WorldWideScience

Sample records for security technology development

  1. The DOE safeguards and security technology development program

    International Nuclear Information System (INIS)

    Cherry, R.C.; Wheelock, A.J.

    1991-01-01

    This paper reports that strategic planning for safeguards and security within the Department of Energy emphasizes the contributions of advanced technologies to the achievement of Departmental protection program goals. The Safeguards and Security Technology Development Program provides state-of-the-art technologies, systems and technical services in support of the policies and programmatic requirements for the protection of Departmental assets. The Program encompasses research and development in physical security, nuclear material control and accountability, information security and personnel security, and the integration of these disciplines in advanced applications. Technology development tasks serve goals that range from the maintenance of an effective technology base to the development, testing and evaluation of applications to meet field needs. A variety of factors, from the evolving threat to reconfiguration of the DOE complex and the technical requirements of new facilities, are expected to influence safeguards and security technology requirements and development efforts. Implementation of the Program is based on the systematic identification, prioritization and alignment of technology development tasks and needs. Initiatives currently underway are aimed at enhancing technology development project management. Increased management attention is also being placed on efforts to promote the benefits of the Program through technology transfer and interagency liaison

  2. Information Security: Past, Present and Future - Impact of Developments in Information Technology on Security

    NARCIS (Netherlands)

    Overbeek, P.L.

    1991-01-01

    The development of information security is addressed in relation to the development of information technology. The leading question is: how has information security developed itself so far, and how should it progress to address tomorrow's security needs. An overwiew is given of the use of

  3. Safeguards and security deficiencies fulfilled through technology development

    International Nuclear Information System (INIS)

    Smoot, W.

    1996-01-01

    The Office of Safeguards and Security (OSS) sponsors research and development activities based on identified field and headquarters customer requirements. Annually, a formal solicitation of safeguards and security user needs is conducted. Currently, there are over 300 valid safeguards and security deficiencies that have been identified. These user needs serve as the basis for formulating the OSS Technology Development Program (TDP). Due to budget constraints, the TDP can only address approximately 47% of these needs in FY 1996. This paper will discuss, in a general sense, the current deficiencies and how the TDP is responding to each. Specifically, the paper will highlight technologies in the areas of Material Control and Accounting, Physical Security, and Information Security. A brief discussion of unfulfilled user requirements will also be presented as a catalyst for leveraging available or developing technologies from other similar programs or from private industry

  4. Safeguards and Security Technology Development Directory. FY 1993

    Energy Technology Data Exchange (ETDEWEB)

    1993-06-01

    The Safeguards and Security Technology Development Directory is published annually by the Office of Safeguards and Security (OSS) of the US Department of Energy (DOE), and is Intended to inform recipients of the full scope of the OSS R&D program. It is distributed for use by DOE headquarters personnel, DOE program offices, DOE field offices, DOE operating contractors, national laboratories, other federal agencies, and foreign governments. Chapters 1 through 7 of the Directory provide general information regarding the Technology Development Program, including the mission, program description, organizational roles and responsibilities, technology development lifecycle, requirements analysis, program formulation, the task selection process, technology development infrastructure, technology transfer activities, and current research and development tasks. These chapters are followed by a series of appendices which contain more specific information on aspects of the Program. Appendix A is a summary of major technology development accomplishments made during FY 1992. Appendix B lists S&S technology development reports issued during FY 1992 which reflect work accomplished through the OSS Technology Development Program and other relevant activities outside the Program. Finally, Appendix C summarizes the individual task statements which comprise the FY 1993 Technology Development Program.

  5. Secure, Mobile, Wireless Network Technology Designed, Developed, and Demonstrated

    Science.gov (United States)

    Ivancic, William D.; Paulsen, Phillip E.

    2004-01-01

    The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and

  6. The Department of Energy's safeguards and security technology development program

    International Nuclear Information System (INIS)

    Smith, G.D.; Pocratsky, C.A.

    1995-01-01

    The US DOE has had a program that develops technologies to protect sensitive nuclear weapons facilities for more than thirty years. The mission of the program is overwhelmingly diverse, as it must be to protect an array of assets such as nuclear weapons, special nuclear material in various forms, components of nuclear weapons, and classified nuclear weapons design information. Considering that the nuclear weapons complex consists of dozens of facilities that are scattered all over the US, the technology development mission is very challenging. Complicating matters further is the ever uncertain future of the DOE. Some examples of dramatic Departmental mission changes that directly impact their security technology development program are given. A few development efforts are highlighted as examples of efforts currently being sponsored. They are: automated sensor testing devices to help reduce the requirement for personnel to enter vaults containing highly radioactive nuclear materials; a vehicle inspection portal to screen vehicles for hidden passengers, nuclear material, explosives, and other contraband; non-lead and short-range ammunition as an environmentally safe alternative to lead ammunition; a complex-wide visitor access control system to allow all DOE employees to travel to all sites with a commonly recognized credential; automated nuclear material monitoring technologies to provide assurance that material in storage has not been tampered with; laser radar as a potential solution to early warning deficiencies throughout the Department; performance testing standards for many security products to include an automated and consistent standard for assessing the quality of video; low temperature pyrotechnic smoke as a possible adversary delay mechanism; modular vaults to provide temporary protection for nuclear material during D and D activities, and a protection approach for restricted passage areas such as the volume above a tiled ceiling or within a crawl space

  7. Security Aspects for Business Solution Development on Portal Technology

    OpenAIRE

    Ovidiu R?DU??; Adrian MUNTEANU

    2012-01-01

    In the scope of portal development, in order to talk about security issues, concerns, and solutions, it is necessary to define a few terms: authentication, authorization, Single Sign-On (SSO), confidentiality, integrity, and non-repudiation. Focusing on the scope of what the portal developer and designer need to know, below it will be explained these concepts, considering it is important to define and make a brief analysis of these terms for understanding of achieving the security goals.

  8. Development of a security system for assisted reproductive technology (ART).

    Science.gov (United States)

    Hur, Yong Soo; Ryu, Eun Kyung; Park, Sung Jin; Yoon, Jeong; Yoon, San Hyun; Yang, Gi Deok; Hur, Chang Young; Lee, Won Don; Lim, Jin Ho

    2015-01-01

    In the field of assisted reproductive technology (ART), medical accidents can result in serious legal and social consequences. This study was conducted to develop a security system (called IVF-guardian; IG) that could prevent mismatching or mix-ups in ART. A software program was developed in collaboration with outside computer programmers. A quick response (QR) code was used to identify the patients, gametes and embryos in a format that was printed on a label. There was a possibility that embryo development could be affected by volatile organic components (VOC) in the printing material and adhesive material in the label paper. Further, LED light was used as the light source to recognize the QR code. Using mouse embryos, the effects of the label paper and LED light were examined. The stability of IG was assessed when applied in clinical practice after developing the system. A total of 104 cycles formed the study group, and 82 cycles (from patients who did not want to use IG because of safety concerns and lack of confidence in the security system) to which IG was not applied comprised the control group. Many of the label paper samples were toxic to mouse embryo development. We selected a particular label paper (P touch label) that did not affect mouse embryo development. The LED lights were non-toxic to the development of the mouse embryos under any experimental conditions. There were no differences in the clinical pregnancy rates between the IG-applied group and the control group (40/104 = 38.5 % and 30/82 = 36.6 %, respectively). The application of IG in clinical practice did not affect human embryo development or clinical outcomes. The use of IG reduces the misspelling of patient names. Using IG, there was a disadvantage in that each treatment step became more complicated, but the medical staff improved and became sufficiently confident in ART to offset this disadvantage. Patients who received treatment using the IG system also went through a somewhat

  9. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  10. How the Office of Safeguards and Security Technology development program facilitates safeguarding and securing the DOE complex

    International Nuclear Information System (INIS)

    Smoot, W.

    1995-01-01

    The technology development program's (TDP's) mission is to provide technologies or methodologies that address safeguards and security requirements throughout the U.S. DOE complex as well as to meet headquarters' policy needs. This includes developing state-of-the-art technologies or modifying existing technologies in physical security, material control and accountability, information security, and integrated safeguards systems. The TDP has an annual process during which it solicits user requirements from the field. These requirements are analyzed by DOE headquarters and laboratory personnel for technical merit. The requirements are then prioritized at headquarters, and the highest priorities are incorporated into our budget. Although this user-needs process occurs formally once a year, user requirements are accepted at any time. The status of funded technologies is communicated through briefings, programs reviews, and various documents that are available to all interested parties. Participants in several interagency groups allows our program to benefit from what others are doing and to prevent duplications of efforts throughout the federal community. Many technologies are transferred to private industry

  11. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  12. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  13. Development of IT-based Cyber Security Technology for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Hong, S. B.; Lee, J. C.; Choi, Y. S.; Choi, Y. R.; Cho, J. W.; Jung, C. E.; Jeong, K. I.; Park, B.; Koo, I. S.

    2009-11-01

    Development and enlargement of the high speed communication network make it possible the user to access online information easily. It generates changing offline activities to online in the economics, expansion of cultural interchanges and convenient life. But it also causes misuse, wiretapping, forgery and alteration of the information via illegal invasion(virus, hacking), and these are derived from the open network characteristic, weakness of the securities of the TCP/IP protocol and information systems. The security of individual and the national foundation facility(industry and government) can be threatened because of these problems, and theses can be used as a instrument of cyber-war. Many cyber security technologies have been developed to corp with the cyber threat. One of the most important national facility is the nuclear power plant and the necessity of the cyber security for the digital I and C of it have been proposed since middle of the 2000. KINS announced the regulation of the cyber security for the digital I and C of the nuclear power plant in 2007. The main concept of the cyber security for it is similar to the IT field that is treated as a leader of the cyber security. Because of the difference of the characteristics between the IT field and the nuclear industry, applying the cyber security technologies developed and used in the IT field to the nuclear industry has some critical constraints. We will analyze these problems and propose a cyber security method based on cryptograph and authentication for the I and C communication network in this report

  14. Development of IT-based Cyber Security Technology for Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Hong, S. B.; Lee, J. C.; Choi, Y. S.; Choi, Y. R.; Cho, J. W.; Jung, C. E.; Jeong, K. I.; Park, B.; Koo, I. S

    2009-11-15

    Development and enlargement of the high speed communication network make it possible the user to access online information easily. It generates changing offline activities to online in the economics, expansion of cultural interchanges and convenient life. But it also causes misuse, wiretapping, forgery and alteration of the information via illegal invasion(virus, hacking), and these are derived from the open network characteristic, weakness of the securities of the TCP/IP protocol and information systems. The security of individual and the national foundation facility(industry and government) can be threatened because of these problems, and theses can be used as a instrument of cyber-war. Many cyber security technologies have been developed to corp with the cyber threat. One of the most important national facility is the nuclear power plant and the necessity of the cyber security for the digital I and C of it have been proposed since middle of the 2000. KINS announced the regulation of the cyber security for the digital I and C of the nuclear power plant in 2007. The main concept of the cyber security for it is similar to the IT field that is treated as a leader of the cyber security. Because of the difference of the characteristics between the IT field and the nuclear industry, applying the cyber security technologies developed and used in the IT field to the nuclear industry has some critical constraints. We will analyze these problems and propose a cyber security method based on cryptograph and authentication for the I and C communication network in this report.

  15. Internet security technologies

    CERN Multimedia

    CERN. Geneva

    2003-01-01

    The three pillars of Internet Security are Infrastructure, Applications and People. In this series of lectures we will examine those three pillars and how vital it is for individuals to understand the vulnerabilities of this technology so they can made informed decisions about risks and how they can reduce those risks for themselves and their colleagues.First we will focus on the infrastructure: network; servers; operating systems and all those things that are mostly invisible. Moving up a level, into the visible realm, we discuss the application and see things like buffer overflows, viruses and how as application developers and users we can protect ourselves. Finally, it's all about people. The strongest security technology in the world is easily defeated if people don't understand their role in the whole system.

  16. School Security Technologies

    Science.gov (United States)

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  17. Technology Empowerment: Security Challenges.

    Energy Technology Data Exchange (ETDEWEB)

    Warren, Drake Edward [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Backus, George A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Wendell [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nelson, Thomas R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Skocypec, Russell D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-03-01

    Technology empowerment” means that innovation is increasingly accessible to ordinary people of limited means. As powerful technologies become more affordable and accessible, and as people are increasingly connected around the world, ordinary people are empowered to participate in the process of innovation and share the fruits of collaborative innovation. This annotated briefing describes technology empowerment and focuses on how empowerment may create challenges to U.S. national security. U.S. defense research as a share of global innovation has dwindled in recent years. With technology empowerment, the role of U.S. defense research is likely to shrink even further while technology empowerment will continue to increase the speed of innovation. To avoid falling too far behind potential technology threats to U.S. national security, U.S. national security institutions will need to adopt many of the tools of technology empowerment.

  18. Human resource development program for nuclear safety and security in Tokyo Institute of Technology

    International Nuclear Information System (INIS)

    Han, Chi Young; Sagara, Hiroshi; Nagasaka, Hideo

    2014-01-01

    The Academy for Global Nuclear Safety and Security Agent was established at Tokyo Institute of Technology in 2011, to develop global nuclear human resources in the field of 3S (Safety, Security, and Safeguards) as a Program for Leading Graduate Schools supported by MEXT (Ministry of Education, Culture, Sports, Science and Technology). New courses of nuclear safety and security were developed in addition to the existing nuclear engineering program; 1) Environmental Dynamics of Radioactive Nuclides; Numerical simulation of the environmental dispersion of radioactive materials released from hypothetical nuclear accidents and evaluation of the public exposure are performed, by using a computer-based emergency response system, to have students predict the environmental dispersion of radionuclides and radiological consequence by nuclear accidents. 2) Measurement of Environmental Radiation; Students acquire hands-on experiences measuring environmental radiation contamination caused by the nuclear accident in Fukushima with multiple types of radiation detectors. Environmental samples are collected and analyzed for isotope identification and its spatial distribution. 3) Simulation of Severe Nuclear Accidents; The evaluation results of Fukushima accident progression are discussed as well as typical sever accidents that threaten the integrity of reactor vessel. Students simulate BWR (Boiling Water Cooled Reactor) transients, design basis accidents, and severe accidents by using simulators. 4) Nuclear Security Training; Design of physical protection systems, its fundamental physics, and regulatory frameworks are covered and students gain the practical experiences by use of intrusion detection systems at JAEA (Japan Atomic Energy Agency), and by numerical simulation of hydro-dynamics of structure material and nuclear material criticality at the university. (author)

  19. Information technology security system engineering methodology

    Science.gov (United States)

    Childs, D.

    2003-01-01

    A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.

  20. Security Problems of Mobile Technologies

    Directory of Open Access Journals (Sweden)

    A. G. Beltov

    2012-09-01

    Full Text Available The article provides an overview of security problems which exist in the mobile devices. The main technologies aimed to protect the phones from various types of attacks are considered. The authors justify the necessity of developing new improved tools and methods to ensure the safety of such devices.

  1. Security force effectiveness and technology

    International Nuclear Information System (INIS)

    Seaton, M.B.

    1988-01-01

    No one would propose ineffective security forces. Applied technology always has, as its purpose, to increase effectiveness. Evidence exists, however, that poorly conceived or executed technological solutions can actually do more harm than good. The author argues for improved human factor considerations in physical security applied technology -- especially in the area of security console operations

  2. Development programs of cutting-edge technologies for measurement and detection of nuclear material for safeguards and security

    International Nuclear Information System (INIS)

    Seya, Michio; Wakabayashi, Shuji; Naoi, Yosuke; Ohkubo, Michiaki; Senzaki, Masao

    2011-01-01

    The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security ('ISCN', hereafter) of Japan Atomic Energy Agency (JAEA) has development programs of cutting-edge technologies for measurement and detection of nuclear materials for nuclear safeguards and security, under the sponsorship of Japanese government (MEXT: Ministry of Education, Culture, Sports, Science and Technology). ISCN started development programs of the following technologies this year. (1) NRF (Nuclear Resonance Fluorescence) NDA technology using laser Compton scattering (LCS) gamma-rays, (2) Alternative to 3 He neutron detection technology using inorganic solid scintillator. ISCN is also going to conduct a demonstration test of a spent fuel Pu-NDA system that is to be developed by LANL (Los Alamos National Laboratory) using very sophisticated neutron measurement technologies, under JAEA/USDOE cooperation agreement. This presentation shows the above programs of ISCN. (author)

  3. Survey of network and information security technology

    International Nuclear Information System (INIS)

    Liu Baoxu; Wang Xiaozhen

    2007-01-01

    With the rapidly development of the computer network technology and informationize working of our Country, Network and Information Security issues becomes the focal point problem that people shows solicitude for. On the basis analysing security threat and challenge of network information and their developing trend. This paper briefly analyses and discusses the main relatively study direction and content about the theory, technology and practice of Network and Information Security. (authors)

  4. Surviving security how to integrate people, process, and technology

    CERN Document Server

    Andress, Amanda

    2003-01-01

    WHY DO I NEED SECURITY? Introduction The Importance of an Effective Security Infrastructure People, Process, and Technology What Are You Protecting Against? Types of Attacks Types of Attackers Security as a Competitive Advantage Choosing a Solution Finding Security Employees The Layered Approach UNDERSTANDING REQUIREMENTS AND RISK What Is Risk? Embracing Risk Information Security Risk Assessment Assessing Risk Insurance SECURITY POLICIES AND PROCEDURES Internal Focus Is Key Security Awareness and Education Policy Life Cycle Developing Policies Components of a Security Policy Sample Security Po

  5. National Security Technology Incubator Business Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  6. Marine data security based on blockchain technology

    Science.gov (United States)

    Yang, Zhao; Xie, Weiwei; Huang, Lei; Wei, Zhiqiang

    2018-03-01

    With the development of marine observation technology and network technology, the volume of marine data growing rapidly. This brings new challenges for data storage and transmission. How to protect data security of marine big data has become an urgent problem. The traditional information security methods’ characteristic is centralization. These technologies cannot provide whole process protection, e.g., data storage, data management and application of data. The blockchain technology is a novel technology, which can keep the data security and reliability by using decentralized methodology. It has aroused wide interest in the financial field. In this paper, we describe the concept, characteristics and key technologies of blockchain technology and introduce it into the field of marine data security.

  7. National Security Technology Incubator Evaluation Process

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.

  8. Information security foundations, technologies and applications

    CERN Document Server

    Awad, Ali Ismail; Fairhurst, Michael

    2018-01-01

    This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security.

  9. Managing information technology security risk

    Science.gov (United States)

    Gilliam, David

    2003-01-01

    Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.

  10. Aerospace Communications Security Technologies Demonstrated

    Science.gov (United States)

    Griner, James H.; Martzaklis, Konstantinos S.

    2003-01-01

    In light of the events of September 11, 2001, NASA senior management requested an investigation of technologies and concepts to enhance aviation security. The investigation was to focus on near-term technologies that could be demonstrated within 90 days and implemented in less than 2 years. In response to this request, an internal NASA Glenn Research Center Communications, Navigation, and Surveillance Aviation Security Tiger Team was assembled. The 2-year plan developed by the team included an investigation of multiple aviation security concepts, multiple aircraft platforms, and extensively leveraged datalink communications technologies. It incorporated industry partners from NASA's Graphical Weather-in-the-Cockpit research, which is within NASA's Aviation Safety Program. Two concepts from the plan were selected for demonstration: remote "black box," and cockpit/cabin surveillance. The remote "black box" concept involves real-time downlinking of aircraft parameters for remote monitoring and archiving of aircraft data, which would assure access to the data following the loss or inaccessibility of an aircraft. The cockpit/cabin surveillance concept involves remote audio and/or visual surveillance of cockpit and cabin activity, which would allow immediate response to any security breach and would serve as a possible deterrent to such breaches. The datalink selected for the demonstrations was VDL Mode 2 (VHF digital link), the first digital datalink for air-ground communications designed for aircraft use. VDL Mode 2 is beginning to be implemented through the deployment of ground stations and aircraft avionics installations, with the goal of being operational in 2 years. The first demonstration was performed December 3, 2001, onboard the LearJet 25 at Glenn. NASA worked with Honeywell, Inc., for the broadcast VDL Mode 2 datalink capability and with actual Boeing 757 aircraft data. This demonstration used a cockpitmounted camera for video surveillance and a coupling to

  11. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  12. Cyber security analytics, technology and automation

    CERN Document Server

    Neittaanmäki, Pekka

    2015-01-01

    Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are  Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

  13. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  14. The Use of Space Technology for Environmental Security, Disaster Rehabilitation and Sustainable Development in Afghanistan and Iraq

    Science.gov (United States)

    Lovett, Kian

    Since the dawn of time, humans have engaged in war. In the last 5,600 years of recorded history 14,600 wars have been waged1. The United Nations has sought to save succeeding generations from the scourge of war and to foster peace. Wars have recently taken place in Afghanistan and Iraq. Both countries are now faced with a range of complex problems. In-depth country assessments reveal significant shortcomings in the areas of water, sanitation, health, security and natural resource management. These are key factors when examining environmental security, sustainable development and trans-boundary problems, all of which are issues relevant to the Middle East and Central Asian states. Space technology can be applied to support the reconstruction and development plans for Afghanistan and Iraq; however, there needs to be an investigation and open discussion of how these resources can best be used. Already, agencies within the United Nations possess considerable expertise in the use of space technologies in the area of disaster management. If this capability is to be used, there will need to be inter-agency coordination, not to mention a further expansion and development of the United Nations role in both Afghanistan and Iraq.

  15. New technology for food systems and security.

    Science.gov (United States)

    Yau, N J Newton

    2009-01-01

    In addition to product trade, technology trade has become one of the alternatives for globalization action around the world. Although not all technologies employed on the technology trade platform are innovative technologies, the data base of international technology trade still is a good indicator for observing innovative technologies around world. The technology trade data base from Sinew Consulting Group (SCG) Ltd. was employed as an example to lead the discussion on security or safety issues that may be caused by these innovative technologies. More technologies related to processing, functional ingredients and quality control technology of food were found in the data base of international technology trade platform. The review was conducted by categorizing technologies into the following subcategories in terms of safety and security issues: (1) agricultural materials/ingredients, (2) processing/engineering, (3) additives, (4) packaging/logistics, (5) functional ingredients, (6) miscellaneous (include detection technology). The author discusses examples listed for each subcategory, including GMO technology, nanotechnology, Chinese medicine based functional ingredients, as well as several innovative technologies. Currently, generation of innovative technology advance at a greater pace due to cross-area research and development activities. At the same time, more attention needs to be placed on the employment of these innovative technologies.

  16. National Security Technology Incubation Project Continuation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  17. An Overview of Computer Network security and Research Technology

    OpenAIRE

    Rathore, Vandana

    2016-01-01

    The rapid development in the field of computer networks and systems brings both convenience and security threats for users. Security threats include network security and data security. Network security refers to the reliability, confidentiality, integrity and availability of the information in the system. The main objective of network security is to maintain the authenticity, integrity, confidentiality, availability of the network. This paper introduces the details of the technologies used in...

  18. Building secure network by integrated technology

    International Nuclear Information System (INIS)

    An Dehai; Xu Rongsheng; Liu Baoxu

    2000-01-01

    The author introduces a method which can realize the most powerful network security prevention by the network security integrated technologies such as firewall, realtime monitor, network scanner, Web detection and security, etc

  19. Engineering Principles for Information Technology Security (A Baseline for Achieving Security)

    National Research Council Canada - National Science Library

    Stoneburner, Gary

    2001-01-01

    The purpose of the Engineering Principles for Information Technology (IT) Security (HP-ITS) is to present a list of system-level security principles to he considered in the design, development, and operation of an information system...

  20. Physical security technology base programs for physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-01-01

    Sandia National Laboratories is the US Department of Energy's lead laboratory for physical security research and development (R and D). In support of this mission, Sandia has maintained for several years an R and D program in each of the following technology areas: Intrusion Detection, Entry Control, CCTV Assessment, Access Delay, Alarm Display, and Guard Equipment and Training. The purpose of the technology base programs is to maintain cognizance of the capabilities of the commercial market, identify improvements and transfer technology to industry and facilities. The output of these programs supports the development of new equipment and advanced system concepts, demonstrations of proof-of-principles and system implementation. This paper will review the status of current developments and discuss trends in new technologies which are being explored for future applications, i.e., artificial intelligence, expert systems, robotics, and more automated systems

  1. Safety and Security Interface Technology Initiative

    International Nuclear Information System (INIS)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-01-01

    Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. ''Supporting Excellence in Operations Through Safety Analysis'', (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is ''Safeguards/Security Integration with Safety''. This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ''tool box'' of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated

  2. PROMOTING GOAT MARKETS AND TECHNOLOGY DEVELOPMENT IN SEMI-ARID ZIMBABWE FOR FOOD SECURITY AND INCOME GROWTH

    Directory of Open Access Journals (Sweden)

    André van Rooyen

    2009-02-01

    Full Text Available An increasing demand for livestock products including goat meat offers small-scale farmers in semi-arid Zimbabwe opportunities for increased market participation. However, existing goat markets are largely informal, with poorly developed inputs and services. Transaction costs are high, resulting in low prices. In addition, access to market information is limited and negates informed decision-making. Also, farmers are unable to realize the full potential of their herds because of insufficient investment in management practices. Farmers use the cash from goat sales for food, education and human health. Yet, they lose up to 26% of their goat herds to mortality, attributed to dry season feed shortages, animal health and inappropriate housing. While farmers do react to market development, it is not in a consistent enough manner to realize the returns from their investments. More needs to be done to improve production, reduce transaction costs and increase market access to ensure growth within the sector. We hypothesize that improved market access will provide farmers with the incentive to invest in management technologies to enhance offtake and increase the quality of their goats. Innovation Platforms, forums that facilitate communication between farmers, market players, input and service suppliers around local production and marketing systems, were established in two locations in Zimbabwe. The stakeholders meet to identify challenges and opportunities with regards to both production and marketing and collectively identify and evaluate improvements in management technologies and markets. This new approach places technology and market development in a local context based on common interests and strong partnerships between the private and public sectors. It builds local capacity, aligns production with market demands, and improves the overall efficiency of the system, thereby increasing food security and income growth and supporting the development of

  3. Restricted access processor - An application of computer security technology

    Science.gov (United States)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  4. Enterprise security IT security solutions : concepts, practical experiences, technologies

    CERN Document Server

    Fumy, Walter

    2013-01-01

    Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cr

  5. New Technology's Surprising Security Threats. Building Digital Libraries

    Science.gov (United States)

    Huwe, Terence

    2005-01-01

    In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…

  6. Secure Web Developers Needed!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    You’re about to launch a new website? Cool!! With today’s web programming languages like PHP, Java, Python or Perl, complex websites can be created, easily fulfilling all your use cases. But hold on. Did you ever think about how easily this can be abused? Attackers today are already using automatic tools which can quickly and easily find and exploit vulnerable web applications.   Web applications often suffer from security vulnerabilities, i.e. design flaws or programming bugs that remained undetected during the whole software development cycle. In production these vulnerabilities become security holes, providing an opportunity for exploitation, and can pose immense security risks (and there is no reason to believe that CERN is immune to this). The costs associated with eliminating these bugs could be loosely described by the "1:10:100 rule", i.e. the relative costs for fixing are 1:10:100 for fixing them in the programming:testing:production phases. Thus, the...

  7. Safety and Security Interface Technology Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-05-01

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security

  8. Denial technology, the neglected security element

    International Nuclear Information System (INIS)

    Mauney, C.H.

    1982-01-01

    Even though there has been an increased concern over providing adequate security during the past decade, and even though some aspects of existing security systems have been enhanced during this period, much remains to be done to provide that balance which is so necessary to have all elements function as an effective unit. The area that primarily has been neglected is the delay element - the part of the system which makes possible the needed time for the security force to respond after an intrustion is detected and prior to the adversary attaining his desired goal. The purpose of this paper is to address the vulnerabilities of a security system which exist without the proper delay elements and to suggest how current technology can provide, through the use of activated barriers, that needed delay time to bring the system into balance. Security managers desire reliability and effectiveness; plant managers require safety, non-interference with operations, cost considerate capability, and aesthetic application - these characteristics will be addressed in the context of providing the required delay. This paper, hopefully, will set the stage for dialogue between developer and user, yielding a mutally acceptable approach to balanced security protection

  9. Nuclear energy technology transfer: the security barriers

    International Nuclear Information System (INIS)

    Rinne, R.L.

    1975-08-01

    The problems presented by security considerations to the transfer of nuclear energy technology are examined. In the case of fusion, the national security barrier associated with the laser and E-beam approaches is discussed; for fission, the international security requirements, due to the possibility of the theft or diversion of special nuclear materials or sabotage of nuclear facilities, are highlighted. The paper outlines the nuclear fuel cycle and terrorist threat, examples of security barriers, and the current approaches to transferring technology. (auth)

  10. Clean fuel technology for world energy security

    Energy Technology Data Exchange (ETDEWEB)

    Sunjay, Sunjay

    2010-09-15

    Clean fuel technology is the integral part of geoengineering and green engineering with a view to global warming mitigation. Optimal utilization of natural resources coal and integration of coal & associated fuels with hydrocarbon exploration and development activities is pertinent task before geoscientist with evergreen energy vision with a view to energy security & sustainable development. Value added technologies Coal gasification,underground coal gasification & surface coal gasification converts solid coal into a gas that can be used for power generation, chemical production, as well as the option of being converted into liquid fuels.

  11. Secure software development training course

    Directory of Open Access Journals (Sweden)

    Victor S. Gorbatov

    2017-06-01

    Full Text Available Information security is one of the most important criteria for the quality of developed software. To obtain a sufficient level of application security companies implement security process into software development life cycle. At this stage software companies encounter with deficit employees who able to solve problems of software design, implementation and application security. This article provides a description of the secure software development training course. Training course of application security is designed for co-education students of different IT-specializations.

  12. Smart Card Security; Technology and Adoption

    OpenAIRE

    Hamed Taherdoost; Shamsul Sahibuddin; Neda Jalaliyoon

    2011-01-01

    Newly, smart card technology are being used in a number of ways around the world, on the otherhand, security has become significant in information technology, especially in those applicationinvolving data sharing and transactions through the internet. Furthermore, researches ininformation technology acceptance have identified the security as one of the factor that caninfluence on smart card adoption. This research is chiefly to study the security principals of smartcard and assess the securit...

  13. Center for Coastline Security Technology, Year-2

    National Research Council Canada - National Science Library

    Glegg, Stewart; Glenn, William; Furht, Borko; Beaujean, P. P; Frisk, G; Schock, S; VonEllenrieder, K; Ananthakrishnan, P; An, E; Granata, R

    2007-01-01

    ...), the Imaging Technology Center, the Department of Computer Science and Engineering, and the University Consortium for Intermodal Transportation Safety and Security at Florida Atlantic University...

  14. Making Technology Work for Campus Security

    Science.gov (United States)

    Floreno, Jeff; Keil, Brad

    2010-01-01

    The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…

  15. Factors Influencing the Adoption of Biometric Security Technologies by Decision Making Information Technology and Security Managers

    OpenAIRE

    Lease, David R.

    2005-01-01

    The research conducted under this study offers an understanding of the reasons why information technology (IT) and/or information assurance (IA) managers choose to recommend or not to recommend particular technologies, specifically biometric security, to their organizations. A review of the relevant literature provided the foundation to develop a set of research questions and factors for this research effort. The research questions became the basis of the study’s stated hypotheses for examini...

  16. Advanced technologies: Trends and implications for security

    International Nuclear Information System (INIS)

    Shaw, A.

    1990-01-01

    As the world moves towards the close of the twentieth century, three technological trends will strongly influence security. In order of importance they are: first, the increasing globalization of the ability to develop and use high technology, much of which has both civilian and military applications; secondly, the broad dissemination of militarily-relevant technology world-wide; and thirdly, the continued development by the United States and the USSR (and a few other nations) of advanced technology for military applications. The military balance between the super-Powers and their allies has been strongly rooted in advancing military technology. Great changes in technology have resulted in adjustments -mostly in limited aspects such as the armour/ anti-armour balance - but have not caused it to change wildly. This seems likely to remain the case for the foreseeable future. There are arguments that Western technology has been a prime causative factor behind Soviet willingness to engage in negotiations to reduce forces. They claim that fear of the Strategic Defense Initiative is behind progress in the Strategic Arms Reduction Talks, and that perceived Western mastery of the technology for systems combining quick reaction, deep strike and high kill probabilities led the Soviet Union to reassess its potential for a successful land campaign in Europe. If current arms control negotiations are successful, the momentum is maintained, and other political changes take hold, the military balance could be taken to a point where ft would not be very sensitive to technological change. One should be aware that the arms control negotiations are very complex, primarily because of technological issues, and we should not yet bank on it all working out well. If it fails, the military technical competition will heat up again. Even under a strict arms control regime we can expect the competition to continue as each side seeks to develop counters to what ft sees as the other side

  17. Review: Security in Wireless Technologies in Business

    Science.gov (United States)

    Sattarova, F. Y.; Kim, Tai-Hoon

    Wireless technology seems to be everywhere now - but it is still relatively in its infancy. New standards and protocols continue to emerge and problems and bugs are discovered. Nevertheless, wireless networks make many things much more convenient and it appears that wireless networks are here to stay. The differences and similarities of wireless and wired security, the new threats brought by mobility, the security of networks and devices and effects of security, or lack of it are shortly discussed in this review paper.

  18. Capitalization of Defense Technology Security Administration Equipment

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    ... $5.2 million in the Equipment in Use account on its trial balance. Starting with FY 1996, Defense Technology Security Administration financial data will be included in consolidated DoD financial statements...

  19. Emerging Technology for School Security

    Science.gov (United States)

    Doss, Kevin T.

    2012-01-01

    Locks and keys ring up huge costs for education institutions. No wonder many facility directors and public-safety directors have turned to automated access-control systems with magnetic-stripe cards, proximity cards and, most recently, smart cards. Smart cards can provide a host of on- and off-campus services beyond security. In addition to…

  20. Assessing security technology's impact: old tools for new problems.

    Science.gov (United States)

    Kreissl, Reinhard

    2014-09-01

    The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for the use of surveillance technologies. These distinctions developed in the physical world and are rooted in a cultural understanding of pre-digital culture. Attempts to capture the problems emerging with the implementation of security technologies using legal reasoning encounter a number of problems since law is by definition oriented backwards, adapting new developments to existing traditions, whereas the intrusion of new technologies in the physical world produces changes and creates fundamentally new problems.

  1. Security alarm communication and display systems development

    International Nuclear Information System (INIS)

    Waddoups, I.G.

    1990-01-01

    Sandia National Laboratories (SNL) has, as lead Department of Energy (DOE) physical security laboratory, developed a variety of alarm communication and display systems for DOE and Department of Defense (DOD) facilities. This paper briefly describes some of the systems developed and concludes with a discussion of technology relevant to those currently designing, developing, implementing, or procuring such a system. Development activities and the rapid evolution of computers over the last decade have resulted in a broad variety of capabilities to support most security system communication and display needs. The major task in selecting a system is becoming familiar with these capabilities and finding the best match to a specific need

  2. A study of the security technology and a new security model for WiFi network

    Science.gov (United States)

    Huang, Jing

    2013-07-01

    The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.

  3. Infrared: A Key Technology for Security Systems

    OpenAIRE

    Corsi, Carlo

    2012-01-01

    Infrared science and technology has been, since the first applications, mainly dedicated to security and surveillance especially in military field, besides specialized techniques in thermal imaging for medical diagnostic and building structures and recently in energy savings and aerospace context. Till recently the security applications were mainly based on thermal imaging as surveillance and warning military systems. In all these applications the advent of room temperature, more reliable due...

  4. The role of the Department of Homeland Security, Science and Technology Directorate in the development of vaccines and diagnostics for Transboundary Animal Diseases.

    Science.gov (United States)

    Colby, M; Coats, M; Brake, D; Fine, J

    2013-01-01

    The development of countermeasures to support an effective response to Transboundary Animal Diseases (TAD) poses a challenge on a global scale and necessitates the coordinated involvement of scientists from government, industry and academia, as well as regulatory entities. The Agricultural Defense Branch under the Chemical and Biological Defense Division (CBD) of the Department of Homeland Security (DHS), Science and Technology Directorate (S&T) supports this important mission within the United States. This article provides an overview of the Agricultural Defense Branch's vaccine and diagnostic TAD project.

  5. Environmental security and sustainable development

    International Nuclear Information System (INIS)

    Kok, M.T.J.

    1996-01-01

    Environmental security has become an important problem area for the social sciences and is becoming a key concept in long-term environmental policy and global environmental change issues. In taking Environmental Security on board, the International Human Dimensions Programme (IHDP) intends to stimulate research on approaches to solve global environmental issues, responses to climate change, food and water security, extreme weather events, etc. Both the Netherlands and Canadian HDP committee have placed environmental security and sustainable development on their national agendas. However, a research agenda for the role of social sciences in environmental security and societal impacts of global change has not been sufficiently elaborated yet, except for economic research on the impacts of climate change. This was the main reason for holding the title workshop. The aims of the workshop were: (1) to define environmental security as a research theme; (2) to explore the research agenda on environmental security for the social sciences; and (3) to establish and reinforce (inter)national research networks in this field. Two papers served as input for the participants of the workshop. First, in the Scoping Report Global Environmental Change and Human Security a brief overview is given of research conducted so far, as well as a working plan for the recently formed ad hoc Working Group on Environmental Security and Global Environmental Change. Secondly, the preliminary results of a programming study on Environmental Security and the societal impacts of climate change are presented. Special attention was given to the involvement of policymakers in the workshop. figs., tabs., 3 appendices, refs

  6. Developing Scalable Information Security Systems

    Directory of Open Access Journals (Sweden)

    Valery Konstantinovich Ablekov

    2013-06-01

    Full Text Available Existing physical security systems has wide range of lacks, including: high cost, a large number of vulnerabilities, problems of modification and support system. This paper covers an actual problem of developing systems without this list of drawbacks. The paper presents the architecture of the information security system, which operates through the network protocol TCP/IP, including the ability to connect different types of devices and integration with existing security systems. The main advantage is a significant increase in system reliability, scalability, both vertically and horizontally, with minimal cost of both financial and time resources.

  7. Practice brief. Securing wireless technology for healthcare.

    Science.gov (United States)

    Retterer, John; Casto, Brian W

    2004-05-01

    Wireless networking can be a very complex science, requiring an understanding of physics and the electromagnetic spectrum. While the radio theory behind the technology can be challenging, a basic understanding of wireless networking can be sufficient for small-scale deployment. Numerous security mechanisms are available to wireless technologies, making it practical, scalable, and affordable for healthcare organizations. The decision on the selected security model should take into account the needs for additional server hardware and administrative costs. Where wide area network connections exist between cooperative organizations, deployment of a distributed security model can be considered to reduce administrative overhead. The wireless approach chosen should be dynamic and concentrate on the organization's specific environmental needs. Aspects of organizational mission, operations, service level, and budget allotment as well as an organization's risk tolerance are all part of the balance in the decision to deploy wireless technology.

  8. Disarmament, Security and Development

    Science.gov (United States)

    Bulletin of the Atomic Scientists, 1976

    1976-01-01

    Provided is a summary of the 26th Pugwash Conference on Science and World Affairs held August 26-31, 1976, in Muhlhausen, East Germany. World problems discussed included: arms limitations, military research and development, nuclear test ban, alternative energy sources, and genetic engineering. (SL)

  9. Modern Quantum Technologies of Information Security

    OpenAIRE

    Korchenko, Oleksandr; Vasiliu, Yevhen; Gnatyuk, Sergiy

    2010-01-01

    In this paper, the systematisation and classification of modern quantum technologies of information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of the quantum technologies used is given. A qualitative analysis of the advantages and disadvantages of concrete quantum protocols is made. The current status of the problem of practical quantum cryptography use in telecommunication networks is consider...

  10. 75 FR 28275 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-05-20

    ...: The Homeland Security Science and Technology Advisory Committee met on April 20, 2010 from 8:30 a.m... and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410, Washington... for the Under Secretary of Homeland Security for Science and Technology. The Homeland Security Science...

  11. The Search for Security Technology Funding.

    Science.gov (United States)

    Fickes, Michael

    2003-01-01

    Explains that although it is difficult to find money to pay for school security technology, there are places to look. For example, the Department of Education has a list serve that summarizes various funding opportunities. There is also a Federal Register list serve and a site put out by the Department of Justice. A sidebar presents three…

  12. Combining overt and covert anti-counterfeiting technologies for securities

    Science.gov (United States)

    Uematsu, Tsuyoshi

    2006-02-01

    The National Printing Bureau of Japan has been developing new anti-counterfeiting technologies as a banknote printer. Some of our technologies have already been effectively introduced into Japan's new banknote series. Anti-counterfeiting technologies can be applied not only to banknotes but also to other security documents depending on desired features. In this presentation, I will introduce three of our newly developed overt and covert security techniques, which are intended for document security and brand protection, as well as banknotes. "Metallic View" is mainly for offset printing. "Copy Check" (micro-structural lines involving luminescence) is for plate making technology. "ImageSwitch" is for a new security solution which has unlimited printing applications. All three techniques create "latent images" (some of which may be better known as "carrier screen images") that are useful in preventing counterfeiting. While each of the techniques is effective by itself, all are more effective when applied together. Combining these techniques could make all security documents harder to copy using IT scanners, and provide cost-effective anti-counterfeiting solutions for all security users.

  13. Effective surveillance for homeland security balancing technology and social issues

    CERN Document Server

    Flammini, Francesco; Franceschetti, Giorgio

    2013-01-01

    Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologie...

  14. Energy technology evaluation report: Energy security

    Science.gov (United States)

    Koopman, R.; Lamont, A.; Schock, R.

    1992-09-01

    Energy security was identified in the National Energy Strategy (NES) as a major issue for the Department of Energy (DOE). As part of a process designed by the DOE to identify technologies important to implementing the NES, an expert working group was convened to consider which technologies can best contribute to reducing the nation's economic vulnerability to future disruptions of world oil supplies, the working definition of energy security. Other working groups were established to deal with economic growth, environmental quality, and technical foundations. Energy Security working group members were chosen to represent as broad a spectrum of energy supply and end-use technologies as possible and were selected for their established reputations as experienced experts with an ability to be objective. The time available for this evaluation was very short. The group evaluated technologies using criteria taken from the NES which can be summarized for energy security as follows: diversifying sources of world oil supply so as to decrease the increasing monopoly status of the Persian Gulf region; reducing the importance of oil use in the US economy to diminish the impact of future disruptions in oil supply; and increasing the preparedness of the US to deal with oil supply disruptions by having alternatives available at a known price. The result of the first phase of the evaluation process was the identification of technology groups determined to be clearly important for reducing US vulnerability to oil supply disruptions. The important technologies were mostly within the high leverage areas of oil and gas supply and transportation demand but also included hydrogen utilization, biomass, diversion resistant nuclear power, and substitute industrial feedstocks.

  15. 77 FR 59407 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-27

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... Security Challenges; Accelerating Innovation Through Systems Analysis; and Leveraging Industry for Impact... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0053] Homeland Security Science and...

  16. 78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-03-04

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... HSSTAC input on how to improve that collaboration. --Cyber Security and the evolution of the Cyber... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0014] Homeland Security Science and...

  17. 78 FR 66949 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-11-07

    ... Technology, such as new developments in systems engineering, cyber-security, knowledge management and how... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0071] Homeland Security Science and... Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Science and...

  18. Marketing Plan for the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  19. 75 FR 18516 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-04-12

    ...; notice of closed Federal Advisory Committee meeting SUMMARY: The Homeland Security Science and Technology.... DATES: The Homeland Security Science and Technology Advisory Committee will meet April 20, 2010 from 8...: Ms. Tiwanda Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray...

  20. 75 FR 39955 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-07-13

    ... Homeland Security Science and Technology Advisory Committee meeting will be open to the public on July 20th... Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410... Protection programs in Science & Technology and updates on homeland security sensitive Federally Funded...

  1. 75 FR 2555 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-01-15

    ... Technology Advisory Committee will meet January 26-28, 2010, at the Department of Homeland Security, 1120..., Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410... Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410...

  2. Cyber security evaluation of II&C technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Ken [Idaho National Laboratory (INL), Idaho Falls, ID (United States)

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a

  3. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  4. Secure Java For Web Application Development

    CERN Document Server

    Bhargav, Abhay

    2010-01-01

    As the Internet has evolved, so have the various vulnerabilities, which largely stem from the fact that developers are unaware of the importance of a robust application security program. This book aims to educate readers on application security and building secure web applications using the new Java Platform. The text details a secure web application development process from the risk assessment phase to the proof of concept phase. The authors detail such concepts as application risk assessment, secure SDLC, security compliance requirements, web application vulnerabilities and threats, security

  5. Development and analysis of security policies in security enhanced Android

    OpenAIRE

    Rimando, Ryan A.

    2012-01-01

    Approved for public release; distribution is unlimited. This thesis examines Security Enhanced Android. Both its policy and its additional security features are explored. The policy is examined in depth, providing a better understanding of the security provided by SE Android. We analyze the default SE Android policy. We identify a potential weakness and change the policy to facilitate control over communication channels. A proof-of-concept set of applications is developed to demonstrate ho...

  6. 507 Developing Industrial and Technological Manpower via ...

    African Journals Online (AJOL)

    sustainable industrial and technological advancement and security for national development. ... industrial/technological manpower for Nigeria is the technical vocational education and ..... Business and Social Sciences, 2 (2), 71-77. Retrieved ...

  7. The Threat of Security: Hindering Technology Integration in the Classroom

    Science.gov (United States)

    Robinson, LeAnne K.; Brown, Abbie; Green, Tim

    2007-01-01

    For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…

  8. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  9. Agriculture development and food security policy in Eritrea - An ...

    African Journals Online (AJOL)

    Agriculture development and food security policy in Eritrea - An analysis. ... per cent of its total food needs and in poor years, it produces no more than 25 per cent. ... food security by introducing modern technology, irrigation, terracing, soil and ...

  10. Development of security engineering curricula at US universities

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, M.L.

    1998-08-01

    The Southwest Surety Institute was formed in June 1996 by Arizona State University (ASU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL) to provide educational programs in Security Engineering, and to conduct research and development in security technologies. This is the first science-based program of its kind in the US, focused on educating Security Engineers to help government and industry address their security needs. Each member brings a unique educational capability to the Institute. NM Tech has a formidable explosives testing and evaluation facility. ASU is developing a Masters program in Security Engineering at their School of Technology located on a new campus in Mesa, Arizona. NMSU provides a Security Technology minor, merging programs in Criminal Justice and Engineering Technology. The Sandia National Laboratories security system design and evaluation process forms the basis for the Security Engineering curricula. In an effort to leverage the special capabilities of each university, distance education will be used to share courses among Institute members and eventually with other sites across the country.

  11. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  12. Information technology - Security techniques - Information security management systems - Requirements

    CERN Document Server

    International Organization for Standardization. Geneva

    2005-01-01

    ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties. ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following: use within organizations to formulate security requirements and objectives; use within organizations as a way to ensure that security risks are cost effectively managed; use within organizations to ensure comp...

  13. Positioning of a Peaceful Use of Nuclear Technology in National Security Aspects

    International Nuclear Information System (INIS)

    Kim, Hyun Jun; Chang, Moon Hee; Kim, Hark Rho; Lee, Young Joon; Lee, Sang Heon

    2012-01-01

    Many cases have shown that a peaceful use of nuclear technology should play an important role in national securities such as energy, economic and science and technology securities, etc. It would be interesting to know what the positioning of the peaceful use of nuclear technology is in the national security aspects. In this paper, a positioning of nuclear power on various national security components is intended by using a positioning process that has been widely used for marketing. Findings can be used for directing further R and Ds to develop nuclear power technology

  14. Positioning of a Peaceful Use of Nuclear Technology in National Security Aspects

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Jun; Chang, Moon Hee; Kim, Hark Rho; Lee, Young Joon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Lee, Sang Heon [Korea National Defense University, Goyang (Korea, Republic of)

    2012-05-15

    Many cases have shown that a peaceful use of nuclear technology should play an important role in national securities such as energy, economic and science and technology securities, etc. It would be interesting to know what the positioning of the peaceful use of nuclear technology is in the national security aspects. In this paper, a positioning of nuclear power on various national security components is intended by using a positioning process that has been widely used for marketing. Findings can be used for directing further R and Ds to develop nuclear power technology

  15. 48 CFR 2452.239-71 - Information Technology Virus Security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...

  16. Proceedings of the 1989 Carnahan conference on security technology

    International Nuclear Information System (INIS)

    DeVore, R.W.

    1989-01-01

    This book contains the proceedings of the 1989 Carnahan conference on security technology and crime countermeasures. Topics covered include: study of methods for the enhancement of classified document control and protection; research and development of a portable microfocus x-ray system capable of providing ultra-high resolution images of improvised explosive devices; and BombCAD - a CAD-based technique for assessing bomb vulnerability and designing and evaluating bomb defense measures

  17. Extending the agile development process to develop acceptably secure software

    NARCIS (Netherlands)

    Ben Othmane, L.; Angin, P.; Weffers, H.T.G.; Bhargava, B.

    2013-01-01

    The agile software development approach makes developing secure software challenging. Existing approaches for extending the agile development process, which enables incremental and iterative software development, fall short of providing a method for efficiently ensuring the security of the software

  18. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  19. Review of the model of technological pragmatism considering privacy and security

    Directory of Open Access Journals (Sweden)

    Kovačević-Lepojević Marina M.

    2013-01-01

    Full Text Available The model of technological pragmatism assumes awareness that technological development involves both benefits and dangers. Most modern security technologies represent citizens' mass surveillance tools, which can lead to compromising a significant amount of personal data due to the lack of institutional monitoring and control. On the other hand, people are interested in improving crime control and reducing the fear of potential victimization which this framework provides as a rational justification for the apparent loss of privacy, personal rights and freedoms. Citizens' perception on the categories of security and privacy, and their balancing, can provide the necessary guidelines to regulate the application of security technologies in the actual context. The aim of this paper is to analyze the attitudes of students at the University of Belgrade (N = 269 toward the application of security technology and identification of the key dimensions. On the basis of the relevant research the authors have formed assumptions about the following dimensions: security, privacy, trust in institutions and concern about the misuse of security technology. The Prise Questionnaire on Security Technology and Privacy was used for data collection. Factor analysis abstracted eight factors which together account for 58% of variance, with the highest loading of the four factors that are identified as security, privacy, trust and concern. The authors propose a model of technological pragmatism considering security and privacy. The data also showed that students are willing to change their privacy for the purpose of improving security and vice versa.

  20. Center for Coastline Security Technology, Year-2

    Science.gov (United States)

    2007-05-01

    cinematic film industry . For the port security application there are several research issues being addressed under this program, specifically...being the cinematic film industry . For the port security application there are several research issues being addressed under this program...the primary customers being the film industry . For the port security application there are several research issues being addressed under this program

  1. 76 FR 4079 - Information Technology (IT) Security

    Science.gov (United States)

    2011-01-24

    ... Security, consistent with Federal policies for the security of unclassified information and information... Certification Program, and provide a Web site link within a contract clause to a library where contractors can... Security should be addressed through government-wide policies, standards, and requirements. NASA response...

  2. Scanning technology with multi-slice helical CT in security inspection domain

    International Nuclear Information System (INIS)

    Wang Jue; Wang Fuquan; Jiang Zenghui

    2008-01-01

    The paper analyzes the technology conditions of security inspection in home and abroad, and expatiates technology of spiral CT and how to define CT value etc, with studying on the key technology of spiral CT scanning way (X-RAY, detector, technology of pulley etc) and mutual relation. By comparing the present products of security inspection, the conclusion was drawn that it is inevitable to develop the tendency of security inspection area with the checking and discerning the substance by using the technology of multi-layer spiral CT. (authors)

  3. Nuclear material facilities - security systems and technology R and D trends

    International Nuclear Information System (INIS)

    Ellis, D.; Steele, B.

    2002-01-01

    Full text: In the US, physical security research and development (R and D) during the 1970s and 1980s created a body of technology and systems engineering that largely defined the industry for several decades. However, despite today's terrorists threats and risks, the overall funding of new and innovative physical security solutions is relatively very small. Such factors constraining physical security R and D include the expansion of overall security responsibilities, the emphasis on programmatic and business performance, in addition to evolving (mis)perceptions that 'the problem has been solved' or that 'anyone can do security'. Underlying these factors, the lack of robust standards and certifications has limited the development and application of physical security products, systems, and services. The research and development of new security technologies must be evaluated against very demanding constraints - including costs/benefits, emerging threats, and policies. Going forward, the goal will be to create a more comprehensive approach to physical security of nuclear material facilities that matches evolving threats and that will complement the transition to an integrated security/operations management environment. Such a management model evaluates the additional value of increasing security alternatives in addition to determining trade-offs between the programmatic mission and security issues. Correspondingly, more explicit and strategically useful measures must be developed to determine importance that, in turn, will influence security-related R and D efforts. The research and development of security technologies should be based upon identified needs and requirements resulting from a systematic analysis of the threat and other conditions. In particular, security technologies and systems must be evaluated in terms of current and long-term impacts. Such needs are (will be) diverse and will depend upon sustained research investments in a broad range of technologies

  4. A Development Framework for Software Security in Nuclear Safety Systems: Integrating Secure Development and System Security Activities

    Energy Technology Data Exchange (ETDEWEB)

    Park, Jaekwan; Suh, Yongsuk [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-02-15

    The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.

  5. On the Horizon: New Advances in Security Technology

    Science.gov (United States)

    Gamble, Cheryl

    2005-01-01

    The worlds of security and technology have been on an intersecting course since the first published account of the use of fingerprint identification made news in 1880 (although unpublished reports suggest its use as early as 1858). In the three and one half years since the September 11 attacks, technological advances across the security field have…

  6. E-Commerce and Security Governance in Developing Countries

    Science.gov (United States)

    Sanayei, Ali.; Rajabion, Lila

    Security is very often mentioned as one of the preconditions for the faster growth of e-commerce. Without a secure and reliable internet, customer will continue to be reluctant to provide confidential information online, such as credit card number. Moreover, organizations of all types and sizes around the world rely heavily on technologies of electronic commerce (e-commerce) for conducting their day-to-day business transaction. Providing organizations with a secure e-commerce environment is a major issue and challenging one especially in Middle Eastern countries. Without secure e-commerce, it is almost impossible to take advantage of the opportunities offered by e-commerce technologies. E-commerce can create opportunities for small entrepreneurs in Middle Eastern countries. This requires removing infrastructure blockages in telecommunications and logistics alongside the governance of e-commerce with policies on consumer protection, security of transactions, privacy of records and intellectual property. In this paper, we will explore the legal implications of e-commerce security governance by establishing who is responsible for ensuring compliance with this discipline, demonstrating the value to be derived from information security governance, the methodology of applying information security governance, and liability for non-compliance with this discipline. Our main focus will be on analyzing the importance and implication of e-commerce security governance in developing countries.

  7. High-Performance Secure Database Access Technologies for HEP Grids

    Energy Technology Data Exchange (ETDEWEB)

    Matthew Vranicar; John Weicher

    2006-04-17

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the

  8. High-Performance Secure Database Access Technologies for HEP Grids

    International Nuclear Information System (INIS)

    Vranicar, Matthew; Weicher, John

    2006-01-01

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist's computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that 'Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications'. There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the secure

  9. Engineering research, development and technology

    International Nuclear Information System (INIS)

    1994-05-01

    The mission of the Engineering Research, Development, and Technology Program at Lawrence Livermore National Laboratory (LLNL) is to develop the technical staff, tools, and facilities needed to support current and future LLNL programs. The efforts are guided by a dual-benefit research and development strategy that supports Department of Energy missions, such as national security through nuclear deterrence and economic competitiveness through partnerships with U.S. industry. This annual report, organized by thrust area, describes the activities for the fiscal year 1993. The report provides timely summaries of objectives, methods, and results from nine thrust areas for this fiscal year: Computational Electronics and Electromagnetics; Computational Mechanics; Diagnostics and Microelectronics; Fabrication Technology; Materials Science and Engineering; Power Conversion Technologies; Nondestructive Evaluation; Remote Sensing, Imaging, and Signal Engineering; and Emerging Technologies. Separate abstracts were prepared for 47 papers in this report

  10. Nuclear Technologies Secure Food For Future

    International Nuclear Information System (INIS)

    2012-01-01

    use of such techniques to protect plants and animals against disease and pests means many more farmers can produce enough food to feed their own families and to sell on markets. Ultimately, fewer people go hungry. The IAEA collaborates with the United Nations Food and Agriculture Organization (FAO) in providing support through a joint division in Vienna. ''While our profile is modest, the size of our footprint is significant,'' said Qu Liang, Director of the Joint FAO/IAEA Division of Nuclear Techniques. ''We are putting the benefits of tried and tested nuclear technologies into the hands of farmers, particularly small producers in poorer countries, to improve their food security and livelihood.'' ''The assistance is driven by advanced technologies,'' Liang added. ''But what we are delivering has to be appropriate to farmers' needs. That means crops that can flourish in changing and often harsher conditions, pest control without a chemical legacy and protection for livestock.'' The Scientific Forum will be opened by the IAEA Director General and ministers from Indonesia, Kenya and Vietnam. FAO Director General Graziano da Silva will deliver a video address. The Forum will address IAEA activities in the fields of food production, food protection and food safety. Each session features a panel of experts who will present and discuss the benefits of nuclear techniques in food and agriculture. A moderator will guide the discussions. (IAEA)

  11. Promoting Economic Security through Information Technology ...

    African Journals Online (AJOL)

    The problem of economic insecurity is a global threat to national security. In Nigeria today, we have witness a lot of national security issues that risks the continued existence of the country as one indivisible political entity with many calling for disintegration. Hitherto, many terrorist networks have sprang up in many parts of ...

  12. Developing security tools of WSN and WBAN networks applications

    CERN Document Server

    A M El-Bendary, Mohsen

    2015-01-01

    This book focuses on two of the most rapidly developing areas in wireless technology (WT) applications, namely, wireless sensors networks (WSNs) and wireless body area networks (WBANs). These networks can be considered smart applications of the recent WT revolutions. The book presents various security tools and scenarios for the proposed enhanced-security of WSNs, which are supplemented with numerous computer simulations. In the computer simulation section, WSN modeling is addressed using MATLAB programming language.

  13. NNSA Program Develops the Next Generation of Nuclear Security Experts

    Energy Technology Data Exchange (ETDEWEB)

    Brim, Cornelia P.; Disney, Maren V.

    2015-09-02

    NNSA is fostering the next generation of nuclear security experts is through its successful NNSA Graduate Fellowship Program (NGFP). NGFP offers its Fellows an exceptional career development opportunity through hands-on experience supporting NNSA mission areas across policy and technology disciplines. The one-year assignments give tomorrow’s leaders in global nuclear security and nonproliferation unparalleled exposure through assignments to Program Offices across NNSA.

  14. Security training with interactive laser-video-disk technology

    International Nuclear Information System (INIS)

    Wilson, D.

    1988-01-01

    DOE, through its contractor EG and G Energy Measurements, Inc., has developed a state-of-the-art interactive-video system for use at the Department of Energy's Central Training Academy. Called the Security Training and Evaluation Shooting System (STRESS), the computer-driven decision shooting system employs the latest is laservideo-disk technology. STRESS is designed to provide realistic and stressful training for security inspectors employed by the DOE and its contractors. The system uses wide-screen video projection, sophisticated scenario-branching technology, and customized video scenarios especially designed for the DOE. Firing a weapon that has been modified to shoot ''laser bullets,'' and wearing a special vest that detects ''hits'': the security inspector encounters adversaries on the wide screen who can shoot or be shot by the inspector in scenarios that demand fast decisions. Based on those decisions, the computer provides instantaneous branching to different scenes, giving the inspector confrontational training with the realism and variability of real life

  15. New technologies and emerging threats: personnel security adjudicative guidelines in the age of social networking

    OpenAIRE

    Festa, James P.

    2012-01-01

    Approved for public release; distribution is unlimited Publicized incidents involving espionage or violence by government employees with security clearances have raised concern for the personnel security community. The guidelines used to adjudicate security clearances were last updated in 2005; since that time, significant technological developments, especially in social media and communications, have emerged. This thesis developed a comprehensive list of current Internet behaviors, and us...

  16. Evolution of Biotechnology and Information Technology and Its Impact on Human Security

    Directory of Open Access Journals (Sweden)

    Elena S. Zinovieva

    2015-01-01

    Full Text Available Abstract: The development of post-industrial society initiates profound economic, technological and cultural change in the way of life of all mankind. The revolutionary breakthroughs in the field of new technologies such as biotechnology and information technology are reflected in all spheres of human activity, directly affecting the human security. The article analyzes the consequences of widespread usage biotechnology and information technology in the foreign policy practice on the basis of the human security theory. The detailed description of the main directions of the use of biometric technology in the foreign policy and consular practices is provided, the challenges and threats to information security associated with biometrics are analyzed, arising from widespread biotechnology are the main challenges and threats to as well as human security threats arising at the present stage of development and application of these technologies. Human security threats associated with the use of biotechnology are placed in the broader context of global trends in scientific and technological development. The recommendations are formulated in the field of foreign policy and international cooperation, which would neutralize new threats to international and personal safety arising at the present stage of development of biotechnology. The authors conclude that in order to ensure ethical regulation of new technologies that address issues of human security, it is necessary to organize multi-stakeholder partnerships at national and international level with the participation of states, representatives of civil society, business and the research community.

  17. 76 FR 78009 - Information Collection; Implementation of Information Technology Security Provision

    Science.gov (United States)

    2011-12-15

    ...] Information Collection; Implementation of Information Technology Security Provision AGENCY: General Services... collection requirement regarding Implementation of Information Technology Security Provision. Public comments... Information Collection 3090- 0294, Implementation of Information Technology Security Provision, by any of the...

  18. Soils and food security | Nortcliff | Nigerian Journal of Technological ...

    African Journals Online (AJOL)

    A threat impacting on food security strongly in Africa is nutrient mining where insufficient nutrients are returned to the soil after crop production. The impacts of global change on food security and the potential impacts of global markets for food and land are also briefly discussed. Nigerian Journal of Technological Research ...

  19. Reducing security risk using data loss prevention technology.

    Science.gov (United States)

    Beeskow, John

    2015-11-01

    Data loss/leakage protection (DLP) technology seeks to improve data security by answering three fundamental questions: > Where are confidential data stored? > Who is accessing the information? > How are data being handled?

  20. Reform of the National Security Science and Technology Enterprise

    National Research Council Canada - National Science Library

    Berry, William; Coffey, Timothy; DeYoung, Donald; Kadtke, James; Loeb, Cheryl

    2008-01-01

    A strong science and technology (S&T) program has been vitally important to American national security since World War II and has to date given the United States a strategic advantage over competitors...

  1. Competitive Technologies for National Security: Review and Recommendations

    National Research Council Canada - National Science Library

    Carafano, James J; Gudgel, Andew; Kochems, Alane

    2008-01-01

    .... Innovation will always be a national security wild card. New technologies may unleash or accelerate social and cultural changes that affect how nations protect themselves on battlefields and behind the scenes...

  2. Augmenting Space Technology Program Management with Secure Cloud & Mobile Services

    Science.gov (United States)

    Hodson, Robert F.; Munk, Christopher; Helble, Adelle; Press, Martin T.; George, Cory; Johnson, David

    2017-01-01

    The National Aeronautics and Space Administration (NASA) Game Changing Development (GCD) program manages technology projects across all NASA centers and reports to NASA headquarters regularly on progress. Program stakeholders expect an up-to-date, accurate status and often have questions about the program's portfolio that requires a timely response. Historically, reporting, data collection, and analysis were done with manual processes that were inefficient and prone to error. To address these issues, GCD set out to develop a new business automation solution. In doing this, the program wanted to leverage the latest information technology platforms and decided to utilize traditional systems along with new cloud-based web services and gaming technology for a novel and interactive user environment. The team also set out to develop a mobile solution for anytime information access. This paper discusses a solution to these challenging goals and how the GCD team succeeded in developing and deploying such a system. The architecture and approach taken has proven to be effective and robust and can serve as a model for others looking to develop secure interactive mobile business solutions for government or enterprise business automation.

  3. New trends in science and technology implications for international peace and security

    International Nuclear Information System (INIS)

    1991-01-01

    In December 1988, the General Assembly requested the Secretary-General to follow future scientific and technological developments, especially those with potential military applications, and to evaluate their impact on international security. In resolution 43/77 A it also requested the Secretary-General to report to it at its forty-fifth session. The broad fields in which scientific and technological developments are taking place were identified as: information technology, biotechnology, materials technology, nuclear technology and space technology. These assessments were discussed by a wider group of experts at a high-level conference on ''New trends in science and technology: implications for international peace and security'', held in April 1990 in the city of Sendai, Japan. The Conference, which was attended by nearly 100 participants from over 20 countries, addressed issues of technological change and global security, new technologies and the search for security in the post-cold-war era, and national policy-making and international diplomacy in an era of rapid technological change. General approaches to technology assessment and technology trends in selected areas were also discussed. The positions taken by Member States on the subject of establishing a mechanism for technology assessment were also taken into account. The highlights of the report are summarized

  4. Secure messaging via the cloud and mobile devices: data security issues emerge with new technologies.

    Science.gov (United States)

    Prestigiacomo, Jennifer

    2011-05-01

    The secure messaging space is alive with new innovations that are moving the industry forward. Key in this space is the push toward moving secure messaging to the cloud and pushing it out to mobile devices. Among the examples are solutions that allow physicians to receive encrypted email on mobile devices, as well as ones that allow doctors to securely text-message each other to coordinate care. However, the security issues around these emerging technologies in this very active space must be further explored.

  5. Promoting Economic Security through Information Technology Abstract

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    2013-12-01

    Dec 1, 2013 ... The problem of economic insecurity is a global threat to national security. ... of the country as one indivisible political entity with many calling for disintegration. ..... The integration of ICT in agriculture can .... Table 4.2.7 Respondents by IT on Business propriety and trade .... of production, distribution and.

  6. Physical security technologies for weapons complex reconfiguration facilities

    International Nuclear Information System (INIS)

    Jaeger, C.D.

    1994-01-01

    Sandia National Laboratories was a member of the Weapons Complex Reconfiguration (WCR) Safeguards and Security (S ampersand S) team providing assistance to the Department of Energy's (DOE) Office of Weapons Complex Reconfiguration. The physical security systems in the new and upgraded facilities being considered for the WCR had to meet DOE orders and other requirements set forth in the WCR Programmatic Design Criteria (PDC), incorporate the latest physical security technologies using proven state-of-the-art systems and meet fundamental security principles. The outcome was to avoid costly retrofits and provide effective and comprehensive protection against current and projected threats with minimal impact on operations, costs and schedule. Physical security requirements for WCR facilities include: (1) reducing S ampersand S life-cycle costs, (2) where feasible automating S ampersand S functions to minimize operational costs, access to critical assets and exposure of people to hazardous environments, (3) increasing the amount of delay to outsider adversary attack, (4) compartmentalizing the facility to minimize the number of personnel requiring access to critical areas and (5) having reliable and maintainable systems. To be most effective against threats physical security must be integrated with facility operations, safety and other S ampersand S activities, such as material control and accountability, nuclear measurements and computer and information security. This paper will discuss the S ampersand S issues, requirements, technology opportunities and needs. Physical security technologies and systems considered in the design effort of the Weapons Complex Reconfiguration facilities will be reviewed

  7. MUSES RT2AE V P/DP: On the Road to Privacy-Friendly Security Technologies in the Workplace

    OpenAIRE

    Van Der Sype, Yung Shin Marleen; Guislain, Jonathan; Seigneur, Jean-Marc; Titi, Xavier

    2016-01-01

    Successful protection of company data assets requires strong technological support. As many security incidents still occur from within, security technologies often include elements to monitor the behaviour of employees. As those security systems are considered as privacy-intrusive, they are hard to align with the privacy and data protection rights of the employees of the company. Even though there is currently no legal obligation for developers to embed privacy and data protection in security...

  8. Consuming technologies - developing routines

    DEFF Research Database (Denmark)

    Gram-Hanssen, Kirsten

    2008-01-01

    technologies and in this article these processes will be investigated from three different perspectives: an historical perspective of how new technologies have entered homes, a consumer perspective of how both houses and new technologies are purchased and finally, as the primary part of the article, a user...... perspective of how routines develop while these technologies are being used. In the conclusion these insights are discussed in relation to possible ways of influencing routines....

  9. Development of security engineering curricula at US universities

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, M.L.

    1998-06-01

    The Southwest Surety Institute was formed in 1996 to create unique, science-based educational programs in security engineering. The programs will integrate business, technology, and criminal justice elements to educate a new generation of security professionals. Graduates of the programs will better understand basic security system design and evaluation and contribute to strengthening of the body of knowledge in the area of security. A systematic approach incorporating people, procedures, and equipment will be taught that will emphasize basic security principles and establish the science of security engineering. The use of performance measures in the analysis of designed systems will enable effective decisions by an enterprise and provide the rationale for investment in security systems. Along with educational programs, Institute members will conduct original research and development built on existing relationships with sponsors from government and industry in areas such as counterterroism, microelectronics, banking, aviation, and sensor development. Additional information and updates on the Southwest Surety Institute are available via the Institute home page at www.emrtc.nmt.edu/ssi.

  10. Methodology for considering environments and culture in developing information security systems

    OpenAIRE

    Mwakalinga, G Jeffy; Kowalski, Stewart; Yngström, Louise

    2009-01-01

    In this paper, we describe a methodology for considering culture of users and environments when developing information security systems. We discuss the problem of how researchers and developers of security for information systems have had difficulties in considering culture of users and environments when they develop information security systems. This has created environments where people serve technology instead of technology serving people. Users have been considered just as any other compo...

  11. Science and technology and their implications for peace and security

    International Nuclear Information System (INIS)

    1990-01-01

    The issue of scientific and technological developments in relation to international peace and security has recently attracted a great deal of interest in the international community, due partly to their enormous potential for the well-being of humanity and also to their enormous implications for instability in the world, an instability characterized as the 'quantitative arms race'. There is a growing concern that, in parallel with 'quantitative disarmament' between the major Powers and the East and West Europe, a new rivalry might develop and extend to the quantitative improvement of weapons, with world-wide consequences. The General Assembly of United Nations has considered this problem and adopted several resolutions on the matter. There has been a great deal of interest in the continuation of international dialogue on the subject

  12. Information and technology: Improving food security in Uganda ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2014-06-23

    Jun 23, 2014 ... Information and technology: Improving food security in Uganda ... knowledge to make decisions about planting, harvesting, and managing livestock, but ... to be effective for minimizing risks and increasing agricultural productivity. ... In time, this network of information – made possible by digital technology ...

  13. Three Essays on Information Technology Security Management in Organizations

    Science.gov (United States)

    Gupta, Manish

    2011-01-01

    Increasing complexity and sophistication of ever evolving information technologies has spurred unique and unprecedented challenges for organizations to protect their information assets. Companies suffer significant financial and reputational damage due to ineffective information technology security management, which has extensively been shown to…

  14. Securing Chinese nuclear power development: further strengthening nuclear security

    International Nuclear Information System (INIS)

    Zhang Hui

    2014-01-01

    Chinese President Xi Jinping addresses China's new concept of nuclear security with four 'equal emphasis' at the third Nuclear Security Summit, and makes four commitments to strengthen nuclear security in the future. To convert President Xi's political commitments into practical, sustainable reality, China should take further steps to install a complete, reliable, and effective security system to ensure that all its nuclear materials and nuclear facilities are effectively protected against the full spectrum of plausible terrorist and criminal threats. This paper suggests the following measures be taken to improve China's existing nuclear security system, including updating and clarifying the requirements for a national level DBT; updating and enforcing existing regulations; further promoting nuclear security culture; balancing the costs of nuclear security, and further strengthening international cooperation on nuclear security. (author)

  15. The application of data encryption technology in computer network communication security

    Science.gov (United States)

    Gong, Lina; Zhang, Li; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    With the rapid development of Intemet and the extensive application of computer technology, the security of information becomes more and more serious, and the information security technology with data encryption technology as the core has also been developed greatly. Data encryption technology not only can encrypt and decrypt data, but also can realize digital signature, authentication and authentication and other functions, thus ensuring the confidentiality, integrity and confirmation of data transmission over the network. In order to improve the security of data in network communication, in this paper, a hybrid encryption system is used to encrypt and decrypt the triple DES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management; At the same time to realize digital signature using Java security software, to ensure data integrity and non-repudiation. Finally, the data encryption system is developed by Java language. The data encryption system is simple and effective, with good security and practicality.

  16. Privacy and Security within Biobanking: The Role of Information Technology.

    Science.gov (United States)

    Heatherly, Raymond

    2016-03-01

    Along with technical issues, biobanking frequently raises important privacy and security issues that must be resolved as biobanks continue to grow in scale and scope. Consent mechanisms currently in use range from fine-grained to very broad, and in some cases participants are offered very few privacy protections. However, developments in information technology are bringing improvements. New programs and systems are being developed to allow researchers to conduct analyses without distributing the data itself offsite, either by allowing the investigator to communicate with a central computer, or by having each site participate in meta-analysis that results in a shared statistic or final significance result. The implementation of security protocols into the research biobanking setting requires three key elements: authentication, authorization, and auditing. Authentication is the process of making sure individuals are who they claim to be, frequently through the use of a password, a key fob, or a physical (i.e., retinal or fingerprint) scan. Authorization involves ensuring that every individual who attempts an action has permission to do that action. Finally, auditing allows for actions to be logged so that inappropriate or unethical actions can later be traced back to their source. © 2016 American Society of Law, Medicine & Ethics.

  17. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  18. Intelligent Facial Recognition Systems: Technology advancements for security applications

    Energy Technology Data Exchange (ETDEWEB)

    Beer, C.L.

    1993-07-01

    Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g., fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.

  19. Assessment of the Technological Changes Impact on the Sustainability of State Security System of Ukraine

    Directory of Open Access Journals (Sweden)

    Olexandr Yemelyanov

    2018-04-01

    Full Text Available Currently, the governments of many countries are facing with a lack of funds for financing programs for social protection of population. Among the causes of this problem, we can indicate the high unemployment rate, which, among other things, is due to implementation of labor-saving technologies. The purpose of this work is to study the impact of technological changes on the sustainability of the state social security system in Ukraine. The general approaches to the assessment of the stability of the state social security system are described. The simulation of the effect of economically efficient technological changes on the company’s income and expenses was carried out. Some patterns of such changes are established. The group of productive technological changes types is presented. The model is developed, and an indicator of the impact estimation of efficiently effective technological changes on the stability of the state social security system is proposed. The analysis of the main indicators of the state social security system functioning of Ukraine is carried out. The dynamics of indicators characterizing the labor market of Ukraine is analyzed. The influence of changes in labor productivity on costs and profits by industries of Ukraine is estimated. The evaluation of the impact of economically efficient technological changes in the industries of Ukraine on the stability of its state social security system is carried out. The different state authorities can use the obtained results for developing measures to manage the sustainability of the state social security system.

  20. National Security Science and Technology Initiative: Air Cargo Screening

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; White, Tim [Pacific Northwest National Laboratory (PNNL); Cespedes, Ernesto [Idaho National Laboratory (INL); Bowerman, Biays [Brookhaven National Laboratory (BNL); Bush, John [Battelle

    2010-11-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three

  1. Modeling and simulation for cyber-physical system security research, development and applications.

    Energy Technology Data Exchange (ETDEWEB)

    Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

    2010-02-01

    This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

  2. Advanced Technologies for Intelligent Systems of National Border Security

    CERN Document Server

    Simek, Krzysztof; Świerniak, Andrzej

    2013-01-01

    One of the world’s leading problems in the field of national security is protection of borders and borderlands. This book addresses multiple issues on advanced innovative methods of multi-level control of both ground (UGVs) and aerial drones (UAVs). Those objects combined with innovative algorithms become autonomous objects capable of patrolling chosen borderland areas by themselves and automatically inform the operator of the system about potential place of detection of a specific incident. This is achieved by using sophisticated methods of generation of non-collision trajectory for those types of objects and enabling automatic integration of both ground and aerial unmanned vehicles. The topics included in this book also cover presentation of complete information and communication technology (ICT) systems capable of control, observation and detection of various types of incidents and threats. This book is a valuable source of information for constructors and developers of such solutions for uniformed servi...

  3. Ocean Technology Development Tank

    Data.gov (United States)

    Federal Laboratory Consortium — The new SWFSC laboratory in La Jolla incorporates a large sea- and fresh-water Ocean Technology Development Tank. This world-class facility expands NOAA's ability to...

  4. Technology research and development

    International Nuclear Information System (INIS)

    Haas, G.M.; Abdov, M.A.; Baker, C.C.; Beuligmann, R.F.

    1985-01-01

    The U.S. Dept. of Energy discusses the new program plan, the parameters of which are a broad scientific and technology knowledge base, an attractive plasma configuration to be determined, and other issues concerning uncertainty as to what constitutes attractive fusion options to be determined in the future, and increased collaboration. Tables show changing directions in magnetic fusion energy, two examples of boundary condition impacts on long-term technology development, and priority classes of the latter. The Argonne National Laboratory comments on the relationship between science, technology and the engineering aspects of the fusion program. UCLA remarks on the role of fusion technology in the fusion program plan, particularly on results from the recent studies of FINESSE. General Dynamics offers commentary on the issues of a reduced budget, and new emphasis on science which creates an image of the program. A table illustrates technology research and development in the program plan from an industrial perspective

  5. Security and privacy issues with health care information technology.

    Science.gov (United States)

    Meingast, Marci; Roosta, Tanya; Sastry, Shankar

    2006-01-01

    The face of health care is changing as new technologies are being incorporated into the existing infrastructure. Electronic patient records and sensor networks for in-home patient monitoring are at the current forefront of new technologies. Paper-based patient records are being put in electronic format enabling patients to access their records via the Internet. Remote patient monitoring is becoming more feasible as specialized sensors can be placed inside homes. The combination of these technologies will improve the quality of health care by making it more personalized and reducing costs and medical errors. While there are benefits to technologies, associated privacy and security issues need to be analyzed to make these systems socially acceptable. In this paper we explore the privacy and security implications of these next-generation health care technologies. We describe existing methods for handling issues as well as discussing which issues need further consideration.

  6. Fusion development and technology

    International Nuclear Information System (INIS)

    Montgomery, D.B.

    1991-01-01

    This report discusses the following topics: superconducting magnet technology high field superconductors; advanced magnetic system and divertor development; poloidal field coils; gyrotron development; commercial reactor studies -- Aries; ITER physics; ITER superconducting PF scenario and magnet analysis; and safety, environmental and economic factors in fusion development

  7. Technology development for safeguards

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Ho Dong; Kang, H. Y.; Song, D. Y. [and others

    2005-04-01

    The objective of this project are to establish the safeguards technology of the nuclear proliferation resistance to the facilities which handle with high radioactivity nuclear materials like the spent fuel, to provide the foundation of the technical independency for the establishment of the effective management of domestic spent fuels, and to construct the base of the early introduction of the key technology relating to the back-end nuclear fuel cycle through the development of the safeguards technology of the DFDF of the nuclear non-proliferation. The essential safeguards technologies of the facility such as the measurement and account of nuclear materials and the C/S technology were carried out in this stage (2002-2004). The principal results of this research are the development of error reduction technology of the NDA equipment and a new NDA system for the holdup measurement of process materials, the development of the intelligent surveillance system based on the COM, the evaluation of the safeguardability of the Pyroprocessing facility which is the core process of the nuclear fuel cycle, the derivation of the research and development items which are necessary to satisfy the safeguards criteria of IAEA, and the presentation of the direction of the technology development relating to the future safeguards of Korea. This project is the representative research project in the field of the Korea's safeguards. The safeguards technology and equipment developed while accomplishing this project can be applied to other nuclear fuel cycle facilities as well as DFDF and will be contributed to increase the international confidence in the development of the nuclear fuel cycle facility of Korea and its nuclear transparency.

  8. Energy, technology, development

    Energy Technology Data Exchange (ETDEWEB)

    Goldemberg, J [Ministerio da Educacao, Brasilia (Brazil)

    1992-02-01

    Energy and technology are essential ingredients of development, it is only through their use that it became possible to sustain a population of almost 5 billion on Earth. The challenges to eradicate poverty and underdevelopment in developing countries in the face of strong population increases can only be successfully met with the use of advanced technology, leapfrogging the path followed in the past by today's industrialized countries. It is shown in the paper that energy consumption can be decoupled from economic development. Such possibility will contribute significantly in achieving sustainable development. 10 refs., 4 figs., 3 tabs.

  9. Plan Colombia or development as security

    Directory of Open Access Journals (Sweden)

    Juan Pablo Guevara Latorre

    2015-01-01

    the most relevant policy for the construction of the State in 21st-century Colombia from a critical standpoint. The document makes it possible to show that Plan Colombia is a privatized form of development, interpreted in terms of security based on an incomplete understanding of the Colombian conflict that prevails into our present

  10. National Security and National Development: A Critique

    African Journals Online (AJOL)

    DR Nneka

    There has been the tendency right from independence to view national ... the nation's economic underdevelopment, which has led to social injustice, ... For a nation, security connotes conditions of peace, stability, order ... They are very important for the ... According to Mathew (1989), Global development now suggests.

  11. [Development of operation patient security detection system].

    Science.gov (United States)

    Geng, Shu-Qin; Tao, Ren-Hai; Zhao, Chao; Wei, Qun

    2008-11-01

    This paper describes a patient security detection system developed with two dimensional bar codes, wireless communication and removal storage technique. Based on the system, nurses and correlative personnel check code wait operation patient to prevent the defaults. The tests show the system is effective. Its objectivity and currency are more scientific and sophisticated than current traditional method in domestic hospital.

  12. Information security policy development for compliance

    CERN Document Server

    Williams, Barry L

    2013-01-01

    Although compliance standards can be helpful guides to writing comprehensive security policies, many of the standards state the same requirements in slightly different ways. Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 provides a simplified way to write policies that meet the major regulatory requirements, without having to manually look up each and every control. Explaining how to write policy statements that address multiple compliance standards and regulatory requirements, the book will he

  13. The insurance industry and public-private collaborations as a vector to develop and spread EO technologies and techniques in the domain of Food Security: The Swiss Re case.

    Science.gov (United States)

    Coutu, S.; Ragaz, M.; Mäder, D.; Hammer, P.; Andriesse, M.; Güttinger, U.; Feyen, H.

    2017-12-01

    The insurance industry has been contributing to the resilient development of agriculture in multiple regions of the globe since the beginning of the 19th Century. It also has from the very beginning of the development of EO Sciences, kept a very close eye on the development of technologies and techniques in this domain. Recent advances in this area such as increased satellite imagery resolution, faster computation time and Big Data management combined with the ground-based knowledge from the insurance industry have offered farmers not only tools permitting better crop management, but also reliable and live yield coverage. This study presents several of these applications at different scales (industrial farming and micro-farming) and in different climate regions, with an emphasis on the limit of current products. Some of these limits such as lack of access of to ground data, R&D efforts or understanding of ground needs could be quickly overcome through closer public-private or private-private collaborations. However, despite a clear benefit for the Food Security nexus and potential win-win situations, those collaborations are not always simple to develop. We present here successful but also disappointing collaboration cases based on the Swiss Re experience, as a global insurance leader. As a conclusion, we highlight how academia, NGOs, governmental organization, start-ups and the insurance industry can get together to foster the development of EO in the domain of Food Security, and bring cutting-edge science to game changing industrial applications.

  14. Development of Nuclear Energy Security Code

    International Nuclear Information System (INIS)

    Shimamura, Takehisa; Suzuki, Atsuyuki; Okubo, Hiroo; Kikuchi, Masahiro.

    1990-01-01

    In establishing of the nuclear fuel cycle in Japan that have a vulnerability in own energy structure, an effectiveness of energy security should be taken into account as well as an economy based on the balance of supply and demand of nuclear fuels. NMCC develops the 'Nuclear Energy Security Code' which was able to evaluate the effectiveness of energy security. Evaluation method adopted in this code is 'Import Premium' which was proposed in 'World Oil', EMF Report 6. The viewpoints of evaluation are as follows: 1. How much uranium fuel quantity can be reduced by using plutonium fuel? 2. How much a sudden rise of fuel cost can be absorbed by establishing the plutonium cycle beforehand the energy crisis? (author)

  15. IT Security Support for the Spaceport Command Control System Development

    Science.gov (United States)

    Varise, Brian

    2014-01-01

    My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.

  16. Technology transfer for development

    International Nuclear Information System (INIS)

    Abraham, D.

    1990-07-01

    The IAEA has developed a multifaceted approach to ensure that assistance to Member States results in assured technology transfer. Through advice and planning, the IAEA helps to assess the costs and benefits of a given technology, determine the basic requirements for its efficient use in conditions specific to the country, and prepare a plan for its introduction. This report describes in brief the Technical Co-operation Programmes

  17. New technologies and the search for security: Prospects for a post-cold-war era

    International Nuclear Information System (INIS)

    Brown, G.E. Jr.

    1990-01-01

    Technology alone will not solve our many environmental, economic and military problems. The search for peace and security must be based on a concept of international security that extends beyond the bounds of military concerns and into the realm of environmental and economic matters. In our efforts to understand how science and technology fit within this security context, we should not look simply at emerging technologies, even those that are sustainable and stabilizing, as being the principal candidates for drastic improvements in peace and security on our planet. One must keep in mind that security for as many as one fourth to one half of the world's inhabitants would be revolutionized if they had access to some of the most basic existing technologies of our times. Equitable access to resources and technology is an age-old problem. Today it must be faced on a global basis. It demands creating a new world economic order that combines the best that the capitalist and socialist economies can offer. We must declare today that a secure global society cannot exist which is half in slavery to poverty and deprived of opportunity, and half free to develop its potential and achieve its dreams

  18. New technologies and the search for security: Prospects for a post-cold-war era

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Jr, G E

    1991-12-31

    Technology alone will not solve our many environmental, economic and military problems. The search for peace and security must be based on a concept of international security that extends beyond the bounds of military concerns and into the realm of environmental and economic matters. In our efforts to understand how science and technology fit within this security context, we should not look simply at emerging technologies, even those that are sustainable and stabilizing, as being the principal candidates for drastic improvements in peace and security on our planet. One must keep in mind that security for as many as one fourth to one half of the world`s inhabitants would be revolutionized if they had access to some of the most basic existing technologies of our times. Equitable access to resources and technology is an age-old problem. Today it must be faced on a global basis. It demands creating a new world economic order that combines the best that the capitalist and socialist economies can offer. We must declare today that a secure global society cannot exist which is half in slavery to poverty and deprived of opportunity, and half free to develop its potential and achieve its dreams

  19. Aviation Security: Technology's Role in Addressing Vulnerabilities

    Science.gov (United States)

    1996-09-19

    This is the statement of Keith O. Fultz, Assistant Comptroller General, Resources, Community, and Economic Development Division, General Accounting Office (GAO), before the Committee on Science, House of Representatives, on the serious vulnerabilitie...

  20. 75 FR 3948 - Big Sky Energy Corp., Biomedical Waste Systems, Inc., Biometrics Security Technology, Inc...

    Science.gov (United States)

    2010-01-25

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Big Sky Energy Corp., Biomedical Waste Systems, Inc., Biometrics Security Technology, Inc., Biosys, Inc., Bolder Technologies Corp., Boyds Wheels, Inc... securities of Biometrics Security Technology, Inc. because it has not filed any periodic reports since...

  1. A study on the development of national guide for implementing nuclear security culture in ROK

    International Nuclear Information System (INIS)

    Koh, Moonsung; Lee, Youngwook; Yoo, Hosik

    2014-01-01

    Among the extended concepts, a remarkable thing is that nuclear security began to be focused on the human factor as well as technical factors (hardware and software system) because most security lapses at nuclear power facilities result from human failings such as low motivation, miscalculation, or malice. Nuclear Security Culture (NSC) is designed to improve the performance of the human factor and to make its interface with security technology and regulations more effective and smooth. There is a need to develop a variety of more efficient tools for achieving sustainable nuclear security culture. We studied for the implementing guide to establish and enhance the nuclear security culture. We have developed the Nuclear Security Culture Implementing Guidelines for licensees in order to enhance nuclear security culture. Licensees have separately established a separate code of conduct on nuclear security culture for their daily business based on such Implementing Guidelines. The Nuclear Security Culture Implementing Guidelines were developed with sufficient consideration of both the IAEA Security Series on nuclear security culture and the Korean circumstances. In all, the Korean government and licensees have timely established and applied the Implementing Guidelines and code of conduct and consequently paved the way for further improvements of the Korean nuclear security regime. The nuclear security culture will facilitate and optimize the human aspects in our nuclear security programs

  2. A study on the development of national guide for implementing nuclear security culture in ROK

    Energy Technology Data Exchange (ETDEWEB)

    Koh, Moonsung; Lee, Youngwook; Yoo, Hosik [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2014-05-15

    Among the extended concepts, a remarkable thing is that nuclear security began to be focused on the human factor as well as technical factors (hardware and software system) because most security lapses at nuclear power facilities result from human failings such as low motivation, miscalculation, or malice. Nuclear Security Culture (NSC) is designed to improve the performance of the human factor and to make its interface with security technology and regulations more effective and smooth. There is a need to develop a variety of more efficient tools for achieving sustainable nuclear security culture. We studied for the implementing guide to establish and enhance the nuclear security culture. We have developed the Nuclear Security Culture Implementing Guidelines for licensees in order to enhance nuclear security culture. Licensees have separately established a separate code of conduct on nuclear security culture for their daily business based on such Implementing Guidelines. The Nuclear Security Culture Implementing Guidelines were developed with sufficient consideration of both the IAEA Security Series on nuclear security culture and the Korean circumstances. In all, the Korean government and licensees have timely established and applied the Implementing Guidelines and code of conduct and consequently paved the way for further improvements of the Korean nuclear security regime. The nuclear security culture will facilitate and optimize the human aspects in our nuclear security programs.

  3. Satellite Technology Contribution to Water and Food Security

    Science.gov (United States)

    Brown, Molly E.

    2010-01-01

    This slide presentation reviews the issue of supplies of food, the relationship to food security, the ability of all people to attain sufficient food for an active and healthy life, and the ability to use satellite technology and remote sensing to assist with planning and act as an early warning system.

  4. Evaluation of Data Security Measures in a Network Environment Towards Developing Cooperate Data Security Guidelines

    OpenAIRE

    Ayub Hussein Shirandula; Dr. G. Wanyembi; Mr. Maina karume

    2012-01-01

    Data security in a networked environment is a topic that has become significant in organizations. As companies and organizations rely more on technology to run their businesses, connecting system to each other in different departments for efficiency data security is the concern for administrators. This research assessed the data security measures put in place at Mumias Sugar Company and the effort it was using to protect its data. The researcher also highlighted major security issues that wer...

  5. Biofuels. Environment, technology and food security

    International Nuclear Information System (INIS)

    Escobar, Jose C.; Lora, Electo S.; Venturini, Osvaldo J.; Yanez, Edgar E.; Castillo, Edgar F.; Almazan, Oscar

    2009-01-01

    The imminent decline of the world's oil production, its high market prices and environmental impacts have made the production of biofuels to reach unprecedent volumes over the last 10 years. This is why there have been intense debates among international organizations and political leaders in order to discuss the impacts of the biofuel use intensification. Besides assessing the causes of the rise in the demand and production of biofuels, this paper also shows the state of the art of their world's current production. It is also discussed different vegetable raw materials sources and technological paths to produce biofuels, as well as issues regarding production cost and the relation of their economic feasibility with oil international prices. The environmental impacts of programs that encourage biofuel production, farmland land requirements and the impacts on food production are also discussed, considering the life cycle analysis (LCA) as a tool. It is concluded that the rise in the use of biofuels is inevitable and that international cooperation, regulations and certification mechanisms must be established regarding the use of land, the mitigation of environmental and social impacts caused by biofuel production. It is also mandatory to establish appropriate working conditions and decent remuneration for workers of the biofuels production chain. (author)

  6. The research on information security technology for the industrial control system of special equipment

    International Nuclear Information System (INIS)

    Chen Ligang; Liu Hongye; Zhang Wei; Sun Jianying; Lan Peng; Dai Sidan

    2014-01-01

    With the rapid development of information technology in enterprise application, industrial control network and management network is becoming more and more closely linked. Development and application of special equipment control system from the traditional industrial control system, not considered when designing communication security problem mainly, therefore, the industrial control system opened at the same time, isolation control system and the outside was weakened, the safety problems of industrial control system had become more and more serious. The practical application combined with the special equipment control system, analysis and elaboration in view of security problems for the control network, also, provide appropriate security solutions for professional characteristics of industrial control network, design on process control system specially, provide security partition protection scheme, in order to improve security ability of industrial control system information. (authors)

  7. Fusion development and technology

    International Nuclear Information System (INIS)

    Montgomery, D.B.

    1992-01-01

    This report discusses the following: superconducting magnet technology; high field superconductors; advanced magnetic system and divertor development; poloidal field coils; gyrotron development; commercial reactor studies--aries; ITER physics: alpha physics and alcator R ampersand D for ITER; lower hybrid current drive and heating in the ITER device; ITER superconducting PF scenario and magnet analysis; ITER systems studies; and safety, environmental and economic factors in fusion development

  8. Use of Persuasive Technology to Change End-Users- IT Security Aware Behaviour: A Pilot Study

    OpenAIRE

    Ai Cheo Yeo; Md. Mahbubur Rahim; Yin Ying Ren

    2008-01-01

    Persuasive technology has been applied in marketing, health, environmental conservation, safety and other domains and is found to be quite effective in changing people-s attitude and behaviours. This research extends the application domains of persuasive technology to information security awareness and uses a theory-driven approach to evaluate the effectiveness of a web-based program developed based on the principles of persuasive technology to improve the information sec...

  9. Biofuel technologies. Recent developments

    Energy Technology Data Exchange (ETDEWEB)

    Gupta, Vijai Kumar [National Univ. of Ireland Galway (Ireland). Dept. of Biochemistry; MITS Univ., Rajasthan (India). Dept. of Science; Tuohy, Maria G. (eds.) [National Univ. of Ireland Galway (Ireland). Dept. of Biochemistry

    2013-02-01

    Written by experts. Richly illustrated. Of interest to both experienced researchers and beginners in the field. Biofuels are considered to be the main potential replacement for fossil fuels in the near future. In this book international experts present recent advances in biofuel research and related technologies. Topics include biomethane and biobutanol production, microbial fuel cells, feedstock production, biomass pre-treatment, enzyme hydrolysis, genetic manipulation of microbial cells and their application in the biofuels industry, bioreactor systems, and economical processing technologies for biofuel residues. The chapters provide concise information to help understand the technology-related implications of biofuels development. Moreover, recent updates on biofuel feedstocks, biofuel types, associated co- and byproducts and their applications are highlighted. The book addresses the needs of postgraduate researchers and scientists across diverse disciplines and industrial sectors in which biofuel technologies and related research and experimentation are pursued.

  10. Development of IT-based data communication network technology

    International Nuclear Information System (INIS)

    Hong, Seok Boong; Jeong, K. I.; Yoo, Y. R.

    2010-10-01

    - Developing broadband high-reliability real-time communications technology for NPP - Developing reliability and performance validation technology for communications network - Developing security technology for NPP communications network - Developing field communications network for harsh environment of NPP - International standard registration(Oct. 28, 2009, IEC 61500

  11. Science, Technology, Engineering, and Mathematics (STEM) Education Reform to Enhance Security of the Global Cyberspace

    Science.gov (United States)

    2014-05-01

    towards cloud computing technologies and capabilities demand needs for developing new tools that work in ensemble to handle security challenges. A...programs with the schools and/or hire from their pool of students. Therefore, no real STEM standards exist at the tertiary and beyond levels of education ...successful in cyber operations and network security related jobs much early on into the new STEM education model pipeline. Subjects such as computer

  12. Securing your Site in Development and Beyond

    Energy Technology Data Exchange (ETDEWEB)

    Akopov, Mikhail S.

    2018-01-04

    Why wait until production deployment, or even staging and testing deployment to identify security vulnerabilities? Using tools like Burp Suite, you can find security vulnerabilities before they creep up on you. Prevent cross-site scripting attacks, and establish a firmer trust between your website and your client. Verify that Apache/Nginx have the correct SSL Ciphers set. We explore using these tools and more to validate proper Apache/Nginx configurations, and to be compliant with modern configuration standards as part of the development cycle. Your clients can use tools like https://securityheaders.io and https://ssllabs.com to get a graded report on your level of compliance with OWASP Secure Headers Project and SSLLabs recommendations. Likewise, you should always use the same sites to validate your configurations. Burp Suite will find common misconfigurations and will also perform more thorough security testing of your applications. In this session you will see examples of vulnerabilities that were detected early on, as well has how to integrate these practices into your daily workflow.

  13. Securing the data economy: translating privacy and enacting security in the development of DataSHIELD.

    Science.gov (United States)

    Murtagh, M J; Demir, I; Jenkings, K N; Wallace, S E; Murtagh, B; Boniol, M; Bota, M; Laflamme, P; Boffetta, P; Ferretti, V; Burton, P R

    2012-01-01

    Contemporary bioscience is seeing the emergence of a new data economy: with data as its fundamental unit of exchange. While sharing data within this new 'economy' provides many potential advantages, the sharing of individual data raises important social and ethical concerns. We examine ongoing development of one technology, DataSHIELD, which appears to elide privacy concerns about sharing data by enabling shared analysis while not actually sharing any individual-level data. We combine presentation of the development of DataSHIELD with presentation of an ethnographic study of a workshop to test the technology. DataSHIELD produced an application of the norm of privacy that was practical, flexible and operationalizable in researchers' everyday activities, and one which fulfilled the requirements of ethics committees. We demonstrated that an analysis run via DataSHIELD could precisely replicate results produced by a standard analysis where all data are physically pooled and analyzed together. In developing DataSHIELD, the ethical concept of privacy was transformed into an issue of security. Development of DataSHIELD was based on social practices as well as scientific and ethical motivations. Therefore, the 'success' of DataSHIELD would, likewise, be dependent on more than just the mathematics and the security of the technology. Copyright © 2012 S. Karger AG, Basel.

  14. Using Science Driven Technologies for the Defense and Security Applications

    Science.gov (United States)

    Habib, Shahid; Zukor, Dorthy; Ambrose, Stephen D.

    2004-01-01

    For the past three decades, Earth science remote sensing technologies have been providing enormous amounts of useful data and information in broadening our understanding of our home planet as a system. This research, as it has expanded our learning process, has also generated additional questions. This has further resulted in establishing new science requirements, which have culminated in defining and pushing the state-of-the-art technology needs. NASA s Earth science program has deployed 18 highly complex satellites, with a total of 80 sensors, so far and is in a process of defining and launching multiple observing systems in the next decade. Due to the heightened security alert of the nation, researchers and technologists are paying serious attention to the use of these science driven technologies for dual use. In other words, how such sophisticated observing and measuring systems can be used in detecting multiple types of security concerns with a substantial lead time so that the appropriate law enforcement agencies can take adequate steps to defuse any potential risky scenarios. This paper examines numerous NASA technologies such as laser/lidar systems, microwave and millimeter wave technologies, optical observing systems, high performance computational techniques for rapid analyses, and imaging products that can have a tremendous pay off for security applications.

  15. Performance Testing of Homeland Security Technologies in U.S. EPA's Environmental Technology Verification (ETV) Program

    National Research Council Canada - National Science Library

    Kelly, Thomas J; Hofacre, Kent C; Derringer, Tricia L; Riggs, Karen B; Koglin, Eric N

    2004-01-01

    ... (reports and test plans available at www.epa.gov/etv). In the aftermath of the terrorist attacks of September 11, 2001, the ETV approach has also been employed in performance tests of technologies relevant to homeland security (HS...

  16. 6th Annual Homeland Security and Defense Education Summit, Developing an Adaptive Homeland Security Environment

    OpenAIRE

    2013-01-01

    6th Annual Homeland Security and Defense Education Summit Developing an Adaptive Homeland Security Environment, Burlington, MA, September 26-28, 2013 2013 Summit Agenda Naval Postgraduate School Center for Homeland Defense and Security In Partnership With Northeastern University, Department of Homeland Security, Federal Emergency Management Agency, National Guard Homeland Security Institute, National Homeland Defense Foundation Naval Postgraduate School Center for Homeland Defense and S...

  17. Remediation Technology Collaboration Development

    Science.gov (United States)

    Mahoney, John; Olsen, Wade

    2010-01-01

    This slide presentation reviews programs at NASA aimed at development at Remediation Technology development for removal of environmental pollutants from NASA sites. This is challenging because there are many sites with different environments, and various jurisdictions and regulations. There are also multiple contaminants. There must be different approaches based on location and type of contamination. There are other challenges: such as costs, increased need for resources and the amount of resources available, and a regulatory environment that is increasing.

  18. Discussion on the Technology and Method of Computer Network Security Management

    Science.gov (United States)

    Zhou, Jianlei

    2017-09-01

    With the rapid development of information technology, the application of computer network technology has penetrated all aspects of society, changed people's way of life work to a certain extent, brought great convenience to people. But computer network technology is not a panacea, it can promote the function of social development, but also can cause damage to the community and the country. Due to computer network’ openness, easiness of sharing and other characteristics, it had a very negative impact on the computer network security, especially the loopholes in the technical aspects can cause damage on the network information. Based on this, this paper will do a brief analysis on the computer network security management problems and security measures.

  19. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Castro, R., E-mail: rodrigo.castro@visite.es [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Barbato, P. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy); Vega, J. [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Taliercio, C. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy)

    2011-10-15

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  20. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    International Nuclear Information System (INIS)

    Castro, R.; Barbato, P.; Vega, J.; Taliercio, C.

    2011-01-01

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  1. After Globalization Future Security in a Technology Rich World

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin,T J

    2001-08-17

    Over the course of the year 2000, five workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats to international security in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. The participants included US national leaders and experts from the Department of Energy National Laboratories; the Department of Defense: Army, Navy, Air Force, Office of the Secretary of Defense, Defense Threat Reduction Agency, and Defense Advanced Research Projects Agency; the Department of State, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. The threats ranged from local/regional to global, from intentional to unintended to natural, from merely economic to massively destructive, and from individual and group to state actions. We were not concerned in this exercise with defining responses to the threats, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be executed or countered. At the concluding review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and national responsibility, and discussed the workshop findings to determine what is most certain or uncertain, and what might be needed to resolve our uncertainties. This paper summarizes the consenses and

  2. SBWR technology and development

    International Nuclear Information System (INIS)

    Rao, A.S.; McCandless, R.J.; Sawyer, C.D.

    1991-01-01

    The simplified boiling water reactor (SBWR) is based on utilizing to the maximum extent possible proven light water reactor (LWR) technology developed through 30 years of operating plant experience plus the advanced boiling water reactor (ABWR) technology development program. For the unique features, developmental programs have been put in place to qualify the design. Thus, the focus of technology development has been on the passive safety features - the gravity-driven ECCS (GDCS) and the containment heat removal (PCCS). General Electric constructed a full-height, scaled, integral facility to demonstrate the GDCS concept and provide data for methods qualification. For the PCCS, a three-pronged program was implemented. Basic heat transfer data were obtained via testing at the Massachusetts Institute of Technology and the University of California at Berkeley. A full-height scaled integral facility to demonstrate the PCCS concept and provide data for methods qualification was constructed in Japan in 1989. Initial testing is now complete. Design of a full-scale heat exchanger unit is underway and testing is planned for completion in early 1993

  3. ABC Technology Development Program

    International Nuclear Information System (INIS)

    1994-01-01

    The Accelerator-Based Conversion (ABC) facility will be designed to accomplish the following mission: 'Provide a weapon's grade plutonium disposition capability in a safe, economical, and environmentally sound manner on a prudent schedule for [50] tons of weapon's grade plutonium to be disposed on in [20] years.' This mission is supported by four major objectives: provide a reliable plutonium disposition capability within the next [15] years; provide a level of safety and of safety assurance that meets or exceeds that afforded to the public by modern commercial nuclear power plants; meet or exceed all applicable federal, state, and local regulations or standards for environmental compliance; manage the program in a cost effective manner. The ABC Technology Development Program defines the technology development activities that are required to accomplish this mission. The technology development tasks are related to the following topics: blanket system; vessel systems; reactivity control systems; heat transport system components; energy conversion systems; shutdown heat transport systems components; auxiliary systems; technology demonstrations - large scale experiments

  4. Adaptive security systems -- Combining expert systems with adaptive technologies

    International Nuclear Information System (INIS)

    Argo, P.; Loveland, R.; Anderson, K.

    1997-01-01

    The Adaptive Multisensor Integrated Security System (AMISS) uses a variety of computational intelligence techniques to reason from raw sensor data through an array of processing layers to arrive at an assessment for alarm/alert conditions based on human behavior within a secure facility. In this paper, the authors give an overview of the system and briefly describe some of the major components of the system. This system is currently under development and testing in a realistic facility setting

  5. A Sustainable Technology Contribuiting to the Food Security

    Directory of Open Access Journals (Sweden)

    Dra. Rosa Catalina Bermúdez-Savòn

    2015-11-01

    Full Text Available A sustainable way for food and energetic security in rural and the city regions, is presented with the application of the solid state fermentation for the biotransformation of lignocellulosic by-products and agro-industrial wastes with white-rot fungi. Inamush as advantages of this technology, is showed the cultivation of mushroom Pleurotus spp.on coffee pulp, cedar chip , coconut and cocoa shells, and the influence of it´s mixture (1:1, trough examination of their growth rates and conversion efficacy to fruiting bodies, which cause contamination of soil and water, because of large volumes and difficult management. The use of residues for these cultive was consolidate such as alternative viable for food production, capable to satisfy the protein and nutritive necessity of population in the non-developing countries, besides low cost production, high protein content and obtention in large quantity in short time. In addition to produce complements for animal feet, such as the spent oyster mushroom substrate postcosecha is detoxified, has proteic content and better digestibility than original substrates,and can be used as animal feed or fertilizer, at the same time, was eradicated the problem of environmental contamination of these residues provoking and further contribution at sustainable development of the communities.

  6. Robotics Technology Development Program

    International Nuclear Information System (INIS)

    1994-02-01

    The Robotics Technology Development Program (RTDP) is a ''needs-driven'' effort. A lengthy series of presentations and discussions at DOE sites considered critical to DOE's Environmental Restoration and Waste Management (EM) Programs resulted in a clear understanding of needed robotics applications toward resolving definitive problems at the sites. A detailed analysis of the Tank Waste Retrieval (TWR), Contaminant Analysis Automation (CAA), Mixed Waste Operations (MWO), and Decontamination ampersand Dismantlement (D ampersand D). The RTDP Group realized that much of the technology development was common (Cross Cutting-CC) to each of these robotics application areas, for example, computer control and sensor interface protocols. Further, the OTD approach to the Research, Development, Demonstration, Testing, and Evaluation (RDDT ampersand E) process urged an additional organizational break-out between short-term (1--3 years) and long-term (3--5 years) efforts (Advanced Technology-AT). The RDTP is thus organized around these application areas -- TWR, CAA, MWO, D ampersand D and CC ampersand AT -- with the first four developing short-term applied robotics. An RTDP Five-Year Plan was developed for organizing the Program to meet the needs in these application areas

  7. Development of coal hydro gasification technology

    International Nuclear Information System (INIS)

    Itoh, Kazuo; Nomura, Kazuo; Asaoka, Yoshikiyo; Kato, Shojiro; Seo, Tomoyuki

    1997-01-01

    Taking a potential future decrease in natural gas supply into consideration, we are looking for a way to secure a stable supply of high quality substitute natural gas made from coal (which occurs abundantly throughout the world) in large volumes at low cost. We are working towards our goal of commercializing coal hydro gasification technology in the 2010's and have started developing elemental technology from FY, 1996 as a part of the governmental new energy program. (au)

  8. Transmutation Technology Development

    Energy Technology Data Exchange (ETDEWEB)

    Song, T. Y.; Park, W. S.; Kim, Y. H. (and others)

    2007-06-15

    The spent fuel coming from the PWR is one of the most difficult problems to be solved for the continuous use of nuclear power. It takes a few million years to be safe under the ground. Therefore, it is not easy to take care of the spent fuel for such a long time. Transmutation technology is the key technology which can solve the spent fuel problem basically. Transmutation is to transmute long-lived radioactive nuclides in the spent fuel into short-lived or stable nuclide through nuclear reactions. The long-lived radioactive nuclides can be TRU and fission products such as Tc-99 and I-129. Although the transmutation technology does not make the underground disposal totally unnecessary, the period to take care of the spent fuel can be reduced to the order of a few hundred years. In addition to the environmental benefit, transmutation can be considered to recycle the energy in the spent fuel since the transmutation is performed through nuclear fission reaction of the TRU in the spent fuel. Therefore, transmutation technology is worth being developed in economical aspect. The results of this work can be a basis for the next stage research. The objective of the third stage research was to complete the core conceptual design and verification of the key technologies. The final results will contribute to the establishment of Korean back end fuel cycle policy by providing technical guidelines.

  9. Textile technology development

    Science.gov (United States)

    Shah, Bharat M.

    1995-01-01

    The objectives of this report were to evaluate and select resin systems for Resin Transfer Molding (RTM) and Powder Towpreg Material, to develop and evaluate advanced textile processes by comparing 2-D and 3-D braiding for fuselage frame applications and develop window belt and side panel structural design concepts, to evaluate textile material properties, and to develop low cost manufacturing and tooling processes for the automated manufacturing of fuselage primary structures. This research was in support of the NASA and Langley Research Center (LaRc) Advanced Composite Structural Concepts and Materials Technologies for Primary Aircraft Structures program.

  10. Parametric Cost and Schedule Modeling for Early Technology Development

    Science.gov (United States)

    2018-04-02

    Research NoteNational Security Rep rt PARAMETRIC MODELING FOR EARLY TECHNOLOGY DEVELOPMENT COST AND SCHEDULE Chuck...Alexander NSR_11x17_Cover_CostModeling_v8.indd 1 11/20/17 3:15 PM PARAMETRIC COST AND SCHEDULE MODELING FOR EARLY  TECHNOLOGY DEVELOPMENT Chuck...COST AND SCHEDULE MODELING FOR EARLY  TECHNOLOGY DEVELOPMENT iii Contents Figures

  11. ECH Technology Development

    Energy Technology Data Exchange (ETDEWEB)

    Temkin, Richard [Massachusetts Inst. of Technology (MIT), Cambridge, MA (United States)

    2014-12-24

    Electron Cyclotron Heating (ECH) is needed for plasma heating, current drive, plasma stability control, and other applications in fusion energy sciences research. The program of fusion energy sciences supported by U. S. DOE, Office of Science, Fusion Energy Sciences relies on the development of ECH technology to meet the needs of several plasma devices working at the frontier of fusion energy sciences research. The largest operating ECH system in the world is at DIII-D, consisting of six 1 MW, 110 GHz gyrotrons capable of ten second pulsed operation, plus two newer gyrotrons. The ECH Technology Development research program investigated the options for upgrading the DIII-D 110 GHz ECH system. Options included extending present-day 1 MW technology to 1.3 – 1.5 MW power levels or developing an entirely new approach to achieve up to 2 MW of power per gyrotron. The research consisted of theoretical research and designs conducted by Communication and Power Industries of Palo Alto, CA working with MIT. Results of the study would be validated in a later phase by research on short pulse length gyrotrons at MIT and long pulse / cw gyrotrons in industry. This research follows a highly successful program of development that has led to the highly reliable, six megawatt ECH system at the DIII-D tokamak. Eventually, gyrotrons at the 1.5 megawatt to multi-megawatt power level will be needed for heating and current drive in large scale plasmas including ITER and DEMO.

  12. After globalization future security in a technology rich world

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin, T J

    2000-02-12

    Over the course of the year 2000, five one-day workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats that might come against the US and its allies in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. In December, an Integration Workshop and Senior Review before national leaders and experts were held. The participants and reviewers were invited from the DOE National Laboratories, the DOD Services, OSD, DTRA, and DARPA, the DOS, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on national security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. We were not concerned in this exercise with defining responses, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be countered. At the concluding Integration Workshop and Senior Panel Review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and responsibility, and discussed the workshop findings to determine what is most certain, and uncertain, and what might be needed to resolve our uncertainties. This document reports the consensus and important variations of both the reviewers and the participants. In all, 45 threats over a wide range of lethality and probability of occurrence were identified. Over 60 enabling technologies were also discussed. These are

  13. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  14. Blockchain Technology: A new secured Electronic Health Record System

    OpenAIRE

    Tamazirt , Lotfi; Alilat , Farid; Agoulmine , Nazim

    2018-01-01

    International audience; Nowadays, health systems are looking for effective ways to manage more patients in a shorter time, and to increase the quality of care through better coordination to provide quick, accurate and non-invasive diagnostics to patients. This paper aims to solve the dependence on trusted third parties by proposing a new management strategy, storage and security in a decentralized network through Blockchain technology. The proposed system also aims to offer a solution to help...

  15. 76 FR 45645 - 10-Day Notice of Proposed Information Collection: Technology Security/Clearance Plans, Screening...

    Science.gov (United States)

    2011-07-29

    ...: Technology Security/Clearance Plans, Screening Records, and Non-Disclosure Agreements ACTION: Notice of... Information Collection: Technology Security/ Clearance Plans, Screening Records, and Non-Disclosure Agreements...: None. Respondents: Business and Nonprofit Organizations, Foreign Governments. Estimated Number of...

  16. A Survey On Biometric Security Technologies From Cloud Computing Perspective

    Directory of Open Access Journals (Sweden)

    Shivashish Ratnam

    2015-08-01

    Full Text Available Cloud computing is one of the rising technologies that takes set of connections users to the next level. Cloud is a technology where resources are paid as per usage rather than owned. One of the major challenges in this technology is Security. Biometric systems provide the answer to ensure that the rendered services are accessed only by a legal user or an authorized user and no one else. Biometric systems recognize users based on behavioral or physiological characteristics. The advantages of such systems over traditional validation methods such as passwords and IDs are well known and hence biometric systems are progressively gaining ground in terms of usage. This paper brings about a new replica of a security system where in users have to offer multiple biometric finger prints during Enrollment for a service. These templates are stored at the cloud providers section. The users are authenticated based on these finger print designed templates which have to be provided in the order of arbitrary numbers or imaginary numbers that are generated every time continuously. Both finger prints templates and images are present and they provided every time duration are encrypted or modified for enhanced security.

  17. Development of Financial Security of Agro-Industrial Enterprises

    OpenAIRE

    Iryna Kryukova

    2012-01-01

    The concept of 'financial security' has been covered in the article. The theoretical basis of agro-industrial factories financial security development has been considered. In particular, the author has done an overview of different methodological approaches to determining the content of financial security and its components. The indicators of financial security of enterprise have been defined. Summing up the methodological aspects of providing business financial security the author proposes t...

  18. About Place and Role of Information and Communication Technologies, Information Security at the Present Stage

    Directory of Open Access Journals (Sweden)

    Alexander A. Galushkin

    2015-12-01

    Full Text Available In the present article author considers questions of importance of information and communication technologies in modern information society and about information security. In the course of the research the author analyzes opinions both known Russian, and famous foreign scientists and practicians from various countries of the world (Italy, the USA, Portugal, etc.. Author emphasizes importance of information and communication technologies at the present stage of development of society and state.

  19. Information Technology Convergence, Secure and Trust Computing, and Data Management ITCS 2012 & STA 2012

    CERN Document Server

    Kim, Jongsung; Zou, Deqing; Lee, Yang

    2012-01-01

    ITCS 2012 and STA 2012 address the various theories and practical applications of information technology convergence, secure and trust computing, and data management in future environments. It will present important results of significant value to solve the application services and various problems within the scope of ITCS 2012 & STA 2012. In addition, we expect it will trigger further related research and technology developments which will improve our lives in the future.

  20. Developing a Security Metrics Scorecard for Healthcare Organizations.

    Science.gov (United States)

    Elrefaey, Heba; Borycki, Elizabeth; Kushniruk, Andrea

    2015-01-01

    In healthcare, information security is a key aspect of protecting a patient's privacy and ensuring systems availability to support patient care. Security managers need to measure the performance of security systems and this can be achieved by using evidence-based metrics. In this paper, we describe the development of an evidence-based security metrics scorecard specific to healthcare organizations. Study participants were asked to comment on the usability and usefulness of a prototype of a security metrics scorecard that was developed based on current research in the area of general security metrics. Study findings revealed that scorecards need to be customized for the healthcare setting in order for the security information to be useful and usable in healthcare organizations. The study findings resulted in the development of a security metrics scorecard that matches the healthcare security experts' information requirements.

  1. Development of Sodium Technology

    International Nuclear Information System (INIS)

    Choi, Jong Hyun; Nam, H. Y.; Kim, T. J.; Jeong, K. C.; Park, J. H.; Kim, B. H.; Jeong, J. Y.; Kim, J. M.; Choi, B. H.; Kim, B. S.

    2003-02-01

    The basic P and ID and fabrication method for IHTS simplification experiment were prepared for the experimental apparatus. In order to investigate the later phase of a SWR event, an experimental apparatus was designed and manufactured. The 620 data set have been obtained in the experiment of free surface fluctuation and an experimental correlation for the critical gas entertainment condition is additionally developed. For development of water into sodium leak detection technology, the properties from leak noises were extracted, and the tools for analyzing acoustic noises were constructed. The state-of-the-art on the flow and differential pressure measuring techniques in the piping system is investigated to develop new techniques which are applicable to high temperature sodium flow environment. The plan for the minimization of errors in temperature measurement was drawn up by analysing the error factors in temperature measurement. And the countermeasures for the minimization of errors in temperature measurement due to complex heat transfer were prepared

  2. The Theoretical Aspects of the Security of Human Development

    OpenAIRE

    Markova Natalia S.; Demyanenko Alina A.

    2017-01-01

    The article is aimed at substantiating the basic categories of the conception of security of human development and formation of a definition of the concept of «security of human development» that would provide the most comprehensive understanding of the nature of this process. The main approaches to researching the phenomenon of «security» were analyzed. Characteristics of the formation of human security as part of a holistic paradigm of human development were considered together with rethink...

  3. Development of Cyber Security Scheme for Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Hong, S. B.; Choi, Y. S.; Cho, J. W. (and others)

    2009-12-15

    Nuclear I and C system is considered to be safe on the cyber threat because of the use of exclusive communication network and operating system. But the trend of open architecture and standardization on the equipment of I and C system, it is not safe on the cyber threat such as hacking and cyber terror. It is needed to protect nuclear I and C systems by the cyber attack, Countermeasures of the cyber security is required a lot of time and endeavors because there are many factors on the environment of cyber security and cyber attack. For the nuclear cyber security, we should make structural framework and eliminate cyber vulnerabilities by the analysis of cyber environment. The framework for the cyber security includes planning, embodiment of security technologies, security audit, security management and security maintenance. In this report, we examined IT security technology and the trend of standard in the industrial I and C system, and proposed a method to construct cyber security for the nuclear power plant. We analysed the threat of cyber security, vulnerability and cyber risk, then we present a method for the cyber security structure and the countermeasures.

  4. Development of Cyber Security Scheme for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Hong, S. B.; Choi, Y. S.; Cho, J. W.

    2009-12-01

    Nuclear I and C system is considered to be safe on the cyber threat because of the use of exclusive communication network and operating system. But the trend of open architecture and standardization on the equipment of I and C system, it is not safe on the cyber threat such as hacking and cyber terror. It is needed to protect nuclear I and C systems by the cyber attack, Countermeasures of the cyber security is required a lot of time and endeavors because there are many factors on the environment of cyber security and cyber attack. For the nuclear cyber security, we should make structural framework and eliminate cyber vulnerabilities by the analysis of cyber environment. The framework for the cyber security includes planning, embodiment of security technologies, security audit, security management and security maintenance. In this report, we examined IT security technology and the trend of standard in the industrial I and C system, and proposed a method to construct cyber security for the nuclear power plant. We analysed the threat of cyber security, vulnerability and cyber risk, then we present a method for the cyber security structure and the countermeasures

  5. Developing technologies and resources

    Energy Technology Data Exchange (ETDEWEB)

    Walker, R.S. [Canadian Nuclear Laboratories, Chalk River, ON (Canada)

    2015-07-01

    Our success as a nuclear nation rests on interdependent pillars involving industry, governments, regulators, and academia. In a context of coherent public policy, we must achieve: 5 Nuclear Industry Priorities: Ensure refurbishments are completed to cost and schedule; Achieve Canadian supply chain success in international nuclear business; Support a strong Canadian nuclear science, technology and innovation agenda; Enhance the supply of skilled workers; Develop a coordinated and integrated strategy for the long term management of all radioactive waste materials; Refine communication strategies informed by insights from social sciences. Canada's nuclear sector has the opportunity to adapt to the opportunities presented by having a national laboratory in Canada.

  6. Developing technologies and resources

    International Nuclear Information System (INIS)

    Walker, R.S.

    2015-01-01

    Our success as a nuclear nation rests on interdependent pillars involving industry, governments, regulators, and academia. In a context of coherent public policy, we must achieve: 5 Nuclear Industry Priorities: Ensure refurbishments are completed to cost and schedule; Achieve Canadian supply chain success in international nuclear business; Support a strong Canadian nuclear science, technology and innovation agenda; Enhance the supply of skilled workers; Develop a coordinated and integrated strategy for the long term management of all radioactive waste materials; Refine communication strategies informed by insights from social sciences. Canada's nuclear sector has the opportunity to adapt to the opportunities presented by having a national laboratory in Canada.

  7. IT Security Specialist | IDRC - International Development Research ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The IT Security Specialist takes a strategic role in the delivery of Infrastructure ... on IT Security to project managers, business clients and senior management. ... as a team member or a team leader by undertaking research, investigations, ...

  8. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  9. Developing an Undergraduate Information Systems Security Track

    Science.gov (United States)

    Sharma, Aditya; Murphy, Marianne C.; Rosso, Mark A.; Grant, Donna

    2013-01-01

    Information Systems Security as a specialized area of study has mostly been taught at the graduate level. This paper highlights the efforts of establishing an Information Systems (IS) Security track at the undergraduate level. As there were many unanswered questions and concerns regarding the Security curriculum, focus areas, the benefit of…

  10. Needs for Development of Nuclear Security Culture in Korea

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yoo, Ho Sik; Kwack, Sung Woo; Lee, Ho Jin; Lee, Jong Uk

    2005-01-01

    Over the past several years, the growing international threat of terrorism has necessitated strengthening of physical protection and security of nuclear materials and facilities. A number of countries have made efforts in improving their physical protection system especially in the field of hardware such as security equipment. While security hardware is important, the efficient use of the equipment is yet another important issue, which depends on the operating personnel and their attitudes in performing their duties. Therefore, Security experts said that the nuclear security would not be completed without security culture. However, Nuclear Security Culture has not been introduced and developed in Korea. This paper introduces the concept and model of Nuclear Security Culture and raises awareness of the needs to develop the Nuclear Security Culture in Korea

  11. Security: A Catalyst for Sustainable Development | Solomon | African ...

    African Journals Online (AJOL)

    This paper explores intricate nexus between security, and the challenges of promoting sustainable development in a volatile environment. It conceptualises security, sustainable development, and volatile environment. The paper argues that the volatile environment in the country has led to security breaches and slowed ...

  12. Smart Secure Homes: A Survey of Smart Home Technologies that Sense, Assess, and Respond to Security Threats.

    Science.gov (United States)

    Dahmen, Jessamyn; Cook, Diane J; Wang, Xiaobo; Honglei, Wang

    2017-08-01

    Smart home design has undergone a metamorphosis in recent years. The field has evolved from designing theoretical smart home frameworks and performing scripted tasks in laboratories. Instead, we now find robust smart home technologies that are commonly used by large segments of the population in a variety of settings. Recent smart home applications are focused on activity recognition, health monitoring, and automation. In this paper, we take a look at another important role for smart homes: security. We first explore the numerous ways smart homes can and do provide protection for their residents. Next, we provide a comparative analysis of the alternative tools and research that has been developed for this purpose. We investigate not only existing commercial products that have been introduced but also discuss the numerous research that has been focused on detecting and identifying potential threats. Finally, we close with open challenges and ideas for future research that will keep individuals secure and healthy while in their own homes.

  13. Development of sodium technology

    International Nuclear Information System (INIS)

    Hwang, Sung Tai; Nam, H. Y.; Choi, Y. D.

    2000-05-01

    The objective of present study is to produce the experimental data for development and verification of computer codes for development of LMR and to develop the preliminary technologies for the future large scale verification experiments. A MHD experimental test loop has been constructed for the quantitative analysis of the effect of magnetic field on the sodium flow and experiments are carried out for three EM pumps. The previous pressure drop correlations are evaluated using the experimental data obtained from the pressure drop experiment in a 19-pin fuel assembly with wire spacer. An dimensionless variable is proposed to describe the amplitude and frequency of the fluctuation of free surface using the experimental data obtained from free surface experimental apparatus and an empirical correlation is developed using this dimensionless variable. An experimental test loop is constructed to measure the flow characteristics in IHX shell side and the local pressure drop in fuel assembly, and to test the vibration behaviour of fuel pins due to flow induced vibration. The sodium two-phase flow measuring technique using the electromagnetic flowmeter is developed and the sodium differential pressure drop measuring technique using the method of direct contact of sodium and oil is established. The work on the analysis of sodium fire characteristics and produce data for vlidation of computer code is performed. Perfect reopen time of self plugged leak path was observed to be about 130 minutes after water leak initiation. Reopen shape of a specimen appeared to be double layer of circular type, and reopen size of this specimen surface was about 2mm diameter on sodium side. In small water leakage experiments, the following correlation equation about the reopen time between sodium temperature and initial leak rate was obtained, τ c = δ·g -0.83 ·10 (3570/T Na -3.34) , in 400-500 deg C of liquid sodium atmosphere. The characteristics of pressure propagation and gas flow, and

  14. Development of sodium technology

    Energy Technology Data Exchange (ETDEWEB)

    Hwang, Sung Tai; Nam, H Y; Choi, Y D [and others

    2000-05-01

    The objective of present study is to produce the experimental data for development and verification of computer codes for development of LMR and to develop the preliminary technologies for the future large scale verification experiments. A MHD experimental test loop has been constructed for the quantitative analysis of the effect of magnetic field on the sodium flow and experiments are carried out for three EM pumps. The previous pressure drop correlations are evaluated using the experimental data obtained from the pressure drop experiment in a 19-pin fuel assembly with wire spacer. An dimensionless variable is proposed to describe the amplitude and frequency of the fluctuation of free surface using the experimental data obtained from free surface experimental apparatus and an empirical correlation is developed using this dimensionless variable. An experimental test loop is constructed to measure the flow characteristics in IHX shell side and the local pressure drop in fuel assembly, and to test the vibration behaviour of fuel pins due to flow induced vibration. The sodium two-phase flow measuring technique using the electromagnetic flowmeter is developed and the sodium differential pressure drop measuring technique using the method of direct contact of sodium and oil is established. The work on the analysis of sodium fire characteristics and produce data for vlidation of computer code is performed. Perfect reopen time of self plugged leak path was observed to be about 130 minutes after water leak initiation. Reopen shape of a specimen appeared to be double layer of circular type, and reopen size of this specimen surface was about 2mm diameter on sodium side. In small water leakage experiments, the following correlation equation about the reopen time between sodium temperature and initial leak rate was obtained, {tau}{sub c} = {delta}{center_dot}g{sup -0.83}{center_dot}10{sup (3570/T{sub Na}-3.34)}, in 400-500 deg C of liquid sodium atmosphere. The characteristics

  15. IFRI's notebooks. Energy, development and security

    International Nuclear Information System (INIS)

    Finon, D.; Jacquet, P.

    1999-01-01

    Today, the concept of energy security has been greatly modified by the worldwide trade, the markets deregulation, the technical progress and the nuclear contestation. This notebook is the synthesis of a colloquium jointly organized in December 16, 1997 by the IFRI and the Institute of Economy and Energy Policy (IEPE) with the sustain of the French delegation of strategic affairs of the defense ministry. It analyzes the evolution of energy markets at the year 2030 prospects and stresses on the role of Middle-East and on the stakes of the economical development and energy policy of China. Finally, it treats of the goals and modalities of the French and European energy policies. (J.S.)

  16. Technology Development Facility (TDF)

    International Nuclear Information System (INIS)

    Doggett, J.N.

    1982-01-01

    We have been studying small, driven, magnetic-mirror-based fusion reactors for the Technology Development Facility (TDF), that will test fusion reactor materials, components, and subsystems. Magnetic mirror systems are particularly interesting for this application because of their inherent steady-state operation, potentially high neutron wall loading, and relatively small size. Our design is a tandem mirror device first described by Fowler and Logan, based on the physics of the TMX experiments at Lawrence Livermore National Laboratory (LLNL). The device produces 20 MW of fusion power with a first-wall, uncollided 14-MeV neutron flux of 1.4 MW/m 2 on an area of approximately 8 m 2 , while consuming approximately 250 MW of electrical power. The work was done by a combined industrial-laboratory-university group

  17. Development and technology

    International Nuclear Information System (INIS)

    Anon.

    1978-01-01

    This program is aimed at developing the technology required for carrying out the mirror reactor program. Much of this work applies to the national program and fusion in general; it covers the following areas: Neutral-beam program (including beam direct conversion and vacuum technology). Direct conversion: In addition to direct conversion associated with neutral beams, we have a continuing program to develop efficient direct recovery systems, which are required for reducing power losses from future mirror reactors. Materials program, several key problems on tritium control and handling that must be solved for any large D-T fusion device are being investigated in the LLL tritium laboratory; emphasis is on cleanup of low tritium concentrations in reactor containment buildings and on the containment of tritium by using various low-permeability barriers and coatings to be applied to metal walls. The effects of neutrons on properties of superconducting materials are being investigated using a unique apparatus in which superconducting properties are measured while the specimen is continuously maintained at liquid-helium temperature. Reactor design studies: Design studies of mirror reactors form a basis for evaluation of mirror concepts and for guiding our long-range program. Present emphasis is on delineating features of reactors based on the tandem mirror concept (TMR), on a fission/fusion hybrid reactor based on the TMR, and on an engineering evaluation of a small reactor system based on field reversal. Reactors that are small and candidates for construction the next decade are being investigated in a program sponsored by the Electric Power Research Institute

  18. Development of Korea telecommunication technology

    International Nuclear Information System (INIS)

    1992-06-01

    It concentrates on development of Korea telecommunication technology, which is made up seven chapters. It gives description of manual central telephone exchange or private automatic telephone exchange, transmission technology on wire line and cable line technology and optical transmission, radio communication technology on mobile and natural satellite communication, network technology with intelligent network, broadband ISDN and packet switched Data Network, terminal technology with telephone and data communication terminal and development of Information Technology in Korea. It has an appendix about development of military communication system.

  19. Technology Development of Safeguards

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Ho Dong; Kang, H. Y.; Ko, W. I. (and others)

    2007-04-15

    The objective of this project is to perform R and D on the essential technologies in nuclear material measurement and surveillance and verification system, and to improve the state of being transparent on the nuclear material management of DUPIC Fuel Development Facility (DFDF) through the evaluation of safeguard ability on non-proliferation fuel cycle and nuclear proliferation resistance. Nuclear material position scan system for the reduction of measurement error was developed for the spatial distribution search of spent fuel in DUPIC facility. Web-based realtime remote monitoring system was designed and constructed for satisfying the IAEA's performance criteria of continuous monitoring, and also developed a software for the function of remote control and message. And diversion paths in a proliferation resistant pyroprocess for SFR were analyzed and its protecting system against the diversion paths were suggested for enhancing proliferation resistance of advanced nuclear fuel cycle. These results could be used for planning the further R and D items in the area of safeguards. Those R and D results mentioned above would be helpful for increasing Korean nuclear transparency in the future.

  20. Developments in lubricant technology

    CERN Document Server

    Srivastava, S P

    2014-01-01

    Provides a fundamental understanding of lubricants and lubricant technology including emerging lubricants such as synthetic and environmentally friendly lubricants Teaches the reader to understand the role of technology involved in the manufacture of lubricants Details both major industrial oils and automotive oils for various engines Covers emerging lubricant technology such as synthetic and environmentally friendly lubricants Discusses lubricant blending technology, storage, re-refining and condition monitoring of lubricant in equipment

  1. Development and Analysis of Security Policies in Security Enhanced Android

    Science.gov (United States)

    2012-12-01

    by Tresys Technology [32]. The suite contains tools for SE policy creation, management, and analysis. Apol provides a graphical interface for...runs under a predefined platform user: system, nfc , radio, etc. The third and fourth checks simply deal with different user strings, with fixed...system user id to the system domain and their application directories to system_data_file. Similarly, applications under the nfc and radio user id

  2. Mars Technology Program: Planetary Protection Technology Development

    Science.gov (United States)

    Lin, Ying

    2006-01-01

    This slide presentation reviews the development of Planetary Protection Technology in the Mars Technology Program. The goal of the program is to develop technologies that will enable NASA to build, launch, and operate a mission that has subsystems with different Planetary Protection (PP) classifications, specifically for operating a Category IVb-equivalent subsystem from a Category IVa platform. The IVa category of planetary protection requires bioburden reduction (i.e., no sterilization is required) The IVb category in addition to IVa requirements: (i.e., terminal sterilization of spacecraft is required). The differences between the categories are further reviewed.

  3. Security Risk Assessment in Software Development Projects

    OpenAIRE

    Svendsen, Heidi

    2017-01-01

    Software security is increasing in importance, linearly with vulnerabilities caused by software flaws. It is not possible to spend all the project s resources on software security. To spend the resources given to security in an effective way, one should know what is most important to protect. By performing a risk analysis the project know which vulnerabilities they face. A risk analysis will prioritise the vulnerabilities, and when the vulnerabilities are prioritised the project know where th...

  4. Development of Food Preservation and Processing Technologies by Radiation Technology

    International Nuclear Information System (INIS)

    Byun, Myung Woo; Lee, Ju Won; Kim, Jae Hun

    2007-07-01

    To secure national food resources, development of energy-saving food processing and preservation technologies, establishment of method on improvement of national health and safety by development of alternative techniques of chemicals and foundation of the production of hygienic food and public health related products by irradiation technology were studied. Results at current stage are following: As the first cooperative venture business technically invested by National Atomic Research Development Project, institute/company's [technology-invested technology foundation No. 1] cooperative venture, Sun-BioTech Ltd., was founded and stated its business. This suggested new model for commercialization and industrialization of the research product by nation-found institute. From the notice of newly approved product list about irradiated food, radiation health related legal approval on 7 food items was achieved from the Ministry of health and wellfare, the Korea Food and Drug Administration, and this contributed the foundation of enlargement of practical use of irradiated food. As one of the foundation project for activation of radiation application technology for the sanitation and secure preservation of special food, such as military meal service, food service for patient, and food for sports, and instant food, such as ready-to-eat/ready-to-cook food, the proposal for radiation application to the major military commander at the Ministry of National Defence and the Joint Chiefs of Staff was accepted for the direction of military supply development in mid-termed plan for the development of war supply. Especially, through the preliminary research and the development of foundation technology for the development of the Korean style space food and functional space food, space Kimch with very long shelf life was finally developed. The development of new item/products for food and life science by combining RT/BT, the development of technology for the elimination/reduction of

  5. Development of Food Preservation and Processing Technologies by Radiation Technology

    Energy Technology Data Exchange (ETDEWEB)

    Byun, Myung Woo; Lee, Ju Won; Kim, Jae Hun [and others

    2007-07-15

    To secure national food resources, development of energy-saving food processing and preservation technologies, establishment of method on improvement of national health and safety by development of alternative techniques of chemicals and foundation of the production of hygienic food and public health related products by irradiation technology were studied. Results at current stage are following: As the first cooperative venture business technically invested by National Atomic Research Development Project, institute/company's [technology-invested technology foundation No. 1] cooperative venture, Sun-BioTech Ltd., was founded and stated its business. This suggested new model for commercialization and industrialization of the research product by nation-found institute. From the notice of newly approved product list about irradiated food, radiation health related legal approval on 7 food items was achieved from the Ministry of health and wellfare, the Korea Food and Drug Administration, and this contributed the foundation of enlargement of practical use of irradiated food. As one of the foundation project for activation of radiation application technology for the sanitation and secure preservation of special food, such as military meal service, food service for patient, and food for sports, and instant food, such as ready-to-eat/ready-to-cook food, the proposal for radiation application to the major military commander at the Ministry of National Defence and the Joint Chiefs of Staff was accepted for the direction of military supply development in mid-termed plan for the development of war supply. Especially, through the preliminary research and the development of foundation technology for the development of the Korean style space food and functional space food, space Kimch with very long shelf life was finally developed. The development of new item/products for food and life science by combining RT/BT, the development of technology for the elimination/reduction of

  6. Development of Food Preservation and Processing Technologies by Radiation Technology

    Energy Technology Data Exchange (ETDEWEB)

    Byun, Myung Woo; Lee, Ju Won; Kim, Jae Hun (and others)

    2007-07-15

    To secure national food resources, development of energy-saving food processing and preservation technologies, establishment of method on improvement of national health and safety by development of alternative techniques of chemicals and foundation of the production of hygienic food and public health related products by irradiation technology were studied. Results at current stage are following: As the first cooperative venture business technically invested by National Atomic Research Development Project, institute/company's [technology-invested technology foundation No. 1] cooperative venture, Sun-BioTech Ltd., was founded and stated its business. This suggested new model for commercialization and industrialization of the research product by nation-found institute. From the notice of newly approved product list about irradiated food, radiation health related legal approval on 7 food items was achieved from the Ministry of health and wellfare, the Korea Food and Drug Administration, and this contributed the foundation of enlargement of practical use of irradiated food. As one of the foundation project for activation of radiation application technology for the sanitation and secure preservation of special food, such as military meal service, food service for patient, and food for sports, and instant food, such as ready-to-eat/ready-to-cook food, the proposal for radiation application to the major military commander at the Ministry of National Defence and the Joint Chiefs of Staff was accepted for the direction of military supply development in mid-termed plan for the development of war supply. Especially, through the preliminary research and the development of foundation technology for the development of the Korean style space food and functional space food, space Kimch with very long shelf life was finally developed. The development of new item/products for food and life science by combining RT/BT, the development of technology for the elimination/reduction of

  7. Information Security System and Development of a Modern Organization

    OpenAIRE

    Wawak, Slawomir

    2009-01-01

    Information security management systems are increasingly applied in a number of sectors of the new, global, interconnected economy. They are used by production and service companies, businesses that provide information technology and telecom services, state administration authorities and local governments. Specifically, they are used in case of crime groups or as a means of securing illegal transactions.

  8. A Security Approach in System Development Life Cycle

    OpenAIRE

    P.Mahizharuvi; Dr.Alagarsamy

    2011-01-01

    Many software organizations today are confronted with challenge of building secure software systems. Traditional software engineering principles place little emphasis on security. These principles tend to tread security as one of a long list of quality factors that are expected from all professionally developed software. As software systems of today have a wide reach, security has become a more important factor than ever in the history of software engineering can no longer be treated as Separ...

  9. Security in Africa: The big picture | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-02-23

    Feb 23, 2011 ... Populations are growing, economies are improving – and conflict is declining. ... in crucial sectors such as communications technology, food security, and ... population growth and urbanization have been the main drivers of ...

  10. Public assessment of new surveillance-oriented security technologies: Beyond the trade-off between privacy and security.

    Science.gov (United States)

    Pavone, Vincenzo; Esposti, Sara Degli

    2012-07-01

    As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.

  11. HUMAN SECURITY – BUILDING THE POST-2015 DEVELOPMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Andreea IANCU

    2015-04-01

    Full Text Available This article approaches the post-2015 Millennium Development Goals agenda through the human security paradigm. It suggests that the human security paradigm represents “the missing link” from the development agenda. Therefore, this analysis explains the necessity for extending the development agenda by including the human security doctrine. The first part of the article discusses the relation between human security and development. The next section analyzes the values of the Millennium Declaration and the Millennium Development Goals. The last part evaluates the improvements that the inclusion of the human security on the post-2015 development framework may bring. The results of this analysis present illustrate the opportunity of deepening the MDGs agenda with a more realistic and ethical approach, through the inclusion of the human security paradigm within the development agenda.

  12. Evaluation methodologies for security testing biometric systems beyond technological evaluation

    OpenAIRE

    Fernández Saavedra, María Belén

    2013-01-01

    The main objective of this PhD Thesis is the specification of formal evaluation methodologies for testing the security level achieved by biometric systems when these are working under specific contour conditions. This analysis is conducted through the calculation of the basic technical biometric system performance and its possible variations. To that end, the next two relevant contributions have been developed. The first contribution is the definition of two independent biometric performance ...

  13. Japanese Technology and U.S. National Security

    Science.gov (United States)

    1990-12-01

    Japanese penchant for situational ethics allowed a sharp psychological about-face following the war, enabling them to accept the American policies. Power...Reagan/Bush Administrations have exaggerated the nation’s defense needs and that selfish interests are overriding objectivity and common sense in the ...security.195 They view the United States as having benign political motives and having the largest domestic market needed to develop regional

  14. 76 FR 41274 - Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2011-07-13

    ..., cyber-security, knowledge management and how best to leverage related technologies funded by other... Science and Technology Advisory Committee (HSSTAC) ACTION: Committee Management; Notice of Federal... FURTHER INFORMATION CONTACT: Mary Hanson, HSSTAC Executive Director, Science and Technology Directorate...

  15. Mars Technology Program Planetary Protection Technology Development

    Science.gov (United States)

    Lin, Ying

    2006-01-01

    The objectives of the NASA Planetary Protection program are to preserve biological and organic conditions of solar-system bodies for future scientific exploration and to protect the Earth from potential hazardous extraterrestrial contamination. As the exploration of solar system continues, NASA remains committed to the implementation of planetary protection policy and regulations. To fulfill this commitment, the Mars Technology Program (MTP) has invested in a portfolio of tasks for developing necessary technologies to meet planetary protection requirements for the next decade missions.

  16. The Role of Agricultural Technology in Food and Nutritional Security ...

    African Journals Online (AJOL)

    Strengthening of agricultural research and extension. The development and utilization of profitable and environmentally-friendly technology is an essential factor for the transformation of agriculture into a modern sector. The impact of technology can be attained through the revitalization of agricultural research and extension ...

  17. Development of a cyber security risk model using Bayesian networks

    International Nuclear Information System (INIS)

    Shin, Jinsoo; Son, Hanseong; Khalil ur, Rahman; Heo, Gyunyoung

    2015-01-01

    Cyber security is an emerging safety issue in the nuclear industry, especially in the instrumentation and control (I and C) field. To address the cyber security issue systematically, a model that can be used for cyber security evaluation is required. In this work, a cyber security risk model based on a Bayesian network is suggested for evaluating cyber security for nuclear facilities in an integrated manner. The suggested model enables the evaluation of both the procedural and technical aspects of cyber security, which are related to compliance with regulatory guides and system architectures, respectively. The activity-quality analysis model was developed to evaluate how well people and/or organizations comply with the regulatory guidance associated with cyber security. The architecture analysis model was created to evaluate vulnerabilities and mitigation measures with respect to their effect on cyber security. The two models are integrated into a single model, which is called the cyber security risk model, so that cyber security can be evaluated from procedural and technical viewpoints at the same time. The model was applied to evaluate the cyber security risk of the reactor protection system (RPS) of a research reactor and to demonstrate its usefulness and feasibility. - Highlights: • We developed the cyber security risk model can be find the weak point of cyber security integrated two cyber analysis models by using Bayesian Network. • One is the activity-quality model signifies how people and/or organization comply with the cyber security regulatory guide. • Other is the architecture model represents the probability of cyber-attack on RPS architecture. • The cyber security risk model can provide evidence that is able to determine the key element for cyber security for RPS of a research reactor

  18. Technology Development and Innovation | Wind | NREL

    Science.gov (United States)

    Technology Development and Innovation Technology Development and Innovation Technology Development Technology Center (NWTC) supports efforts to reduce bird and bat fatalities at wind energy projects and photo of wind turbines at the National Wind Technology Center. Wildlife technology research and

  19. The Theoretical Aspects of the Security of Human Development

    Directory of Open Access Journals (Sweden)

    Markova Natalia S.

    2017-10-01

    Full Text Available The article is aimed at substantiating the basic categories of the conception of security of human development and formation of a definition of the concept of «security of human development» that would provide the most comprehensive understanding of the nature of this process. The main approaches to researching the phenomenon of «security» were analyzed. Characteristics of the formation of human security as part of a holistic paradigm of human development were considered together with rethinking it as a new theory of global security. A cross-categorical analysis of the concepts of «human development» and of «human security» was carried out by the main criteria: characteristics, time frames, main purpose and objectives. As a result, the human security is complementary to the concept of human development in the part of safe variants of choice (freedom from needs; it further facilitated the security provision at the level of prosperity and progress, not at the level of survival. It has been determined that the conception of human security is at the same time an element of the conception of human development as well as of human security.

  20. Help for the Developers of Control System Cyber Security Standards

    Energy Technology Data Exchange (ETDEWEB)

    Robert P. Evans

    2008-05-01

    A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

  1. Nigerian Journal of Technological Development

    African Journals Online (AJOL)

    The Nigerian Journal of Technological Development is now a quarterly publication of the Faculty of Engineering & Technology, University of Ilorin, Ilorin, Nigeria. ... to the subject matter as a Research Paper, Review Paper or a Technical Note.

  2. Final report for the protocol extensions for ATM Security Laboratory Directed Research and Development Project

    Energy Technology Data Exchange (ETDEWEB)

    Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others

    1996-03-01

    This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.

  3. Liberia: National Security Interests in Transformational Development

    National Research Council Canada - National Science Library

    Coleman, Carolyn I

    2008-01-01

    Liberia is of national security interest to the United States of America. Liberia's 14-year civil war ended in 2003, leaving the country with a collapsed government and failing economic, physical, and social infrastructures...

  4. Agriculture and Food Security | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    1MB). Funding. The Agriculture and Food Security program funds research primarily through competitive calls. Announcements and details on eligibility and thematic focus for funding opportunities will be posted on IDRC's funding page.

  5. Human Security versus Human Development - Behavioristic Approach

    Directory of Open Access Journals (Sweden)

    Duralia Oana

    2016-08-01

    Full Text Available Recent terrorist attacks in Brussels, Paris and Istanbul, are shaking a world bewildered of daily fear of violence, while the contemporary consumer has to deal with the “new wars” emerging in the context of the current socio-economic and political context. The issue is especially thorny since, most of the times, the “enemy” the citizens must face is unknown, not only when it comes to terrorist attacks, but also when dealing with the question of the “enemy” in foods purchased for consumption (food security or the security of personal data when accessing and using the Internet (cyber security. Consequently, this paper attempts to highlight the way in which the safety and security needs of the contemporary consumer have diversified over time, often becoming determinants of social behavior in general, and of the buying and consumption behavior, in particular.

  6. Foundations for Security Aware Software Development Education

    National Research Council Canada - National Science Library

    McDonald, Jeffrey T

    2005-01-01

    .... In this paper, we show how rigorous coding techniques should be woven into the fabric of computer science curriculum and ultimately should be distinguished from requirements-driven security techniques...

  7. Advancing CANDU technology AECL's Development program

    International Nuclear Information System (INIS)

    Torgerson, D.F.

    1997-01-01

    AECL has a comprehensive product development program that is advancing all aspects of CANDU technology including fuel and fuel cycles, fuel channels, heavy water and tritium technology, safety technology, components and systems, constructability, health and environment, and control and instrumentation. The technology arising from these programs is being incorporated into the CANDU design through an evolutionary process. This evolutionary process is focused on improving economics, enhancing safety and ensuring fuel cycle flexibility to secure fuel supply for the foreseeable future. This strategic thrusts are being used by CANDU designers and researchers to set priorities and goals for AECL's development activities. The goals are part of a 25-year development program that culminates in the 'CANDU X'. The 'CANDU X' is not a specific design - it is a concept that articulates our best extrapolation of what is achievable with the CANDU design over the next 25 years, and includes the advanced features arising from the R and D and engineering to be done over that time. AECL's current product, the 700 MWe class CANDU 6 and the 900 MWe class CANDU 9, both incorporate output from the development programs as the technology become available. A brief description of each development areas is given below. The paper ends with the conclusion that AECL has a clear vision of how CANDU technology and products will evolve over the next several years, and has structured a comprehensive development program to take full advantage of the inherent characteristics of heavy water reactors. (author)

  8. The research of network database security technology based on web service

    Science.gov (United States)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  9. Nuclear science, technology and innovation in Canada - securing the future

    Energy Technology Data Exchange (ETDEWEB)

    Walker, R.S. [Atomic Energy of Canada Limited, Chalk River, ON (Canada)

    2014-07-01

    As a Tier 1 Nuclear Nation, Canada has a rich and proud history of achievement in nuclear Science, Technology and Innovation (ST&I) -- from commercializing the CANDU power system around the world, advancing fuel technology and nuclear safety, to protecting human health through nuclear medicine and cancer therapy technology. Today, the nuclear industry in Canada is actively working to secure its promising, long-term place in the world and is embracing the change necessary to fulfill the enormous potential for good of nuclear technology. For its part, the Canadian Government is taking a bold new public policy approach to nuclear ST&I, by restructuring its large, multi-faceted AECL Nuclear Laboratories. Through the restructuring, AECL, as Canada's premier nuclear science and technology organization, will be better positioned for success via an incentivized 'Government-owned-Contractor-operated', private-sector management model. The aim of this new approach is to enhance and grow high-value nuclear innovation for the marketplace, strengthen the competitiveness of Canada's nuclear sector, and reduce costs to the Government of Canada with time. This approach will play a key role in ensuring a bright future for the Canadian Nuclear Industry domestically and globally as it launches its 25-year Vision and Action Plan, where one of the priority action areas is support for a strong, forward-looking, nuclear ST&I agenda. As the new model for the Nuclear Laboratories is moved forward by the Government, with the support of AECL and industry, Canada's nuclear expertise and knowledge continue to be expanded and deepened through the work of the Laboratories' ten Centres of Excellence, where AECL's fundamental approach is guided by the reality that ST&I is needed in all aspects of the nuclear cycle, including decommissioning, waste management and environmental protection. (author)

  10. 14 CFR 1274.937 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-01-01

    ... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...

  11. 48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...

  12. 48 CFR 1252.239-71 - Information technology security plan and accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...

  13. Information security awareness in small information technology-dependent business organisations

    OpenAIRE

    2015-01-01

    M.A. (Business Management) Small businesses thrive in the developing economy of South Africa and address the important issue of unemployment and poverty that exist in the country. A large number of these business organisations can be found in the province of Gauteng because of the large and diverse economic contribution the province delivers to the economy of South Africa. With the increased use of technology in the small businesses of Gauteng and South Africa, the risks around cyber-secur...

  14. INTERNET SECURITYTECHNOLOGY AND SOCIAL AWARENESS OF THE DANGERS

    Directory of Open Access Journals (Sweden)

    Laskowski Piotr Paweł

    2017-06-01

    Full Text Available The article describes selected issues related to user safety on the Internet. This safety consists of a number of factors such as the technology that we use to communicate and to browse the Internet, and habits and behaviors that we have acquired and through which we can identify at least some typical hazards encountered on the Web. Knowledge of software and the ability to use it and to configure it properly as well as checking regularly for security updates reduces the risk of data loss or identity theft. Public awareness of threats continues to grow, but there are also new, previously unknown threats; that is why it is so important to inform of the dangers by all available channels of communication.

  15. Developing human technology curriculum

    Directory of Open Access Journals (Sweden)

    Teija Vainio

    2012-10-01

    Full Text Available During the past ten years expertise in human-computer interaction has shifted from humans interacting with desktop computers to individual human beings or groups of human beings interacting with embedded or mobile technology. Thus, humans are not only interacting with computers but with technology. Obviously, this shift should be reflected in how we educate human-technology interaction (HTI experts today and in the future. We tackle this educational challenge first by analysing current Master’s-level education in collaboration with two universities and second, discussing postgraduate education in the international context. As a result, we identified core studies that should be included in the HTI curriculum. Furthermore, we discuss some practical challenges and new directions for international HTI education.

  16. METHOD FOR SECURITY SPECIFICATION SOFTWARE REQUIREMENTS AS A MEANS FOR IMPLEMENTING A SOFTWARE DEVELOPMENT PROCESS SECURE - MERSEC

    Directory of Open Access Journals (Sweden)

    Castro Mecías, L.T.

    2015-06-01

    Full Text Available Often security incidents that have the object or use the software as a means of causing serious damage and legal, economic consequences, etc. Results of a survey by Kaspersky Lab reflectvulnerabilities in software are the main cause of security incidents in enterprises, the report shows that 85% of them have reported security incidents and vulnerabilities in software are the main reason is further estimated that incidents can cause significant losses estimated from 50,000 to $ 649.000. (1 In this regard academic and industry research focuses on proposals based on reducing vulnerabilities and failures of technology, with a positive influence on how the software is developed. A development process for improved safety practices and should include activities from the initial phases of the software; so that security needs are identified, manage risk and appropriate measures are implemented. This article discusses a method of analysis, acquisition and requirements specification of the software safety analysis on the basis of various proposals and deficiencies identified from participant observation in software development teams. Experiments performed using the proposed yields positive results regarding the reduction of security vulnerabilities and compliance with the safety objectives of the software.

  17. Nuclear technology for sustainable development

    International Nuclear Information System (INIS)

    2001-01-01

    Introduces three of the IAEA's current programmes: Promoting food security - use of the sterile insect technique to eradicate the tsetse fly in Sub-Saharan Africa; Managing water resources - use of isotope hydrology to check water for traces of arsenic in Bangladesh; Improving human health - use of nuclear techniques for diagnosis, imaging and cancer treatment in developing countries

  18. Smart Fabrics Technology Development

    Science.gov (United States)

    Simon, Cory; Potter, Elliott; Potter, Elliott; McCabe, Mary; Baggerman, Clint

    2010-01-01

    Advances in Smart Fabrics technology are enabling an exciting array of new applications for NASA exploration missions, the biomedical community, and consumer electronics. This report summarizes the findings of a brief investigation into the state of the art and potential applications of smart fabrics to address challenges in human spaceflight.

  19. PACFEST 2004 : enabling technologies for maritime security in the Pacific region.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Whitley, John B.; Chellis, Craig (Pacific Disaster Center, Kihei, HI)

    2005-06-01

    In October of 2003 experts involved in various aspects of homeland security from the Pacific region met to engage in a free-wheeling discussion and brainstorming (a 'fest') on the role that technology could play in winning the war on terrorism in the Pacific region. The result was a concise and relatively thorough definition of the terrorism problem in the Pacific region, emphasizing the issues unique to Island nations in the Pacific setting, along with an action plan for developing working demonstrations of advanced technological solutions to these issues. Since PacFest 2003, the maritime dimensions of the international security environment have garnered increased attention and interest. To this end, PacFest 2004 sought to identify gaps and enabling technologies for maritime domain awareness and responsive decision-making in the Asia-Pacific region. The PacFest 2004 participants concluded that the technologies and basic information building blocks exist to create a system that would enable the Pacific region government and private organizations to effectively collaborate and share their capabilities and information concerning maritime security. The proposed solution summarized in this report integrates national environments in real time, thereby enabling effective prevention and first response to natural and terrorist induced disasters through better use of national and regional investments in people, infrastructure, systems, processes and standards.

  20. Ethnicity: A threat to Nigeria's security and development | Nweke ...

    African Journals Online (AJOL)

    The negative implications of ethnicity to national security and development are enormous. This paper interrogates ethnicity as the major hindrance to Nigeria.s security and development. The paper unveils the role of the constitution of the Federal Republic of Nigeria in strengthening ethnicity and calls for a constitutional ...

  1. Development of a Secure Mobile GPS Tracking and Management System

    Science.gov (United States)

    Liu, Anyi

    2012-01-01

    With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …

  2. New Security Development and Trends to Secure the SCADA Sensors Automated Transmission during Critical Sessions

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2015-10-01

    Full Text Available Modern technology enhancements have been used worldwide to fulfill the requirements of the industrial sector, especially in supervisory control and data acquisition (SCADA systems as a part of industrial control systems (ICS. SCADA systems have gained popularity in industrial automations due to technology enhancements and connectivity with modern computer networks and/or protocols. The procurement of new technologies has made SCADA systems important and helpful to processing in oil lines, water treatment plants, and electricity generation and control stations. On the other hand, these systems have vulnerabilities like other traditional computer networks (or systems, especially when interconnected with open platforms. Many international organizations and researchers have proposed and deployed solutions for SCADA security enhancement, but most of these have been based on node-to-node security, without emphasizing critical sessions that are linked directly with industrial processing and automation. This study concerns SCADA security measures related to critical processing with specified sessions of automated polling, analyzing cryptography mechanisms and deploying the appropriate explicit inclusive security solution in a distributed network protocol version 3 (DNP3 stack, as part of a SCADA system. The bytes flow through the DNP3 stack with security computational bytes within specified critical intervals defined for polling. We took critical processing knowledge into account when designing a SCADA/DNP3 testbed and deploying a cryptography solution that did not affect communications.

  3. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    Energy Technology Data Exchange (ETDEWEB)

    Mendez Cruz, Carmen Margarita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rochau, Gary E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Middleton, Bobby [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Salvador B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Carmelo [General Atomics, San Diego, CA (United States); Schleicher, Robert [General Atomics, San Diego, CA (United States)

    2016-06-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)’s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  4. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    International Nuclear Information System (INIS)

    Mendez Cruz, Carmen Margarita; Rochau, Gary E.; Middleton, Bobby; Rodriguez, Salvador B.; Rodriguez, Carmelo; Schleicher, Robert

    2016-01-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)'s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  5. Recent Developments in Low-Level Software Security

    OpenAIRE

    Agten , Pieter; Nikiforakis , Nick; Strackx , Raoul; Groef , Willem ,; Piessens , Frank

    2012-01-01

    Part 1: Keynotes; International audience; An important objective for low-level software security research is to develop techniques that make it harder to launch attacks that exploit implementation details of the system under attack. Baltopoulos and Gordon have summarized this as the principle of source-based reasoning for security: security properties of a software system should follow from review of the source code and its source-level semantics, and should not depend on details of the compi...

  6. Information Technology Security Professionals' Knowledge and Use Intention Based on UTAUT Model

    Science.gov (United States)

    Kassa, Woldeloul

    2016-01-01

    Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…

  7. 76 FR 31350 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Science.gov (United States)

    2011-05-31

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0357] Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast Guard, DHS. ACTION: Notice of request for comments... Security and Safety Act of 2010(CVSSA), specifically related to video recording and overboard detection...

  8. Safeguards and security research and development: Program status report, February-July 1981

    International Nuclear Information System (INIS)

    Henry, C.N.; Walton, R.B.

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards

  9. Safeguards and security research and development: Program status report, February-July 1981

    Energy Technology Data Exchange (ETDEWEB)

    Henry, C.N.; Walton, R.B. (comps.)

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards.

  10. Technologies for a sustainable development; Technologies pour un developpement durable

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    initiative (Global Monitoring for Environment and Security); contribution of spatial observation techniques; measurements and impacts of the air traffic on the atmospheric chemistry by sounders on board of commercial aircraft; advanced seismic technology for improved reservoir drainage; development of the heavy and extra-heavy crude oils, technological and economic challenges; development of deep and ultra-deep offshore: a major source of supply to meet the future world energy demand; what forms of energy for the cars of tomorrow; urban goods transport: towards a drop in congestion and nuisance; the Civis guided intermediate system: improvement of comfort and stationary accessibility; new hybrid propulsion for buses: energy/environmental optimization; Tram-train: city-suburbs concept without transshipment; the contribution of waste processing to the production of greenhouse gases; waste as a source of renewable energy; integrated waste management: 4 practical cases in food production, paper industry, naval construction and chemicals; sludge management. (J.S.)

  11. Understanding of the Cyber Security and the Development of CAPTCHA

    Science.gov (United States)

    Yang, Yu

    2018-04-01

    CAPTCHA is the abbreviation of "Completely Automated Public Turing Test to Tell Computers and Humans Apart", which is a program algorithm for distinguishing between computers and humans. It is able to generate and evaluate tests that are easy for human to pass yet are not possible for computers to. Common CAPTCHA generally contains symbols, text, pictures, and even videos, which is mainly used for human-computer verification. With the popularization of the Internet and its related applications, many malicious attacks against websites, systems and servers gradually appear. Therefore, the research on CAPTCHA is especially important. This article will briefly summarize and introduce the existing CAPTCHA technology, and summarizes the common problems of network attacks and information security. After listing the common type of CAPTCHA, it will finally propose feasible suggestions for the development of CAPTCHA.

  12. Science and Technology Resources on the Internet: Computer Security.

    Science.gov (United States)

    Kinkus, Jane F.

    2002-01-01

    Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…

  13. Rights management technologies: A good choice for securing electronic healthrecords?

    NARCIS (Netherlands)

    Petkovic, M.; Katzenbeisser, S.; Kursawe, K.; Pohlmann, N.; Reimer, H.; Schneider, W.

    2007-01-01

    Advances in healthcare IT bring new concerns with respect to privacy and security. Security critical patient data no longer resides on mainframes physically isolated within an organization, where physical security measures can be taken to defend the data and the system. Modern solutions are heading

  14. Homeland Security Affairs Journal, Supplement - 2012: IEEE 2011 Conference on Technology for Homeland Security: Best Papers

    OpenAIRE

    2012-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. IEEE Supplement 2012. Supplement: IEEE 2011 Conference on Te...

  15. Hawai‘i Distributed Energy Resource Technologies for Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2012-09-30

    HNEI has conducted research to address a number of issues important to move Hawai‘i to greater use of intermittent renewable and distributed energy resource (DER) technologies in order to facilitate greater use of Hawai‘i's indigenous renewable energy resources. Efforts have been concentrated on the Islands of Hawai‘i, Maui, and O‘ahu, focusing in three areas of endeavor: 1) Energy Modeling and Scenario Analysis (previously called Energy Road mapping); 2) Research, Development, and Validation of Renewable DER and Microgrid Technologies; and 3) Analysis and Policy. These efforts focused on analysis of the island energy systems and development of specific candidate technologies for future insertion into an integrated energy system, which would lead to a more robust transmission and distribution system in the state of Hawai‘i and eventually elsewhere in the nation.

  16. Applications of ultra-compact accelerator technologies for homeland security

    International Nuclear Information System (INIS)

    Sampayan, S.; Caporaso, G.; Chen, Y.J.; Falabella, S.; Guethlein, G.; Harris, J.R.; Hawkins, S.; Holmes, C.; Krogh, M.; Nelson, S.; Nunnally, W.; Paul, A.C.; Poole, B.; Rhodes, M.; Sanders, D.; Selenes, K.; Shaklee, K.; Sitaraman, S.; Sullivan, J.; Wang, L.; Watson, J.

    2007-01-01

    We report on a technology development to address explosive detector system throughout with increased detection probability. The system we proposed and are studying consists of a pixelized X-ray based pre-screener and a pulsed neutron source quantitative post verifier. Both technologies are derived from our compact accelerator development program for the Department of Energy Radiography Mission that enables gradients >10MV/m. For the pixelized X-ray source panel technology, we have performed initial integration and testing. For the accelerator, we are presently integrating and testing cell modules. For the verifier, we performed MCNP calculations that show good detectability of military and multi-part liquid threat systems. We detail the progress of our overall effort, including research and modeling to date, recent high voltage test results and concept integration

  17. Developing a secured social networking site using information security awareness techniques

    Directory of Open Access Journals (Sweden)

    Julius O. Okesola

    2014-11-01

    Full Text Available Background: Ever since social network sites (SNS became a global phenomenon in almost every industry, security has become a major concern to many SNS stakeholders. Several security techniques have been invented towards addressing SNS security, but information security awareness (ISA remains a critical point. Whilst very few users have used social circles and applications because of a lack of users’ awareness, the majority have found it difficult to determine the basis of categorising friends in a meaningful way for privacy and security policies settings. This has confirmed that technical control is just part of the security solutions and not necessarily a total solution. Changing human behaviour on SNSs is essential; hence the need for a privately enhanced ISA SNS. Objective: This article presented sOcialistOnline – a newly developed SNS, duly secured and platform independent with various ISA techniques fully implemented. Method: Following a detailed literature review of the related works, the SNS was developed on the basis of Object Oriented Programming (OOP approach, using PhP as the coding language with the MySQL database engine at the back end. Result: This study addressed the SNS requirements of privacy, security and services, and attributed them as the basis of architectural design for sOcialistOnline. SNS users are more aware of potential risk and the possible consequences of unsecured behaviours. Conclusion: ISA is focussed on the users who are often the greatest security risk on SNSs, regardless of technical securities implemented. Therefore SNSs are required to incorporate effective ISA into their platform and ensure users are motivated to embrace it.

  18. Food sovereignty and rural development: beyond food security

    Directory of Open Access Journals (Sweden)

    Fabio Alberto Pachón-Ariza¹

    2013-12-01

    Full Text Available Food sovereignty and food security are not the same issue. Both are different but many people around the world confuse the two. This article explores and analyzes the issues surrounding food security and food sovereignty in order to explain the differences between them, identifies the principal statements in food sovereignty and compares some data from different countries in an attempt to highlight the fact that food security policies result in hunger, poverty and environmental damage. Food security and rural development share similar goals, both seek to improve the quality of life of peasants and rural inhabitants; however, economic ideas are unfortunately still prized more than people

  19. 77 FR 56662 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-13

    ... its business. ADDRESSES: The meeting will be held at the Department of Homeland Security (DHS... as new developments in systems engineering, cyber-security, knowledge management and how best to... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0053] Homeland Security Science and...

  20. A Study Of Cyber Security Challenges And Its Emerging Trends On Latest Technologies

    OpenAIRE

    Reddy, G. Nikhita; Reddy, G. J. Ugander

    2014-01-01

    Cyber Security plays an important role in the field of information technology .Securing the information have become one of the biggest challenges in the present day. When ever we think about the cyber security the first thing that comes to our mind is cyber crimes which are increasing immensely day by day. Various Governments and companies are taking many measures in order to prevent these cyber crimes. Besides various measures cyber security is still a very big concern to many. This paper ma...

  1. Mobilizing technology for developing countries

    Energy Technology Data Exchange (ETDEWEB)

    Weiss, C Jr

    1979-10-01

    Mr. Weiss says that the 15 years since the UN Conference on Science, Technology, and Development in Geneva have taught us that what seem at first to be technological obstacles to development frequently turn out on closer examination to have been policy failures; that introduction of technologies into developing countries must be accompanied by institutional and policy changes if the technologies are to benefit the countries. He points out that choice of alternative technology for a developing country should depend on careful overall assessment of local techno-economic, geographical, ecological, and social factors, as well as the desired balance between growth and equity. Such a technology assessment, a key element in the choice of appropriate (i.e., locally suitable) technology for particular investment projects, should be built into procedures for project preparation and appraisal in governments and development assistance agencies. Turning to technologists, Mr. Weiss says they face a double challenge: (1) to recognize potential for new efforts to harness science and technology for the benefit of the developing countries; and (2) by understanding the social, institutional, and economic framework into which an innovation is to operate, to ease its application and diffusion, and thus speed and increase its practical impact. 25 references.

  2. Social security in developing countries : some theoretical considerations

    NARCIS (Netherlands)

    Leliveld, A.H.M.

    1991-01-01

    This paper discusses the concept of social security and criticizes the ILO definition of the concept as too limited to analyse non-Western social security systems. It develops an alternative definition which includes, firstly, the protection by society of individuals or social groups against a fall

  3. Factors affecting food security and contribution of modern technologies in food sustainability.

    Science.gov (United States)

    Premanandh, Jagadeesan

    2011-12-01

    The concept of food insecurity is complex and goes beyond the simplistic idea of a country's inability to feed its population. The global food situation is redefined by many driving forces such as population growth, availability of arable lands, water resources, climate change and food availability, accessibility and loss. The combined effect of these factors has undeniably impacted global food production and security. This article reviews the key factors influencing global food insecurity and emphasises the need to adapt science-based technological innovations to address the issue. Although anticipated benefits of modern technologies suggest a level of food production that will sustain the global population, both political will and sufficient investments in modern agriculture are needed to alleviate the food crisis in developing countries. In this globalised era of the 21st century, many determinants of food security are trans-boundary and require multilateral agreements and actions for an effective solution. Food security and hunger alleviation on a global scale are within reach provided that technological innovations are accepted and implemented at all levels. Copyright © 2011 Society of Chemical Industry.

  4. Review of Enabling Technologies to Facilitate Secure Compute Customization

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pelfrey, Daniel S [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2014-12-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data for a variety of users, often requiring strong separation between job allocations. There are many challenges to establishing these secure enclaves within the shared infrastructure of high-performance computing (HPC) environments. The isolation mechanisms in the system software are the basic building blocks for enabling secure compute enclaves. There are a variety of approaches and the focus of this report is to review the different virtualization technologies that facilitate the creation of secure compute enclaves. The report reviews current operating system (OS) protection mechanisms and modern virtualization technologies to better understand the performance/isolation properties. We also examine the feasibility of running ``virtualized'' computing resources as non-privileged users, and providing controlled administrative permissions for standard users running within a virtualized context. Our examination includes technologies such as Linux containers (LXC [32], Docker [15]) and full virtualization (KVM [26], Xen [5]). We categorize these different approaches to virtualization into two broad groups: OS-level virtualization and system-level virtualization. The OS-level virtualization uses containers to allow a single OS kernel to be partitioned to create Virtual Environments (VE), e.g., LXC. The resources within the host's kernel are only virtualized in the sense of separate namespaces. In contrast, system-level virtualization uses hypervisors to manage multiple OS kernels and virtualize the physical resources (hardware) to create Virtual Machines (VM), e.g., Xen, KVM. This terminology of VE and VM, detailed in Section 2, is used throughout the report to distinguish between the two different approaches to providing virtualized execution

  5. The law as an instrument of technology control and as a basis for technological development

    International Nuclear Information System (INIS)

    Kloepfer, M.

    1998-01-01

    In public debates about German industry's global competitiveness it becomes evident that environmental law and the technology-related law are almost exclusively perceived as systems of law which - for reasons of environmental protection and protection of public health - are setting restraints to technological development. This is a narrow perspective neglecting the functions of the law as an instrument providing legal security and a reliable framework for developments. In a democratic, constitutional state, the environmental law and the technology-related law are instruments providing for protection of the basic, general rights and requirements of technology, and contribute to ensuring general acceptance of technologic development. (orig./CB) [de

  6. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...

  7. Development of Innovative Component for the Region’s Economic Security

    Directory of Open Access Journals (Sweden)

    Irina Markovna Golova

    2017-12-01

    Full Text Available This article studies the development of innovative component for the region’s economic security. The hypothesis of the study is that in the context of globalization and development of network society, innovation is becoming one of the key elements ensuring the economic security of a region. We considered the relationship between the concepts of sustainable development and economic security. The authors show that currently, the economic security of the country directly depends on its place within the innovation chain. We substantiate that Russian Federation and its regions need to shift to the innovation development based on strengthening its own sources for long-term growth. The paper considers the basic theoretical and methodological problems in the formation of innovation component of the Russian regions’ economic security. We reveal the major essence and elements of the innovative component of the sustainable economic development of the region. The authors show that the formation of the innovative component of the region’s economic security demands the correlation of the strategy of regional innovation development and the production and technological type of territory. Additionally, this strategy should correlate with the desirable ways of production type transformation in the future, considering the trends of the world economy. We have highlighted the production and technological types of Russian regions as well as identified the features of relevant regional components for the innovation system of the Russian Federation to ensure sustainable development. The study defines the priority directions and goals for the development of economic security innovative component in the Russian regions. The authors’ calculations allowed to select a group of territorial subjects of the Russian Federation, which appear to be the most promising for the development of innovative activities for the elaboration of export-oriented high-tech industries

  8. SECURITY IN SUSTAINABLE DEVELOPMENT: COMPARING UNITED NATIONS 2030 AGENDA FOR SUSTAINABLE DEVELOPMENT WITH MILLENNIUM DECLARATION

    Directory of Open Access Journals (Sweden)

    Ahmet BARBAK

    2017-06-01

    Full Text Available This study aims to compare United Nations 2030 Agenda for Sustainable Development with Millennium Declaration in terms of their security conceptualizations to explore changes in security thinking and policy components (goals, targets, principles, priorities etc. over time. In doing so, it is envisaged that United Nations’ expectations from member states regarding their national security policies and organizations could be revealed. Security thinking has changed since late 1980’s with the introduction of sustainable development approach by the United Nations. This shift in security thinking encompasses human security and security-development nexus. Holding all member states responsible, Millennium Declaration and 2030 Agenda for Sustainable Development constitute the primary and the most recent outcome documents of United Nations’ sustainable development policy. Both documents have security components. This enables extracting security elements and comparing them with an analytical manner. Consequently, findings are compared and discussed in terms of public policy and organization at national level.

  9. Sustainable Phosphorus Measures: Strategies and Technologies for Achieving Phosphorus Security

    Directory of Open Access Journals (Sweden)

    Stuart White

    2013-01-01

    Full Text Available Phosphorus underpins the world’s food systems by ensuring soil fertility, maximising crop yields, supporting farmer livelihoods and ultimately food security. Yet increasing concerns around long-term availability and accessibility of the world’s main source of phosphorus—phosphate rock, means there is a need to investigate sustainable measures to buffer the world’s food systems against the long and short-term impacts of global phosphorus scarcity. While the timeline of phosphorus scarcity is contested, there is consensus that more efficient use and recycling of phosphorus is required. While the agricultural sector will be crucial in achieving this, sustainable phosphorus measures in sectors upstream and downstream of agriculture from mine to fork will also need to be addressed. This paper presents a comprehensive classification of all potential phosphorus supply- and demand-side measures to meet long-term phosphorus needs for food production. Examples range from increasing efficiency in the agricultural and mining sector, to technologies for recovering phosphorus from urine and food waste. Such measures are often undertaken in isolation from one another rather than linked in an integrated strategy. This integrated approach will enable scientists and policy-makers to take a systematic approach when identifying potential sustainable phosphorus measures. If a systematic approach is not taken, there is a risk of inappropriate investment in research and implementation of technologies and that will not ultimately ensure sufficient access to phosphorus to produce food in the future. The paper concludes by introducing a framework to assess and compare sustainable phosphorus measures and to determine the least cost options in a given context.

  10. Wind energy technology developments

    DEFF Research Database (Denmark)

    Madsen, Peter Hauge; Hansen, Morten Hartvig; Pedersen, Niels Leergaard

    2014-01-01

    turbine blades and towers are very large series-produced components, which costs and quality are strongly dependent on the manufacturing methods. The industrial wind energy sector is well developed in Denmark, and the competitive advantage of the Danish sector and the potential for job creation...

  11. Fiber-optic perimeter security system based on WDM technology

    Science.gov (United States)

    Polyakov, Alexandre V.

    2017-10-01

    Intelligent underground fiber optic perimeter security system is presented. Their structure, operation, software and hardware with neural networks elements are described. System allows not only to establish the fact of violation of the perimeter, but also to locate violations. This is achieved through the use of WDM-technology division spectral information channels. As used quasi-distributed optoelectronic recirculation system as a discrete sensor. The principle of operation is based on registration of the recirculation period change in the closed optoelectronic circuit at different wavelengths under microstrain exposed optical fiber. As a result microstrain fiber having additional power loss in a fiber optical propagating pulse, which causes a time delay as a result of switching moments of the threshold device. To separate the signals generated by intruder noise and interference, the signal analyzer is used, based on the principle of a neural network. The system detects walking, running or crawling intruder, as well as undermining attempts to register under the perimeter line. These alarm systems can be used to protect the perimeters of facilities such as airports, nuclear reactors, power plants, warehouses, and other extended territory.

  12. National Nuclear Technology Map Development

    International Nuclear Information System (INIS)

    Shin, J. I.; Lee, T. J.; Yoon, S. W.

    2005-03-01

    The objective of NuTRM is to prepare a plan of nuclear R and D and technological innovations which is very likely to make nuclear technology a promising power source for future national developments. The NuTRM finds out systematically the nuclear R and D vision and the high-value-added strategic technologies to be developed by the efficient cooperation of actors including government, industry, academy and research institute by 2020. In other words, NuTRM aims at a long-term strategic planning of nuclear R and D and technological innovation in order to promote the socio-economic contributions of nuclear science and technology for the nation's future competitiveness and sustainable development and to raise the global status of the Korean nuclear R and D and Industry

  13. Technological development in fisheries management

    DEFF Research Database (Denmark)

    Eigaard, Ole Ritzau; Marchal, Paul; Gislason, Henrik

    2014-01-01

    Many marine fish stocks are overexploited and considerable overcapacity exists in fishing fleets worldwide. One of the reasons for the imbalance between resource availability and fishing capacity is technological development, which continuously increases the efficiency of the vessels—a mechanism...... referred to as “technological creep.” We review how the introduction of new and more efficient electronic equipment, gear design, engines, deck equipment, and catch-handling procedures influences the capture efficiency (catchability) of commercial fishing vessels. On average, we estimate that catchability...... increases by 3.2% per year due to technological developments, an increase often ignored in fisheries management. The documentation and quantification of technological creep improves the basis for successfully integrating the effects of technological development (and catchability changes) in fisheries...

  14. Development of a security-by-design handbook

    International Nuclear Information System (INIS)

    Olson, David L.; Snell, Mark Kamerer; Iida, Toru; Ochiai, Kazuya; Tanuma, Koji

    2010-01-01

    There is an increasing awareness that efficient and effective nuclear facility design is best achieved when requirements from the 3S disciplines Safety, Safeguards, and Security - are balanced and intrinsic to the facility design. This can be achieved when policy, processes, methods, and technologies are understood and applied in these areas during all phases of the design process. For the purposes of this paper, Security-by-design will be defined as the system level incorporation of the physical protection system (PPS) into a new or retrofitted nuclear power plant (NPP) or nuclear facility (NF) resulting in intrinsic security. Security-by-design can also be viewed as a framework to achieve robust and durable security systems. This paper reports on work performed to date to create a Security-by-Design Handbook, under a bilateral agreement between the United States and Japan, specifically, a review of physical protection principles and best practices, and a decommissioning to better understand where these principles and practices can be applied. This paper describes physical protection principles and best practices to achieve security-by- design that were gathered from International, Japanese, and U.S. sources. Principles are included for achieving security early in the design process where security requirements are typically less costly and easier to incorporate. The paper then describes a generic design process that covers the entire facility lifecycle from scoping and planning of the project to decommissioning and decontamination. Early design process phases, such as conceptual design, offer opportunities to add security features intrinsic to the facility design itself. Later phases, including design engineering and construction, are important for properly integrating security features into a coherent design and for planning for and assuring the proper performance of the security system during the operation and decommissioning of the facility. The paper also

  15. Trends in Wind Energy Technology Development

    DEFF Research Database (Denmark)

    Rasmussen, Flemming; Madsen, Peter Hauge; Tande, John O.

    2011-01-01

    . The huge potential of wind, the rapid development of the technology and the impressive growth of the industry justify the perception that wind energy is changing its role to become the future backbone of a secure global energy supply. Between the mid-1980s, when the wind industry took off, and 2005 wind......Text Over the past 25 years global wind energy capacity has doubled every three years, corresponding to a tenfold expansion every decade. By the end of 2010 global installed wind capacity was approximately 200 GW and in 2011 is expected to produce about 2% of global electricity consumption...... turbine technology has seen rapid development, leading to impressive increases in the size of turbines, with corresponding cost reductions. From 2005 to 2009 the industry’s focus seems to have been on increasing manufacturing capacity, meeting market demand and making wind turbines more reliable...

  16. High performance fuel technology development

    Energy Technology Data Exchange (ETDEWEB)

    Koon, Yang Hyun; Kim, Keon Sik; Park, Jeong Yong; Yang, Yong Sik; In, Wang Kee; Kim, Hyung Kyu [KAERI, Daejeon (Korea, Republic of)

    2012-01-15

    {omicron} Development of High Plasticity and Annular Pellet - Development of strong candidates of ultra high burn-up fuel pellets for a PCI remedy - Development of fabrication technology of annular fuel pellet {omicron} Development of High Performance Cladding Materials - Irradiation test of HANA claddings in Halden research reactor and the evaluation of the in-pile performance - Development of the final candidates for the next generation cladding materials. - Development of the manufacturing technology for the dual-cooled fuel cladding tubes. {omicron} Irradiated Fuel Performance Evaluation Technology Development - Development of performance analysis code system for the dual-cooled fuel - Development of fuel performance-proving technology {omicron} Feasibility Studies on Dual-Cooled Annular Fuel Core - Analysis on the property of a reactor core with dual-cooled fuel - Feasibility evaluation on the dual-cooled fuel core {omicron} Development of Design Technology for Dual-Cooled Fuel Structure - Definition of technical issues and invention of concept for dual-cooled fuel structure - Basic design and development of main structure components for dual- cooled fuel - Basic design of a dual-cooled fuel rod.

  17. Developing Inset Resistant Maize Varieties for Food Security in Kenya

    International Nuclear Information System (INIS)

    Mugo, S.

    2002-01-01

    The Insect Resistant Maize for Africa (IRMA) project aims at increasing maize production and food security through development and deployment of stem borer resistant maize germplasm developed using conventional and through biotechnology methods such as Bt maize. Bt maize offers farmers an effective and practical option for controlling stem borers. It was recognized that the development and routine use of Bt maize will require addressing relevant bio-safety, environmental, and community concerns and research and information gathering activities are in place to address these concerns and research and information gathering activities are in place to address these concerns. Suitable Bt gene have been acquired or synthesized and back-crossed into elite maize germplasm at CIMMYT-Mexico, and the effective Cry-proteins against the major maize stem borers in Kenya were identified to better target pests. Stem borer resistant maize germplasm is being developed through conventional breeding, using locally adapted and exotic germplasm. for safe and effective deployment of Bt maize,studies on its impacts on target and non-target arthropods as well as studies on the effects of Bt maize on key non-target arthropods as well as studies on gene flow are underway. Insect resistance management strategies are being developed through quantifying the effectiveness, ???. Socioeconomic impact studies are revealing factors in the society that may influence the adoption of Bt maize in Kenya. Also, baseline data, essential for the monitoring and evaluation of the Bt maize technology in Kenya, has been established. Technology transfer and capacity building, creating awareness and communications have received attention in the project. This paper describes the major research activities as they relate to development of the stem bore resistant maize germplasm

  18. A Cost Effective Security Technology Integrated with RFID Based Automated Toll Collection System

    Directory of Open Access Journals (Sweden)

    Rafiya Hossain

    2017-09-01

    Full Text Available Crime statistics and research on criminology show that under similar circumstances,crimes are more likely to occur in developing countries than in developed countries due to their lack ofsecurity measures. Transport crimes on highways and bridges are one of the most common crimes in the developing nations. Automation of various systems like the toll collection system is being introduced in the developing countries to avoid corruption in the collection of toll, decrease cost and increase operational efficiency. The goal of this research is to find an integrated solution that enhances security along with the advantage of automated toll collection. Inspired by the availability of many security systems, this research presents a system that can block a specific vehicle or a particular type of vehicles at the toll booths based on directives from the law enforcement agencies. The heart of the system is based on RFID (Radio Frequency Identification technology. In this system, by sending a text message the law enforcement agency or the authority that controls the toll booths can prevent the barrier from being liftedeven after deduction of the toll charge if the passing vehicle has a security issue. The designed system should help the effort of reducing transport crimes on highways and bridges of developing countries.

  19. Multichip module technology development

    International Nuclear Information System (INIS)

    Kapustinsky, J.S.; Boissevain, J.G.; Muck, R.C.; Smith, G.D.; Wong-Swanson, B.G.; Ziock, H.J.

    1997-01-01

    This is the final report of a one-year, Laboratory Directed Research and Development (LDRD) project at Los Alamos National Laboratory (LANL). A Multichip Module (MCM) was designed and submitted for fabrication to the Lockheed Martin foundry using a licensed process called High Density Interconnect (HDI). The HDI process uses thin film techniques to create circuit interconnect patterns on multiple layers of dielectric film which are deposited directly on top of unpackaged electronic die. This results in an optimally small package that approaches the area of the bare die themselves. This project tested the capability of the Lockheed Martin foundry to produce, in an HDI process, a complex mixed-mode (analog and digital) circuit on a single MCM substrate

  20. Radioisotope Power Systems Technology Development

    Data.gov (United States)

    National Aeronautics and Space Administration — The goal of the RPS's technology portfolio is to advance performance of radioisotope power systems through new and novel innovations being developed and transitioned...

  1. Energy consumption and technological developments

    International Nuclear Information System (INIS)

    Okorokov, V.R.

    1990-02-01

    The paper determines an outline of the world energy prospects based on principal trends of the development of energy consumption analysed over the long past period. According to the author's conclusion the development of energy systems will be determined in the nearest future (30 - 40 years) by contemporary energy technologies based on the exploitation of traditional energy resources but in the far future technologies based on the exploitation of thermonuclear and solar energy will play the decisive role. (author)

  2. Managed groundwater development for water-supply security in Sub ...

    African Journals Online (AJOL)

    security in Sub-Saharan Africa: Investment priorities ... 2010, together with a review of some developments in western Africa and insights from parts of Asia and Latin America. ...... and the Global Water Partnership (Ania Grobicki and Aurelie.

  3. Working Environment and Technological Development

    DEFF Research Database (Denmark)

    Clausen, Christian; Nielsen, Klaus T.; Jensen, Per Langaa

    1997-01-01

    and their and their concept of working environment2) Technology renewal, which considers the role of the working environment in connection with the development and use of concrete technologies3) Working environment planning, which considers the existing efforts to place the working environment in a planning process.......The paper describes the purpose, themes, overarching research questions and specific projects of the programme: Working Environment and Technological Development. The major research themes are:1) Management concepts and the working environment, which considers the visions...

  4. Development of Radioisotope Tracer Technology

    International Nuclear Information System (INIS)

    Jung, Sung Hee; Jin, Joon Ha; Kim, Jong Bum; Kim, Jin Seop; Kim, Jae Jo; Park, Soon Chul; Lim, Don Soon; Choi, Byung Jong; Jang, Dong Soon; Kim, Hye Sook

    2007-06-01

    The project is aimed to develop the radiotracer technology for process optimization and trouble-shooting to establish the environmental and industrial application of radiation and radioisotopes. The advanced equipment and software such as high speed data acquisition system, RTD model and high pressure injection tool have developed. Based on the various field application to the refinery/petrochemical industries, the developed technology was transfer to NDT company for commercial service. For the environmental application of radiotracer technology, injector, detector sled, core sampler, RI and GPS data logging system are developed and field tests were implemented successfully at Wolsung and Haeundae beach. Additionally tracer technology were also used for the performance test of the clarifier in a wastewater treatment plant and for the leak detection in reservoirs. From the experience of case studies on radiotracer experiment in waste water treatment facilities, 'The New Excellent Technology' is granted from the ministry of environment. For future technology, preliminary research for industrial gamma transmission and emission tomography which are new technology combined with radioisotope and image reconstruction are carried out

  5. A Study of Cyber Security Activities for Development of Safety-related Controller

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Myeongkyun; Song, Seunghwan; Yoo, Kwanwoo; Yun, Donghwa [Korea Univ., Seoul (Korea, Republic of)

    2014-05-15

    Nuclear Power Plant Regulatory guide describes the regulatory requirements to implement cyber security activities to ensure that design and operate to respond to cyber threats that exploited to vulnerability of digital-based technologies associated with safety-related digital instrumentation and control systems at nuclear power plants. Cyber security activities coverage is instrumentation and control systems to perform safety functions and digital-based equipment to use development, test, analysis and asset for instrumentation and control systems. Regulatory guidance is required to the cyber security activities that should be performed in each development phase of safety-related controller. Development organization should establish and implement to cyber security plans for responding to cyber threats throughout each lifecycle phase and the result of the cyber security activities should be generated to the documents. In addition, the independent verification and validation organization should perform simulated penetration test for enhancing response capabilities to cyber security threats and development organization should establish and implement response hardening solutions for the cyber security vulnerabilities identified in the simulated penetration test.

  6. A Study of Cyber Security Activities for Development of Safety-related Controller

    International Nuclear Information System (INIS)

    Lee, Myeongkyun; Song, Seunghwan; Yoo, Kwanwoo; Yun, Donghwa

    2014-01-01

    Nuclear Power Plant Regulatory guide describes the regulatory requirements to implement cyber security activities to ensure that design and operate to respond to cyber threats that exploited to vulnerability of digital-based technologies associated with safety-related digital instrumentation and control systems at nuclear power plants. Cyber security activities coverage is instrumentation and control systems to perform safety functions and digital-based equipment to use development, test, analysis and asset for instrumentation and control systems. Regulatory guidance is required to the cyber security activities that should be performed in each development phase of safety-related controller. Development organization should establish and implement to cyber security plans for responding to cyber threats throughout each lifecycle phase and the result of the cyber security activities should be generated to the documents. In addition, the independent verification and validation organization should perform simulated penetration test for enhancing response capabilities to cyber security threats and development organization should establish and implement response hardening solutions for the cyber security vulnerabilities identified in the simulated penetration test

  7. Advances in cyber security technology, operations, and experiences

    CERN Document Server

    Hsu, D Frank

    2013-01-01

    Advances in Cyber Security provides, in a technical yet easy to understand fashion, a real life story of the evolving cyberspace ecosystem from the perspectives of structure, function, and application. It also provides ways and means to secure and sustain this ecosystem by the collective wisdom of professionals and practitioners from government, academia, and industry across national and international boundaries.

  8. The impact of medical technology on sense of security in the palliative home care setting.

    Science.gov (United States)

    Munck, Berit; Sandgren, Anna

    2017-03-02

    The increase in the use of medical devices in palliative home care requires that patients and next-of-kin feel secure. Therefore, the aim was to describe medical technology's impact on the sense of security for patients, next-of-kin and district nurses. Deductive content analysis was conducted on data from three previous studies, using the theoretical framework 'palliative home care as a secure base'. The use of medical technology was shown to have an impact on the sense of security for all involved. A sense of control was promoted by trust in staff and their competence in managing the technology, which was linked to continuity. Inner peace and being in comfort implied effective symptom relief facilitated by pain pumps and being relieved of responsibility. Health care professionals need to have practical knowledge about medical technology, but at the same time have an awareness of how to create and maintain a sense of security.

  9. Evaluating the influence of information and communications technology on food security

    Directory of Open Access Journals (Sweden)

    Ntabeni J. Jere

    2017-05-01

    Objectives: The study evaluates the influence of ICTs in improving food security in KwaZulu-Natal Province. A theoretical framework was developed as the lens through which diffusion and adoption of ICTs can be understood. The theorised model was developed using constructs from the diffusion of innovation (DOI theory, technology acceptance model (TAM and Hofstede’s cultural dimensions theory. Method: Survey data from 517 smallholder farmers from the district municipality of iLembe were collected using a questionnaire. A quantitative approach was followed, and the developed theorised model was analysed using structural equation modelling techniques. Results: This study proposes that ICT influence on food security is associated with culture, perceived usefulness and perceived ease of use. The study further finds that perceived ease of use of ICTs has the most significant effect with regard to ICT adoption and diffusion amongst smallholder farmers in iLembe district municipality. There are, however, no associations found with perceived attributes of innovation and the nature of social systems. The study consisted of a largely homogeneous social system; therefore, the researcher could not make any comparisons. Conclusion: The proposed framework for evaluating the influence of ICTs on food security put forward in this study highlights a number of issues. Firstly, there is need for further study to be conducted to understand adoption of ICTs specifically for food security. This would help in creating more accurate adoption strategies. Secondly, the study informs ICT innovation developers on the need to prioritise ease of use of ICT-based interventions when developing innovations that focus on smallholder farmers. The study also contributes to policy guidelines and suggests clear guidelines be developed to address cultural aspects such as gender imbalances.

  10. 78 FR 56263 - HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc...

    Science.gov (United States)

    2013-09-12

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc., SLM Holdings, Inc., Spring Creek Healthcare Systems... securities of Security Intelligence Technologies, Inc. because it has not filed any periodic reports since...

  11. The EM technology development strategy

    International Nuclear Information System (INIS)

    Frank, C.W.; Barainca, M.; Kubo, A.S.

    1992-01-01

    The Office of Technology Development (TD) supports research and development of technologies that will lower cost, reduce risk, improve safety, and accelerate cleanup of the Nuclear Weapons Complex and provide solutions to currently untractable environmental problems. The TD strategic plan outlines Applied Research, Development, Demonstration, Testing, and Evaluation (RDDT and E) that will provide needed technology products to be used by Environmental Restoration and Waste Management operations (i.e., our customers). The TD strategic plan is derived from EM Goals, Objectives, and Strategy and is incorporated into DOE'S Five-Year Plan for Environmental Restoration and Waste Management. The TD strategic plan is developed based on integrating customer requirements, and is complemented by a top-down, bottom-up analysis of Site Specific Technology Needs and environmental problems. The execution of TD's strategic plan is implemented largely through Integrated Programs (IP) and Integrated Demonstrations (ID). IDs have proven to be a cost-effective method of managing technology development, testing and evaluation, and implementation of successful technology systems into the DOE Environmental Restoration and Waste Management Programs. The Savannah River ID for Volatile Organic Compounds (VOCs) in Saturated Soils resulted in a 51 percent cost savings over stand-alone demonstrations, saving over $8 million. The IPs and IDs are selected based on customer needs, technical complexity, and complex-wide regulatory and compliance agreements. New technology systems are selected for incorporation into an IP or ID from offerings of the DOE laboratories, industry, and the universities. A major TD initiative was announced in August 1991, with the release of a Program Research and Development Announcement (PRDA) requesting industry and universities to propose innovative new technologies to clean up the Weapons Complex. (author)

  12. Assistive Technologies and Issues Relating to Privacy, Ethics and Security

    Science.gov (United States)

    Martin, Suzanne; Bengtsson, Johan E.; Dröes, Rose-Marie

    Emerging technologies provide the opportunity to develop innovative sustainable service models, capable of supporting adults with dementia at home. Devices range from simple stand-alone components that can generate a responsive alarm call to complex interoperable systems that even can be remotely controlled. From these complex systems the paradigm of the ubiquitous or ambient smart home has emerged, integrating technology, environmental design and traditional care provision. The service context is often complex, involving a variety of stakeholders and a range of interested agencies. Against this backdrop, as anecdotal evidence and government policies spawn further innovation it is critical that due consideration is given to the potential ethical ramifications at an individual, organisational and societal level. Well-grounded ethical thinking and proactive ethical responses to this innovation are required. Explicit policy and practice should therefore emerge which engenders confidence in existing supported living option schemes for adults with dementia and informs further innovation.

  13. Computer-Aided Sensor Development Focused on Security Issues

    Directory of Open Access Journals (Sweden)

    Andrzej Bialas

    2016-05-01

    Full Text Available The paper examines intelligent sensor and sensor system development according to the Common Criteria methodology, which is the basic security assurance methodology for IT products and systems. The paper presents how the development process can be supported by software tools, design patterns and knowledge engineering. The automation of this process brings cost-, quality-, and time-related advantages, because the most difficult and most laborious activities are software-supported and the design reusability is growing. The paper includes a short introduction to the Common Criteria methodology and its sensor-related applications. In the experimental section the computer-supported and patterns-based IT security development process is presented using the example of an intelligent methane detection sensor. This process is supported by an ontology-based tool for security modeling and analyses. The verified and justified models are transferred straight to the security target specification representing security requirements for the IT product. The novelty of the paper is to provide a patterns-based and computer-aided methodology for the sensors development with a view to achieving their IT security assurance. The paper summarizes the validation experiment focused on this methodology adapted for the sensors system development, and presents directions of future research.

  14. Computer-Aided Sensor Development Focused on Security Issues.

    Science.gov (United States)

    Bialas, Andrzej

    2016-05-26

    The paper examines intelligent sensor and sensor system development according to the Common Criteria methodology, which is the basic security assurance methodology for IT products and systems. The paper presents how the development process can be supported by software tools, design patterns and knowledge engineering. The automation of this process brings cost-, quality-, and time-related advantages, because the most difficult and most laborious activities are software-supported and the design reusability is growing. The paper includes a short introduction to the Common Criteria methodology and its sensor-related applications. In the experimental section the computer-supported and patterns-based IT security development process is presented using the example of an intelligent methane detection sensor. This process is supported by an ontology-based tool for security modeling and analyses. The verified and justified models are transferred straight to the security target specification representing security requirements for the IT product. The novelty of the paper is to provide a patterns-based and computer-aided methodology for the sensors development with a view to achieving their IT security assurance. The paper summarizes the validation experiment focused on this methodology adapted for the sensors system development, and presents directions of future research.

  15. The development of information technologies

    Directory of Open Access Journals (Sweden)

    Kostúr Karol

    2002-12-01

    Full Text Available The contribution analyses the tasks information technologies in industry. At present time is the problem of connecting mutual variously levels of management. Therefore, first priority is an integration of information technologies. The information technologies for enterprise management are analysed. The product SAP R/3 appears as suitable for top management. The SAP R/3 Enterprise has a new technology so call web-server. This server enables the integration with e-business. The development my SAP is based on application of Business information warehouse (BW and Strategic enterprise management (SEM. The cheaper products (SPIN + EVIS are characterized too. Whitness Miner is very interesting system. The contribution this technology is programming realization of method KDD – knowledge discovery in databases.

  16. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  17. Effective Electronic Security: Process for the Development and Validation from Requirements to Testing

    Science.gov (United States)

    2013-06-01

    ABBREVIATIONS ANSI American National Standards Institute ASIS American Society of Industrial Security CCTV Closed Circuit Television CONOPS...is globally recognized for the development and maintenance of standards. ASTM defines a specification as an explicit set of requirements...www.rkb.us/saver/. One of the SAVER reports titled CCTV Technology Handbook has a chapter on system design. The report uses terms like functional

  18. Food governance transformation : aligning food security with sustainable farming practices in developing communities

    NARCIS (Netherlands)

    Otsuki, K.

    2014-01-01

    Conventional approaches used to improve farming practices and access to food in developing communities are underpinned by policy, technology, and the science of modernization. The focus has been on securing a sufficient quantity of food derived from extensive monocultures. This quantity focus is

  19. Convergence of emerging science and technology trends for defense, security, and human performance

    International Nuclear Information System (INIS)

    Vaseashta, Ashok

    2010-01-01

    sciences and technologies and road-mapping, which describes the emergence and direction of performance, features, or impacts of a science and technology to appear in the future. The development of 'early warning' scanning capabilities to develop awareness and understanding of basic scientific research as well as forthcoming technology and their implications underscore a fundamental change in focus from 'entirely technology-oriented' to 'science based futures-oriented technological approach', echoing the shift in chemical and biological defense strategy from a 'needs-based' to 'capabilities-based' model. The expectation is to minimize the impact of and manage technology uncertainty through exploiting futures-oriented analytical methods, modeling and simulation, and scenario development. The ultimate goal of the IASC futures research is not to predict the future or to influence social decisions in a predictable way. Rather, our aim is visionary to expand research organizations' and scientists' awareness of future threats and opportunities for balanced, strategic S and T analyses and recommendation of revolutionary scientific breakthroughs in support of international security. (author)

  20. Emerging Trends in Development of International Information Security Regime

    Directory of Open Access Journals (Sweden)

    Elena S. Zinovieva

    2016-01-01

    Full Text Available The article discusses the key trends shaping the international regime on information security. International cooperation in this area at the global level encounters contradictions of state interest. The main actors of the information security are the United States, Russia, China and the EU countries (Britain, France and Germany. The main contradiction is developing between the US on one side and Russia and China on the other. EU countries occupy the middle position, gravitating to that of US. The article proves that international cooperation on information security will reflect the overall logic of the development of international cooperation, which is characterized by a new model of cooperation, with the participation of state and non-state actors, known as multi-stakeholder partnerships and multi-level cooperation. The logic of the formation of an international regime on information security is closest to the logic of the formation of the international non-proliferation regime. It is in the interest of Russia to support the trend towards regionalization of information security regime. Russia can form a regional information security regime in the former Soviet Union on the basis of the CSTO and SCO and potentially on a wider Eurasian space. Such regional regime would give Russia an opportunity to shape the international regime and closely monitor emerging information security issues in the former Soviet Union, and remove the potential threat of "color revolutions".

  1. Development of high-index optical coating for security holograms

    Science.gov (United States)

    Ahmed, Nadir A. G.

    2000-10-01

    Over the past few years security holograms have grown into a complex business to prevent counterfeiting of security cards, banknotes and the like. Rapid advances in holographic technology have led to a growing requirement for optical materials and coating methods to produce such holograms at reasonable costs. These materials have specific refractive indices and are used to fabricate semi- transparent holograms. The present paper describes a coating process to deposit optical coating on flexible films inside a vacuum web metallizer for the production of high quality semi-transparent holograms.

  2. Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense

    Science.gov (United States)

    Spafford, Eugene H.

    The number and sophistication of cyberattacks continues to increase, but no national policy is in place to confront them. Critical systems need to be built on secure foundations, rather than the cheapest general-purpose platform. A program that combines education in cyber security, increasing resources for law enforcement, development of reliable systems for critical applications, and expanding research support in multiple areas of security and reliability is essential to combat risks that are far beyond the nuisances of spam email and viruses, and involve widespread espionage, theft, and attacks on essential services.

  3. Titanium Aluminide Casting Technology Development

    Science.gov (United States)

    Bünck, Matthias; Stoyanov, Todor; Schievenbusch, Jan; Michels, Heiner; Gußfeld, Alexander

    2017-12-01

    Titanium aluminide alloys have been successfully introduced into civil aircraft engine technology in recent years, and a significant order volume increase is expected in the near future. Due to its beneficial buy-to-fly ratio, investment casting bears the highest potential for cost reduction of all competing production technologies for TiAl-LPTB. However, highest mechanical properties can be achieved by TiAl forging. In view of this, Access e.V. has developed technologies for the production of TiAl investment cast parts and TiAl die cast billets for forging purposes. While these parts meet the highest requirements, establishing series production and further optimizing resource and economic efficiency are present challenges. In order to meet these goals, Access has recently been certified according to aircraft standards, aiming at qualifying parts for production on technology readiness level 6. The present work gives an overview of the phases of development and certification.

  4. PREFACE: 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies

    Science.gov (United States)

    Shuja Syed, Ahmed

    2013-12-01

    The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want

  5. VLBI Technology Development at SHAO

    Science.gov (United States)

    Zhang, Xiuzhong; Shu, Fengchun; Xiang, Ying; Zhu, Renjie; Xu, Zhijun; Chen, Zhong; Zheng, Weimin; Luo, Jintao; Wu, Yajun

    2010-01-01

    VLBI technology development made significant progress at SHAO in the last few years. The development status of the Chinese DBBC, the software and FPGA-based correlators, and the new VLBI antenna, as well as VLBI applications are summarized in this paper.

  6. European innovation and technology development

    International Nuclear Information System (INIS)

    Johnson, R.W.

    1991-01-01

    The promotion of technological innovation by European national governments and the EC in pursuit of both increased recovery and the anchoring of technology in supply, manufacturing and service sector companies has been a feature of the strategic involvement by European states in exploration and production research and development. This paper summaries past trends in this activity and reviews the targets for future industry innovation which will enable European (primarily the North Sea) production to be sustained for a further generation

  7. National security through the preservation and development of cultural sphere

    Directory of Open Access Journals (Sweden)

    Malakshinova N.Sh.

    2016-10-01

    Full Text Available matters of national security in the context of the inextricable interrelationship and interdependence of national security and socio-economic development are presented in the article. The particular attention is paid to the legislative consolidation of security categories, the system of national security elements, and changes in the domestic legislation updates. Therefore, safety, a list of national interests, highlighted by long-term perspective, and questions about the means of implementation of strategic national priorities, including the named culture as a sphere of life are very important. Sphere of culture as a national priority and an important factor in the quality of life growth and harmonization of public relations, collateral dynamic socio-economic development and the preservation of a common cultural space and sovereignty of Russia are studied more detailed.

  8. Information Technology Management: Social Security Administration Practices Can Be Improved

    National Research Council Canada - National Science Library

    Shaw, Clay

    2001-01-01

    To improve SSAs IT management practices, we recommend that the Acting Commissioner of Social Security direct the Chief Information Officer and the Deputy Commissioner for Systems to complete the following actions...

  9. Development of Radiochemical Separation Technology

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Eil Hee; Kim, K. W.; Yang, H. B. (and others)

    2007-06-15

    This project of the second phase was aimed at the development of basic unit technologies for advanced partitioning, and the application tests of pre-developed partitioning technologies for separation of actinides by using a simulated multi-component radioactive waste containing Am, Np, Tc, U and so on. The goals for recovery yield of TRU, and for purity of Tc are high than 99% and about 99%, respectively. The work scopes and contents were as follows. 1). For the development of basic unit technologies for advanced partitioning. 1. Development of technologies for co-removal of TRU and for mutual separation of U and TRU with a reduction-complexation reaction. 2. Development of extraction system for high-acidity co-separation of An(+3) and Ln(+3) and its radiolytic evaluation. 3. Synthesis of extractants for the selective separation of An(+3) and its relevant extraction system development. 4. Development of a hybrid system for the recovery of noble metals and its continuous separation tests. 5. Development of electrolytic system for the decompositions of N-NO3 and N-NH3 compounds to nitrogen gas. 2). For the application test of pre-developed partitioning technologies for the separation of actinide elements in a simulated multi-component solution equivalent to HLW level. 1. Co-separation of Tc, Np and U by a (TBP-TOA)/NDD system. 2. Mutual-separation of Am, Cm and RE elements by a (Zr-DEHPA)/NDD system. All results will be used as the fundamental data for the development of advanced partitioning process in the future.

  10. Security and Stability in Africa: A Development Approach

    Science.gov (United States)

    2010-01-01

    Dar el Salaam in 1998, and against Israeli interests in Kenya in 2002. Wars, lawlessness, and corruption have also fostered international crime on...operations are an important way for military forces to foster stability and security through economic and political development. These operations show...security and exports of unwisely breaking up large commercial farms. Within families, such dualism also exists, which is a legacy of colonial policies

  11. Technology safeguards needed as security rule audits loom.

    Science.gov (United States)

    Gersh, Deborah; Hoey, Laura G; McCrystal, Timothy M; Tolley, David C

    2012-05-01

    The Department of Health and Human Services will conduct security rule audits that will involve on-site visits and include: Compliance-focused interviews with key organizational leaders. Scrutiny of physical operations controls, especially regarding storage, maintenance, and use of protected health information. Assessment of organizational policies and procedures to ensure compliance with privacy and security rules. Identification of regulatory compliance areas of concern.

  12. Research on mobile electronic commerce security technology based on WPKI

    Science.gov (United States)

    Zhang, Bo

    2013-07-01

    Through the in-depth study on the existing mobile e-commerce and WAP protocols, this paper presents a security solution of e-commerce system based on WPKI, and describes its implementation process and specific implementation details. This solution uniformly distributes the key used by the various participating entities , to fully ensure the confidentiality, authentication, fairness and integrity of mobile e-commerce payments, therefore has some pract ical value for improving the security of e-commerce system.

  13. Science and Technology vs. Defense and Security: Dual Use Consequences, a South American Perspective

    International Nuclear Information System (INIS)

    Espona, M. J.

    2007-01-01

    Nowadays we can say that science and technology are development driven forces in most countries, with some exceptions especially in the Southern Hemisphere. Even though, we have to take into account their link to and impact on defense and security and not only when it comes to WMD but also in the economy and academy areas, both in developed and developing countries. Within this framework, when we analyze the spread of technology and knowledge, it is important to consider: the media where it takes place (e.g. journals, internet, conferences, commercial agreements); which the actors involved are (e.g. scientists, governmental agencies, commercial firms); and the motive why it occurs (e.g. scientific discoveries; commercial exchange; international agreements). Once known all these elements, which vary both intracountry and intercountry, we may have a deep and broad enough framework to consider which policies to take in order to foster scientific and technologic development without collaborating with state and non state WMD programs. Although we already have a legal framework to fight against WMD proliferation and terrorism, the diverse degree of success of such instruments makes it necessary to continue analyzing and debating ways to strengthen them and/or find new ones. Therefore, in this paper we will analyze how the phenomena of science and technology development and spread impacts on defense and security from a South American perspective, taking into account the particular differences among developed and developing countries. Among the primary findings we can mention the existing differences between countries when it comes to the place (military, academic or commercial ones) where the critical science and technology innovative developments take place; the origin of funding (private or governmental); the existence and fulfillment of plans to foster science and technology development; and the scientific community awareness in WMD topics. All these elements have a

  14. Software for security event management: Development and utilization

    Directory of Open Access Journals (Sweden)

    Aleksandr V. Kuznetcov

    2017-11-01

    Full Text Available We address the challenge to the information security coming from the lack of algorithmic machinery for managing the security events. We start with a mathematical formulation of the problem for a tabular processor by introducing an appropriate target function. Details of corresponding algorithm can be found by following the provided links. We describe our original software module that implements the algorithm for determining the registered security events. The module is based on the tabular processor certified by the Russian Federal Service for Technical and Export Control. We present a control sample for testing the developed module. The sample has the dimension 30x20 and contains 14 choices for threshold values of security events number. The results of the tests comply with the specified boundary conditions and demonstrate a nonlinear dependence of the objective function on the number of registered security events, as well as a nonlinear dependence of the percentage of the detected security event on the total initial number of security events to be registered at the event source. The performance of the module specifically, the central processing unit usage is found acceptable (not exceeding 33%, which allows one to use the software for typical automated workplaces equipped with appropriate tabular processors. Our approach is universal with respect to the application areas.

  15. 78 FR 41954 - TA-W-82,634, Prudential Global Business Technology Solutions Central Security Services Dresher...

    Science.gov (United States)

    2013-07-12

    ... Business Technology Solutions Central Security Services Iselin, New Jersey; TA-W-82,634B, Prudential Global Business Technology Solutions Central Security Services Plymouth, Minnesota; TA- W-82,634C, Prudential Global Business Technology Solutions Central Security Services Scottsdale, Arizona; TA-W-82,634D...

  16. Integrating Product and Technology Development

    DEFF Research Database (Denmark)

    Meijer, Ellen Brilhuis; Pigosso, Daniela Cristina Antelmi; McAloone, Tim C.

    2016-01-01

    .g. managing dependencies) and opportunities (e.g. streamlining development). This paper presents five existing reference models for technology development (TD), which were identified via a systematic literature review, where their possible integration with product development (PD) reference models......Although dual innovation projects, defined in this article as the concurrent development of products and technologies, often occur in industry, these are only scarcely supported methodologically. Limited research has been done about dual innovation projects and their inherent challenges (e...... was investigated. Based on the specific characteristics desired for dual innovation projects, such as integrated product development and coverage of multiple development stages, a set of selection criteria was employed to select suitable PD and TD reference models. The integration and adaptation of the selected...

  17. Pyroprocessing technology development at KAERI

    International Nuclear Information System (INIS)

    Lee, Han Soo; Park, Geun Il; Kang, Kweon Ho; Hur, Jin Mok; Kim, Jeong Guk; Ahn, Do Hee; Cho, Yung Zun; Kim, Eung Ho

    2011-01-01

    Pyroprocessing technology was developed in the beginning for metal fuel treatment in the US in the 1960s. The conventional aqueous process, such as PUREX, is not appropriate for treating metal fuel. Pyroprocessing technology has advantages over the aqueous process: less proliferation risk, treatment of spent fuel with relatively high heat and radioactivity, compact equipment, etc. The addition of an oxide reduction process to the pyroprocessing metal fuel treatment enables handling of oxide spent fuel, which draws a potential option for the management of spent fuel from the PWR. In this context, KAERI has been developing pyroprocessing technology to handle the oxide spent fuel since the 1990s. This paper describes the current status of pyroprocessing technology development at KAERI from the head-end process to the waste treatment. A unit process with various scales has been tested to produce the design data associated with the scale up. A performance test of unit processes integration will be conducted at the PRIDE facility, which will be constructed by early 2012. The PRIDE facility incorporates the unit processes all together in a cell with an Ar environment. The purpose of PRIDE is to test the processes for unit process performance, operability by remote equipment, the integrity of the unit processes, process monitoring, Ar environment system operation, and safeguards related activities. The test of PRIDE will be promising for further pyroprocessing technology development

  18. Advanced Mirror & Modelling Technology Development

    Science.gov (United States)

    Effinger, Michael; Stahl, H. Philip; Abplanalp, Laura; Maffett, Steven; Egerman, Robert; Eng, Ron; Arnold, William; Mosier, Gary; Blaurock, Carl

    2014-01-01

    The 2020 Decadal technology survey is starting in 2018. Technology on the shelf at that time will help guide selection to future low risk and low cost missions. The Advanced Mirror Technology Development (AMTD) team has identified development priorities based on science goals and engineering requirements for Ultraviolet Optical near-Infrared (UVOIR) missions in order to contribute to the selection process. One key development identified was lightweight mirror fabrication and testing. A monolithic, stacked, deep core mirror was fused and replicated twice to achieve the desired radius of curvature. It was subsequently successfully polished and tested. A recently awarded second phase to the AMTD project will develop larger mirrors to demonstrate the lateral scaling of the deep core mirror technology. Another key development was rapid modeling for the mirror. One model focused on generating optical and structural model results in minutes instead of months. Many variables could be accounted for regarding the core, face plate and back structure details. A portion of a spacecraft model was also developed. The spacecraft model incorporated direct integration to transform optical path difference to Point Spread Function (PSF) and between PSF to modulation transfer function. The second phase to the project will take the results of the rapid mirror modeler and integrate them into the rapid spacecraft modeler.

  19. 78 FR 45255 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-07-26

    ..., cyber-security, knowledge management and how best to leverage related technologies funded by other... INFORMATION CONTACT: Mary Hanson, HSSTAC Executive Director, Science and Technology Directorate, Department of... Technology Advisory Committee (HSSTAC) ACTION: Notice of Federal Advisory Committee charter renewal. SUMMARY...

  20. 48 CFR 1252.239-70 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology resources. 1252.239-70 Section 1252.239-70 Federal Acquisition Regulations... of Provisions and Clauses 1252.239-70 Security requirements for unclassified information technology... Unclassified Information Technology Resources (APR 2005) (a) The Contractor shall be responsible for...

  1. 48 CFR 3052.204-70 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology resources. 3052.204-70 Section 3052.204-70 Federal Acquisition Regulations... for unclassified information technology resources. As prescribed in (HSAR) 48 CFR 3004.470-3, insert a clause substantially the same as follows: Security Requirements for Unclassified Information Technology...

  2. An Evaluation Methodology for the Usability and Security of Cloud-based File Sharing Technologies

    Science.gov (United States)

    2012-09-01

    FISMA, ISO 27001 , FIPS 140-2, and ISO 270001) indicate a cloud-based service’s compliance with industry standard security controls, management and...Information Assurance IEEE Institute of Electrical and Electronics Engineers IT Information Technology ITS Insider Threat Study ISO International...effectively, efficiently and with satisfaction” (International Organization for Standardization [ ISO ], 1998). Alternately, information security

  3. Social security in developing countries : operation and dynamics of social security mechanisms in rural Swaziland

    NARCIS (Netherlands)

    Leliveld, A.H.M.

    1994-01-01

    This study, which is based on field research carried out in Swaziland from October 1989 to December 1990, starts with an introductory chapter followed by three theoretical chapters on social security in developing countries. The content of these chapters is illustrated with an extensive case study

  4. Technology scale and supply chains in a secure, affordable and low carbon energy transition

    International Nuclear Information System (INIS)

    Hoggett, Richard

    2014-01-01

    Highlights: • Energy systems need to decarbonise, provide security and remain affordable. • There is uncertainty over which technologies will best enable this to happen. • A strategy to deal with uncertainty is to assess a technologies ability to show resilience, flexibility and adaptability. • Scale is important and smaller scale technologies are like to display the above characteristics. • Smaller scale technologies are therefore more likely to enable a sustainable, secure, and affordable energy transition. - Abstract: This research explores the relationship between technology scale, energy security and decarbonisation within the UK energy system. There is considerable uncertainty about how best to deliver on these goals for energy policy, but a focus on supply chains and their resilience can provide useful insights into the problems uncertainty causes. Technology scale is central to this, and through an analysis of the supply chains of nuclear power and solar photovoltaics, it is suggested that smaller scale technologies are more likely to support and enable a secure, low carbon energy transition. This is because their supply chains are less complex, show more flexibility and adaptability, and can quickly respond to changes within an energy system, and as such they are more resilient than large scale technologies. These characteristics are likely to become increasingly important in a rapidly changing energy system, and prioritising those technologies that demonstrate resilience, flexibility and adaptability will better enable a transition that is rapid, sustainable, secure and affordable

  5. Professional Development Award: Agriculture and Food Security ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2017-08-28

    Aug 28, 2017 ... Development of communication products. ... to the program's website, knowledge management platform, and social media. ... 8-10 words);; A description of the purpose of the research;; Methodology;; Ethical considerations.

  6. Securing a better future for all: Nuclear techniques for global development and environmental protection. NA factsheet on radioisotope production and radiation technology contributing to better health care and a cleaner environment

    International Nuclear Information System (INIS)

    2012-01-01

    Radioisotope and radiation technology finds numerous applications in a wide variety of fields, most importantly in medicine, industry, agriculture and the environment. However, in order to take full advantage of the benefits offered by this technology, it is essential to provide the necessary infrastructure as well as qualified personnel. The IAEA strives to promote worldwide availability of products and facilities in order to offer the benefits of radioisotope products and radiation technology to developing countries. In particular, the IAEA helps Member States to achieve self-sufficiency in the production of radioisotopes and radiopharmaceuticals, strengthen quality assurance practices and regulatory compliance as well as facilitate human resources development. The multipronged need based approach includes providing advice, assistance and capacity building support for: Development, production and quality assurance of reactor and accelerator based medical isotopes and radiopharmaceuticals for both the diagnosis and treatment of diseases, especially cancer; Establishment of irradiation facilities and utilization of gamma radiation, electron beam and X ray technology for varied applications, including tackling pollutants, wastewater treatment, sterilization of medical products, disinfestation of food grains, and synthesis and characterization of advanced materials; Application of radiation and isotopes in industrial process management.

  7. Technology and Motor Ability Development

    Science.gov (United States)

    Wang, Lin; Lang, Yong; Luo, Zhongmin

    2014-01-01

    As a new member joining the technology family, active video games have been developed to promote physical exercise. This working-in-progress paper shares an ongoing project on examining the basic motor abilities that are enhanced through participating in commercially available active video games. [For the full proceedings see ED557181.

  8. Development of radioisotope tracer technology

    International Nuclear Information System (INIS)

    Jin, Joon Ha; Lee, Myun Joo; Jung, Sung Hee; Park, Soon Chul; Lim, Dong Soon; Kim, Jae Ho; Lee, Jae Choon; Lee, Doo Sung; Cho, Yong Suk; Shin, Sung Kuan

    2000-04-01

    The purpose of this study is to develop the radioisotope tracer technology, which can be used in solving industrial and environmental problems and to build a strong tracer group to support the local industries. In relation to the tracer technology in 1999, experiments to estimate the efficiencies of a sludge digester of a waste water treatment plant and a submerged biological reactor of a dye industry were conducted. As a result, the tracer technology for optimization of facilities related to wastewater treatment has been developed and is believed to contribute to improve their operation efficiency. The quantification of the experimental result was attempted to improve the confidence of tracer technology by ECRIN program which basically uses the MCNP simulation principle. Using thin layer activation technique, wear of tappet shim was estimated. Thin layer surface of a tappet shim was irradiated by proton beam and the correlation between the measured activity loss and the amount of wear was established. The equipment was developed to adjust the energy of proton which collides with the surface of tappet. The tracer project team has participated into the tracer test for estimating the efficiency of RFCC system in SK cooperation. From the experiment the tracer team has obtained the primary elements to be considered for judging the efficiency of RFCC unit. By developing the tracer techniques to test huge industrial units like RFCC, the tracer team will be able to support the local industries that require technical services to solve any urgent trouble. (author)

  9. competitive technologies for sustainable development

    International Nuclear Information System (INIS)

    Chriqui, Vincent; Bergougnoux, Jean; Hossie, Gaelle; Beeker, Etienne; Buba, Johanne; Delanoe, Julien; Ducos, Geraldine; Hilt, Etienne; Rigard-Cerison, Aude; Teillant, Aude; Auverlot, Dominique; Martinez, Elise; Dambrine, Fabrice; Roure, Francoise

    2012-08-01

    By letter dated 27 April 2011, the Director General of the Centre for Strategic Analysis, Vincent Chriqui, confided to Jean Bergougnoux, honorary president of the SNCF, Honorary General Director of EDF, the task of animating a reflection Prospective Technological Studies of the sectors of energy, transport and construction. This synthesis report, prepared with the assistance of rapporteurs Centre for Strategic Analysis, attempts to summarize and put into perspective all the work which show these specific reports. Admittedly some very complex issues still need supplements. It may therefore be useful to extend this work in a number of areas. Beyond its role in the competitiveness of a country, technological innovation is essential to provide appropriate responses to the challenges of our commitment to sustainable development in terms of economic growth, preservation of the environmental and social progress. Mission for Prospective Technological conducted by the Centre for Strategic Analysis has sought to clarify this dual problem by proposing a long-term vision for the energy, transport and construction. For each technology studied, it has attempted to assess both the possible contribution to sustainable development and the competitive potential of our country on the international scene. His work, chaired by Jean Bergougnoux have reviewed the technological advances that may occur in the coming decades in the sectors concerned. They examined the conditions for integration of these advances in systems and subsystems existing (or create) and the conditions of a mature technical, economic but also social. Wherever possible, two time horizons were identified: a medium-term horizon, 2030, for which we have a fairly clear vision of future developments and long-term horizon, 2050, which allows to consider jumps Scientists are still uncertain. Finally, the mission is interested in four transverse technologies involved consistently in the three study areas, which are likely to

  10. Decommissioning technology development for research reactors

    International Nuclear Information System (INIS)

    Lee, K. W.; Kim, S. K.; Kim, Y. K.

    2004-03-01

    Although it is expected that the decommissioning of a nuclear power plant will happen since 2020, the need of partial decommissioning and decontamination for periodic inspection and life extension has been on an increasing trend and domestic market has gradually been extended. Therefore, in this project the decommissioning DB system on the KRR-1 and 2 was developed as establishing the information classification system of the research reactor dismantling and the structural design and optimization of the decommissioning DB system. Also in order to secure the reliability and safety about the dismantling process, the main dismantling simulation technology that can verify the dismantling process before their real dismantling work was developed. And also the underwater cutting equipment was developed to remove these stainless steel parts highly activated from the RSR. First, the its key technologies were developed and then the design, making, and capability analysis were performed. Finally the actual proof was achieved for applying the dismantling site. an automatic surface contamination measuring equipment was developed in order to get the sample automatically and measure the radiation/radioactivity

  11. Energy Security and Renewable Energy in Least Developed Countries

    International Nuclear Information System (INIS)

    Wohlgemuth, N.

    2006-01-01

    The Programme of Action for the Least Developed Countries (UN, 2001) states: The levels of production and consumption of energy in the majority of Least Developed Countries (LDCs) are inadequate and unstable. This clearly indicates a situation of energy insecurity. Starting from an encompassing definition of energy security (a country's ability to expand and optimise its energy resource portfolio and achieve a level of services that will sustain economic growth and poverty reduction), it becomes quickly clear that energy security in LDCs is a complex topic with numerous interlinkages to other sustainable development objectives. This paper attempts to give an overview of issues related to energy security in LDCs by focusing on the role renewable energy can play in that context.(author)

  12. An assessment of the effectiveness of fuel cycle technologies for the national energy security enhancement in the electricity sector

    International Nuclear Information System (INIS)

    Kim, Hyun Jun; Jun, Eunju; Chang, Soon Heung; Kim, Won Joon

    2009-01-01

    Energy security, in the 21st century, draws significant attention in most countries worldwide, because the national security and sustainable development depend largely on energy security. The anticipated fossil energy depletion and the instability of their supply drive many countries to consider nuclear energy as their alternative energy source for the enhancement of their national energy security. In this study, indicators measuring the level of energy security in the electric power sector are developed and applied for the assessment of the effectiveness of four electric power system schemes which deploy different nuclear fuel cycle technologies, with consideration for the diversification of the energy markets and the vulnerability to economic disruption. Results show that the contribution of the closed fuel cycle scheme is larger than the once-through fuel cycle scheme in the perspective of energy security. In addition, the completely closed fuel cycle with the spent fuel recycling enhances the national energy security to the maximum extent compared to all other fuel cycle schemes. Since a completely closed fuel cycle is hardly affected by the uranium price changes, this scheme is found to be the most favorable scheme, ensuring the stable profit of utilities and stabilizing the electricity tariff. In addition, the completely closed fuel cycle scheme provides the best enhancement of national energy security with respect to energy supply, under reasonable price conditions. The indicators developed in this study can be utilized as a useful instrument for the measurement of the level of the energy security, especially by the countries importing energy resources for the generation of electric power.

  13. Development of fluid and I and C systems design technology

    International Nuclear Information System (INIS)

    Sim, Yoon Sub; Park, C. K.; Kim, S. O.

    2000-05-01

    LMR is the reactor type that makes utilization of uranium resource very efficiently and the necessity of construction of a LMR in 2020's has been raised. However, the design technology required for construction has not been secured domestically. To fulfill the necessity, study has been made for the LMR system design technology and conceptual design of KALIMER systems for fluid, instrumentation, control, and protection have been developed. Also the computer code systems for the design and analysis of the KALIMER fluid systems have been developed. These study results are to used as the starting point of the next phase LMR design technology development research

  14. Development of fluid and I and C systems design technology

    Energy Technology Data Exchange (ETDEWEB)

    Sim, Yoon Sub; Park, C. K.; Kim, S. O. [and others

    2000-05-01

    LMR is the reactor type that makes utilization of uranium resource very efficiently and the necessity of construction of a LMR in 2020's has been raised. However, the design technology required for construction has not been secured domestically. To fulfill the necessity, study has been made for the LMR system design technology and conceptual design of KALIMER systems for fluid, instrumentation, control, and protection have been developed. Also the computer code systems for the design and analysis of the KALIMER fluid systems have been developed. These study results are to used as the starting point of the next phase LMR design technology development research.

  15. Development of fluid and I and C systems design technology

    Energy Technology Data Exchange (ETDEWEB)

    Sim, Yoon Sub; Park, C K; Kim, S O [and others

    2000-05-01

    LMR is the reactor type that makes utilization of uranium resource very efficiently and the necessity of construction of a LMR in 2020's has been raised. However, the design technology required for construction has not been secured domestically. To fulfill the necessity, study has been made for the LMR system design technology and conceptual design of KALIMER systems for fluid, instrumentation, control, and protection have been developed. Also the computer code systems for the design and analysis of the KALIMER fluid systems have been developed. These study results are to used as the starting point of the next phase LMR design technology development research.

  16. A Practice of Secure Development and Operational Environment Plan

    International Nuclear Information System (INIS)

    Park, Jaekwan; Seo, Sangmun; Suh, Yongsukl; Park, Cheol

    2017-01-01

    This paper suggests a practice of plan for SDOE establishment in a nuclear I and C. First, it is necessary to perform a requirements analysis to define key regulatory issues and determine the target systems. The analysis includes a survey to find out the applicable measures credited internationally. Based on the analysis results, this paper proposes an implementation plan including a process harmonizing security activities with legacy software activities and applicable technical, operational, and management measures for target systems. Recently, nuclear I and C has been faced with two security issues, cyber security (CS) and secure development and operational environment (SDOE). Unlike cyber security, few studies on planning SDOE have been presented. This paper suggests a plan for establishing an SDOE in a nuclear I and C. This paper defines three key considerations to comply with the regulatory position of RG. 1.152(R3) and proposes a process harmonizing the security activities with legacy software activities. In addition, this paper proposes technical, operational, and management measures applicable for SDOE.

  17. Measuring Global Water Security Towards Sustainable Development Goals

    Science.gov (United States)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience 'low water security' over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated-physical and socio-economic-approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  18. Developing fossil fuel based technologies

    International Nuclear Information System (INIS)

    Manzoori, A.R.; Lindner, E.R.

    1991-01-01

    Some of the undesirable effects of burning fossil fuels in the conventional power generating systems have resulted in increasing demand for alternative technologies for power generation. This paper describes a number of new technologies and their potential to reduce the level of atmospheric emissions associated with coal based power generation, such as atmospheric and pressurized fluid bed combustion systems and fuel cells. The status of their development is given and their efficiency is compared with that of conventional pc fired power plants. 1 tab., 7 figs

  19. Audit and Evaluation of Computer Security. Computer Science and Technology.

    Science.gov (United States)

    Ruthberg, Zella G.

    This is a collection of consensus reports, each produced at a session of an invitational workshop sponsored by the National Bureau of Standards. The purpose of the workshop was to explore the state-of-the-art and define appropriate subjects for future research in the audit and evaluation of computer security. Leading experts in the audit and…

  20. Genetic technology and agricultural development.

    Science.gov (United States)

    Staub, W J; Blase, M G

    1971-07-09

    The genetic technologies being adopted in South Asia are significant factors in the agricultural development of the area. But, labeling them " miracle seeds," solely responsible for recent agricultural growth, is misleading. Certainly the introduction of new genetic technology has catalyzed South Asian agriculture and has instilled a new dynamism essential to economic development. Somewhat similar phenomena have, however, been observed in other parts of the world in other periods of history. The nature of these genetic technologies, how they are being applied, and their limits and potential have been explored above. Also, the effects of these varieties on the generation of employment, and the distribution of benefits accruing from them have been examined in preliminary fashion. Stemming from the preceding discussion, two areas of priority appear obvious. First, the close association of genetic technologies with irrigation suggests that irrigation should receive more attention than it has in the past. Large-scale public irrigation schemes are expensive and have tended to yield low rates of return. However, there appears to be room for marginal increases in, or improvements of, existing irrigation facilities. Second, even with a rapid spread of the practices associated with highyeild varieties, it may be too much to expect the farm sector to absorb the expected increases in the rural labor force. The generation of employment is a major problem in India as well as in most other developing countries. Hence, possibilities for expanding rural, nonfarm employment and controlling population growth should be sought vigorously.

  1. Technology development life cycle processes.

    Energy Technology Data Exchange (ETDEWEB)

    Beck, David Franklin

    2013-05-01

    This report and set of appendices are a collection of memoranda originally drafted in 2009 for the purpose of providing motivation and the necessary background material to support the definition and integration of engineering and management processes related to technology development. At the time there was interest and support to move from Capability Maturity Model Integration (CMMI) Level One (ad hoc processes) to Level Three. As presented herein, the material begins with a survey of open literature perspectives on technology development life cycles, including published data on %E2%80%9Cwhat went wrong.%E2%80%9D The main thrust of the material presents a rational expose%CC%81 of a structured technology development life cycle that uses the scientific method as a framework, with further rigor added from adapting relevant portions of the systems engineering process. The material concludes with a discussion on the use of multiple measures to assess technology maturity, including consideration of the viewpoint of potential users.

  2. Nevada Natonal Security Site-Directed Research and Development FY 2010 Annual Report

    International Nuclear Information System (INIS)

    Bender, Howard

    2011-01-01

    This annual report of the Site-Directed Research and Development (SDRD) program represents the highly significant R and D accomplishments conducted during fiscal year 2010. This year was noteworthy historically, as the Nevada Test Site was renamed to the Nevada National Security Site (NNSS). This change not only recognizes how the site's mission has evolved, but also heralds a future of new challenges and opportunities for the NNSS. In many ways, since its inception in 2002, the SDRD program has helped shape that evolving mission. As we approach 2012, SDRD will also mark a milestone, having completed its first full decade of innovative R and D in support of the site and national security. The program continues to fund advanced science and technology development across traditional Department of Energy (DOE) nuclear security areas such as stockpile stewardship and non-proliferation while also supporting Department of Homeland Security (DHS) needs, and specialized work for government agencies like the Department of Defense (DoD) and others. The NNSS will also contribute technologies in the areas of treaty verification and monitoring, two areas of increasing importance to national security. Keyed to the NNSS's broadened scope, the SDRD program will continue to anticipate and advance R and D projects that will help the NNSS meet forthcoming challenges.

  3. Development of human resource capacity building assistance for nuclear security

    International Nuclear Information System (INIS)

    Nakamura, Yo; Noro, Naoko

    2014-01-01

    The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency (JAEA) has been providing nuclear security human resource development projects targeting at nuclear emerging countries in Asia in cooperation with the authorities concerned including the Sandia National Laboratory (SNL) and the International Atomic Energy Agency (IAEA). In the aftermath of the attacks of Sept. 11, the threat of terrorism was internationally recognized and thus the human resource capacity building is underway as an urgent task. In order to responding to emerging threats, the human resource capacity building that ISCN has implemented thus far needs to be multilaterally analyzed in order to develop more effective training programs. This paper studies ISCN's future direction by analyzing its achievements, as well as introduces the collaborative relationships with SNL that contributes to the reflection and maintenance of international trends for the contents of nuclear security training, the nuclear security enhancement support with which Japan is to provide nuclear emerging countries in Asia, and the achievements of the nuclear security training program that ISCN implemented. (author)

  4. NNSA Laboratory Directed Research and Development Program 2008 Symposium--Focus on Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Kotta, P R; Sketchley, J A

    2008-08-20

    The Laboratory Directed Research and Development (LDRD) Program was authorized by Congress in 1991 to fund leading-edge research and development central to the national laboratories core missions. LDRD anticipates and engages in projects on the forefront of science and engineering at the Department of Energy (DOE) national laboratories, and has a long history of addressing pressing national security needs at the National Nuclear Security Administration (NNSA) laboratories. LDRD has been a scientific success story, where projects continue to win national recognition for excellence through prestigious awards, papers published and cited in peer-reviewed journals, mainstream media coverage, and patents granted. The LDRD Program is also a powerful means to attract and retain top researchers from around the world, to foster collaborations with other prominent scientific and technological institutions, and to leverage some of the world's most technologically advanced assets. This enables the LDRD Program to invest in high-risk and potentially high-payoff research that creates innovative technical solutions for some of our nation's most difficult challenges. Worldwide energy demand is growing at an alarming rate, as developing nations continue to expand their industrial and economic base on the back of limited global resources. The resulting international conflicts and environmental consequences pose serious challenges not only to this nation, but to the international community as well. The NNSA and its national security laboratories have been increasingly called upon to devote their scientific and technological capabilities to help address issues that are not limited solely to the historic nuclear weapons core mission, but are more expansive and encompass a spectrum of national security missions, including energy security. This year's symposium highlights some of the exciting areas of research in alternative fuels and technology, nuclear power, carbon

  5. Development and Evaluation of Secure Socket Layer Visualization Tool with Packet Capturing Function

    Directory of Open Access Journals (Sweden)

    Arai Masayuki

    2015-01-01

    Full Text Available Secure Socket Layer (SSL has become a fundamental technology that secures browser-processed personal details sent to the server. As a result, communication and computer engineers are advised to learn the protocol. However, understanding SSL is very difficult because of its intricate communication procedure. To solve this problem, we developed a visualization tool for understanding SSL. This paper describes the design, implementation methods, and evaluation of the tool. The evaluation results show that the visualization tool is effective for learning SSL.

  6. Microcontroller Based Home Security and Load Controlling Using Gsm Technology

    OpenAIRE

    Mustafijur Rahman; A.H.M Zadidul Karim; Sultanur Nyeem; Faisal Khan; Golam Matin

    2015-01-01

    "Home automation" referred to as 'Intelligent home' or 'automated home', indicates the automation of daily tasks with electrical devices used in homes. This could be the control of lights or more complex chores such as remote viewing of the house interiors for surveillance purposes. The emerging concept of smart homes offers a comfortable, convenient and safe and secure environment for occupants. These include automatic load controlling, fire detection, temperature sensing, and motion detecti...

  7. Using automatic identification system technology to improve maritime border security

    OpenAIRE

    Lindstrom, Tedric R.

    2014-01-01

    Approved for public release; distribution is unlimited Our coastal waters are the United States’ most open and vulnerable borders. This vast maritime domain harbors critical threats from terrorism, criminal activities, and natural disasters. Maritime borders pose significant security challenges, as nefarious entities have used small boats to conduct illegal activities for years, and they continue to do so today. Illegal drugs, money, weapons, and migrants flow both directions across our ma...

  8. Science and technology, development factors

    International Nuclear Information System (INIS)

    Nascimento, J.O.

    1982-01-01

    Attention is drawn to the present effort in science, technology, research and development in the countries of the northern hemisphere. In the ligh to the data collected, some predictions are made about advances, especially in the metallugical field. The corresponding activities in Brazil are examined, both the more important official and state-controlled ones and those of private companies. Finally, a detailed presentation is given of what has been achieved in the specific case of niobium, whose prospects are examined. (Author) [pt

  9. Development of integrated accident management assessment technology

    International Nuclear Information System (INIS)

    Jung, Won Dea; Ha, Jae Joo; Jin, Young Ho

    2002-04-01

    This project aims to develop critical technologies for accident management through securing evaluation frameworks and supporting tools, in order to enhance capabilities coping with severe accidents. For the research goal, firstly under the viewpoint of accident prevention, on-line risk monitoring system and the analysis framework for human error have been developed. Secondly, the training/supporting systems including the training simulator and the off-site risk evaluation system have been developed to enhance capabilities coping with severe accidents. Four kinds of research results have been obtained from this project. Firstly, the framework and taxonomy for human error analysis has been developed for accident management. As the second, the supporting system for accident managements has been developed. Using data that are obtained through the evaluation of off-site risk for Younggwang site, the risk database as well as the methodology for optimizing emergency responses has been constructed. As the third, a training support system, SAMAT, has been developed, which can be used as a training simulator for severe accident management. Finally, on-line risk monitoring system, DynaRM, has been developed for Ulchin 3 and 4 unit

  10. Mutations technology in the service of food security

    International Nuclear Information System (INIS)

    Sobeih, S.A.S.

    2013-01-01

    Nuclear techniques of various physical mutagens such as, X-rays, Gamma rays, Beta partials, Neutrons, Lasers, Electron beams, Ion beams irradiation and some chemical mutagens had significantly contributed in developing superior crop varieties of seeds and vegetatively propagated crops. Those released mutant cultivars in different groups had great economic impact on agriculture and food production and added billions of dollars in the economy of many countries. More than 3200 crops varieties of different crops have been officially released by mutation breeding technique. Almost half (48%) of all mutant crop varieties is recorded in cereals. Rice is the crop with the highest number of mutants and accounts for (53%) of the mutant cereals under cultivations followed by barley which makes up (20%) of all cereals mutant varieties globally. More than half (60%) of the mutants crop varieties have been released in Asia. China alone accounts for more than(25%) of all mutant varieties that have been officially released globally. Nuclear technology is an important way to reduce the gap of food between consumption and climate change and on the other hand to increase production. (author)

  11. Protection of minority interest and the development of security markets

    NARCIS (Netherlands)

    Modigliani, F.; Perotti, E.C.

    1997-01-01

    While excessive regulation is an obstacle to the development of financial markets, we argue that lack of basic rules or poorly enforced regulation may explain the relative importance across countries of banking and security markets in financing firms. A selective or arbitrary enforcement transforms

  12. Measuring global water security towards sustainable development goals

    NARCIS (Netherlands)

    Wada, Y.|info:eu-repo/dai/nl/341387819; Gain, A.K.; Giupponi, C.

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals(SDGs). Many international river basins are likely to experience ‘low water

  13. Peace, Human Security and Sustainable Development in Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Peace, Human Security and Sustainable Development in Africa ... into a sustainable livelihood for some of the poorest communities in Africa. ... Project status ... IDRC congratulates first cohort of Women in Climate Change Science Fellows ... titled “Climate change and adaptive water management: Innovative solutions from ...

  14. Development of undergraduate nuclear security curriculum at College of Engineering, Universiti Tenaga Nasional

    Science.gov (United States)

    Hamid, Nasri A.; Mujaini, Madihah; Mohamed, Abdul Aziz

    2017-01-01

    The Center for Nuclear Energy (CNE), College of Engineering, Universiti Tenaga Nasional (UNITEN) has a great responsibility to undertake educational activities that promote developing human capital in the area of nuclear engineering and technology. Developing human capital in nuclear through education programs is necessary to support the implementation of nuclear power projects in Malaysia in the near future. In addition, the educational program must also meet the nuclear power industry needs and requirements. In developing a certain curriculum, the contents must comply with the university's Outcomes Based Education (OBE) philosophy. One of the important courses in the nuclear curriculum is in the area of nuclear security. Basically the nuclear security course covers the current issues of law, politics, military strategy, and technology with regard to weapons of mass destruction and related topics in international security, and review legal regulations and political relationship that determine the state of nuclear security at the moment. In addition, the course looks into all aspects of the nuclear safeguards, builds basic knowledge and understanding of nuclear non-proliferation, nuclear forensics and nuclear safeguards in general. The course also discusses tools used to combat nuclear proliferation such as treaties, institutions, multilateral arrangements and technology controls. In this paper, we elaborate the development of undergraduate nuclear security course at the College of Engineering, Universiti Tenaga Nasional. Since the course is categorized as mechanical engineering subject, it must be developed in tandem with the program educational objectives (PEO) of the Bachelor of Mechanical Engineering program. The course outcomes (CO) and transferrable skills are also identified. Furthermore, in aligning the CO with program outcomes (PO), the PO elements need to be emphasized through the CO-PO mapping. As such, all assessments and distribution of Bloom Taxonomy

  15. Development of National Technology Audit Policy

    Directory of Open Access Journals (Sweden)

    Subiyanto Subiyanto

    2017-07-01

    Full Text Available The Laws have mandated implementation of technology audit, nevertheless such implementation needs an additional policy that is more technical. The concept of national audit technology policy shall make technology audit as a tool to ensure the benefit of technology application for society and technology advance for nation independency. This article discusses on technology audit policy concept especially infrastructure requirement, with emphasis on regulation, implementation tools, and related institution. The development of technology audit policy for national interest requires provision of mandatory audit implementation, accompanied by tools for developing technology auditor’s competence and technology audit institutional’s mechanism. To guide technology auditor’s competence, concept of national audit technology policy shall classify object of technology audit into product technology, production technology, and management of technology, accompanied by related parameters of technology performance evaluation.

  16. Mobile Technology: The Foundation for an Engaged and Secure Campus Community

    Science.gov (United States)

    Chapel, Edward

    2008-01-01

    Montclair State University, a public New Jersey institution with more than 17,000 students enrolled, has harnessed the cell phone and cellular broadband technology to foster a stronger sense of community and provide students with a safe, secure, and rich learning environment. This paper discusses the potential for new technologies to foster…

  17. Develop security architecture for both in-house healthcare information systems and electronic patient record

    Science.gov (United States)

    Zhang, Jianguo; Chen, Xiaomeng; Zhuang, Jun; Jiang, Jianrong; Zhang, Xiaoyan; Wu, Dongqing; Huang, H. K.

    2003-05-01

    In this paper, we presented a new security approach to provide security measures and features in both healthcare information systems (PACS, RIS/HIS), and electronic patient record (EPR). We introduced two security components, certificate authoring (CA) system and patient record digital signature management (DSPR) system, as well as electronic envelope technology, into the current hospital healthcare information infrastructure to provide security measures and functions such as confidential or privacy, authenticity, integrity, reliability, non-repudiation, and authentication for in-house healthcare information systems daily operating, and EPR exchanging among the hospitals or healthcare administration levels, and the DSPR component manages the all the digital signatures of patient medical records signed through using an-symmetry key encryption technologies. The electronic envelopes used for EPR exchanging are created based on the information of signers, digital signatures, and identifications of patient records stored in CAS and DSMS, as well as the destinations and the remote users. The CAS and DSMS were developed and integrated into a RIS-integrated PACS, and the integration of these new security components is seamless and painless. The electronic envelopes designed for EPR were used successfully in multimedia data transmission.

  18. Security Guidelines for the Development of Accessible Web Applications through the implementation of intelligent systems

    Directory of Open Access Journals (Sweden)

    Luis Joyanes Aguilar

    2009-12-01

    Full Text Available Due to the significant increase in threats, attacks and vulnerabilities that affect the Web in recent years has resulted the development and implementation of pools and methods to ensure security measures in the privacy, confidentiality and data integrity of users and businesses. Under certain circumstances, despite the implementation of these tools do not always get the flow of information which is passed in a secure manner. Many of these security tools and methods cannot be accessed by people who have disabilities or assistive technologies which enable people to access the Web efficiently. Among these security tools that are not accessible are the virtual keyboard, the CAPTCHA and other technologies that help to some extent to ensure safety on the Internet and are used in certain measures to combat malicious code and attacks that have been increased in recent times on the Web. Through the implementation of intelligent systems can detect, recover and receive information on the characteristics and properties of the different tools and hardware devices or software with which the user is accessing a web application and through analysis and interpretation of these intelligent systems can infer and automatically adjust the characteristics necessary to have these tools to be accessible by anyone regardless of disability or navigation context. This paper defines a set of guidelines and specific features that should have the security tools and methods to ensure the Web accessibility through the implementation of intelligent systems.

  19. Europe, Middle East and North Africa Conference on Technology and Security to Support Learning 2016

    CERN Document Server

    Serrhini, Mohammed; Felgueiras, Carlos

    2017-01-01

    This book contains a selection of articles from The Europe, Middle East and North Africa Conference on Technology and Security to Support Learning 2016 (EMENA-TSSL'16), held between the 3th and 5th of October at Saidia, Oujda, Morocco. EMENA-TSSL'16 is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges in Information & Communication Technologies, and Security to support Learning. The main topics covered are: A) Online Education; B) Emerging Technologies in Education; C) Artificial Intelligence in Education; D) Gamification and Serious games; E) Network & Web Technologies Applications; F) Online experimentation and Virtual Laboratories; G) Multimedia Systems and Applications; H) Security and Privacy; I) Multimedia, Computer Vision and Image Processing; J) Cloud, Big Data Analytics and Applications; K) Human-Computer Interaction; L) Software Systems, Architectures, Applications and Tools; M) Onli...

  20. Development of atomic spectroscopy technology

    International Nuclear Information System (INIS)

    Lee, Jong Min; Cha, Hyung Ki; Song, Kyu Seok; Yang, Ki Ho; Baik, Dae Hyun; Lee, Young Joo; Yi, Jong Hoon; Jeong, Do Young; Jeong, Eui Chang; Yoo, Byung Duk; Cha, Byung Heon; Kim, Seong Ho; Nam, Seong Mo; Kim, Sun Kuk; Lee, Byung Cheol; Choi, Hwa Lim; Ko, Dok Yung; Han, Jae Min; Rho, Si Pyo; Lim, Chang Hwan; Choi, An Seong

    1992-12-01

    This project is aimed for the 'Development of extraction and separation techniques for stable isotopes by atomic laser spectroscopy technique'. The project is devided by two sub-projects. One is the 'Development of the selective photoionization technology' and the other is 'Development of ultrasensitive spectroscopic analysis technololgy'. This year studies on Hg and Yb, both of which have 7 isotopes, have been performed and, as a result, it was proved that specific isotopes of these elements could be selectively extracted. In addition study on plasma extraction technique, development of atomizers, design of electron gun have been the result of the project in 1992. In second sub-project trace determination of Pb has been performed with laser resonance ionization spectroscopy. As a result 20 picogram of detection limit has been obtained. In addition to these results, design of high sensitive laser induced fluorescence detection system as well as remote sensing DIAL system have been done. (Author)

  1. Cyberfeminism, technology, and international "development".

    Science.gov (United States)

    Gajjala, R; Mamidipudi, A

    1999-07-01

    This article reports on the implications and benefits of Internet technology among women from developing countries. Cyberfeminism is the practice of feminism in cyberspace. Feminists believe that women should take control and augment Internet technologies to empower themselves. Learning to use the computers, getting "connected," and surfing the Internet are encouraged among all women with the aim of advancing feminist causes and empowering women. The Internet has been observed to cause radical changes in the way business and social activities are conducted. A description of how two women have engaged in cyberfeminism and worked in development and technology programs is included. One contributor, Annapurna Mamipudi, is involved in a non-governmental organization working with traditional handloom weavers in India Another contributor is Radhika Gajjala, who works in academia and creates on-line "discussion lists" and Web sites from her North American geographical location. Her job is to create spaces that provide opportunities for dialogue and collaboration among women with Internet access all over the world.

  2. Security of OS-level virtualization technologies: Technical report

    OpenAIRE

    Reshetova, Elena; Karhunen, Janne; Nyman, Thomas; Asokan, N.

    2014-01-01

    The need for flexible, low-overhead virtualization is evident on many fronts ranging from high-density cloud servers to mobile devices. During the past decade OS-level virtualization has emerged as a new, efficient approach for virtualization, with implementations in multiple different Unix-based systems. Despite its popularity, there has been no systematic study of OS-level virtualization from the point of view of security. In this report, we conduct a comparative study of several OS-level v...

  3. Cutting-edge technologies for X-ray systems ensuring safety, security, and comfort of diagnosis and treatment

    International Nuclear Information System (INIS)

    Sato, Naotaka; Kuroki, Takahiro

    2015-01-01

    X-ray systems that convert X-rays passing through the human body Into images are widely used in various fields of diagnosis and treatment, due to their simplicity and immediacy. In recent years. Improvements in the image quality and usability of such systems as a result of technological innovations have contributed to more accurate diagnosis and treatment and shorter examination times. Toshiba Medical Systems Corporation has been continuously developing exposure management technologies that can precisely estimate doses of exposure as well as technologies to reduce exposure. We are also making efforts to reduce the burden on patients through the development of technologies to enhance the effectiveness of examinations. By applying these technologies to our various X-ray products, we are actively promoting the provision of medical systems offering safety, security, and comfort to both patients, and operators and other medical staff. (author)

  4. A Stitch in Time : Supporting Android Developers in Writing Secure Code

    OpenAIRE

    Nguyen, Duc Cuong; Wermke, Dominik; Acar, Yasemin; Backes, Michael; Weir, Charles Alexander Forbes; Fahl, Sascha

    2017-01-01

    Despite security advice in the official documentation and an extensive body of security research about vulnerabilities and exploits, many developers still fail to write secure Android applications. Frequently, Android developers fail to adhere to security best practices, leaving applications vulnerable to a multitude of attacks. We point out the advantage of a low-time-cost tool both to teach better secure coding and to improve app security. Using the FixDroid™ IDE plug-in, we show that profe...

  5. Technology development in market networks

    International Nuclear Information System (INIS)

    Olerup, B.

    2001-01-01

    Technology procurement is used as an environmental control means in Sweden to promote the manufacturing and sale of energy-efficient technologies. The public authority in charge makes use of the market mechanism in alternating co-operative and competitive elements. The fragmented market, with its standardised products for many small customers, is brought together to specify desired product developments. These demands also include other qualities besides energy efficiency. A contest is announced in which a possible future market is indicated to manufacturers. Efforts are made to enlarge the market to motivate their investment and to keep down the unit cost. Each side in the deal is thus given an incentive to act in the desired direction. (author)

  6. Finding the right technology solutions to secure our borders

    CSIR Research Space (South Africa)

    Venter, CP

    2015-10-01

    Full Text Available technologies used • Radar and Electronic warfare systems, optronic systems, unmanned aerial vehicles, databases, software, networks. • Preparation time 8 months • Executed over two weeks Working with real results After the experiment • Overall...

  7. Securing Canada’s Information-Technology Infrastructure: Context, Principles, and Focus Areas of Cybersecurity Research

    Directory of Open Access Journals (Sweden)

    Dan Craigen

    2013-07-01

    Full Text Available This article addresses the challenges of cybersecurity and ultimately the provision of a stable and resilient information-technology infrastructure for Canada and, more broadly, the world. We describe the context of current cybersecurity challenges by synthesizing key source material whose importance was informed by our own real-world experiences. Furthermore, we present a checklist of guiding principles to a unified response, complete with a set of action-oriented research topics that are linked to known operational limitations. The focus areas are used to drive the formulation of a unified and relevant research and experimental development program, thereby moving us towards a stable and resilient cyberinfrastructure. When cybersecurity is viewed as an inherently interdisciplinary problem of societal concern, we expect that fundamentally new research perspectives will emerge in direct response to domain-specific protection requirements for information-technology infrastructure. Purely technical responses to cybersecurity challenges will be inadequate because human factors are an inherent aspect of the problem. This article will interest managers and entrepreneurs. Senior management teams can assess new technical developments and product releases to fortify their current security solutions, while entrepreneurs can harness new opportunities to commercialize novel technology to solve a high-impact cybersecurity problem..

  8. How does technological regime affect performance of technology development projects?

    NARCIS (Netherlands)

    Song, Michael; Hooshangi, Soheil; Zhao, Y. Lisa; Halman, Johannes I.M.

    2014-01-01

    In this study, we examine how technological regime affects the performance of technology development projects (i.e., project quality, sales, and profit). Technological regime is defined as the set of attributes of a technological environment where the innovative activities of firms take place.

  9. Development of Food Security Information System Based on Business Intelligence in Food Security Agency, Ministry of Agriculture, Indonesia

    OpenAIRE

    Hendrawaty, Manise; Harisno, Harisno

    2014-01-01

    Food is the main basic need of human, because of that fulfillment of human need of food has to be fulfilled. So it can fulfill that need, then government institution, Food Security Agency (BKP) is formed so it can monitor fulfillment of food need of society. The goals of this writing are to develop food security information system that provides dashboard facility based on business intelligence, to develop food security information system that can give fast, precise and real time information a...

  10. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  11. Security technology discussion for emergency command system of nuclear power plant

    International Nuclear Information System (INIS)

    Liu Zhenjun

    2014-01-01

    Nuclear power plant emergency command system can provide valuable data for emergency personnel, such as the unit data, weather data, environmental radiation data. In the course of emergency response, the emergency command system provides decision support to quickly and effectively control and mitigate the consequences of the nuclear accident, to avoid and reduce the dose received by staff and the public, to protect the environment and the public. There are high performance requirements on the security of the system and the data transmission. Based on the previous project and new demand after the Fukushima incident, the security technology design of emergency system in nuclear power plant was discussed. The results show that the introduction of information security technology can effectively ensure the security of emergency systems, and enhance the capacity of nuclear power plant to deal with nuclear accidents. (author)

  12. Microsoft Technology as an Optimization Tool in Promoting Security and Functionality of the Educational System

    Directory of Open Access Journals (Sweden)

    Jelena Jardas Antonic

    2008-10-01

    Full Text Available Abstract - In the cooperation with the City of Rijeka, the project of analysis of the functional and security situation of information infrastructure has been initiated in 24 schools in the authority of the city. Having completed the multicriteria analysis of the collected data, we have built a model of implementing Microsoft service technologies. The implementation should satisfy the elementary security principles that are required by the security standards today, maximizing functionality of infrastructure and minimizing network administration tasks. Server technology that has been used in this solution is Microsoft Widows 2003 Server R2 and Internet Security and Acceleration Server 2006, as well as the GFI WebMonitor and antivirus.

  13. Children's Developing Understanding of Technology

    Science.gov (United States)

    Mawson, Brent

    2010-01-01

    The issue of children's conceptions of technology and technology education is seen as important by technology educators. While there is a solid body of literature that documents groups of children's understandings of technology and technology education, this is primarily focused on snapshot studies of children aged 11 and above. There is little…

  14. Measuring global water security towards sustainable development goals

    Science.gov (United States)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-12-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience ‘low water security’ over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated—physical and socio-economic—approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term ‘security’ is conceptualized as a function of ‘availability’, ‘accessibility to services’, ‘safety and quality’, and ‘management’. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  15. Development of DUPIC safeguards technology

    Energy Technology Data Exchange (ETDEWEB)

    Kim, H D; Ko, W I; Song, D Y [and others

    2000-03-01

    During the first phase of R and D program conducted from 1997 to 1999, nuclear material safeguards studies system were performed on the technology development of DUPIC safeguards system such as nuclear material measurement in bulk form and product form, DUPIC fuel reactivity measurement, near-real-time accountancy, and containment and surveillance system for effective and efficient implementation of domestic and international safeguards obligation. For the nuclear material measurement system, the performance test was finished and received IAEA approval, and now is being used in DUPIC Fuel Fabrication Facility(DFDF) for nuclear material accounting and control. Other systems being developed in this study were already installed in DFDF and being under performance test. Those systems developed in this study will make a contribution not only to the effective implementation of DUPIC safeguards, but also to enhance the international confidence build-up in peaceful use of spent fuel material. (author)

  16. Development of spent fuel remote handling technology

    Energy Technology Data Exchange (ETDEWEB)

    Park, B. S.; Yoon, J. S.; Hong, H. D. (and others)

    2007-02-15

    In this research, the remote handling technology was developed for the ACP application. The ACP gives a possible solution to reduce the rapidly cumulative amount of spent fuels generated from the nuclear power plants in Korea. The remote technologies developed in this work are a slitting device, a voloxidizer, a modified telescopic servo manipulator and a digital mock-up. A slitting device was developed to declad the spent fuel rod-cuts and collect the spent fuel UO{sub 2} pellets. A voloxidizer was developed to convert the spent fuel UO{sub 2} pellets obtained from the slitting process in to U{sub 3}O{sub 8} powder. Experiments were performed to test the capabilities and remote operation of the developed slitting device and voloxidizer by using simulated rod-cuts and fuel in the ACP hot cell. A telescopic servo manipulator was redesigned and manufactured improving the structure of the prototype. This servo manipulator was installed in the ACP hot cell, and the target module for maintenance of the process equipment was selected. The optimal procedures for remote operation were made through the maintenance tests by using the servo manipulator. The ACP digital mockup in a virtual environment was established to secure a reliability and safety of remote operation and maintenance. The simulation for the remote operation and maintenance was implemented and the operability was analyzed. A digital mockup about the preliminary conceptual design of an enginnering-scale ACP was established, and an analysis about a scale of facility and remote handling was accomplished. The real-time diagnostic technique was developed to detect the possible fault accidents of the slitting device. An assessment of radiation effect for various sensors was also conducted in the radiation environment.

  17. Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era

    Science.gov (United States)

    Ali, Firkhan Ali Bin Hamid; Zalisham Jali, Mohd, Dr

    2018-05-01

    The development of the digital transformation in the organizations has become more expanding in these present and future years. This is because of the active demand to use the ICT services among all the organizations whether in the government agencies or private sectors. While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. So, their needs a well plan to implement the cyber infrastructures and equipment. The cyber security play important role to ensure that the ICT components or infrastructures execute well along the organization’s business successful. This paper will present a study of security management models to guideline the security maintenance on existing cyber infrastructures. In order to perform security model for the currently existing cyber infrastructures, combination of the some security workforces and security process of extracting the security maintenance in cyber infrastructures. In the assessment, the focused on the cyber security maintenance within security models in cyber infrastructures and presented a way for the theoretical and practical analysis based on the selected security management models. Then, the proposed model does evaluation for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. The implemented cyber security maintenance within security management model in a prototype and evaluated it for practical and theoretical scenarios. Furthermore, a framework model is presented which allows the evaluation of configuration changes in the agile and dynamic cyber infrastructure environments with regard to properties like vulnerabilities or expected availability. In case of a security perspective, this evaluation can be used to monitor the security levels of the configuration over its lifetime and

  18. Implementing Information Security and Its Technology: A LineManagement Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Barletta, William A.

    2005-08-22

    Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

  19. Development of an industrial complex for ensuring national competitiveness and economic security

    Directory of Open Access Journals (Sweden)

    A. V. Kalach

    2016-01-01

    Full Text Available Living standards depends on the state of the country’s industrial complex. In a message to Russian President Vladimir Putin's Federal Assembly was asked to implement in 2015 a national technological initiative, the development of industries of the new technological order. As a result of the predominance of the industry of the sixth technological order should occur major changes in the structure of production factors and significance. It follows the inevitability of structural changes in the system of economic institutions and mechanisms of economic security and competitiveness of the state achieve the main goal of the state program “The development of industry and increase its competitiveness” is carried out through the following the directions of sub-programs: investment goods (chemical complex development composite materials, industrial biotechnology, power engineering, machine tool industry, agricultural machinery, machinery specialized production, transport engineering; goods (light industry, children;s products industry, the automotive industry; military-industrial complex; infrastructure (development of engineering activities, industrial parks; semi-finished goods and materials (timber industry, metallurgy, industrial development of rare-earth metals. At the current pace of technological and economic development, the 6 th technological structure will come into proliferation phase in 2010–2020, and in the phase of maturity – 40-ies of XXI century. At the same time in 2020–2025 there will be a new scientific-technical and technological revolution, which will become the basis for developing, synthesizing advances in the above basic technologies. In this paper, we proposed as a tool to ensure the economic security of the state to use the acceleration system of technical development of the industrial complex.

  20. National Institute of Justice (NIJ): improving the effectiveness of law enforcement via homeland security technology improvements (Keynote Address)

    Science.gov (United States)

    Morgan, John S.

    2005-05-01

    Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. Preventing terrorism and promoting the nation"s security is the Department of Justice"s number one strategic priority. This is reflected in its technology development efforts, as well as its operational focus. The National Institute of Justice (NIJ) is the national focal point for the research, development, test and evaluation of technology for law enforcement. In addition to its responsibilities in supporting day-to-day criminal justice needs in areas such as less lethal weapons and forensic science, NIJ also provides critical support for counter-terrorism capacity improvements in state and local law enforcement in several areas. The most important of these areas are bomb response, concealed weapons detection, communications and information technology, which together offer the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. NIJ coordinates its activities with several other key federal partners, including the Department of Homeland Security"s Science and Technology Directorate, the Technical Support Working Group, and the Department of Defense.

  1. Cyber-Security Issues in Healthcare Information Technology.

    Science.gov (United States)

    Langer, Steve G

    2017-02-01

    In 1999-2003, SIIM (then SCAR) sponsored the creation of several special topic Primers, one of which was concerned with computer security. About the same time, a multi-society collaboration authored an ACR Guideline with a similar plot; the latter has recently been updated. The motivation for these efforts was the launch of Health Information Portability and Accountability Act (HIPAA). That legislation directed care providers to enable the portability of patient medical records across authorized medical centers, while simultaneously protecting patient confidentiality among unauthorized agents. These policy requirements resulted in the creation of numerous technical solutions which the above documents described. While the mathematical concepts and algorithms in those papers are as valid today as they were then, recent increases in the complexity of computer criminal applications (and defensive countermeasures) and the pervasiveness of Internet connected devices have raised the bar. This work examines how a medical center can adapt to these evolving threats.

  2. Selection of the Best Security Controls for Rapid Development of Enterprise-Level Cyber Security

    Science.gov (United States)

    2017-03-01

    investment (ROI) assessment. This ROI assessment entailed consideration of both the likely/expected security benefits of each candidate security control...the top 10–20 cyber security controls, where ranking was based upon a return on investment (ROI) assessment. This ROI assessment entailed...11  II.  CYBER SECURITY: UNDERLYING PRINCIPLES, FUNDAMENTALS AND BEST PRACTICES .................................................13  A

  3. Challenges of Information Technology Security in the NASA Environment

    Science.gov (United States)

    Santiago, S. S.

    2000-01-01

    A brief description of the NASA organization and how the CIO responsibilities are integrated into that organization followed by an introduction of the NASA ITS Program goals and objectives. An overview of the four major enterprises' cultures and how those cultures tie back to the Enterprises' missions. A description of the ITS challenges that exist stemming from the competing NASA Enterprises' requirements and how they have formed the basis of the NASA ITS Program. A talk will focus on policies and procedures and the technology being incorporated into the NASA infrastructure and how that technology ties back to the policies and procedures.

  4. Safeguards and security research and development: Progress report, October 1994--September 1995

    Energy Technology Data Exchange (ETDEWEB)

    Rutherford, D.R.; Henriksen, P.W. [comp.

    1997-03-01

    The primary goal of the Los Alamos Safeguards and Security Technology Development Program, International Safeguards, and other Safeguards and Security Programs is to continue to be the center of excellence in the field of Safeguards and Security. This annual report for 1995 describes those scientific and engineering projects that contribute to all of the aforementioned programs. The authors have presented the information in a different format from previous annual reports. Part I is devoted to Nuclear Material Measurement Systems. Part II contains projects that are specific to Integrated Safeguards Systems. Part III highlights Safeguards Systems Effectiveness Evaluations and Part IV is a compilation of highlights from Information Assurance projects. Finally Part V highlights work on the projects at Los Alamos for International Safeguards. The final part of this annual report lists titles and abstracts of Los Alamos Safeguards and Security Technology Development reports, technical journal articles, and conference papers that were presented and published in 1995. This is the last annual report in this format. The authors wish to thank all of the individuals who have contributed to this annual report and made it so successful over the years.

  5. Safeguards and security research and development: Progress report, October 1994--September 1995

    International Nuclear Information System (INIS)

    Rutherford, D.R.; Henriksen, P.W.

    1997-03-01

    The primary goal of the Los Alamos Safeguards and Security Technology Development Program, International Safeguards, and other Safeguards and Security Programs is to continue to be the center of excellence in the field of Safeguards and Security. This annual report for 1995 describes those scientific and engineering projects that contribute to all of the aforementioned programs. The authors have presented the information in a different format from previous annual reports. Part I is devoted to Nuclear Material Measurement Systems. Part II contains projects that are specific to Integrated Safeguards Systems. Part III highlights Safeguards Systems Effectiveness Evaluations and Part IV is a compilation of highlights from Information Assurance projects. Finally Part V highlights work on the projects at Los Alamos for International Safeguards. The final part of this annual report lists titles and abstracts of Los Alamos Safeguards and Security Technology Development reports, technical journal articles, and conference papers that were presented and published in 1995. This is the last annual report in this format. The authors wish to thank all of the individuals who have contributed to this annual report and made it so successful over the years

  6. Safety and security of radiation sources and radioactive materials: A case of Zambia - least developed country

    International Nuclear Information System (INIS)

    Banda, S.C.

    1998-01-01

    In Zambia, which is current (1998) classified as a Least Developed Country has applications of nuclear science and technology that cover the medical, industrial, education and research. However, the application is mainly in medical and industry. Through the responsibility of radiation source is within the mandate of the Radiation Protection Board. The aspects involving security fall on different stake holders some that have no technical knowledge on what radiation is about. The stake holders in this category include customs clearing and forwarding agents, state security/defence agencies and the operators. Such a situation demands a national system that should be instituted to meet the safety and security requirements but takes into account the involvement of the diverse stake holders. In addition such system should avoid unnecessary exposure, ensure safety of radioactive materials and sources, detect illicit trade and maintain integrity of such materials or sources. This paper will provide the status on issue in Zambia and the challenges that exist to ensure further development in application of Nuclear Science and Technology (S and T) in the country takes into account the safety and security requirements that avoid deliberate and accidental loss of radiation sources and radioactive materials. The Government has a responsibility to ensure that effective system is established and operated to protect radiation sources and radioactive materials from theft, sabotage and ensure safety. (author)

  7. Technology adoption and food security: the role of the Nigerian ...

    African Journals Online (AJOL)

    The focus of this paper is on the potential role of the Nigerian Agricultural Insurance Scheme (NAIS) in protecting the farmer from the plethora of risks associated with the transfer and introduction of modern technologies. The scheme can improve farmers' access to credit when the insurance contract is used as collateral for ...

  8. MIT Lincoln Laboratory: Technology in Support of National Security

    Science.gov (United States)

    2011-01-01

    technologies that could be uti - lized in future Landsat satellites to achieve significant economies of mass, size, power consumption, and cost, and...epitomized by the pregnancy test kit. However, immunoassays are typically based on anti bodies removed from their host cells and placed on substrates

  9. Newer Technologies for School Security. ERIC Digest Number 145.

    Science.gov (United States)

    Schneider, Tod

    This digest describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that allows for…

  10. Security Concerns in Telecommuting within the Information Technology Industry

    Science.gov (United States)

    Chithambo, Loyce Maosa

    2011-01-01

    Since the availability of remote access technology, most companies have adopted telecommuting as part of business operations. Although some research has identified policies and procedures when individuals telecommute, limited research exists about existing policies and procedures for telecommuters. The purpose of this qualitative descriptive…

  11. Agricultural extension, technology adoption and household food security

    NARCIS (Netherlands)

    Santos Rocha, Jozimo

    2017-01-01

    In this thesis, I use experimental and quasi-experimental data from 25 villages and a total of 1,105 farmers from eastern DRC to investigate the relationship among agricultural training, the adoption of agricultural technologies, crop productivity, and household food insecurity and dietary

  12. Development of nuclear analytical technology

    International Nuclear Information System (INIS)

    Jee, Kwang Yong; Kim, W. H.; Park, Yeong J.; Park, Yong J.; Sohn, S. C.; Song, B. C.; Jeon, Y. S.; Pyo, H. Y.; Ha, Y. K.

    2004-04-01

    The objectives of this study are to develop the technology for the determination of isotopic ratios of nuclear particles detected from swipe samples and to develop the NIPS system. The R and D contents and results of this study are firstly the production of nuclear micro particle(1 ∼ 20 μm) and standardization, the examination of variation in fission track characteristic according to nuclear particle size and enrichment( 235 U: 1-50%), the construction of database and the application of this technique to swipe samples. If this technique is verified its superiority by various field tests and inter-laboratory comparison program with other institutes in developed countries, it can be possible to join NWAL supervised under IAEA and to export our technology abroad. Secondly, characteristics of alpha track by boron (n, α) nuclear reaction were studied to measure both total boron concentration and 10B enrichment. The correlation of number of alpha tracks and various 10B concentration was studied to evaluate the reliability of this method. Especially, cadmium shielding technique was introduced to reduce the background of alpha tracks by covering the solid track detector and the multi-dot detector plate was developed to increase the reproducibility of measurement by making boron solution dried evenly in the plate. The results of the alpha track method were found to be well agreed with those of mass spectroscopy within less than 10 % deviation. Finally, the NIPS system using 252 Cf neutron source was developed and prompt gamma spectrum and its background were obtained. Monte Carlo method using MCNP-4B code was utilized for the interpretation of neutron and gamma-ray shielding condition as well as the moderation of a fast neutron. Gamma-gamma coincidence was introduced to reduce the prompt gamma background. The counting efficiency of the HPGe detector was calibrated in the energy range from 50 keV to 10 MeV using radio isotope standards and prompt gamma rays of Cl for the

  13. Dry rod consolidation technology development

    International Nuclear Information System (INIS)

    Rasmussen, T.L.; Schoonen, D.H.; Feldman, E.M.; Fisher, M.W.

    1987-01-01

    The Department of Energy's (DOE) Office of Civilian Radioactive Waste Management (OCRWM) is funding a program to consolidate commercial spent fuel for testing in dry storage casks and to develop technology that will be fed into other OCRWM programs, e.g., Prototypical Consolidation Demonstration Program (PCDP). The program is being conducted at the Idaho National Engineering Laboratory (INEL) by the INEL Operating Contractor EG and G Idaho, Inc. Hardware and software have been designed and fabricated for installation in a hot cell adjacent to the Test Area North (TAN) Hot Shop Facility. This equipment is used to perform dry consolidation of commercial spent fuel from the Virginia Power (VP) Cooperative Agreement Spent Fuel Storage Cask (SFSC) Demonstration Program and assemblies that had previously been stored at the Engine Maintenance and Disassembly (EMAD) facility in Nevada. Consolidation is accomplished by individual, horizontal rod pulling. A computerized semiautomatic control system with operator involvement is utilized to conduct consolidation operations. During consolidation operations, data is taken to characterize this technology. Still photo, video tape, and other documentation will be generated to make developed information available to interested parties. Cold checkout of the hardware and software was completed in September of 1986. Following installation in the hot cell, consolidation operations begins in May 1987. Resulting consolidated fuel will be utilized in the VP Cooperative Agreement SFSC Program

  14. Dry rod consolidation technology development

    International Nuclear Information System (INIS)

    Rasmussen, T.L.; Schoonen, D.H.; Fisher, M.W.

    1986-01-01

    The Department of Energy's (DOE) Office of Civilian Radioactive Waste Management (OCRWM) is funding a Program to consolidate commercial spent fuel for testing in dry storage casks and to develop technology that will be fed into other OCRWM Programs, e.g., Prototypical Consolidation Demonstration Program. The Program is being conducted at the Idaho National Engineering Laboratory (INEL) by the Operating Contractor, EGandG Idaho, Inc. Hardware and software have been designed and fabricated for installation in a hot cell adjacent to the Test Area North (TAN) Hot Shop Facility. This equipment will be used to perform dry consolidation of commercial spent fuel from the Virginia Power (VP) Cooperative Agreement Spent Fuel Storage Cask (SPSC) Demonstration Program and assemblies that had previously been stored at the Engine Maintenance and Disassembly (EMAD) facility in Nevada. Consolidation will be accomplished by individual, horizontal rod pulling. A computerized semi-automatic control system with operator involvement will be utilized to conduct consolidation operations. Special features have been incorporated in the design to allow crud collection and measurement of rod pulling forces. During consolidation operations, data will be taken to characterize this technology. Still photo, video tape, and other documentation will be generated to make developed information available to interested parties. Cold checkout of the hardware and software will complete in September of 1986. Following installation in the hot cell, consolidation operations will begin in January 1987. Resulting consolidated fuel will be utilized in the VP Cooperative Agreement SFSC Program

  15. Effective Remote Control of Several Outdoor Security Lights by SMS and Wifi Technology

    Directory of Open Access Journals (Sweden)

    M. F. Akorede

    2017-08-01

    Full Text Available The aim of this study was to design and develop a control system using Short Message Service (SMS and wireless networking (WiFi technology to remotely control outdoor security lights in large organisations. The device comprises four main units, namely: the mobile phone or a computer system, the Global System for Mobile communication (GSM modem, the switching unit and the WiFi module. One feature that makes the developed system better than other related existing works is its ability to use two means of control. It makes use of WiFi when the operator is within the coverage area of the network of about 100 m to the device, at no cost, otherwise it uses SMS containing certain codes to control the lights. A Subscriber Identity Module (SIM card is placed in the GSM modem and SMS from the transmitter are sent to that mobile number. The module is also constantly checked by the microcontroller unit, processes the information, extracts the message and command from the GSM modem and WiFi module respectively and then acts accordingly. Owing to its simplicity, C programming is used to programme the microcontroller. The developed device when tested with three lighting points operating on 230V power supply, gives an impressive performance in terms of accuracy and promptness with both SMS and WiFi technology.

  16. Developing the security culture at the SEISMED Reference Centres.

    Science.gov (United States)

    Fowler, J

    1996-01-01

    The paper gives a brief summary of the SEISMED project and the particular role played by the Reference Centres. Details are given of the hardware and application systems in use in the Royal Hospitals (NHS) Trust (RHT), one of the SEISMED Reference Centres. It proposes, without verification, a definition of a Security Culture based on three criteria. These are suggested to be the "Awareness" the "Acceptance" and the "Actions" of the management and staff to improve Information Systems Security throughout the RHT. The way that "Awareness" was increased is shown by the specific initiatives commenced as a result of a CRAMM Risk Analysis and the management and staff training programmes. The specific initiatives mentioned include, an Information Systems Security Policy, a contingency and disaster recovery plan, improvements in the physical protection of equipment and changes to the method of access control. The "Acceptance" by the staff of these measures is considered and the success or failure of "Developing A Security Culture" examined. The role of SEISMED in this process is assessed.

  17. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  18. Food security politics and the Millennium Development Goals.

    Science.gov (United States)

    McMichael, Philip; Schneider, Mindi

    2011-01-01

    This article reviews proposals regarding the recent food crisis in the context of a broader, threshold debate on the future of agriculture and food security. While the MDGs have focused on eradicating extreme poverty and hunger, the food crisis pushed the hungry over the one billion mark. There is thus a renewed focus on agricultural development, which pivots on the salience of industrial agriculture (as a supply source) in addressing food security. The World Bank's new 'agriculture for development' initiative seeks to improve small-farmer productivity with new inputs, and their incorporation into global markets via value-chains originating in industrial agriculture. An alternative claim, originating in 'food sovereignty' politics, demanding small-farmer rights to develop bio-regionally specific agro-ecological methods and provision for local, rather than global, markets, resonates in the IAASTD report, which implies agribusiness as usual ''is no longer an option'. The basic divide is over whether agriculture is a servant of economic growth, or should be developed as a foundational source of social and ecological sustainability. We review and compare these different paradigmatic approaches to food security, and their political and ecological implications.

  19. Development and Testing of Intelligent Alcohol Transportation Security System

    Directory of Open Access Journals (Sweden)

    Velaphi Msomi

    2018-01-01

    Full Text Available The development and testing of intelligent liquid transportation security system are being reported in this paper. The targeted fluid to be secured was ethanol alcohol and this was due to the theft cases occurring during the transportation of this product from the supplier to the customer. The system was developed such that only the radar level sensor (VEGAPULS 62 might be in contact with the fluid and the rest of the system remained outside the liquid carrying container to be secured. The system was developed such that it reports any abnormal liquid level drop through short message service (SMS. The functioning of the developed system was tested through the use of 1040 L Intermediate Bulk Container (IBC filled with water which was hauled for about 1.5 km. The liquid theft was simulated and the system sent two SMS. The first SMS reported the beginning of water level drop and the second one reported the ending of water level drop. The second SMS reported the amount of liquid that was taken out of the container.

  20. Substantiation the strategic priorities of innovation regional development security

    Directory of Open Access Journals (Sweden)

    Irina Markovna Golova

    2014-09-01

    Full Text Available In this article are discussed methodological challenges for strategic priorities ensure security innovation regional development. It is shown that in modern conditions innovative safety is an independent and very important area of security of the region. This innovative security should be understood as a qualitative characteristic that gives insight into the regional socio-economic systems requirements and challenges of the innovation economy, including their ability to recombination. It is considered the basic patterns and features of mutual influence and interaction of innovative and traditional socio-economic development of the territories. The necessity of the joint integrated treatment of innovation and socio-economic development in the management of innovative safety of the region is founded. It is given suggestions on fundamental approaches to the solution of the problem of selecting priority areas for strengthening the sources of innovation development successfully tailored to specific territories. The main positions are illustrated in the example the regions of the Ural Federal District.

  1. How Secure Is Education in Information Technology? A Method for Evaluating Security Education in IT

    Science.gov (United States)

    Grover, Mark; Reinicke, Bryan; Cummings, Jeff

    2016-01-01

    As the popularity of Information Technology programs has expanded at many universities, there are a number of questions to be answered from a curriculum standpoint. As many of these programs are either interdisciplinary, or at least exist outside of the usual Computer Science and Information Systems programs, questions of what is appropriate for…

  2. Information Communication Technology Planning in Developing Countries

    Science.gov (United States)

    Malapile, Sandy; Keengwe, Jared

    2014-01-01

    This article explores major issues related to Information Communication Technology (ICT) in education and technology planning. Using the diffusion of innovation theory, the authors examine technology planning opportunities and challenges in Developing countries (DCs), technology planning trends in schools, and existing technology planning models…

  3. Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs—Summary Report

    Energy Technology Data Exchange (ETDEWEB)

    O' Neil, Lori Ross; Assante, Michael; Tobey, D. H.; Conway, T. J.; Vanderhorst, Jr, T. J.; Januszewski, III, J.; Leo, R.; Perman, K.

    2013-07-01

    This document is a summarization of the report, Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs, the final report for phase 2 of the SPSP (DOE workforce study) project.

  4. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  5. Development of a security vulnerability assessment process for the RAMCAP chemical sector.

    Science.gov (United States)

    Moore, David A; Fuller, Brad; Hazzan, Michael; Jones, J William

    2007-04-11

    The Department of Homeland Security (DHS), Directorate of Information Analysis & Infrastructure Protection (IAIP), Protective Services Division (PSD), contracted the American Society of Mechanical Engineers Innovative Technologies Institute, LLC (ASME ITI, LLC) to develop guidance on Risk Analysis and Management for Critical Asset Protection (RAMCAP). AcuTech Consulting Group (AcuTech) has been contracted by ASME ITI, LLC, to provide assistance by facilitating the development of sector-specific guidance on vulnerability analysis and management for critical asset protection for the chemical manufacturing, petroleum refining, and liquefied natural gas (LNG) sectors. This activity involves two key tasks for these three sectors: Development of a screening to supplement DHS understanding of the assets that are important to protect against terrorist attack and to prioritize the activities. Development of a standard security vulnerability analysis (SVA) framework for the analysis of consequences, vulnerabilities, and threats. This project involves the cooperative effort of numerous leading industrial companies, industry trade associations, professional societies, and security and safety consultants representative of those sectors. Since RAMCAP is a voluntary program for ongoing risk management for homeland security, sector coordinating councils are being asked to assist in communicating the goals of the program and in encouraging participation. The RAMCAP project will have a profound and positive impact on all sectors as it is fully developed, rolled-out and implemented. It will help define the facilities and operations of national and regional interest for the threat of terrorism, define standardized methods for analyzing consequences, vulnerabilities, and threats, and describe best security practices of the industry. This paper will describe the results of the security vulnerability analysis process that was developed and field tested for the chemical manufacturing

  6. Development of a security vulnerability assessment process for the RAMCAP chemical sector

    International Nuclear Information System (INIS)

    Moore, David A.; Fuller, Brad; Hazzan, Michael; Jones, J. William

    2007-01-01

    The Department of Homeland Security (DHS), Directorate of Information Analysis and Infrastructure Protection (IAIP), Protective Services Division (PSD), contracted the American Society of Mechanical Engineers Innovative Technologies Institute, LLC (ASME ITI, LLC) to develop guidance on Risk Analysis and Management for Critical Asset Protection (RAMCAP). AcuTech Consulting Group (AcuTech) has been contracted by ASME ITI, LLC, to provide assistance by facilitating the development of sector-specific guidance on vulnerability analysis and management for critical asset protection for the chemical manufacturing, petroleum refining, and liquefied natural gas (LNG) sectors. This activity involves two key tasks for these three sectors:*Development of a screening to supplement DHS understanding of the assets that are important to protect against terrorist attack and to prioritize the activities. *Development of a standard security vulnerability analysis (SVA) framework for the analysis of consequences, vulnerabilities, and threats. This project involves the cooperative effort of numerous leading industrial companies, industry trade associations, professional societies, and security and safety consultants representative of those sectors. Since RAMCAP is a voluntary program for ongoing risk management for homeland security, sector coordinating councils are being asked to assist in communicating the goals of the program and in encouraging participation. The RAMCAP project will have a profound and positive impact on all sectors as it is fully developed, rolled-out and implemented. It will help define the facilities and operations of national and regional interest for the threat of terrorism, define standardized methods for analyzing consequences, vulnerabilities, and threats, and describe best security practices of the industry. This paper will describe the results of the security vulnerability analysis process that was developed and field tested for the chemical manufacturing

  7. Human Rights, Human Needs, Human Development, Human Security

    OpenAIRE

    Gasper, Des

    2009-01-01

    Human rights, human development and human security form increasingly important, partly interconnected, partly competitive and misunderstood ethical and policy discourses. Each tries to humanize a pre-existing and unavoidable major discourse of everyday life, policy and politics; each has emerged within the United Nations world; each relies implicitly on a conceptualisation of human need; each has specific strengths. Yet mutual communication, understanding and co-operation are deficient, espec...

  8. Enhancing water security in a rapidly developing shale gas region

    Directory of Open Access Journals (Sweden)

    Shannon Holding

    2017-06-01

    New hydrological insights for the region: Initiatives and tools enhancing water security in the region include strategic partnerships and stakeholder collaborations, policy and regulation development, and data collection and distribution efforts. The contributions and limitations of each of these are discussed. A vulnerability mapping framework is presented which addresses data gaps and provides a tool for decision-making surrounding risk to water quality from various hazards. An example vulnerability assessment was conducted for wastewater transport along pipeline and trucking corridors.

  9. Cyber security consideration on I and C system development process

    International Nuclear Information System (INIS)

    Park, Jaek Wan; Park, Jeyun; Kim, Young Ki

    2012-01-01

    Instrumentation and control (I and C) systems in nuclear power plants collect sensor signals installed in plant fields, monitor plant performance and status, and generate signals to control instruments for plant operation and protection. Recently, digital systems of I and C are required to be protected from cyber threats. It has been reported that several plants have been attacked and malfunctioned by outside intruders. To cope with cyber attacks, various studies have been proposed in IT and plant industries. From 2006, regulatory guides and industry standards for cyber security have been published. Therefore, these guides should be strongly considered in the development process of a digital system. Our framework refers to the system development life cycle described in RG 1.152. The main activities of RG 5.71 are included in the framework appropriately. This approach supports the consistent application of system features for cyber security by incorporating the security requirements required in the operation and maintenance phases into the initial phase of development process. It is expected that the application of the framework to a new plant system design may comply with both RG 1.152 and 5.71

  10. Cyber security consideration on I and C system development process

    Energy Technology Data Exchange (ETDEWEB)

    Park, Jaek Wan; Park, Jeyun; Kim, Young Ki [KAERI, Daejeon (Korea, Republic of)

    2012-10-15

    Instrumentation and control (I and C) systems in nuclear power plants collect sensor signals installed in plant fields, monitor plant performance and status, and generate signals to control instruments for plant operation and protection. Recently, digital systems of I and C are required to be protected from cyber threats. It has been reported that several plants have been attacked and malfunctioned by outside intruders. To cope with cyber attacks, various studies have been proposed in IT and plant industries. From 2006, regulatory guides and industry standards for cyber security have been published. Therefore, these guides should be strongly considered in the development process of a digital system. Our framework refers to the system development life cycle described in RG 1.152. The main activities of RG 5.71 are included in the framework appropriately. This approach supports the consistent application of system features for cyber security by incorporating the security requirements required in the operation and maintenance phases into the initial phase of development process. It is expected that the application of the framework to a new plant system design may comply with both RG 1.152 and 5.71.

  11. Development of DUPIC safeguards technology

    International Nuclear Information System (INIS)

    Kim, H. D.; Kang, H. Y.; Ko, W. I.

    2002-05-01

    DUPIC safeguards R and D in the second phase has focused on the development of nuclear material measurement system and its operation and verification, the development of nuclear material control and accounting system, and the development of remote and unmanned containment/surveillance system. Of them, the nuclear material measurement system was authenticated from IAEA and officially used for IAEA and domestic safeguards activities in DFDF. It was also verified that the system could be used for quality control of DUPIC process. It is recognised that the diagnostic software using neural network and remote and unmanned containment/surveillance system developed here could be key technologies to go into remote and near-real time monitoring system. The result of this project will eventually contribute to similar nuclear fuel cycles like MOX and pyroprocessing facility as well as the effective implementation of DUPIC safeguards. In addition, it will be helpful to enhance international confidence build-up in the peaceful use of spent fuel material

  12. Inspection technologies -Development of national safeguards technology-

    International Nuclear Information System (INIS)

    Hong, J. S.; Kim, B. K.; Kwack, E. H.

    1996-12-01

    17 facility regulations prepared by nuclear facilities according to the Ministerial Notices were evaluated. Safeguards inspection activities under Safeguards are described. Safeguards inspection equipments and operation manuals to be used for national inspection are also described. Safeguards report are produced and submitted to MOST by using the computerized nuclear material accounting system at state level. National inspection support system are developed to produce the on-site information for domestic inspection. Planning and establishment of policy for nuclear control of nuclear materials, international cooperation for nuclear control, CTBT, strengthening of international safeguards system, and the supply of PWRs to North Korea are also described. (author). 43 tabs., 39 figs

  13. The development of mobile robot for security application and nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kim, B. S.; Lee, Y. B.; Choi, Y. S.; Seo, Y. C.; Park, Y. M

    1999-12-01

    The use of a mobile robot system in nuclear radioactive environments has the advantage of watching and inspecting the NPP safety-related equipment systematically and repairing damaged parts efficiently, thereby enhancing the safe operations of NPPs as well as reducing significantly personnel's dose rate to radioactive environment. Key technology achieved through the development of such robotic system can be used for security application and can offer new approaches to many of the tasks faced to the industry as well. The mobile robot system was composed of a mobile subsystem, a manipulator subsystem, a control subsystem, and a sensor subsystem to use in security application and nuclear radioactive environments. The mobile subsystem was adopted to synchro-drive method to improve the mobility of it. And the manipulator subsystem was developed to minimize the weight and easy to control at remote site. Finally, we developed the USB-based robot control system considering the expandability and modularity. The developed mobile robot for inspection and security was experimented for the collision avoidance and autonomous algorithm, and then it was confirmed that the mobile robot was very effective to the security application and inspection of nuclear facilities. (author)

  14. The development of mobile robot for security application and nuclear facilities

    International Nuclear Information System (INIS)

    Kim, B. S.; Lee, Y. B.; Choi, Y. S.; Seo, Y. C.; Park, Y. M.

    1999-12-01

    The use of a mobile robot system in nuclear radioactive environments has the advantage of watching and inspecting the NPP safety-related equipment systematically and repairing damaged parts efficiently, thereby enhancing the safe operations of NPPs as well as reducing significantly personnel's dose rate to radioactive environment. Key technology achieved through the development of such robotic system can be used for security application and can offer new approaches to many of the tasks faced to the industry as well. The mobile robot system was composed of a mobile subsystem, a manipulator subsystem, a control subsystem, and a sensor subsystem to use in security application and nuclear radioactive environments. The mobile subsystem was adopted to synchro-drive method to improve the mobility of it. And the manipulator subsystem was developed to minimize the weight and easy to control at remote site. Finally, we developed the USB-based robot control system considering the expandability and modularity. The developed mobile robot for inspection and security was experimented for the collision avoidance and autonomous algorithm, and then it was confirmed that the mobile robot was very effective to the security application and inspection of nuclear facilities. (author)

  15. A SES (sustainable energy security) index for developing countries

    International Nuclear Information System (INIS)

    Narula, Kapil; Reddy, B. Sudhakara

    2016-01-01

    Measuring the performance of the energy system of a country is a prerequisite for framing good energy polices. However, the existing indices which claim to measure energy security have limited applicability for developing countries. Energy sustainability is also increasingly gaining importance and countries are keen to measure it to tailor their energy policies. Therefore, the concept of SES (sustainable energy security) has been proposed as the goal for a developing country. This paper presents an analytical framework for the assessment of SES of an energy system and the methodology for constructing an SES index. A hierarchical structure has been proposed and the energy system has been divided into 'supply', 'conversion & distribution' and 'demand' sub-systems. Each subsystem is further divided into its components which are evaluated for four dimensions of SES, Availability, Affordability, Efficiency and (Environmental) Acceptability using quantitative metrics. Energy indices are constructed using 'scores' (objective values), and 'weights' (subjective values representing tradeoffs) which are then aggregated, bottom-up, to obtain an overall SES Index for a country. The proposed SES Index is multidimensional, quantitative, modular, systemic and flexible. Such a SES Index can be used to design policy interventions for transitioning to a sustainable and a secure energy future. - Highlights: • A SES (sustainable energy security) index is proposed for developing countries. • A hierarchical structure includes the entire energy system from supply to end use. • The performance of all energy sources, energy carriers and sectors is assessed. • Availability, affordability, efficiency and acceptability dimensions are evaluated. • The SES index is multidimensional, quantitative, modular, systemic and flexible.

  16. ICT security- aspects important for nuclear facilities; Information and Communication Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thunem, Atoosa P-J.

    2005-09-15

    Rapid application growth of complex Information and Communication Technologies (ICT) in every society and state infrastructure as well as industry has revealed vulnerabilities that eventually have given rise to serious security breaches. These vulnerabilities together with the course of the breaches from cause to consequence are gradually about to convince the field experts that ensuring the security of ICT-driven systems is no longer possible by only relying on the fundaments of computer science, IT, or telecommunications. Appropriating knowledge from other disciplines is not only beneficial, but indeed very necessary. At the same time, it is a common observation today that ICT-driven systems are used everywhere, from the nuclear, aviation, commerce and healthcare domains to camera-equipped web-enabled cellular phones. The increasing interdisciplinary and inter-sectoral aspects of ICT security worldwide have been providing updated and useful information to the nuclear domain, as one of the emerging users of ICT-driven systems. Nevertheless, such aspects have also contributed to new and complicated challenges, as ICT security for the nuclear domain is in a much more delicate manner than for any other domains related to the concept of safety, at least from the public standpoint. This report addresses some important aspects of ICT security that need to be considered at nuclear facilities. It deals with ICT security and the relationship between security and safety from a rather different perspective than usually observed and applied. The report especially highlights the influence on the security of ICT-driven systems by all other dependability factors, and on that basis suggests a framework for ICT security profiling, where several security profiles are assumed to be valid and used in parallel for each ICT-driven system, sub-system or unit at nuclear facilities. The report also covers a related research topic of the Halden Project with focus on cyber threats and

  17. Toshiba's activity concerning technology succession and human resource development

    International Nuclear Information System (INIS)

    Ogura, Kenji; Hoshide, Akehiko

    2008-01-01

    Recently, from the viewpoint of the reduction of carbon-dioxide emission that cause global warming and the energy security, the importance of nuclear power generation is recognized again as an effective approach for solving the problems, and many nuclear power plants are planed to be constructed worldwide. On the other hand, the experienced engineers will face the time of the retirement in the near future and technology succession and human resource development has become important problems. In this paper, Toshiba's Nuclear Energy Systems and Services Division's activity concerning technology succession and human resource development will be introduced. (author)

  18. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    Science.gov (United States)

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  19. Information technology as a tool for the Italian Institute of Social Security (INPS) in the management of social security and civil disability: Pro and cons.

    Science.gov (United States)

    Sammicheli, Michele; Scaglione, Marcella

    2018-01-01

    We examine, from a medical-legal perspective, the pro and cons of the information technology procedures that the Italian Institute of Social Security (INPS) has implemented to manage the provision of social disability assistance, meaning that separate from the payment of pension contributions, being welfare, anchored to an administrative requirement by way of the compulsory payment of a minimum social security contribution.

  20. Technology transfer and international development: Materials and manufacturing technology

    Science.gov (United States)

    1982-01-01

    Policy oriented studies on technological development in several relatively advanced developing countries were conducted. Priority sectors defined in terms of technological sophistication, capital intensity, value added, and export potential were studied in Brazil, Venezuela, Israel, and Korea. The development of technological policy alternatives for the sponsoring country is assessed. Much emphasis is placed on understanding the dynamics of the sectors through structured interviews with a large sample of firms in the leading manufacturing and materials processing sectors.

  1. Human Development Index and Efficiency level of Social Security Hospitals

    Directory of Open Access Journals (Sweden)

    H. Sepehrdost

    2012-04-01

    Full Text Available Introduction & Objective: Hospitals as one of the main institutions providing health care services play an important role in the health system and allocate a high percentage of health sector's budget to them. This study aimed to answer whether social security hospitals efficiency levels are the same for all provinces in Iran? And whether any relationship exists between the human development indexes (HDI of the provinces and technical efficiency levels of the hospitals?Materials & Methods: Data envelopment analysis model has been used to measure technical efficiency of 65 social security hospitals, including small hospitals (working with lower than one hundred active beds and large hospitals (working with over one hundred active beds during the years 2007 to 2009. Further, the relationship between human development index and technical efficiency of hospitals in the provinces has been analyzed.Results: Results show that the average technical efficiency of small and large hospitals working in low and medium HDI provinces (0.912 and 0.937 are more than the average technical efficiency of hospitals in higher HDI provinces (0.870 and 0.887.Conclusion: It is recommended that social security organization concentrated distribute its hospital services in provinces with lower HDI and higher density of population living under the coverage of organization’s insurance. This will eventually puts its positive effects on per capita income of people, as well as more equitable distribution of income. (Sci J Hamadan Univ Med Sci 2012;19(1:32-38

  2. Development of international guidelines for RAM shipment security

    International Nuclear Information System (INIS)

    Luna, R.E.

    2004-01-01

    In October of 2003 a weeklong IAEA Technical Meeting developed a set of guidelines for providing security to consignments of radioactive materials in transport. These guidelines will be published shortly in an IAEA TECDOC. The guidelines produced reflect consideration of many influences and concerns that currently revolve around the potential for terrorist use of radioactive material for malevolent ends. The influences discussed here include: public perception of hazard and concern that new requirements will further limit global shipping capability, international efforts to control sealed sources, national efforts to increment protection on selected materials, the basis for exemption of materials, concern for cost impacts of overly broad requirements, questions on how to adjust requirements for a national threat assessment, and issues relating to consistency within the international community on security needs

  3. Development of international guidelines for RAM shipment security

    Energy Technology Data Exchange (ETDEWEB)

    Luna, R.E.

    2004-07-01

    In October of 2003 a weeklong IAEA Technical Meeting developed a set of guidelines for providing security to consignments of radioactive materials in transport. These guidelines will be published shortly in an IAEA TECDOC. The guidelines produced reflect consideration of many influences and concerns that currently revolve around the potential for terrorist use of radioactive material for malevolent ends. The influences discussed here include: public perception of hazard and concern that new requirements will further limit global shipping capability, international efforts to control sealed sources, national efforts to increment protection on selected materials, the basis for exemption of materials, concern for cost impacts of overly broad requirements, questions on how to adjust requirements for a national threat assessment, and issues relating to consistency within the international community on security needs.

  4. Technologies for security, military police, and professional policing organizations: the Department of Energy perspective

    Science.gov (United States)

    Steele, Basil J.

    1997-01-01

    There are many emerging technologies that can be used to help the law enforcement community protect the public as well as public and private facilities against ever increasing threats to this country and its resources. These technologies include sensors, closed circuit television (CCTV), access control, contraband detection, communications, control and display, barriers, and various component and system modeling techniques. This paper will introduce some of the various technologies that have been examined for the Department of Energy that could be applied to various law enforcement applications. They include: scannerless laser radar; next generation security systems; response force video information helmet system; access delay technologies; rapidly deployable intrusion detection systems; cost risk benefit analysis.

  5. Engineering research, development and technology. Thrust area report, FY93

    Energy Technology Data Exchange (ETDEWEB)

    1994-05-01

    The mission of the Engineering Research, Development, and Technology Program at Lawrence Livermore National Laboratory (LLNL) is to develop the technical staff, tools, and facilities needed to support current and future LLNL programs. The efforts are guided by a dual-benefit research and development strategy that supports Department of Energy missions, such as national security through nuclear deterrence and economic competitiveness through partnerships with U.S. industry. This annual report, organized by thrust area, describes the activities for the fiscal year 1993. The report provides timely summaries of objectives, methods, and results from nine thrust areas for this fiscal year: Computational Electronics and Electromagnetics; Computational Mechanics; Diagnostics and Microelectronics; Fabrication Technology; Materials Science and Engineering; Power Conversion Technologies; Nondestructive Evaluation; Remote Sensing, Imaging, and Signal Engineering; and Emerging Technologies. Separate abstracts were prepared for 47 papers in this report.

  6. Information Technology Management: Social Security Administration Practices Can Be Improved

    National Research Council Canada - National Science Library

    Shaw, Clay

    2001-01-01

    ...) develop and maintain selection criteria that include explicit cost, benefit, schedule, and risk criteria to facilitate the objective analysis, comparison, prioritization, and selection of IT investments; (3...

  7. Demographic-Based Perceptions of Adequacy of Software Security's Presence within Individual Phases of the Software Development Life Cycle

    Science.gov (United States)

    Kramer, Aleksey

    2013-01-01

    The topic of software security has become paramount in information technology (IT) related scholarly research. Researchers have addressed numerous software security topics touching on all phases of the Software Development Life Cycle (SDLC): requirements gathering phase, design phase, development phase, testing phase, and maintenance phase.…

  8. Nuclear Safeguards Infrastructure Development and Integration with Safety and Security

    International Nuclear Information System (INIS)

    Kovacic, Donald N.; Raffo-Caiado, Ana Claudia; McClelland-Kerr, John; Van sickle, Matthew; Bissani, Mo

    2009-01-01

    Faced with increasing global energy demands, many developing countries are considering building their first nuclear power plant. As a country embarks upon or expands its nuclear power program, it should consider how it will address the 19 issues laid out in the International Atomic Energy Agency (IAEA) document Milestones in Development of a National Infrastructure for Nuclear Power. One of those issues specifically addresses the international nonproliferation treaties and commitments and the implementation of safeguards to prevent diversion of nuclear material from peaceful purposes to nuclear weapons. Given the many legislative, economic, financial, environmental, operational, and other considerations preoccupying their planners, it is often difficult for countries to focus on developing the core strengths needed for effective safeguards implementation. Typically, these countries either have no nuclear experience or it is limited to the operation of research reactors used for radioisotope development and scientific research. As a result, their capacity to apply safeguards and manage fuel operations for a nuclear power program is limited. This paper argues that to address the safeguards issue effectively, a holistic approach must be taken to integrate safeguards with the other IAEA issues including safety and security - sometimes referred to as the '3S' concept. Taking a holistic approach means that a country must consider safeguards within the context of its entire nuclear power program, including operations best practices, safety, and security as well as integration with its larger nonproliferation commitments. The Department of Energy/National Nuclear Security Administration's International Nuclear Safeguards and Engagement Program (INSEP) has been involved in bilateral technical cooperation programs for over 20 years to promote nonproliferation and the peaceful uses of nuclear energy. INSEP is currently spearheading efforts to promote the development of

  9. Food safety and quality through radiation technology: its implications to national security

    Energy Technology Data Exchange (ETDEWEB)

    Lanuza, Luvimina G.

    2012-08-15

    tests showed that the dose used did not modify the sensory properties in such a way that they were detected by both sets of respondents. The study recommended that food irradiation technology be adopted by the national government as one of the means to achieve national food security. The results of this study provide science-based evidence in collaborating previous studies on the role of food irradiation technology in ensuring food security such as when used for post-harvest treatment of agricultural crops and for quarantine treatment of fruits and vegetables for export. It must, however, be recognized that the general population may still have fear of radiation. As such, a concerted effort using the quad-media and other government instrumentalities be utilized to effect a paradigm shift of the populace and increase public awareness and acceptance of irradiated food. One can rightly say that food irradiation technology is a tool for national development, and enhances national security through food security. (author)

  10. Food safety and quality through radiation technology: its implications to national security

    International Nuclear Information System (INIS)

    Lanuza, Luvimina G.

    2012-08-01

    showed that the dose used did not modify the sensory properties in such a way that they were detected by both sets of respondents. The study recommended that food irradiation technology be adopted by the national government as one of the means to achieve national food security. The results of this study provide science-based evidence in collaborating previous studies on the role of food irradiation technology in ensuring food security such as when used for post-harvest treatment of agricultural crops and for quarantine treatment of fruits and vegetables for export. It must, however, be recognized that the general population may still have fear of radiation. As such, a concerted effort using the quad-media and other government instrumentalities be utilized to effect a paradigm shift of the populace and increase public awareness and acceptance of irradiated food. One can rightly say that food irradiation technology is a tool for national development, and enhances national security through food security. (author)

  11. Evaluating Factors of Security Policy on Information Security Effectiveness in Developing Nations: A Case of Nigeria

    Science.gov (United States)

    Okolo, Nkiru Benjamin

    2016-01-01

    Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…

  12. Arctic Energy Technology Development Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Sukumar Bandopadhyay; Charles Chamberlin; Robert Chaney; Gang Chen; Godwin Chukwu; James Clough; Steve Colt; Anthony Covescek; Robert Crosby; Abhijit Dandekar; Paul Decker; Brandon Galloway; Rajive Ganguli; Catherine Hanks; Rich Haut; Kristie Hilton; Larry Hinzman; Gwen Holdman; Kristie Holland; Robert Hunter; Ron Johnson; Thomas Johnson; Doug Kame; Mikhail Kaneveskly; Tristan Kenny; Santanu Khataniar; Abhijeet Kulkami; Peter Lehman; Mary Beth Leigh; Jenn-Tai Liang; Michael Lilly; Chuen-Sen Lin; Paul Martin; Pete McGrail; Dan Miller; Debasmita Misra; Nagendra Nagabhushana; David Ogbe; Amanda Osborne; Antoinette Owen; Sharish Patil; Rocky Reifenstuhl; Doug Reynolds; Eric Robertson; Todd Schaef; Jack Schmid; Yuri Shur; Arion Tussing; Jack Walker; Katey Walter; Shannon Watson; Daniel White; Gregory White; Mark White; Richard Wies; Tom Williams; Dennis Witmer; Craig Wollard; Tao Zhu

    2008-12-31

    The Arctic Energy Technology Development Laboratory was created by the University of Alaska Fairbanks in response to a congressionally mandated funding opportunity through the U.S. Department of Energy (DOE), specifically to encourage research partnerships between the university, the Alaskan energy industry, and the DOE. The enabling legislation permitted research in a broad variety of topics particularly of interest to Alaska, including providing more efficient and economical electrical power generation in rural villages, as well as research in coal, oil, and gas. The contract was managed as a cooperative research agreement, with active project monitoring and management from the DOE. In the eight years of this partnership, approximately 30 projects were funded and completed. These projects, which were selected using an industry panel of Alaskan energy industry engineers and managers, cover a wide range of topics, such as diesel engine efficiency, fuel cells, coal combustion, methane gas hydrates, heavy oil recovery, and water issues associated with ice road construction in the oil fields of the North Slope. Each project was managed as a separate DOE contract, and the final technical report for each completed project is included with this final report. The intent of this process was to address the energy research needs of Alaska and to develop research capability at the university. As such, the intent from the beginning of this process was to encourage development of partnerships and skills that would permit a transition to direct competitive funding opportunities managed from funding sources. This project has succeeded at both the individual project level and at the institutional development level, as many of the researchers at the university are currently submitting proposals to funding agencies, with some success.

  13. INTELLIGENT NETWORKS, SMART GRIDS CONCEPT, CRUCIAL TECHNOLOGIES FOR SUSTAINABLE DEVELOPMENT

    Directory of Open Access Journals (Sweden)

    Constantin RADU

    2011-05-01

    Full Text Available In this article is presented the concept of smart grids, a very important technology for sustainable development. In the context of globalization of the world lives in an increasingly complex security environment, with rapid changes, some obvious, others less obvious implications in the short, medium or long term, international, national, local and up to every citizen. All countries in the globalized world economy is facing energy problems in terms of climate change have intensified in the twentieth century.

  14. Information Technology Management: Social Security Administration Practices Can Be Improved

    National Research Council Canada - National Science Library

    Shaw, Clay

    2001-01-01

    ...: In the investment management area, (1) develop and implement a process guide that establishes the policies, procedures, and key criteria for conducting the IT investment management process and guiding executive staff operations; (2...

  15. Guidelines for developing NASA (National Aeronautics and Space Administration) ADP security risk management plans

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    This report presents guidance to NASA Computer security officials for developing ADP security risk management plans. The six components of the risk management process are identified and discussed. Guidance is presented on how to manage security risks that have been identified during a risk analysis performed at a data processing facility or during the security evaluation of an application system.

  16. Development of Core Design Technology for LMR

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Yeong Il; Hong, S. G.; Jang, J. W. (and others)

    2007-06-15

    This report describes the contents of core design technology and computer code system development performed during 2005 and 2006 on the objects of nuclear proliferation resistant core and nuclear fuel basic key technology development security. Also, it is including the future application plans for the results and the developed methodology, important information and the materials acquired in this period. Two core designs with single enrichment were considered for the KALIMER-600 during the first year : 1) the first core uses the non-fuel rods such as B4C, ZrH1.8, and dummy rods, 2) the core using different cladding thickness for each core region (inner, middle, and outer cores) without non-fuel rods to flatten the power distribution. In particular, the latter design was intended to simplify the fuel assembly design by eliminating the heterogeneity. It was found that the proposed design satisfy all of the Gen IV SFR design goals on the cycle length longer than 18 EFPM, fuel discharge burnup larger than 80GWd/t, sodium void worth, conversion ratio, reactivity burnup swing and so on. For this object reactor, the structure integrity outside of reactor is confirmed for the radiation exposure during the plant life according to the result of shielding design and evaluation. The transmutation capability and the core characteristics of sodium cooled fast reactor was also evaluated according to the change of MA amount. The reactivity coefficients for the BN-600 reactor with MA fueled are calculated and the results are compared and evaluated with other participants results. Even though the discrepancies between the results of participants are somewhat large but the K-CORE results are close to the average within a standard deviation. To have the capability of 3-dimensional core dynamic analysis such as analyzing power distribution and reactivity variations according to the asymmetric insertion/withdrawal of control rods, the calculation module for core dynamic parameters was

  17. Risk, security and technology: governing football supporters in the twenty-first century

    NARCIS (Netherlands)

    Spaaij, R.

    2013-01-01

    This paper critically examines the security and risk management technologies that are being used to conduct and pre-empt the behaviour of football supporters. It is shown how, in the Netherlands, pre-emptive risk management in the governing of football supporters involves a dispersed and fragmented

  18. 48 CFR 352.239-72 - Security requirements for Federal information technology resources.

    Science.gov (United States)

    2010-10-01

    ..., Security Self-Assessment Guide for Information Technology Systems and FIPS 200, on an annual basis. (C) HHS... basis, the Contractor shall provide to the Contracting Officer verification that the IT-SP remains valid... Contracting Officer verification that the IT-SC&A remains valid. Evidence of a valid system accreditation...

  19. Gender Differences in the Field of Information Security Technology Management: A Qualitative, Phenomenological Study

    Science.gov (United States)

    Johnson, Marcia L.

    2013-01-01

    This qualitative study explored why there are so few senior women in the information security technology management field and whether gender played a part in the achievement of women in the field. Extensive interviews were performed to capture the lived experiences of successful women in the field regarding the obstacles and common denominators of…

  20. 77 FR 57072 - Proposed Information Collection; Comment Request; National Security and Critical Technology...

    Science.gov (United States)

    2012-09-17

    ..., DC 20230 (or via the Internet at [email protected] ). FOR FURTHER INFORMATION CONTACT: Requests for... techniques or other forms of information technology. Comments submitted in response to this notice will be... DEPARTMENT OF COMMERCE Bureau of Industry and Security Proposed Information Collection; Comment...

  1. Turkey’s Strategy towards Afghanistan: Security and Development Assistance

    Directory of Open Access Journals (Sweden)

    Altunay Ilgar Aliyeva

    2016-01-01

    Full Text Available Providing assistance to the least developed countries has remained one of the top priorities for leading international actors in the XXI century, and the Republic of Turkey is no exception in this regard. The Justice and Development Party's ascension to power in 2002 led to a drastic revision of the Turkish foreign policy and adoption of a novel approach to the least developed countries accounting for the complex interdependence between security and development. This approach was tested in Afghanistan where Turkey contributed to both post-conflict reconstruction of the country and to the activities of the International Security Assistance Force (ISAF. Since 2015 Turkey has been actively engaged in the new NATO 'Resolute Support' mission, while continuing its economic support to Afghanistan on bilateral and multilateral basis. This paper aims to unveil the particularities of the Turkey's Afghan strategy, which has yet escaped the Russian scholars' attention, with the help of the Turkish primary sources and academic works. It studies the specificity of bilateral relations and their determinants, including historic ties and religious and cultural proximity. It provides an in-depth analysis of the activities of both Turkish Cooperation and Development Agency (TIKA and the Turkish Provincial Reconstruction Team (PRT in Afghanistan and examines the challenges of Turkish troops' presence on the Afghan soil and the way how the Turkish elites and Turkey's NATO allies perceive it.

  2. International: development, the petroleum, security for the least developing countries

    International Nuclear Information System (INIS)

    Anon.

    2004-01-01

    The annual report of the CNUCED presents the economic situation improvement of the developing countries, those which benefit from petroleum resources. The CNUCED worries on the durability of the economic improvement of these countries. (A.L.B.)

  3. Combining technologies - radiography and neutron based - for cargo security applications

    International Nuclear Information System (INIS)

    Gozani, T.; Liu, F.; Sivakumar, M.; Brown, D.

    2004-01-01

    Inspection of air and sea cargo has traditionally been done by X-ray systems of various energies relying on operators to analyze images looking for anomalies in the image of cargo that may signify a threat. This has shown only limited success in detecting explosives and other threats, which do not have any distinctive shapes. OSI Systems, through its subsidiaries Rapiscan and Ancore, has combined high-energy x-ray radiography with thermal neutron analysis (TNA) to create the combined system-''TNX''. The system provides automatic material specific detection of bulk threat items, like explosives, while furnishing the operator with a high-resolution image for weapons detection and also to identify anomalies for the TNA to inspect. Similarly the Pulsed Fast Neutron Analysis (PFNA) can be combined with high-energy x-ray to create a ''FNX'' system for both air and sea cargo applications. This enables the operator obtain a three dimensional image of the material composition of the cargo under inspection and remove the clutter from the image leaving only the potentially hazardous material(s) automatically while viewing a high resolution image for manifest verification and weapons. The current status of the technology will be discussed and data be presented

  4. Cooperative technology development: An approach to advancing energy technology

    International Nuclear Information System (INIS)

    Stern, T.

    1989-09-01

    Technology development requires an enormous financial investment over a long period of time. Scarce national and corporate resources, the result of highly competitive markets, decreased profit margins, wide currency fluctuations, and growing debt, often preclude continuous development of energy technology by single entities, i.e., corporations, institutions, or nations. Although the energy needs of the developed world are generally being met by existing institutions, it is becoming increasingly clear that existing capital formation and technology transfer structures have failed to aid developing nations in meeting their growing electricity needs. This paper will describe a method for meeting the electricity needs of the developing world through technology transfer and international cooperative technology development. The role of nuclear power and the advanced passive plant design will be discussed. (author)

  5. China boosts support for IAEA development and security initiatives

    International Nuclear Information System (INIS)

    2004-01-01

    Full text: Marking 20 years of cooperation with the International Atomic Energy Agency (IAEA), China announced today that it would donate US$1 million to IAEA's special funds for technical cooperation and enhanced nuclear security. Welcoming the contribution, IAEA Director General Mohamed ElBaradei said, 'The IAEA is grateful for China's continuing generosity in supporting our technical cooperation and security programmes in the nuclear field. The IAEA has forged an excellent partnership with China over the past two decades - one of the most far-reaching partnerships we have with any Member State, extending across the spectrum of IAEA work from safety and security, to safeguards and verification, to technical cooperation in food, energy, water and health. China has been both a major recipient and contributor to IAEA special funds since it joined the IAEA in 1984. China has been an active participant in the IAEA Technical Cooperation (TC) programme, receiving more than US$22 million in assistance through 103 TC projects, in particular in the fields of nuclear safety, engineering and technology. China has also been a major contributor to the TC Fund, with some $11 million in cash and $400,000 of in-kind support. The IAEA's TC Programme disburses more than US$75 million worth of expert services, fellowships, equipment and training workshops per year in approximately 110 countries and territories. The Agency works in partnership with project counterparts in the recipient Member States, typically in the government's atomic energy authority as well as with health, food and agriculture, environment and water authorities. In addition, The Agency collaborates with the World Bank and other UN organizations to plan and execute projects in harmony with Member States' needs. In March 2002, the IAEA launched a 'Plan of Activities to Protect Against Nuclear Terrorism,' which enhanced and integrated the Agency's existing nuclear security-related activities. These activities

  6. Robotics Technology Development Program Cross Cutting and Advanced Technology

    International Nuclear Information System (INIS)

    Harrigan, R.W.; Horschel, D.S.

    1994-01-01

    Need-based cross cutting technology is being developed which is broadly applicable to the clean up of hazardous and radioactive waste within the US Department of Energy's complex. Highly modular, reusable technologies which plug into integrated system architectures to meet specific robotic needs result from this research. In addition, advanced technologies which significantly extend current capabilities such as automated planning and sensor-based control in unstructured environments for remote system operation are also being developed and rapidly integrated into operating systems

  7. Development of Stable Isotope Technology

    International Nuclear Information System (INIS)

    Jeong, Do Young; Kim, Cheol Jung; Han, Jae Min

    2009-03-01

    KAERI has obtained an advanced technology with singular originality for laser stable isotope separation. Objectives for this project are to get production technology of Tl-203 stable isotope used for medical application and are to establish the foundation of the pilot system, while we are taking aim at 'Laser Isotope Separation Technology to make resistance to the nuclear proliferation'. And we will contribute to ensuring a nuclear transparency in the world society by taking part in a practical group of NSG and being collaboration with various international groups related to stable isotope separation technology

  8. Open Technology Development: Roadmap Plan

    National Research Council Canada - National Science Library

    Herz, J. C; Lucas, Mark; Scott, John

    2006-01-01

    .... Collaborative and distributed online tools; and 4. Technological Agility. Open standards and interfaces were initially established through ARPA and distributed via open source software reference implementations...

  9. HTGR technology development: status and direction

    International Nuclear Information System (INIS)

    Kasten, P.R.

    1982-01-01

    During the last two years there has been an extensive and comprehensive effort expended primarily by General Atomic (GA) in generating a revised technology development plan. Oak Ridge National Laboratory (ORNL) has assisted in this effort, primarily through its interactions over the past years in working together with GA in technology development, but also through detailed review of the initial versions of the technology development plan as prepared by GA. The plan covers Fuel Technology, Materials Technology (including metals, graphite, and ceramics), Plant Technology (including methods, safety, structures, systems, heat exchangers, control and electrical, and mechanical), and Component Design Verification and Support areas

  10. Food Security, Institutional Framework and Technology: Examining the Nexus in Nigeria Using ARDL Approach.

    Science.gov (United States)

    Osabohien, Romanus; Osabuohien, Evans; Urhie, Ese

    2018-04-01

    Growth in agricultural science and technology is deemed essential for in-creasing agricultural output; reduce the vulnerability of rural poverty and in turn, food security. Food security and growth in agricultural output depends on technological usages, which enhances the pro-ductive capacity of the agricultural sector. The indicators of food security utilised in this study in-clude: dietary energy supply, average value of food production, prevalence of food inadequacy, among others. In this paper, we examined the level of technology and how investment in the agriculture and technology can improve technical know-how in Nigeria with a view to achieving food security. We carried out the analysis on how investment in technology and institutional framework can improve the level of food availability (a key component of food security) in Nigeria using econ-ometric technique based on Autoregressive Distribution Lag (ARDL) framework. The results showed, inter alia, that in Nigeria, there is a high level of food insecurity as a result of low attention on food production occasioned by the pervasive influence of oil that become the major export product. It was noted that the availability of arable land was one of the major factors to increase food production to solve the challenge of food insecurity. Thus, the efforts of reducing the rate of food insecurity are essential in this regards. This can also be achieved, among others, by active interactions between government and farmers, to make contribution to important planning issues that relate to food production in the country and above all, social protection policies should be geared or channelled to agricultural sector to protect farmers who are vulnerable to shocks and avert risks associated with agriculture.

  11. An Overview of SBIR Phase 2 Communications Technology and Development

    Science.gov (United States)

    Nguyen, Hung D.; Steele, Gynelle C.

    2015-01-01

    Technological innovation is the overall focus of NASA's Small Business Innovation Research (SBIR) program. The program invests in the development of innovative concepts and technologies to help NASA's mission directorates address critical research and development needs for agency projects. This report highlights innovative SBIR Phase II projects from 2007-2012 specifically addressing areas in Communications Technology and Development which is one of six core competencies at NASA Glenn Research Center. There are eighteen technologies featured with emphasis on a wide spectrum of applications such as with a security-enhanced autonomous network management, secure communications using on-demand single photons, cognitive software-defined radio, spacesuit audio systems, multiband photonic phased-array antenna, and much more. Each article in this booklet describes an innovation, technical objective, and highlights NASA commercial and industrial applications. This report serves as an opportunity for NASA personnel including engineers, researchers, and program managers to learn of NASA SBIR's capabilities that might be crosscutting into this technology area. As the result, it would cause collaborations and partnerships between the small companies and NASA Programs and Projects resulting in benefit to both SBIR companies and NASA.

  12. Engineering Research, Development and Technology, FY95: Thrust area report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-02-01

    The mission of the Engineering Research, Development, and Technology Program at Lawrence Livermore National Laboratory (LLNL) is to develop the knowledge base, process technologies, specialized equipment, tools and facilities to support current and future LLNL programs. Engineering`s efforts are guided by a strategy that results in dual benefit: first, in support of Department of Energy missions, such as national security through nuclear deterrence; and second, in enhancing the nation`s economic competitiveness through their collaboration with US industry in pursuit of the most cost-effective engineering solutions to LLNL programs. To accomplish this mission, the Engineering Research, Development, and Technology Program has two important goals: (1) identify key technologies relevant to LLNL programs where they can establish unique competencies, and (2) conduct high-quality research and development to enhance their capabilities and establish themselves as the world leaders in these technologies. To focus Engineering`s efforts, technology thrust areas are identified and technical leaders are selected for each area. The thrust areas are comprised of integrated engineering activities, staffed by personnel from the nine electronics and mechanical engineering divisions, and from other LLNL organizations. This annual report, organized by thrust area, describes Engineering`s activities for fiscal year 1995. The report provides timely summaries of objectives methods, and key results from eight thrust areas: computational electronics and electromagnetics; computational mechanics; microtechnology; manufacturing technology; materials science and engineering; power conversion technologies; nondestructive evaluation; and information engineering.

  13. The role of food-security solutions in the protection of natural resources and environment of developing countries.

    Science.gov (United States)

    Lashgarara, Farhad; Mirdamadi, Seyyed Mehdi; Hosseini, Seyyed Jamal Farajollah; Chizari, Mohammad

    2008-10-01

    The majority of the countries of the world, especially developing countries, face environmental problems. Limitations of basic resources (water and soil) and population growth have been the cause of these environmental problems that countries are confronted with. Developing countries have numerous problems, including destruction of forests, vegetable and animal species, and pollution of the environment. Damage to natural resources and the environment can influence the food-security situation. One of the main millennium development goals (MDGs) is protection of the environment and people's health. This cannot obtained unless there is ensured food security. Food security has been defined as a situation when all people, at all times, have physical and economic access to sufficient, safe, and nutritious food needed to maintain a healthy and active life. At the same time, with ensured food security, we can hope to protect the natural resources and environment. The methodology used is descriptive-analytical, and its main purpose is determining the importance and role of food-security solutions in the reduction of environmental hazards and improvement of natural resources and the environmental situation in developing countries. Therefore, some of the most important food-security solutions that can play an important role in this relation were discussed, including conventional research-based technology, biotechnology, information and communication technologies (ICTs), alternative energy sources, and food irradiation.

  14. Survey of current technologies of security management for distributed information systems; Bunsangata joho system no security iji kanri hoshiki no genjo

    Energy Technology Data Exchange (ETDEWEB)

    Matsui, S [Central Research Institute of Electric Power Industry, Tokyo (Japan)

    1997-05-01

    The latest situation of the security management for a distributed information system was examined and systematically summarized to indicate the management design in future. This paper describes the threat of the distributed information system to security, the risk for confidentiality, integrity, and availability due to the threat, and the measures to be taken. The basic technology of security management is classified into the `user certification to prevent an incorrect access` and the `encipherment to prevent data from being used incorrectly.` The technology for certification has been almost completed. It can be securely done using an expendable password or IC card system. In Internet, multiple enciphering technologies for constructing a virtual private network that can secure the almost the same security as for a private network can be used. In an electronic mail, the enciphering technology can also be used easily. The tool that manages the security of very many servers, clients, and networks is in the initial stage. 16 refs., 1 fig., 5 tabs.

  15. Safeguards and Security Research and Development progress report, October 1990--September 1991

    International Nuclear Information System (INIS)

    Smith, D.B.; Jaramillo, G.R.

    1992-07-01

    This report describes the activities carried out by the Los Alamos Safeguards and Security Research And Development (R ampersand D) program from October 1990 through September 1991. The activities presented in the first three parts--Science and Technology Base Development, Basic Systems Design, and Onsite Test and Evaluation and Facility Support--were, for the most part, sponsored by the Department of Energy's Office of Safeguards and Security (DOE/OSS). The activities described in Part 4--International Safeguards--were supported by the International Safeguards Division of the Office of Arms Control and Nonproliferation (OACN/IS). Part 5 describes several safeguards or safeguards-related activities that have sponsors other than the DOE/OSS or OACN/IS. The final part of the report lists titles and abstracts of Los Alamos safeguards R ampersand D reports, technical journal articles, and conference papers that were published in 1991

  16. Development of information security and vulnerability risk management system for J-PARC

    International Nuclear Information System (INIS)

    Ishikawa, Hiroyuki; Tate, Akihiro; Murakami, Tadashi

    2012-02-01

    In J-PARC (Japan Proton Accelerator Research Complex) we have set up intra-network (internal network, we will abbreviate it as JLAN, below) to support research activity and communication among users. In JLAN, we set up various kinds of security devices to keep JLAN secure. However, the servers which provide information or service to public are still in danger of being accessed illegally. If there is an illegal access, that may cause defacement of data or information leak. Furthermore, the victim servers are manipulated by the malicious attackers, and they themselves attack the external information equipments. Vulnerability of servers enables unauthorized access. So, vulnerability test with use of a vulnerability tool is one of the most effective ways to take measures for vulnerability of the equipments. However, it is not enough to just conduct a vulnerability test. It is also essential for information security to take measures to cover constantly for the vulnerability of servers. We focused on the points above, and developed the vulnerability testing system for security. It is not only a testing tool for the vulnerability of servers, but also management system which enables the server administrators in charge of taking measures for vulnerabilities to manage risks and handles PDCA (Plan-Do-Check-Action) cycles as countermeasure for vulnerability. In this paper, we report the technologies and ingenuities for the development of the above system. (author)

  17. Development of superconductor application technology

    Energy Technology Data Exchange (ETDEWEB)

    Hong, G W; Kim, C J; Lee, H G; Lee, H J; Kim, K B; Won, D Y; Jang, K I; Kwon, S C; Kim, W J; Ji, Y A; Yang, S W; Kim, W K; Park, S D; Lee, M H; Lee, D M; Park, H W; Yu, J K; Lee, I S; Kim, J J; Choi, H S; Chu, Y; Kim, Y S; Kim, D H

    1997-09-01

    Fabrication of high Tc bulk superconductor and its application, fabrication of superconducting wire for electric power device and analysis for cryogenic system were carried out for developing superconductor application technologies for electric power system. High quality YBaCuO bulk superconductor was fabricated by controlling initial powder preparation process and prototype flywheel energy storage device was designed basically. The superconducting levitation force measuring device was made to examine the property of prepared superconductor specimen. Systematic studies onthe method of starting powder preparation, mechanical fabrication process, heat treatment condition and analysis of plastic deformation were carried out to increase the stability and reproducibility of superconducting wire. A starting power with good reactivity and fine particle size was obtained by mechanical grinding, control of phase assemblage, and emulsion drying method. Ag/BSCCO tape with good cross sectional shape and Jc of 20,000 A/cm{sup 2} was fabricated by applying CIP packing procedure. Multifilamentary wire with Jc of 10,000 A/cm{sup 2} was fabricated by rolling method using square billet as starting shape. The joining of the multifilamentary wire was done by etching and pressing process and showed 50% of joining efficiency. Analysis on the heat loss in cryostat for high Tc superconducting device was carried out for optimum design of the future cryogenic system. (author). 66 refs., 104 figs.

  18. Development of superconductor application technology

    International Nuclear Information System (INIS)

    Hong, G. W.; Kim, C. J.; Lee, H. G.; Lee, H. J.; Kim, K. B.; Won, D. Y.; Jang, K. I.; Kwon, S. C.; Kim, W. J.; Ji, Y. A.; Yang, S. W.; Kim, W. K.; Park, S. D.; Lee, M. H.; Lee, D. M.; Park, H. W.; Yu, J. K.; Lee, I. S.; Kim, J. J.; Choi, H. S.; Chu, Y.; Kim, Y. S.; Kim, D. H.

    1997-09-01

    Fabrication of high Tc bulk superconductor and its application, fabrication of superconducting wire for electric power device and analysis for cryogenic system were carried out for developing superconductor application technologies for electric power system. High quality YBaCuO bulk superconductor was fabricated by controlling initial powder preparation process and prototype flywheel energy storage device was designed basically. The superconducting levitation force measuring device was made to examine the property of prepared superconductor specimen. Systematic studies onthe method of starting powder preparation, mechanical fabrication process, heat treatment condition and analysis of plastic deformation were carried out to increase the stability and reproducibility of superconducting wire. A starting power with good reactivity and fine particle size was obtained by mechanical grinding, control of phase assemblage, and emulsion drying method. Ag/BSCCO tape with good cross sectional shape and Jc of 20,000 A/cm 2 was fabricated by applying CIP packing procedure. Multifilamentary wire with Jc of 10,000 A/cm 2 was fabricated by rolling method using square billet as starting shape. The joining of the multifilamentary wire was done by etching and pressing process and showed 50% of joining efficiency. Analysis on the heat loss in cryostat for high Tc superconducting device was carried out for optimum design of the future cryogenic system. (author). 66 refs., 104 figs

  19. International Security, Development, and Human Rights: Policy Conversion or Conflict?

    Directory of Open Access Journals (Sweden)

    Miao-ling Lin Hasenkamp

    2012-04-01

    Full Text Available This article uses an institutional network governance approach to explore the overlapping dimension of the policy fields between security, development, and human rights, reflected in the US and German provincial reconstruction teams (PRTs in Afghanistan. The past two decades have witnessed a gradually changing paradigm in academic and policy debates regarding the questions of the normative basis of world order and possibilities for tackling imminent threats to security and peace (i.e. intra-state armed conflicts, failed states, terrorism, poverty, and deepening inequality. The introduction of concepts such as “human security” and “the right to humanitarian intervention/responsibility to protect (R2P” as well as critical examinations of peace-, nation-, and state-building missions (PNSB have led to a relativist tendency of state sovereignty and a changing attitude regarding how to address the intersection of security, development, and human rights. Despite this shift, the policy commitments to integrating these policy considerations remain puzzling. How have they been redefined, conceptualized, and put into practice? I argue that an integrated conceptual approach has facilitated the redefinition of common policy goals, principles, and the mobilization of resources. At the same time, civil and military cooperation, as demonstrated in the multifunctional work of PRTs, has been Janus-headed—permanently caught in an ongoing tension between the war on terror and short-term stability operation on the one hand and long-term durable peace and development on the other. The misunderstanding of its interim character, the dynamics of Afghan environment, the blurring of policy lines, and the differences between national PRT models have made it difficult to systematically assess the efficiency and legitimacy of each policy frame and program.

  20. Information and communication technologies for a greener economy. The development of new energy techniques and the energy transition toward a carbon-free economy that will be more secure and more competitive

    International Nuclear Information System (INIS)

    Chevet, Pierre-Franck

    2011-01-01

    To position France as a major player in new energy technology - similar to what the country achieved forty years ago in nuclear energy - the choice has been made to omit no resources. Through a wide range of measures for subsidizing innovations and chains of production in new energy technology, France is supporting, within the European energy market's framework, the emergence or consolidation of actors in technological domains as varied as solar thermodynamics, energy produced from the sea, smart energy networks or biofuels. Along with Sweden and Germany, France is now among the top European producers of energy from renewable sources

  1. National Strategy to Secure Cyberspace

    National Research Council Canada - National Science Library

    Schwalm, Keith T

    2006-01-01

    ... of a national strategy for securing cyberspace. The approach explored the development of cyber technology strategies and programs related to the mission and roles of Homeland Security Advanced Research Projects Agency...

  2. The Evolving Relationship Between Technology and National Security in China: Innovation, Defense Transformation, and China’s Place in the Global Technology Order

    Science.gov (United States)

    2016-02-12

    Stockmann, Xiao Qiang. Changing Media, Changing China , New York: Oxford University Press, (01 2011) Dieter Ernst. Indigenous Innovation and...2211 China , science, technology, dual use, defense, security, innovation REPORT DOCUMENTATION PAGE 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 10...ABSTRACT Final Report: The Evolving Relationship Between Technology and National Security in China : Innovation , Defense Transformation, and China’s

  3. AND TECHNOLOGY FOR NATIONAL DEVELOPMENT

    African Journals Online (AJOL)

    within the interest and capabilities of all humans regardless of race, gender, national- ity or ethnicity (Byant & Swinton, ... and technology among men and women that are taken for granted have changed. The marginalization of .... Secondly, science and technology are perceived as powerful model for understanding and ...

  4. ENTREPRENEURSHIP ECONOMIC SAFETY AND DEVELOPMENT OF SECURITY SERVICES

    Directory of Open Access Journals (Sweden)

    G. V. Goudkov

    2011-01-01

    Full Text Available Successful functioning of the industry that provides for safety of organizations and physical entities exercises strategic impacts on development of society and economics of any state including Russia. Economic safety of Russia is directly linked with economic and information safety of itsbusiness structures. Extension of the scope and use of services offered by experienced state and private security enterprises including licensed individuals is one of most important directions of business safety perfection. Further improvement of Russian legislation on non-governmentalsecurity structures and coordination of their activities with those of state law enforcement bodies is obligatory condition of attaining higherpublic and economic safety levels.

  5. The Security and Development Nexus in Cape Town

    DEFF Research Database (Denmark)

    Jensen, Steffen Bo

    2010-01-01

    In this article, I argue that the security and development nexus takes on specific forms depending on the context, and that in Cape Town’s coloured townships it is embodied in policies and practices around what has come to be known as the ‘war on gangs’. Furthermore, the war on gangs in Cape Town...... bears resemblances to counterinsurgency strategies — not least in the sense that both are responses to a similar problem of governance. This comparison allows us explore how citizenship is being reconfigured for residents of the townships in ways that resemble what James Holston (2007) calls...

  6. Success factors in technology development

    Science.gov (United States)

    Preston, John T.

    1995-01-01

    Universities in the U.S. have a significant impact on business through the transfer of technology. This paper describes goals and philosophy of the Technology Licensing Office at the Massachusetts Institute of Technology. This paper also relates the critical factors for susscessful technology transfer, particularly relating to new business formation. These critical factors include the quality of the technology, the quality of the management, the quality of the investor, the passion for success, and the image of the company. Descriptions of three different levels of investment are also given and the most successful level of investment for starting a new company is reviewed. Licensing to large companies is also briefly reviewed, as this type of licensing requires some different strategies than that of licensing to start-up companies. High quality critical factors and intelligent investment create rewards for the parties and successful ventures.

  7. Success tree analysis on the technologies development for FBR commercialization

    International Nuclear Information System (INIS)

    An, Shigehiro; Taniyama, Hiroshi; Nagai, Hiroshi.

    1991-01-01

    In order to obtain a secure energy supply in future, it is important to establish a system for plutonium utilization via the FBR which is superior to the uranium utilization system with respect to both safety and good economics. In spite of this obvious need, the commercialization of the FBR is facing delays. Although several factors, for example, improvement of LWR technologies, stable supply of low cost uranium, opposition to nuclear power, etc. are contributors, the primary reason for the delay is the unfavorable economics of the FBR itself. In this paper the key technologies leading to reduced FBR costs are identified and their development strategies are discussed. (author)

  8. Arms and technology transfers: Security and economic considerations among importing and exporting states

    International Nuclear Information System (INIS)

    Lodgaard, S.; Pfaltzgraff, R.L. Jr.

    1995-01-01

    The issues of technology and armament transfers are increasingly at the forefront of problems of international security and disarmament. Three major reasons could explain this. First, the disarmament process has been very successful in the last few years, especially in the field of nuclear, as well chemical and conventional, weapons. Second the disarmament effort underway concerns primarily the old partners of the East-West confrontation. Last, the general context, characterized by the opening and widening of exchanges, the increasingly open and transparent circulation of techniques and material, and the globalization of economic relations, must be taken into account. This report, prepared by UNIDIR comprises the following subjects: General trends in defense related transfers; Political/military factors associated with the diffusion of advanced technology; economic and technological consideration; and facilitation of economic growth/maximization of regional security and stability

  9. Minapadi Development Strategy in Supporting National Food Security

    Science.gov (United States)

    Lestari, Sri; Bambang, Azis Nur

    2018-02-01

    Efforts to achieve food security, especially food self-sufficiency, face severe challenges. Intensification needs to be done in optimizing the existing land by applying integrated agriculture. One of them is by integrating agriculture and fishery aspect with implementation of minapadi. Minapadi cultivation has actually grown since a long time, but in the course of time this system Began displaced because of pesticides and chemical fertilizers. Become flagship Minapadi back in line with the increasing public awareness of the importance of sustainable environment, health, increasing demand for organic products that are free from pesticide residues which means safe for consumption. Minapadi is the answer to the fulfillment of people's need for carbohydrate and protein food. Blending the fulfillment of carbohydrates is rice as the staple food of most people with the fulfillment of animal protein from fish commodities to add nutritional value. In realizing the food security strategy is required Minapadi development. This descriptive research aims to find out various minapadi development strategies in several regions with different methods based on the literature and previous studies. The result is the formulation of minapadi development strategy in an area not necessarily can be applied in other areas.This occurs because of differences in setting criteria/ variables based on the characteristics and potential of a region, the strengths and opportunities, as well as the weaknesses and threats that the area may encounter.

  10. Leveraging multi-channel x-ray detector technology to improve quality metrics for industrial and security applications

    Science.gov (United States)

    Jimenez, Edward S.; Thompson, Kyle R.; Stohn, Adriana; Goodner, Ryan N.

    2017-09-01

    Sandia National Laboratories has recently developed the capability to acquire multi-channel radio- graphs for multiple research and development applications in industry and security. This capability allows for the acquisition of x-ray radiographs or sinogram data to be acquired at up to 300 keV with up to 128 channels per pixel. This work will investigate whether multiple quality metrics for computed tomography can actually benefit from binned projection data compared to traditionally acquired grayscale sinogram data. Features and metrics to be evaluated include the ability to dis- tinguish between two different materials with similar absorption properties, artifact reduction, and signal-to-noise for both raw data and reconstructed volumetric data. The impact of this technology to non-destructive evaluation, national security, and industry is wide-ranging and has to potential to improve upon many inspection methods such as dual-energy methods, material identification, object segmentation, and computer vision on radiographs.

  11. Relevance of Clean Coal Technology for India’s Energy Security: A Policy Perspective

    Science.gov (United States)

    Garg, Amit; Tiwari, Vineet; Vishwanathan, Saritha

    2017-07-01

    Climate change mitigation regimes are expected to impose constraints on the future use of fossil fuels in order to reduce greenhouse gas (GHG) emissions. In 2015, 41% of total final energy consumption and 64% of power generation in India came from coal. Although almost a sixth of the total coal based thermal power generation is now super critical pulverized coal technology, the average CO2 emissions from the Indian power sector are 0.82 kg-CO2/kWh, mainly driven by coal. India has large domestic coal reserves which give it adequate energy security. There is a need to find options that allow the continued use of coal while considering the need for GHG mitigation. This paper explores options of linking GHG emission mitigation and energy security from 2000 to 2050 using the AIM/Enduse model under Business-as-Usual scenario. Our simulation analysis suggests that advanced clean coal technologies options could provide promising solutions for reducing CO2 emissions by improving energy efficiencies. This paper concludes that integrating climate change security and energy security for India is possible with a large scale deployment of advanced coal combustion technologies in Indian energy systems along with other measures.

  12. Policy issues inherent in advanced technology development

    Energy Technology Data Exchange (ETDEWEB)

    Baumann, P.D.

    1994-12-31

    In the development of advanced technologies, there are several forces which are involved in the success of the development of those technologies. In the overall development of new technologies, a sufficient number of these forces must be present and working in order to have a successful opportunity at developing, introducing and integrating into the marketplace a new technology. This paper discusses some of these forces and how they enter into the equation for success in advanced technology research, development, demonstration, commercialization and deployment. This paper limits itself to programs which are generally governmental funded, which in essence represent most of the technology development efforts that provide defense, energy and environmental technological products. Along with the identification of these forces are some suggestions as to how changes may be brought about to better ensure success in a long term to attempt to minimize time and financial losses.

  13. Status of Irradiation technology development in JMTR

    International Nuclear Information System (INIS)

    Inaba, Y.; Inoue, S.; Izumo, H.; Kitagishi, S.; Tsuchiya, K.; Saito, T.; Ishitsuka, E.

    2008-01-01

    Irradiation Engineering Section of the Neutron Irradiation and Testing Reactor Center was organized to development the new irradiation technology for the application at JMTR re operation. The new irradiation engineering building was remodeled from the old RI development building, and was started to use from the end of September, 2008. Advanced in situ instrumentation technology (high temperature multi paired thermocouple, ceramic sensor, application of optical measurement), 99M o production technology by new Mo solution irradiation method, recycling technology on used beryllium reflector, and so on are planned as the development of new irradiation technologies. The development will be also important for the education and training programs through the development of young generation in not only Japan but also Asian counties. In this report, as the status of the development the new irradiation technology, new irradiation engineering building, high temperature multi paired thermocouple, experiences of optical measurement, recycling technology on used beryllium reflector are introduced

  14. Status of irradiation technology development in JMTR

    International Nuclear Information System (INIS)

    Inaba, Y.; Inoue, S.; Izumo, H.; Kitagishi, S.; Tsuchiya, K.; Saito, T.; Ishitsuka, E.

    2008-01-01

    Irradiation Engineering Section of the Neutron Irradiation and Testing Reactor Centre was organised to development the new irradiation technology for the application at JMTR re-operation. The new irradiation engineering building was remoulded from the old RI development building, and was started to use from the end of September, 2008. Advanced in-situ instrumentation technology(high temperature multi-paired thermocouple, ceramic sensor,application of optical measurement), 99 Mo production technology by new Mo solution irradiation method,recycling technology on used beryllium reflector, and so on are planned as the development of new irradiation technologies. The development will be also important for the education and training programs through the development of young generation in not only Japan but also Asian countries. In this report, as the status of the development the new irradiation technology, new irradiation engineering building, high temperature multi-paired thermocouple, experiences of optical measurement, recycling technology on used beryllium reflector are introduced

  15. Policy issues inherent in advanced technology development

    International Nuclear Information System (INIS)

    Baumann, P.D.

    1994-01-01

    In the development of advanced technologies, there are several forces which are involved in the success of the development of those technologies. In the overall development of new technologies, a sufficient number of these forces must be present and working in order to have a successful opportunity at developing, introducing and integrating into the marketplace a new technology. This paper discusses some of these forces and how they enter into the equation for success in advanced technology research, development, demonstration, commercialization and deployment. This paper limits itself to programs which are generally governmental funded, which in essence represent most of the technology development efforts that provide defense, energy and environmental technological products. Along with the identification of these forces are some suggestions as to how changes may be brought about to better ensure success in a long term to attempt to minimize time and financial losses

  16. Mobile Sensor Technologies Being Developed

    Science.gov (United States)

    Greer, Lawrence C.; Oberle, Lawrence G.

    2003-01-01

    The NASA Glenn Research Center is developing small mobile platforms for sensor placement, as well as methods for communicating between roving platforms and a central command location. The first part of this project is to use commercially available equipment to miniaturize an existing sensor platform. We developed a five-circuit-board suite, with an average board size of 1.5 by 3 cm. Shown in the preceding photograph, this suite provides all motor control, direction finding, and communications capabilities for a 27- by 21- by 40-mm prototype mobile platform. The second part of the project is to provide communications between mobile platforms, and also between multiple platforms and a central command location. This is accomplished with a low-power network labeled "SPAN," Sensor Platform Area Network, a local area network made up of proximity elements. In practice, these proximity elements are composed of fixed- and mobile-sensor-laden science packages that communicate to each other via radiofrequency links. Data in the network will be shared by a central command location that will pass information into and out of the network through its access to a backbone element. The result will be a protocol portable to general purpose microcontrollers satisfying a host of sensor networking tasks. This network will enter the gap somewhere between television remotes and Bluetooth but, unlike 802.15.4, will not specify a physical layer, thus allowing for many data rates over optical, acoustical, radiofrequency, hardwire, or other media. Since the protocol will exist as portable C-code, developers may be able to embed it in a host of microcontrollers from commercial to space grade and, of course, to design it into ASICs. Unlike in 802.15.4, the nodes will relate to each other as peers. A demonstration of this protocol using the two test bed platforms was recently held. Two NASA modified, commercially available, mobile platforms communicated and shared data with each other and a

  17. FY-95 technology catalog. Technology development for buried waste remediation

    International Nuclear Information System (INIS)

    1995-01-01

    The US Department of Energy's (DOE) Buried Waste Integrated Demonstration (BWID) program, which is now part of the Landfill Stabilization Focus Area (LSFA), supports applied research, development, demonstration, and evaluation of a multitude of advanced technologies dealing with underground radioactive and hazardous waste remediation. These innovative technologies are being developed as part of integrated comprehensive remediation systems for the effective and efficient remediation of buried waste sites throughout the DOE complex. These efforts are identified and coordinated in support of Environmental Restoration (EM-40) and Waste Management (EM-30) needs and objectives. Sponsored by the DOE Office of Technology Development (EM-50), BWID and LSFA work with universities and private industry to develop technologies that are being transferred to the private sector for use nationally and internationally. This report contains the details of the purpose, logic, and methodology used to develop and demonstrate DOE buried waste remediation technologies. It also provides a catalog of technologies and capabilities with development status for potential users. Past FY-92 through FY-94 technology testing, field trials, and demonstrations are summarized. Continuing and new FY-95 technology demonstrations also are described

  18. FY-95 technology catalog. Technology development for buried waste remediation

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-10-01

    The US Department of Energy`s (DOE) Buried Waste Integrated Demonstration (BWID) program, which is now part of the Landfill Stabilization Focus Area (LSFA), supports applied research, development, demonstration, and evaluation of a multitude of advanced technologies dealing with underground radioactive and hazardous waste remediation. These innovative technologies are being developed as part of integrated comprehensive remediation systems for the effective and efficient remediation of buried waste sites throughout the DOE complex. These efforts are identified and coordinated in support of Environmental Restoration (EM-40) and Waste Management (EM-30) needs and objectives. Sponsored by the DOE Office of Technology Development (EM-50), BWID and LSFA work with universities and private industry to develop technologies that are being transferred to the private sector for use nationally and internationally. This report contains the details of the purpose, logic, and methodology used to develop and demonstrate DOE buried waste remediation technologies. It also provides a catalog of technologies and capabilities with development status for potential users. Past FY-92 through FY-94 technology testing, field trials, and demonstrations are summarized. Continuing and new FY-95 technology demonstrations also are described.

  19. Towards the Development of a Methodology for the Cyber Security Analysis of Safety Related Nuclear Digital I and C Systems

    International Nuclear Information System (INIS)

    Khand, Parvaiz Ahmed; Seong, Poong Hyun

    2007-01-01

    In nuclear power plants the redundant safety related systems are designed to take automatic action to prevent and mitigate accident conditions if the operators and the non-safety systems fail to maintain the plant within normal operating conditions. In case of an event, the failure of these systems has catastrophic consequences. The tendency in the industry over the past 10 years has been to use of commercial of the shelf (COTS) technologies in these systems. COTS software was written with attention to function and performance rather than security. COTS hardware usually designed to fail safe, but security vulnerabilities could be exploited by an attacker to disable the fail safe mechanisms. Moreover, the use of open protocols and operating systems in these technologies make the plants to become vulnerable to a host of cyber attacks. An effective security analysis process is required during all life cycle phases of these systems in order to ensure the security from cyber attacks. We are developing a methodology for the cyber security analysis of safety related nuclear digital I and C Systems. This methodology will cover all phases of development, operation and maintenance processes of software life cycle. In this paper, we will present a security analysis process for the concept stage of software development life cycle

  20. Development of Coated Particle Fuel Technology

    International Nuclear Information System (INIS)

    Lee, Young Woo; Kim, B. G.; Kim, S. H.

    2007-06-01

    Uranium kernel fabrication technology using a wet chemical so-gel method, a key technology in the coated particle fuel area, is established up to the calcination step and the first sintering of UO2 kernel was attempted. Experiments on the parametric study of the coating process using the surrogate ZrO2 kernel give the optimum conditions for the PyC and SiC coating layer and ZrC coating conditions were obtained for the vaporization of the ZrCl4 precursor and coating condition from ZrC coating experiments using plate-type graphite substrate. In addition, by development of fuel performance analysis code a part of the code system is completed which enables the participation to the benchmark calculation and comparison in the IAEA collaborated research program. The technologies for irradiation and post irradiation examination, which are important in developing the HTGR fuel technology of its first kind in Korea was started to develop and, through a feasibility study and preliminary analysis, the technologies required to be developed are identified for further development as well as the QC-related basic technologies are reviewed, analyzed and identified for the own technology development. Development of kernel fabrication technology can be enhanced for the remaining sintering technology and completed based on the technologies developed in this phase. In the coating technology, the optimum conditions obtained using a surrogate ZrO2 kernel material can be applied for the uranium kernel coating process development. Also, after completion of the code development in the next phase, more extended participation to the international collaboration for benchmark calculation can be anticipated which will enable an improvement of the whole code system. Technology development started in this phase will be more extended and further focused on the detailed technology development to be required for the related technology establishment