WorldWideScience

Sample records for significantly improve security

  1. Significance of Hemispheric Security for Mexico

    Science.gov (United States)

    2003-04-07

    La Seguridad Internacional, la Nueva Geopolitica Continental y Mexico ,” Seminario Internacional sobre Misiones de Paz, Seguridad y Defensa, Rio de...USAWC STRATEGY RESEARCH PROJECT SIGNIFICANCE OF HEMISPHERIC SECURITY FOR MEXICO by LTC Enrique Garcia Jaramillo Cavalry, Mexican Army COL Joseph R...xx-xx-2002 to xx-xx-2003 4. TITLE AND SUBTITLE Significance of Hemispheric Security for Mexico Unclassified 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c

  2. Securing Land Tenure, Improving Food Security and Reducing ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Securing Land Tenure, Improving Food Security and Reducing Poverty in Rural ... land tenure regimes as obstacles to food security, economic integration and ... its 2017 call for proposals to establish Cyber Policy Centres in the Global South.

  3. Security improvements for rail movements of SNM

    International Nuclear Information System (INIS)

    Garcia, M.R.; Gronager, J.E.; Shemigon, N.N.

    1998-01-01

    The US Department of Energy (DOE) and the Russian Special Scientific and Production State Enterprise Eleron have teamed to lead a project to enhance the overall security of Russian Ministry of Atomic Energy (MINATOM) transportation of Special Nuclear Material (SNM) shipments. The effort is called the Railcar Transportation Security Project and is part of the overall DOE Material Protection, Control, and Accounting (MPC and A) program addressing the enhancement of nuclear material control, accounting, and physical protection for Russian SNM. The goal of this MPC and A project is to significantly increase the security of Russian MINATOM highly enriched SNM rail shipments. To accomplish this, the MPC and A Railcar Transportation Security program will provide an enhanced, yet cost effective, railcar transportation security system. The system incorporates a balance between the traditional detection, communications, delay, and response security elements to significantly improve the security of MINATOM SNM shipments. The strategy of this program is to use rapid upgrades to implement mature security technologies as quickly as possible. The rapid upgrades emphasize rapidly deployable delay elements, enhanced radio communications, and intrusion detection and surveillance. Upgraded railcars have begun operation during FY98. Subsequent upgrades will build upon the rapid upgrades and eventually be integrated into a final deployed system configuration. This paper provides an overview of the program, with a summary of performance of the deployed railcars

  4. Legal significance of the private security sector in Kosovo

    Directory of Open Access Journals (Sweden)

    Fidair Berisha

    2015-11-01

    Full Text Available Privatization of the security sector is considered a new phenomenon in the post communist society. The security system has been under a total monopol of the state institutions. Therefore, even the legal adjustment of this system is considered that only state institutions are entitled for provision of the security services, by excluding participation of civic organizations from this activity. Beside this, state enterprises have been obliged to establish its safet structures for property protection and involved employers in enterprises. Immediately after the conflictual period the privatization of the security sector was rapidly increased, including various parts of society. In Kosovo immediately after the conflictual period there was legal gaps, which means that the private security sector has not been adjusted and as a result of this has been uncontrolled and without supervision. Therefore in 2000 the UNMIK administration has undertaken measures and has carried out the first act which has regulated this sector in Kosova. The draft law has undergone significant changes starting from the title. Saying in more common manner, “Draft law for private security” is amended in the LAW no. 04/L-004.2001 for private security services, and this amendment of the private security sector is based in the above mentioned law.

  5. Improving Network Security with Watchguard UTM Firewall

    OpenAIRE

    Lehmonen, Harri

    2017-01-01

    After working many years in close contact with end customers, the author has noticed that Finnish small and mid-size businesses are not paying as much attention to network security threats as they should. Even though different kind of security threats are probably present and reported often in news, very basic security practices are discarded and no resources are spent advancing the issue. The topic of this thesis is Improving Network Security with Watchguard’s UTM Firewall. It focuses o...

  6. Improving Information Security Risk Management

    Science.gov (United States)

    Singh, Anand

    2009-01-01

    manaOptimizing risk to information to protect the enterprise as well as to satisfy government and industry mandates is a core function of most information security departments. Risk management is the discipline that is focused on assessing, mitigating, monitoring and optimizing risks to information. Risk assessments and analyses are critical…

  7. When Information Improves Information Security

    Science.gov (United States)

    Grossklags, Jens; Johnson, Benjamin; Christin, Nicolas

    This paper presents a formal, quantitative evaluation of the impact of bounded-rational security decision-making subject to limited information and externalities. We investigate a mixed economy of an individual rational expert and several naïve near-sighted agents. We further model three canonical types of negative externalities (weakest-link, best shot and total effort), and study the impact of two information regimes on the threat level agents are facing.

  8. Improved verification methods for OVI security ink

    Science.gov (United States)

    Coombs, Paul G.; Markantes, Tom

    2000-04-01

    Together, OVP Security Pigment in OVI Security Ink, provide an excellent method of overt banknote protection. The effective use of overt security feature requires an educated public. The rapid rise in computer-generated counterfeits indicates that consumers are not as educate das to banknote security features as they should be. To counter the education issue, new methodologies have been developed to improve the validation of banknotes using the OVI ink feature itself. One of the new methods takes advantage of the overt nature of the product's optically variable effect. Another method utilizes the unique optical interference characteristics provided by the OVP platelets.

  9. BIOTECHNOLOGY CAN IMPROVE FOOD SECURITY IN AFRICA ...

    African Journals Online (AJOL)

    BIOTECHNOLOGY CAN IMPROVE FOOD SECURITY IN AFRICA. ... and capacity to innovate and patent new materials as well as enforce biosafety requirements. In order for countries to access biotechnology products or technologies, it will ...

  10. A improved Network Security Situation Awareness Model

    Directory of Open Access Journals (Sweden)

    Li Fangwei

    2015-08-01

    Full Text Available In order to reflect the situation of network security assessment performance fully and accurately, a new network security situation awareness model based on information fusion was proposed. Network security situation is the result of fusion three aspects evaluation. In terms of attack, to improve the accuracy of evaluation, a situation assessment method of DDoS attack based on the information of data packet was proposed. In terms of vulnerability, a improved Common Vulnerability Scoring System (CVSS was raised and maked the assessment more comprehensive. In terms of node weights, the method of calculating the combined weights and optimizing the result by Sequence Quadratic Program (SQP algorithm which reduced the uncertainty of fusion was raised. To verify the validity and necessity of the method, a testing platform was built and used to test through evaluating 2000 DAPRA data sets. Experiments show that the method can improve the accuracy of evaluation results.

  11. Hill Cipher and Least Significant Bit for Image Messaging Security

    Directory of Open Access Journals (Sweden)

    Muhammad Husnul Arif

    2016-02-01

    Full Text Available Exchange of information through cyberspace has many benefits as an example fast estimated time, unlimited physical distance and space limits, etc. But in these activities can also pose a security risk for confidential information. It is necessary for the safety that can be used to protect data transmitted through the Internet. Encryption algorithm that used to encrypt message to be sent (plaintext into messages that have been randomized (ciphertext is cryptography and steganography algorithms. In application of cryptographic techniques that will be used is Hill Cipher. The technique is combined with steganography techniques Least Significant Bit. The result of merging techniques can maintain the confidentiality of messages because people who do not know the secret key used will be difficult to get the message contained in the stego-image and the image that has been inserted can not be used as a cover image. Message successfully inserted and extracted back on all samples with a good image formats * .bmp, * .png , * .jpg at a resolution of 512 x 512 pixels , 256 x 256 pixels. MSE and PSNR results are not influenced file format or file size, but influenced by dimensions of image. The larger dimensions of the image, then the smaller MSE that means error of image gets smaller.

  12. Improving computer security by health smart card.

    Science.gov (United States)

    Nisand, Gabriel; Allaert, François-André; Brézillon, Régine; Isphording, Wilhem; Roeslin, Norbert

    2003-01-01

    The University hospitals of Strasbourg have worked for several years on the computer security of the medical data and have of this fact be the first to use the Health Care Professional Smart Card (CPS). This new tool must provide security to the information processing systems and especially to the medical data exchanges between the partners who collaborate to the care of the Beyond the purely data-processing aspects of the functions of safety offered by the CPS, safety depends above all on the practices on the users, their knowledge concerning the legislation, the risks and the stakes, of their adhesion to the procedures and protections installations. The aim of this study is to evaluate this level of knowledge, the practices and the feelings of the users concerning the computer security of the medical data, to check the relevance of the step taken, and if required, to try to improve it. The survey by questionnaires involved 648 users. The practices of users in terms of data security are clearly improved by the implementation of the security server and the use of the CPS system, but security breaches due to bad practices are not however completely eliminated. That confirms that is illusory to believe that data security is first and foremost a technical issue. Technical measures are of course indispensable, but the greatest efforts are required after their implementation and consist in making the key players [2], i.e. users, aware and responsible. However, it must be stressed that the user-friendliness of the security interface has a major effect on the results observed. For instance, it is highly probable that the bad practices continued or introduced upon the implementation of the security server and CPS scheme are due to the complicated nature or functional defects of the proposed solution, which must therefore be improved. Besides, this is only the pilot phase and card holders can be expected to become more responsible as time goes by, along with the gradual

  13. 49 CFR 1580.203 - Reporting significant security concerns.

    Science.gov (United States)

    2010-10-01

    ... TRANSPORTATION SECURITY Passenger Rail Including Passenger Railroad Carriers, Rail Transit Systems, Tourist... railroad carrier hosting an operation described in paragraph (a)(1) of this section. (3) Each tourist... transit line, and route, as applicable. (4) Origination and termination locations for the affected...

  14. Carotid endarterectomy significantly improves postoperative laryngeal sensitivity.

    Science.gov (United States)

    Hammer, Georg Philipp; Tomazic, Peter Valentin; Vasicek, Sarah; Graupp, Matthias; Gugatschka, Markus; Baumann, Anneliese; Konstantiniuk, Peter; Koter, Stephan Herwig

    2016-11-01

    sensory threshold on the operated-on side (6.08 ± 2.02 mm Hg) decreased significantly at the 6-week follow-up, even in relation to the preoperative measure (P = .022). With the exception of one patient with permanent unilateral vocal fold immobility, no signs of nerve injury were detected. In accordance with previous reports, injuries to the recurrent laryngeal nerve during CEA seem to be rare. In most patients, postoperative symptoms (globus, dysphagia, dysphonia) and signs fade within a few weeks without any specific therapeutic intervention. This study shows an improved long-term postoperative superior laryngeal nerve function with regard to laryngopharyngeal sensitivity. Copyright © 2016 The Authors. Published by Elsevier Inc. All rights reserved.

  15. PV in Japan - improving energy security?

    International Nuclear Information System (INIS)

    Anon

    2002-01-01

    Currently, almost 80% of Japan's primary energy is imported and about 50% of this comes from politically unstable countries. The Japanese are now working hard to improve energy security in a clean and sustainable fashion. Since the wind patterns are not favourable for wind power, the emphasis is on photovoltaics (PVs), and many companies that once manufactured integrated circuits are now working on solar cells where their knowledge and experience of mass production, quality control, sales and marketing stand them in good stead. It is expected that the Japanese will be world leaders in the making and export of solar equipment, as well as one of the world's greatest users

  16. 78 FR 48029 - Improving Chemical Facility Safety and Security

    Science.gov (United States)

    2013-08-07

    ... Improving Chemical Facility Safety and Security By the authority vested in me as President by the... at reducing the safety risks and security risks associated with hazardous chemicals. However... to further improve chemical facility safety and security in coordination with owners and operators...

  17. Improving food security and nutrition through research | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Informing policy through agriculture and food security research. Improving the uptake of agricultural and food security research into policy and practice is a central objective of IDRC's Agriculture and Food Security program. To maximize the impact of proven solutions, the program set out to inform and engage both Canadian ...

  18. Improving Tamper Detection for Hazardous Waste Security

    International Nuclear Information System (INIS)

    Johnston, R. G.; Garcia, A. R. E.; Pacheco, N.; Martinez, R. K.; Martinez, D. D.; Trujillo, S. J.; Lopez, L. N.

    2003-01-01

    Since September 11, waste managers are increasingly expected to provide effective security for their hazardous wastes. Tamper-indicating seals can help. This paper discusses seals, and offers recommendations for how to choose and use them

  19. Improving industrial process control systems security

    CERN Document Server

    Epting, U; CERN. Geneva. TS Department

    2004-01-01

    System providers are today creating process control systems based on remote connectivity using internet technology, effectively exposing these systems to the same threats as corporate computers. It is becoming increasingly difficult and costly to patch/maintain the technical infrastructure monitoring and control systems to remove these vulnerabilities. A strategy including risk assessment, security policy issues, service level agreements between the IT department and the controls engineering groups must be defined. In addition an increased awareness of IT security in the controls system engineering domain is needed. As consequence of these new factors the control system architectures have to take into account security requirements, that often have an impact on both operational aspects as well as on the project and maintenance cost. Manufacturers of industrial control system equipment do however also propose progressively security related solutions that can be used for our active projects. The paper discusses ...

  20. Collaborating toward improving food security in Nunavut.

    Science.gov (United States)

    Wakegijig, Jennifer; Osborne, Geraldine; Statham, Sara; Issaluk, Michelle Doucette

    2013-01-01

    Community members, Aboriginal organizations, public servants and academics have long been describing a desperate situation of food insecurity in the Eastern Canadian Arctic. The Nunavut Food Security Coalition, a partnership of Inuit Organizations and the Government of Nunavut, is collaborating to develop a territorial food security strategy to address pervasive food insecurity in the context of poverty reduction. The Nunavut Food Security Coalition has carried out this work using a community consultation model. The research was collected through community visits, stakeholder consultation and member checking at the Nunavut Food Security Symposium. In this paper, we describe a continuous course of action, based on community engagement and collective action, that has led to sustained political interest in and public mobilization around the issue of food insecurity in Nunavut. The process described in this article is a unique collaboration between multiple organizations that has led to the development of a sustainable partnership that will inform policy development while representing the voice of Nunavummiut.

  1. Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template.

    Science.gov (United States)

    He, Ying; Johnson, Chris

    2015-11-01

    The recurrence of past security breaches in healthcare showed that lessons had not been effectively learned across different healthcare organisations. Recent studies have identified the need to improve learning from incidents and to share security knowledge to prevent future attacks. Generic Security Templates (GSTs) have been proposed to facilitate this knowledge transfer. The objective of this paper is to evaluate whether potential users in healthcare organisations can exploit the GST technique to share lessons learned from security incidents. We conducted a series of case studies to evaluate GSTs. In particular, we used a GST for a security incident in the US Veterans' Affairs Administration to explore whether security lessons could be applied in a very different Chinese healthcare organisation. The results showed that Chinese security professional accepted the use of GSTs and that cyber security lessons could be transferred to a Chinese healthcare organisation using this approach. The users also identified the weaknesses and strengths of GSTs, providing suggestions for future improvements. Generic Security Templates can be used to redistribute lessons learned from security incidents. Sharing cyber security lessons helps organisations consider their own practices and assess whether applicable security standards address concerns raised in previous breaches in other countries. The experience gained from this study provides the basis for future work in conducting similar studies in other healthcare organisations. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  2. Sustaining Operational Resiliency: A Process Improvement Approach to Security Management

    National Research Council Canada - National Science Library

    Caralli, Richard A

    2006-01-01

    ... potential to significantly disrupt an organization's pursuit of its mission. Security, business continuity, and IT operations management are activities that traditionally support operational risk management...

  3. Information security improving blocklist driven firewall implementation

    OpenAIRE

    Kylmänen, J. (Juha)

    2013-01-01

    Abstract The Internet has become a commodity and with it information security and privacy issues have appeared. Common threats against the end users include malware and phishing. Phishing is a social engineering technique used to mimic legit banking or social networking websites in an attempt to gain sensitive information from the user and malware is software with malicious intent. ...

  4. Collaborating toward improving food security in Nunavut

    Directory of Open Access Journals (Sweden)

    Jennifer Wakegijig

    2013-08-01

    Full Text Available Background. Community members, Aboriginal organizations, public servants and academics have long been describing a desperate situation of food insecurity in the Eastern Canadian Arctic. Objective. The Nunavut Food Security Coalition, a partnership of Inuit Organizations and the Government of Nunavut, is collaborating to develop a territorial food security strategy to address pervasive food insecurity in the context of poverty reduction. Design. The Nunavut Food Security Coalition has carried out this work using a community consultation model. The research was collected through community visits, stakeholder consultation and member checking at the Nunavut Food Security Symposium. Results. In this paper, we describe a continuous course of action, based on community engagement and collective action, that has led to sustained political interest in and public mobilization around the issue of food insecurity in Nunavut. Conclusions. The process described in this article is a unique collaboration between multiple organizations that has led to the development of a sustainable partnership that will inform policy development while representing the voice of Nunavummiut.

  5. Security of supply in electricity markets: Improving cost efficiency of supplying security and possible welfare gains

    DEFF Research Database (Denmark)

    Klinge Jacobsen, Henrik; Grenaa Jensen, Stine

    2012-01-01

    In liberalised markets the ability to maintain security of electricity supply is questioned because security is characterised as a public good. We discuss if this property can be modified with changing technology. Furthermore, we examine if construction of markets for security can be justified...... by possible welfare gains. From a welfare perspective it is possible that security levels are too high and obtained with too high costs. Adjusting the effort so that marginal cost for securing supply is at similar levels in generation capacity and in network maintenance could increase welfare even without...... the need to construct markets. Secondarily, a consumer defined average level of security might improve welfare. Finally, different willingness to pay among customers and construction of advanced markets might increase welfare further. We argue that several cost and welfare improvements can be achieved...

  6. Computer Security: improve software, avoid blunder

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Recently, a severe vulnerability has been made public about how Apple devices are wrongly handling encryption. This vulnerability rendered SSL/TLS protection useless, and permitted attackers checking out a wireless network to capture or modify data in encrypted sessions.   In other words, all confidential data like passwords, banking information, etc. could have been siphoned off by a targeted attack. While Apple has been quick in providing adequate security patches for iOS devices and Macs, it is an excellent example of how small mistakes can lead to big security holes. Here is the corresponding code from Apple’s Open Source repository. Can you spot the issue? 1 static OSStatus 2 SSLVerifySignedServerKeyExchange(SSLContext *ctx, bool isRsa, SSLBuffer signedParams, uint8_t *signature, UInt16 signatureLen) 3 { 4              OSStatus &nb...

  7. Simple, low-cost ways to dramatically improve the security of tags and seals

    International Nuclear Information System (INIS)

    Johnston, R.G.; Garcia, A.R.E.

    1999-01-01

    The Vulnerability Assessment Team at Los Alamos National Laboratory has analyzed over 100 different tags and security seals (tamper-indicating devices). We have demonstrated how all these security products can be defeated quickly, easily, and inexpensively using low-tech methods. In our view, most of these security devices can be significantly improved with minor changes in their design and/or in how they are used. In this paper, we present some generic suggestions for improving the security and reliability of tags and seals. (author)

  8. Empowerment and BYOx: Towards Improved IS Security Compliance

    DEFF Research Database (Denmark)

    Welck, Maximilian von; Trenz, Manuel; Jensen, Tina Blegind

    2017-01-01

    Non-compliant employees continue to pose a serious threat to information systems security. Most attempts to increase compliant behavior rely on measures that reduce employees’ latitude. However, recent studies suggest that this indeed eventuates in less compliance due to adverse behaviors...... outline how this novel approach to improve IS security compliance can be developed and investigated further....

  9. Process Improvement Should Link to Security: SEPG 2007 Security Track Recap

    National Research Council Canada - National Science Library

    Woody, Carol

    2007-01-01

    ...; organizations must support an expensive unending update-and-upgrade cycle. Process improvement has been proposed as a mechanism for addressing security challenges, but the Capability Maturity Model Integration (CMMI[registered name...

  10. Information Technology Management: Social Security Administration Practices Can Be Improved

    National Research Council Canada - National Science Library

    Shaw, Clay

    2001-01-01

    To improve SSAs IT management practices, we recommend that the Acting Commissioner of Social Security direct the Chief Information Officer and the Deputy Commissioner for Systems to complete the following actions...

  11. Communications and Integration Enhancements to Improve Homeland Security

    National Research Council Canada - National Science Library

    Sando, Terrance W

    2007-01-01

    .... Homeland Security responses. These technology enhancements and processes combined with the force capabilities that the National Guard has recently created, when integrated with other national capabilities, will greatly improve...

  12. Healthier, more nutritious potatoes improve food security in Colombia

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-04-26

    Apr 26, 2016 ... Healthier, more nutritious potatoes improve food security in Colombia ... farmers, have high commercial potential, and are popular with consumers. ... children and adolescents is an alarming trend throughout the Caribbean.

  13. New bean products to improve food security | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-04-21

    ... Agricultural Research Organisation and the Kenya Agricultural and Livestock Research ... New bean products to improve food security. April 21, 2016. Image ... more lucrative market for smallholder bean farmers, most of whom are women.

  14. A Video Based System and Method for Improving Aircraft Security

    National Research Council Canada - National Science Library

    Meitzler, Tom; Ebenstein, Sam; Smith, Greg; Rodin, Yelena; Zorka, Nick

    2004-01-01

    In late September of 2001 the Commercial Airline Pilots Association (CAPA) endorsed president Bush's plan for improved airline security but expressed concern that it did not address many critical issues...

  15. Improving Food and Nutrition Security in the Philippines through ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Improving food and nutrition security in the Philippines through school ... Implementation of the Community Health Assessment Program in the Philippines ... This project will address the effects of fast-paced economic growth in the Greater ...

  16. The Justice of Improving Security and Confronting Poverty

    DEFF Research Database (Denmark)

    Farah, Abdulkadir Osman

    2016-01-01

    Following decades of postcolonial dictatorships and authoritarianism, many African countries have experienced expanded efforts by transnational organizations—from both top down and bottom up—aimed at alleviating poverty and improving security. This article provides a partial inventory of such eff......Following decades of postcolonial dictatorships and authoritarianism, many African countries have experienced expanded efforts by transnational organizations—from both top down and bottom up—aimed at alleviating poverty and improving security. This article provides a partial inventory...

  17. Climate resilient crops for improving global food security and safety.

    Science.gov (United States)

    Dhankher, Om Parkash; Foyer, Christine H

    2018-05-01

    Food security and the protection of the environment are urgent issues for global society, particularly with the uncertainties of climate change. Changing climate is predicted to have a wide range of negative impacts on plant physiology metabolism, soil fertility and carbon sequestration, microbial activity and diversity that will limit plant growth and productivity, and ultimately food production. Ensuring global food security and food safety will require an intensive research effort across the food chain, starting with crop production and the nutritional quality of the food products. Much uncertainty remains concerning the resilience of plants, soils, and associated microbes to climate change. Intensive efforts are currently underway to improve crop yields with lower input requirements and enhance the sustainability of yield through improved biotic and abiotic stress tolerance traits. In addition, significant efforts are focused on gaining a better understanding of the root/soil interface and associated microbiomes, as well as enhancing soil properties. © 2018 The Authors Plant, Cell & Environment Published by John Wiley & Sons Ltd.

  18. Improved security analysis of Fugue-256 (poster)

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde; Bagheri, Nasoor

    2011-01-01

    We present some improved analytical results as part of the ongoing work on the analysis of Fugue-256 hash function, a second round candidate in the NIST's SHA3 competition. First we improve Aumasson and Phans' integral distinguisher on the 5.5 rounds of the final transformation of Fugue-256 to 16...

  19. Inhaler Reminders Significantly Improve Asthma Patients' Use of Controller Medications

    Science.gov (United States)

    ... controller medications Share | Inhaler reminders significantly improve asthma patients’ use of controller medications Published Online: July 22, ... the burden and risk of asthma, but many patients do not use them regularly. This poor adherence ...

  20. Improving Energy Security for Air Force Installations

    Science.gov (United States)

    Schill, David

    Like civilian infrastructure, Air Force installations are dependent on electrical energy for daily operations. Energy shortages translate to decreased productivity, higher costs, and increased health risks. But for the United States military, energy shortages have the potential to become national security risks. Over ninety-five percent of the electrical energy used by the Air Force is supplied by the domestic grid, which is susceptible to shortages and disruptions. Many Air Force operations require a continuous source of energy, and while the Air Force has historically established redundant supplies of electrical energy, these back-ups are designed for short-term outages and may not provide sufficient supply for a longer, sustained power outage. Furthermore, it is the goal of the Department of Defense to produce or procure 25 percent of its facility energy from renewable sources by fiscal year 2025. In a government budget environment where decision makers are required to provide more capability with less money, it is becoming increasingly important for informed decisions regarding which energy supply options bear the most benefit for an installation. The analysis begins by exploring the field of energy supply options available to an Air Force installation. The supply options are assessed according to their ability to provide continuous and reliable energy, their applicability to unique requirements of Air Force installations, and their costs. Various methods of calculating energy usage by an installation are also addressed. The next step of this research develops a methodology and tool which assesses how an installation responds to various power outage scenarios. Lastly, various energy supply options are applied to the tool, and the results are reported in terms of cost and loss of installation capability. This approach will allow installation commanders and energy managers the ability to evaluate the cost and effectiveness of various energy investment options.

  1. Significant improvement in the thermal annealing process of optical resonators

    Science.gov (United States)

    Salzenstein, Patrice; Zarubin, Mikhail

    2017-05-01

    Thermal annealing performed during process improves the quality of the roughness of optical resonators reducing stresses at the periphery of their surface thus allowing higher Q-factors. After a preliminary realization, the design of the oven and the electronic method were significantly improved thanks to nichrome resistant alloy wires and chopped basalt fibers for thermal isolation during the annealing process. Q-factors can then be improved.

  2. Research helps improve food security and nutrition

    International Development Research Centre (IDRC) Digital Library (Canada)

    Corey Piccioni

    agricultural productivity, improving nutrition, and raising incomes of men and women smallholder farmers. IDRC accomplishes this through joint partnerships with Global. Affairs Canada and the Australian Centre for International. Agricultural Research. Our researchers use a variety of approaches to: • Increase productivity of ...

  3. INDUSTRIAL WASTE MANAGEMENT TO IMPROVE ENVIRONMENTAL SECURITY

    Directory of Open Access Journals (Sweden)

    V. A. Perfilov

    2016-01-01

    Full Text Available Aim. Disposal of industrial waste to improve the environmental safety by means of recycling and reusing in the manufacture of building materials.Materials and methods. We made a selection of new optimum compositions of fiber-concretes using industrial carbon black from heat generating productions, glass fibers, plasticizers, activated mixing water produced using an ultrasonic unit.Results. New fiber-reinforced concrete compositions were developed using carbon black as an additive. As a result of the processing of the experimental data, it has been revealed that introduction of carbon black as an additive contributed to the increase of the strength characteristics of nearly all fiber-reinforced concrete compositions. It has been found that microparticles of carbon black accumulate the products of hydration of portlandcement-hydrosilicate calcium on the surface and contribute to the formation of a solid microarming concrete structure.Conclusions. The use of industrial carbon black in fibrous concrete mixture using restructured water improves its rheological properties, reduces its segregation and improves the homogeneity of the concrete. Recycling and re-using carbon black in the production of building materials will improve the environmental ecology.

  4. Improving Reliability, Security, and Efficiency of Reconfigurable Hardware Systems (Habilitation)

    NARCIS (Netherlands)

    Ziener, Daniel

    2017-01-01

    In this treatise,  my research on methods to improve efficiency, reliability, and security of reconfigurable hardware systems, i.e., FPGAs, through partial dynamic reconfiguration is outlined. The efficiency of reconfigurable systems can be improved by loading optimized data paths on-the-fly on an

  5. Nuclear security. Improving correction of security deficiencies at DOE's weapons facilities

    International Nuclear Information System (INIS)

    Wells, James E.; Cannon, Doris E.; Fenzel, William F.; Lightner, Kenneth E. Jr.; Curtis, Lois J.; DuBois, Julia A.; Brown, Gail W.; Trujillo, Charles S.; Tumler, Pamela K.

    1992-11-01

    The US nuclear weapons research, development, and production are conducted at 10 DOE nuclear weapons facilities by contractors under the guidance and oversight of 9 DOE field offices. Because these facilities house special nuclear materials used in making nuclear weapons and nuclear weapons components, DOE administers a security program to protect (1) against theft, sabotage, espionage, terrorism, or other risks to national security and (2) the safety and health of DOE employees and the public. DOE spends almost $1 billion a year on this security program. DOE administers the security program through periodic inspections that evaluate and monitor the effectiveness of facilities' safeguards and security. Security inspections identify deficiencies, instances of noncompliance with safeguards and security requirements or poor performance of the systems being evaluated, that must be corrected to maintain adequate security. The contractors and DOE share responsibility for correcting deficiencies. Contractors, in correcting deficiencies, must comply with several DOE orders. The contractors' performances were not adequate in conducting four of the eight procedures considered necessary in meeting DOE's deficiency correction requirements. For 19 of the 20 deficiency cases we reviewed, contractors could not demonstrate that they had conducted three critical deficiency analyses (root cause, risk assessment, and cost-benefit) required by DOE. Additionally, the contractors did not always adequately verify that corrective actions taken were appropriate, effective, and complete. The contractors performed the remaining four procedures (reviewing deficiencies for duplication, entering deficiencies into a data base, tracking the status of deficiencies, and preparing and implementing a corrective action plan) adequately in all 20 cases. DOE's oversight of the corrective action process could be improved in three areas. The computerized systems used to track the status of security

  6. The significance of enset culture and biodiversity for rural household food and livelihood security in southwestern Ethiopia

    NARCIS (Netherlands)

    Negash, A.; Niehof, A.

    2004-01-01

    The significance of enset (Ensete ventricosum Welw. Cheesman) for the food and livelihood security of rural households in Southwestern Ethiopia, where this crop is the main staple, raises two major questions. The first concerns the related issues of household food security and livelihood security

  7. Improving Security in the ATLAS PanDA System

    International Nuclear Information System (INIS)

    Caballero, J; Maeno, T; Potekhin, M; Wenaus, T; Nilsson, P; Stewart, G

    2011-01-01

    The security challenges faced by users of the grid are considerably different to those faced in previous environments. The adoption of pilot jobs systems by LHC experiments has mitigated many of the problems associated with the inhomogeneities found on the grid and has greatly improved job reliability; however, pilot jobs systems themselves must then address many security issues, including the execution of multiple users' code under a common 'grid' identity. In this paper we describe the improvements and evolution of the security model in the ATLAS PanDA (Production and Distributed Analysis) system. We describe the security in the PanDA server which is in place to ensure that only authorized members of the VO are allowed to submit work into the system and that jobs are properly audited and monitored. We discuss the security in place between the pilot code itself and the PanDA server, ensuring that only properly authenticated workload is delivered to the pilot for execution. When the code to be executed is from a 'normal' ATLAS user, as opposed to the production system or other privileged actor, then the pilot may use an EGEE developed identity switching tool called gLExec. This changes the grid proxy available to the job and also switches the UNIX user identity to protect the privileges of the pilot code proxy. We describe the problems in using this system and how they are overcome. Finally, we discuss security drills which have been run using PanDA and show how these improved our operational security procedures.

  8. Information and technology: Improving food security in Uganda ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2014-06-23

    Jun 23, 2014 ... Information and technology: Improving food security in Uganda ... knowledge to make decisions about planting, harvesting, and managing livestock, but ... to be effective for minimizing risks and increasing agricultural productivity. ... In time, this network of information – made possible by digital technology ...

  9. Citizen-based Strategies to Improve Community Security: Working ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Citizen-based Strategies to Improve Community Security: Working with Vulnerable Populations to Address Urban Violence in Medellin ... Water Resources Association, in close collaboration with IDRC, is holding a webinar titled “Climate change and adaptive water management: Innovative solutions from the Global South”.

  10. Sustaining Operational Resiliency: A Process Improvement Approach to Security Management

    National Research Council Canada - National Science Library

    Caralli, Richard A

    2006-01-01

    .... Coordinating these efforts to sustain operational resiliency requires a process-oriented approach that can be defined, measured, and actively managed. This report describes the fundamental elements and benefits of a process approach to security and operational resiliency and provides a notional view of a framework for process improvement.

  11. What's under the hood? Improving SCADA security with process awareness

    NARCIS (Netherlands)

    Chromik, Justyna Joanna; Remke, Anne Katharina Ingrid; Haverkort, Boudewijn R.H.M.

    2016-01-01

    SCADA networks are an essential part of monitoring and controlling physical infrastructures, such as the power grid. Recent news item show that tampering with the data exchanged in a SCADA network occurs and has severe consequences. A possible way of improving the security of SCADA networks is to

  12. Towards improving security measures in Nigeria University Libraries ...

    African Journals Online (AJOL)

    A questionnaire designed by the researchers titled “Towards Improving Security Measures in Nigerian University Libraries (TISMINUL)” was used to collect the needed data. The questionnaire was designed in two parts. Part one was to gather information on the size of collection, frequency of stock taking and book loss.

  13. Training directionally selective motion pathways can significantly improve reading efficiency

    Science.gov (United States)

    Lawton, Teri

    2004-06-01

    This study examined whether perceptual learning at early levels of visual processing would facilitate learning at higher levels of processing. This was examined by determining whether training the motion pathways by practicing leftright movement discrimination, as found previously, would improve the reading skills of inefficient readers significantly more than another computer game, a word discrimination game, or the reading program offered by the school. This controlled validation study found that practicing left-right movement discrimination 5-10 minutes twice a week (rapidly) for 15 weeks doubled reading fluency, and significantly improved all reading skills by more than one grade level, whereas inefficient readers in the control groups barely improved on these reading skills. In contrast to previous studies of perceptual learning, these experiments show that perceptual learning of direction discrimination significantly improved reading skills determined at higher levels of cognitive processing, thereby being generalized to a new task. The deficits in reading performance and attentional focus experienced by the person who struggles when reading are suggested to result from an information overload, resulting from timing deficits in the direction-selectivity network proposed by Russell De Valois et al. (2000), that following practice on direction discrimination goes away. This study found that practicing direction discrimination rapidly transitions the inefficient 7-year-old reader to an efficient reader.

  14. The development and significance of the DOE Safeguards and Security standards and criteria

    International Nuclear Information System (INIS)

    Toman, J.

    1987-01-01

    In October 1985, the DOE Assistant Secretary for Defense Programs created a task force to develop inspection standards and criteria for Safeguards and Security. These standards and criteria (S/C) would provide the DOE Inspection and Evaluation (I and E) teams with the guidance needed to assess the security posture of DOE's nuclear and other important facilities. The Lawrence Livermore National Laboratory was designated the lead management organization for the structuring, administration, and execution of the overall task force effort and appointed the Executive Secretary. The Office of Security Evaluations (OSE) became the responsible DOE organization, and its Director assumed the role of Chairman of the Task Force Executive Committee. At its peak, the Task Force consisted of approximately 200 people who were considered to be experts in eight major topical areas. The composition of the experts was almost evenly divided between DOE and contractor employees. The collective wisdom of these experts was used in a consensus process to develop the S/C that are now published in draft form. These S/C have been used in more than ten inspections since May 1986 with much success. This paper discusses the process used to achieve the desired end result and the significance of the Task Force's accomplishments

  15. Additional improvements needed in physical security at nuclear powerplants

    International Nuclear Information System (INIS)

    1983-01-01

    Since the middle 1970's, the Nuclear Regulatory Commission and powerplant operators have taken measures to reduce the vulnerability of powerplants to attempted acts of sabotage. GAO's evaluation disclosed that further improvements can be made by screening nuclear plant employees to reduce the number of potential saboteurs and strengthening the physical security systems to ensure their compatibility with other plant safety systems. The Commission has taken two initiatives addressing these improvements. Therefore, GAO is not making recommendations at this time

  16. Analysis and improvement of security of energy smart grids

    International Nuclear Information System (INIS)

    Halimi, Halim

    2014-01-01

    The Smart grid is the next generation power grid, which is a new self-healing, self-activating form of electricity network, and integrates power-flow control, increased quality of electricity, and energy reliability, energy efficiency and energy security using information and communication technologies. Communication networks play a critical role in smart grid, as the intelligence of smart grid is built based on information exchange across the power grid. Its two-way communication and electricity flow enable to monitor, predict and manage the energy usage. To upgrade an existing power grid into a smart grid, it requires an intelligent and secure communication infrastructure. Because of that, the main goal of this dissertation is to propose new architecture and implementation of algorithms for analysis and improvement of the security and reliability in smart grid. In power transmission segments of smart grid, wired communications are usually adopted to ensure robustness of the backbone power network. In contrast, for a power distribution grid, wireless communications provide many benefits such as low cost high speed links, easy setup of connections among different devices/appliances, and so on. Wireless communications are usually more vulnerable to security attacks than wired ones. Developing appropriate wireless communication architecture and its security measures is extremely important for a smart grid system. This research addresses physical layer security in a Wireless Smart Grid. Hence a defense Quorum- based algorithm is proposed to ensure physical security in wireless communication. The new security architecture for smart grid that supports privacy-preserving, data aggregation and access control is defined. This architecture consists of two parts. In the first part we propose to use an efficient and privacy-preserving aggregation scheme (EPPA), which aggregates real-time data of consumers by Local Gateway. During aggregation the privacy of consumers is

  17. Nuclear security. DOE actions to improve the personnel clearance program

    International Nuclear Information System (INIS)

    Fultz, Keith O.; Bannerman, Carl J.; Daniel, Beverly A.

    1988-11-01

    The status of the Department of Energy's (DOE) implementation of recommendations in our two reports on DOE's personnel security clearance program was determined. The recommendations were aimed at improving the timeliness, accuracy, and efficiency of personnel security clearance decisions. Specifically, the objective was to determine and report on steps DOE is taking to implement these recommendations. In summary, it was found that DOE has either initiated action or is studying ways to address all the recommendations, but none of the recommendations have been completely implemented. The effectiveness of the DOE actions will depend, in part, on the adequacy of its internal control system for overseeing and evaluating program operations. DOE's personnel security clearance program is intended to provide reasonable assurance that personnel with access to classified information and materials are trustworthy. The Department requests that the Office of Personnel Management or the Federal Bureau of Investigation collect personal data on each person who requires such access to do his or her job. Based on these background investigations, DOE officials authorize individuals whose personal histories indicate that they are trustworthy to have access to classified information, secured facilities, and controlled materials as needed to perform their jobs. DOE has five types of these authorizations or personnel security clearances and must update information on personnel holding each type at 5-year intervals to confirm their continuing reliability. The five types are based on the types of security interests to which the person needs access, e.g., persons needing nuclear weapons-related data must have a Q clearance, and persons with a top secret clearance can have access to national security data classified as top secret

  18. IAEA-EU Joint Action Partnership in Improving Nuclear Security

    International Nuclear Information System (INIS)

    2011-12-01

    Nuclear and other radioactive material is on the move and in demand. Used in peaceful applications such as energy, medicine, research and industry, it improves the daily lives of individuals worldwide. Nonetheless, the risk posed by it falling into the wrong hands is a real and growing concern of the international community and one that demands improved nuclear security. Steps to bolster nuclear security and mitigate this risk include accounting for and securing nuclear and radioactive material as well as their related facilities, and helping to prevent theft, sabotage and use with malicious intent. Strong legislative, regulatory and enforcement frameworks, enhanced national capacity, and increased international cooperation in protecting against, and preparing for, any scenario strengthens these measures further. As a result, the Board of Governors of the International Atomic Energy Agency (IAEA) approved a plan of activities in 2002 to improve nuclear security worldwide. In 2003, the Council of the European Union (EU) adopted its Strategy against Proliferation of Weapons of Mass Destruction. Since then, five Contribution Agreements between the European Commission (EC) and the IAEA have been undertaken to provide financial support to IAEA activities in the areas of nuclear security and verification. These 'Joint Actions' assist States in strengthening their nuclear security infrastructure and underscore both the EU and IAEA's commitment to effective cooperation. IAEA-EU JOINT ACTION. The IAEA works to improve and strengthen national nuclear security programmes worldwide. EU support helps to advance the IAEA's efforts by raising awareness and improving understanding of nuclear security and its many component parts. Priority is given to those States that need to determine what radioactive and nuclear material they have, how to control it and how to reduce the risk it poses. Efforts focus on three main areas, strengthening: (i) States' legislative and regulatory

  19. Improving Control System Security through the Evaluation of Current Trends in Computer Security Research

    Energy Technology Data Exchange (ETDEWEB)

    Rolston

    2005-03-01

    At present, control system security efforts are primarily technical and reactive in nature. What has been overlooked is the need for proactive efforts, focused on the IT security research community from which new threats might emerge. Evaluating cutting edge IT security research and how it is evolving can provide defenders with valuable information regarding what new threats and tools they can anticipate in the future. Only known attack methodologies can be blocked, and there is a gap between what is known to the general security community and what is being done by cutting edge researchers --both those trying to protect systems and those trying to compromise them. The best security researchers communicate with others in their field; they know what cutting edge research is being done; what software can be penetrated via this research; and what new attack techniques and methodologies are being circulated in the black hat community. Standardization of control system applications, operating systems, and networking protocols is occurring at a rapid rate, following a path similar to the standardization of modern IT networks. Many attack methodologies used on IT systems can be ported over to the control system environment with little difficulty. It is extremely important to take advantage of the lag time between new research, its use on traditional IT networks, and the time it takes to port the research over for use on a control system network. Analyzing nascent trends in IT security and determining their applicability to control system networks provides significant information regarding defense mechanisms needed to secure critical infrastructure more effectively. This work provides the critical infrastructure community with a better understanding of how new attacks might be launched, what layers of defense will be needed to deter them, how the attacks could be detected, and how their impact could be limited.

  20. Significant Improvement of Catalytic Efficiencies in Ionic Liquids

    International Nuclear Information System (INIS)

    Song, Choong Eui; Yoon, Mi Young; Choi, Doo Seong

    2005-01-01

    The use of ionic liquids as reaction media can confer many advantages upon catalytic reactions over reactions in organic solvents. In ionic liquids, catalysts having polar or ionic character can easily be immobilized without additional structural modification and thus the ionic solutions containing the catalyst can easily be separated from the reagents and reaction products, and then, be reused. More interestingly, switching from an organic solvent to an ionic liquid often results in a significant improvement in catalytic performance (e.g., rate acceleration, (enantio)selectivity improvement and an increase in catalyst stability). In this review, some recent interesting results which can nicely demonstrate these positive 'ionic liquid effect' on catalysis are discussed

  1. Report: EPA Improved Its National Security Information Program, but Some Improvements Still Needed

    Science.gov (United States)

    Report #16-P-0196, June 2, 2016. The EPA will continue to improve its national security information program by completing information classification guides that can be used uniformly and consistently throughout the agency.

  2. 78 FR 69433 - Executive Order 13650 Improving Chemical Facility Safety and Security Listening Sessions

    Science.gov (United States)

    2013-11-19

    ... Chemical Facility Safety and Security Listening Sessions AGENCY: National Protection and Programs... from stakeholders on issues pertaining to Improving Chemical Facility Safety and Security (Executive... regulations, guidance, and policies; and identifying best practices in chemical facility safety and security...

  3. Bedtime Blood Pressure Chronotherapy Significantly Improves Hypertension Management.

    Science.gov (United States)

    Hermida, Ramón C; Ayala, Diana E; Fernández, José R; Mojón, Artemio; Crespo, Juan J; Ríos, María T; Smolensky, Michael H

    2017-10-01

    Consistent evidence of numerous studies substantiates the asleep blood pressure (BP) mean derived from ambulatory BP monitoring (ABPM) is both an independent and a stronger predictor of cardiovascular disease (CVD) risk than are daytime clinic BP measurements or the ABPM-determined awake or 24-hour BP means. Hence, cost-effective adequate control of sleep-time BP is of marked clinical relevance. Ingestion time, according to circadian rhythms, of hypertension medications of 6 different classes and their combinations significantly improves BP control, particularly sleep-time BP, and reduces adverse effects. Copyright © 2017 Elsevier Inc. All rights reserved.

  4. [Improvement of Phi bodies stain and its clinical significance].

    Science.gov (United States)

    Gong, Xu-Bo; Lu, Xing-Guo; Yan, Li-Juan; Xiao, Xi-Bin; Wu, Dong; Xu, Gen-Bo; Zhang, Xiao-Hong; Zhao, Xiao-Ying

    2009-02-01

    The aim of this study was to improve the dyeing method of hydroperoxidase (HPO), to analyze the morphologic features of Phi bodies and to evaluate the clinical application of this method. 128 bone marrow or peripheral blood smears from patients with myeloid and lymphoid malignancies were stained by improved HPO staining. The Phi bodies were observed with detection rate of Phi bodies in different leukemias. 69 acute myeloid leukemia (AML) specimens were chosen randomly, the positive rate and the number of Phi bodies between the improved HPO and POX stain based on the same substrate of 3, 3'diaminobenzidine were compared. The results showed that the shape of bundle-like Phi bodies was variable, long or short. while the nubbly Phi bodies often presented oval and smooth. Club-like Phi bodies were found in M(3). The detection rates of bundle-like Phi bodies in AML M(1)-M(5) were 42.9% (6/14), 83.3% (15/18), 92.0% (23/25), 52.3% (11/21), 33.3% (5/15) respectively, and those of nubbly Phi bodies were 28.6% (4/14), 66.7% (12/18), 11.1% (3/25), 33.3% (7/21), 20.0% (3/15) respectively. The detection rate of bundle-like Phi bodies in M(3) was significantly higher than that in (M(1) + M(2)) or (M(4) + M(5)) groups. The detection rate of nubbly Phi bodies in (M(1) + M(2)) group was higher than that in M(3) group. In conclusion, after improvement of staining method, the HPO stain becomes simple, the detection rate of Phi bodies is higher than that by the previous method, the positive granules are more obvious, and the results become stable. This improved method plays an important role in differentiating AML from ALL, subtyping AML, and evaluating the therapeutic results.

  5. What's under the hood? Improving SCADA security with process awareness

    OpenAIRE

    Chromik, Justyna Joanna; Remke, Anne Katharina Ingrid; Haverkort, Boudewijn R.H.M.

    2016-01-01

    SCADA networks are an essential part of monitoring and controlling physical infrastructures, such as the power grid. Recent news item show that tampering with the data exchanged in a SCADA network occurs and has severe consequences. A possible way of improving the security of SCADA networks is to use intrusion detection systems. By monitoring and analysing the traffic, it is possible to detect whether information has a legitimate source or was tampered with. However, in many cases the knowled...

  6. An Improved Constraint-Based System for the Verification of Security Protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro

    We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov [30]. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect flaws associated to partial

  7. An Improved Constraint-based system for the verification of security protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro; Hermenegildo, Manuel V.; Puebla, German

    We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect aws associated to partial runs

  8. Security analysis and improvements to the PsychoPass method.

    Science.gov (United States)

    Brumen, Bostjan; Heričko, Marjan; Rozman, Ivan; Hölbl, Marko

    2013-08-13

    In a recent paper, Pietro Cipresso et al proposed the PsychoPass method, a simple way to create strong passwords that are easy to remember. However, the method has some security issues that need to be addressed. To perform a security analysis on the PsychoPass method and outline the limitations of and possible improvements to the method. We used the brute force analysis and dictionary attack analysis of the PsychoPass method to outline its weaknesses. The first issue with the Psychopass method is that it requires the password reproduction on the same keyboard layout as was used to generate the password. The second issue is a security weakness: although the produced password is 24 characters long, the password is still weak. We elaborate on the weakness and propose a solution that produces strong passwords. The proposed version first requires the use of the SHIFT and ALT-GR keys in combination with other keys, and second, the keys need to be 1-2 distances apart. The proposed improved PsychoPass method yields passwords that can be broken only in hundreds of years based on current computing powers. The proposed PsychoPass method requires 10 keys, as opposed to 20 keys in the original method, for comparable password strength.

  9. Using automatic identification system technology to improve maritime border security

    OpenAIRE

    Lindstrom, Tedric R.

    2014-01-01

    Approved for public release; distribution is unlimited Our coastal waters are the United States’ most open and vulnerable borders. This vast maritime domain harbors critical threats from terrorism, criminal activities, and natural disasters. Maritime borders pose significant security challenges, as nefarious entities have used small boats to conduct illegal activities for years, and they continue to do so today. Illegal drugs, money, weapons, and migrants flow both directions across our ma...

  10. Ceramic Composite Intermediate Temperature Stress-Rupture Properties Improved Significantly

    Science.gov (United States)

    Morscher, Gregory N.; Hurst, Janet B.

    2002-01-01

    Silicon carbide (SiC) composites are considered to be potential materials for future aircraft engine parts such as combustor liners. It is envisioned that on the hot side (inner surface) of the combustor liner, composites will have to withstand temperatures in excess of 1200 C for thousands of hours in oxidizing environments. This is a severe condition; however, an equally severe, if not more detrimental, condition exists on the cold side (outer surface) of the combustor liner. Here, the temperatures are expected to be on the order of 800 to 1000 C under high tensile stress because of thermal gradients and attachment of the combustor liner to the engine frame (the hot side will be under compressive stress, a less severe stress-state for ceramics). Since these composites are not oxides, they oxidize. The worst form of oxidation for strength reduction occurs at these intermediate temperatures, where the boron nitride (BN) interphase oxidizes first, which causes the formation of a glass layer that strongly bonds the fibers to the matrix. When the fibers strongly bond to the matrix or to one another, the composite loses toughness and strength and becomes brittle. To increase the intermediate temperature stress-rupture properties, researchers must modify the BN interphase. With the support of the Ultra-Efficient Engine Technology (UEET) Program, significant improvements were made as state-of-the-art SiC/SiC composites were developed during the Enabling Propulsion Materials (EPM) program. Three approaches were found to improve the intermediate-temperature stress-rupture properties: fiber-spreading, high-temperature silicon- (Si) doped boron nitride (BN), and outside-debonding BN.

  11. Causes of improvement in the security environment of Iraq, 2006-2009

    OpenAIRE

    Wheeler, Seth A.

    2009-01-01

    Approved for public release, distribution unlimited Popular consensus exists that the 2007 surge of U.S. forces in Iraq led to an improved security environment. The surge was designed to reduce violence and improve security by protecting the Iraqi population - a change in strategy. According to the consensus, the security environment improved due to the surge, measured by the decreasing number of attacks. For this thesis, the security environment consists of the number of attacks and t...

  12. Methylphenidate significantly improves declarative memory functioning of adults with ADHD.

    NARCIS (Netherlands)

    Verster, J.C.; Bekker, E.M.; Kooij, J.J.; Buitelaar, J.K.; Verbaten, M.N.; Volkerts, E.R.; Olivier, B.

    2010-01-01

    BACKGROUND: Declarative memory deficits are common in untreated adults with attention-deficit hyperactivity disorder (ADHD), but limited evidence exists to support improvement after treatment with methylphenidate. The objective of this study was to examine the effects of methylphenidate on memory

  13. The significance of interconnector counter-trading in a security constrained electricity market

    International Nuclear Information System (INIS)

    Higgins, P.; Li, K.; Devlin, J.; Foley, A.M.

    2015-01-01

    Throughout the European Union there is an increasing amount of wind generation being dispatched-down due to the binding of power system operating constraints from high levels of wind generation. This paper examines the impact a system non-synchronous penetration limit has on the dispatch-down of wind and quantifies the significance of interconnector counter-trading to the priority dispatching of wind power. A fully coupled economic dispatch and security constrained unit commitment model of the Single Electricity Market of the Republic of Ireland and Northern Ireland and the British Electricity Trading and Transmission Arrangement was used in this study. The key finding was interconnector counter-trading reduces the impact the system non-synchronous penetration limit has on the dispatch-down of wind. The capability to counter-trade on the interconnectors and an increase in system non-synchronous penetration limit from 50% to 55% reduces the dispatch-down of wind by 311 GW h and decreases total electricity payments to the consumer by €1.72/MW h. In terms of the European Union electricity market integration, the results show the importance of developing individual electricity markets that allow system operators to counter-trade on interconnectors to ensure the priority dispatch of the increasing levels of wind generation. - Highlights: • Interconnector counter-trading reduces the system marginal price in the SEM. • Dispatch-down of wind power is reduced due to interconnector counter-trading. • A 5% increase in the SNSP limit can reduce wind power dispatched-down by 50%. • An increase in the SNSP limit and installed wind capacity reduces the SMP.

  14. Improved security detection strategy in quantum secure direct communication protocol based on four-particle Green-Horne-Zeilinger state

    Energy Technology Data Exchange (ETDEWEB)

    Li, Jian; Nie, Jin-Rui; Li, Rui-Fan [Beijing Univ. of Posts and Telecommunications, Beijing (China). School of Computer; Jing, Bo [Beijing Univ. of Posts and Telecommunications, Beijing (China). School of Computer; Beijing Institute of Applied Meteorology, Beijing (China). Dept. of Computer Science

    2012-06-15

    To enhance the efficiency of eavesdropping detection in the quantum secure direct communication protocol, an improved quantum secure direct communication protocol based on a four-particle Green-Horne-Zeilinger (GHZ) state is presented. In the protocol, the four-particle GHZ state is used to detect eavesdroppers, and quantum dense coding is used to encode the message. In the security analysis, the method of entropy theory is introduced, and two detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference that has been introduced. If the eavesdropper wants to obtain all the information, the detection rate of the quantum secure direct communication using an Einstein-Podolsky-Rosen (EPR) pair block will be 50% and the detection rate of the presented protocol will be 87%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol proposed is more secure than the others. (orig.)

  15. Simple algorithm for improved security in the FDDI protocol

    Science.gov (United States)

    Lundy, G. M.; Jones, Benjamin

    1993-02-01

    We propose a modification to the Fiber Distributed Data Interface (FDDI) protocol based on a simple algorithm which will improve confidential communication capability. This proposed modification provides a simple and reliable system which exploits some of the inherent security properties in a fiber optic ring network. This method differs from conventional methods in that end to end encryption can be facilitated at the media access control sublayer of the data link layer in the OSI network model. Our method is based on a variation of the bit stream cipher method. The transmitting station takes the intended confidential message and uses a simple modulo two addition operation against an initialization vector. The encrypted message is virtually unbreakable without the initialization vector. None of the stations on the ring will have access to both the encrypted message and the initialization vector except the transmitting and receiving stations. The generation of the initialization vector is unique for each confidential transmission and thus provides a unique approach to the key distribution problem. The FDDI protocol is of particular interest to the military in terms of LAN/MAN implementations. Both the Army and the Navy are considering the standard as the basis for future network systems. A simple and reliable security mechanism with the potential to support realtime communications is a necessary consideration in the implementation of these systems. The proposed method offers several advantages over traditional methods in terms of speed, reliability, and standardization.

  16. Improving food security empowerment in Indonesia- Timor Leste border

    Science.gov (United States)

    Dewi, G. D. P.; Yustikaningrum, R. V.

    2018-03-01

    Post Referendum 1999, Indonesia and Timor Leste have a strategic challenge to provide food consistently around the border. This research intended to discover an appropriate strategy to tackle fragility of food security in the land border of Indonesia-Timor Leste, to improve collaborative actions between parties, as well as, opportunity to actualize food cross-border trading between local farmers and factories. For the result, there are two approaches will be applied. First, the empowerment term refers to the strategy of empowerment in strengthening the capability and capacity of human capital as one of the determinant factors of the resilience and self-sufficiency achievement. Second, the gender approach looks at the women and men build confidence, resilience, and independence which one of them through an educational intervention that enable the local people to manage food chain. Atambua is a region count as relatively as high poverty, poor human capital, weak quality and competitiveness of agriculture products, livestock and fishery, SMEs, and infrastructure. Thus, field study research is applied to find the actual and strategic effort aim to lead the achievement of food security and to engage Atambua over food trade to Timor Leste.

  17. Creating a Middle Grades Environment that Significantly Improves Student Achievement

    Science.gov (United States)

    L'Esperance, Mark E.; Lenker, Ethan; Bullock, Ann; Lockamy, Becky; Mason, Cathy

    2013-01-01

    This article offers an overview of the framework that Sampson County Public Schools (North Carolina) used to critically reflect on the current state of their middle grades schools. The article also highlights the changes that resulted from the district-wide analysis and the ways in which these changes led to a significant increase in the academic…

  18. A Key Generation Model for Improving the Security of Cryptographic ...

    African Journals Online (AJOL)

    Cryptography is a mathematical technique that plays an important role in information security techniques for addressing authentication, interactive proofs, data origination, sender/receiver identity, non-repudiation, secure computation, data integrity and confidentiality, message integrity checking and digital signatures.

  19. Improving Timeliness in Real-Time Secure Database Systems

    National Research Council Canada - National Science Library

    Son, Sang H; David, Rasikan; Thuraisingham, Bhavani

    2006-01-01

    .... In addition to real-time requirements, security is usually required in many applications. Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems...

  20. Significance of the institute of appeals under the conditions of increasing threats to national security

    Directory of Open Access Journals (Sweden)

    A. V. Kapulovskyi

    2015-03-01

    Full Text Available The article deals with the regulatory and scientific foundation for the development of the institute of citizens’ treatments in terms of obvious internal and external threats to national security. An attempt to construct an applicable model of management of public processes in terms of threats to national security, in which public opinion plays a key value. The fact that a successful resolution of problem of public participation in the preparation and acceptance of political decisions requires not only the presence of the constitutionally enshrined rights and duties and political institutions formed democratically, but also a variety of forms and ways of influencing in the activities of public authorities. At the same time, in a not declared, the so-called »hybrid» war, in which warfare are conducted locally - in some parts of the state and all other public and private institutions function in usual mode, tracking of possible threats to national security and factors that give rise to such threats should be carried out by means of both cleanly military, and civil means and methods. Thus, one of the most effective civil means of tracking such threats are the reception of citizens’ treatments, their processing and the adoption of appropriate response measures, in my opinion. Keywords: national security, public safety, human rights, public authorities, public interest.

  1. Low-dose vaporized cannabis significantly improves neuropathic pain.

    Science.gov (United States)

    Wilsey, Barth; Marcotte, Thomas; Deutsch, Reena; Gouaux, Ben; Sakai, Staci; Donaghe, Haylee

    2013-02-01

    We conducted a double-blind, placebo-controlled, crossover study evaluating the analgesic efficacy of vaporized cannabis in subjects, the majority of whom were experiencing neuropathic pain despite traditional treatment. Thirty-nine patients with central and peripheral neuropathic pain underwent a standardized procedure for inhaling medium-dose (3.53%), low-dose (1.29%), or placebo cannabis with the primary outcome being visual analog scale pain intensity. Psychoactive side effects and neuropsychological performance were also evaluated. Mixed-effects regression models demonstrated an analgesic response to vaporized cannabis. There was no significant difference between the 2 active dose groups' results (P > .7). The number needed to treat (NNT) to achieve 30% pain reduction was 3.2 for placebo versus low-dose, 2.9 for placebo versus medium-dose, and 25 for medium- versus low-dose. As these NNTs are comparable to those of traditional neuropathic pain medications, cannabis has analgesic efficacy with the low dose being as effective a pain reliever as the medium dose. Psychoactive effects were minimal and well tolerated, and neuropsychological effects were of limited duration and readily reversible within 1 to 2 hours. Vaporized cannabis, even at low doses, may present an effective option for patients with treatment-resistant neuropathic pain. The analgesia obtained from a low dose of delta-9-tetrahydrocannabinol (1.29%) in patients, most of whom were experiencing neuropathic pain despite conventional treatments, is a clinically significant outcome. In general, the effect sizes on cognitive testing were consistent with this minimal dose. As a result, one might not anticipate a significant impact on daily functioning. Published by Elsevier Inc.

  2. Low Dose Vaporized Cannabis Significantly Improves Neuropathic Pain

    Science.gov (United States)

    Wilsey, Barth; Marcotte, Thomas D.; Deutsch, Reena; Gouaux, Ben; Sakai, Staci; Donaghe, Haylee

    2013-01-01

    We conducted a double-blind, placebo-controlled, crossover study evaluating the analgesic efficacy of vaporized cannabis in subjects, the majority of whom were experiencing neuropathic pain despite traditional treatment. Thirty-nine patients with central and peripheral neuropathic pain underwent a standardized procedure for inhaling either medium dose (3.53%), low dose (1.29%), or placebo cannabis with the primary outcome being VAS pain intensity. Psychoactive side-effects, and neuropsychological performance were also evaluated. Mixed effects regression models demonstrated an analgesic response to vaporized cannabis. There was no significant difference between the two active dose groups’ results (p>0.7). The number needed to treat (NNT) to achieve 30% pain reduction was 3.2 for placebo vs. low dose, 2.9 for placebo vs. medium dose, and 25 for medium vs. low dose. As these NNT are comparable to those of traditional neuropathic pain medications, cannabis has analgesic efficacy with the low dose being, for all intents and purposes, as effective a pain reliever as the medium dose. Psychoactive effects were minimal and well-tolerated, and neuropsychological effects were of limited duration and readily reversible within 1–2 hours. Vaporized cannabis, even at low doses, may present an effective option for patients with treatment-resistant neuropathic pain. PMID:23237736

  3. Security aspects of "Geoenergeia" and the significance of energy resources management in international politics

    OpenAIRE

    VIDAKIS, Ioannis; BALTOS, Georgios

    2015-01-01

    This paper builds on the tools of geopolitics and geo-economics for analyzing energy resource networks and energy security. To prioritize the role that energy resources play in the interpretation of and decision making in international politics, it proposes the introduction of the Greek language-inspired term "geoenergeia" and a derivative methodology. Unprecedented fluctuations in fuel prices during recent decades and intensifying turmoil in the energy market are all indisputable phenomena t...

  4. Leveraging Safety Programs to Improve and Support Security Programs

    Energy Technology Data Exchange (ETDEWEB)

    Leach, Janice [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Snell, Mark K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Pratt, R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sandoval, S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-10-01

    There has been a long history of considering Safety, Security, and Safeguards (3S) as three functions of nuclear security design and operations that need to be properly and collectively integrated with operations. This paper specifically considers how safety programmes can be extended directly to benefit security as part of an integrated facility management programme. The discussion will draw on experiences implementing such a programme at Sandia National Laboratories’ Annular Research Reactor Facility. While the paper focuses on nuclear facilities, similar ideas could be used to support security programmes at other types of high-consequence facilities and transportation activities.

  5. Seeking A Breakthrough: The Improvement of The Asia-Pacific Security Structure From the Perspective of “One Belt One Road” Initiative

    OpenAIRE

    Zhang Zhaoxi

    2016-01-01

    The U.S alliance in the Asia-Pacific region has exerted significant influence on Asia-Pacific security architecture for a long time. While with the deepening of interdependence among Asia-Pacific countries, the development of regional international relations has outdated the existing security architecture in this region. It is imperative to improve the architecture in that there are plenty of structural hurdles, such as the obsolescence of security concepts, the fragmentation of security mech...

  6. 75 FR 56858 - Improvements to the Supplemental Security Income Program-Heroes Earnings Assistance and Relief...

    Science.gov (United States)

    2010-09-17

    ... number, 1-800-772-1213, or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 416 [Docket No. SSA-2009-0017] RIN 0960-AH00 Improvements to the Supplemental Security Income Program--Heroes Earnings Assistance and Relief Tax Act of 2008...

  7. Environmental and climate security: improving scenario methodologies for science and risk assessment

    Science.gov (United States)

    Briggs, C. M.; Carlsen, H.

    2010-12-01

    Governments and popular discussions have increasingly referred to concepts of ‘climate security’, often with reference to IPCC data. Development of effective methodologies to translate complex, scientific data into risk assessments has lagged, resulting in overly simplistic political assumptions of potential impacts. Climate security scenarios have been developed for use by security and military agencies, but effective engagement by scientific communities requires an improved framework. Effective use of data requires improvement both of climate projections, and the mapping of cascading impacts across interlinked, complex systems. In this research we propose a process for systematic generation of subsets of scenarios (of arbitrary size) from a given set of variables with possible interlinkages. The variables could include climatic changes as well as other global changes of concerns in a security context. In coping with possible challenges associated with the nexus of climate change and security - where deep structural uncertainty and possible irreversible changes are of primary interest - it is important to explore the outer limits of the relevant uncertainties. Therefore the proposed process includes a novel method that will help scenario developers in generating scenario sets where the scenarios are in a quantifiable sense maximally different and therefore best ‘span’ the whole set of scenarios. When downscaled onto a regional level, this process can provide guidance to potentially significant and abrupt geophysical changes, where high uncertainty has often prevented communication of risks. Potential physical changes can then be used as starting points for mapping cascading effects across networks, including topological analysis to identify critically vulnerable nodes and fragile systems, the existence of positive or negative feedback loops, and possible intervention points. Advanced knowledge of both potential geo-physical shifts and related non

  8. Improving Mental Health Reporting Practices in Between Personnel Security Investigations

    Science.gov (United States)

    2017-06-01

    derogatory information, unfavorable administrative actions, and adverse actions to the appropriate personnel security, human resources , and...national security clearance? What type of clearances do people typically have (e.g., Secret, Top Secret, TS/SCI, SAP , etc.)? (2) Does [the

  9. Stormwater harvesting: Improving water security in South Africa's urban areas

    Directory of Open Access Journals (Sweden)

    Lloyd Fisher-Jeffes

    2017-01-01

    Full Text Available The drought experienced in South Africa in 2016 one of the worst in decades has left many urbanised parts of the country with limited access to water, and food production has been affected. If a future water crisis is to be averted, the country needs to conserve current water supplies, reduce its reliance on conventional surface water schemes, and seek alternative sources of water supply. Within urban areas, municipalities must find ways to adapt to, and mitigate the threats from, water insecurity resulting from, inter alia, droughts, climate change and increasing water demand driven by population growth and rising standards of living. Stormwater harvesting (SWH is one possible alternative water resource that could supplement traditional urban water supplies, as well as simultaneously offer a range of social and environmental benefits. We set out three position statements relating to how SWH can: improve water security and increase resilience to climate change in urban areas; prevent frequent flooding; and provide additional benefits to society. We also identify priority research areas for the future in order to target and support the appropriate uptake of SWH in South Africa, including testing the viability of SWH through the use of real-time control and managed aquifer recharge.

  10. Improving organisational resilience through enterprise security risk management.

    Science.gov (United States)

    Petruzzi, John; Loyear, Rachelle

    Enterprise Security Risk Management (ESRM) is a new philosophy and method of managing security programmes through the use of traditional risk principles. As a philosophy and life cycle, ESRM is focused on creating a business partnership between security practitioners and business leaders to more effectively provide protection against security risks in line with acceptable risk tolerances as defined by business asset owners and stakeholders. This paper explores the basics of the ESRM philosophy and life cycle and also shows how embracing the ESRM philosophy and implementing a risk-based security management model in the business organisation can lead to higher levels of organisational resilience as desired by organisation leaders, executives and the board of directors.

  11. Report: Improvements Needed in Key EPA Information System Security Practices

    Science.gov (United States)

    Report #10-P-0146, June 15, 2010. Williams Adley found that EPA program offices lacked evidence that they planned and executed tests of information system security controls as required by federal requirements.

  12. Improving food security and nutrition through research | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-10-06

    Oct 6, 2016 ... In Canada, the 2012 federal budget highlighted CIFSRF's success, noting how the ... New animal vaccines could keep more African farmers in business ... Research on food security makes a difference for African women.

  13. Improved Security Models & Protocols in Online Mobile Business Financial Transactions

    OpenAIRE

    Sreeramana Aithal

    2017-01-01

    Chapter I : Introduction to Mobile Business and Mobile Banking Chapter II : Review of Literature on Mobile Business Technology, Mobile Banking Services & Security Chapter III : Research Objectives and Methodology Chapter IV : Results and Discussion Chapter V : Summary and Conclusions Bibliography

  14. Agencies Need Improved Financial Data Reporting for Private Security Contractors

    National Research Council Canada - National Science Library

    Warren, David R; Bianco, Michael A; Nasser, Waheed; Kusman, Richard R; Shafer, James; Venner, Jason; Walls, Lovell Q; Wright, Samson J

    2008-01-01

    Section 842 of the National Defense Authorization Act of 2008 (Public Law 110-181), required SIGIR to, among other things, develop a plan to evaluate various characteristics of contracting for private security contractor services in Iraq...

  15. ICT-Based Framework for Improved Food Security in Nigeria ...

    African Journals Online (AJOL)

    The six regional decision support systems in this model is a comprehensive database ... from research findings and innovations, inputs from agricultural extension officers, ... Keywords: Food Security, Interactive websites, National Internet host, ...

  16. Agencies Need Improved Financial Data Reporting for Private Security Contractors

    National Research Council Canada - National Science Library

    Warren, David R; Bianco, Michael A; Nasser, Waheed; Kusman, Richard R; Shafer, James; Venner, Jason; Walls, Lovell Q; Wright, Samson J

    2008-01-01

    .... The objective of this report was to determine the extent to which federal agencies have systematically captured financial data for private security services in Iraq since 2003, and to identify...

  17. POLICE OFFICE MODEL IMPROVEMENT FOR SECURITY OF SWARM ROBOTIC SYSTEMS

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2014-09-01

    Full Text Available This paper focuses on aspects of information security for group of mobile robotic systems with swarm intellect. The ways for hidden attacks realization by the opposing party on swarm algorithm are discussed. We have fulfilled numerical modeling of potentially destructive information influence on the ant shortest path algorithm. We have demonstrated the consequences of attacks on the ant algorithm with different concentration in a swarm of subversive robots. Approaches are suggested for information security mechanisms in swarm robotic systems, based on the principles of centralized security management for mobile agents. We have developed the method of forming a self-organizing information security management system for robotic agents in swarm groups implementing POM (Police Office Model – a security model based on police offices, to provide information security in multi-agent systems. The method is based on the usage of police station network in the graph nodes, which have functions of identification and authentication of agents, identifying subversive robots by both their formal characteristics and their behavior in the swarm. We have suggested a list of software and hardware components for police stations, consisting of: communication channels between the robots in police office, nodes register, a database of robotic agents, a database of encryption and decryption module. We have suggested the variants of logic for the mechanism of information security in swarm systems with different temporary diagrams of data communication between police stations. We present comparative analysis of implementation of protected swarm systems depending on the functioning logic of police offices, integrated in swarm system. It is shown that the security model saves the ability to operate in noisy environments, when the duration of the interference is comparable to the time necessary for the agent to overcome the path between police stations.

  18. EU Failing FAO Challenge to Improve Global Food Security.

    Science.gov (United States)

    Smyth, Stuart J; Phillips, Peter W B; Kerr, William A

    2016-07-01

    The announcement that the European Union (EU) had reached an agreement allowing Member States (MS) to ban genetically modified (GM) crops confirms that the EU has chosen to ignore the food security challenge issued to the world by the Food and Agriculture Organization of the United Nations (FAO) in 2009. The FAO suggests that agricultural biotechnology has a central role in meeting the food security challenge. Copyright © 2016 Elsevier Ltd. All rights reserved.

  19. Geomechanical Modeling for Improved CO2 Storage Security

    Science.gov (United States)

    Rutqvist, J.; Rinaldi, A. P.; Cappa, F.; Jeanne, P.; Mazzoldi, A.; Urpi, L.; Vilarrasa, V.; Guglielmi, Y.

    2017-12-01

    This presentation summarizes recent modeling studies on geomechanical aspects related to Geologic Carbon Sequestration (GCS,) including modeling potential fault reactivation, seismicity and CO2 leakage. The model simulations demonstrates that the potential for fault reactivation and the resulting seismic magnitude as well as the potential for creating a leakage path through overburden sealing layers (caprock) depends on a number of parameters such as fault orientation, stress field, and rock properties. The model simulations further demonstrate that seismic events large enough to be felt by humans requires brittle fault properties as well as continuous fault permeability allowing for the pressure to be distributed over a large fault patch to be ruptured at once. Heterogeneous fault properties, which are commonly encountered in faults intersecting multilayered shale/sandstone sequences, effectively reduce the likelihood of inducing felt seismicity and also effectively impede upward CO2 leakage. Site specific model simulations of the In Salah CO2 storage site showed that deep fractured zone responses and associated seismicity occurred in the brittle fractured sandstone reservoir, but at a very substantial reservoir overpressure close to the magnitude of the least principal stress. It is suggested that coupled geomechanical modeling be used to guide the site selection and assisting in identification of locations most prone to unwanted and damaging geomechanical changes, and to evaluate potential consequence of such unwanted geomechanical changes. The geomechanical modeling can be used to better estimate the maximum sustainable injection rate or reservoir pressure and thereby provide for improved CO2 storage security. Whether damaging geomechanical changes could actually occur very much depends on the local stress field and local reservoir properties such the presence of ductile rock and faults (which can aseismically accommodate for the stress and strain induced by

  20. Critical Conversations and the Role of Dialogue in Delivering Meaningful Improvements in Safety and Security Culture

    International Nuclear Information System (INIS)

    Brissette, S.

    2016-01-01

    Significant scholarship has been devoted to research into safety culture assessment methodologies. These focus on the development, delivery and interpretations of safety culture surveys and other assessment techniques to assure reliable outcomes that provide insights into the safety culture of an organization across multiple dimensions. The lessons from this scholarship can be applied to the emerging area of security culture assessments as the nuclear industry broadens its focus on this topic. The aim of this paper is to discuss the value of establishing mechanisms, immediately after an assessment and regularly between assessments, to facilitate a structured dialogue among leaders around insights derived from an assessment, to enable ongoing improvements in safety and security culture. The leader’s role includes both understanding the current state of culture, the “what is”, and creating regular, open and informed dialogue around their role in shaping the culture to achieve “what should be”.

  1. Improvement of economic security management system of municipalities with account of transportation system development: methods of assessment

    Science.gov (United States)

    Khe Sun, Pak; Vorona-Slivinskaya, Lubov; Voskresenskay, Elena

    2017-10-01

    The article highlights the necessity of a complex approach to assess economic security of municipalities, which would consider municipal management specifics. The approach allows comparing the economic security level of municipalities, but it does not describe parameter differences between compared municipalities. Therefore, there is a second method suggested: parameter rank order method. Applying these methods allowed to figure out the leaders and outsiders of the economic security among municipalities and rank all economic security parameters according to the significance level. Complex assessment of the economic security of municipalities, based on the combination of the two approaches, allowed to assess the security level more accurate. In order to assure economic security and equalize its threshold values, one should pay special attention to transportation system development in municipalities. Strategic aims of projects in the area of transportation infrastructure development in municipalities include the following issues: contribution into creating and elaborating transportation logistics and manufacture transport complexes, development of transportation infrastructure with account of internal and external functions of the region, public transport development, improvement of transport security and reducing its negative influence on the environment.

  2. Improving Land Dry Farmer Capacity Toward Adequate Food Security

    Directory of Open Access Journals (Sweden)

    Sitti Aminah

    2015-09-01

    Full Text Available Land dry farmers have not enrolled in supporting food security. Most of the farmer are the peasants with low capacity to produce food. The purpose of the research is to formulate policy recommendation to increase capacity of the peasants for support food security. The data were collected using following techniques: questionnaire, interview and focus group discussion. The data were analyzed using descriptive statistics and structural equation modelling (SEM. The research results showed that the peasant characteristics and the peasants capacity are within low category, influencing the level of food security. The Government are expected actively to increase the peasant’s capacity by optimizing efforts: providing extension and training in participatory ways; increasing role of facilitator and researcher in empowerment process, increasing the peasants’ access to production input, credit facilities and wider markets, give incentive to the peasants so that they can do double working, as well as increasing coordination between government institutions and stakeholder.

  3. Foraging Is Determinant to Improve Smallholders’ Food Security in Rural Areas in Mali, West Africa

    Directory of Open Access Journals (Sweden)

    Sognigbe N’Danikou

    2017-11-01

    Full Text Available Studies on the enabling factors for household food security (HFS most often used simplified econometric models looking into the links with a selected set of variables. In this research, a livelihood approach of HFS was used and aimed at determining the most significant livelihood assets for HFS in dryland agricultural systems. Elements of the five livelihood assets were assessed through questionnaire surveys with a random sample of 180 households, and six focus group discussions in three communities along the rural-urban continuum, in Southern Mali. The coping strategy index approach was used to evaluate household food security status. Non-parametric and parametric statistical tests were combined, as appropriate, to identify the most significant determinants of HFS status. Findings indicated that most determinant factors of HFS were the diversity of wild and cultivated food plants, and hunting (natural capital; access to clean water and irrigation (infrastructural capital; and off-farm employment (financial capital. HFS also improved along the urban-rural continuum and rural households with high natural capital seemed to be more food secure. Findings call for important investment to expand the natural capital (e.g., domestication of new crops and agricultural diversification and infrastructural capital (irrigation facilities, clean water of the rural households.

  4. Cloud Computing Security Model with Combination of Data Encryption Standard Algorithm (DES) and Least Significant Bit (LSB)

    Science.gov (United States)

    Basri, M.; Mawengkang, H.; Zamzami, E. M.

    2018-03-01

    Limitations of storage sources is one option to switch to cloud storage. Confidentiality and security of data stored on the cloud is very important. To keep up the confidentiality and security of such data can be done one of them by using cryptography techniques. Data Encryption Standard (DES) is one of the block cipher algorithms used as standard symmetric encryption algorithm. This DES will produce 8 blocks of ciphers combined into one ciphertext, but the ciphertext are weak against brute force attacks. Therefore, the last 8 block cipher will be converted into 8 random images using Least Significant Bit (LSB) algorithm which later draws the result of cipher of DES algorithm to be merged into one.

  5. Seeking A Breakthrough: The Improvement of The Asia-Pacific Security Structure From the Perspective of “One Belt One Road” Initiative

    Directory of Open Access Journals (Sweden)

    Zhang Zhaoxi

    2016-12-01

    Full Text Available The U.S alliance in the Asia-Pacific region has exerted significant influence on Asia-Pacific security architecture for a long time. While with the deepening of interdependence among Asia-Pacific countries, the development of regional international relations has outdated the existing security architecture in this region. It is imperative to improve the architecture in that there are plenty of structural hurdles, such as the obsolescence of security concepts, the fragmentation of security mechanism and the dearth of public goods on security affairs. OBOR, which is exemplary as a new multilateral cooperative initiative and has interacted profoundly with the regional security of the Asia-Pacific, holds endogenous relations with the Asia-Pacific security architecture. OBOR could improve the Asia-Pacific security architecture in the following ways: to create a new model of security maintenance in light of the advanced ideas given by OBOR; to design new institutional frameworks which are more normative and effective with mechanical innovations stemming from OBOR; to enrich the security public goods in the Asia-Pacific region under the reference of co-construction and sharing the idea of OBOR. However, the practice of improvement will face tremendous challenges both internally and externally. These challenges should be prudently analyzed and treated in order to better fulfill the co-evolution in the process of the construction of OBOR and the improvement of the Asia-Pacific security architecture, for the promotion of long-termed prosperity and stability in this region.

  6. Managing Wetlands for Improved Food Security in Uganda | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Researchers will determine the food security status of households adjacent to wetlands and the part that wetlands resources contribute to it. They will analyze the tradeoffs in using wetlands for crop production. And, they will test, adapt and promote agricultural technologies that enhance productivity while minimizing ...

  7. Improving DNS security : a measurement-based approach

    NARCIS (Netherlands)

    van Rijswijk-Deij, Roland

    2017-01-01

    The Domain Name System (DNS) is a vital part of the core infrastructure of the Internet. It maps human readable names (such as www.example.com) to machine readable information (such as 93.184.216.34). This thesis studies two aspects of the DNS. First, it studies problems in the DNS Security

  8. Managing Wetlands for Improved Food Security in Uganda | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    However, little is known about the contribution of wetland resources to household food security or the environmental impact of using wetlands for agriculture or other purposes. Researchers will ... IDRC is pleased to announce the results of its 2017 call for proposals to establish Cyber Policy Centres in the Global South.

  9. 360 PORT MDA - A Strategy to Improve Port Security

    Science.gov (United States)

    2006-09-01

    Participating Agencies (After: Executive Briefing..........................27 Table 6. Designated Joint Operations Center Participants (From: SAFE...Investigations CGIP Coast Guard Intelligence Program CHOC Charleston Harbor Operations Center CIO Command Intelligence Officer CMT Combating Maritime... EXECUTIVE SUMMARY Ports are critical to our economy and national security. Key hubs in the international trade network, U.S. ports accounted for more than

  10. A Secure Behavior Modification Sensor System for Physical Activity Improvement

    Science.gov (United States)

    Price, Alan

    2011-01-01

    Today, advances in wireless sensor networks are making it possible to capture large amounts of information about a person and their interaction within their home environment. However, what is missing is how to ensure the security of the collected data and its use to alter human behavior for positive benefit. In this research, exploration was…

  11. Improving potato production for increased food security of ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The challenge. In Colombia, food security is a national concern, and indigenous communities of Nariño are among the most food insecure in the country. Potato is the staple food crop and main source of family income for the region's smallholder farms — many of which are headed by women. One of the biggest threats to ...

  12. Watermarking Techniques Using Least Significant Bit Algorithm for Digital Image Security Standard Solution- Based Android

    Directory of Open Access Journals (Sweden)

    Ari Muzakir

    2017-05-01

    Full Text Available Ease of deployment of digital image through the internet has positive and negative sides, especially for owners of the original digital image. The positive side of the ease of rapid deployment is the owner of that image deploys digital image files to various sites in the world address. While the downside is that if there is no copyright that serves as protector of the image it will be very easily recognized ownership by other parties. Watermarking is one solution to protect the copyright and know the results of the digital image. With Digital Image Watermarking, copyright resulting digital image will be protected through the insertion of additional information such as owner information and the authenticity of the digital image. The least significant bit (LSB is one of the algorithm is simple and easy to understand. The results of the simulations carried out using android smartphone shows that the LSB watermarking technique is not able to be seen by naked human eye, meaning there is no significant difference in the image of the original files with images that have been inserted watermarking. The resulting image has dimensions of 640x480 with a bit depth of 32 bits. In addition, to determine the function of the ability of the device (smartphone in processing the image using this application used black box testing. 

  13. Securing budget for and implementing your significant simulator upgrade: The Fermi experience

    International Nuclear Information System (INIS)

    Crone, B.D.

    2006-01-01

    Detroit Edison has selected CAE to perform a total simulator upgrade (with the exception of the panel hardware and I/O system) of the Fermi 2 station simulator. The upgrade is intended to improve the performance of the simulator (and thus training effectiveness) while reducing associated operating costs by utilizing an industry standard operating platform, software applications, and off the shelf PC based computer hardware. Additionally, the upgrade is intended to provide the ability to conduct classroom presentations through the use of desktop simulators. Because the cost of a total upgrade is considerable, substantial work is necessary to convince site management that such an undertaking is necessary, can be performed efficiently, and that a return on investment is even possible. This effort was compounded by the lingering history of a previous simulator upgrade, which was completed considerably over-budget and beyond the intended Ready for Training date. As of this writing, the Fermi 2 Simulator Upgrade using CAE products is approximately 60% complete. This paper will describe the methods used to procure funding, as well as steps taken following funding approval to keep the project on track for successful completion. (author)

  14. Information Security in Education: Are We Continually Improving?

    Directory of Open Access Journals (Sweden)

    Dennis Bialaszewski

    2015-06-01

    Full Text Available This paper will shed light on the lack of the development of appropriate monitoring systems in the field of education. Test banks can be easily purchased. Smart phones can take and share pictures of exams. A video of an exam given through Blackboard can easily be made. A survey to determine the extent of cheating using technology was given to several university students. Evidence is provided that shows security is lacking as evidenced by the number of students who have made use of technological advances to cheat on exams. The findings and conclusion may serve as evidence for administrators and policy makers to re-assess efforts being made to increase security in online testing.

  15. Security improvement by using a modified coherent state for quantum cryptography

    International Nuclear Information System (INIS)

    Lu, Y.J.; Zhu, Luobei; Ou, Z.Y.

    2005-01-01

    Weak coherent states as a photon source for quantum cryptography have a limit in secure data rate and transmission distance because of the presence of multiphoton events and loss in transmission line. Two-photon events in a coherent state can be taken out by a two-photon interference scheme. We investigate the security issue of utilizing this modified coherent state in quantum cryptography. A 4-dB improvement in the secure data rate or a nearly twofold increase in transmission distance over the coherent state are found. With a recently proposed and improved encoding strategy, further improvement is possible

  16. Improving the security of quantum protocols via commit-and-open

    NARCIS (Netherlands)

    I.B. Damgård (Ivan); S. Fehr (Serge); C. Luneman; L. Salvail (Louis); C. Schaffner (Christian)

    2009-01-01

    htmlabstractWe consider two-party quantum protocols starting with a transmission of some random BB84 qubits followed by classical messages. We show a general compiler improving the security of such protocols: if the original protocol is secure against an almost honest adversary, then the

  17. Improving the security of the Hwang-Su protocol for mobile networks

    African Journals Online (AJOL)

    user

    Improving the security of the Hwang-Su protocol for mobile networks. Miloud Ait Hemad, My ... Furthermore, the wireless data channel is low data rate. These restrictions have an ..... Research in Security and Privacy. Wu T. Y. and Tsen Y. M., ...

  18. Reducing food wastage, improving food security? An inventory study on stakeholders’ perspectives and the current state

    NARCIS (Netherlands)

    Tielens, J.; Candel, J.J.L.

    2014-01-01

    This study is concerned with the relation between food wastage reduction and the improvement of food security. The central question of this inventory study is to what extent interventions to reduce food wastage are effective contributions for food security, in particular for local access in

  19. Improving method for calculating integral index of personnel security of company

    Directory of Open Access Journals (Sweden)

    Chjan Khao Yui

    2016-06-01

    Full Text Available The paper improves the method of calculating the integral index of personnel security of a company. The author has identified four components of personnel security (social and motivational safety, occupational safety, not confliction security, life safety which are characterized by certain indicators. Integral index of personnel security is designed for the enterprises of machine-building sector in Kharkov region, taking into account theweight coefficients j-th component of bj, and weighting factors that determine the degree of contribution of the ith parameter in the integral index aіj as defined by experts.

  20. A new method for improving security in MANETs AODV Protocol

    Directory of Open Access Journals (Sweden)

    Zahra Alishahi

    2012-10-01

    Full Text Available In mobile ad hoc network (MANET, secure communication is more challenging task due to its fundamental characteristics like having less infrastructure, wireless link, distributed cooperation, dynamic topology, lack of association, resource constrained and physical vulnerability of node. In MANET, attacks can be broadly classified in two categories: routing attacks and data forwarding attacks. Any action not following rules of routing protocols belongs to routing attacks. The main objective of routing attacks is to disrupt normal functioning of network by advertising false routing updates. On the other hand, data forwarding attacks include actions such as modification or dropping data packet, which does not disrupt routing protocol. In this paper, we address the “Packet Drop Attack”, which is a serious threat to operational mobile ad hoc networks. The consequence of not forwarding other packets or dropping other packets prevents any kind of communication to be established in the network. Therefore, there is a need to address the packet dropping event takes higher priority for the mobile ad hoc networks to emerge and to operate, successfully. In this paper, we propose a method to secure ad hoc on-demand distance vector (AODV routing protocol. The proposed method provides security for routing packets where the malicious node acts as a black-hole and drops packets. In this method, the collaboration of a group of nodes is used to make accurate decisions. Validating received RREPs allows the source to select trusted path to its destination. The simulation results show that the proposed mechanism is able to detect any number of attackers.

  1. AN ENCRYPTION ALGORITHM FOR IMPROVING DATABASE SECURITY USING ROT & REA

    OpenAIRE

    M. Sujitha; M. Pushpa

    2015-01-01

    Database is an organized collection of data, many user wants to store their personal and confidential data’s in such database. Unauthorized persons may try to get the data’s from database and misuse them without the owner’s knowledge. To overcome such problem the advanced control mechanism, known as Database security was introduced. Encryption algorithm is one of the way to give protection to the database from various threat or hackers who target to get confidential information. This paper di...

  2. Improving food security in Latin America and the Caribbean | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    21 avr. 2016 ... Farm to fork—improving eating habits and nutrition education in the Caribbean · Science ... Family fish farming improves quality of life in the Bolivian Amazon ... Agricultural technologies bring healthy diversity to school meals ...

  3. Improving food security in Latin America and the Caribbean | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-04-21

    Apr 21, 2016 ... Farm to fork—improving eating habits and nutrition education in the Caribbean · Science ... Family fish farming improves quality of life in the Bolivian Amazon ... Agricultural technologies bring healthy diversity to school meals ...

  4. Improving Food Security in the Highlands of Ethiopia through ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... in the Highlands of Ethiopia through Improved and Sustainable Agricultural Productivity and ... Women will be involved as agents of change in the adoption of improved ... IDRC and key partners will showcase critical work on adaptation and ...

  5. Improving the security of the Hwang-Su protocol for mobile networks

    African Journals Online (AJOL)

    user

    Improving the security of the Hwang-Su protocol for mobile networks. Miloud Ait ... But, it is threatened by weak ... Wireless networks (IEEE standard 802.11 1996, Gast 2005) have allowed computer systems to exchange data without cable.

  6. Use of Minicameras to Improve Operative Procedure in Security Forces.

    Science.gov (United States)

    Clemente-Suárez, Vicente Javier; Diaz-Manzano, Montaña; Robles-Pérez, José Juan

    2017-09-01

    The aim of the present study was to analyze pistol and compact rifle marksmanship in close quarter combat (CQC). There is currently a controversy about what weapon is most appropriate to use in CQC, short weapon as pistols or long weapons as rifle. Forty two participants conducted two close quarter combat simulations, one with pistol and one with compact rifle. Marksmanship and time to cover the simulation were measured. Data obtained showed no significant differences between pistol and compact rifle. In addition, it was observed a tendency to obtain higher scores with compact rifle, probably be due to the higher stability provided in the shot action. Compact rifle could be an effective election in actual theaters of operation in which asymmetrical and symmetrical combat are combined and also in police interventions due to compact rifle provide higher fire power and range and obtained the same shooting performance than pistol. To the best of our knowledge this is the first study that provides empirical data to solve the discussion about the efficiency of the use of rifle and pistol in close quarter combat in military and police interventions. These results could be used to improve the military and police interventions efficiency.

  7. Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’

    Directory of Open Access Journals (Sweden)

    Muhammad Khurram Khan

    2010-03-01

    Full Text Available User authentication in wireless sensor networks (WSN is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules; authenticating remote users in such resource-constrained environments is a paramount security concern. Recently, M.L. Das proposed a two-factor user authentication scheme in WSNs and claimed that his scheme is secure against different kinds of attack. However, in this paper, we show that the M.L. Das-scheme has some critical security pitfalls and cannot be recommended for real applications. We point out that in his scheme: users cannot change/update their passwords, it does not provide mutual authentication between gateway node and sensor node, and is vulnerable to gateway node bypassing attack and privileged-insider attack. To overcome the inherent security weaknesses of the M.L. Das-scheme, we propose improvements and security patches that attempt to fix the susceptibilities of his scheme. The proposed security improvements can be incorporated in the M.L. Das-scheme for achieving a more secure and robust two-factor user authentication in WSNs.

  8. Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'.

    Science.gov (United States)

    Khan, Muhammad Khurram; Alghathbar, Khaled

    2010-01-01

    User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules; authenticating remote users in such resource-constrained environments is a paramount security concern. Recently, M.L. Das proposed a two-factor user authentication scheme in WSNs and claimed that his scheme is secure against different kinds of attack. However, in this paper, we show that the M.L. Das-scheme has some critical security pitfalls and cannot be recommended for real applications. We point out that in his scheme: users cannot change/update their passwords, it does not provide mutual authentication between gateway node and sensor node, and is vulnerable to gateway node bypassing attack and privileged-insider attack. To overcome the inherent security weaknesses of the M.L. Das-scheme, we propose improvements and security patches that attempt to fix the susceptibilities of his scheme. The proposed security improvements can be incorporated in the M.L. Das-scheme for achieving a more secure and robust two-factor user authentication in WSNs.

  9. Trade and commerce in improved crops and food: an essay on food security.

    Science.gov (United States)

    Kershen, Drew L

    2010-11-30

    Agricultural trade between nations is a significant proportion of total international trade. Agricultural trade in transgenic crops faces extra complications due to the existence of domestic and international regimes that focus specifically on agricultural biotechnology. These specialized regimes create legal and commercial challenges for trade in transgenic crops that have significant implications for the food security of the nations of the world. By food security, one should understand not just the available supply of food, but also the quality of the food and the environmental impact of agricultural production systems. These specialized regimes for transgenic crops can either encourage or hinder the adoption of agricultural biotechnology as a sustainable intensive agriculture. Sustainable intensive agriculture offers hope for agronomic improvements for agricultural production, socio-economic betterment for farmers and environmental benefits for societies. Sustainable intensive agriculture offers particular hope for the poorest farmers of the world because agricultural biotechnology is a technology in the seed. Copyright © 2010 Elsevier B.V. All rights reserved.

  10. National Emergency Preparedness and Response: Improving for Incidents of National Significance

    National Research Council Canada - National Science Library

    Clayton, Christopher M

    2006-01-01

    The national emergency management system has need of significant improvement in its contingency planning and early consolidation of effort and coordination between federal, state, and local agencies...

  11. Security analysis and improvements of arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Zou Xiangfu; Qiu Daowen

    2010-01-01

    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature (AQS) schemes have been proposed. It was claimed that these AQS schemes could guarantee unconditional security. However, we show that they can be repudiated by the receiver Bob. To conquer this shortcoming, we construct an AQS scheme using a public board. The AQS scheme not only avoids being disavowed by the receiver but also preserves all merits in the existing schemes. Furthermore, we discover that entanglement is not necessary while all these existing AQS schemes depend on entanglement. Therefore, we present another AQS scheme without utilizing entangled states in the signing phase and the verifying phase. This scheme has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.

  12. Toward Improved Security and Privacy in Modern Healthcare

    Science.gov (United States)

    Pagano, Matthew Wallach

    2013-01-01

    The conversion of paper-based medical records into electronic formats is set to bring many benefits to healthcare. This includes creating a more seamless exchange of electronic health records (EHRs) between providers, improving healthcare while lowering its costs, and providing patients with increased access to their EHRs. As more medical…

  13. Using smartphones to improve animal health and food security ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-05-05

    May 5, 2016 ... The app is also helping farmers raise healthier animals and improve their own ... and found to be a convenient and user-friendly tool for learning and ... of smartphone-based knowledge mobilization technology for building the ...

  14. Security Analysis and Improvement of ‘a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System’

    Science.gov (United States)

    Islam, SK Hafizul; Khan, Muhammad Khurram; Li, Xiong

    2015-01-01

    Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.’s scheme for integrated electronic patient record (EPR) information system, which has been analyzed in this study. We have found that Wen’s scheme still has the following inefficiencies: (1) the correctness of identity and password are not verified during the login and password change phases; (2) it is vulnerable to impersonation attack and privileged-insider attack; (3) it is designed without the revocation of lost/stolen smart card; (4) the explicit key confirmation and the no key control properties are absent, and (5) user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP) in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature. PMID:26263401

  15. Security Analysis and Improvement of 'a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System'.

    Directory of Open Access Journals (Sweden)

    S K Hafizul Islam

    Full Text Available Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.'s scheme for integrated electronic patient record (EPR information system, which has been analyzed in this study. We have found that Wen's scheme still has the following inefficiencies: (1 the correctness of identity and password are not verified during the login and password change phases; (2 it is vulnerable to impersonation attack and privileged-insider attack; (3 it is designed without the revocation of lost/stolen smart card; (4 the explicit key confirmation and the no key control properties are absent, and (5 user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature.

  16. Frameworks for improvement: clinical audit, the plan-do-study-act cycle and significant event audit.

    Science.gov (United States)

    Gillam, Steve; Siriwardena, A Niroshan

    2013-01-01

    This is the first in a series of articles about quality improvement tools and techniques. We explore common frameworks for improvement, including the model for improvement and its application to clinical audit, plan-do-study-act (PDSA) cycles and significant event analysis (SEA), examining the similarities and differences between these and providing examples of each.

  17. Cryptanalysis and improvement of quantum secure communication network protocol with entangled photons for mobile communications

    International Nuclear Information System (INIS)

    Gao, Gan

    2014-01-01

    Recently, a communication protocol called controlled bidirectional quantum secret direct communication for mobile networks was proposed by Chou et al (2014 Mobile Netw. Appl. 19 121). We study the security of the proposed communication protocol and find that it is not secure. The controller, Telecom Company, may eavesdrop secret messages from mobile devices without being detected. Finally, we give a possible improvement of the communication protocol. (paper)

  18. SECURITIES REGULATION: Improvements Needed in the Amex Listing Program

    National Research Council Canada - National Science Library

    2001-01-01

    .... The remaining markets had significantly fewer listings. For example, the fourth-largest market in terms of the number of companies listed was the Boston Stock Exchange, with 84 listings, 46 of which were also listed on Nasdaq...

  19. An improved smartcard for the South African Social Security Agency (SASSA): A proof of life based solution

    CSIR Research Space (South Africa)

    Mthethwa, Sthembile

    2016-12-01

    Full Text Available Conference on Information Science and Security, Pattaya, Thailand, 19 - 22 December 2016 An improved smartcard for the South African Social Security Agency (SASSA): A proof of life based solution Mthethwa, S. Barbour, G. Thinyane, M...

  20. Sustainability impact assessment to improve food security of smallholders in Tanzania

    International Nuclear Information System (INIS)

    Schindler, Jana; Graef, Frieder; König, Hannes Jochen; Mchau, Devotha; Saidia, Paul; Sieber, Stefan

    2016-01-01

    The objective of this paper was to assess the sustainability impacts of planned agricultural development interventions, so called upgrading strategies (UPS), to enhance food security and to identify what advantages and risks are assessed from the farmer's point of view in regards to social life, the economy and the environment. We developed a participatory methodological procedure that links food security and sustainable development. Farmers in four different case study villages in rural Tanzania chose their priority UPS. For these UPS, they assessed the impacts on locally relevant food security criteria. The positive impacts identified were mainly attributed to increased agricultural production and its related positive impacts such as increased income and improved access to necessary means to diversify the diet. However, several risks of certain UPS were also indicated by farmers, such as increased workload, high maintenance costs, higher competition among farmers, loss of traditional knowledge and social conflicts. We discussed the strong interdependence of socio-economic and environmental criteria to improve food security for small-scale farmers and analysed several trade-offs in regards to UPS choices and food security criteria. We also identified and discussed the advantages and challenges of our methodological approach. In conclusion, the participatory impact assessment on the farmer level allowed a locally specific analysis of the various positive and negative impacts of UPS on social life, the economy and the environment. We emphasize that only a development approach that considers social, economic and environmental challenges simultaneously can enhance food security.

  1. Sustainability impact assessment to improve food security of smallholders in Tanzania

    Energy Technology Data Exchange (ETDEWEB)

    Schindler, Jana, E-mail: jana.schindler@zalf.de [Leibniz Centre for Agricultural Landscape Research (ZALF), Institute of Land Use Systems, Eberswalder Straße 84, 15374 Müncheberg (Germany); Humboldt Universität zu Berlin, Faculty of Agriculture and Horticulture, Invalidenstr. 42, 10099 Berlin (Germany); Graef, Frieder, E-mail: graef@zalf.de [Leibniz Centre for Agricultural Landscape Research (ZALF), Institute of Land Use Systems, Eberswalder Straße 84, 15374 Müncheberg (Germany); König, Hannes Jochen, E-mail: hkoenig@zalf.de [Leibniz Centre for Agricultural Landscape Research (ZALF), Institute of Land Use Systems, Eberswalder Straße 84, 15374 Müncheberg (Germany); Mchau, Devotha, E-mail: dvtmchau@yahoo.com [Agricultural Research Institute (ARI Hombolo/Makutupora), P. O. Box 1676, Dodoma (Tanzania, United Republic of); Saidia, Paul, E-mail: saidiapaul@gmail.com [Sokoine University of Agriculture (SUA) Morogoro, Department of Crop Science and Production, P O. Box 3005, Morogoro (Tanzania, United Republic of); Sieber, Stefan, E-mail: stefan.sieber@zalf.de [Leibniz Centre for Agricultural Landscape Research (ZALF), Institute of Socio-Economics, Eberswalder Straße 84, 15374 Müncheberg (Germany)

    2016-09-15

    The objective of this paper was to assess the sustainability impacts of planned agricultural development interventions, so called upgrading strategies (UPS), to enhance food security and to identify what advantages and risks are assessed from the farmer's point of view in regards to social life, the economy and the environment. We developed a participatory methodological procedure that links food security and sustainable development. Farmers in four different case study villages in rural Tanzania chose their priority UPS. For these UPS, they assessed the impacts on locally relevant food security criteria. The positive impacts identified were mainly attributed to increased agricultural production and its related positive impacts such as increased income and improved access to necessary means to diversify the diet. However, several risks of certain UPS were also indicated by farmers, such as increased workload, high maintenance costs, higher competition among farmers, loss of traditional knowledge and social conflicts. We discussed the strong interdependence of socio-economic and environmental criteria to improve food security for small-scale farmers and analysed several trade-offs in regards to UPS choices and food security criteria. We also identified and discussed the advantages and challenges of our methodological approach. In conclusion, the participatory impact assessment on the farmer level allowed a locally specific analysis of the various positive and negative impacts of UPS on social life, the economy and the environment. We emphasize that only a development approach that considers social, economic and environmental challenges simultaneously can enhance food security.

  2. Improving the security of multiparty quantum secret sharing against Trojan horse attack

    International Nuclear Information System (INIS)

    Deng Fuguo; Li Xihan; Zhou Hongyu; Zhang Zhanjun

    2005-01-01

    We analyzed the security of the multiparty quantum secret sharing (MQSS) protocol recently proposed by Zhang, Li, and Man [Phys. Rev. A 71, 044301 (2005)] and found that this protocol is secure for any other eavesdropper except for the agent Bob who prepares the quantum signals as he can attack the quantum communication with a Trojan horse. That is, Bob replaces the single-photon signal with a multiphoton one and the other agent Charlie cannot find this cheating as she does not measure the photons before they run back from the boss Alice, which reveals that this MQSS protocol is not secure for Bob. Finally, we present a possible improvement of the MQSS protocol security with two single-photon measurements and four unitary operations

  3. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  4. Impersonation attack on a quantum secure direct communication and authentication protocol with improvement

    Science.gov (United States)

    Amerimehr, Ali; Hadain Dehkordi, Massoud

    2018-03-01

    We analyze the security of a quantum secure direct communication and authentication protocol based on single photons. We first give an impersonation attack on the protocol. The cryptanalysis shows that there is a gap in the authentication procedure of the protocol so that an opponent can reveal the secret information by an undetectable attempt. We then propose an improvement for the protocol and show it closes the gap by applying a mutual authentication procedure. In the improved protocol single photons are transmitted once in a session, so it is easy to implement as the primary protocol. Furthermore, we use a novel technique for secret order rearrangement of photons by which not only quantum storage is eliminated also a secret key can be reused securely. So the new protocol is applicable in practical approaches like embedded system devices.

  5. Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User

    Directory of Open Access Journals (Sweden)

    Jongho Moon

    2017-01-01

    Full Text Available Recently many authentication protocols using an extended chaotic map were suggested for a mobile user. Many researchers demonstrated that authentication protocol needs to provide key agreement, mutual authentication, and user anonymity between mobile user and server and resilience to many possible attacks. In this paper, we cautiously analyzed chaotic-map-based authentication scheme and proved that it is still insecure to off-line identity guessing, user and server impersonation, and on-line identity guessing attacks. To address these vulnerabilities, we proposed an improved protocol based on an extended chaotic map and a fuzzy extractor. We proved the security of the proposed protocol using a random oracle and AVISPA (Automated Validation of Internet Security Protocols and Applications tool. Furthermore, we present an informal security analysis to make sure that the improved protocol is invulnerable to possible attacks. The proposed protocol is also computationally efficient when compared to other previous protocols.

  6. Human Factors in Coast Guard Computer Security - An Analysis of Current Awareness and Potential Techniques to Improve Security Program Viability

    National Research Council Canada - National Science Library

    Whalen, Timothy

    2001-01-01

    .... As such, our ability to ensure the security of those systems is also increasing in import. Traditional information security measures tend to be system-oriented and often fail to address the human element that is critical to system success...

  7. Analysis of the nexus between population, water resources and Global Food Security highlights significance of governance and research investments and policy priorities.

    Science.gov (United States)

    Yunusa, Isa A M; Zerihun, Ayalsew; Gibberd, Mark R

    2018-05-10

    Analyses of sensitivity of Global Food Security (GFS) score to a key set of supply or demand factors often suggest population and water supply as being the most critical and on which policies tend to focus. To explore other policy options, we characterised the nexus between GFS and a set of supply or demand factors including defining including population, agricultural and industrial water-use, agricultural publications (as a surrogate for investment in agricultural research and development [R&D]), and corruption perception index (CPI), to reveal opportunities for attaining enduring GFS. We found that despite being the primary driver of demand for food, population showed no significant correlation with GFS scores. Similarly agricultural water-use was poorly correlated with GFS scores, except in countries where evaporation exceeds precipitation and irrigation is significant. However, GFS had a strong positive association with industrial water-use as a surrogate for overall industrialisation. Recent expansions in cultivated land area failed to yield concomitant improvements in GFS score since such expansions have been mostly into marginal lands with low productivity and also barely compensated for lands retired from cropping in several developed economies. However, GFS was positively associated with agricultural R&D investments, as it was with the CPI scores. The apparent and relative strengths of these drivers on GFS outcome amongst countries were in the order: industrial water-use ≈ publication rate ≈ corruption perception > agricultural water-use > population. We concluded by suggesting that to enshrine enduring food security, policies should prioritise (1) increased R&D investments that address farmer needs, and (2) governance mechanisms that promote accountability in both research and production value chains. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  8. State regulation as a tool for improving the economic security of the regions

    Directory of Open Access Journals (Sweden)

    Yu. M. Sokolinskaya

    2017-01-01

    Full Text Available Providing economic security for the development of regions, increasing their competitiveness, risk-free and sustainable activities are the main tasks of the regional program of social and economic development, which occupies a special place in the system of instruments for public management of these processes. The program of social and economic development is a unique strategy of the region aimed at security and optimization of the spatial structure and relations between the center and the regions in order to ensure economic security and growth by maximizing the effective use of existing internal and external factors. The institutional influence of the state in order to improve the economic security of regions and enterprises occurs palliatively when the business of the region is supported in direct – subsidies, and more often indirectly – compliance with the laws and regulations of the Russian Federation and the region, on the principles of institutional and market synergies. Adaptation of enterprises in the region to the market is difficult, when specific socio-organizational, economic, technical and technological, scientific, information activities in their interrelations function in the field of Russian laws. The search for ways to improve the economic security of the Russian Federation, regions and enterprises takes place in the context of global integration through the improvement of the mechanism of state regulation. An important task of the current stage of economic security of the country and regions is the construction of a system of its institutional organization that would be able to balance the levers of government with the opportunities of private enterprises, provide a quality level of providing the business with protection from terrorism, predation, financial risks, legal competition etc.

  9. Improving Student Engagement in the Study of Professional Ethics: Concepts and an Example in Cyber Security.

    Science.gov (United States)

    Bustard, John D

    2018-04-01

    In spite of the acknowledged importance of professional ethics, technical students often show little enthusiasm for studying the subject. This paper considers how such engagement might be improved. Four guiding principles for promoting engagement are identified: (1) aligning teaching content with student interests; (2) taking a pragmatic rather than a philosophical approach to issue resolution; (3) addressing the full complexity of real-world case studies; and (4) covering content in a way that students find entertaining. The use of these principles is then discussed with respect to the specific experience of developing and presenting a master's module in Ethical and Legal Issues in Cyber Security at Queens University Belfast. One significant aspect of the resulting design is that it encourages students to see ethical issues in systemic terms rather than from an individual perspective, with issues emerging from a conflict between different groups with different vested interests. Case studies are used to examine how personal and business priorities create conflicts that can lead to negative press, fines and punitive legal action. The module explores the reasons why organisations may be unaware of the risks associated with their actions and how an inappropriate response to an ethical issue can significantly aggravate a situation. The module has been delivered in three successive years since 2014 and been well received on each occasion. The paper describes the design of the module and the experience of delivering it, concluding with a discussion of the effectiveness of the approach.

  10. Improving the security of optoelectronic delayed feedback system by parameter modulation and system coupling

    Science.gov (United States)

    Liu, Lingfeng; Miao, Suoxia; Cheng, Mengfan; Gao, Xiaojing

    2016-02-01

    A coupled system with varying parameters is proposed to improve the security of optoelectronic delayed feedback system. This system is coupled by two parameter-varied optoelectronic delayed feedback systems with chaotic modulation. Dynamics performance results show that this system has a higher complexity compared to the original one. Furthermore, this system can conceal the time delay effectively against the autocorrelation function and delayed mutual information method and can increase the dimension space of secure parameters to resist brute-force attack by introducing the digital chaotic systems.

  11. Improved Optical Document Security Techniques Based on Volume Holography and Lippmann Photography

    Science.gov (United States)

    Bjelkhagen, Hans I.

    Optical variable devices (OVDs), such as holograms, are now common in the field of document security. Up until now mass-produced embossed holograms or other types of mass-produced OVDs are used not only for banknotes but also for personalized documents, such as passports, ID cards, travel documents, driving licenses, credit cards, etc. This means that identical OVDs are used on documents issued to individuals. Today, there is need for a higher degree of security on such documents and this chapter covers new techniques to make improved mass-produced or personalized OVDs.

  12. [Formula: see text]Determination of the smoking gun of intent: significance testing of forced choice results in social security claimants.

    Science.gov (United States)

    Binder, Laurence M; Chafetz, Michael D

    2018-01-01

    Significantly below-chance findings on forced choice tests have been described as revealing "the smoking gun of intent" that proved malingering. The issues of probability levels, one-tailed vs. two-tailed tests, and the combining of PVT scores on significantly below-chance findings were addressed in a previous study, with a recommendation of a probability level of .20 to test the significance of below-chance results. The purpose of the present study was to determine the rate of below-chance findings in a Social Security Disability claimant sample using the previous recommendations. We compared the frequency of below-chance results on forced choice performance validity tests (PVTs) at two levels of significance, .05 and .20, and when using significance testing on individual subtests of the PVTs compared with total scores in claimants for Social Security Disability in order to determine the rate of the expected increase. The frequency of significant results increased with the higher level of significance for each subtest of the PVT and when combining individual test sections to increase the number of test items, with up to 20% of claimants showing significantly below-chance results at the higher p-value. These findings are discussed in light of Social Security Administration policy, showing an impact on policy issues concerning child abuse and neglect, and the importance of using these techniques in evaluations for Social Security Disability.

  13. Assessing Community Readiness to Reduce Childhood Diarrheal Disease and Improve Food Security in Dioro, Mali

    Directory of Open Access Journals (Sweden)

    Erica C. Borresen

    2016-06-01

    Full Text Available Diarrhea and malnutrition represent leading causes of death for children in Mali. Understanding a community’s needs and ideas are critical to ensure the success of prevention and treatment interventions for diarrheal disease, as well as to improve food security to help reduce malnutrition. The objective of this study was to incorporate the Community Readiness Model (CRM for the issues of childhood diarrheal disease and food security in Mali to measure baseline community readiness prior to any program implementation. Thirteen key respondents residing in Dioro, Mali were selected based on varied social roles and demographics and completed two questionnaires on these public health issues. The overall readiness score to reduce childhood diarrheal disease was 5.75 ± 1.0 standard deviation (preparation stage. The overall readiness score to improve food security was 5.5 ± 0.5 standard deviation (preparation stage. The preparation stage indicates that at least some of the community have basic knowledge regarding these issues, and want to act locally to reduce childhood diarrhea and improve food security and nutrition. Proposed activities to increase community readiness on these issues are provided and are broad enough to allow opportunities to implement community- and culturally-specific activities by the Dioro community.

  14. Analysis and Improvement of Large Payload Bidirectional Quantum Secure Direct Communication Without Information Leakage

    Science.gov (United States)

    Liu, Zhi-Hao; Chen, Han-Wu

    2018-02-01

    As we know, the information leakage problem should be avoided in a secure quantum communication protocol. Unfortunately, it is found that this problem does exist in the large payload bidirectional quantum secure direct communication (BQSDC) protocol (Ye Int. J. Quantum. Inf. 11(5), 1350051 2013) which is based on entanglement swapping between any two Greenberger-Horne-Zeilinger (GHZ) states. To be specific, one half of the information interchanged in this protocol is leaked out unconsciously without any active attack from an eavesdropper. Afterward, this BQSDC protocol is revised to the one without information leakage. It is shown that the improved BQSDC protocol is secure against the general individual attack and has some obvious features compared with the original one.

  15. Improved Asymmetric Cipher Based on Matrix Power Function with Provable Security

    Directory of Open Access Journals (Sweden)

    Eligijus Sakalauskas

    2017-01-01

    Full Text Available The improved version of the author’s previously declared asymmetric cipher protocol based on matrix power function (MPF is presented. Proposed modification avoids discrete logarithm attack (DLA which could be applied to the previously declared protocol. This attack allows us to transform the initial system of MPF equations to so-called matrix multivariate quadratic (MMQ system of equations, which is a system representing a subclass of multivariate quadratic (MQ systems of equations. We are making a conjecture that avoidance of DLA in protocol, presented here, should increase its security, since an attempt to solve the initial system of MPF equations would appear to be no less complex than solving the system of MMQ equations. No algorithms are known to solve such a system of equations. Security parameters and their secure values are defined. Security analysis against chosen plaintext attack (CPA and chosen ciphertext attack (CCA is presented. Measures taken to prevent DLA attack increase the security of this protocol with respect to the previously declated protocol.

  16. Neuro-Linguistic Programming: Improving Rapport between Track/Cross Country Coaches and Significant Others

    Science.gov (United States)

    Helm, David Jay

    2017-01-01

    This study examines the background information and the components of N.L.P., being eye movements, use of predicates, and posturing, as they apply to improving rapport and empathy between track/cross country coaches and their significant others in the arena of competition to help alleviate the inherent stressors.

  17. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    Science.gov (United States)

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  18. Security analysis and improvements of authentication and access control in the Internet of Things.

    Science.gov (United States)

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  19. A case for avoiding security-enhanced HTTP tools to improve security for Web-based applications

    Energy Technology Data Exchange (ETDEWEB)

    Wood, B.

    1996-03-01

    This paper describes some of the general weaknesses of the current popular Hypertext Transmission Protocol (HTTP) security standards and products in an effort to show that these standards are not appealing for many applications. The author will then show how one can treat HTTP browsers and servers as untrusted elements in the network so that one can rely on other mechanisms to achieve better overall security than can be attained through today`s security-enhanced HTTP tools.

  20. Formulation, computation and improvement of steady state security margins in power systems. Part II: Results

    International Nuclear Information System (INIS)

    Echavarren, F.M.; Lobato, E.; Rouco, L.; Gomez, T.

    2011-01-01

    A steady state security margin for a particular operating point can be defined as the distance from this initial point to the secure operating limits of the system. Four of the most used steady state security margins are the power flow feasibility margin, the contingency feasibility margin, the load margin to voltage collapse, and the total transfer capability between system areas. This is the second part of a two part paper. Part I has proposed a novel framework of a general model able to formulate, compute and improve any steady state security margin. In Part II the performance of the general model is validated by solving a variety of practical situations in modern real power systems. Actual examples of the Spanish power system will be used for this purpose. The same computation and improvement algorithms outlined in Part I have been applied for the four security margins considered in the study, outlining the convenience of defining a general framework valid for the four of them. The general model is used here in Part II to compute and improve: (a) the power flow feasibility margin (assessing the influence of the reactive power generation limits in the Spanish power system), (b) the contingency feasibility margin (assessing the influence of transmission and generation capacity in maintaining a correct voltage profile), (c) the load margin to voltage collapse (assessing the location and quantity of loads that must be shed in order to be far away from voltage collapse) and (d) the total transfer capability (assessing the export import pattern of electric power between different areas of the Spanish system). (author)

  1. Formulation, computation and improvement of steady state security margins in power systems. Part II: Results

    Energy Technology Data Exchange (ETDEWEB)

    Echavarren, F.M.; Lobato, E.; Rouco, L.; Gomez, T. [School of Engineering of Universidad Pontificia Comillas, C/Alberto Aguilera, 23, 28015 Madrid (Spain)

    2011-02-15

    A steady state security margin for a particular operating point can be defined as the distance from this initial point to the secure operating limits of the system. Four of the most used steady state security margins are the power flow feasibility margin, the contingency feasibility margin, the load margin to voltage collapse, and the total transfer capability between system areas. This is the second part of a two part paper. Part I has proposed a novel framework of a general model able to formulate, compute and improve any steady state security margin. In Part II the performance of the general model is validated by solving a variety of practical situations in modern real power systems. Actual examples of the Spanish power system will be used for this purpose. The same computation and improvement algorithms outlined in Part I have been applied for the four security margins considered in the study, outlining the convenience of defining a general framework valid for the four of them. The general model is used here in Part II to compute and improve: (a) the power flow feasibility margin (assessing the influence of the reactive power generation limits in the Spanish power system), (b) the contingency feasibility margin (assessing the influence of transmission and generation capacity in maintaining a correct voltage profile), (c) the load margin to voltage collapse (assessing the location and quantity of loads that must be shed in order to be far away from voltage collapse) and (d) the total transfer capability (assessing the export import pattern of electric power between different areas of the Spanish system). (author)

  2. Security analysis and improvement of a privacy authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Wu, Fan; Xu, Lili

    2013-08-01

    Nowadays, patients can gain many kinds of medical service on line via Telecare Medical Information Systems(TMIS) due to the fast development of computer technology. So security of communication through network between the users and the server is very significant. Authentication plays an important part to protect information from being attacked by malicious attackers. Recently, Jiang et al. proposed a privacy enhanced scheme for TMIS using smart cards and claimed their scheme was better than Chen et al.'s. However, we have showed that Jiang et al.'s scheme has the weakness of ID uselessness and is vulnerable to off-line password guessing attack and user impersonation attack if an attacker compromises the legal user's smart card. Also, it can't resist DoS attack in two cases: after a successful impersonation attack and wrong password input in Password change phase. Then we propose an improved mutual authentication scheme used for a telecare medical information system. Remote monitoring, checking patients' past medical history record and medical consultant can be applied in the system where information transmits via Internet. Finally, our analysis indicates that the suggested scheme overcomes the disadvantages of Jiang et al.'s scheme and is practical for TMIS.

  3. Nuclear Regulatory Systems in Africa: Improving Safety and Security Culture Through Education and Training

    International Nuclear Information System (INIS)

    Kazadi Kabuya, F.

    2016-01-01

    The purpose of this paper is to address the important issue of supporting safety and security culture through an educational and training course program designed both for regulatory staff and licensees. Enhancing the safety and security of nuclear facilities may involve assessing the overall effectiveness of the organization's safety culture. Safety Culture implies steps such as identifying and targeting areas requiring attention, putting emphasis on organizational strengths and weaknesses, human attitudes and behaviours that may positively impact an organization's safety culture, resulting in improving workplace safety and developing and maintaining a high level of awareness within these facilities. Following the terrorist attacks of September 11, 2001, international efforts were made towards achieving such goals. This was realized through meetings, summits and training courses events, with main aim to enhance security at facilities whose activities, if attacked, could impact public health and safety. During regulatory oversight inspections undertaken on some licensee's premises, violations of security requirements were identified. They mostly involved inadequate management oversight of security, lack of a questioning attitude, complacency and mostly inadequate training in both security and safety issues. Using training and education approach as a support to raise awareness on safety and security issues in the framework of improving safety and security culture, a tentative training program in nuclear and radiological safety was started in 2002 with the main aim of vulgarizing the regulatory framework. Real first needs for a training course program were identified among radiographers and radiologists with established working experience but with limited knowledge in radiation safety. In the field of industrial uses of radiation the triggering events for introducing and implementing a training program were: the loss of a radioactive source in a mining

  4. Rehearsal significantly improves immediate and delayed recall on the Rey Auditory Verbal Learning Test.

    Science.gov (United States)

    Hessen, Erik

    2011-10-01

    A repeated observation during memory assessment with the Rey Auditory Verbal Learning Test (RAVLT) is that patients who spontaneously employ a memory rehearsal strategy by repeating the word list more than once achieve better scores than patients who only repeat the word list once. This observation led to concern about the ability of the standard test procedure of RAVLT and similar tests in eliciting the best possible recall scores. The purpose of the present study was to test the hypothesis that a rehearsal recall strategy of repeating the word list more than once would result in improved scores of recall on the RAVLT. We report on differences in outcome after standard administration and after experimental administration on Immediate and Delayed Recall measures from the RAVLT of 50 patients. The experimental administration resulted in significantly improved scores for all the variables employed. Additionally, it was found that patients who failed effort screening showed significantly poorer improvement on Delayed Recall compared with those who passed the effort screening. The general clear improvement both in raw scores and T-scores demonstrates that recall performance can be significantly influenced by the strategy of the patient or by small variations in instructions by the examiner.

  5. National Institute of Justice (NIJ): improving the effectiveness of law enforcement via homeland security technology improvements (Keynote Address)

    Science.gov (United States)

    Morgan, John S.

    2005-05-01

    Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. Preventing terrorism and promoting the nation"s security is the Department of Justice"s number one strategic priority. This is reflected in its technology development efforts, as well as its operational focus. The National Institute of Justice (NIJ) is the national focal point for the research, development, test and evaluation of technology for law enforcement. In addition to its responsibilities in supporting day-to-day criminal justice needs in areas such as less lethal weapons and forensic science, NIJ also provides critical support for counter-terrorism capacity improvements in state and local law enforcement in several areas. The most important of these areas are bomb response, concealed weapons detection, communications and information technology, which together offer the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. NIJ coordinates its activities with several other key federal partners, including the Department of Homeland Security"s Science and Technology Directorate, the Technical Support Working Group, and the Department of Defense.

  6. Costello Syndrome with Severe Nodulocystic Acne: Unexpected Significant Improvement of Acanthosis Nigricans after Oral Isotretinoin Treatment

    Directory of Open Access Journals (Sweden)

    Leelawadee Sriboonnark

    2015-01-01

    Full Text Available We report the case of 17-year-old female diagnosed with Costello syndrome. Genetic testing provided a proof with G12S mutation in the HRAS gene since 3 years of age with a presentation of severe nodulocystic acne on her face. After 2 months of oral isotretinoin treatment, improvement in her acne was observed. Interestingly, an unexpected significant improvement of acanthosis nigricans on her neck and dorsum of her hands was found as well. We present this case as a successful treatment option by using oral isotretinoin for the treatment of acanthosis nigricans in Costello syndrome patients.

  7. Determination of significance in Ecological Impact Assessment: Past change, current practice and future improvements

    Energy Technology Data Exchange (ETDEWEB)

    Briggs, Sam; Hudson, Malcolm D., E-mail: mdh@soton.ac.uk

    2013-01-15

    Ecological Impact Assessment (EcIA) is an important tool for conservation and achieving sustainable development. 'Significant' impacts are those which disturb or alter the environment to a measurable degree. Significance is a crucial part of EcIA, our understanding of the concept in practice is vital if it is to be effective as a tool. This study employed three methods to assess how the determination of significance has changed through time, what current practice is, and what would lead to future improvements. Three data streams were collected: interviews with expert stakeholders, a review of 30 Environmental Statements and a broad-scale survey of the United Kingdom Institute of Ecology and Environmental Management (IEEM) members. The approach taken in the determination of significance has become more standardised and subjectivity has become constrained through a transparent framework. This has largely been driven by a set of guidelines produced by IEEM in 2006. The significance of impacts is now more clearly justified and the accuracy with which it is determined has improved. However, there are limitations to accuracy and effectiveness of the determination of significance. These are the quality of baseline survey data, our scientific understanding of ecological processes and the lack of monitoring and feedback of results. These in turn are restricted by the limited resources available in consultancies. The most notable recommendations for future practice are the implementation of monitoring and the publication of feedback, the creation of a central database for baseline survey data and the streamlining of guidance. - Highlights: Black-Right-Pointing-Pointer The assessment of significance has changed markedly through time. Black-Right-Pointing-Pointer The IEEM guidelines have driven a standardisation of practice. Black-Right-Pointing-Pointer Currently limited by quality of baseline data and scientific understanding. Black-Right-Pointing-Pointer Monitoring

  8. Histone deacetylase inhibitor significantly improved the cloning efficiency of porcine somatic cell nuclear transfer embryos.

    Science.gov (United States)

    Huang, Yongye; Tang, Xiaochun; Xie, Wanhua; Zhou, Yan; Li, Dong; Yao, Chaogang; Zhou, Yang; Zhu, Jianguo; Lai, Liangxue; Ouyang, Hongsheng; Pang, Daxin

    2011-12-01

    Valproic acid (VPA), a histone deacetylase inbibitor, has been shown to generate inducible pluripotent stem (iPS) cells from mouse and human fibroblasts with a significant higher efficiency. Because successful cloning by somatic cell nuclear transfer (SCNT) undergoes a full reprogramming process in which the epigenetic state of a differentiated donor nuclear is converted into an embryonic totipotent state, we speculated that VPA would be useful in promoting cloning efficiency. Therefore, in the present study, we examined whether VPA can promote the developmental competence of SCNT embryos by improving the reprogramming state of donor nucleus. Here we report that 1 mM VPA for 14 to 16 h following activation significantly increased the rate of blastocyst formation of porcine SCNT embryos constructed from Landrace fetal fibroblast cells compared to the control (31.8 vs. 11.4%). However, we found that the acetylation level of Histone H3 lysine 14 and Histone H4 lysine 5 and expression level of Oct4, Sox2, and Klf4 was not significantly changed between VPA-treated and -untreated groups at the blastocyst stage. The SCNT embryos were transferred to 38 surrogates, and the cloning efficiency in the treated group was significantly improved compared with the control group. Taken together, we have demonstrated that VPA can improve both in vitro and in vivo development competence of porcine SCNT embryos.

  9. SAFETY AND SECURITY IMPROVEMENT IN PUBLIC TRANSPORTATION BASED ON PUBLIC PERCEPTION IN DEVELOPING COUNTRIES

    Directory of Open Access Journals (Sweden)

    Tri Basuki JOEWONO

    2006-01-01

    Three aspects of an improvement agenda are proposed based on the perception data, namely technology, management, and institution. This agenda is clarified by a set of action plans incorporating the responsible parties and a time frame. The action plan is divided into three terms to define a clear goal for each step. The short-term action focuses on the hardware and on preparing further steps, whereas the medium-term action focuses on developing and improving the standard of safety and security. The long-term action focuses on advancing safety and security practices. The effectiveness of this agenda and action plan rests upon a set of assumptions, such as the degree of seriousness from the authoritative institution, fair distribution of information, the availability of reasonable resources, and coordinated and collaborative action from all parties involved to reach the objective.

  10. Understanding How the "Open" of Open Source Software (OSS) Will Improve Global Health Security.

    Science.gov (United States)

    Hahn, Erin; Blazes, David; Lewis, Sheri

    2016-01-01

    Improving global health security will require bold action in all corners of the world, particularly in developing settings, where poverty often contributes to an increase in emerging infectious diseases. In order to mitigate the impact of emerging pandemic threats, enhanced disease surveillance is needed to improve early detection and rapid response to outbreaks. However, the technology to facilitate this surveillance is often unattainable because of high costs, software and hardware maintenance needs, limited technical competence among public health officials, and internet connectivity challenges experienced in the field. One potential solution is to leverage open source software, a concept that is unfortunately often misunderstood. This article describes the principles and characteristics of open source software and how it may be applied to solve global health security challenges.

  11. Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement

    Science.gov (United States)

    Nurdiyanto, Heri; Rahim, Robbi; Wulan, Nur

    2017-12-01

    Symmetric type cryptography algorithm is known many weaknesses in encryption process compared with asymmetric type algorithm, symmetric stream cipher are algorithm that works on XOR process between plaintext and key, to improve the security of symmetric stream cipher algorithm done improvisation by using Triple Transposition Key which developed from Transposition Cipher and also use Base64 algorithm for encryption ending process, and from experiment the ciphertext that produced good enough and very random.

  12. From Serpent to CEO: Improving First-Term Security Forces Airman Performance Through Neuroscience Education

    Science.gov (United States)

    2017-06-09

    support procedures and decision - making processes. Creating awareness that limitations are present creates a natural motivation to want to reduce...law enforcement decision - making ? What cultural norms within Security Forces should be challenged to improve responses of young adults faced with...enforcement and combat decision - making processes is available. However, it is not uncommon for laboratory discoveries to enter clinical practice, not to

  13. Breaking a chaos-based secure communication scheme designed by an improved modulation method

    International Nuclear Information System (INIS)

    Li Shujun; Alvarez, Gonzalo; Chen Guanrong

    2005-01-01

    Recently Bu and Wang [Bu S, Wang B-H. Chaos, Solitons and Fractals 2004;19(4):919-24] proposed a simple modulation method aiming to improve the security of chaos-based secure communications against return-map-based attacks. Soon this modulation method was independently cryptanalyzed by Chee et al. [Chee CY, Xu D, Bishop SR. Chaos, Solitons and Fractals 2004;21(5):1129-34], Wu et al. [Wu X, Hu H, Zhang B. Chaos, Solitons and Fractals 2004;22(2):367-73], and Alvarez et al. [Alvarez G, Montoya F, Romera M, Pastor G. Chaos, Solitons and Fractals, in press, arXiv:nlin/0406065] via different attacks. As an enhancement to the Bu-Wang method, an improving scheme was suggested by Wu et al. by removing the relationship between the modulating function and the zero-points. The present paper points out that the improved scheme proposed by Wu et al. is still insecure against a new attack. Compared with the existing attacks, the proposed attack is more powerful and can also break the original Bu-Wang scheme. Furthermore, it is pointed out that the security of the modulation-based schemes proposed by Wu et al. is not so satisfactory from a pure cryptographical point of view. The synchronization performance of this class of modulation-based schemes is also discussed

  14. Breaking a chaos-based secure communication scheme designed by an improved modulation method

    Energy Technology Data Exchange (ETDEWEB)

    Li Shujun [Department of Electronic Engineering, City University of Hong Kong, Kowloon, Hong Kong (China)]. E-mail: hooklee@mail.com; Alvarez, Gonzalo [Instituto de Fisica Aplicada, Consejo Superior de Investigaciones Cientificas, Serrano 144-28006 Madrid (Spain); Chen Guanrong [Department of Electronic Engineering, City University of Hong Kong, Kowloon, Hong Kong (China)

    2005-07-01

    Recently Bu and Wang [Bu S, Wang B-H. Chaos, Solitons and Fractals 2004;19(4):919-24] proposed a simple modulation method aiming to improve the security of chaos-based secure communications against return-map-based attacks. Soon this modulation method was independently cryptanalyzed by Chee et al. [Chee CY, Xu D, Bishop SR. Chaos, Solitons and Fractals 2004;21(5):1129-34], Wu et al. [Wu X, Hu H, Zhang B. Chaos, Solitons and Fractals 2004;22(2):367-73], and Alvarez et al. [Alvarez G, Montoya F, Romera M, Pastor G. Chaos, Solitons and Fractals, in press, arXiv:nlin/0406065] via different attacks. As an enhancement to the Bu-Wang method, an improving scheme was suggested by Wu et al. by removing the relationship between the modulating function and the zero-points. The present paper points out that the improved scheme proposed by Wu et al. is still insecure against a new attack. Compared with the existing attacks, the proposed attack is more powerful and can also break the original Bu-Wang scheme. Furthermore, it is pointed out that the security of the modulation-based schemes proposed by Wu et al. is not so satisfactory from a pure cryptographical point of view. The synchronization performance of this class of modulation-based schemes is also discussed.

  15. Communication: Proper treatment of classically forbidden electronic transitions significantly improves detailed balance in surface hopping

    Energy Technology Data Exchange (ETDEWEB)

    Sifain, Andrew E. [Department of Physics and Astronomy, University of Southern California, Los Angeles, California 90089-0485 (United States); Wang, Linjun [Department of Chemistry, Zhejiang University, Hangzhou 310027 (China); Prezhdo, Oleg V. [Department of Physics and Astronomy, University of Southern California, Los Angeles, California 90089-0485 (United States); Department of Chemistry, University of Southern California, Los Angeles, California 90089-1062 (United States)

    2016-06-07

    Surface hopping is the most popular method for nonadiabatic molecular dynamics. Many have reported that it does not rigorously attain detailed balance at thermal equilibrium, but does so approximately. We show that convergence to the Boltzmann populations is significantly improved when the nuclear velocity is reversed after a classically forbidden hop. The proposed prescription significantly reduces the total number of classically forbidden hops encountered along a trajectory, suggesting that some randomization in nuclear velocity is needed when classically forbidden hops constitute a large fraction of attempted hops. Our results are verified computationally using two- and three-level quantum subsystems, coupled to a classical bath undergoing Langevin dynamics.

  16. Transboundary Water: Improving Methodologies and Developing Integrated Tools to Support Water Security

    Science.gov (United States)

    Hakimdavar, Raha; Wood, Danielle; Eylander, John; Peters-Lidard, Christa; Smith, Jane; Doorn, Brad; Green, David; Hummel, Corey; Moore, Thomas C.

    2018-01-01

    River basins for which transboundary coordination and governance is a factor are of concern to US national security, yet there is often a lack of sufficient data-driven information available at the needed time horizons to inform transboundary water decision-making for the intelligence, defense, and foreign policy communities. To address this need, a two-day workshop entitled Transboundary Water: Improving Methodologies and Developing Integrated Tools to Support Global Water Security was held in August 2017 in Maryland. The committee that organized and convened the workshop (the Organizing Committee) included representatives from the National Aeronautics and Space Administration (NASA), the US Army Corps of Engineers Engineer Research and Development Center (ERDC), and the US Air Force. The primary goal of the workshop was to advance knowledge on the current US Government and partners' technical information needs and gaps to support national security interests in relation to transboundary water. The workshop also aimed to identify avenues for greater communication and collaboration among the scientific, intelligence, defense, and foreign policy communities. The discussion around transboundary water was considered in the context of the greater global water challenges facing US national security.

  17. The challenges of ESRD care in developing economies: sub-Saharan African opportunities for significant improvement.

    Science.gov (United States)

    Bamgboye, Ebun Ladipo

    Chronic kidney disease (CKD) is a significant cause of morbidity and mortality in sub-Saharan Africa. This, along with other noncommunicable diseases like hypertension, diabetes, and heart diseases, poses a double burden on a region that is still struggling to cope with the scourge of communicable diseases like malaria, tuberculosis, HIV, and more recently Ebola. Causes of CKD in the region are predominantly glomerulonephritis and hypertension, although type 2 diabetes is also becoming a significant cause as is the retroviral disease. Patients are generally younger than in the developed world, and there is a significant male preponderance. Most patients are managed by hemodialysis, with peritoneal dialysis and kidney transplantation being available in only few countries in the region. Government funding and support for dialysis is often unavailable, and when available, often with restrictions. There is a dearth of trained manpower to treat the disease, and many countries have a limited number of units, which are often ill-equipped to deal adequately with the number of patients who require end-stage renal disease (ESRD) care in the region. Although there has been a significant improvement when compared with the situation, even as recently as 10 years ago, there is also the potential for further improvement, which would significantly improve the outcomes in patients with ESRD in the region. The information in this review was obtained from a combination of renal registry reports (published and unpublished), published articles, responses to a questionnaire sent to nephrologists prior to the World Congress of Nephrology (WCN) in Cape Town, and from nephrologists attending the WCN in Cape Town (March 13 - 17, 2015).

  18. Improving food and nutritional security of small and marginal coconut growers through diversification of crops and enterprises

    Directory of Open Access Journals (Sweden)

    Maria Luz George

    2010-10-01

    Full Text Available This paper presents the impact of integrating interventions like nutrition gardening, livestock rearing, product diversification and allied income generation activities in small and marginal coconut homesteads along with nutrition education in improving the food and nutritional security as well as the income of the family members. The activities were carried out through registered Community Based Organizations (CBOs in three locations in Kerala, India during 2005-2008. Data was collected before and after the project periods through interviews using a pre-tested questionnaire containing statements indicating the adequacy, quality and diversity of food materials. Fifty respondents each were randomly selected from the three communities, thereby resulting in a total sample size of 150. The data was analysed using SPSS by adopting statistical tools like frequency, average, percentage analysis, t – test and regression. Participatory planning and implementation of diverse interventions notably intercropping and off-farm activities along with nutrition education brought out significant improvements in the food and nutritional security, in terms of frequency and quantity of consumption as well as diet diversity. At the end of the project, 96%of the members became completely food secure and 72% nutritionally secure. The overall consumption of fruits, vegetables and milk by both children and adults and egg by children recorded increase over the project period. Consumption of fish was more than the Recommended Dietary Intake (RDI level during pre and post project periods. Project interventions like nutrition gardening could bring in surplus consumption of vegetables (35% and fruits (10% than RDI. In spite of the increased consumption of green leafy vegetables and milk and milk products over the project period, the levels of consumption were still below the RDI levels. CBO-wise analysis of the consumption patterns revealed the need for location

  19. Survival prediction algorithms miss significant opportunities for improvement if used for case selection in trauma quality improvement programs.

    Science.gov (United States)

    Heim, Catherine; Cole, Elaine; West, Anita; Tai, Nigel; Brohi, Karim

    2016-09-01

    Quality improvement (QI) programs have shown to reduce preventable mortality in trauma care. Detailed review of all trauma deaths is a time and resource consuming process and calculated probability of survival (Ps) has been proposed as audit filter. Review is limited on deaths that were 'expected to survive'. However no Ps-based algorithm has been validated and no study has examined elements of preventability associated with deaths classified as 'expected'. The objective of this study was to examine whether trauma performance review can be streamlined using existing mortality prediction tools without missing important areas for improvement. We conducted a retrospective study of all trauma deaths reviewed by our trauma QI program. Deaths were classified into non-preventable, possibly preventable, probably preventable or preventable. Opportunities for improvement (OPIs) involve failure in the process of care and were classified into clinical and system deviations from standards of care. TRISS and PS were used for calculation of probability of survival. Peer-review charts were reviewed by a single investigator. Over 8 years, 626 patients were included. One third showed elements of preventability and 4% were preventable. Preventability occurred across the entire range of the calculated Ps band. Limiting review to unexpected deaths would have missed over 50% of all preventability issues and a third of preventable deaths. 37% of patients showed opportunities for improvement (OPIs). Neither TRISS nor PS allowed for reliable identification of OPIs and limiting peer-review to patients with unexpected deaths would have missed close to 60% of all issues in care. TRISS and PS fail to identify a significant proportion of avoidable deaths and miss important opportunities for process and system improvement. Based on this, all trauma deaths should be subjected to expert panel review in order to aim at a maximal output of performance improvement programs. Copyright © 2016 Elsevier

  20. Improvement on Quantum Secure Direct Communication with W State in Noisy Channel

    International Nuclear Information System (INIS)

    Dong Li; Xiu Xiaoming; Gao Yajun; Chi Feng

    2009-01-01

    An improvement (Y-protocol) [Commun. Theor. Phys. 49 (2008) 103] on the quantum secure direct communication with W state (C-protocol) [Chin. Phys. Lett. 23 (2006) 290] is proposed by Yuan et al. The quantum bit error rate induced by eavesdropper is 4.17% in C-protocol and 6.25% in Y-protocol. In this paper, another improvement on C-protocol is given. The quantum bit error rate of the eavesdropping will increase to 8.75%, which is 1.1 times larger than that in C-protocol and 0.4 times larger than that in Y-protocol.

  1. Human Factors in Coast Guard Computer Security - An Analysis of Current Awareness and Potential Techniques to Improve Security Program Viability

    National Research Council Canada - National Science Library

    Whalen, Timothy

    2001-01-01

    .... This thesis attempts to identify both the susceptibility of Coast Guard information systems to human factors-based security risks and possible means for increasing user awareness of those risks...

  2. PXD101 significantly improves nuclear reprogramming and the in vitro developmental competence of porcine SCNT embryos

    Energy Technology Data Exchange (ETDEWEB)

    Jin, Jun-Xue; Kang, Jin-Dan; Li, Suo; Jin, Long; Zhu, Hai-Ying; Guo, Qing; Gao, Qing-Shan; Yan, Chang-Guo; Yin, Xi-Jun, E-mail: yinxj33@msn.com

    2015-01-02

    Highlights: • First explored that the effects of PXD101 on the development of SCNT embryos in vitro. • 0.5 μM PXD101 treated for 24 h improved the development of porcine SCNT embryos. • Level of AcH3K9 was significantly higher than control group at early stages. - Abstract: In this study, we investigated the effects of the histone deacetylase inhibitor PXD101 (belinostat) on the preimplantation development of porcine somatic cell nuclear transfer (SCNT) embryos and their expression of the epigenetic markers histone H3 acetylated at lysine 9 (AcH3K9). We compared the in vitro developmental competence of SCNT embryos treated with various concentrations of PXD101 for 24 h. Treatment with 0.5 μM PXD101 significantly increased the proportion of SCNT embryos that reached the blastocyst stage, in comparison to the control group (23.3% vs. 11.5%, P < 0.05). We tested the in vitro developmental competence of SCNT embryos treated with 0.5 μM PXD101 for various amounts of times following activation. Treatment for 24 h significantly improved the development of porcine SCNT embryos, with a significantly higher proportion of embryos reaching the blastocyst stage in comparison to the control group (25.7% vs. 10.6%, P < 0.05). PXD101-treated SCNT embryos were transferred into two surrogate sows, one of whom became pregnant and four fetuses developed. PXD101 treatment significantly increased the fluorescence intensity of immunostaining for AcH3K9 in embryos at the pseudo-pronuclear and 2-cell stages. At these stages, the fluorescence intensities of immunostaining for AcH3K9 were significantly higher in PXD101-treated embryos than in control untreated embryos. In conclusion, this study demonstrates that PXD101 can significantly improve the in vitro and in vivo developmental competence of porcine SCNT embryos and can enhance their nuclear reprogramming.

  3. Information security management: a proposal to improve the effectiveness of information security in the scientific research environment

    International Nuclear Information System (INIS)

    Alexandria, Joao Carlos Soares de

    2009-01-01

    The increase of the connectivity in the business environment, combined with the growing dependency of information systems, has become the information security management an important governance tool. Information security has as main goal to protect the business transactions in order to work normally. In this way, It will be safeguarding the business continuity. The threats of information come from hackers' attacks, electronic frauds and spying, as well as fire, electrical energy interruption and humans fault. Information security is made by implementation of a set of controls, including of the others politics, processes, procedures, organizational structures, software and hardware, which require a continuous management and a well established structure to be able to face such challenges. This work tried to search the reasons why the organizations have difficulties to make a practice of information security management. Many of them just limit to adopt points measures, sometimes they are not consistent with their realities. The market counts on enough quantity of standards and regulations related to information security issues, for example, ISO/IEC 27002, American Sarbanes-Oxley act, Basel capital accord, regulations from regulatory agency (such as the Brazilians ones ANATEL, ANVISA and CVM). The market researches have showed that the information security implementation is concentrated on a well-defined group of organization mainly formed by large companies and from specifics sectors of economy, for example, financial and telecommunication. However, information security must be done by all organizations that use information systems to carry out their activities, independently of its size or economic area that it belongs. The situation of information security in the governmental sector of Brazil, and inside its research institutions, is considered worrying by the Brazilian Court of Accounts (TCU). This research work presents an assessment and diagnostic proposal of

  4. Hacking and securing the AR.Drone 2.0 quadcopter: investigations for improving the security of a toy

    Science.gov (United States)

    Pleban, Johann-Sebastian; Band, Ricardo; Creutzburg, Reiner

    2014-02-01

    In this article we describe the security problems of the Parrot AR.Drone 2.0 quadcopter. Due to the fact that it is promoted as a toy with low acquisition costs, it may end up being used by many individuals which makes it a target for harmful attacks. In addition, the videostream of the drone could be of interest for a potential attacker due to its ability of revealing confidential information. Therefore, we will perform a security threat analysis on this particular drone. We will set the focus mainly on obvious security vulnerabilities like the unencrypted Wi-Fi connection or the user management of the GNU/Linux operating system which runs on the drone. We will show how the drone can be hacked in order to hijack the AR.Drone 2.0. Our aim is to sensitize the end-user of AR.Drones by describing the security vulnerabilities and to show how the AR.Drone 2.0 could be secured from unauthorized access. We will provide instructions to secure the drones Wi-Fi connection and its operation with the official Smartphone App and third party PC software.

  5. Unified Health Gamification can significantly improve well-being in corporate environments.

    Science.gov (United States)

    Shahrestani, Arash; Van Gorp, Pieter; Le Blanc, Pascale; Greidanus, Fabrizio; de Groot, Kristel; Leermakers, Jelle

    2017-07-01

    There is a multitude of mHealth applications that aim to solve societal health problems by stimulating specific types of physical activities via gamification. However, physical health activities cover just one of the three World Health Organization (WHO) dimensions of health. This paper introduces the novel notion of Unified Health Gamification (UHG), which covers besides physical health also social and cognitive health and well-being. Instead of rewarding activities in the three WHO dimensions using different mHealth competitions, UHG combines the scores for such activities on unified leaderboards and lets people interact in social circles beyond personal interests. This approach is promising in corporate environments since UHG can connect the employees with intrinsic motivation for physical health with those who have quite different interests. In order to evaluate this approach, we realized an app prototype and we evaluated it in two corporate pilot studies. In total, eighteen pilot users participated voluntarily for six weeks. Half of the participants were recruited from an occupational health setting and the other half from a treatment setting. Our results suggest that the UHG principles are worth more investigation: various positive health effects were found based on a validated survey. The mean mental health improved significantly at one pilot location and at the level of individual pilot participants, multiple other effects were found to be significant: among others, significant mental health improvements were found for 28% of the participants. Most participants intended to use the app beyond the pilot, especially if it would be further developed.

  6. Improving the Security of Internet Banking Applications by Using Multimodal Biometrics

    Directory of Open Access Journals (Sweden)

    Cătălin Lupu

    2015-03-01

    Full Text Available Online banking applications are used by more and more people all over the world. Most of the banks are providing these services to their customers. The authentication methods varies from the basic user and password to username and a onetime password (OTP generated by a virtual or a physical digipass. The common thing among authentication methods is that the login wepage is provided through a secure channel. Some banks have introduced (especially for testing purposes the authentication using common biometric characteristics, like fingerprint, voice or keystroke recognition. This paper will present some of the most common online banking authentication methods, together with basic biometric characteristics that could be used in these applications. The security in internet banking applications can be improved by using biometrics for the authentication process. Also, the authors have developed an application for authentication of users using fingerprint as the main characteristic, which will be presented at the end of this paper.

  7. Standard format and content for a licensee physical security plan for the protection of special nuclear material of moderate or low strategic significance (Revision 1, Feb. 1983)

    International Nuclear Information System (INIS)

    Anon.

    1983-01-01

    This regulatory guide describes the information required in the physical security plan submitted as part of an application for a license to possess, use, or transport Special Nuclear Materials (SNM) of moderate strategic significance or 10 kg or more of SNM of low strategic significance and recommends a standard format for presenting the information in an orderly arrangement. This standard format will thus serve as an aid to uniformity and completeness in the preparation and review of the physical security plan of the license application. This document can also be used as guidance by licensees possessing or transporting less than 10 kg of SNM of low strategic significance in understanding the intent and implementing the requirements of paragraphs 73.67(a), 73.67(f), and 73.67(g) of 10 CFR Part 73

  8. CRYPTO-STEG: A Hybrid Cryptology - Steganography Approach for Improved Data Security

    Directory of Open Access Journals (Sweden)

    Atif Bin Mansoor

    2012-04-01

    Full Text Available Internet is a widely used medium for transfer of information due to its reach and ease of availability. However, internet is an insecure medium and any information might be easily intercepted and viewed during its transfer. Different mechanisms like cryptology and steganography are adopted to secure the data communication over an inherently insecure medium like internet. Cryptology scrambles the information in a manner that an unintended recipient cannot easily extract the information, while steganography hides the information in a cover object so that it is transferred unnoticed in the cover. Encrypted data may not be extracted easily but causes a direct suspicion to any observer, while data hidden using steganographic techniques go inconspicuous. Cryptanalysis is the process of attacking the encrypted text to extract the information, while steganalysis is the process of detecting the disguised messages. In literature, both cryptology and steganography are treated separately. In this paper, we present our research on an improved data security paradigm, where data is first encrypted using AES (Advanced Encryption Standard and DES (Data Encryption Standard cryptology algorithms. Both plain and encrypted data is hidden in the images using Model Based and F5 steganographic techniques. Features are extracted in DWT (Discrete Wavelet Transform and DCT (Discrete Cosine Transform domains using higher order statistics for steganalysis, and subsequently used to train a FLD (Fisher Linear Discriminant classifier which is employed to categorize a separate set of images as clean or stego (containing hidden messages. Experimental results demonstrate improved data security using proposed CRYPTO-STEG approach compared to plain text steganography. Results also demonstrate that the Model Based steganography is more secure than the F5 steganography.

  9. Genetically Engineered Crops and Certified Organic Agriculture for Improving Nutrition Security in Africa and South Asia.

    Science.gov (United States)

    Pray, Carl; Ledermann, Samuel

    2016-01-01

    In Africa and South Asia, where nutrition insecurity is severe, two of the most prominent production technologies are genetically modified (GM) crops and certified organic agriculture. We analyze the potential impact pathways from agricultural production to nutrition. Our review of data and the literature reveals increasing farm-level income from cash crop production as the main pathway by which organic agriculture and GM agriculture improve nutrition. Potential secondary pathways include reduced prices of important food crops like maize due to GM maize production and increased food production using organic technology. Potential tertiary pathways are improvements in health due to reduced insecticide use. Challenges to the technologies achieving their impact include the politics of GM agriculture and the certification costs of organic agriculture. Given the importance of agricultural production in addressing nutrition security, accentuated by the post-2015 sustainable development agenda, the chapter concludes by stressing the importance of private and public sector research in improving the productivity and adoption of both GM and organic crops. In addition, the chapter reminds readers that increased farm income and productivity require complementary investments in health, education, food access and women's empowerment to actually improve nutrition security. © 2016 S. Karger AG, Basel.

  10. Thermosensitive Hydrogel Mask Significantly Improves Skin Moisture and Skin Tone; Bilateral Clinical Trial

    Directory of Open Access Journals (Sweden)

    Anna Quattrone

    2017-06-01

    Full Text Available Objective: A temperature-sensitive state-changing hydrogel mask was used in this study. Once it comes into contact with the skin and reaches the body temperature, it uniformly and quickly releases the active compounds, which possess moisturizing, anti-oxidant, anti-inflammatory and regenerative properties. Methods: An open label clinical trial was conducted to evaluate the effects of the test product on skin hydration, skin tone and skin ageing. Subjects applied the product to one side of their face and underwent Corneometer® and Chromameter measurements, Visual assessment of facial skin ageing and facial photography. All assessments and Self-Perception Questionnaires (SPQ were performed at baseline, after the first application of the test product and after four applications. Results: After a single treatment we observed an increase in skin moisturisation, an improvement of skin tone/luminosity and a reduction in signs of ageing, all statistically significant. After four applications a further improvement in all measured parameters was recorded. These results were confirmed by the subjects’ own perceptions, as reported in the SPQ both after one and four applications. Conclusion: The hydrogel mask tested in this study is very effective in improving skin hydration, skin radiance and luminosity, in encouraging an even skin tone and in reducing skin pigmentation.

  11. E2F5 status significantly improves malignancy diagnosis of epithelial ovarian cancer

    KAUST Repository

    Kothandaraman, Narasimhan

    2010-02-24

    Background: Ovarian epithelial cancer (OEC) usually presents in the later stages of the disease. Factors, especially those associated with cell-cycle genes, affecting the genesis and tumour progression for ovarian cancer are largely unknown. We hypothesized that over-expressed transcription factors (TFs), as well as those that are driving the expression of the OEC over-expressed genes, could be the key for OEC genesis and potentially useful tissue and serum markers for malignancy associated with OEC.Methods: Using a combination of computational (selection of candidate TF markers and malignancy prediction) and experimental approaches (tissue microarray and western blotting on patient samples) we identified and evaluated E2F5 transcription factor involved in cell proliferation, as a promising candidate regulatory target in early stage disease. Our hypothesis was supported by our tissue array experiments that showed E2F5 expression only in OEC samples but not in normal and benign tissues, and by significantly positively biased expression in serum samples done using western blotting studies.Results: Analysis of clinical cases shows that of the E2F5 status is characteristic for a different population group than one covered by CA125, a conventional OEC biomarker. E2F5 used in different combinations with CA125 for distinguishing malignant cyst from benign cyst shows that the presence of CA125 or E2F5 increases sensitivity of OEC detection to 97.9% (an increase from 87.5% if only CA125 is used) and, more importantly, the presence of both CA125 and E2F5 increases specificity of OEC to 72.5% (an increase from 55% if only CA125 is used). This significantly improved accuracy suggests possibility of an improved diagnostics of OEC. Furthermore, detection of malignancy status in 86 cases (38 benign, 48 early and late OEC) shows that the use of E2F5 status in combination with other clinical characteristics allows for an improved detection of malignant cases with sensitivity

  12. Significance of MPEG-7 textural features for improved mass detection in mammography.

    Science.gov (United States)

    Eltonsy, Nevine H; Tourassi, Georgia D; Fadeev, Aleksey; Elmaghraby, Adel S

    2006-01-01

    The purpose of the study is to investigate the significance of MPEG-7 textural features for improving the detection of masses in screening mammograms. The detection scheme was originally based on morphological directional neighborhood features extracted from mammographic regions of interest (ROIs). Receiver Operating Characteristics (ROC) was performed to evaluate the performance of each set of features independently and merged into a back-propagation artificial neural network (BPANN) using the leave-one-out sampling scheme (LOOSS). The study was based on a database of 668 mammographic ROIs (340 depicting cancer regions and 328 depicting normal parenchyma). Overall, the ROC area index of the BPANN using the directional morphological features was Az=0.85+/-0.01. The MPEG-7 edge histogram descriptor-based BPNN showed an ROC area index of Az=0.71+/-0.01 while homogeneous textural descriptors using 30 and 120 channels helped the BPNN achieve similar ROC area indexes of Az=0.882+/-0.02 and Az=0.877+/-0.01 respectively. After merging the MPEG-7 homogeneous textural features with the directional neighborhood features the performance of the BPANN increased providing an ROC area index of Az=0.91+/-0.01. MPEG-7 homogeneous textural descriptor significantly improved the morphology-based detection scheme.

  13. Carfilzomib significantly improves the progression-free survival of high-risk patients in multiple myeloma.

    Science.gov (United States)

    Avet-Loiseau, Hervé; Fonseca, Rafael; Siegel, David; Dimopoulos, Meletios A; Špička, Ivan; Masszi, Tamás; Hájek, Roman; Rosiñol, Laura; Goranova-Marinova, Vesselina; Mihaylov, Georgi; Maisnar, Vladimír; Mateos, Maria-Victoria; Wang, Michael; Niesvizky, Ruben; Oriol, Albert; Jakubowiak, Andrzej; Minarik, Jiri; Palumbo, Antonio; Bensinger, William; Kukreti, Vishal; Ben-Yehuda, Dina; Stewart, A Keith; Obreja, Mihaela; Moreau, Philippe

    2016-09-01

    The presence of certain high-risk cytogenetic abnormalities, such as translocations (4;14) and (14;16) and deletion (17p), are known to have a negative impact on survival in multiple myeloma (MM). The phase 3 study ASPIRE (N = 792) demonstrated that progression-free survival (PFS) was significantly improved with carfilzomib, lenalidomide, and dexamethasone (KRd), compared with lenalidomide and dexamethasone (Rd) in relapsed MM. This preplanned subgroup analysis of ASPIRE was conducted to evaluate KRd vs Rd by baseline cytogenetics according to fluorescence in situ hybridization. Of 417 patients with known cytogenetic risk status, 100 patients (24%) were categorized with high-risk cytogenetics (KRd, n = 48; Rd, n = 52) and 317 (76%) were categorized with standard-risk cytogenetics (KRd, n = 147; Rd, n = 170). For patients with high-risk cytogenetics, treatment with KRd resulted in a median PFS of 23.1 months, a 9-month improvement relative to treatment with Rd. For patients with standard-risk cytogenetics, treatment with KRd led to a 10-month improvement in median PFS vs Rd. The overall response rates for KRd vs Rd were 79.2% vs 59.6% (high-risk cytogenetics) and 91.2% vs 73.5% (standard-risk cytogenetics); approximately fivefold as many patients with high- or standard-risk cytogenetics achieved a complete response or better with KRd vs Rd (29.2% vs 5.8% and 38.1% vs 6.5%, respectively). KRd improved but did not abrogate the poor prognosis associated with high-risk cytogenetics. This regimen had a favorable benefit-risk profile in patients with relapsed MM, irrespective of cytogenetic risk status, and should be considered a standard of care in these patients. This trial was registered at www.clinicaltrials.gov as #NCT01080391. © 2016 by The American Society of Hematology.

  14. Cryptanalyzing an improved security modulated chaotic encryption scheme using ciphertext absolute value

    International Nuclear Information System (INIS)

    Alvarez, G.; Montoya, F.; Romera, M.; Pastor, G.

    2005-01-01

    This paper describes the security weakness of a recently proposed improved chaotic encryption method based on the modulation of a signal generated by a chaotic system with an appropriately chosen scalar signal. The aim of the improvement is to avoid the breaking of chaotic encryption schemes by means of the return map attack introduced by Perez and Cerdeira. A method of attack based on taking the absolute value of the ciphertext is presented, that allows for the cancellation of the modulation scalar signal and the determination of some system parameters that play the role of system key. The proposed improved method is shown to be compromised without any knowledge of the chaotic system parameter values and even without knowing the transmitter structure

  15. Bone Mass and Strength are Significantly Improved in Mice Overexpressing Human WNT16 in Osteocytes.

    Science.gov (United States)

    Alam, Imranul; Reilly, Austin M; Alkhouli, Mohammed; Gerard-O'Riley, Rita L; Kasipathi, Charishma; Oakes, Dana K; Wright, Weston B; Acton, Dena; McQueen, Amie K; Patel, Bhavmik; Lim, Kyung-Eun; Robling, Alexander G; Econs, Michael J

    2017-04-01

    Recently, we demonstrated that osteoblast-specific overexpression of human WNT16 increased both cortical and trabecular bone mass and structure in mice. To further identify the cell-specific role of Wnt16 in bone homeostasis, we created transgenic (TG) mice overexpressing human WNT16 in osteocytes using Dmp1 promoter (Dmp1-hWNT16 TG) on C57BL/6 (B6) background. We analyzed bone phenotypes and serum bone biomarkers, performed gene expression analysis and measured dynamic bone histomorphometry in Dmp1-hWNT16 TG and wild-type (WT) mice. Compared to WT mice, Dmp1-hWNT16 TG mice exhibited significantly higher whole-body, spine and femoral aBMD, BMC and trabecular (BV/TV, Tb.N, and Tb.Th) and cortical (bone area and thickness) parameters in both male and female at 12 weeks of age. Femur stiffness and ultimate force were also significantly improved in the Dmp1-hWNT16 TG female mice, compared to sex-matched WT littermates. In addition, female Dmp1-hWNT16 TG mice displayed significantly higher MS/BS, MAR and BFR/BS compared to the WT mice. Gene expression analysis demonstrated significantly higher mRNA level of Alp in both male and female Dmp1-hWNT16 TG mice and significantly higher levels of Osteocalcin, Opg and Rankl in the male Dmp1-hWNT16 TG mice in bone tissue compared to sex-matched WT mice. These results indicate that WNT16 plays a critical role for acquisition of both cortical and trabecular bone mass and strength. Strategies designed to use WNT16 as a target for therapeutic interventions will be valuable to treat osteoporosis and other low bone mass conditions.

  16. Radiotherapy is associated with significant improvement in local and regional control in Merkel cell carcinoma

    International Nuclear Information System (INIS)

    Kang, Susan H; Haydu, Lauren E; Goh, Robin Yeong Hong; Fogarty, Gerald B

    2012-01-01

    Merkel cell carcinoma (MCC) is a rare tumour of skin. This study is a retrospective audit of patients with MCC from St Vincent’s and Mater Hospital, Sydney, Australia. The aim of this study was to investigate the influence of radiotherapy (RT) on the local and regional control of MCC lesions and survival of patients with MCC. The data bases in anatomical pathology, RT and surgery. We searched for patients having a diagnosis of MCC between 1996 and 2007. Patient, tumour and treatment characteristics were collected and analysed. Univariate survival analysis of categorical variables was conducted with the Kaplan-Meier method together with the Log-Rank test for statistical significance. Continuous variables were assessed using the Cox regression method. Multivariate analysis was performed for significant univariate results. Sixty seven patients were found. Sixty two who were stage I-III and were treated with radical intent were analysed. 68% were male. The median age was 74 years. Forty-two cases (68%) were stage I or II, and 20 cases (32%) were stage III. For the subset of 42 stage I and II patients, those that had RT to their primary site had a 2-year local recurrence free survival of 89% compared with 36% for patients not receiving RT (p<0.001). The cumulative 2-year regional recurrence free survival for patients having adjuvant regional RT was 84% compared with 43% for patients not receiving this treatment (p<0.001). Immune status at initial surgery was a significant predictor for OS and MCCSS. In a multivariate analysis combining macroscopic size (mm) and immune status at initial surgery, only immune status remained a significant predictor of overall survival (HR=2.096, 95% CI: 1.002-4.385, p=0.049). RT is associated with significant improvement in local and regional control in Merkel cell carcinoma. Immunosuppression is an important factor in overall survival

  17. Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements

    Energy Technology Data Exchange (ETDEWEB)

    Ondrej Linda; Milos Manic; Miles McQueen

    2012-09-01

    Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

  18. Improving the security of a quantum secret sharing protocol between multiparty and multiparty without entanglement

    International Nuclear Information System (INIS)

    Han Lianfang; Liu Yimin; Shi Shouhua; Zhang Zhanjun

    2007-01-01

    Recently Yan and Gao [F.L. Yan, T. Gao, Phys. Rev. A 72 (2005) 012304] have proposed a quantum secret sharing protocol which allows a secret message to be shared between one group of m parties and another group of n parties. The protocol is claimed to be secure. In this Letter, first we show that any subgroup consisting of evil cooperative parties (or one and only one evil party) can successfully cheat other parties to obtain the secret message without being detected. Then we improve the original Yan-Gao protocol such that the insider's cheats are prevented

  19. Integration of biomimicry and nanotechnology for significantly improved detection of circulating tumor cells (CTCs).

    Science.gov (United States)

    Myung, Ja Hye; Park, Sin-Jung; Wang, Andrew Z; Hong, Seungpyo

    2017-12-13

    Circulating tumor cells (CTCs) have received a great deal of scientific and clinical attention as a biomarker for diagnosis and prognosis of many types of cancer. Given their potential significance in clinics, a variety of detection methods, utilizing the recent advances in nanotechnology and microfluidics, have been introduced in an effort of achieving clinically significant detection of CTCs. However, effective detection and isolation of CTCs still remain a tremendous challenge due to their extreme rarity and phenotypic heterogeneity. Among many approaches that are currently under development, this review paper focuses on a unique, promising approach that takes advantages of naturally occurring processes achievable through application of nanotechnology to realize significant improvement in sensitivity and specificity of CTC capture. We provide an overview of successful outcome of this biomimetic CTC capture system in detection of tumor cells from in vitro, in vivo, and clinical pilot studies. We also emphasize the clinical impact of CTCs as biomarkers in cancer diagnosis and predictive prognosis, which provides a cost-effective, minimally invasive method that potentially replaces or supplements existing methods such as imaging technologies and solid tissue biopsy. In addition, their potential prognostic values as treatment guidelines and that ultimately help to realize personalized therapy are discussed. Copyright © 2017. Published by Elsevier B.V.

  20. Improving the Security and Performance of the BaBar Detector Controls System

    International Nuclear Information System (INIS)

    Kotturi, Karen D.

    2003-01-01

    It starts out innocently enough--users want to monitor Online data and so run their own copies of the detector control GUIs in their offices and at home. But over time, the number of processes making requests for values to display on GUIs, webpages and stripcharts can grow, and affect the performance of an Input/Output Controller (IOC) such that it is unable to respond to requests from requests critical to data-taking. At worst, an IOC can hang, its CPU having been allocated 100% to responding to network requests. For the BaBar Online Detector Control System, we were able to eliminate this problem and make great gains in security by moving all of the IOCs to a non-routed, virtual LAN and by enlisting a workstation with two network interface cards to act as the interface between the virtual LAN and the public BaBar network. On the interface machine, we run the Experimental Physics Industrial Control System (EPICS) Channel Access (CA) gateway software (originating from Advanced Photon Source). This software accepts as inputs, all the channels which are loaded into the EPICS databases on all the IOCs. It polls them to update its copy of the values. It answers requests from applications by sending them the currently cached value. We adopted the requirement that data-taking would be independent of the gateway, so that, in the event of a gateway failure, data-taking would be uninterrupted. In this way, we avoided introducing any new risk elements to data-taking. Security rules already in use by the IOC were propagated to the gateway's own security rules and the security of the IOCs themselves was improved by removing them from the public BaBar network

  1. Significant Improvement of Organic Thin-Film Transistor Mobility Utilizing an Organic Heterojunction Buffer Layer

    International Nuclear Information System (INIS)

    Pan Feng; Qian Xian-Rui; Huang Li-Zhen; Wang Hai-Bo; Yan Dong-Hang

    2011-01-01

    High-mobility vanadyl phthalocyanine (VOPc)/5,5‴-bis(4-fluorophenyl)-2,2':5',2″:5″,2‴-quaterthiophene (F2-P4T) thin-film transistors are demonstrated by employing a copper hexadecafluorophthalocyanine (F 16 CuPc)/copper phthalocyanine (CuPc) heterojunction unit, which are fabricated at different substrate temperatures, as a buffer layer. The highest mobility of 4.08cm 2 /Vs is achieved using a F 16 CuPc/CuPc organic heterojunction buffer layer fabricated at high substrate temperature. Compared with the random small grain-like morphology of the room-temperature buffer layer, the high-temperature organic heterojunction presents a large-sized fiber-like film morphology, resulting in an enhanced conductivity. Thus the contact resistance of the transistor is significantly reduced and an obvious improvement in device mobility is obtained. (cross-disciplinary physics and related areas of science and technology)

  2. Significant improvement of optical traps by tuning standard water immersion objectives

    International Nuclear Information System (INIS)

    Reihani, S Nader S; Mir, Shahid A; Richardson, Andrew C; Oddershede, Lene B

    2011-01-01

    Focused infrared lasers are widely used for micromanipulation and visualization of biological specimens. An inherent practical problem is that off-the-shelf commercial microscope objectives are designed for use with visible and not infrared wavelengths. Less aberration is introduced by water immersion objectives than by oil immersion ones, however, even water immersion objectives induce significant aberration. We present a simple method to reduce the spherical aberration induced by water immersion objectives, namely by tuning the correction collar of the objective to a value that is ∼ 10% lower than the physical thickness of the coverslip. This results in marked improvements in optical trapping strengths of up to 100% laterally and 600% axially from a standard microscope objective designed for use in the visible range. The results are generally valid for any water immersion objective with any numerical aperture

  3. Significant improvement in the electrical characteristics of Schottky barrier diodes on molecularly modified Gallium Nitride surfaces

    Science.gov (United States)

    Garg, Manjari; Naik, Tejas R.; Pathak, C. S.; Nagarajan, S.; Rao, V. Ramgopal; Singh, R.

    2018-04-01

    III-Nitride semiconductors face the issue of localized surface states, which causes fermi level pinning and large leakage current at the metal semiconductor interface, thereby degrading the device performance. In this work, we have demonstrated the use of a Self-Assembled Monolayer (SAM) of organic molecules to improve the electrical characteristics of Schottky barrier diodes (SBDs) on n-type Gallium Nitride (n-GaN) epitaxial films. The electrical characteristics of diodes were improved by adsorption of SAM of hydroxyl-phenyl metallated porphyrin organic molecules (Zn-TPPOH) onto the surface of n-GaN. SAM-semiconductor bonding via native oxide on the n-GaN surface was confirmed using X-ray photoelectron spectroscopy measurements. Surface morphology and surface electronic properties were characterized using atomic force microscopy and Kelvin probe force microscopy. Current-voltage characteristics of different metal (Cu, Ni) SBDs on bare n-GaN were compared with those of Cu/Zn-TPPOH/n-GaN and Ni/Zn-TPPOH/n-GaN SBDs. It was found that due to the molecular monolayer, the surface potential of n-GaN was decreased by ˜350 mV. This caused an increase in the Schottky barrier height of Cu and Ni SBDs from 1.13 eV to 1.38 eV and 1.07 eV to 1.22 eV, respectively. In addition to this, the reverse bias leakage current was reduced by 3-4 orders of magnitude for both Cu and Ni SBDs. Such a significant improvement in the electrical performance of the diodes can be very useful for better device functioning.

  4. pEPito: a significantly improved non-viral episomal expression vector for mammalian cells

    Directory of Open Access Journals (Sweden)

    Ogris Manfred

    2010-03-01

    Full Text Available Abstract Background The episomal replication of the prototype vector pEPI-1 depends on a transcription unit starting from the constitutively expressed Cytomegalovirus immediate early promoter (CMV-IEP and directed into a 2000 bp long matrix attachment region sequence (MARS derived from the human β-interferon gene. The original pEPI-1 vector contains two mammalian transcription units and a total of 305 CpG islands, which are located predominantly within the vector elements necessary for bacterial propagation and known to be counterproductive for persistent long-term transgene expression. Results Here, we report the development of a novel vector pEPito, which is derived from the pEPI-1 plasmid replicon but has considerably improved efficacy both in vitro and in vivo. The pEPito vector is significantly reduced in size, contains only one transcription unit and 60% less CpG motives in comparison to pEPI-1. It exhibits major advantages compared to the original pEPI-1 plasmid, including higher transgene expression levels and increased colony-forming efficiencies in vitro, as well as more persistent transgene expression profiles in vivo. The performance of pEPito-based vectors was further improved by replacing the CMV-IEP with the human CMV enhancer/human elongation factor 1 alpha promoter (hCMV/EF1P element that is known to be less affected by epigenetic silencing events. Conclusions The novel vector pEPito can be considered suitable as an improved vector for biotechnological applications in vitro and for non-viral gene delivery in vivo.

  5. Electronic monitoring in combination with direct observation as a means to significantly improve hand hygiene compliance.

    Science.gov (United States)

    Boyce, John M

    2017-05-01

    Monitoring hand hygiene compliance among health care personnel (HCP) is an essential element of hand hygiene promotion programs. Observation by trained auditors is considered the gold standard method for establishing hand hygiene compliance rates. Advantages of observational surveys include the unique ability to establish compliance with all of the World Health Organization "My 5 Moments for Hand Hygiene" initiative Moments and to provide just-in-time coaching. Disadvantages include the resources required for observational surveys, insufficient sample sizes, and nonstandardized methods of conducting observations. Electronic and camera-based systems can monitor hand hygiene performance on all work shifts without a Hawthorne effect and provide significantly more data regarding hand hygiene performance. Disadvantages include the cost of installation, variable accuracy in estimating compliance rates, issues related to acceptance by HCP, insufficient data regarding their cost-effectiveness and influence on health care-related infection rates, and the ability of most systems to monitor only surrogates for Moments 1, 4, and 5. Increasing evidence suggests that monitoring only Moments 1, 4, and 5 provides reasonable estimates of compliance with all 5 Moments. With continued improvement of electronic monitoring systems, combining electronic monitoring with observational methods may provide the best information as part of a multimodal strategy to improve and sustain hand hygiene compliance rates among HCP. Copyright © 2017 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Elsevier Inc. All rights reserved.

  6. An On-Chip RBC Deformability Checker Significantly Improves Velocity-Deformation Correlation

    Directory of Open Access Journals (Sweden)

    Chia-Hung Dylan Tsai

    2016-10-01

    Full Text Available An on-chip deformability checker is proposed to improve the velocity–deformation correlation for red blood cell (RBC evaluation. RBC deformability has been found related to human diseases, and can be evaluated based on RBC velocity through a microfluidic constriction as in conventional approaches. The correlation between transit velocity and amount of deformation provides statistical information of RBC deformability. However, such correlations are usually only moderate, or even weak, in practical evaluations due to limited range of RBC deformation. To solve this issue, we implemented three constrictions of different width in the proposed checker, so that three different deformation regions can be applied to RBCs. By considering cell responses from the three regions as a whole, we practically extend the range of cell deformation in the evaluation, and could resolve the issue about the limited range of RBC deformation. RBCs from five volunteer subjects were tested using the proposed checker. The results show that the correlation between cell deformation and transit velocity is significantly improved by the proposed deformability checker. The absolute values of the correlation coefficients are increased from an average of 0.54 to 0.92. The effects of cell size, shape and orientation to the evaluation are discussed according to the experimental results. The proposed checker is expected to be useful for RBC evaluation in medical practices.

  7. Fabrication of CoZn alloy nanowire arrays: Significant improvement in magnetic properties by annealing process

    International Nuclear Information System (INIS)

    Koohbor, M.; Soltanian, S.; Najafi, M.; Servati, P.

    2012-01-01

    Highlights: ► Increasing the Zn concentration changes the structure of NWs from hcp to amorphous. ► Increasing the Zn concentration significantly reduces the Hc value of NWs. ► Magnetic properties of CoZn NWs can be significantly enhanced by appropriate annealing. ► The pH of electrolyte has no significant effect on the properties of the NW arrays. ► Deposition frequency has considerable effects on the magnetic properties of NWs. - Abstract: Highly ordered arrays of Co 1−x Zn x (0 ≤ x ≤ 0.74) nanowires (NWs) with diameters of ∼35 nm and high length-to-diameter ratios (up to 150) were fabricated by co-electrodeposition of Co and Zn into pores of anodized aluminum oxide (AAO) templates. The Co and Zn contents of the NWs were adjusted by varying the ratio of Zn and Co ion concentrations in the electrolyte. The effect of the Zn content, electrodeposition conditions (frequency and pH) and annealing on the structural and magnetic properties (e.g., coercivity (Hc) and squareness (Sq)) of NW arrays were investigated using X-ray diffraction (XRD), scanning electron microscopy, electron diffraction, and alternating gradient force magnetometer (AGFM). XRD patterns reveal that an increase in the concentration of Zn ions of the electrolyte forces the hcp crystal structure of Co NWs to change into an amorphous phase, resulting in a significant reduction in Hc. It was found that the magnetic properties of NWs can be significantly improved by appropriate annealing process. The highest values for Hc (2050 Oe) and Sq (0.98) were obtained for NWs electrodeposited using 0.95/0.05 Co:Zn concentrations at 200 Hz and annealed at 575 °C. While the pH of electrolyte is found to have no significant effect on the structural and magnetic properties of the NW arrays, the electrodeposition frequency has considerable effects on the magnetic properties of the NW arrays. The changes in magnetic property of NWs are rooted in a competition between shape anisotropy and

  8. Fabrication of CoZn alloy nanowire arrays: Significant improvement in magnetic properties by annealing process

    Energy Technology Data Exchange (ETDEWEB)

    Koohbor, M. [Department of Physics, University of Kurdistan, Sanandaj (Iran, Islamic Republic of); Soltanian, S., E-mail: s.soltanian@gmail.com [Department of Physics, University of Kurdistan, Sanandaj (Iran, Islamic Republic of); Department of Electrical and Computer Engineering, University of British Columbia, Vancouver (Canada); Najafi, M. [Department of Physics, University of Kurdistan, Sanandaj (Iran, Islamic Republic of); Department of Physics, Hamadan University of Technology, Hamadan (Iran, Islamic Republic of); Servati, P. [Department of Electrical and Computer Engineering, University of British Columbia, Vancouver (Canada)

    2012-01-05

    Highlights: Black-Right-Pointing-Pointer Increasing the Zn concentration changes the structure of NWs from hcp to amorphous. Black-Right-Pointing-Pointer Increasing the Zn concentration significantly reduces the Hc value of NWs. Black-Right-Pointing-Pointer Magnetic properties of CoZn NWs can be significantly enhanced by appropriate annealing. Black-Right-Pointing-Pointer The pH of electrolyte has no significant effect on the properties of the NW arrays. Black-Right-Pointing-Pointer Deposition frequency has considerable effects on the magnetic properties of NWs. - Abstract: Highly ordered arrays of Co{sub 1-x}Zn{sub x} (0 {<=} x {<=} 0.74) nanowires (NWs) with diameters of {approx}35 nm and high length-to-diameter ratios (up to 150) were fabricated by co-electrodeposition of Co and Zn into pores of anodized aluminum oxide (AAO) templates. The Co and Zn contents of the NWs were adjusted by varying the ratio of Zn and Co ion concentrations in the electrolyte. The effect of the Zn content, electrodeposition conditions (frequency and pH) and annealing on the structural and magnetic properties (e.g., coercivity (Hc) and squareness (Sq)) of NW arrays were investigated using X-ray diffraction (XRD), scanning electron microscopy, electron diffraction, and alternating gradient force magnetometer (AGFM). XRD patterns reveal that an increase in the concentration of Zn ions of the electrolyte forces the hcp crystal structure of Co NWs to change into an amorphous phase, resulting in a significant reduction in Hc. It was found that the magnetic properties of NWs can be significantly improved by appropriate annealing process. The highest values for Hc (2050 Oe) and Sq (0.98) were obtained for NWs electrodeposited using 0.95/0.05 Co:Zn concentrations at 200 Hz and annealed at 575 Degree-Sign C. While the pH of electrolyte is found to have no significant effect on the structural and magnetic properties of the NW arrays, the electrodeposition frequency has considerable effects on

  9. Compression stockings significantly improve hemodynamic performance in post-thrombotic syndrome irrespective of class or length.

    Science.gov (United States)

    Lattimer, Christopher R; Azzam, Mustapha; Kalodiki, Evi; Makris, Gregory C; Geroulakos, George

    2013-07-01

    Graduated elastic compression (GEC) stockings have been demonstrated to reduce the morbidity associated with post-thrombotic syndrome. The ideal length or compression strength required to achieve this is speculative and related to physician preference and patient compliance. The aim of this study was to evaluate the hemodynamic performance of four different stockings and determine the patient's preference. Thirty-four consecutive patients (40 legs, 34 male) with post-thrombotic syndrome were tested with four different stockings (Mediven plus open toe, Bayreuth, Germany) of their size in random order: class 1 (18-21 mm Hg) and class II (23-32 mm Hg), below-knee (BK) and above-knee thigh-length (AK). The median age, Venous Clinical Severity Score, Venous Segmental Disease Score, and Villalta scale were 62 years (range, 31-81 years), 8 (range, 1-21), 5 (range, 2-10), and 10 (range, 2-22), respectively. The C of C0-6EsAs,d,pPr,o was C0 = 2, C2 = 1, C3 = 3, C4a = 12, C4b = 7, C5 = 12, C6 = 3. Obstruction and reflux was observed on duplex in 47.5% legs, with deep venous reflux alone in 45%. Air plethysmography was used to measure the venous filling index (VFI), venous volume, and time to fill 90% of the venous volume. Direct pressure measurements were obtained while lying and standing using the PicoPress device (Microlab Elettronica, Nicolò, Italy). The pressure sensor was placed underneath the test stocking 5 cm above and 2 cm posterior to the medial malleolus. At the end of the study session, patients stated their preferred stocking based on comfort. The VFI, venous volume, and time to fill 90% of the venous volume improved significantly with all types of stocking versus no compression. In class I, the VFI (mL/s) improved from a median of 4.9 (range, 1.7-16.3) without compression to 3.7 (range, 0-14) BK (24.5%) and 3.6 (range, 0.6-14.5) AK (26.5%). With class II, the corresponding improvement was to 4.0 (range, 0.3-16.2) BK (18.8%) and 3.7 (range, 0.5-14.2) AK (24

  10. Significant improvement of intestinal microbiota of gibel carp (Carassius auratus gibelio) after traditional Chinese medicine feeding.

    Science.gov (United States)

    Wu, Z B; Gatesoupe, F-J; Li, T T; Wang, X H; Zhang, Q Q; Feng, D Y; Feng, Y Q; Chen, H; Li, A H

    2018-03-01

    Increasing attention has been attracted to intestinal microbiota, due to interactions with nutrition, metabolism and immune defence of the host. Traditional Chinese medicine (TCM) feed additives have been applied in aquaculture to improve fish health, but the interaction with fish gut microbiota is still poorly understood. This study aimed to explore the effect of adding TCM in feed on the intestinal microbiota of gibel carp (Carassius auratus gibelio). Bacterial communities of 16 fish intestinal contents and one water sample were characterized by high-throughput sequencing and analysis of the V4-V5 region of the 16S rRNA gene. The results showed that the composition and structure of the bacterial community were significantly altered by the TCM feeding. Some phyla increased markedly (Proteobacteria, Actinobacteria, Acidobacteria, etc.), while Fusobacteria were significantly reduced. Concurrently, the richness and diversity of the taxonomic units increased, and the microbiota composition of TCM-treated fish was more homogeneous among individuals. At the genus level, the addition of TCM tended to reduce the incidence of potential pathogens (Aeromonas, Acinetobacter and Shewanella), while stimulating the emergence of some potential probiotics (Lactobacillus, Lactococcus, Bacillus and Pseudomonas). These data suggested that the feed additive could regulate the fish intestinal microbiota by reinforcing the microbial balance. This study may provide useful information for further application of TCM for diseases prevention and stress management in aquaculture. © 2017 The Society for Applied Microbiology.

  11. Significant improvement in one-dimensional cursor control using Laplacian electroencephalography over electroencephalography

    Science.gov (United States)

    Boudria, Yacine; Feltane, Amal; Besio, Walter

    2014-06-01

    Objective. Brain-computer interfaces (BCIs) based on electroencephalography (EEG) have been shown to accurately detect mental activities, but the acquisition of high levels of control require extensive user training. Furthermore, EEG has low signal-to-noise ratio and low spatial resolution. The objective of the present study was to compare the accuracy between two types of BCIs during the first recording session. EEG and tripolar concentric ring electrode (TCRE) EEG (tEEG) brain signals were recorded and used to control one-dimensional cursor movements. Approach. Eight human subjects were asked to imagine either ‘left’ or ‘right’ hand movement during one recording session to control the computer cursor using TCRE and disc electrodes. Main results. The obtained results show a significant improvement in accuracies using TCREs (44%-100%) compared to disc electrodes (30%-86%). Significance. This study developed the first tEEG-based BCI system for real-time one-dimensional cursor movements and showed high accuracies with little training.

  12. Induction-heating MOCVD reactor with significantly improved heating efficiency and reduced harmful magnetic coupling

    KAUST Repository

    Li, Kuang-Hui; Alotaibi, Hamad S.; Sun, Haiding; Lin, Ronghui; Guo, Wenzhe; Torres-Castanedo, Carlos G.; Liu, Kaikai; Galan, Sergio V.; Li, Xiaohang

    2018-01-01

    In a conventional induction-heating III-nitride metalorganic chemical vapor deposition (MOCVD) reactor, the induction coil is outside the chamber. Therefore, the magnetic field does not couple with the susceptor well, leading to compromised heating efficiency and harmful coupling with the gas inlet and thus possible overheating. Hence, the gas inlet has to be at a minimum distance away from the susceptor. Because of the elongated flow path, premature reactions can be more severe, particularly between Al- and B-containing precursors and NH3. Here, we propose a structure that can significantly improve the heating efficiency and allow the gas inlet to be closer to the susceptor. Specifically, the induction coil is designed to surround the vertical cylinder of a T-shaped susceptor comprising the cylinder and a top horizontal plate holding the wafer substrate within the reactor. Therefore, the cylinder coupled most magnetic field to serve as the thermal source for the plate. Furthermore, the plate can block and thus significantly reduce the uncoupled magnetic field above the susceptor, thereby allowing the gas inlet to be closer. The results show approximately 140% and 2.6 times increase in the heating and susceptor coupling efficiencies, respectively, as well as a 90% reduction in the harmful magnetic flux on the gas inlet.

  13. Induction-heating MOCVD reactor with significantly improved heating efficiency and reduced harmful magnetic coupling

    KAUST Repository

    Li, Kuang-Hui

    2018-02-23

    In a conventional induction-heating III-nitride metalorganic chemical vapor deposition (MOCVD) reactor, the induction coil is outside the chamber. Therefore, the magnetic field does not couple with the susceptor well, leading to compromised heating efficiency and harmful coupling with the gas inlet and thus possible overheating. Hence, the gas inlet has to be at a minimum distance away from the susceptor. Because of the elongated flow path, premature reactions can be more severe, particularly between Al- and B-containing precursors and NH3. Here, we propose a structure that can significantly improve the heating efficiency and allow the gas inlet to be closer to the susceptor. Specifically, the induction coil is designed to surround the vertical cylinder of a T-shaped susceptor comprising the cylinder and a top horizontal plate holding the wafer substrate within the reactor. Therefore, the cylinder coupled most magnetic field to serve as the thermal source for the plate. Furthermore, the plate can block and thus significantly reduce the uncoupled magnetic field above the susceptor, thereby allowing the gas inlet to be closer. The results show approximately 140% and 2.6 times increase in the heating and susceptor coupling efficiencies, respectively, as well as a 90% reduction in the harmful magnetic flux on the gas inlet.

  14. Natural gas to improve energy security in Small Island Developing States: A techno-economic analysis

    Directory of Open Access Journals (Sweden)

    Pravesh Raghoo

    Full Text Available There is a paucity of studies on natural gas-based energy production in Small Island Developing States (SIDS even though technological improvements today are likely to make the application of natural gas more and more feasible. The development of natural gas in some of the regions of the Pacific, Africa, Indian Ocean and Caribbean attracts nearby countries and the coming up of the compressed natural gas (CNG technology which can serve regional markets are two motivations for SIDS to develop natural gas-based energy provision. A third factor concerns long-term energy security. Due to continued reliance on fossil fuels and slow uptake of renewable energy, there is a need to diversify SIDS’ energy mix for a sustainable electricity industry. Comparing the opportunities and constraints of liquefied natural gas (LNG and compressed natural gas (CNG in a SIDS-specific context, this paper discusses how to improve the integration of natural gas in prevailing energy regimes in SIDS as an alternative fuel to oil and complementary to renewable energy sources. To illustrate feasibility in practice, a techno-economic analysis is carried out using the island of Mauritius as an example. Keywords: Energy security, Natural gas, Small Island Developing States

  15. Securing General Aviation

    National Research Council Canada - National Science Library

    Elias, Bart

    2005-01-01

    .... Because GA plays a small but important role in the U.S. economy, improving upon GA security without unduly impeding air commerce or limiting the freedom of movement by air remains a significant challenge...

  16. A Stochastic Model for Improving Information Security in Supply Chain Systems

    OpenAIRE

    Ibrahim Al Kattan; Ahmed Al Nunu; Kassem Saleh

    2009-01-01

    This article presents a probabilistic security model for supply chain management systems (SCM) in which the basic goals of security (including confidentiality, integrity, availability and accountability, CIAA) are modeled and analyzed. Consequently, the weak points in system security are identified. A stochastic model using measurable values to describe the information system security of a SCM is introduced. Information security is a crucial and integral part of the network of supply chains. ...

  17. Nicotine Significantly Improves Chronic Stress-Induced Impairments of Cognition and Synaptic Plasticity in Mice.

    Science.gov (United States)

    Shang, Xueliang; Shang, Yingchun; Fu, Jingxuan; Zhang, Tao

    2017-08-01

    The aim of this study was to examine if nicotine was able to improve cognition deficits in a mouse model of chronic mild stress. Twenty-four male C57BL/6 mice were divided into three groups: control, stress, and stress with nicotine treatment. The animal model was established by combining chronic unpredictable mild stress (CUMS) and isolated feeding. Mice were exposed to CUMS continued for 28 days, while nicotine (0.2 mg/kg) was also administrated for 28 days. Weight and sucrose consumption were measured during model establishing period. The anxiety and behavioral despair were analyzed using the forced swim test (FST) and open-field test (OFT). Spatial cognition was evaluated using Morris water maze (MWM) test. Following behavioral assessment, both long-term potentiation (LTP) and depotentiation (DEP) were recorded in the hippocampal dentate gyrus (DG) region. Both synaptic and Notch1 proteins were measured by Western. Nicotine increased stressed mouse's sucrose consumption. The MWM test showed that spatial learning and reversal learning in stressed animals were remarkably affected relative to controls, whereas nicotine partially rescued cognitive functions. Additionally, nicotine considerably alleviated the level of anxiety and the degree of behavioral despair in stressed mice. It effectively mitigated the depression-induced impairment of hippocampal synaptic plasticity, in which both the LTP and DEP were significantly inhibited in stressed mice. Moreover, nicotine enhanced the expression of synaptic and Notch1 proteins in stressed animals. The results suggest that nicotine ameliorates the depression-like symptoms and improves the hippocampal synaptic plasticity closely associated with activating transmembrane ion channel receptors and Notch signaling components. Graphical Abstract ᅟ.

  18. Significant improvements in stability and reproducibility of atomic-scale atomic force microscopy in liquid

    International Nuclear Information System (INIS)

    Akrami, S M R; Nakayachi, H; Fukuma, T; Watanabe-Nakayama, T; Asakawa, H

    2014-01-01

    Recent advancement of dynamic-mode atomic force microscopy (AFM) for liquid-environment applications enabled atomic-scale studies on various interfacial phenomena. However, instabilities and poor reproducibility of the measurements often prevent systematic studies. To solve this problem, we have investigated the effect of various tip treatment methods for atomic-scale imaging and force measurements in liquid. The tested methods include Si coating, Ar plasma, Ar sputtering and UV/O 3 cleaning. We found that all the methods provide significant improvements in both the imaging and force measurements in spite of the tip transfer through the air. Among the methods, we found that the Si coating provides the best stability and reproducibility in the measurements. To understand the origin of the fouling resistance of the cleaned tip surface and the difference between the cleaning methods, we have investigated the tip surface properties by x-ray photoelectron spectroscopy and contact angle measurements. The results show that the contaminations adsorbed on the tip during the tip transfer through the air should desorb from the surface when it is immersed in aqueous solution due to the enhanced hydrophilicity by the tip treatments. The tip surface prepared by the Si coating is oxidized when it is immersed in aqueous solution. This creates local spots where stable hydration structures are formed. For the other methods, there is no active mechanism to create such local hydration sites. Thus, the hydration structure formed under the tip apex is not necessarily stable. These results reveal the desirable tip properties for atomic-scale AFM measurements in liquid, which should serve as a guideline for further improvements of the tip treatment methods. (paper)

  19. Significant improvement of accuracy and precision in the determination of trace rare earths by fluorescence analysis

    International Nuclear Information System (INIS)

    Ozawa, L.; Hersh, H.N.

    1976-01-01

    Most of the rare earths in yttrium, gadolinium and lanthanum oxides emit characteristic fluorescent line spectra under irradiation with photons, electrons and x rays. The sensitivity and selectivity of the rare earth fluorescences are high enough to determine the trace amounts (0.01 to 100 ppM) of rare earths. The absolute fluorescent intensities of solids, however, are markedly affected by the synthesis procedure, level of contamination and crystal perfection, resulting in poor accuracy and low precision for the method (larger than 50 percent error). Special care in preparation of the samples is required to obtain good accuracy and precision. It is found that the accuracy and precision for the determination of trace (less than 10 ppM) rare earths by fluorescence analysis improved significantly, while still maintaining the sensitivity, when the determination is made by comparing the ratio of the fluorescent intensities of the trace rare earths to that of a deliberately added rare earth as reference. The variation in the absolute fluorescent intensity remains, but is compensated for by measuring the fluorescent line intensity ratio. Consequently, the determination of trace rare earths (with less than 3 percent error) is easily made by a photoluminescence technique in which the rare earths are excited directly by photons. Accuracy is still maintained when the absolute fluorescent intensity is reduced by 50 percent through contamination by Ni, Fe, Mn or Pb (about 100 ppM). Determination accuracy is also improved for fluorescence analysis by electron excitation and x-ray excitation. For some rare earths, however, accuracy by these techniques is reduced because indirect excitation mechanisms are involved. The excitation mechanisms and the interferences between rare earths are also reported

  20. Improving System Security and User Privacy in Secure Electronic Transaction (SET) with X.509 v3 Certificate

    OpenAIRE

    Saidu Muhammad

    2015-01-01

    With the advancement of internets, user’s transaction is at ease, timely manner and effective wise through online payment method, so also cybercriminals become increasingly more prompt in areas like e-commerce sites, financial institutions, payment processes and other online transactions. Therefore the need for the system security and privacy became the central issues for the acceptance of online payment methods in particular and growth of the Internet market in general. Using SET...

  1. Affordable nutrient solutions for improved food security as evidenced by crop trials

    Science.gov (United States)

    van der Velde, Marijn; See, Linda; You, Liangzhi; Balkovic, Juraj; Fritz, Steffen; Khabarov, Nikolay; Obersteiner, Michael; Wood, Stanley

    2013-04-01

    Robust assessments of attainable crop yields in Africa and South America are pivotal for projections of food security and cropland expansion. In contract to South America, Africa has not achieved significant increases in crop yields. Here we utilize a database of historical FAO crop fertilizer trials at 1358 locations for Sub-Saharan Africa and South America to calculate corn yield gaps at the continental scale. To further the African crop productivity discourse we consider the importance of soil nutrient stoichiometry and the viability of micro-dosing. Importantly, besides N, our crop yield potential estimates account for P which has a notoriously low availability in weathered tropical soils. We investigated yield gaps for corn under two scenarios: a micro-dosing scenario with marginal increases in N and P of 10 kg/ha and a larger yet still conservative scenario with proposed N and P applications of 80 and 20 kg/ha respectively. Two critical findings emerged from the analysis. The first is the degree to which P limits increases in corn yields. For example, under a micro-dosing scenario, in Africa, the addition of small amounts of N alone resulted in yield increases of 8% while the addition of only P increased yields by 26%, with implications for designing better balanced fertilizer distribution schemes. Application of both N and P at 10 kg ha-1 lead to 15% and 32% yield increase. To put the benefits of these higher yields in context, this could save more than 4 and 25 million ha of cropland, or alternatively potentially feed 64 and 150 million people in South America and Africa respectively. The second finding was the relatively large amount of yield increase possible for a small, yet affordable amount of fertilizer application. Using African and South American fertilizer prices we show that the level of investment needed to achieve these results is considerably less than 1% of Agricultural GDP for both a micro-dosing scenario and for a scenario involving higher

  2. Flavonol-rich dark cocoa significantly decreases plasma endothelin-1 and improves cognition in urban children.

    Science.gov (United States)

    Calderón-Garcidueñas, Lilian; Mora-Tiscareño, Antonieta; Franco-Lira, Maricela; Cross, Janet V; Engle, Randall; Aragón-Flores, Mariana; Gómez-Garza, Gilberto; Jewells, Valerie; Medina-Cortina, Humberto; Solorio, Edelmira; Chao, Chih-Kai; Zhu, Hongtu; Mukherjee, Partha S; Ferreira-Azevedo, Lara; Torres-Jardón, Ricardo; D'Angiulli, Amedeo

    2013-01-01

    Air pollution exposures are linked to systemic inflammation, cardiovascular and respiratory morbidity and mortality, neuroinflammation and neuropathology in young urbanites. In particular, most Mexico City Metropolitan Area (MCMA) children exhibit subtle cognitive deficits, and neuropathology studies show 40% of them exhibiting frontal tau hyperphosphorylation and 51% amyloid-β diffuse plaques (compared to 0% in low pollution control children). We assessed whether a short cocoa intervention can be effective in decreasing plasma endothelin 1 (ET-1) and/or inflammatory mediators in MCMA children. Thirty gram of dark cocoa with 680 mg of total flavonols were given daily for 10.11 ± 3.4 days (range 9-24 days) to 18 children (10.55 years, SD = 1.45; 11F/7M). Key metabolite ratios in frontal white matter and in hippocampus pre and during cocoa intervention were quantified by magnetic resonance spectroscopy. ET-1 significantly decreased after cocoa treatment (p = 0.0002). Fifteen children (83%) showed a marginally significant individual improvement in one or both of the applied simple short memory tasks. Endothelial dysfunction is a key feature of exposure to particulate matter (PM) and decreased endothelin-1 bioavailability is likely useful for brain function in the context of air pollution. Our findings suggest that cocoa interventions may be critical for early implementation of neuroprotection of highly exposed urban children. Multi-domain nutraceutical interventions could limit the risk for endothelial dysfunction, cerebral hypoperfusion, neuroinflammation, cognitive deficits, structural volumetric detrimental brain effects, and the early development of the neuropathological hallmarks of Alzheimer's and Parkinson's diseases.

  3. Model training across multiple breeding cycles significantly improves genomic prediction accuracy in rye (Secale cereale L.).

    Science.gov (United States)

    Auinger, Hans-Jürgen; Schönleben, Manfred; Lehermeier, Christina; Schmidt, Malthe; Korzun, Viktor; Geiger, Hartwig H; Piepho, Hans-Peter; Gordillo, Andres; Wilde, Peer; Bauer, Eva; Schön, Chris-Carolin

    2016-11-01

    Genomic prediction accuracy can be significantly increased by model calibration across multiple breeding cycles as long as selection cycles are connected by common ancestors. In hybrid rye breeding, application of genome-based prediction is expected to increase selection gain because of long selection cycles in population improvement and development of hybrid components. Essentially two prediction scenarios arise: (1) prediction of the genetic value of lines from the same breeding cycle in which model training is performed and (2) prediction of lines from subsequent cycles. It is the latter from which a reduction in cycle length and consequently the strongest impact on selection gain is expected. We empirically investigated genome-based prediction of grain yield, plant height and thousand kernel weight within and across four selection cycles of a hybrid rye breeding program. Prediction performance was assessed using genomic and pedigree-based best linear unbiased prediction (GBLUP and PBLUP). A total of 1040 S 2 lines were genotyped with 16 k SNPs and each year testcrosses of 260 S 2 lines were phenotyped in seven or eight locations. The performance gap between GBLUP and PBLUP increased significantly for all traits when model calibration was performed on aggregated data from several cycles. Prediction accuracies obtained from cross-validation were in the order of 0.70 for all traits when data from all cycles (N CS  = 832) were used for model training and exceeded within-cycle accuracies in all cases. As long as selection cycles are connected by a sufficient number of common ancestors and prediction accuracy has not reached a plateau when increasing sample size, aggregating data from several preceding cycles is recommended for predicting genetic values in subsequent cycles despite decreasing relatedness over time.

  4. Significantly improving trace thallium removal from surface waters during coagulation enhanced by nanosized manganese dioxide.

    Science.gov (United States)

    Huangfu, Xiaoliu; Ma, Chengxue; Ma, Jun; He, Qiang; Yang, Chun; Jiang, Jin; Wang, Yaan; Wu, Zhengsong

    2017-02-01

    Thallium (Tl) is an element of high toxicity and significant accumulation in human body. There is an urgent need for the development of appropriate strategies for trace Tl removal in drinking water treatment plants. In this study, the efficiency and mechanism of trace Tl (0.5 μg/L) removal by conventional coagulation enhanced by nanosized manganese dioxide (nMnO 2 ) were explored in simulated water and two representative surface waters (a river water and a reservoir water obtained from Northeast China). Experimental results showed that nMnO 2 significantly improve Tl(I) removal from selected waters. The removal efficiency was dramatically higher in the simulated water, demonstrating by less than 0.1 μg/L Tl residual. The enhancement of trace Tl removal in the surface waters decreased to a certain extent. Both adjusting water pH to alkaline condition and preoxidation of Tl(I) to Tl(III) benefit trace Tl removal from surface waters. Data also indicated that competitive cation of Ca 2+ decreased the efficiency of trace Tl removal, resulting from the reduction of Tl adsorption on nMnO 2 . Humic acid could largely low Tl removal efficiency during nMnO 2 enhanced coagulation processes. Trace elemental Tl firstly adsorbed on nMnO 2 and then removed accompanying with nMnO 2 settling. The information obtained in the present study may provide a potential strategy for drinking water treatment plants threatened by trace Tl. Copyright © 2016 Elsevier Ltd. All rights reserved.

  5. Significant effect of Ca2+ on improving the heat resistance of lactic acid bacteria.

    Science.gov (United States)

    Huang, Song; Chen, Xiao Dong

    2013-07-01

    The heat resistance of lactic acid bacteria (LAB) has been extensively investigated due to its highly practical significance. Reconstituted skim milk (RSM) has been found to be one of the most effective protectant wall materials for microencapsulating microorganisms during convective drying, such as spray drying. In addition to proteins and carbohydrate, RSM is rich in calcium. It is not clear which component is critical in the RSM protection mechanism. This study investigated the independent effect of calcium. Ca(2+) was added to lactose solution to examine its influence on the heat resistance of Lactobacillus rhamnosus ZY, Lactobacillus casei Zhang, Lactobacillus plantarum P8 and Streptococcus thermophilus ND03. The results showed that certain Ca(2+) concentrations enhanced the heat resistance of the LAB strains to different extents, that is produced higher survival and shorter regrowth lag times of the bacterial cells. In some cases, the improvements were dramatic. More scientifically insightful and more intensive instrumental study of the Ca(2+) behavior around and in the cells should be carried out in the near future. In the meantime, this work may lead to the development of more cost-effective wall materials with Ca(2+) added as a prime factor. © 2013 Federation of European Microbiological Societies. Published by John Wiley & Sons Ltd. All rights reserved.

  6. Targeting Heparin to Collagen within Extracellular Matrix Significantly Reduces Thrombogenicity and Improves Endothelialization of Decellularized Tissues.

    Science.gov (United States)

    Jiang, Bin; Suen, Rachel; Wertheim, Jason A; Ameer, Guillermo A

    2016-12-12

    Thrombosis within small-diameter vascular grafts limits the development of bioartificial, engineered vascular conduits, especially those derived from extracellular matrix (ECM). Here we describe an easy-to-implement strategy to chemically modify vascular ECM by covalently linking a collagen binding peptide (CBP) to heparin to form a heparin derivative (CBP-heparin) that selectively binds a subset of collagens. Modification of ECM with CBP-heparin leads to increased deposition of functional heparin (by ∼7.2-fold measured by glycosaminoglycan composition) and a corresponding reduction in platelet binding (>70%) and whole blood clotting (>80%) onto the ECM. Furthermore, addition of CBP-heparin to the ECM stabilizes long-term endothelial cell attachment to the lumen of ECM-derived vascular conduits, potentially through recruitment of heparin-binding growth factors that ultimately improve the durability of endothelialization in vitro. Overall, our findings provide a simple yet effective method to increase deposition of functional heparin on the surface of ECM-based vascular grafts and thereby minimize thrombogenicity of decellularized tissue, overcoming a significant challenge in tissue engineering of bioartificial vessels and vascularized organs.

  7. Significant Improvement in Chronic Persistent Headaches Caused by Small Rathke Cleft Cysts After Transsphenoidal Surgery.

    Science.gov (United States)

    Fukui, Issei; Hayashi, Yasuhiko; Kita, Daisuke; Sasagawa, Yasuo; Oishi, Masahiro; Tachibana, Osamu; Nakada, Mitsutoshi

    2017-03-01

    Rathke cleft cysts (RCC) usually are asymptomatic and can be observed via the use of conservative methods. Some patients with RCCs, however, have severe headaches even if they are small enough to be confined to the sella, and these small RCCs seldom have been discussed. This study presents an investigation into clinical characteristics of small RCCs associated with severe headaches, demonstrating efficacy and safety of endoscopic transsphenoidal surgery (ETSS) to relieve headaches. In this study, 13 patients with small RCCs (maximum diameter HIT-6) score was calculated both pre- and postoperatively to evaluate headache severity. All patients complained of severe headaches, which disturbed their daily life. Most headaches were nonpulsating and localized in the frontal area. Characteristically, 6 patients (46%) experienced severe headaches with sudden onset that continued chronically. HIT-6 score was 64 on average, meaning headaches affected daily life severely. After surgical decompression of the cyst, headache in all of the patients improved dramatically and HIT-6 score decreased significantly to 37, suggesting that headaches were diminished. No newly developed deficiencies of the anterior pituitary lobe function were detected. Postoperative occurrence of diabetes insipidus was found in 2 patients, both of which were transient. No recurring cysts were found. Severe headaches can develop from small RCCs. In the present study, ETSS was performed on such patients effectively and safely to relieve their headaches. Copyright © 2017 Elsevier Inc. All rights reserved.

  8. Successful percutaneous coronary intervention significantly improves coronary sinus blood flow as assessed by transthoracic echocardiography.

    Science.gov (United States)

    Lyubarova, Radmila; Boden, William E; Fein, Steven A; Schulman-Marcus, Joshua; Torosoff, Mikhail

    2018-06-01

    Transthoracic echocardiography (TTE) has been used to assess coronary sinus blood flow (CSBF), which reflects total coronary arterial blood flow. Successful angioplasty is expected to improve coronary arterial blood flow. Changes in CSBF after percutaneous coronary intervention (PCI), as assessed by TTE, have not been systematically evaluated. TTE can be utilized to reflect increased CSBF after a successful, clinically indicated PCI. The study cohort included 31 patients (18 females, 62 ± 11 years old) referred for diagnostic cardiac catheterization for suspected coronary artery disease and possible PCI, when clinically indicated. All performed PCIs were successful, with good angiographic outcome. CSBF per cardiac cycle (mL/beat) was measured using transthoracic two-dimensional and Doppler flow imaging as the product of coronary sinus (CS) area and CS flow time-velocity integral. CSBF per minute (mL/min) was calculated as the product of heart rate and CSBF per cardiac cycle. In each patient, CSBF was assessed prospectively, before and after cardiac catheterization with and without clinically indicated PCI. Within- and between-group differences in CSBF before and after PCI were assessed using repeated measures analysis of variance. Technically adequate CSBF measurements were obtained in 24 patients (77%). In patients who did not undergo PCI, there was no significant change in CSBF (278.1 ± 344.1 versus 342.7 ± 248.5, p = 0.36). By contrast, among patients who underwent PCI, CSBF increased significantly (254.3 ± 194.7 versus 618.3 ± 358.5 mL/min, p < 0.01, p-interaction = 0.03). Other hemodynamic and echocardiographic parameters did not change significantly before and after cardiac catheterization in either treatment group. Transthoracic echocardiographic assessment can be employed to document CSBF changes after angioplasty. Future studies are needed to explore the clinical utility of this noninvasive metric.

  9. The experience of clinical supervision for nurses and healthcare assistants in a secure adolescent service: Affecting service improvement.

    Science.gov (United States)

    McCarron, R H; Eade, J; Delmage, E

    2018-04-01

    WHAT IS KNOWN ON THE SUBJECT?: Regular and effective clinical supervision for mental health nurses and healthcare assistants (HCAs) is an important tool in helping to reduce stress and burnout, and in ensuring safe, effective and high-quality mental health care. Previous studies of clinical supervision within secure mental health environments have found both a low availability of clinical supervision, and a low level of staff acceptance of its value, particularly for HCAs. WHAT DOES THIS PAPER ADD TO EXISTING KNOWLEDGE?: In previous studies, the understanding shown by HCAs and nurses around the benefits of clinical supervision may have been limited by the methods used. This study was specifically designed to help them best express their views. In contrast to previous studies, both nurses and HCAs showed a good understanding of the function and value of clinical supervision. Significant improvements in the experience of, and access to, clinical supervision for nurses and HCAs working in secure mental health services may be achieved by raising staff awareness, demonstrating organizational support and increasing monitoring of clinical supervision. WHAT ARE THE IMPLICATIONS FOR PRACTICE?: Organizations should consider reviewing their approach to supervision to include raising staff awareness, multidisciplinary supervision, group supervision, and recording and tracking of supervision rates. Organizations should be mindful of the need to provide effective clinical supervision to HCAs as well as nurses. Introduction Studies have found a low availability and appreciation of clinical supervision, especially for healthcare assistants (HCAs). Qualitative research is needed to further understand this. Aims Increase understanding of nurses' and HCAs' experiences of, and access to, clinical supervision. Identify nurses' and HCAs' perceptions of the value and function of clinical supervision. Assess how interventions affect staff's experiences of clinical supervision. Methods In

  10. Lidar and Dial application for detection and identification: a proposal to improve safety and security

    Science.gov (United States)

    Gaudio, P.; Malizia, A.; Gelfusa, M.; Murari, A.; Parracino, S.; Poggi, L. A.; Lungaroni, M.; Ciparisse, J. F.; Di Giovanni, D.; Cenciarelli, O.; Carestia, M.; Peluso, E.; Gabbarini, V.; Talebzadeh, S.; Bellecci, C.

    2017-01-01

    Nowadays the intentional diffusion in air (both in open and confined environments) of chemical contaminants is a dramatic source of risk for the public health worldwide. The needs of a high-tech networks composed by software, diagnostics, decision support systems and cyber security tools are urging all the stakeholders (military, public, research & academic entities) to create innovative solutions to face this problem and improve both safety and security. The Quantum Electronics and Plasma Physics (QEP) Research Group of the University of Rome Tor Vergata is working since the 1960s on the development of laser-based technologies for the stand-off detection of contaminants in the air. Up to now, four demonstrators have been developed (two LIDAR-based and two DIAL-based) and have been used in experimental campaigns during all 2015. These systems and technologies can be used together to create an innovative solution to the problem of public safety and security: the creation of a network composed by detection systems: A low cost LIDAR based system has been tested in an urban area to detect pollutants coming from urban traffic, in this paper the authors show the results obtained in the city of Crotone (south of Italy). This system can be used as a first alarm and can be coupled with an identification system to investigate the nature of the threat. A laboratory dial based system has been used in order to create a database of absorption spectra of chemical substances that could be release in atmosphere, these spectra can be considered as the fingerprints of the substances that have to be identified. In order to create the database absorption measurements in cell, at different conditions, are in progress and the first results are presented in this paper.

  11. Lidar and Dial application for detection and identification: a proposal to improve safety and security

    International Nuclear Information System (INIS)

    Gaudio, P.; Malizia, A.; Gelfusa, M.; Parracino, S.; Poggi, L.A.; Lungaroni, M.; Ciparisse, J.F.; Giovanni, D. Di; Cenciarelli, O.; Carestia, M.; Peluso, E.; Gabbarini, V.; Talebzadeh, S.; Bellecci, C.; Murari, A.

    2017-01-01

    Nowadays the intentional diffusion in air (both in open and confined environments) of chemical contaminants is a dramatic source of risk for the public health worldwide. The needs of a high-tech networks composed by software, diagnostics, decision support systems and cyber security tools are urging all the stakeholders (military, public, research and academic entities) to create innovative solutions to face this problem and improve both safety and security. The Quantum Electronics and Plasma Physics (QEP) Research Group of the University of Rome Tor Vergata is working since the 1960s on the development of laser-based technologies for the stand-off detection of contaminants in the air. Up to now, four demonstrators have been developed (two LIDAR-based and two DIAL-based) and have been used in experimental campaigns during all 2015. These systems and technologies can be used together to create an innovative solution to the problem of public safety and security: the creation of a network composed by detection systems: A low cost LIDAR based system has been tested in an urban area to detect pollutants coming from urban traffic, in this paper the authors show the results obtained in the city of Crotone (south of Italy). This system can be used as a first alarm and can be coupled with an identification system to investigate the nature of the threat. A laboratory dial based system has been used in order to create a database of absorption spectra of chemical substances that could be release in atmosphere, these spectra can be considered as the fingerprints of the substances that have to be identified. In order to create the database absorption measurements in cell, at different conditions, are in progress and the first results are presented in this paper.

  12. Speaker identification for the improvement of the security communication between law enforcement units

    Science.gov (United States)

    Tovarek, Jaromir; Partila, Pavol

    2017-05-01

    This article discusses the speaker identification for the improvement of the security communication between law enforcement units. The main task of this research was to develop the text-independent speaker identification system which can be used for real-time recognition. This system is designed for identification in the open set. It means that the unknown speaker can be anyone. Communication itself is secured, but we have to check the authorization of the communication parties. We have to decide if the unknown speaker is the authorized for the given action. The calls are recorded by IP telephony server and then these recordings are evaluate using classification If the system evaluates that the speaker is not authorized, it sends a warning message to the administrator. This message can detect, for example a stolen phone or other unusual situation. The administrator then performs the appropriate actions. Our novel proposal system uses multilayer neural network for classification and it consists of three layers (input layer, hidden layer, and output layer). A number of neurons in input layer corresponds with the length of speech features. Output layer then represents classified speakers. Artificial Neural Network classifies speech signal frame by frame, but the final decision is done over the complete record. This rule substantially increases accuracy of the classification. Input data for the neural network are a thirteen Mel-frequency cepstral coefficients, which describe the behavior of the vocal tract. These parameters are the most used for speaker recognition. Parameters for training, testing and validation were extracted from recordings of authorized users. Recording conditions for training data correspond with the real traffic of the system (sampling frequency, bit rate). The main benefit of the research is the system developed for text-independent speaker identification which is applied to secure communication between law enforcement units.

  13. Improving computer security for authentication of users: influence of proactive password restrictions.

    Science.gov (United States)

    Proctor, Robert W; Lien, Mei-Ching; Vu, Kim-Phuong L; Schultz, E Eugene; Salvendy, Gavriel

    2002-05-01

    Entering a username-password combination is a widely used procedure for identification and authentication in computer systems. However, it is a notoriously weak method, in that the passwords adopted by many users are easy to crack. In an attempt to improve security, proactive password checking may be used, in which passwords must meet several criteria to be more resistant to cracking. In two experiments, we examined the influence of proactive password restrictions on the time that it took to generate an acceptable password and to use it subsequently to long in. The required length was a minimum of five characters in Experiment 1 and eight characters in Experiment 2. In both experiments, one condition had only the length restriction, and the other had additional restrictions. The additional restrictions greatly increased the time it took to generate the password but had only a small effect on the time it took to use it subsequently to long in. For the five-character passwords, 75% were cracked when no other restrictions were imposed, and this was reduced to 33% with the additional restrictions. For the eight-character passwords, 17% were cracked with no other restrictions, and 12.5% with restrictions. The results indicate that increasing the minimum character length reduces crackability and increases security, regardless of whether additional restrictions are imposed.

  14. Heat storage in forest biomass significantly improves energy balance closure particularly during stable conditions

    Science.gov (United States)

    Lindroth, A.; Mölder, M.; Lagergren, F.

    2009-08-01

    Temperature measurements in trunks and branches in a mature ca. 100 years-old mixed pine and spruce forest in central Sweden were used to estimate the heat storage in the tree biomass. The estimated heat flux in the sample trees and data on biomass distributions were used to scale up to stand level biomass heat fluxes. The rate of change of sensible and latent heat storage in the air layer below the level of the flux measurements was estimated from air temperature and humidity profile measurements and soil heat flux was estimated from heat flux plates and soil temperature measurements. The fluxes of sensible and latent heat from the forest were measured with an eddy covariance system in a tower. The analysis was made for a two-month period in summer of 1995. The tree biomass heat flux was the largest of the estimated storage components and varied between 40 and -35 W m-2 on summer days with nice weather. Averaged over two months the diurnal maximum of total heat storage was 45 W m-2 and the minimum was -35 W m-2. The soil heat flux and the sensible heat storage in air were out of phase with the biomass flux and they reached maximum values that were about 75% of the maximum of the tree biomass heat storage. The energy balance closure improved significantly when the total heat storage was added to the turbulent fluxes. The slope of a regression line with sum of fluxes and storage as independent and net radiation as dependent variable, increased from 0.86 to 0.95 for half-hourly data and the scatter was also reduced. The most significant finding was, however, that during nights with strongly stable conditions when the sensible heat flux dropped to nearly zero, the total storage matched the net radiation nearly perfectly. Another interesting result was that the mean energy imbalance started to increase when the Richardson number became more negative than ca. -0.1. In fact, the largest energy deficit occurred at maximum instability. Our conclusion is that eddy

  15. Significant improvement of eczema with skin care and food elimination in small children.

    Science.gov (United States)

    Norrman, Gunilla; Tomicić, Sara; Böttcher, Malin Fagerås; Oldaeus, Göran; Strömberg, Leif; Fälth-magnusson, Karin

    2005-10-01

    To evaluate common methods of investigation and treatment in children younger than 2 y of age with eczema, with or without sensitization to food allergens. One hundred and twenty-three children younger than 2 y of age with eczema and suspected food allergy were included in this prospective study. The children underwent skin-prick test with cow's milk, fresh hen's egg white and wheat. Specific IgE to milk and egg white was analysed. The eczema extent and severity was estimated with SCORAD before and after treatment. Children with a positive skin-prick test were instructed to exclude that food item from their diet. All children were treated with emollients and topical steroids when needed. Sixty-two of the children were skin-prick positive to at least one of the allergens; 62% had mild, 30% moderate and 8% severe eczema at their first visit. After treatment, 90% had mild, 10% moderate and 0% severe eczema. Forty-six per cent of the children had circulating IgE antibodies to milk or egg white. Ten per cent had specific IgE but negative skin-prick test to the same allergen. This subgroup improved their eczema significantly without elimination diet. The conventional treatments for children with eczema, i.e. skin care and food elimination, are effective. The beneficial effect of skin care as the first step should not be neglected, and it may not be necessary to eliminate food allergens to relieve skin symptoms in all food-sensitized children with eczema.

  16. Introduction of e-learning in dental radiology reveals significantly improved results in final examination.

    Science.gov (United States)

    Meckfessel, Sandra; Stühmer, Constantin; Bormann, Kai-Hendrik; Kupka, Thomas; Behrends, Marianne; Matthies, Herbert; Vaske, Bernhard; Stiesch, Meike; Gellrich, Nils-Claudius; Rücker, Martin

    2011-01-01

    Because a traditionally instructed dental radiology lecture course is very time-consuming and labour-intensive, online courseware, including an interactive-learning module, was implemented to support the lectures. The purpose of this study was to evaluate the perceptions of students who have worked with web-based courseware as well as the effect on their results in final examinations. Users (n(3+4)=138) had access to the e-program from any networked computer at any time. Two groups (n(3)=71, n(4)=67) had to pass a final exam after using the e-course. Results were compared with two groups (n(1)=42, n(2)=48) who had studied the same content by attending traditional lectures. In addition a survey of the students was statistically evaluated. Most of the respondents reported a positive attitude towards e-learning and would have appreciated more access to computer-assisted instruction. Two years after initiating the e-course the failure rate in the final examination dropped significantly, from 40% to less than 2%. The very positive response to the e-program and improved test scores demonstrated the effectiveness of our e-course as a learning aid. Interactive modules in step with clinical practice provided learning that is not achieved by traditional teaching methods alone. To what extent staff savings are possible is part of a further study. Copyright © 2010 European Association for Cranio-Maxillo-Facial Surgery. Published by Elsevier Ltd. All rights reserved.

  17. Mapping Soil Properties of Africa at 250 m Resolution: Random Forests Significantly Improve Current Predictions.

    Directory of Open Access Journals (Sweden)

    Tomislav Hengl

    Full Text Available 80% of arable land in Africa has low soil fertility and suffers from physical soil problems. Additionally, significant amounts of nutrients are lost every year due to unsustainable soil management practices. This is partially the result of insufficient use of soil management knowledge. To help bridge the soil information gap in Africa, the Africa Soil Information Service (AfSIS project was established in 2008. Over the period 2008-2014, the AfSIS project compiled two point data sets: the Africa Soil Profiles (legacy database and the AfSIS Sentinel Site database. These data sets contain over 28 thousand sampling locations and represent the most comprehensive soil sample data sets of the African continent to date. Utilizing these point data sets in combination with a large number of covariates, we have generated a series of spatial predictions of soil properties relevant to the agricultural management--organic carbon, pH, sand, silt and clay fractions, bulk density, cation-exchange capacity, total nitrogen, exchangeable acidity, Al content and exchangeable bases (Ca, K, Mg, Na. We specifically investigate differences between two predictive approaches: random forests and linear regression. Results of 5-fold cross-validation demonstrate that the random forests algorithm consistently outperforms the linear regression algorithm, with average decreases of 15-75% in Root Mean Squared Error (RMSE across soil properties and depths. Fitting and running random forests models takes an order of magnitude more time and the modelling success is sensitive to artifacts in the input data, but as long as quality-controlled point data are provided, an increase in soil mapping accuracy can be expected. Results also indicate that globally predicted soil classes (USDA Soil Taxonomy, especially Alfisols and Mollisols help improve continental scale soil property mapping, and are among the most important predictors. This indicates a promising potential for transferring

  18. Optimized distributed systems achieve significant performance improvement on sorted merging of massive VCF files.

    Science.gov (United States)

    Sun, Xiaobo; Gao, Jingjing; Jin, Peng; Eng, Celeste; Burchard, Esteban G; Beaty, Terri H; Ruczinski, Ingo; Mathias, Rasika A; Barnes, Kathleen; Wang, Fusheng; Qin, Zhaohui S

    2018-06-01

    Sorted merging of genomic data is a common data operation necessary in many sequencing-based studies. It involves sorting and merging genomic data from different subjects by their genomic locations. In particular, merging a large number of variant call format (VCF) files is frequently required in large-scale whole-genome sequencing or whole-exome sequencing projects. Traditional single-machine based methods become increasingly inefficient when processing large numbers of files due to the excessive computation time and Input/Output bottleneck. Distributed systems and more recent cloud-based systems offer an attractive solution. However, carefully designed and optimized workflow patterns and execution plans (schemas) are required to take full advantage of the increased computing power while overcoming bottlenecks to achieve high performance. In this study, we custom-design optimized schemas for three Apache big data platforms, Hadoop (MapReduce), HBase, and Spark, to perform sorted merging of a large number of VCF files. These schemas all adopt the divide-and-conquer strategy to split the merging job into sequential phases/stages consisting of subtasks that are conquered in an ordered, parallel, and bottleneck-free way. In two illustrating examples, we test the performance of our schemas on merging multiple VCF files into either a single TPED or a single VCF file, which are benchmarked with the traditional single/parallel multiway-merge methods, message passing interface (MPI)-based high-performance computing (HPC) implementation, and the popular VCFTools. Our experiments suggest all three schemas either deliver a significant improvement in efficiency or render much better strong and weak scalabilities over traditional methods. Our findings provide generalized scalable schemas for performing sorted merging on genetics and genomics data using these Apache distributed systems.

  19. Cyclosporin A significantly improves preeclampsia signs and suppresses inflammation in a rat model.

    Science.gov (United States)

    Hu, Bihui; Yang, Jinying; Huang, Qian; Bao, Junjie; Brennecke, Shaun Patrick; Liu, Huishu

    2016-05-01

    Preeclampsia is associated with an increased inflammatory response. Immune suppression might be an effective treatment. The aim of this study was to examine whether Cyclosporin A (CsA), an immunosuppressant, improves clinical characteristics of preeclampsia and suppresses inflammation in a lipopolysaccharide (LPS) induced preeclampsia rat model. Pregnant rats were randomly divided into 4 groups: group 1 (PE) rats each received LPS via tail vein on gestational day (GD) 14; group 2 (PE+CsA5) rats were pretreated with LPS (1.0 μg/kg) on GD 14 and were then treated with CsA (5mg/kg, ip) on GDs 16, 17 and 18; group 3 (PE+CsA10) rats were pretreated with LPS (1.0 μg/kg) on GD 14 and were then treated with CsA (10mg/kg, ip) on GDs 16, 17 and 18; group 4 (pregnant control, PC) rats were treated with the vehicle (saline) used for groups 1, 2 and 3. Systolic blood pressure, urinary albumin, biometric parameters and the levels of serum cytokines were measured on day 20. CsA treatment significantly reduced LPS-induced systolic blood pressure and the mean 24-h urinary albumin excretion. Pro-inflammatory cytokines IL-6, IL-17, IFN-γ and TNF-α were increased in the LPS treatment group but were reduced in (LPS+CsA) group (Ppreeclampsia signs and attenuated inflammatory responses in the LPS induced preeclampsia rat model which suggests that immunosuppressant might be an alternative management option for preeclampsia. Copyright © 2016 Elsevier Ltd. All rights reserved.

  20. Parameter definition using vibration prediction software leads to significant drilling performance improvements

    Energy Technology Data Exchange (ETDEWEB)

    Amorim, Dalmo; Hanley, Chris Hanley; Fonseca, Isaac; Santos, Juliana [National Oilwell Varco, Houston TX (United States); Leite, Daltro J.; Borella, Augusto; Gozzi, Danilo [Petroleo Brasileiro S.A. (PETROBRAS), Rio de Janeiro, RJ (Brazil)

    2012-07-01

    The understanding and mitigation of downhole vibration has been a heavily researched subject in the oil industry as it results in more expensive drilling operations, as vibrations significantly diminish the amount of effective drilling energy available to the bit and generate forces that can push the bit or the Bottom Hole Assembly (BHA) off its concentric axis of rotation, producing high magnitude impacts with the borehole wall. In order to drill ahead, a sufficient amount of energy must be supplied by the rig to overcome the resistance of the drilling system, including the reactive torque of the system, drag forces, fluid pressure losses and energy dissipated by downhole vibrations, then providing the bit with the energy required to fail the rock. If the drill string enters resonant modes of vibration, not only does it decreases the amount of available energy to drill, but increases the potential for catastrophic downhole equipment and drilling bit failures. In this sense, the mitigation of downhole vibrations will result in faster, smoother, and cheaper drilling operations. A software tool using Finite Element Analysis (FEA) has been developed to provide better understanding of downhole vibration phenomena in drilling environments. The software tool calculates the response of the drilling system at various input conditions, based on the design of the wellbore along with the geometry of the Bottom Hole Assembly (BHA) and the drill string. It identifies where undesired levels of resonant vibration will be driven by certain combinations of specific drilling parameters, and also which combinations of drilling parameters will result in lower levels of vibration, so the least shocks, the highest penetration rate and the lowest cost per foot can be achieved. With the growing performance of personal computers, complex software systems modeling the drilling vibrations using FEA has been accessible to a wider audience of field users, further complimenting with real time

  1. On Security Management: Improving Energy Efficiency, Decreasing Negative Environmental Impact, and Reducing Financial Costs for Data Centers

    Directory of Open Access Journals (Sweden)

    Katarzyna Mazur

    2015-01-01

    Full Text Available Security management is one of the most significant issues in nowadays data centers. Selection of appropriate security mechanisms and effective energy consumption management together with caring for the environment enforces a profound analysis of the considered system. In this paper, we propose a specialized decision support system with a multilevel, comprehensive analysis scheme. As a result of the extensive use of mathematical methods and statistics, guidelines and indicators returned by the proposed approach facilitate the decision-making process and conserve decision-maker’s time and attention. In the paper we utilized proposed multilevel analysis scheme to manage security-based data flow in the example data center. Determining the most secure, energy-efficient, environmental friendly security mechanisms, we implemented the role-based access control method in Quality of Protection Modeling Language (QoP-ML and evaluated its performance in terms of mentioned factors.

  2. Improving energy decisions towards better scientific policy advice for a safe and secure future energy system

    CERN Document Server

    Droste-Franke, Bert; Kaiser, M; Schreurs, Miranda; Weber, Christoph; Ziesemer, Thomas

    2015-01-01

    Managing a successful transition of the current energy supply system to less carbon emitting options, ensuring a safe and secure supply during the whole process and in the long term, is one of the largest challenges of our time. Various approaches and first implementations show that it is not only technological issue, but also a matter of societal acceptance and acceptability, considering basic ethic values of the society. The main foci of the book are, thus, to develop an understanding about the specific challenges of the scientific policy advice in the area, to explore typical current approaches for the analysis of future energy systems and to develop criteria for the quality assessment and guidelines for the improvement of such studies. The book provides assistance to the interpretation of existing studies and guidelines for setting up and carrying out new analyses as well as for communicating and applying the results. Thereby, it aims to support the involved actors such as the respective scientific expert...

  3. Improving Podcast Distribution on Gwanda using PrivHab: a Multiagent Secure Georouting Protocol.

    Directory of Open Access Journals (Sweden)

    Adrián SÁNCHEZ-CARMONA

    2015-12-01

    Full Text Available We present PrivHab, a multiagent secure georouting protocol that improves podcast distribution on Gwanda, Zimbabwe. PrivHab learns the whereabouts of the nodes of the network to select an itinerary for each agent carrying a piece of data. PrivHab makes use of cryptographic techniques to make the decisions while preserving nodes' privacy. PrivHab uses a waypoint-based georouting that achieves a high performance and low overhead in rugged terrain areas that are plenty of physical obstacles. The store-carry-and-forward approach used is based on mobile agents and is designed to operate in areas that lack network infrastructure. The PrivHab protocol is compared with a set of well-known delay-tolerant routing algorithms and shown to outperform them.

  4. An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Lauritsen, Rasmus; Toft, Tomas

    2014-01-01

    Recent developments in Multi-party Computation (MPC) has resulted in very efficient protocols for dishonest majority in the preprocessing model. In particular, two very promising protocols for Boolean circuits have been proposed by Nielsen et al. (nicknamed TinyOT) and by Damg˚ard and Zakarias...... suggest a modification of MiniMac that achieves increased parallelism at no extra communication cost. This gives an asymptotic improvement of the original protocol as well as an 8-fold speed-up of our implementation. We compare the resulting protocol to TinyOT for the case of secure computation in parallel...... of a large number of AES encryptions and find that it performs better than results reported so far on TinyOT, on the same hardware.p...

  5. Standard format and content for a licensee physical security plan for the protection of special nuclear material of moderate or low strategic significance - January 1980

    International Nuclear Information System (INIS)

    Anon.

    1981-01-01

    This guide describes the information required in the physical security plan submitted as part of an application for a license to possess, use, or transport special nuclear material (SNM) of moderate strategic significance or 10 kg or more of SNM of low strategic significance and recommends a standard format for presenting the information in an orderly arrangement. This standards format will thus serve as an aid to uniformity and completeness in the preparation and review of the physical protection plan of the license application. This document can also be used as guidance by licensees possessing or transporting less than 10 kg of SNM of low strategic significance in understanding the intent and implementing the requirements of paragraphs 73.67(a), 73.67(f), and 73.67(g) of 10 CRF Part 73

  6. Waste Minimization Improvements Achieved Through Six Sigma Analysis Result In Significant Cost Savings

    International Nuclear Information System (INIS)

    Mousseau, Jeffrey D.; Jansen, John R.; Janke, David H.; Plowman, Catherine M.

    2003-01-01

    Improved waste minimization practices at the Department of Energy's (DOE) Idaho National Engineering and Environmental Laboratory (INEEL) are leading to a 15% reduction in the generation of hazardous and radioactive waste. Bechtel, BWXT Idaho, LLC (BBWI), the prime management and operations contractor at the INEEL, applied the Six Sigma improvement process to the INEEL Waste Minimization Program to review existing processes and define opportunities for improvement. Our Six Sigma analysis team: composed of an executive champion, process owner, a black belt and yellow belt, and technical and business team members used this statistical based process approach to analyze work processes and produced ten recommendations for improvement. Recommendations ranged from waste generator financial accountability for newly generated waste to enhanced employee recognition programs for waste minimization efforts. These improvements have now been implemented to reduce waste generation rates and are producing positive results

  7. The French Experience Regarding Peer Reviews to Improve the Safety and Security of Radioactive Sources

    International Nuclear Information System (INIS)

    Lachaume, J.-L.; Bélot, G.

    2015-01-01

    France has a 50 year history of control over radioactive sources. Convinced that peer reviews may be helpful to improve any regulatory system, France decided to experience a ‘full scope’ Integrated Regulatory Review Service mission in 2006 and its follow-up mission in 2009, including a review of the implementation of the Code of Conduct. The reviews, interviews and observations performed during these missions enabled the experts to have a thorough knowledge of the French system and to highlight its strengths and ways for improvements. Following these reviews, France decided to rely on its good practices, extend them as much as possible and to define, implement and address an action plan to improve its regulatory control over radioactive sources, while maintaining the prime responsibility on the operators. While good practices in the tracking of sources were maintained and slight evolutions were conducted in the safety regulations, licensing process, and inspection and enforcement actions, the major outcome of these reviews will obviously consist of the entrustment of the French Nuclear Safety Authority with the role of the regulatory authority for the security of radioactive sources and the implementation of dedicated provisions. (author)

  8. Contemporary Management of Acute Aortic Occlusion Has Evolved but Outcomes Have Not Significantly Improved.

    Science.gov (United States)

    Robinson, William P; Patel, Rupal K; Columbo, Jesse A; Flahive, Julie; Aiello, Francesco A; Baril, Donald T; Schanzer, Andres; Messina, Louis M

    2016-07-01

    hospitalization. AAO is now more commonly caused by in situ thrombosis rather than embolism. A high index of suspicion for AAO is required for prompt diagnosis and treatment, particularly when patients present with profound lower extremity neurologic deficit. In comparison with previous reports, the contemporary management of AAO includes increased use of axillobifemoral bypass and now involves endovascular revascularization, although a variety of open surgical procedures are utilized. However, the in-hospital mortality and morbidity of AAO has not decreased significantly over the last 2 decades and mid-term survival remains limited. Further study is required to identify strategies that improve outcomes after AAO. Copyright © 2016 Elsevier Inc. All rights reserved.

  9. Efficiency improvement of nuclear power plant operation: the significant role of advanced nuclear fuel technologies

    International Nuclear Information System (INIS)

    Van Velde, AA. de; Burtak, F.

    2000-01-01

    In this paper authors deals with nuclear fuel cycle and their economic aspects. At Siemens, the developments focusing on the reduction of fuel cycle costs are currently directed on .further batch average burnup increase, .improvement of fuel reliability, .enlargement of fuel operation margins, .improvement of methods for fuel design and core analysis. These items will be presented in detail in the full paper and illustrated by the global operating experience of Siemens fuel for both PWRs and BWRs. (authors)

  10. How to improve nuclear security worldwide: Three young women win IAEA essay contest

    International Nuclear Information System (INIS)

    Li, Jeremy

    2016-01-01

    Three essays that provided actionable and innovative recommendations to strengthen nuclear security through stronger border controls, closer international cooperation and public education won the IAEA’s first ever nuclear security essay contest. In preparation for the International Conference on Nuclear Security: Commitments and Actions, the IAEA invited students and young professionals to submit essays focusing on challenges and recommendations to strengthen nuclear security. A panel of experts from the IAEA and the International Nuclear Security Education Network selected three winners from among the 353 submissions received. The winners will present their papers at the conference, taking place in Vienna in December 2016

  11. How to improve nuclear security worldwide: Three young women win IAEA essay contest

    International Nuclear Information System (INIS)

    Li, Jeremy

    2016-01-01

    Three essays that provided actionable and innovative recommendations to strengthen nuclear security through stronger border controls, closer international cooperation and public education won the IAEA’s first ever nuclear security essay contest. In preparation for the International Conference on Nuclear Security: Commitments and Actions, the IAEA invited students and young professionals to submit essays focusing on challenges and recommendations to strengthen nuclear security. A panel of experts from the IAEA and the International Nuclear Security Education Network selected three winners from among the 353 submissions received. The winners will present their papers at the conference, taking place in Vienna in December 2016.

  12. Millisecond photo-thermal process on significant improvement of supercapacitor’s performance

    International Nuclear Information System (INIS)

    Wang, Kui; Wang, Jixiao; Wu, Ying; Zhao, Song; Wang, Zhi; Wang, Shichang

    2016-01-01

    Graphical abstract: A high way for charge transfer is created by a millisecond photo-thermal process which could decrease contact resistance among nanomaterials and improve the electrochemical performances. - Highlights: • Improve conductivity among nanomaterials with a millisecond photo-thermal process. • The specific capacitance can increase about 25% with an photo-thermal process. • The circle stability and rate capability can be improved above 10% with photo-thermal process. • Provide a new way that create electron path to improve electrochemical performance. - Abstract: Supercapacitors fabricated with nanomaterials usually have high specific capacitance and excellent performance. However, the small size of nanomaterials renders a considerable limitation of the contact area among nanomaterials, which is harmful to charge carrier transfer. This fact may hinder the development and application of nanomaterials in electrochemical storage systems. Here, a millisecond photo-thermal process was introduced to create a charge carries transfer path to decrease the contact resistance among nanomaterials, and enhance the electrochemical performance of supercapacitors. Polyaniline (PANI) nanowire, as a model nanomaterial, was used to modify electrodes under different photo-thermal process conditions. The modified electrodes were characterized by scanning electronic microscopy (SEM), cyclic voltammetry (CV), electrochemical impedance spectroscopy (EIS) and the results were analysed by equivalent circuit simulation. These results demonstrate that the photo-thermal process can alter the morphology of PANI nanowires, lower the charge transfer resistances and thus improve the performance of electrodes. The specific capacitance increase of the modified electrodes is about 25%. The improvement of the circle stability and rate capability are above 10%. To the best of our knowledge, this is the first attempt on research the effect of photo-thermal process on the conductivity

  13. A Review of New and Developing Technology to Significantly Improve Mars Sample-Return Missions

    Science.gov (United States)

    Carsey, F.; Brophy, J.; Gilmore, M.; Rodgers, D.; Wilcox, B.

    2000-07-01

    A JPL development activity was initiated in FY 1999 for the purpose of examining and evaluating technologies that could materially improve future (i.e., beyond the 2005 launch) Mars sample return missions. The scope of the technology review was comprehensive and end-to-end; the goal was to improve mass, cost, risk, and scientific return. A specific objective was to assess approaches to sample return with only one Earth launch. While the objective of the study was specifically for sample-return, in-situ missions can also benefit from using many of the technologies examined.

  14. Results of special security inspection on improvement of security management setup in Head Office and Tsuruga Nuclear Power Station of the Japan Atomic Power Company and improvement of facilities in Tsuruga Nuclear Power Station

    International Nuclear Information System (INIS)

    1982-01-01

    In connection with the series of accidents in the Tsuruga Nuclear Power Station, the Agency of Natural Resources and Energy had instructed JAPC to make comprehensive inspection on the security management setup and to take improvement measures in the nuclear power station. The results of the subsequent inspection by ANRE confirmed that the improvements made by JAPC are adequate, and the following items are described: improvement of security management setup - communication and reporting in emergency, the management of inspection and maintenance records, work control and supervision in repair, improvement, etc., functional authority and responsibility in maintenance management, operation management, radiation control, personnel education; improvement of facilities - feed water heaters, laundry waste-water filter room, radioactive waste treatment facility, general drainage, concentrated waste liquid storage tanks in newly-built waste treatment building, etc. (J.P.N.)

  15. [Tourism ecological security early warning of Zhangjiajie, China based on the improved TOPSIS method and the grey GM (1,1)model].

    Science.gov (United States)

    Xu, Mei; Liu, Chun la; Li, Dan; Zhong, Xiao Lin

    2017-11-01

    Tourism ecological security early warning is of great significance both to the coordination of ecological environment protection and tourism industry rapid development in tourism destination, and the sustainable and healthy development of regional social and economy. Firstly, based on the DPSIR model, the tourism ecological security early warning index system of Zhangjiajie was constructed from 5 aspects, which were driving force, pressure, state, impact and response. Then, by using the improved TOPSIS method, the tourism ecological security situation of Zhangjiajie from 2001 to 2014 was analyzed. Lastly, by using the grey GM (1,1) model, the tourism ecological security evolution trend of 2015-2020 was predicted. The results indicated that, on the whole, the close degree of Zhangjiajie's tourism ecological security showed a slightly upward trend during 2001-2014, the warning degree was the moderate warning. In terms of each subsystem, warning degree of the driving force system and the pressure system of Zhangjiajie's tourism ecological secu-rity were on the rise, which evolved from light warning to heavy warning; warning degree of the state system and the impact system had not changed so much, and had been in the moderate warning; warning degree of the response system was on the decline, which changed from huge warning to no warning during 2001-2014. According to the current development trend, the close degree of Zhangjiajie's tourism ecological security would rise further in 2015-2020, and the warning degree would turn from moderate warning into light warning, but the task of coordinating the relationship between tourism development and ecological construction and environmental protection would be still arduous.

  16. Improving the security of electricity supply - report by a rapporteur ad int

    International Nuclear Information System (INIS)

    Forsten, J.; Lehtonen, M.

    2002-07-01

    The storms 'Pyry' and 'Janika', which swept over Finland in October-November 2001, caused serious damages to the operability of electric systems and led to long-term and extensive interruptions in electricity supply especially in Pirkanmaa, Central Home, Poijat-Hame and in the Uusimaa region. Although the security of electricity supply in Finland has in general been on a high level, the needs of customers concerning the quality of electrical power are constantly growing, and the operational reliability of the distribution networks will thereby have to be developed. The Rapporteur ad int. appointed by the Ministry of Trade and Industry on 21 November 2001 considers that such a scheme complementing the price reduction under the Electricity Market Act should be set up that would require a fixed compensation from the distribution network operators in the case of non deliverance of electricity. The fixed compensation should be paid automatically for e.g. interruptions lasting over 12 hours. The sum would depend on the length of the interruption and on the customer's annual rate of the network service fee. The Rapporteur also gives a number of other recommendations for improving the situation. Each distribution network operator is to choose the means of improvement on a technical-economical basis. The required level in the design, construction, operation and maintenance of an electrical network should guarantee that the interruptions in electricity supply would not exceed six hours even in exceptional circumstances. Ensuring electrical safety is of prime importance in disturbance situations. Shortening the interruption times and improving the quality of electricity call for sustained investment planning and activities. The distribution network operators should draw up a ten-year action plan. including measures aiming to reduce interruptions and the related timetables. To be able to keep the interruption times short in extensive cases of disturbance, the distribution

  17. Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures

    Directory of Open Access Journals (Sweden)

    Xin Su

    2018-01-01

    Full Text Available Including mobile environment, conventional security mechanisms have been adapted to satisfy the needs of users. However, the device environment-IoT-based number of connected devices is quite different to the previous traditional desktop PC- or mobile-based environment. Based on the IoT, different kinds of smart and mobile devices are fully connected automatically via device controller, such as smartphone. Therefore, controller must be secure compared to conventional security mechanism. According to the existing security threats, these are quite different from the previous ones. Thus, the countermeasures applied should be changed. However, the smart device-based authentication techniques that have been proposed to date are not adequate in terms of usability and security. From the viewpoint of usability, the environment is based on mobility, and thus devices are designed and developed to enhance their owners’ efficiency. Thus, in all applications, there is a need to consider usability, even when the application is a security mechanism. Typically, mobility is emphasized over security. However, considering that the major characteristic of a device controller is deeply related to its owner’s private information, a security technique that is robust to all kinds of attacks is mandatory. In this paper, we focus on security. First, in terms of security achievement, we investigate and categorize conventional attacks and emerging issues and then analyze conventional and existing countermeasures, respectively. Finally, as countermeasure concepts, we propose several representative methods.

  18. [Security of hospital infusion practices: From an a priori risk analysis to an improvement action plan].

    Science.gov (United States)

    Pignard, J; Cosserant, S; Traore, O; Souweine, B; Sautou, V

    2016-03-01

    Infusion in care units, and all the more in intensive care units, is a complex process which can be the source of many risks for the patient. Under cover of an institutional approach for the improvement of the quality and safety of patient healthcare, a risk mapping infusion practices was performed. The analysis was focused on intravenous infusion situations in adults, the a priori risk assessment methodology was applied and a multidisciplinary work group established. Forty-three risks were identified for the infusion process (prescription, preparation and administration). The risks' assessment and the existing means of control showed that 48% of them would have a highly critical patient security impact. Recommendations were developed for 20 risks considered to be most critical, to limit their occurrence and severity, and improve their control level. An institutional action plan was developed and validated in the Drug and Sterile Medical Devices Commission. This mapping allowed the realization of an exhaustive inventory of potential risks associated with the infusion. At the end of this work, multidisciplinary groups were set up to work on different themes and regular quarterly meetings were established to follow the progress of various projects. Risk mapping will be performed in pediatric and oncology unit where the risks associated with the handling of toxic products is omnipresent. Copyright © 2015 Académie Nationale de Pharmacie. Published by Elsevier Masson SAS. All rights reserved.

  19. Reducing dysfunctional beliefs about sleep does not significantly improve insomnia in cognitive behavioral therapy.

    Science.gov (United States)

    Okajima, Isa; Nakajima, Shun; Ochi, Moeko; Inoue, Yuichi

    2014-01-01

    The present study examined to examine whether improvement of insomnia is mediated by a reduction in sleep-related dysfunctional beliefs through cognitive behavioral therapy for insomnia. In total, 64 patients with chronic insomnia received cognitive behavioral therapy for insomnia consisting of 6 biweekly individual treatment sessions of 50 minutes in length. Participants were asked to complete the Athens Insomnia Scale and the Dysfunctional Beliefs and Attitudes about Sleep scale both at the baseline and at the end of treatment. The results showed that although cognitive behavioral therapy for insomnia greatly reduced individuals' scores on both scales, the decrease in dysfunctional beliefs and attitudes about sleep with treatment did not seem to mediate improvement in insomnia. The findings suggest that sleep-related dysfunctional beliefs endorsed by patients with chronic insomnia may be attenuated by cognitive behavioral therapy for insomnia, but changes in such beliefs are not likely to play a crucial role in reducing the severity of insomnia.

  20. Reducing Dysfunctional Beliefs about Sleep Does Not Significantly Improve Insomnia in Cognitive Behavioral Therapy

    OpenAIRE

    Okajima, Isa; Nakajima, Shun; Ochi, Moeko; Inoue, Yuichi

    2014-01-01

    The present study examined to examine whether improvement of insomnia is mediated by a reduction in sleep-related dysfunctional beliefs through cognitive behavioral therapy for insomnia. In total, 64 patients with chronic insomnia received cognitive behavioral therapy for insomnia consisting of 6 biweekly individual treatment sessions of 50 minutes in length. Participants were asked to complete the Athens Insomnia Scale and the Dysfunctional Beliefs and Attitudes about Sleep scale both at the...

  1. Significant performance improvement obtained in a wireless mesh network using a beamswitching antenna

    CSIR Research Space (South Africa)

    Lysko, AA

    2012-09-01

    Full Text Available mesh network operated in a fixed 11 Mbps mode. The throughput improvement in multi-hop communication obtained in the presence of an interferer is tenfold, from 0.2 Mbps to 2 Mbps. Index Terms?antenna, smart antenna, wireless mesh network, WMN... efficiency in the communications, and active research and development of new methods and technologies enabling this at the physical layer, including multiple antenna techniques, such as multiple input multiple output (MIMO) and smart antennas...

  2. The Efficiency of Improvement of the Economic Security System of Ukraine

    Directory of Open Access Journals (Sweden)

    Klunko Nataliya S.

    2017-09-01

    Full Text Available An analysis of approaches to the formation of efficiency of ensuring economic security was carried out. The essence of economic security has been defined and its material base has been described. Threats to the economic security of Ukraine have been systematized and their structure analyzed. Both internal and external measures to prevent threats to the economic security of Ukraine have been allocated. Dynamics of the factors on which the economic security of Ukraine depends has been considered. It has been determined that the socio-economic development strategy formulated makes the country’s economic security system efficient. Two approaches to the strategic development of the Ukrainian economy have been allocated: enhancing competitiveness and integration into the international economic associations.

  3. Computer Security: Improvements Needed to Reduce Risk to Critical Federal Operations and Assets

    National Research Council Canada - National Science Library

    Dacey, Robert

    2001-01-01

    .... Accordingly, the security of these systems and data is essential to avoiding disruptions in critical operations, as well as to helping prevent data tampering, fraud, and inappropriate disclosure...

  4. Intraoperative Sensorcaine significantly improves postoperative pain management in outpatient reduction mammaplasty.

    Science.gov (United States)

    Culliford, Alfred T; Spector, Jason A; Flores, Roberto L; Louie, Otway; Choi, Mihye; Karp, Nolan S

    2007-09-15

    Breast reduction is one of the most frequently performed plastic surgical procedures in the United States; more than 160,500 patients underwent the procedure in 2005. Many outpatient reduction mammaplasty patients report the greatest postoperative discomfort in the first 48 hours. The authors' investigated the effect of intraoperative topical application of the long-acting local anesthetic agent bupivacaine (Sensorcaine or Marcaine) on postoperative pain, time to postanesthesia care unit discharge, and postoperative use of narcotic medication. In a prospective, randomized, single-blind trial, intraoperative use of Sensorcaine versus placebo (normal saline) was compared. Postoperative pain was quantified using the visual analogue scale, and time to discharge from the postanesthesia care unit was recorded. Patients documented their outpatient pain medication usage. Of the 37 patients enrolled in the study, 20 were treated with intraoperative topical Sensorcaine and 17 received placebo. Patients treated with Sensorcaine were discharged home significantly faster (2.9 hours versus 3.8 hours, p = 0.002). The control arm consistently had higher pain scores in the postanesthesia care unit (although not statistically significant) than the Sensorcaine group using the visual analogue scale system. Furthermore, patients receiving Sensorcaine required significantly less narcotic medication while recovering at home (mean, 3.5 tablets of Vicodin) than the control group (mean, 6.4 tablets; p = 0.001). There were no complications resulting from Sensorcaine usage. This prospective, randomized, single-blind study demonstrates that a single dose of intraoperative Sensorcaine provides a safe, inexpensive, and efficacious way to significantly shorten the length of postanesthesia care unit stay and significantly decrease postoperative opioid analgesic use in patients undergoing ambulatory reduction mammaplasty.

  5. Significant Improvements in Pyranometer Nighttime Offsets Using High-Flow DC Ventilation

    Energy Technology Data Exchange (ETDEWEB)

    Kutchenreiter, Mark; Michalski, J.J.; Long, C.N.; Habte, Aron

    2017-05-22

    Accurate solar radiation measurements using pyranometers are required to understand radiative impacts on the Earth's energy budget, solar energy production, and to validate radiative transfer models. Ventilators of pyranometers, which are used to keep the domes clean and dry, also affect instrument thermal offset accuracy. This poster presents a high-level overview of the ventilators for single-black-detector pyranometers and black-and-white pyranometers. For single-black-detector pyranometers with ventilators, high-flow-rate (50-CFM and higher), 12-V DC fans lower the offsets, lower the scatter, and improve the predictability of nighttime offsets compared to lower-flow-rate (35-CFM), 120-V AC fans operated in the same type of environmental setup. Black-and-white pyranometers, which are used to measure diffuse horizontal irradiance, sometimes show minor improvement with DC fan ventilation, but their offsets are always small, usually no more than 1 W/m2, whether AC- or DC-ventilated.

  6. Nitrite addition to acidified sludge significantly improves digestibility, toxic metal removal, dewaterability and pathogen reduction

    Science.gov (United States)

    Du, Fangzhou; Keller, Jürg; Yuan, Zhiguo; Batstone, Damien J.; Freguia, Stefano; Pikaar, Ilje

    2016-12-01

    Sludge management is a major issue for water utilities globally. Poor digestibility and dewaterability are the main factors determining the cost for sludge management, whereas pathogen and toxic metal concentrations limit beneficial reuse. In this study, the effects of low level nitrite addition to acidified sludge to simultaneously enhance digestibility, toxic metal removal, dewaterability and pathogen reduction were investigated. Waste activated sludge (WAS) from a full-scale waste water treatment plant was treated at pH 2 with 10 mg NO2--N/L for 5 h. Biochemical methane potential tests showed an increase in the methane production of 28%, corresponding to an improvement from 247 ± 8 L CH4/kg VS to 317 ± 1 L CH4/kg VS. The enhanced removal of toxic metals further increased the methane production by another 18% to 360 ± 6 L CH4/kg VS (a total increase of 46%). The solids content of dewatered sludge increased from 14.6 ± 1.4% in the control to 18.2 ± 0.8%. A 4-log reduction for both total coliforms and E. coli was achieved. Overall, this study highlights the potential of acidification with low level nitrite addition as an effective and simple method achieving multiple improvements in terms of sludge management.

  7. Efficiency improvement of nuclear power plant operation: the significant role of advanced nuclear fuel technologies

    International Nuclear Information System (INIS)

    Velde Van de, A.; Burtak, F.

    2001-01-01

    Due to the increased liberalisation of the power markets, nuclear power generation is being exposed to high cost reduction pressure. In this paper we highlight the role of advanced nuclear fuel technologies to reduce the fuel cycle costs and therefore increase the efficiency of nuclear power plant operation. The key factor is a more efficient utilisation of the fuel and present developments at Siemens are consequently directed at (i) further increase of batch average burnup, (ii) improvement of fuel reliability, (iii) enlargement of fuel operation margins and (iv) improvement of methods for fuel design and core analysis. As a result, the nuclear fuel cycle costs for a typical LWR have been reduced during the past decades by about US$ 35 million per year. The estimated impact of further burnup increases on the fuel cycle costs is expected to be an additional saving of US$10 - 15 million per year. Due to the fact that the fuel will operate closer to design limits, a careful approach is required when introducing advanced fuel features in reload quantities. Trust and co-operation between the fuel vendors and the utilities is a prerequisite for the common success. (authors)

  8. Significant improvement of mouse cloning technique by treatment with trichostatin A after somatic nuclear transfer

    International Nuclear Information System (INIS)

    Kishigami, Satoshi; Mizutani, Eiji; Ohta, Hiroshi; Hikichi, Takafusa; Thuan, Nguyen Van; Wakayama, Sayaka; Bui, Hong-Thuy; Wakayama, Teruhiko

    2006-01-01

    The low success rate of animal cloning by somatic cell nuclear transfer (SCNT) is believed to be associated with epigenetic errors including abnormal DNA hypermethylation. Recently, we elucidated by using round spermatids that, after nuclear transfer, treatment of zygotes with trichostatin A (TSA), an inhibitor of histone deacetylase, can remarkably reduce abnormal DNA hypermethylation depending on the origins of transferred nuclei and their genomic regions [S. Kishigami, N. Van Thuan, T. Hikichi, H. Ohta, S. Wakayama. E. Mizutani, T. Wakayama, Epigenetic abnormalities of the mouse paternal zygotic genome associated with microinsemination of round spermatids, Dev. Biol. (2005) in press]. Here, we found that 5-50 nM TSA-treatment for 10 h following oocyte activation resulted in more efficient in vitro development of somatic cloned embryos to the blastocyst stage from 2- to 5-fold depending on the donor cells including tail tip cells, spleen cells, neural stem cells, and cumulus cells. This TSA-treatment also led to more than 5-fold increase in success rate of mouse cloning from cumulus cells without obvious abnormality but failed to improve ES cloning success. Further, we succeeded in establishment of nuclear transfer-embryonic stem (NT-ES) cells from TSA-treated cloned blastocyst at a rate three times higher than those from untreated cloned blastocysts. Thus, our data indicate that TSA-treatment after SCNT in mice can dramatically improve the practical application of current cloning techniques

  9. The Improvement of Screening the Significant Factors of Oil Blends as Bio lubricant Base Stock

    International Nuclear Information System (INIS)

    Noor Hajarul Ashikin Shamsuddin; Rozaini Abdullah; Zainab Hamzah; Siti Jamilah Hanim Mohd Yusof

    2015-01-01

    A new formulation bio lubricant base stock was developed by blending of waste cooking oil (WCO) with Jatropha curcas oil (JCO). The objective of this research is to evaluate significant factors contributing to the production of oil blends for bio lubricant application. The significant factors used in this study were oil ratio (WCO:JCO), agitation times (min) and agitation speed (rpm). The blended oil bio based lubricant was used to determine the saponification, acid, peroxide and iodine values. The experimental design used in this study was the 2 level-factorial design. In this experiment, it was found that the effect of oil ratio and interaction of oil ratio and agitation speed gave the most significant effect in oil blends as bio lubricant base stock. The highest ratio of oil blend 80 %:20 % WCO:JCO, with low agitation speed of 300 rpm and low agitation time of 30 minutes gave the optimum results. The acid, saponification, peroxide and iodine values obtained were 0.517±0.08 mg KOH/ g, 126.23±1.62 mg/ g, 7.5±2.0 m eq/ kg and 50.42±2.85 mg/ g respectively. A higher ratio of waste cooking oil blends was found to be favourable as bio lubricant base stock. (author)

  10. EASE-Grid 2.0: Incremental but Significant Improvements for Earth-Gridded Data Sets

    Directory of Open Access Journals (Sweden)

    Matthew H. Savoie

    2012-03-01

    Full Text Available Defined in the early 1990s for use with gridded satellite passive microwave data, the Equal-Area Scalable Earth Grid (EASE-Grid was quickly adopted and used for distribution of a variety of satellite and in situ data sets. Conceptually easy to understand, EASE-Grid suffers from limitations that make it impossible to format in the widely popular GeoTIFF convention without reprojection. Importing EASE-Grid data into standard mapping software packages is nontrivial and error-prone. This article defines a standard for an improved EASE-Grid 2.0 definition, addressing how the changes rectify issues with the original grid definition. Data distributed using the EASE-Grid 2.0 standard will be easier for users to import into standard software packages and will minimize common reprojection errors that users had encountered with the original EASE-Grid definition.

  11. An approach to improve the match-on-card fingerprint authentication system security

    CSIR Research Space (South Africa)

    Nair, Kishor Krishnan

    2016-07-01

    Full Text Available -on-Card (TOC), Match-on- Card (MOC), Work-Sharing On-Card (WSOC), and System-on-Card (SOC). Out of these four approaches, the SOC is considered as the most secure and expensive, whereas the TOC is considered as the least secure and least expensive. The MOC...

  12. An Approach to Improve the Match-on-Card ngerprint Authentication System Security

    CSIR Research Space (South Africa)

    Nair, Kishor Krishnan

    2016-08-18

    Full Text Available -on-Card (TOC), Match-on-Card (MOC), Work-Sharing On-Card (WSOC), and System-on-Card (SOC). Out of these four approaches, the SOC is considered as the most secure and expensive, whereas the TOC is considered as the least secure and least expensive. The MOC...

  13. Automated Information Security Will Not Improve until Effectively Supported by IRM.

    Science.gov (United States)

    Chick, Morey J.

    1989-01-01

    The first of two articles on the nature of the growing problem of automated information systems security, especially in the federal government, this article presents a brief history of the problem and describes the need for integrating security activities into overall policies and programs to help reduce system vulnerabilities and risks. (23…

  14. Integrating Visual Mnemonics and Input Feedback With Passphrases to Improve the Usability and Security of Digital Authentication.

    Science.gov (United States)

    Juang, Kevin; Greenstein, Joel

    2018-04-01

    We developed a new authentication system based on passphrases instead of passwords. Our new system incorporates a user-generated mnemonic picture displayed during login, definition tooltips, error correction to reduce typographical errors, a decoy-based input masking technique, and random passphrase generation using either a specialized wordlist or a sentence template. Passphrases exhibit a greater level of security than traditional passwords, but their wider adoption has been hindered by human factors issues. Our assertion is that the added features of our system work particularly well with passphrases and help address these shortcomings. We conducted a study to evaluate our new system with a customized 1,450-word list and our new system with a 6-word sentence structure against the control conditions of a user-created passphrase of at least 24 characters and a system-generated passphrase using a 10,326-word list. Fifty participants completed two sessions so that we could measure the usability and security of the authentication schemes. With the new system conditions, memorability was improved, and security was equivalent to or better than the control conditions. Usability and overall ratings also favored the new system conditions over the control conditions. Our research presents a new authentication system using innovative techniques that improve on the usability and security of existing password and passphrase authentication systems. In computer security, drastic changes should never happen overnight, but we recommend that our contributions be incorporated into current authentication systems to help facilitate a transition from passwords to usable passphrases.

  15. Spectroelectrochemistry as a Strategy for Improving Selectivity of Sensors for Security and Defense Applications

    Energy Technology Data Exchange (ETDEWEB)

    Heineman, William R.; Seliskar, Carl J.; Morris, Laura K.; Bryan, Samuel A.

    2012-12-19

    Spectroelectrochemistry provides improved selectivity for sensors by electrochemically modulating the optical signal associated with the analyte. The sensor consists of an optically transparent electrode (OTE) coated with a film that preconcentrates the target analyte. The OTE functions as an optical waveguide for attenuated total reflectance (ATR) spectroscopy, which detects the analyte by absorption. Alternatively, the OTE can serve as the excitation light for fluorescence detection, which is generally more sensitive than absorption. The analyte partitions into the film, undergoes an electrochemical redox reaction at the OTE surface, and absorbs or emits light in its oxidized or reduced state. The change in the optical response associated with electrochemical oxidation or reduction at the OTE is used to quantify the analyte. Absorption sensors for metal ion complexes such as [Fe(CN)6]4- and [Ru(bpy)3]2+ and fluorescence sensors for [Ru(bpy)3]2+ and the polycyclic aromatic hydrocarbon 1-hydroxypyrene have been developed. The sensor concept has been extended to binding assays for a protein using avidin–biotin and 17β-estradiol–anti-estradiol antibodies. The sensor has been demonstrated to measure metal complexes in complex samples such as nuclear waste and natural water. This sensor has qualities needed for security and defense applications that require a high level of selectivity and good detection limits for target analytes in complex samples. Quickly monitoring and designating intent of a nuclear program by measuring the Ru/Tc fission product ratio is such an application.

  16. Do low-cost ceramic water filters improve water security in rural South Africa?

    Science.gov (United States)

    Lange, Jens; Materne, Tineke; Grüner, Jörg

    2016-10-01

    This study examined the performance of a low-cost ceramic candle filter system (CCFS) for point of use (POU) drinking water treatment in the village of Hobeni, Eastern Cape Province, South Africa. CCFSs were distributed in Hobeni and a survey was carried out among their users. The performance of 51 CCFSs was evaluated by dip slides and related to human factors. Already after two-thirds of their specified lifetime, none of the distributed CCFSs produced water without distinct contamination, and more than one-third even deteriorated in hygienic water quality. Besides the water source (springs were preferable compared to river or rain water), a high water throughput was the dominant reason for poor CCFS performance. A stepwise laboratory test documented the negative effects of repeated loading and ambient field temperatures. These findings suggest that not every CCFS type per se guarantees improved drinking water security and that the efficiency of low-cost systems should continuously be monitored. For this purpose, dip slides were found to be a cost-efficient alternative to standard laboratory tests. They consistently underestimated microbial counts but can be used by laypersons and hence by the users themselves to assess critical contamination of their filter systems.

  17. A patient/family-centered strategic plan can drive significant improvement.

    Science.gov (United States)

    Brilli, Richard J; Crandall, Wallace V; Berry, Janet C; Stoverock, Linda; Rosen, Kerry; Budin, Lee; Kelleher, Kelly J; Gleeson, Sean P; Davis, J Terrance

    2014-08-01

    The use of a PFCSP, as a road map to operationalize the hospital's vision, has been a compelling paradigm to achieve significant QI results. The framework is simple yet directly aligns with the IOM domains of quality. It has inspired and helped actively engage hospital personnel in the work required to achieve the goals and vision of the hospital system. Five years after initiating this type of plan, activity is flourishing in each of the domains and midterm results are substantial. We think that the nature of this strategic plan has been an important aspect of our success to date.

  18. An integrated PRA module for fast determination of risk significance and improvement effectiveness

    International Nuclear Information System (INIS)

    Chao, Chun-Chang; Lin, Jyh-Der

    2004-01-01

    With the widely use of PRA technology in risk-informed applications, to predict the changes of CDF and LERF becomes a standard process for risk-informed applications. This paper describes an integrated PRA module prepared for risk-informed applications. The module contains a super risk engine, a super fault tree engine, an advanced PRA model and a tool for data base maintenance. The individual element of the module also works well for purpose other than risk-informed applications. The module has been verified and validated through a series of scrupulous benchmark tests with similar software. The results of the benchmark tests showed that the module has remarkable accuracy and speed even for an extremely large-size top-logic fault tree as well as for the case in which large amount of MCSs may be generated. The risk monitor for nuclear power plants in Taiwan is the first application to adopt the module. The results predicted by the risk monitor are now accepted by the regulatory agency. A tool to determine the risk significance according to the inspection findings will be the next application to adopt the module in the near future. This tool classified the risk significance into four different color codes according to the level of increase on CDF. Experience of application showed that the flexibility, the accuracy and speed of the module make it useful in any risk-informed applications when risk indexes must be determined by resolving a PRA model. (author)

  19. Inulin significantly improves serum magnesium levels in proton pump inhibitor-induced hypomagnesaemia.

    Science.gov (United States)

    Hess, M W; de Baaij, J H F; Broekman, M; Bisseling, T M; Haarhuis, B; Tan, A; Te Morsche, R; Hoenderop, J G J; Bindels, R J M; Drenth, J P H

    2016-06-01

    Proton pump inhibitors (PPI) are among the most widely prescribed drugs to treat gastric acid-related disorders. PPI-induced hypomagnesaemia, a defect in intestinal absorption of Mg(2+) , can be a severe side effect of chronic PPI use. To restore serum Mg(2+) concentrations in PPI-induced hypomagnesaemia patients by dietary supplementation with inulin fibres. Eleven patients with PPI-induced hypomagnesaemia and 10 controls were treated with inulin (20 g/day). Each trial consisted of two cycles of 14-day inulin treatment followed by a washout period of 14 days. Patients continued to use their PPI. Serum Mg(2+) levels served as the primary endpoint. Inulin significantly enhanced serum Mg(2+) levels from 0.60 to 0.68 mmol/L in PPI-induced hypomagnesaemia patients, and from 0.84 to 0.93 mmol/L in controls. As a consequence 24 h urinary Mg(2+) excretion was significantly increased in patients with PPI-induced hypomagnesaemia (0.3-2.2 mmol/day). Symptoms related to hypomagnesaemia, including muscle cramps and paraesthesia, were reduced during intervention with inulin. Inulin increases serum Mg(2+) concentrations under PPI maintenance in patients with PPI-induced hypomagnesaemia. © 2016 John Wiley & Sons Ltd.

  20. Progressive degradation of alloy 690 and the development of a significant improvement in alloy 800CR

    International Nuclear Information System (INIS)

    Staehle, Roger W.; Arioka, Koji; Tapping, Robert

    2015-01-01

    The present most widely used alloys for tubing in steam generators and structural materials in water cooled reactors are Alloy 690 and Alloy 800. However, both alloys, while improved over Alloy 600 may not meet the needs of longer range applications in the range of 80-100 years. Alloy 690 sustains damage resulting from the formation of cavities at grain boundaries which eventually cover about 50% of the area of the grain boundaries with the remainder covering being covered with carbides. The cavities seem to nucleate on the carbides leaving the grain boundaries a structure of cavities and carbides. Such a structure will lead the Alloy 690 to fail completely. Normal Alloy 800 does not produce such cavities and probably retains a large amount of its corrosion resistance but does sustain progressive SCC at low rate. A new alloy, 800CR, has been developed in a collaboration among Arioka, Tapping, and Staehle. This alloy is based on a Cr composition of 23.5-27% with the remainder retaining the previous Alloy 800 composition. 800CR sustains a crack velocity about 100 times less than Alloy 690 and a negligible rate of initiation. The 800CR, alloy is now seeking a patent. (authors)

  1. Significant improvements of electrical discharge machining performance by step-by-step updated adaptive control laws

    Science.gov (United States)

    Zhou, Ming; Wu, Jianyang; Xu, Xiaoyi; Mu, Xin; Dou, Yunping

    2018-02-01

    In order to obtain improved electrical discharge machining (EDM) performance, we have dedicated more than a decade to correcting one essential EDM defect, the weak stability of the machining, by developing adaptive control systems. The instabilities of machining are mainly caused by complicated disturbances in discharging. To counteract the effects from the disturbances on machining, we theoretically developed three control laws from minimum variance (MV) control law to minimum variance and pole placements coupled (MVPPC) control law and then to a two-step-ahead prediction (TP) control law. Based on real-time estimation of EDM process model parameters and measured ratio of arcing pulses which is also called gap state, electrode discharging cycle was directly and adaptively tuned so that a stable machining could be achieved. To this end, we not only theoretically provide three proved control laws for a developed EDM adaptive control system, but also practically proved the TP control law to be the best in dealing with machining instability and machining efficiency though the MVPPC control law provided much better EDM performance than the MV control law. It was also shown that the TP control law also provided a burn free machining.

  2. Strategies to enable the adoption of animal biotechnology to sustainably improve global food safety and security.

    Science.gov (United States)

    Tizard, Mark; Hallerman, Eric; Fahrenkrug, Scott; Newell-McGloughlin, Martina; Gibson, John; de Loos, Frans; Wagner, Stefan; Laible, Götz; Han, Jae Yong; D'Occhio, Michael; Kelly, Lisa; Lowenthal, John; Gobius, Kari; Silva, Primal; Cooper, Caitlin; Doran, Tim

    2016-10-01

    The ability to generate transgenic animals has existed for over 30 years, and from those early days many predicted that the technology would have beneficial applications in agriculture. Numerous transgenic agricultural animals now exist, however to date only one product from a transgenic animal has been approved for the food chain, due in part to cumbersome regulations. Recently, new techniques such as precision breeding have emerged, which enables the introduction of desired traits without the use of transgenes. The rapidly growing human population, environmental degradation, and concerns related to zoonotic and pandemic diseases have increased pressure on the animal agriculture sector to provide a safe, secure and sustainable food supply. There is a clear need to adopt transgenic technologies as well as new methods such as gene editing and precision breeding to meet these challenges and the rising demand for animal products. To achieve this goal, cooperation, education, and communication between multiple stakeholders-including scientists, industry, farmers, governments, trade organizations, NGOs and the public-is necessary. This report is the culmination of concepts first discussed at an OECD sponsored conference and aims to identify the main barriers to the adoption of animal biotechnology, tactics for navigating those barriers, strategies to improve public perception and trust, as well as industry engagement, and actions for governments and trade organizations including the OECD to harmonize regulations and trade agreements. Specifically, the report focuses on animal biotechnologies that are intended to improve breeding and genetics and currently are not routinely used in commercial animal agriculture. We put forward recommendations on how scientists, regulators, and trade organizations can work together to ensure that the potential benefits of animal biotechnology can be realized to meet the future needs of agriculture to feed the world.

  3. Multi-energy x-ray detectors to improve air-cargo security

    Science.gov (United States)

    Paulus, Caroline; Moulin, Vincent; Perion, Didier; Radisson, Patrick; Verger, Loïck

    2017-05-01

    X-ray based systems have been used for decades to screen luggage or cargo to detect illicit material. The advent of energy-sensitive photon-counting x-ray detectors mainly based on Cd(Zn)Te semi-conductor technology enables to improve discrimination between materials compared to single or dual energy technology. The presented work is part of the EUROSKY European project to develop a Single European Secure Air-Cargo Space. "Cargo" context implies the presence of relatively heavy objects and with potentially high atomic number. All the study is conducted on simulations with three different detectors: a typical dual energy sandwich detector, a realistic model of the commercial ME100 multi-energy detector marketed by MULTIX, and a ME100 "Cargo": a not yet existing modified multi-energy version of the ME100 more suited to air freight cargo inspection. Firstly, a comparison on simulated measurements shows the performances improvement of the new multi-energy detectors compared to the current dual-energy one. The relative performances are evaluated according to different criteria of separability or contrast-to-noise ratio and the impact of different parameters is studied (influence of channel number, type of materials and tube voltage). Secondly, performances of multi-energy detectors for overlaps processing in a dual-view system is accessed: the case of orthogonal projections has been studied, one giving dimensional values, the other one providing spectral data to assess effective atomic number. A method of overlap correction has been proposed and extended to multi-layer objects case. Therefore, Calibration and processing based on bi-material decomposition have been adapted for this purpose.

  4. Overview of security culture

    International Nuclear Information System (INIS)

    Matulanya, M. A.

    2014-04-01

    Nuclear Security culture concept has been aggressively promoted over the past several years as a tool to improve the physical protection of the nuclear and radioactive materials due to growing threats of catastrophic terrorism and other new security challenges. It is obvious that, the scope of nuclear security and the associated cultures need to be extended beyond the traditional task of protecting weapons-usable materials. The role of IAEA is to strengthen the nuclear security framework globally and in leading the coordination of international activities in this field. Therefore all governments should work closely with the IAEA to take stronger measures to ensure the physical protection, the safety and security of the nuclear and radioactive materials. In the effort to reflect this new realities and concerns, the IAEA in 2008 came up with the document, the Nuclear Security Culture, Nuclear Security Series No. 7, Implementing Guide to the member states which urged every member state to take appropriate measures to promote security culture with respect to nuclear and radioactive materials. The document depicted this cultural approach as the way to protect individual, society and the environment. Among other things, the document defined nuclear security culture as characteristics and attitudes in organizations and of individuals which establishes that, nuclear security issues receives attention warranted by their significance. (au)

  5. Significant improvement of pig cloning efficiency by treatment with LBH589 after somatic cell nuclear transfer.

    Science.gov (United States)

    Jin, Jun-Xue; Li, Suo; Gao, Qing-Shan; Hong, Yu; Jin, Long; Zhu, Hai-Ying; Yan, Chang-Guo; Kang, Jin-Dan; Yin, Xi-Jun

    2013-10-01

    The low success rate of animal cloning by somatic cell nuclear transfer (SCNT) associates with epigenetic aberrancy, including the abnormal acetylation of histones. Altering the epigenetic status by histone deacetylase inhibitors (HDACi) enhances the developmental potential of SCNT embryos. In the current study, we examined the effects of LBH589 (panobinostat), a novel broad-spectrum HDACi, on the nuclear reprogramming and development of pig SCNT embryos in vitro. In experiment 1, we compared the in vitro developmental competence of nuclear transfer embryos treated with different concentrations of LBH589. Embryos treated with 50 nM LBH589 for 24 hours showed a significant increase in the rate of blastocyst formation compared with the control or embryos treated with 5 or 500 nM LBH589 (32.4% vs. 11.8%, 12.1%, and 10.0%, respectively, P < 0.05). In experiment 2, we examined the in vitro developmental competence of nuclear transfer embryos treated with 50 nM LBH589 for various intervals after activation and 6-dimethylaminopurine. Embryos treated for 24 hours had higher rates of blastocyst formation than the other groups. In experiment 3, when the acetylation of H4K12 was examined in SCNT embryos treated for 6 hours with 50 nM LBH589 by immunohistochemistry, the staining intensities of these proteins in LBH589-treated SCNT embryos were significantly higher than in the control. In experiment 4, LBH589-treated nuclear transfer and control embryos were transferred into surrogate mothers, resulting in three (100%) and two (66.7%) pregnancies, respectively. In conclusion, LBH589 enhances the nuclear reprogramming and developmental potential of SCNT embryos by altering the epigenetic status and expression, and increasing blastocyst quality. Crown Copyright © 2013. Published by Elsevier Inc. All rights reserved.

  6. The implementation of nuclear security program and the improvement of physical protection in Indonesia: progress and challenges

    International Nuclear Information System (INIS)

    Khairul

    2009-01-01

    Full text: Non Proliferation of Nuclear Weapon Treaty (NPT), and the comprehensive safeguards agreements regime on IAEA model INFCIRC/153 Corr., nuclear safeguards systems have been operated for over three decades. Indonesia ratified the NPT agreement by Act No. 8 Year 1979. The government of the Republic of Indonesia is committed to general contribution in achieving a condition of safe, secure and peace the world in relation of nuclear energy utilization and to continue its strong support for the principles of the treaty. At that time Indonesian nuclear program was not as big as present programs. By time changes, the utilization of nuclear energy for peaceful purposes was significantly increasing based on the world's nuclear research and technology development. Nowadays, Indonesia has three research reactors and other nuclear installations for research activities. The first nuclear power plant is planned will operating on year 2016. National Nuclear Energy Agency (BATAN) as promoting body in Indonesia has several reactor research centers. They are located at different province such as Bandung nuclear research center, Yogyakarta nuclear research center and Serpong nuclear research center. As the research and development institution belongs to government BATAN has also develop research by using radioactive substances for peaceful purpose. At three reactor research center are used nuclear materials with different nuclear category. The biggest research reactor in Indonesia is located in national center for science and technology development or called PUSPIPTEK, Serpong district, Province of Banten. In Serpong nuclear research center comprise several nuclear installation such as research reactor G.A. Siwabessy (30 Mw thermal), fuel element production installation, experimental fuel element installation, radio metallurgy installation, radioisotopes installation, radioactive waste installation. The Serpong whole area is wide approximately 24 ha and including supporting

  7. Silver chlorobromide nanocubes with significantly improved uniformity: synthesis and assembly into photonic crystals

    Energy Technology Data Exchange (ETDEWEB)

    Li, Zheng; Okasinski, John S.; Gosztola, David J.; Ren, Yang; Sun, Yugang

    2015-01-01

    Silver chlorobromide (AgClxBr1-x, 0 < x < 1) nanocubes with a highly uniform size, morphology, and crystallinity have been successfully synthesized through a co-precipitation of Ag+ ions with both Cl- and Br- ions in ethylene glycol containing polyvinyl pyrrolidone at mild temperatures. Compositions of the synthesized nanocubes can be easily tuned by controlling the molar ratio of Cl- to Br- ions in the reaction solutions. The size of the nanocubes is determined by varying a number of parameters including the molar ratio of Cl- to Br- ions, injection rate of Ag+ ions, and reaction temperature. The real-time formation of colloidal AgClxBr1-x nanocubes has been monitored, for the first time, by in situ highenergy synchrotron X-ray diffraction. The time-resolved results reveal that a fast injection rate of Ag+ ions is critical for the formation of AgClxBr1-x nanocubes with a highly pure face-centered cubic crystalline phase. The improved uniformity of the AgClxBr1-x nanocubes is beneficial for assembling them into order superlattices (e.g., photonic crystals) even by simply applying centrifugation forces. The stop band of the resulting photonic crystals can be easily tuned from the ultraviolet to the infrared region by using AgClxBr1-x nanocubes with different sizes. The variation of the dielectric constant of AgClxBr1-x associated with the change of the relative concentration of halide ions provides an additional knob to tune the optical properties of photonic crystals.

  8. The Strasbourg Large Refractor and Dome: Significant Improvements and Failed Attempts

    Science.gov (United States)

    Heck, Andre

    2009-01-01

    Founded by the German Empire in the late 19th century, Strasbourg Astronomical Observatory featured several novelties from the start. According to Mueller (1978), the separation of observing buildings from the study area and from the astronomers' residence was a revolution in observatory construction. The instruments were, as much as possible, isolated from the vibrations of the buildings themselves. "Gas flames" and water were used to reduce temperature effects. Thus the Large Dome (ca 11m diameter), housing the Large Refractor (ca 49cm, then the largest in Germany) and covered by zinc over wood, could be cooled down by water running from the top. Reports (including by the French who took over the observatory after World War I) are however somehow nonexistent on the effective usage and actual efficiency of such a system (which must have generated locally a significant amount of humidity). The paper will detail these technical attempts as well as the specificities of the instruments installed in that new observatory intended as a showcase of German astronomy.

  9. Single-atom catalysts for CO2 electroreduction with significant activity and selectivity improvements.

    Science.gov (United States)

    Back, Seoin; Lim, Juhyung; Kim, Na-Young; Kim, Yong-Hyun; Jung, Yousung

    2017-02-01

    A single-atom catalyst (SAC) has an electronic structure that is very different from its bulk counterparts, and has shown an unexpectedly high specific activity with a significant reduction in noble metal usage for CO oxidation, fuel cell and hydrogen evolution applications, although physical origins of such performance enhancements are still poorly understood. Herein, by means of density functional theory (DFT) calculations, we for the first time investigate the great potential of single atom catalysts for CO 2 electroreduction applications. In particular, we study a single transition metal atom anchored on defective graphene with single or double vacancies, denoted M@sv-Gr or M@dv-Gr, where M = Ag, Au, Co, Cu, Fe, Ir, Ni, Os, Pd, Pt, Rh or Ru, as a CO 2 reduction catalyst. Many SACs are indeed shown to be highly selective for the CO 2 reduction reaction over a competitive H 2 evolution reaction due to favorable adsorption of carboxyl (*COOH) or formate (*OCHO) over hydrogen (*H) on the catalysts. On the basis of free energy profiles, we identified several promising candidate materials for different products; Ni@dv-Gr (limiting potential U L = -0.41 V) and Pt@dv-Gr (-0.27 V) for CH 3 OH production, and Os@dv-Gr (-0.52 V) and Ru@dv-Gr (-0.52 V) for CH 4 production. In particular, the Pt@dv-Gr catalyst shows remarkable reduction in the limiting potential for CH 3 OH production compared to any existing catalysts, synthesized or predicted. To understand the origin of the activity enhancement of SACs, we find that the lack of an atomic ensemble for adsorbate binding and the unique electronic structure of the single atom catalysts as well as orbital interaction play an important role, contributing to binding energies of SACs that deviate considerably from the conventional scaling relation of bulk transition metals.

  10. Factors Related to Significant Improvement of Estimated Glomerular Filtration Rates in Chronic Hepatitis B Patients Receiving Telbivudine Therapy

    Directory of Open Access Journals (Sweden)

    Te-Fu Lin

    2017-01-01

    Full Text Available Background and Aim. The improvement of estimated glomerular filtration rates (eGFRs in chronic hepatitis B (CHB patients receiving telbivudine therapy is well known. The aim of this study was to clarify the kinetics of eGFRs and to identify the significant factors related to the improvement of eGFRs in telbivudine-treated CHB patients in a real-world setting. Methods. Serial eGFRs were calculated every 3 months using the Chronic Kidney Disease Epidemiology Collaboration (CKD-EPI equation. The patients were classified as CKD-1, -2, or -3 according to a baseline eGFR of ≥90, 60–89, or <60 mL/min/1.73 m2, respectively. A significant improvement of eGFR was defined as a more than 10% increase from the baseline. Results. A total of 129 patients were enrolled, of whom 36% had significantly improved eGFRs. According to a multivariate analysis, diabetes mellitus (DM (p=0.028 and CKD-3 (p=0.043 were both significantly related to such improvement. The rates of significant improvement of eGFR were about 73% and 77% in patients with DM and CKD-3, respectively. Conclusions. Telbivudine is an alternative drug of choice for the treatment of hepatitis B patients for whom renal safety is a concern, especially patients with DM and CKD-3.

  11. Nuclear Forensics and Attribution for Improved Energy Security: The Use of Taggants in Nuclear Fuel

    International Nuclear Information System (INIS)

    Kristo, M J; Robel, M; Hutcheon, I D

    2007-01-01

    The Global Nuclear Energy Partnership (GNEP), recently announced by DOE Secretary Bodman, poses significant new challenges with regard to securing, safeguarding, monitoring and tracking nuclear materials. In order to reduce the risk of nuclear proliferation, new technologies must be developed to reduce the risk that nuclear material can be diverted from its intended use. Regardless of the specific nature of the fuel cycle, nuclear forensics and attribution will play key roles to ensure the effectiveness of nonproliferation controls and to deter the likelihood of illicit activities. As the leader of the DHS nuclear and radiological pre-detonation attribution program, LLNL is uniquely positioned to play a national leadership role in this effort. Ensuring that individuals or organizations engaged in illicit trafficking are rapidly identified and apprehended following theft or diversion of nuclear material provides a strong deterrent against unlawful activities. Key to establishing this deterrent is developing the ability to rapidly and accurately determine the identity, source and prior use history of any interdicted nuclear material. Taggants offer one potentially effective means for positively identifying lost or stolen nuclear fuels. Taggants are materials that can be encoded with a unique signature and introduced into nuclear fuel during fuel fabrication. During a nuclear forensics investigation, the taggant signature can be recovered and the nuclear material identified through comparison with information stored in an appropriate database. Unlike serial numbers or barcodes, microtaggants can provide positive identification with only partial recovery, providing extreme resistance to any attempt to delete or alter them

  12. Improved Formulations for Air-Surface Exchanges Related to National Security Needs: Dry Deposition Models

    Energy Technology Data Exchange (ETDEWEB)

    Droppo, James G.

    2006-07-01

    The Department of Homeland Security and others rely on results from atmospheric dispersion models for threat evaluation, event management, and post-event analyses. The ability to simulate dry deposition rates is a crucial part of our emergency preparedness capabilities. Deposited materials pose potential hazards from radioactive shine, inhalation, and ingestion pathways. A reliable characterization of these potential exposures is critical for management and mitigation of these hazards. A review of the current status of dry deposition formulations used in these atmospheric dispersion models was conducted. The formulations for dry deposition of particulate materials from am event such as a radiological attack involving a Radiological Detonation Device (RDD) is considered. The results of this effort are applicable to current emergency preparedness capabilities such as are deployed in the Interagency Modeling and Atmospheric Assessment Center (IMAAC), other similar national/regional emergency response systems, and standalone emergency response models. The review concludes that dry deposition formulations need to consider the full range of particle sizes including: 1) the accumulation mode range (0.1 to 1 micron diameter) and its minimum in deposition velocity, 2) smaller particles (less than .01 micron diameter) deposited mainly by molecular diffusion, 3) 10 to 50 micron diameter particles deposited mainly by impaction and gravitational settling, and 4) larger particles (greater than 100 micron diameter) deposited mainly by gravitational settling. The effects of the local turbulence intensity, particle characteristics, and surface element properties must also be addressed in the formulations. Specific areas for improvements in the dry deposition formulations are 1) capability of simulating near-field dry deposition patterns, 2) capability of addressing the full range of potential particle properties, 3) incorporation of particle surface retention/rebound processes, and

  13. Omega-3 fatty acid therapy dose-dependently and significantly decreased triglycerides and improved flow-mediated dilation, however, did not significantly improve insulin sensitivity in patients with hypertriglyceridemia.

    Science.gov (United States)

    Oh, Pyung Chun; Koh, Kwang Kon; Sakuma, Ichiro; Lim, Soo; Lee, Yonghee; Lee, Seungik; Lee, Kyounghoon; Han, Seung Hwan; Shin, Eak Kyun

    2014-10-20

    Experimental studies demonstrate that higher intake of omega-3 fatty acids (n-3 FA) improves insulin sensitivity, however, we reported that n-3 FA 2g therapy, most commonly used dosage did not significantly improve insulin sensitivity despite reducing triglycerides by 21% in patients. Therefore, we investigated the effects of different dosages of n-3 FA in patients with hypertriglyceridemia. This was a randomized, single-blind, placebo-controlled, parallel study. Age, sex, and body mass index were matched among groups. All patients were recommended to maintain a low fat diet. Forty-four patients (about 18 had metabolic syndrome/type 2 diabetes mellitus) in each group were given placebo, n-3 FA 1 (O1), 2 (O2), or 4 g (O4), respectively daily for 2 months. n-3 FA therapy dose-dependently and significantly decreased triglycerides and triglycerides/HDL cholesterol and improved flow-mediated dilation, compared with placebo (by ANOVA). However, each n-3 FA therapy did not significantly decrease high-sensitivity C-reactive protein and fibrinogen, compared with placebo. O1 significantly increased insulin levels and decreased insulin sensitivity (determined by QUICKI) and O2 significantly decreased plasma adiponectin levels relative to baseline measurements. Of note, when compared with placebo, each n-3 FA therapy did not significantly change insulin, glucose, adiponectin, glycated hemoglobin levels and insulin sensitivity (by ANOVA). We observed similar results in a subgroup of patients with the metabolic syndrome. n-3 FA therapy dose-dependently and significantly decreased triglycerides and improved flow-mediated dilation. Nonetheless, n-3 FA therapy did not significantly improve acute-phase reactants and insulin sensitivity in patients with hypertriglyceridemia, regardless of dosages. Copyright © 2014. Published by Elsevier Ireland Ltd.

  14. Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks.

    Science.gov (United States)

    Kim, Jiye; Lee, Donghoon; Jeon, Woongryul; Lee, Youngsook; Won, Dongho

    2014-04-09

    User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker's own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes.

  15. The Global Trends in the Alternative Energetics and Improvement of the State Policy in the Sphere of Fiscal Security: in Search for Equilibrium and Markets

    Directory of Open Access Journals (Sweden)

    Hnedina Kateryna V.

    2017-12-01

    Full Text Available Alternative energetics is an important component of the competitiveness and security of the national economy. Its rapid development over the past 10 years is caused by both the attempts of individual countries to maintain and strengthen their competitive advantage in the world markets and the efforts of international organizations (UN, IRENA, IEA to consolidate different stakeholders to achieve energy and fiscal security, protection of environment and improvement of climate conditions. The article is aimed at generalizing global trends in alternative energetics in the context of development of the State policy in the sphere of fiscal security. A brief overview of the latest trends in the alternative energetics development, most of which focus on identifying the basic sectoral trends, has been provided. However, the issues of fiscal security in the energy sector remain poorly researched, especially in terms of formation of the State policy, consolidating interests of different groups of stakeholders. It has been determined that in the developed countries a significant growth of alternative energetics is caused by the consistent State policy on creation of conditions for formation of effective branch markets and the solving of so-called energy trilemma.

  16. Exercise handbook : what transportation security and emergency preparedness leaders need to know to improve emergency preparedness.

    Science.gov (United States)

    2014-02-01

    The U.S. Department of Homeland Security (DHS) has provided extensive general guidance on developing training and exercise programs for public entities, but little had been done to focus that material on the transportation sector specifically. Transp...

  17. Security Analysis and the Contribution of UPFC for Improving Voltage Stability

    Directory of Open Access Journals (Sweden)

    Asma Meddeb

    2018-02-01

    Full Text Available The occurrence of many failures in the power system can lead to power instability and affects the system parameters to go beyond its operating limits. It may lead to obstructing the secure operations and reliability of power systems. Ensuring power system security needs proper actions to be taken for the undesirable contingency. Thus, security analysis is important tasks in modern energy management systems. This paper proposes an approach based on the Newton Raphson power flow method for power system security analysis. Firstly, the contingencies will be specified to assess their impact on the transient stability. Secondly, the selected contingencies will be classified in the order of severity. In addition, the integration of the Unified Power Flow Controller (UPFC to enhance the transient stability of the power system is considered. The proposed method is implemented on the IEEE-14 bus system. We performed this case study using the well-known software EUROSTAG.

  18. Report: EPA’s National Security Information Program Could Be Improved

    Science.gov (United States)

    Report #12-P-0543, June 18, 2012. Under its classified NSI program, EPA has assigned responsibilities and provided guidance, training, and oversight. EPA program offices provide secure equipment and space, following NSI program specifications.

  19. Reimagining Energy in the North: Developing Solutions for Improving Renewable Energy Security in Northern Communities

    Science.gov (United States)

    Creed, I. F.; Poelzer, G.; Noble, B.; Beatty, B.; Belcher, K.; Chung, T.; Loring, P. A.

    2017-12-01

    The global energy sector is at a crossroads. Efforts to reduce greenhouse gas emissions, volatile fossil fuel prices, the emergence of sustainability markets, and advances in renewable energy technologies are setting the foundation for what could be one of the most significant societal transitions since the industrial revolution. There is a growing movement to "re-energize" Canada, through embracing pathways to facilitate a societal transition a low-carbon future. For example, circumpolar jurisdictions are poised for a transition to renewable energy. There are more than 250 remote, off-grid communities across Canada's North, of which approximately 170 are Indigenous, that rely largely on diesel-fueled generators. Diesel-fueled generation is generally reliable when properly maintained; however, supply is limited, infrastructure is at capacity or in need of major upgrading, and the volatile price of fuel can mean significant social, community and economic opportunity loss. Renewable energy projects offer one possible opportunity to address these challenges. But, given the challenges of human capacity, limited fiscal resources, and regulatory barriers, how can Northern communities participate in the global energy transition and not be left behind? To answer this question, the University of Saskatchewan, together with partners from the circumpolar North, are leading an initiative to develop a cross-sectoral and multi-national consortium of communities, utilities, industries, governments, and academics engaged in renewable energy in the North. This consortium will reimagine energy security in the North by co-creating and brokering the knowledge and understanding to design renewable energy systems that enhance social and economic value. Northern communities and utilities will learn directly from other northern communities and utilities across Canada and internationally about what can be achieved in renewable energy development and the solutions to current and future

  20. Improved E-Banking System With Advanced Encryption Standards And Security Models

    Directory of Open Access Journals (Sweden)

    Sharaaf N. A.

    2015-08-01

    Full Text Available Emerging new Technologies and large scale businesses have made this world a global village. Many business organizations provide online services targeting global consumer bases. Transaction in international scale has been enabled by banks all around the world through E-banking in order to supply the needs of above business organizations. E-banking serves lots of benefits to both customers of banks and banks itself. It adds value to customers satisfaction with better service quality and enables banks to gain a competitive advantage over other competitors. Online banking need to possess high level security in order to provide safe consistent and robust online environment which guarantees secure data transmission and identity of both bank and customer. Lack of security may lead to less trust or hard to trust attitude towards online banking. Although customers are attracted by online banking convenience they seem largely in concern about identity theft and phishing. Analysis of many research papers on e-banking security models and their respective advantages and disadvantages have been discussed in literature review. Username password E-banking dongles fractal images biometric scans and advanced encryption standards are some of the suggested solutions for E-banking security. This study focuses on the security beyond above mechanisms. This paper ensures security of online banking at three levels. At client side using internet dongle integrated with finger print scanning technology at banking sever side and data transmission level. This model also includes username password and advanced encryption for further security. Complete description on the model has been discussed in methodology section. Future works on this topic and Conclusion are covered in separate sections.

  1. The state of improvement of security management setup in the Japan Atomic Power Company and improvement of facilities in its Tsuruga Nuclear Power Station

    International Nuclear Information System (INIS)

    1982-01-01

    In connection with the series of accidents in the Tsuruga Nuclear Power Station of the Japan Atomic Power Company, the state of security management in JAPC and the safety of facilities in the Tsuruga Nuclear Power Station, which have resulted from improvement efforts, are described on the following items: security management setup - communication and reporting in emergency, the management of inspection and maintenance records, work control and supervision in repair, improvement, etc., functional authority and responsibility in maintenance management, operation management, radiation control, personnel education; improvement of facilities - feed water heaters, laundry waste-water filter room, radioactive waste treatment facility, general drainage, concentrated waste liquid storage tanks in newly-built waste treatment building, etc. (Mori, K.)

  2. Urban Ecological Security Simulation and Prediction Using an Improved Cellular Automata (CA) Approach-A Case Study for the City of Wuhan in China.

    Science.gov (United States)

    Gao, Yuan; Zhang, Chuanrong; He, Qingsong; Liu, Yaolin

    2017-06-15

    Ecological security is an important research topic, especially urban ecological security. As highly populated eco-systems, cities always have more fragile ecological environments. However, most of the research on urban ecological security in literature has focused on evaluating current or past status of the ecological environment. Very little literature has carried out simulation or prediction of future ecological security. In addition, there is even less literature exploring the urban ecological environment at a fine scale. To fill-in the literature gap, in this study we simulated and predicted urban ecological security at a fine scale (district level) using an improved Cellular Automata (CA) approach. First we used the pressure-state-response (PSR) method based on grid-scale data to evaluate urban ecological security. Then, based on the evaluation results, we imported the geographically weighted regression (GWR) concept into the CA model to simulate and predict urban ecological security. We applied the improved CA approach in a case study-simulating and predicting urban ecological security for the city of Wuhan in Central China. By comparing the simulated ecological security values from 2010 using the improved CA model to the actual ecological security values of 2010, we got a relatively high value of the kappa coefficient, which indicates that this CA model can simulate or predict well future development of ecological security in Wuhan. Based on the prediction results for 2020, we made some policy recommendations for each district in Wuhan.

  3. Urban Ecological Security Simulation and Prediction Using an Improved Cellular Automata (CA) Approach—A Case Study for the City of Wuhan in China

    Science.gov (United States)

    Gao, Yuan; Zhang, Chuanrong; He, Qingsong; Liu, Yaolin

    2017-01-01

    Ecological security is an important research topic, especially urban ecological security. As highly populated eco-systems, cities always have more fragile ecological environments. However, most of the research on urban ecological security in literature has focused on evaluating current or past status of the ecological environment. Very little literature has carried out simulation or prediction of future ecological security. In addition, there is even less literature exploring the urban ecological environment at a fine scale. To fill-in the literature gap, in this study we simulated and predicted urban ecological security at a fine scale (district level) using an improved Cellular Automata (CA) approach. First we used the pressure-state-response (PSR) method based on grid-scale data to evaluate urban ecological security. Then, based on the evaluation results, we imported the geographically weighted regression (GWR) concept into the CA model to simulate and predict urban ecological security. We applied the improved CA approach in a case study—simulating and predicting urban ecological security for the city of Wuhan in Central China. By comparing the simulated ecological security values from 2010 using the improved CA model to the actual ecological security values of 2010, we got a relatively high value of the kappa coefficient, which indicates that this CA model can simulate or predict well future development of ecological security in Wuhan. Based on the prediction results for 2020, we made some policy recommendations for each district in Wuhan. PMID:28617348

  4. Improving food security? Setting indicators and observing change of rural household in Central Sulawesi

    Directory of Open Access Journals (Sweden)

    Stephan Klasen

    2017-11-01

    Full Text Available Household food security is a critical issue for Indonesia, which is investigated in this study. Many of rural household in Indonesia depends on agricultural sectors and facing challenges of global warming that threatening food security and poverty alleviation in the country. We use panel data at the household level for a sample of households living in Central Sulawesi at the rainforest margin in Indonesia. For the purpose of this study, we apply principal component analysis to develop an indicator of food security and used the index in determining the household’s condition to be persistent food secure or insecure. The findings present the fact that over the period the household’s food security in the study area has changed to better food condition. The number of people who are food insecure has declined by 23.73 % over the year. However, the results suggest that public services on health, education and infrastructure need to be strengthened, investments in access to credit and off-farm employment policies, as well as insurance programs on social protection and disaster management, need to be developed.

  5. Report: EPA’s Information Systems and Data Are at Risk Due to Insufficient Training of Personnel With Significant Information Security Responsibilities

    Science.gov (United States)

    Report #14-P-0142, March 21, 2014. The EPA places its information systems and data at risk due to an organizational structure that has not specified required duties and responsibilities to ensure personnel are trained on key information security roles.

  6. The importance and significance of peace studies with special reference to South Africa’s political-security role in Africa

    Directory of Open Access Journals (Sweden)

    T. Neethling

    2006-07-01

    Full Text Available The origins of peace studies as an academic field of inquiry could be traced to the late 1940s and the field has been developing considerably since then. Currently, scholars at various tertiary institutions over the world are involved in using their academic skills to educate students about the causes of wars and violent conflict while pointing out various alternatives to these phenomena. Peace studies in the South African and broader African context are certainly of great significance and importance. After all, the gripping and devastating violence that manifested in African countries such as Liberia, Sierra Leone, Sudan, Burundi, Rwanda, the DRC, Somalia, Angola, the Comoros and many other conflict-stricken areas warrant scholarly attention with a view to better understanding the causes, dynamics and effects of such conflict. By means of this understanding the conflict could be addressed through mechanisms of conflict resolution and peace building could be promoted. Furthermore, the South African Government’s progressive military involvement in international peace missions in recent years is far more than an issue of mere military concern. It is a matter of great political interest and significance. Being supportive of the need for peace studies in the curricula of South African universities (and African universities in general, this article argues that South African students should be exposed to a rich and comprehensive literature on the search for international peace and security; of how to understand and deal with the causes of large-scale conflict and violence; and how these could be curtailed and resolved − literature which informs scholarly discussions and research in many centres and places of education, training and peace building.

  7. An Improved Protocol for Controlled Deterministic Secure Quantum Communication Using Five-Qubit Entangled State

    Science.gov (United States)

    Kao, Shih-Hung; Lin, Jason; Tsai, Chia-Wei; Hwang, Tzonelih

    2018-03-01

    In early 2009, Xiu et al. (Opt. Commun. 282(2) 333-337 2009) presented a controlled deterministic secure quantum communication (CDSQC) protocol via a newly constructed five-qubit entangled quantum state. Later, Qin et al. (Opt. Commun. 282(13), 2656-2658 2009) pointed out two security loopholes in Xiu et al.'s protocol: (1) A correlation-elicitation (CE) attack can reveal the entire secret message; (2) A leakage of partial information for the receiver is noticed. Then, Xiu et al. (Opt. Commun. 283(2), 344-347 2010) presented a revised CDSQC protocol to remedy the CE attack problem. However, the information leakage problem still remains open. This work proposes a new CDSQC protocol using the same five-qubit entangled state which can work without the above mentioned security problems. Moreover, the Trojan Horse attacks can be automatically avoided without using detecting devices in the new CDSQC.

  8. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    Directory of Open Access Journals (Sweden)

    Youngsook Lee

    2014-01-01

    Full Text Available An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1 it fails to provide user anonymity against any third party as well as the foreign agent, (2 it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3 it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.

  9. An Improved Protocol for Controlled Deterministic Secure Quantum Communication Using Five-Qubit Entangled State

    Science.gov (United States)

    Kao, Shih-Hung; Lin, Jason; Tsai, Chia-Wei; Hwang, Tzonelih

    2018-06-01

    In early 2009, Xiu et al. (Opt. Commun. 282(2) 333-337 2009) presented a controlled deterministic secure quantum communication (CDSQC) protocol via a newly constructed five-qubit entangled quantum state. Later, Qin et al. (Opt. Commun. 282(13), 2656-2658 2009) pointed out two security loopholes in Xiu et al.'s protocol: (1) A correlation-elicitation (CE) attack can reveal the entire secret message; (2) A leakage of partial information for the receiver is noticed. Then, Xiu et al. (Opt. Commun. 283(2), 344-347 2010) presented a revised CDSQC protocol to remedy the CE attack problem. However, the information leakage problem still remains open. This work proposes a new CDSQC protocol using the same five-qubit entangled state which can work without the above mentioned security problems. Moreover, the Trojan Horse attacks can be automatically avoided without using detecting devices in the new CDSQC.

  10. Applying Data Mining Techniques to Improve Information Security in the Cloud: A Single Cache System Approach

    OpenAIRE

    Amany AlShawi

    2016-01-01

    Presently, the popularity of cloud computing is gradually increasing day by day. The purpose of this research was to enhance the security of the cloud using techniques such as data mining with specific reference to the single cache system. From the findings of the research, it was observed that the security in the cloud could be enhanced with the single cache system. For future purposes, an Apriori algorithm can be applied to the single cache system. This can be applied by all cloud providers...

  11. Analyzing remotely sensed datasets for improved characterization of field-scale interventions for food security

    Science.gov (United States)

    Limaye, A. S.; Ellenburg, W. L., II; Coffee, K.; Ashmall, W.; Stanton, K.; Burks, J.; Irwin, D.

    2017-12-01

    Agriculture interventions such as irrigation, improved fertilization, and advanced cultivars have the potential to increase food security and ensure climate resilience. However, in order broaden the support of activities like these, environmental managers must be able to assess their impact. Often field data are difficult to obtain and decisions are made with limited information. Satellite products can provide relevant information at field and village wide scales that can assist in this process. SERVIR is taking an aim of helping connect the space-based products to help the efficacy of village scale interventions through a couple of web-based tools, called ClimateSERV and AgriSERV. ClimateSERV has been active since 2014, and has increased in the data holdings and access points. Currently, ClimateSERV enables users to create geographic regions of their choosing and to compute key statistics for those regions. Rainfall (GPM IMERG, CHIRPS), vegetation indices (eMODIS Normalized Difference Vegetation Index - NDVI; Evaporative Stress Index), and North American Multi-model Ensemble-based seasonal climate forecasts of rainfall and temperature. ClimateSERV can also query the Google Earth Engine holdings for datasets, currently, ClimateSERV provides access to the daytime MODIS Land Surface Temperature (LST). Our first such derived product is a monthly rainfall analysis feature which combines CHIRPS historic rainfall with seasonal forecast models AgriSERV is a derived web-based tool based on the ClimateSERV data holdings. It is designed to provide easy to interpret analysis, based NDVI and rainfall. This tool allows users to draw two areas of interest, one control with no intervention and another that has experienced intervention. An on-demand comparative analysis is performed and the user is presented with side-by-side charts and summary data that highlight the differences of the two areas in terms of vegetation health, derived growing season lengths and rainfall. The

  12. State Security Breach Response Laws: State-by-State Summary Table. Using Data to Improve Education: A Legal Reference Guide to Protecting Student Privacy and Data Security

    Science.gov (United States)

    Data Quality Campaign, 2011

    2011-01-01

    Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…

  13. Natalizumab Significantly Improves Cognitive Impairment over Three Years in MS: Pattern of Disability Progression and Preliminary MRI Findings.

    Directory of Open Access Journals (Sweden)

    Flavia Mattioli

    Full Text Available Previous studies reported that Multiple Sclerosis (MS patients treated with natalizumab for one or two years exhibit a significant reduction in relapse rate and in cognitive impairment, but the long term effects on cognitive performance are unknown. This study aimed to evaluate the effects of natalizumab on cognitive impairment in a cohort of 24 consecutive patients with relapsing remitting MS treated for 3 years. The neuropsychological tests, as well as relapse number and EDSS, were assessed at baseline and yearly for three years. The impact on cortical atrophy was also considered in a subgroup of them, and are thus to be considered as preliminary. Results showed a significant reduction in the number of impaired neuropsychological tests after three years, a significant decrease in annualized relapse rate at each time points compared to baseline and a stable EDSS. In the neuropsychological assessment, a significant improvement in memory, attention and executive function test scores was detected. Preliminary MRI data show that, while GM volume did not change at 3 years, a significantly greater parahippocampal and prefrontal gray matter density was noticed, the former correlating with neuropsychological improvement in a memory test. This study showed that therapy with Natalizumab is helpful in improving cognitive performance, and is likely to have a protective role on grey matter, over a three years follow-up.

  14. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    Science.gov (United States)

    Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  15. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    Full Text Available Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  16. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System

    Science.gov (United States)

    Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075

  17. Improving SCADA security of a local process with a power grid model

    NARCIS (Netherlands)

    Chromik, Justyna Joanna; Remke, Anne Katharina Ingrid; Haverkort, Boudewijn R.H.M.

    Security of networks controlling smart grids is an important subject. The shift of the power grid towards a smart grid results in more distributed control functions, while intrusion detection of the control network mostly remains centrally based. Moreover, existing local (host-based) intrusion

  18. Assessing and improving SCADA security in the Dutch drinking water sector

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Ali, M.; Zielstra, A.

    2011-01-01

    International studies have shown that information security for process control systems, in particular SCADA, is weak. Many of the critical infrastructure (CI) services critically depend on process control systems. Therefore, any vulnerability in the protection of process control systems in CI may

  19. Assessing and Improving SCADA Security in the Dutch Drinking Water Sector

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Ali, M.; Zielstra, A.

    2009-01-01

    International studies have shown that information security for process control systems, in particular SCADA, is weak. As many critical infrastructure (CI) services depend on process control systems, any vulnerability in the protection of process control systems in CI may result in serious

  20. Modification of CAS-protocol for improvement of security web-applications from unauthorized access

    Directory of Open Access Journals (Sweden)

    Alexey I Igorevich Alexandrov

    2017-07-01

    Full Text Available Dissemination of information technologies and the expansion of their application demand constantly increasing security level for users, operating with confidential information and personal data. The problem of setting up secure user identification is probably one of the most common tasks, which occur in the process of software development. Today, despite the availability of a large amount of authentication tools, new solutions, mechanisms and technologies are being introduced regularly. Primarily, it is done to increase the security level of data protection against unauthorized access. This article describes the experience of using central user authentication service based on CAS-protocol (CAS – Central Authentication Service and free open source software, analyzing its main advantages and disadvantages and describing the possibility of its modification, which would increase security of web-based information systems from being accessed illegally. The article contains recommendations for setting a maximum time limit for users working on services, integrated with central authentication; and, analyses the research of implementing modern web-technologies while using user authentication system based on CAS-protocol. In addition, it describes the ways of CAS-server modernization for developing additional modules: a module for collecting and analyzing the use of information systems, and another one, for a user management system. Furthermore, CAS-protocol can be used at universities and other organizations for creating a unified information environment in education.

  1. Using Real Option Thinking to Improve Decision Making in Security Investment

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Houmb, S.H.; Daneva, Maia

    2010-01-01

    Making well-founded security investment decisions is hard: several alternatives may need to be considered, the alternatives' space is often diffuse, and many decision parameters that are traded-off are uncertain or incomplete. We cope with these challenges by proposing a method that supports

  2. Legal Framework and Best Practice for Improving Transport Security of Radioactive and Nuclear Materials in Croatia

    International Nuclear Information System (INIS)

    Ilijas, B.; Medakovic, S.

    2012-01-01

    Security of transporting radioactive and nuclear materials always poses a demanding task to the holder of the authorization or beneficiary, and especially transporter. Very strict and precise legal framework must be done for this purpose, yet it has not be too complicated to create a great problems in practice. The best balance between efficiency and simplicity should be achieved. In Croatia on power is 'The Dangerous Goods Transport Act' which stipulates the conditions for the carriage of dangerous goods in individual transport modes, obligations of persons participating in the carriage, requirements for packaging and vehicles, conditions for the appointment of safety advisers and safety adviser's rights and duties, competence and conditions for the implementation of training programs for persons participating in transport, competence of the state authorities related to such carriage and supervision of the implementation of the Act. Besides this Act, which regulates the issue in more general way, in preparation is a new 'Ordinance on Physical Security Measures for Radioactive Sources, Nuclear Material and Nuclear Facilities'. The intention of this Ordinance, in the part dealing with transport, is to bring specific approach, in accordance with IAEA guides, forwarding the most of obligations to the holder of the authorization or beneficiary and transporter, leaving state regulatory bodies mostly supervising role. In practice this can create some problems in the beginning, but with rising security awareness and after some experience collected, this can be the best way to achieve satisfactory security, yet not slowing down and complicating regular jobs with radioactive and nuclear materials.(author).

  3. Improving the security of the Hwang-Su protocol for mobile networks ...

    African Journals Online (AJOL)

    The mobile networks are experiencing a growing success. This success is mainly due to the fact that these networks providing the mobility of users, the transmission of data through open air and the requirement of low power. But, it is threatened by weak security, especially at the level of authentication. Hwang and Su have ...

  4. Feasibility of a novel participatory multi-sector continuous improvement approach to enhance food security in remote Indigenous Australian communities

    Directory of Open Access Journals (Sweden)

    J. Brimblecombe

    2017-12-01

    Conclusion: A multi-sector participatory approach seeking continuous improvement engaged committed Aboriginal and non-Aboriginal stakeholders and was shown to have potential to shift community diet. Provision of clear mechanisms to link this approach with higher level policy and decision-making structures, clarity of roles and responsibilities, and processes to prioritise and communicate actions across sectors should further strengthen capacity for food security improvement. Integrating this approach enabling local decision-making into community governance structures with adequate resourcing is an imperative.

  5. An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography.

    Science.gov (United States)

    Chaudhry, Shehzad Ashraf; Mahmood, Khalid; Naqvi, Husnain; Khan, Muhammad Khurram

    2015-11-01

    Telecare medicine information system (TMIS) offers the patients convenient and expedite healthcare services remotely anywhere. Patient security and privacy has emerged as key issues during remote access because of underlying open architecture. An authentication scheme can verify patient's as well as TMIS server's legitimacy during remote healthcare services. To achieve security and privacy a number of authentication schemes have been proposed. Very recently Lu et al. (J. Med. Syst. 39(3):1-8, 2015) proposed a biometric based three factor authentication scheme for TMIS to confiscate the vulnerabilities of Arshad et al.'s (J. Med. Syst. 38(12):136, 2014) scheme. Further, they emphasized the robustness of their scheme against several attacks. However, in this paper we establish that Lu et al.'s scheme is vulnerable to numerous attacks including (1) Patient anonymity violation attack, (2) Patient impersonation attack, and (3) TMIS server impersonation attack. Furthermore, their scheme does not provide patient untraceability. We then, propose an improvement of Lu et al.'s scheme. We have analyzed the security of improved scheme using popular automated tool ProVerif. The proposed scheme while retaining the plusses of Lu et al.'s scheme is also robust against known attacks.

  6. Improved decryption quality and security of a joint transform correlator-based encryption system

    International Nuclear Information System (INIS)

    Vilardy, Juan M; Millán, María S; Pérez-Cabré, Elisabet

    2013-01-01

    Some image encryption systems based on modified double random phase encoding and joint transform correlator architecture produce low quality decrypted images and are vulnerable to a variety of attacks. In this work, we analyse the algorithm of some reported methods that optically implement the double random phase encryption in a joint transform correlator. We show that it is possible to significantly improve the quality of the decrypted image by introducing a simple nonlinear operation in the encrypted function that contains the joint power spectrum. This nonlinearity also makes the system more resistant to chosen-plaintext attacks. We additionally explore the system resistance against this type of attack when a variety of probability density functions are used to generate the two random phase masks of the encryption–decryption process. Numerical results are presented and discussed. (paper)

  7. Improved decryption quality and security of a joint transform correlator-based encryption system

    Science.gov (United States)

    Vilardy, Juan M.; Millán, María S.; Pérez-Cabré, Elisabet

    2013-02-01

    Some image encryption systems based on modified double random phase encoding and joint transform correlator architecture produce low quality decrypted images and are vulnerable to a variety of attacks. In this work, we analyse the algorithm of some reported methods that optically implement the double random phase encryption in a joint transform correlator. We show that it is possible to significantly improve the quality of the decrypted image by introducing a simple nonlinear operation in the encrypted function that contains the joint power spectrum. This nonlinearity also makes the system more resistant to chosen-plaintext attacks. We additionally explore the system resistance against this type of attack when a variety of probability density functions are used to generate the two random phase masks of the encryption-decryption process. Numerical results are presented and discussed.

  8. Applying Data Mining Techniques to Improve Information Security in the Cloud: A Single Cache System Approach

    Directory of Open Access Journals (Sweden)

    Amany AlShawi

    2016-01-01

    Full Text Available Presently, the popularity of cloud computing is gradually increasing day by day. The purpose of this research was to enhance the security of the cloud using techniques such as data mining with specific reference to the single cache system. From the findings of the research, it was observed that the security in the cloud could be enhanced with the single cache system. For future purposes, an Apriori algorithm can be applied to the single cache system. This can be applied by all cloud providers, vendors, data distributors, and others. Further, data objects entered into the single cache system can be extended into 12 components. Database and SPSS modelers can be used to implement the same.

  9. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  10. Behavioral and physical biometric characteristics modeling used for ITS security improvement

    Directory of Open Access Journals (Sweden)

    Miroslav BAČA

    2009-01-01

    Full Text Available Biometric technologies rely on specific biometric characteristics that are used for recognition. The particular characteristic for a given situation can be described through a serious of descriptive parameters including ease of collecting, permanence, measurably, acceptability, deceptiveness, universality, uniqueness, sample cost, system cost, database size, as well as environmental factors. By using our ontology-based framework for adequacy of biometric systems, we introduce a model for using biometric technologies in ITS. Such technologies increase security, safety and protection of ITS.

  11. Department of Defense and Security Cooperation: Improving Prioritization, Authorities, and Evaluations

    Science.gov (United States)

    2016-03-09

    March 9, 2016 Chairman Fischer , Ranking Member Nelson, and distinguished members of the subcommittee, thank you for the opportunity to testify...on the important subject of U.S. security cooperation. It’s a pleasure to appear before you today along with my colleagues, Jeff Eggers and Melissa...based evaluations. Chairman Fischer , Ranking Member Nelson, and members of the subcommittee, I appreciate the opportunity to offer this testimony, and I look forward to assisting the committee in its vital work.

  12. Improving Security in Bring Your Own Device (BYOD) Environment by Controlling Access

    OpenAIRE

    Muhammad, M.A.; Zadeh, P.B.; Ayesh, Aladdin, 1972-

    2017-01-01

    With the rapid increase in smartphones and tablets, Bring Your Own Devices (BYOD) has simplified computing by introducing the use of personally owned devices. These devices can be utilised in accessing business enterprise contents and networks. The effectiveness of BYOD offers several business benefits like employee job satisfaction, increased job efficiency and flexibility. However, allowing employees to bring their own devices could lead to a plethora of security issues; like data theft, un...

  13. Improving Regional Security in Central America: Military Engagement Options for Nicaragua

    Science.gov (United States)

    2002-12-01

    of Disasters) Guatemala, Guatemala. Secretaria de Integracion Economica Centroamericana. 68 Smith, Peter H. 2000. Talons of the Eagle: Dynamics of...for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection...an essential role in the stability and security of the Central American sub region. The de -stabilizing influence of Sandinista policies in the 1980s

  14. Improving the security of a parallel keyed hash function based on chaotic maps

    Energy Technology Data Exchange (ETDEWEB)

    Xiao Di, E-mail: xiaodi_cqu@hotmail.co [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China); Liao Xiaofeng [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China); Wang Yong [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China)] [College of Economy and Management, Chongqing University of Posts and Telecommunications, Chongqing 400065 (China)

    2009-11-23

    In this Letter, we analyze the cause of vulnerability of the original parallel keyed hash function based on chaotic maps in detail, and then propose the corresponding enhancement measures. Theoretical analysis and computer simulation indicate that the modified hash function is more secure than the original one. At the same time, it can keep the parallel merit and satisfy the other performance requirements of hash function.

  15. Improving the security of a parallel keyed hash function based on chaotic maps

    International Nuclear Information System (INIS)

    Xiao Di; Liao Xiaofeng; Wang Yong

    2009-01-01

    In this Letter, we analyze the cause of vulnerability of the original parallel keyed hash function based on chaotic maps in detail, and then propose the corresponding enhancement measures. Theoretical analysis and computer simulation indicate that the modified hash function is more secure than the original one. At the same time, it can keep the parallel merit and satisfy the other performance requirements of hash function.

  16. Leveraging multi-channel x-ray detector technology to improve quality metrics for industrial and security applications

    Science.gov (United States)

    Jimenez, Edward S.; Thompson, Kyle R.; Stohn, Adriana; Goodner, Ryan N.

    2017-09-01

    Sandia National Laboratories has recently developed the capability to acquire multi-channel radio- graphs for multiple research and development applications in industry and security. This capability allows for the acquisition of x-ray radiographs or sinogram data to be acquired at up to 300 keV with up to 128 channels per pixel. This work will investigate whether multiple quality metrics for computed tomography can actually benefit from binned projection data compared to traditionally acquired grayscale sinogram data. Features and metrics to be evaluated include the ability to dis- tinguish between two different materials with similar absorption properties, artifact reduction, and signal-to-noise for both raw data and reconstructed volumetric data. The impact of this technology to non-destructive evaluation, national security, and industry is wide-ranging and has to potential to improve upon many inspection methods such as dual-energy methods, material identification, object segmentation, and computer vision on radiographs.

  17. Significant clinical improvement in radiation-induced lumbosacral poly-radiculopathy by a treatment combining pentoxifylline, tocopherol, and clodronate (Pentoclo)

    Energy Technology Data Exchange (ETDEWEB)

    Delanian, S. [Hop St Louis, Serv Oncol Radiotherapie, APHP, F-75010 Paris, (France); Lefaix, J.L. [CEA-LARIA, CIRIL-GANIL, Caen, (France); Maisonobe, T. [Hop La Pitie Salpetriere, Federat Neurophysiol Clin, APHP, Paris, (France)

    2008-07-01

    Radiation-induced (RI) peripheral neuropathy is a rare and severe delayed complication of radiotherapy that is spontaneously irreversible, with no standard of treatment. We previously developed a successful antioxidant treatment in RI fibrosis and necrosis. Two patients with progressive worsening RI lumbosacral poly-radiculopathy experienced over several years a significant clinical improvement in their neurological sensorimotor symptoms with long-term pentoxifylline-tocopherol-clodronate treatment, and good safety. (authors)

  18. The cumulative effect of small dietary changes may significantly improve nutritional intakes in free-living children and adults

    OpenAIRE

    Bornet , Francis; Paineau , Damien; Beaufils , François; Boulier , Alain; Cassuto , Dominique-Adèle; Chwalow , Judith; Combris , Pierre; Couet , Charles; Jouret , Béatrice; Lafay , Lionel; Laville , Martine; Mahé , Sylvain; Ricour , Claude; Romon , Monique; Simon , Chantal

    2010-01-01

    Abstract Background/Objectives: The ELPAS study was an 8-month randomized controlled dietary modification trial designed to test the hypothesis that family dietary coaching would improve nutritional intakes and weight control in 2026 free-living children and parents (Paineau et al., 2008). It resulted in significant nutritional changes, with beneficial effects on body mass index in adults. In these ancillary analyses, we investigated dietary changes throughout the intervention. ...

  19. Home blood pressure monitoring, secure electronic messaging and medication intensification for improving hypertension control: a mediation analysis.

    Science.gov (United States)

    Ralston, J D; Cook, A J; Anderson, M L; Catz, S L; Fishman, P A; Carlson, J; Johnson, R; Green, B B

    2014-01-01

    We evaluated the role of home monitoring, communication with pharmacists, medication intensification, medication adherence and lifestyle factors in contributing to the effectiveness of an intervention to improve blood pressure control in patients with uncontrolled essential hypertension. We performed a mediation analysis of a published randomized trial based on the Chronic Care Model delivered over a secure patient website from June 2005 to December 2007. Study arms analyzed included usual care with a home blood pressure monitor and usual care with home blood pressure monitor and web-based pharmacist care. Mediator measures included secure messaging and telephone encounters; home blood pressure monitoring; medications intensification and adherence and lifestyle factors. Overall fidelity to the Chronic Care Model was assessed with the Patient Assessment of Chronic Care (PACIC) instrument. The primary outcome was percent of participants with blood pressure (BP) <140/90 mm Hg. At 12 months follow-up, patients in the web-based pharmacist care group were more likely to have BP <140/90 mm Hg (55%) compared to patients in the group with home blood pressure monitors only (37%) (p = 0.001). Home blood pressure monitoring accounted for 30.3% of the intervention effect, secure electronic messaging accounted for 96%, and medication intensification for 29.3%. Medication adherence and self-report of fruit and vegetable intake and weight change were not different between the two study groups. The PACIC score accounted for 22.0 % of the main intervention effect. The effect of web-based pharmacist care on improved blood pressure control was explained in part through a combination of home blood pressure monitoring, secure messaging, and antihypertensive medication intensification.

  20. Acid or erythromycin stress significantly improves transformation efficiency through regulating expression of DNA binding proteins in Lactococcus lactis F44.

    Science.gov (United States)

    Wang, Binbin; Zhang, Huawei; Liang, Dongmei; Hao, Panlong; Li, Yanni; Qiao, Jianjun

    2017-12-01

    Lactococcus lactis is a gram-positive bacterium used extensively in the dairy industry and food fermentation, and its biological characteristics are usually improved through genetic manipulation. However, poor transformation efficiency was the main restriction factor for the construction of engineered strains. In this study, the transformation efficiency of L. lactis F44 showed a 56.1-fold increase in acid condition (pH 5.0); meanwhile, erythromycin stress (0.04 μg/mL) promoted the transformation efficiency more significantly (76.9-fold). Notably, the transformation efficiency of F44e (L. lactis F44 harboring empty pLEB124) increased up to 149.1-fold under the synergistic stresses of acid and erythromycin. In addition, the gene expression of some DNA binding proteins (DprA, RadA, RadC, RecA, RecQ, and SsbA) changed correspondingly. Especially for radA, 25.1-fold improvement was detected when F44e was exposed to pH 5.0. Overexpression of some DNA binding proteins could improve the transformation efficiency. The results suggested that acid or erythromycin stress could improve the transformation efficiency of L. lactis through regulating gene expression of DNA binding proteins. We have proposed a simple but promising strategy for improving the transformation efficiency of L. lactis and other hard-transformed microorganisms. Copyright © 2017 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.

  1. Food assistance is associated with improved body mass index, food security and attendance at clinic in an HIV program in central Haiti: a prospective observational cohort study

    Directory of Open Access Journals (Sweden)

    Ivers Louise C

    2010-08-01

    Full Text Available Abstract Background Few data are available to guide programmatic solutions to the overlapping problems of undernutrition and HIV infection. We evaluated the impact of food assistance on patient outcomes in a comprehensive HIV program in central Haiti in a prospective observational cohort study. Methods Adults with HIV infection were eligible for monthly food rations if they had any one of: tuberculosis, body mass index (BMI 2, CD4 cell count 3 (in the prior 3 months or severe socio-economic conditions. A total of 600 individuals (300 eligible and 300 ineligible for food assistance were interviewed before rations were distributed, at 6 months and at 12 months. Data collected included demographics, BMI and food insecurity score (range 0 - 20. Results At 6- and 12-month time-points, 488 and 340 subjects were eligible for analysis. Multivariable analysis demonstrated that at 6 months, food security significantly improved in those who received food assistance versus who did not (-3.55 vs -0.16; P Conclusions Food assistance was associated with improved food security, increased BMI, and improved adherence to clinic visits at 6 and 12 months among people living with HIV in Haiti and should be part of routine care where HIV and food insecurity overlap.

  2. Feasibility of a novel participatory multi-sector continuous improvement approach to enhance food security in remote Indigenous Australian communities.

    Science.gov (United States)

    Brimblecombe, J; Bailie, R; van den Boogaard, C; Wood, B; Liberato, S C; Ferguson, M; Coveney, J; Jaenke, R; Ritchie, J

    2017-12-01

    Food insecurity underlies and compounds many of the development issues faced by remote Indigenous communities in Australia. Multi-sector approaches offer promise to improve food security. We assessed the feasibility of a novel multi-sector approach to enhance community food security in remote Indigenous Australia. A longitudinal comparative multi-site case study, the Good Food Systems Good Food for All Project, was conducted (2009-2013) with four Aboriginal communities. Continuous improvement meetings were held in each community. Data from project documents and store sales were used to assess feasibility according to engagement, uptake and sustainability of action, and impact on community diet, as well as identifying conditions facilitating or hindering these. Engagement was established where: the community perceived a need for the approach; where trust was developed between the community and facilitators; where there was community stability; and where flexibility was applied in the timing of meetings. The approach enabled stakeholders in each community to collectively appraise the community food system and plan action. Actions that could be directly implemented within available resources resulted from developing collaborative capacity. Actions requiring advocacy, multi-sectoral involvement, commitment or further resources were less frequently used. Positive shifts in community diet were associated with key areas where actions were implemented. A multi-sector participatory approach seeking continuous improvement engaged committed Aboriginal and non-Aboriginal stakeholders and was shown to have potential to shift community diet. Provision of clear mechanisms to link this approach with higher level policy and decision-making structures, clarity of roles and responsibilities, and processes to prioritise and communicate actions across sectors should further strengthen capacity for food security improvement. Integrating this approach enabling local decision-making into

  3. An initiative to improve the management of clinically significant test results in a large health care network.

    Science.gov (United States)

    Roy, Christopher L; Rothschild, Jeffrey M; Dighe, Anand S; Schiff, Gordon D; Graydon-Baker, Erin; Lenoci-Edwards, Jennifer; Dwyer, Cheryl; Khorasani, Ramin; Gandhi, Tejal K

    2013-11-01

    The failure of providers to communicate and follow up clinically significant test results (CSTR) is an important threat to patient safety. The Massachusetts Coalition for the Prevention of Medical Errors has endorsed the creation of systems to ensure that results can be received and acknowledged. In 2008 a task force was convened that represented clinicians, laboratories, radiology, patient safety, risk management, and information systems in a large health care network with the goals of providing recommendations and a road map for improvement in the management of CSTR and of implementing this improvement plan during the sub-force sequent five years. In drafting its charter, the task broadened the scope from "critical" results to "clinically significant" ones; clinically significant was defined as any result that requires further clinical action to avoid morbidity or mortality, regardless of the urgency of that action. The task force recommended four key areas for improvement--(1) standardization of policies and definitions, (2) robust identification of the patient's care team, (3) enhanced results management/tracking systems, and (4) centralized quality reporting and metrics. The task force faced many challenges in implementing these recommendations, including disagreements on definitions of CSTR and on who should have responsibility for CSTR, changes to established work flows, limitations of resources and of existing information systems, and definition of metrics. This large-scale effort to improve the communication and follow-up of CSTR in a health care network continues with ongoing work to address implementation challenges, refine policies, prepare for a new clinical information system platform, and identify new ways to measure the extent of this important safety problem.

  4. The SGLT2 Inhibitor Dapagliflozin Significantly Improves the Peripheral Microvascular Endothelial Function in Patients with Uncontrolled Type 2 Diabetes Mellitus.

    Science.gov (United States)

    Sugiyama, Seigo; Jinnouchi, Hideaki; Kurinami, Noboru; Hieshima, Kunio; Yoshida, Akira; Jinnouchi, Katsunori; Nishimura, Hiroyuki; Suzuki, Tomoko; Miyamoto, Fumio; Kajiwara, Keizo; Jinnouchi, Tomio

    2018-03-30

    Objective Sodium-glucose cotransporter-2 (SGLT2) inhibitors reduce cardiovascular events and decrease the body fat mass in patients with type 2 diabetes mellitus (T2DM). We examined whether or not the SGLT2-inhibitor dapagliflozin can improve the endothelial function associated with a reduction in abdominal fat mass. Methods We prospectively recruited patients with uncontrolled (hemoglobin A1c [HbA1c] >7.0%) T2DM who were not being treated by SGLT2 inhibitors. Patients were treated with add-on dapagliflozin (5 mg/day) or non-SGLT2 inhibitor medicines for 6 months to improve their HbA1c. We measured the peripheral microvascular endothelial function as assessed by reactive hyperemia peripheral arterial tonometry (RH-PAT) and calculated the natural logarithmic transformed value of the RH-PAT index (LnRHI). We then investigated changes in the LnRHI and abdominal fat area using computed tomography (CT). Results The subjects were 54 patients with uncontrolled T2DM (72.2% men) with a mean HbA1c of 8.1%. The HbA1c was significantly decreased in both groups, with no significant difference between the groups. Dapagliflozin treatment, but not non-SGLT2 inhibitor treatment, significantly increased the LnRHI. The changes in the LnRHI were significantly greater in the dapagliflozin group than in the non-SGLT2 inhibitor group. Dapagliflozin treatment, but not non-SGLT2 inhibitor treatment, significantly decreased the abdominal visceral fat area, subcutaneous fat area (SFA), and total fat area (TFA) as assessed by CT and significantly increased the plasma adiponectin levels. The percentage changes in the LnRHI were significantly correlated with changes in the SFA, TFA, systolic blood pressure, and adiponectin. Conclusion Add-on treatment with dapagliflozin significantly improves the glycemic control and endothelial function associated with a reduction in the abdominal fat mass in patients with uncontrolled T2DM.

  5. Spontaneous Resolution of Long-Standing Macular Detachment due to Optic Disc Pit with Significant Visual Improvement.

    Science.gov (United States)

    Parikakis, Efstratios A; Chatziralli, Irini P; Peponis, Vasileios G; Karagiannis, Dimitrios; Stratos, Aimilianos; Tsiotra, Vasileia A; Mitropoulos, Panagiotis G

    2014-01-01

    To report a case of spontaneous resolution of a long-standing serous macular detachment associated with an optic disc pit, leading to significant visual improvement. A 63-year-old female presented with a 6-month history of blurred vision and micropsia in her left eye. Her best-corrected visual acuity was 6/24 in the left eye, and fundoscopy revealed serous macular detachment associated with optic disc pit, which was confirmed by optical coherence tomography (OCT). The patient was offered vitrectomy as a treatment alternative, but she preferred to be reviewed conservatively. Three years after initial presentation, neither macular detachment nor subretinal fluid was evident in OCT, while the inner segment/outer segment (IS/OS) junction line was intact. Her visual acuity was improved from 6/24 to 6/12 in her left eye, remaining stable at the 6-month follow-up after resolution. We present a case of spontaneous resolution of a long-standing macular detachment associated with an optic disc pit with significant visual improvement, postulating that the integrity of the IS/OS junction line may be a prognostic factor for final visual acuity and suggesting OCT as an indicator of visual prognosis and the probable necessity of a surgical management.

  6. Spontaneous Resolution ofLong-Standing Macular Detachment due to Optic Disc Pit with Significant Visual Improvement

    Directory of Open Access Journals (Sweden)

    Efstratios A. Parikakis

    2014-03-01

    Full Text Available Purpose: To report a case of spontaneous resolution of a long-standing serous macular detachment associated with an optic disc pit, leading to significant visual improvement. Case Presentation: A 63-year-old female presented with a 6-month history of blurred vision and micropsia in her left eye. Her best-corrected visual acuity was 6/24 in the left eye, and fundoscopy revealed serous macular detachment associated with optic disc pit, which was confirmed by optical coherence tomography (OCT. The patient was offered vitrectomy as a treatment alternative, but she preferred to be reviewed conservatively. Three years after initial presentation, neither macular detachment nor subretinal fluid was evident in OCT, while the inner segment/outer segment (IS/OS junction line was intact. Her visual acuity was improved from 6/24 to 6/12 in her left eye, remaining stable at the 6-month follow-up after resolution. Conclusion: We present a case of spontaneous resolution of a long-standing macular detachment associated with an optic disc pit with significant visual improvement, postulating that the integrity of the IS/OS junction line may be a prognostic factor for final visual acuity and suggesting OCT as an indicator of visual prognosis and the probable necessity of a surgical management.

  7. The In Vitro Mass-Produced Model Mycorrhizal Fungus, Rhizophagus irregularis, Significantly Increases Yields of the Globally Important Food Security Crop Cassava

    Science.gov (United States)

    Ceballos, Isabel; Ruiz, Michael; Fernández, Cristhian; Peña, Ricardo

    2013-01-01

    The arbuscular mycorrhizal symbiosis is formed between arbuscular mycorrhizal fungi (AMF) and plant roots. The fungi provide the plant with inorganic phosphate (P). The symbiosis can result in increased plant growth. Although most global food crops naturally form this symbiosis, very few studies have shown that their practical application can lead to large-scale increases in food production. Application of AMF to crops in the tropics is potentially effective for improving yields. However, a main problem of using AMF on a large-scale is producing cheap inoculum in a clean sterile carrier and sufficiently concentrated to cheaply transport. Recently, mass-produced in vitro inoculum of the model mycorrhizal fungus Rhizophagus irregularis became available, potentially making its use viable in tropical agriculture. One of the most globally important food plants in the tropics is cassava. We evaluated the effect of in vitro mass-produced R. irregularis inoculum on the yield of cassava crops at two locations in Colombia. A significant effect of R. irregularis inoculation on yield occurred at both sites. At one site, yield increases were observed irrespective of P fertilization. At the other site, inoculation with AMF and 50% of the normally applied P gave the highest yield. Despite that AMF inoculation resulted in greater food production, economic analyses revealed that AMF inoculation did not give greater return on investment than with conventional cultivation. However, the amount of AMF inoculum used was double the recommended dose and was calculated with European, not Colombian, inoculum prices. R. irregularis can also be manipulated genetically in vitro, leading to improved plant growth. We conclude that application of in vitro R. irregularis is currently a way of increasing cassava yields, that there is a strong potential for it to be economically profitable and that there is enormous potential to improve this efficiency further in the future. PMID:23950975

  8. The in vitro mass-produced model mycorrhizal fungus, Rhizophagus irregularis, significantly increases yields of the globally important food security crop cassava.

    Directory of Open Access Journals (Sweden)

    Isabel Ceballos

    Full Text Available The arbuscular mycorrhizal symbiosis is formed between arbuscular mycorrhizal fungi (AMF and plant roots. The fungi provide the plant with inorganic phosphate (P. The symbiosis can result in increased plant growth. Although most global food crops naturally form this symbiosis, very few studies have shown that their practical application can lead to large-scale increases in food production. Application of AMF to crops in the tropics is potentially effective for improving yields. However, a main problem of using AMF on a large-scale is producing cheap inoculum in a clean sterile carrier and sufficiently concentrated to cheaply transport. Recently, mass-produced in vitro inoculum of the model mycorrhizal fungus Rhizophagus irregularis became available, potentially making its use viable in tropical agriculture. One of the most globally important food plants in the tropics is cassava. We evaluated the effect of in vitro mass-produced R. irregularis inoculum on the yield of cassava crops at two locations in Colombia. A significant effect of R. irregularis inoculation on yield occurred at both sites. At one site, yield increases were observed irrespective of P fertilization. At the other site, inoculation with AMF and 50% of the normally applied P gave the highest yield. Despite that AMF inoculation resulted in greater food production, economic analyses revealed that AMF inoculation did not give greater return on investment than with conventional cultivation. However, the amount of AMF inoculum used was double the recommended dose and was calculated with European, not Colombian, inoculum prices. R. irregularis can also be manipulated genetically in vitro, leading to improved plant growth. We conclude that application of in vitro R. irregularis is currently a way of increasing cassava yields, that there is a strong potential for it to be economically profitable and that there is enormous potential to improve this efficiency further in the future.

  9. An improved chaos-based secure communication technique using a novel encryption function with an embedded cipher key

    Energy Technology Data Exchange (ETDEWEB)

    Zaher, Ashraf A. [Physics Department, Science College, Kuwait University, P.O. Box 5969, Safat 13060 (Kuwait)], E-mail: ashraf.zaher@ku.edu.kw

    2009-12-15

    In this paper, a secure communication technique, using a chaotic system with a single adjustable parameter and a single observable time series, is proposed. The chosen chaotic system, which is a variant of the famous Rikitake model, has a special structure for which the adjustable parameter appears in the dynamic equation of the observable time series. This particular structure is used to build a synchronization-based state observer that is decoupled from the adaptive parameter identifier. A local Lyapunov function is used to design the parameter identifier, with an adjustable convergence rate that guarantees the stability of the overall system. A two-channel transmission method is used to exemplify the suggested technique where the secret message is encoded using a nonlinear function of both the chaotic states and the adjustable parameter of the chaotic system that acts as a secret key. Simulations show that, at the receiver, the signal can be efficiently retrieved only if the secret key is known, even when both the receiver and the transmitter are in perfect synchronization. The proposed technique is demonstrated to have improved security and privacy against intruders, when compared to other techniques reported in the literature, while being simple to implement using both analog and digital hardware. In addition, the chosen chaotic system is shown to be flexible in accommodating the transmission of signals with variable bandwidths, which promotes the superiority and versatility of the suggested secure communication technique.

  10. Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jiye Kim

    2014-04-01

    Full Text Available User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks. In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker’s own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes.

  11. An improved chaos-based secure communication technique using a novel encryption function with an embedded cipher key

    International Nuclear Information System (INIS)

    Zaher, Ashraf A.

    2009-01-01

    In this paper, a secure communication technique, using a chaotic system with a single adjustable parameter and a single observable time series, is proposed. The chosen chaotic system, which is a variant of the famous Rikitake model, has a special structure for which the adjustable parameter appears in the dynamic equation of the observable time series. This particular structure is used to build a synchronization-based state observer that is decoupled from the adaptive parameter identifier. A local Lyapunov function is used to design the parameter identifier, with an adjustable convergence rate that guarantees the stability of the overall system. A two-channel transmission method is used to exemplify the suggested technique where the secret message is encoded using a nonlinear function of both the chaotic states and the adjustable parameter of the chaotic system that acts as a secret key. Simulations show that, at the receiver, the signal can be efficiently retrieved only if the secret key is known, even when both the receiver and the transmitter are in perfect synchronization. The proposed technique is demonstrated to have improved security and privacy against intruders, when compared to other techniques reported in the literature, while being simple to implement using both analog and digital hardware. In addition, the chosen chaotic system is shown to be flexible in accommodating the transmission of signals with variable bandwidths, which promotes the superiority and versatility of the suggested secure communication technique.

  12. Construction of Monitoring Model and Algorithm Design on Passenger Security during Shipping Based on Improved Bayesian Network

    Science.gov (United States)

    Wang, Jiali; Zhang, Qingnian; Ji, Wenfeng

    2014-01-01

    A large number of data is needed by the computation of the objective Bayesian network, but the data is hard to get in actual computation. The calculation method of Bayesian network was improved in this paper, and the fuzzy-precise Bayesian network was obtained. Then, the fuzzy-precise Bayesian network was used to reason Bayesian network model when the data is limited. The security of passengers during shipping is affected by various factors, and it is hard to predict and control. The index system that has the impact on the passenger safety during shipping was established on basis of the multifield coupling theory in this paper. Meanwhile, the fuzzy-precise Bayesian network was applied to monitor the security of passengers in the shipping process. The model was applied to monitor the passenger safety during shipping of a shipping company in Hainan, and the effectiveness of this model was examined. This research work provides guidance for guaranteeing security of passengers during shipping. PMID:25254227

  13. The thermal relay design to improve power system security for the HTS cables in Icheon substation

    International Nuclear Information System (INIS)

    Lee, Hansang; Yang, Byeong-Mo; Jang, Gilsoo

    2013-01-01

    Highlights: •It is important to study thermal characteristics of the HTS cable. •The thermal relay in the Icheon substation has been developed. •Well-designed thermal relay has been verified through PSCAD/EMTDC simulations. -- Abstract: This paper proposes a model for thermal protection relay for the high temperature superconducting (HTS) cables and thermal protection scheme in Icheon substation in Korea. The thermal protection is one of the most important factors to guarantee the reliability of the HTS cable as well as power system security. The superconductivity of the HTS cables, which can be guaranteed by the liquid nitrogen near 70 K, can be threatened by the large fault current. To avoid the overheating in HTS cable and to secure the power system operation with the HTS cable, the thermal protection relay should be considered. To find the optimal thermal-protection scheme, the model for the superconducting power system has been achieved in Icheon substation and the thermal protection scheme has been verified through PSCAD/EMTDC simulation

  14. The thermal relay design to improve power system security for the HTS cables in Icheon substation

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Hansang, E-mail: hslee80@kiu.ac.kr [School of Railway and Electrical Engineering, Kyungil University, Hayang-eup, Gyeongsan-si, Gyeongsangbuk-do 712-701 (Korea, Republic of); Yang, Byeong-Mo [Korea Electric Power Research Institute, Munji-dong, Yuseong-gu, Daejeon 305-760 (Korea, Republic of); Jang, Gilsoo, E-mail: gjang@korea.ac.kr [School of Electrical Engineering, Korea University, Anam-dong 5-ga, Seongbuk-gu, Seoul 136-713 (Korea, Republic of)

    2013-11-15

    Highlights: •It is important to study thermal characteristics of the HTS cable. •The thermal relay in the Icheon substation has been developed. •Well-designed thermal relay has been verified through PSCAD/EMTDC simulations. -- Abstract: This paper proposes a model for thermal protection relay for the high temperature superconducting (HTS) cables and thermal protection scheme in Icheon substation in Korea. The thermal protection is one of the most important factors to guarantee the reliability of the HTS cable as well as power system security. The superconductivity of the HTS cables, which can be guaranteed by the liquid nitrogen near 70 K, can be threatened by the large fault current. To avoid the overheating in HTS cable and to secure the power system operation with the HTS cable, the thermal protection relay should be considered. To find the optimal thermal-protection scheme, the model for the superconducting power system has been achieved in Icheon substation and the thermal protection scheme has been verified through PSCAD/EMTDC simulation.

  15. The Role of Information Security Management Systems in Supply Chain Performance Improvement

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Taghva

    2012-02-01

    Full Text Available In recent years, the researchers have emphasized on positive effect of information system on supply chain performance such as organizational processes integration, information sharing, information technology, etc. In other hand, information security management system is one of the subjects that researches considered its effects on increase accuracy and effective information exchange, access to accurate and timely information and reduce errors of information system. Since, any research has not been done on this ground (the importance of ISMS on supply chain performance. Therefore, it was felt that a research should have done on these approaches on supply chain. In this respect, current research was seeking that how ISMS had impact on supply chain performance in automotive industry and this was the innovative aspect of this paper. So first of all, after the review of the information security management system literature, supply chain performance was considered by the balanced scorecard approach then the most important factors of these two subjects was extracted by correlation analysis. In this way, it was considered that how ISMS had impact on supply chain performance by correlation analysis. The results showed that different dimensions of ISMS (information uniformity, prevent the human and machine mistake, information be accuracy, and rectitude and instruction for users had impact on four dimensions of supply chain performance (customers, financial, internal processes and learning and growth in three levels (strategic, technical, and operational in supply chain. At the end, it was showed that ISMS lays the ground for increase supply chain performance.

  16. Performance of the Sellick maneuver significantly improves when residents and trained nurses use a visually interactive guidance device in simulation

    International Nuclear Information System (INIS)

    Connor, Christopher W; Saffary, Roya; Feliz, Eddy

    2013-01-01

    We examined the proper performance of the Sellick maneuver, a maneuver used to reduce the risk of aspiration of stomach contents during induction of general anesthesia, using a novel device that measures and visualizes the force applied to the cricoid cartilage using thin-film force sensitive resistors in a form suitable for in vivo use. Performance was tested in three stages with twenty anaesthesiology residents and twenty trained operating room nurses. Firstly, subjects applied force to the cricoid cartilage as was customary to them. Secondly, subjects used the device to guide the application of that force. Thirdly, subjects were again asked to perform the manoeuvre without visual guidance. Each test lasted 1 min and the amount of force applied was measured throughout. Overall, the Sellick maneuver was often not applied properly, with large variance between individual subjects. Performance and inter-subject consistency improved to a very highly significant degree when subjects were able to use the device as a visual guide (p < 0.001). Subsequent significant improvements in performances during the last, unguided test demonstrated that the device initiated learning. (paper)

  17. Performance of the Sellick maneuver significantly improves when residents and trained nurses use a visually interactive guidance device in simulation

    Energy Technology Data Exchange (ETDEWEB)

    Connor, Christopher W; Saffary, Roya; Feliz, Eddy [Department of Anesthesiology Boston Medical Center, Boston, MA (United States)

    2013-12-15

    We examined the proper performance of the Sellick maneuver, a maneuver used to reduce the risk of aspiration of stomach contents during induction of general anesthesia, using a novel device that measures and visualizes the force applied to the cricoid cartilage using thin-film force sensitive resistors in a form suitable for in vivo use. Performance was tested in three stages with twenty anaesthesiology residents and twenty trained operating room nurses. Firstly, subjects applied force to the cricoid cartilage as was customary to them. Secondly, subjects used the device to guide the application of that force. Thirdly, subjects were again asked to perform the manoeuvre without visual guidance. Each test lasted 1 min and the amount of force applied was measured throughout. Overall, the Sellick maneuver was often not applied properly, with large variance between individual subjects. Performance and inter-subject consistency improved to a very highly significant degree when subjects were able to use the device as a visual guide (p < 0.001). Subsequent significant improvements in performances during the last, unguided test demonstrated that the device initiated learning. (paper)

  18. Improving the security of chaotic encryption by using a simple modulating method

    International Nuclear Information System (INIS)

    Bu Shouliang; Wang Binghong

    2004-01-01

    In recent years, synchronization of chaotic systems has aroused much interest due to its potential application to secure communications. However, it is found by Perez and Cerdeira that an intruder, without the knowledge of the parameters of the system or even of the nonlinear system itself, may extract the messages from the carrier signal by producing a return map where the dynamics is attracted to an almost 1D set. To eliminate the weakness, in this letter, a simple but efficient method for synchronizing chaotic systems by modulating the transmitted signal with an appropriately choosing scalar signal is proposed. It turns out that this modulating strategy not only preserves all appropriate information required for synchronizing chaotic systems but also destroys the possibility of the phase space reconstruction of the sender dynamics such as a return map

  19. Current and potential cyber attacks on medical journals; guidelines for improving security.

    Science.gov (United States)

    Dadkhah, Mehdi; Seno, Seyed Amin Hosseini; Borchardt, Glenn

    2017-03-01

    At the moment, scholarly publishing is faced with much academic misconduct and threats such as predatory journals, hijacked journals, phishing, and other scams. In response, we have been discussing this misconduct and trying to increase the awareness of researchers, but it seems that there is a lack of research that presents guidelines for editors to help them protect themselves against these threats. It seems that information security is missing in some parts of scholarly publishing that particularly involves medical journals. In this paper, we explain different types of cyber-attacks that especially threaten editors and academic journals. We then explain the details involved in each type of attack. Finally, we present general guidelines for detection and prevention of the attacks. In some cases, we use small experiments to show that our claim is true. Finally, we conclude the paper with a prioritization of these attacks. Copyright © 2016 European Federation of Internal Medicine. Published by Elsevier B.V. All rights reserved.

  20. Combination of blood tests for significant fibrosis and cirrhosis improves the assessment of liver-prognosis in chronic hepatitis C.

    Science.gov (United States)

    Boursier, J; Brochard, C; Bertrais, S; Michalak, S; Gallois, Y; Fouchard-Hubert, I; Oberti, F; Rousselet, M-C; Calès, P

    2014-07-01

    Recent longitudinal studies have emphasised the prognostic value of noninvasive tests of liver fibrosis and cross-sectional studies have shown their combination significantly improves diagnostic accuracy. To compare the prognostic accuracy of six blood fibrosis tests and liver biopsy, and evaluate if test combination improves the liver-prognosis assessment in chronic hepatitis C (CHC). A total of 373 patients with compensated CHC, liver biopsy (Metavir F) and blood tests targeting fibrosis (APRI, FIB4, Fibrotest, Hepascore, FibroMeter) or cirrhosis (CirrhoMeter) were included. Significant liver-related events (SLRE) and liver-related deaths were recorded during follow-up (started the day of biopsy). During the median follow-up of 9.5 years (3508 person-years), 47 patients had a SLRE and 23 patients died from liver-related causes. For the prediction of first SLRE, most blood tests allowed higher prognostication than Metavir F [Harrell C-index: 0.811 (95% CI: 0.751-0.868)] with a significant increase for FIB4: 0.879 [0.832-0.919] (P = 0.002), FibroMeter: 0.870 [0.812-0.922] (P = 0.005) and APRI: 0.861 [0.813-0.902] (P = 0.039). Multivariate analysis identified FibroMeter, CirrhoMeter and sustained viral response as independent predictors of first SLRE. CirrhoMeter was the only independent predictor of liver-related death. The combination of FibroMeter and CirrhoMeter classifications into a new FM/CM classification improved the liver-prognosis assessment compared to Metavir F staging or single tests by identifying five subgroups of patients with significantly different prognoses. Some blood fibrosis tests are more accurate than liver biopsy for determining liver prognosis in CHC. A new combination of two complementary blood tests, one targeted for fibrosis and the other for cirrhosis, optimises assessment of liver-prognosis. © 2014 John Wiley & Sons Ltd.

  1. 76 FR 63811 - Structural Reforms To Improve the Security of Classified Networks and the Responsible Sharing and...

    Science.gov (United States)

    2011-10-13

    ... implementation of policies and minimum standards regarding information security, personnel security, and systems security; address both internal and external security threats and vulnerabilities; and provide policies and... policies and minimum standards will address all agencies that operate or access classified computer...

  2. Induction Based Training leads to Highly Significant Improvements of Objective and Subjective Suturing Ability in Junior Doctors

    Directory of Open Access Journals (Sweden)

    Kevin Garry

    2018-03-01

    Full Text Available Background: Simulation based training has shown to be of benefit in the education of medical students. However, the impact of induction based clinical simulation on surgical ability of qualified doctors remains unclear.The aim of this study was to establish if a 60 minute teaching session integrated into an Emergency Medicine speciality induction program produces statistically significant improvements in objective and subjective suturing abilities of junior doctors commencing an Emergency Medicine rotation.Methods: The objective suturing abilities of 16 Foundation Year Two doctors were analysed using a validated OSATs scale prior to a novel teaching intervention. The doctors then undertook an intensive hour long workshop receiving one to one feedback before undergoing repeat OSATs assessment.Subjective ability was measured using a 5 point likert scale and self-assessed competency reporting interrupted suturing before and after the intervention. Photographs of wound closure before and after the intervention were recorded for further blinded assessment of impact of intervention. A survey regarding continued ability was repeated at four months following the intervention. The study took place on 7/12/16 during the Belfast Health and Social Care Trust Emergency Medicine induction in the Royal Victoria Hospital Belfast. The hospital is a regional level 1 trauma centre that has annual departmental attendances in excess of 200,000.All new junior doctors commencing the Emergency Medicine rotation were invited to partake in the study. All 16 agreed. The group consisted of a mixture of undergraduate and postgraduate medicaldoctors who all had 16 months experience working in a variety of medical or surgical jobs previously.Results: Following the teaching intervention objective and subjective abilities in interrupted suturing showed statistically significant improvement (P>0.005. Self-reporting of competency of independently suturingwounds improved from 50

  3. The European Academy laparoscopic “Suturing Training and Testing’’ (SUTT) significantly improves surgeons’ performance

    Science.gov (United States)

    Sleiman, Z.; Tanos, V.; Van Belle, Y.; Carvalho, J.L.; Campo, R.

    2015-01-01

    The efficiency of suturing training and testing (SUTT) model by laparoscopy was evaluated, measuring the suturingskill acquisition of trainee gynecologists at the beginning and at the end of a teaching course. During a workshop organized by the European Academy of Gynecological Surgery (EAGS), 25 participants with three different experience levels in laparoscopy (minor, intermediate and major) performed the 4 exercises of the SUTT model (Ex 1: both hands stitching and continuous suturing, Ex 2: right hand stitching and intracorporeal knotting, Ex 3: left hand stitching and intracorporeal knotting, Ex 4: dominant hand stitching, tissue approximation and intracorporeal knotting). The time needed to perform the exercises is recorded for each trainee and group and statistical analysis used to note the differences. Overall, all trainees achieved significant improvement in suturing time (p psychomotor skills, surgery, teaching, training suturing model. PMID:26977264

  4. High-intensity interval training (swimming) significantly improves the adverse metabolism and comorbidities in diet-induced obese mice.

    Science.gov (United States)

    Motta, Victor F; Aguila, Marcia B; Mandarim-DE-Lacerda, Carlos A

    2016-05-01

    Controlling obesity and other comorbidities in the population is a challenge in modern society. High-intensity interval training (HIIT) combines short periods of high-intensity exercise with long recovery periods or a low-intensity exercise. The aim was to assess the impact of HIIT in the context of diet-induced obesity in the animal model. C57BL/6 mice were fed one of the two diets: standard chow (lean group [LE]) or a high-fat diet (obese group [OB]). After twelve weeks, the animals were divided into non-trained groups (LE-NT and OB-NT) and trained groups (LE-T and OB-T), and began an exercise protocol. For biochemical analysis of inflammatory and lipid profile, we used a colorimetric enzymatic method and an automatic spectrophotometer. One-way ANOVA was used for statistical analysis of the experimental groups with Holm-Sidak post-hoc Test. Two-way ANOVA analyzed the interactions between diet and HIIT protocol. HIIT leads to significant reductions in body mass, blood glucose, glucose tolerance and hepatic lipid profile in T-groups compared to NT-groups. HIIT was able to reduce plasma levels of inflammatory cytokines. Additionally, HIIT improves the insulin immunodensity in the islets, reduces the adiposity and the hepatic steatosis in the T-groups. HIIT improves beta-oxidation and peroxisome proliferator-activated receptor (PPAR)-alpha and reduces lipogenesis and PPAR-gamma levels in the liver. In skeletal muscle, HIIT improves PPAR-alpha and glucose transporter-4 and reduces PPAR-gamma levels. HIIT leads to attenuate the adverse effects caused by a chronic ingestion of a high-fat diet.

  5. Codon Optimization Significantly Improves the Expression Level of α-Amylase Gene from Bacillus licheniformis in Pichia pastoris

    Directory of Open Access Journals (Sweden)

    Jian-Rong Wang

    2015-01-01

    Full Text Available α-Amylase as an important industrial enzyme has been widely used in starch processing, detergent, and paper industries. To improve expression efficiency of recombinant α-amylase from Bacillus licheniformis (B. licheniformis, the α-amylase gene from B. licheniformis was optimized according to the codon usage of Pichia pastoris (P. pastoris and expressed in P. pastoris. Totally, the codons encoding 305 amino acids were optimized in which a total of 328 nucleotides were changed and the G+C content was increased from 47.6 to 49.2%. The recombinants were cultured in 96-deep-well microplates and screened by a new plate assay method. Compared with the wild-type gene, the optimized gene is expressed at a significantly higher level in P. pastoris after methanol induction for 168 h in 5- and 50-L bioreactor with the maximum activity of 8100 and 11000 U/mL, which was 2.31- and 2.62-fold higher than that by wild-type gene. The improved expression level makes the enzyme a good candidate for α-amylase production in industrial use.

  6. Control system security in nuclear power plant

    International Nuclear Information System (INIS)

    Li Jianghai; Huang Xiaojin

    2012-01-01

    The digitalization and networking of control systems in nuclear power plants has brought significant improvements in system control, operation and maintenance. However, the highly digitalized control system also introduces additional security vulnerabilities. Moreover, the replacement of conventional proprietary systems with common protocols, software and devices makes these vulnerabilities easy to be exploited. Through the interaction between control systems and the physical world, security issues in control systems impose high risks on health, safety and environment. These security issues may even cause damages of critical infrastructures and threaten national security. The importance of control system security by reviewing several control system security incidents that happened in nuclear power plants was showed in recent years. Several key difficulties in addressing these security issues were described. Finally, existing researches on control system security and propose several promising research directions were reviewed. (authors)

  7. The application of multiloop diagnostics model to assess and improve the economic security of enterprises

    Directory of Open Access Journals (Sweden)

    Pluzhnikov Vladimir

    2017-01-01

    Full Text Available The author’s research is dedicated to the enhancement of the level of the enterprise economic safety. This task involves developing the concept of an integrated system for early prevention of dangers and threats of business activity, substantiation of procedures for regulating the activities of the enterprise in accordance with the changing external and internal factors. Multiloop diagnostics model is proposed to identify causal relations of management dysfunction. It allows you to receive an adequate assessment of the basic parameters of activity of the enterprise and accurately identify its status. Researching problems of economic safety of the enterprise such diagnostic methods as economic and logical analysis, statistical monitoring and strategic management were applied. There was made a conclusion that a qualitative assessment is a key tool of the level assessment of the enterprise economic safety, its control, and monitoring. It allows you to get reliable information about the real possibilities of the enterprise at different stages of development, to monitor and evaluate the level of economic security, find effective solutions to transition to a higher level of economic safety of the enterprise.

  8. Neoindustrialization as a factor in improving economic security of old-industrial regions

    Directory of Open Access Journals (Sweden)

    Ol’ga Aleksandrovna Romanova

    2012-06-01

    Full Text Available This paper proves that the paradigm of the world of the XXIcentury is neoindustrialization on the basis of alternativestrategic goals of the global economy associated with the formation of post-industrial society and financialization neoindustrialization. A systematic proposal for the driving forces and mechanisms for its implementation is suggested. It is shown that target-oriented approach can be successfully used at the regional level as a mechanism for economic neoindustrialization of an old-industrial region. Conceptual approach to developing comprehensive program of industrial development in the industrial region that implements the ideas of neoindustrialization in relation to industry of Sverdlovsk region is presented. It was found that the regional technology platform can be an effective tool for combining the interests of territorial and sectoral development. It is proved that the idea of neoindustrialization can be realized only as a result of wise industrial policy and road map formation for the movement to an entirely new high-tech based industrial development. In the process of forming, the problem of neoindustrialization of a «pure» market as a factor in increasing the economic security is actualized.

  9. Image Steganography In Securing Sound File Using Arithmetic Coding Algorithm, Triple Data Encryption Standard (3DES) and Modified Least Significant Bit (MLSB)

    Science.gov (United States)

    Nasution, A. B.; Efendi, S.; Suwilo, S.

    2018-04-01

    The amount of data inserted in the form of audio samples that use 8 bits with LSB algorithm, affect the value of PSNR which resulted in changes in image quality of the insertion (fidelity). So in this research will be inserted audio samples using 5 bits with MLSB algorithm to reduce the number of data insertion where previously the audio sample will be compressed with Arithmetic Coding algorithm to reduce file size. In this research will also be encryption using Triple DES algorithm to better secure audio samples. The result of this research is the value of PSNR more than 50dB so it can be concluded that the image quality is still good because the value of PSNR has exceeded 40dB.

  10. Complete Au@ZnO core-shell nanoparticles with enhanced plasmonic absorption enabling significantly improved photocatalysis

    Science.gov (United States)

    Sun, Yiqiang; Sun, Yugang; Zhang, Tao; Chen, Guozhu; Zhang, Fengshou; Liu, Dilong; Cai, Weiping; Li, Yue; Yang, Xianfeng; Li, Cuncheng

    2016-05-01

    Nanostructured ZnO exhibits high chemical stability and unique optical properties, representing a promising candidate among photocatalysts in the field of environmental remediation and solar energy conversion. However, ZnO only absorbs the UV light, which accounts for less than 5% of total solar irradiation, significantly limiting its applications. In this article, we report a facile and efficient approach to overcome the poor wettability between ZnO and Au by carefully modulating the surface charge density on Au nanoparticles (NPs), enabling rapid synthesis of Au@ZnO core-shell NPs at room temperature. The resulting Au@ZnO core-shell NPs exhibit a significantly enhanced plasmonic absorption in the visible range due to the Au NP cores. They also show a significantly improved photocatalytic performance in comparison with their single-component counterparts, i.e., the Au NPs and ZnO NPs. Moreover, the high catalytic activity of the as-synthesized Au@ZnO core-shell NPs can be maintained even after many cycles of photocatalytic reaction. Our results shed light on the fact that the Au@ZnO core-shell NPs represent a promising class of candidates for applications in plasmonics, surface-enhanced spectroscopy, light harvest devices, solar energy conversion, and degradation of organic pollutants.Nanostructured ZnO exhibits high chemical stability and unique optical properties, representing a promising candidate among photocatalysts in the field of environmental remediation and solar energy conversion. However, ZnO only absorbs the UV light, which accounts for less than 5% of total solar irradiation, significantly limiting its applications. In this article, we report a facile and efficient approach to overcome the poor wettability between ZnO and Au by carefully modulating the surface charge density on Au nanoparticles (NPs), enabling rapid synthesis of Au@ZnO core-shell NPs at room temperature. The resulting Au@ZnO core-shell NPs exhibit a significantly enhanced plasmonic

  11. Combat-related intradural gunshot wound to the thoracic spine: significant improvement and neurologic recovery following bullet removal.

    Science.gov (United States)

    Louwes, Thijs M; Ward, William H; Lee, Kendall H; Freedman, Brett A

    2015-02-01

    The vast majority of combat-related penetrating spinal injuries from gunshot wounds result in severe or complete neurological deficit. Treatment is based on neurological status, the presence of cerebrospinal fluid (CSF) fistulas, and local effects of any retained fragment(s). We present a case of a 46-year-old male who sustained a spinal gunshot injury from a 7.62-mm AK-47 round that became lodged within the subarachnoid space at T9-T10. He immediately suffered complete motor and sensory loss. By 24-48 hours post-injury, he had recovered lower extremity motor function fully but continued to have severe sensory loss (posterior cord syndrome). On post-injury day 2, he was evacuated from the combat theater and underwent a T9 laminectomy, extraction of the bullet, and dural laceration repair. At surgery, the traumatic durotomy was widened and the bullet, which was laying on the dorsal surface of the spinal cord, was removed. The dura was closed in a water-tight fashion and fibrin glue was applied. Postoperatively, the patient made a significant but incomplete neurological recovery. His stocking-pattern numbness and sub-umbilical searing dysthesia improved. The spinal canal was clear of the foreign body and he had no persistent CSF leak. Postoperative magnetic resonance imaging of the spine revealed contusion of the spinal cord at the T9 level. Early removal of an intra-canicular bullet in the setting of an incomplete spinal cord injury can lead to significant neurological recovery following even high-velocity and/or high-caliber gunshot wounds. However, this case does not speak to, and prior experience does not demonstrate, significant neurological benefit in the setting of a complete injury.

  12. Prostate health index (phi) and prostate cancer antigen 3 (PCA3) significantly improve diagnostic accuracy in patients undergoing prostate biopsy.

    Science.gov (United States)

    Perdonà, Sisto; Bruzzese, Dario; Ferro, Matteo; Autorino, Riccardo; Marino, Ada; Mazzarella, Claudia; Perruolo, Giuseppe; Longo, Michele; Spinelli, Rosa; Di Lorenzo, Giuseppe; Oliva, Andrea; De Sio, Marco; Damiano, Rocco; Altieri, Vincenzo; Terracciano, Daniela

    2013-02-15

    Prostate health index (phi) and prostate cancer antigen 3 (PCA3) have been recently proposed as novel biomarkers for prostate cancer (PCa). We assessed the diagnostic performance of these biomarkers, alone or in combination, in men undergoing first prostate biopsy for suspicion of PCa. One hundred sixty male subjects were enrolled in this prospective observational study. PSA molecular forms, phi index (Beckman coulter immunoassay), PCA3 score (Progensa PCA3 assay), and other established biomarkers (tPSA, fPSA, and %fPSA) were assessed before patients underwent a 18-core first prostate biopsy. The discriminating ability between PCa-negative and PCa-positive biopsies of Beckman coulter phi and PCA3 score and other used biomarkers were determined. One hundred sixty patients met inclusion criteria. %p2PSA (p2PSA/fPSA × 100), phi and PCA3 were significantly higher in patients with PCa compared to PCa-negative group (median values: 1.92 vs. 1.55, 49.97 vs. 36.84, and 50 vs. 32, respectively, P ≤ 0.001). ROC curve analysis showed that %p2PSA, phi, and PCA3 are good indicator of malignancy (AUCs = 0.68, 0.71, and 0.66, respectively). A multivariable logistic regression model consisting of both the phi index and PCA3 score allowed to reach an overall diagnostic accuracy of 0.77. Decision curve analysis revealed that this "combined" marker achieved the highest net benefit over the examined range of the threshold probability. phi and PCA3 showed no significant difference in the ability to predict PCa diagnosis in men undergoing first prostate biopsy. However, diagnostic performance is significantly improved by combining phi and PCA3. Copyright © 2012 Wiley Periodicals, Inc.

  13. Improving barley culm robustness for secured crop yield in a changing climate.

    Science.gov (United States)

    Dockter, Christoph; Hansson, Mats

    2015-06-01

    The Green Revolution combined advancements in breeding and agricultural practice, and provided food security to millions of people. Daily food supply is still a major issue in many parts of the world and is further challenged by future climate change. Fortunately, life science research is currently making huge progress, and the development of future crop plants will be explored. Today, plant breeding typically follows one gene per trait. However, new scientific achievements have revealed that many of these traits depend on different genes and complex interactions of proteins reacting to various external stimuli. These findings open up new possibilities for breeding where variations in several genes can be combined to enhance productivity and quality. In this review we present an overview of genes determining plant architecture in barley, with a special focus on culm length. Many genes are currently known only through their mutant phenotypes, but emerging genomic sequence information will accelerate their identification. More than 1000 different short-culm barley mutants have been isolated and classified in different phenotypic groups according to culm length and additional pleiotropic characters. Some mutants have been connected to deficiencies in biosynthesis and reception of brassinosteroids and gibberellic acids. Still other mutants are unlikely to be connected to these hormones. The genes and corresponding mutations are of potential interest for development of stiff-straw crop plants tolerant to lodging, which occurs in extreme weather conditions with strong winds and heavy precipitation. © The Author 2015. Published by Oxford University Press on behalf of the Society for Experimental Biology. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  14. Waste management to improve food safety and security for health advancement.

    Science.gov (United States)

    Lin, Angela Yu-Chen; Huang, Susana Tzy-Ying; Wahlqvist, Mark L

    2009-01-01

    Economic growth inevitably influences the food chain. Growing demand with changes in lifestyle and health consciousness encourage use of packaged and pre-prepared foods. The needs of environmental protection from waste generated are largely overlooked, and a lack of knowledge about the impact on the environment and its health effects constitute food security/safety problems. Food production and waste generation directly affect resource (i.e., energy and water) consumption and often contaminate the environment. More pressure on food production has inculcated the use of pesticides, herbicides, antibiotics and chemical fertilizers which add to current global pollution. At least half of food grown is discarded before and after it reaches consumers. It is estimated that one third to half of landfill waste comes from the food sector. This landfill releases green house gases (GHG) as well as leachate which worsen soil and water quality and safety. Pharmaceutical and chemical contaminations from residential, industrial and agricultural sources make their way into nearby water and soil and can eventually affect our food systems. Phthalates, PFOA, BPA, commonly used in plastics and personal care products, are found in unacceptable concentrations in Taiwanese waters. They, too, contribute to food contamination and long-term health risk. Existing waste management strategies warrant more stringent norms for waste reduction at source. Awareness through education could reduce food waste and its consequences. This review encompasses impacts of food production systems on the environment, pollution which results from food waste, costs and economic advantages in food waste management, and health consequences of waste.

  15. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  16. Security and gain improvement of a practical quantum key distribution using a gated single-photon source and probabilistic photon-number resolution

    International Nuclear Information System (INIS)

    Horikiri, Tomoyuki; Sasaki, Hideki; Wang, Haibo; Kobayashi, Takayoshi

    2005-01-01

    We propose a high security quantum key distribution (QKD) scheme utilizing one mode of spontaneous parametric downconversion gated by a photon number resolving detector. This photon number measurement is possible by using single-photon detectors operating at room temperature and optical fibers. By post selection, the multiphoton probability in this scheme can be reduced to lower than that of a scheme using an attenuated coherent light resulting in improvement of security. Furthermore, if distillation protocol (error correction and privacy amplification) is performed, the gain will be increased. Hence a QKD system with higher security and bit rate than the laser-based QKD system can be attained using present available technologies

  17. Improving Deterministic Reserve Requirements for Security Constrained Unit Commitment and Scheduling Problems in Power Systems

    Science.gov (United States)

    Wang, Fengyu

    Traditional deterministic reserve requirements rely on ad-hoc, rule of thumb methods to determine adequate reserve in order to ensure a reliable unit commitment. Since congestion and uncertainties exist in the system, both the quantity and the location of reserves are essential to ensure system reliability and market efficiency. The modeling of operating reserves in the existing deterministic reserve requirements acquire the operating reserves on a zonal basis and do not fully capture the impact of congestion. The purpose of a reserve zone is to ensure that operating reserves are spread across the network. Operating reserves are shared inside each reserve zone, but intra-zonal congestion may block the deliverability of operating reserves within a zone. Thus, improving reserve policies such as reserve zones may improve the location and deliverability of reserve. As more non-dispatchable renewable resources are integrated into the grid, it will become increasingly difficult to predict the transfer capabilities and the network congestion. At the same time, renewable resources require operators to acquire more operating reserves. With existing deterministic reserve requirements unable to ensure optimal reserve locations, the importance of reserve location and reserve deliverability will increase. While stochastic programming can be used to determine reserve by explicitly modelling uncertainties, there are still scalability as well as pricing issues. Therefore, new methods to improve existing deterministic reserve requirements are desired. One key barrier of improving existing deterministic reserve requirements is its potential market impacts. A metric, quality of service, is proposed in this thesis to evaluate the price signal and market impacts of proposed hourly reserve zones. Three main goals of this thesis are: 1) to develop a theoretical and mathematical model to better locate reserve while maintaining the deterministic unit commitment and economic dispatch

  18. Lipid Replacement Therapy Drink Containing a Glycophospholipid Formulation Rapidly and Significantly Reduces Fatigue While Improving Energy and Mental Clarity

    Directory of Open Access Journals (Sweden)

    Robert Settineri

    2011-08-01

    Full Text Available Background: Fatigue is the most common complaint of patients seeking general medical care and is often treated with stimulants. It is also important in various physical activities of relatively healthy men and women, such as sports performance. Recent clinical trials using patients with chronic fatigue have shown the benefit of Lipid Replacement Therapy in restoring mitochondrial electron transport function and reducing moderate to severe chronic fatigue. Methods: Lipid Replacement Therapy was administered for the first time as an all-natural functional food drink (60 ml containing polyunsaturated glycophospholipids but devoid of stimulants or herbs to reduce fatigue. This preliminary study used the Piper Fatigue Survey instrument as well as a supplemental questionnaire to assess the effects of the glycophospholipid drink on fatigue and the acceptability of the test drink in adult men and women. A volunteer group of 29 subjects of mean age 56.2±4.5 years with various fatigue levels were randomly recruited in a clinical health fair setting to participate in an afternoon open label trial on the effects of the test drink. Results: Using the Piper Fatigue instrument overall fatigue among participants was reduced within the 3-hour seminar by a mean of 39.6% (p<0.0001. All of the subcategories of fatigue showed significant reductions. Some subjects responded within 15 minutes, and the majority responded within one hour with increased energy and activity and perceived improvements in cognitive function, mental clarity and focus. The test drink was determined to be quite acceptable in terms of taste and appearance. There were no adverse events from the energy drink during the study.Functional Foods in Health and Disease 2011; 8:245-254Conclusions: The Lipid Replacement Therapy functional food drink appeared to be a safe, acceptable and potentially useful new method to reduce fatigue, sustain energy and improve perceptions of mental function.

  19. A matter of timing: identifying significant multi-dose radiotherapy improvements by numerical simulation and genetic algorithm search.

    Directory of Open Access Journals (Sweden)

    Simon D Angus

    -effecitive means of significantly improving clinical efficacy.

  20. A matter of timing: identifying significant multi-dose radiotherapy improvements by numerical simulation and genetic algorithm search.

    Science.gov (United States)

    Angus, Simon D; Piotrowska, Monika Joanna

    2014-01-01

    of significantly improving clinical efficacy.

  1. Tanzanian farmers' knowledge and attitudes to GM biotechnology and the potential use of GM crops to provide improved levels of food security. A Qualitative Study

    Directory of Open Access Journals (Sweden)

    Herron Caroline M

    2010-07-01

    Full Text Available Abstract Background Genetically Modified (GM crops have been championed as one possible method to improve food security and individual nutritional status in sub Saharan Africa. Understanding and acceptability of GM crop technology to farmers and consumers have not been assessed. We developed a qualitative research study involving farmers as both producers and consumers to gauge the understanding of GM crop technology, its acceptability, and identifying issues of concern. Methods Nineteen individual interviews (10 male and 9 female and five mixed gender focus group discussions with local farmers were conducted in 3 regions in Tanzania. Analysis took place concurrently with data collection. Following initial interviews, subsequent questions were adjusted based on emerging themes. Results Understanding, awareness and knowledge of GM crop technology and terminology and its potential risks and benefits was very poor in all regions. Receptivity to the potential use of GM crops was, however, high. Respondents focused on the potential benefits of GM crops rather than any potential longer term health risks. A number of factors, most significantly field trial data, would influence farmers' decisions regarding the introduction of GM crop varieties into their farming practice. Understanding of the potential improved health provision possible by changes in agricultural practice and food-related decision making, and the health benefits of a diet containing essential vitamins, minerals and micronutrients is also poor in these communities. Conclusion This study forms a basis from which further research work can be undertaken. It is important to continue to assess opinions and attitudes of farmers and consumers in sub Saharan Africa towards potential use of GM technologies whilst highlighting the importance of the relationship between agriculture, health and development. This will allow people in the region to make accurate, informed decisions about whether they

  2. Tanzanian farmers' knowledge and attitudes to GM biotechnology and the potential use of GM crops to provide improved levels of food security. A Qualitative Study.

    Science.gov (United States)

    Lewis, Christopher P; Newell, James N; Herron, Caroline M; Nawabu, Haidari

    2010-07-12

    Genetically Modified (GM) crops have been championed as one possible method to improve food security and individual nutritional status in sub Saharan Africa. Understanding and acceptability of GM crop technology to farmers and consumers have not been assessed. We developed a qualitative research study involving farmers as both producers and consumers to gauge the understanding of GM crop technology, its acceptability, and identifying issues of concern. Nineteen individual interviews (10 male and 9 female) and five mixed gender focus group discussions with local farmers were conducted in 3 regions in Tanzania. Analysis took place concurrently with data collection. Following initial interviews, subsequent questions were adjusted based on emerging themes. Understanding, awareness and knowledge of GM crop technology and terminology and its potential risks and benefits was very poor in all regions. Receptivity to the potential use of GM crops was, however, high. Respondents focused on the potential benefits of GM crops rather than any potential longer term health risks. A number of factors, most significantly field trial data, would influence farmers' decisions regarding the introduction of GM crop varieties into their farming practice. Understanding of the potential improved health provision possible by changes in agricultural practice and food-related decision making, and the health benefits of a diet containing essential vitamins, minerals and micronutrients is also poor in these communities. This study forms a basis from which further research work can be undertaken. It is important to continue to assess opinions and attitudes of farmers and consumers in sub Saharan Africa towards potential use of GM technologies whilst highlighting the importance of the relationship between agriculture, health and development. This will allow people in the region to make accurate, informed decisions about whether they believe use of GM biotechnology is an appropriate way in which

  3. Report: EPA’s Information Security Program Is Established, but Improvements Are Needed to Strengthen Its Processes

    Science.gov (United States)

    Report #18-P-0031, October 30, 2017. Although the EPA has an effective information security program, management emphasis is needed to achieve a higher level of maturity for the agency’s information security program.

  4. Analysis of different power grid segmentation and transmission schemes for power system security improvement

    International Nuclear Information System (INIS)

    Shami, U.T.; Chaudhary, M.S.

    2015-01-01

    This paper explores the power grid segmentation concept for power system stability improvement in detail. First, the firewall property of grid segmentation is investigated for a two area network. Then two HVDC technologies, LCC and VSC, are compared for the same network. A two area VSC-AC segmented network is then compared with two area VSC segmented network. Suitable segmentation topology and suitable number of VSC segmented areas are then investigated. Simulation results show that grid segmentation offers network stability during fault conditions and VSC is the most suitable choice for segmentation over LCC. Results further show that having large number of DC segmented areas and using the radial segmentation topology improves the stability of the overall system. All the simulations were carried out in PSS at the rate E software provided by SIEMENS discussed. Section IV discusses the test systems under study in this research. Section V compares and analyzes the simulation results. Section VI contains the conclusion. (author)

  5. Flavonol-rich dark cocoa significantly decreases plasma endothelin-1 and improves cognitive responses in urban children.

    Directory of Open Access Journals (Sweden)

    Lilian eCalderon-Garciduenas

    2013-08-01

    Full Text Available Air pollution exposures are linked to systemic inflammation, cardiovascular and respiratory morbidity and mortality, neuroinflammation and neuropathology in young urbanites. In particular, most Mexico City Metropolitan Area (MCMA children exhibit subtle cognitive deficits, and neuropathology studies show 40% of them exhibiting frontal tau hyperphosphorylation and 51% amyloid-β diffuse plaques (compared to 0% in low pollution control children. We assessed whether a short cocoa intervention can be effective in decreasing plasma endothelin 1 (ET-1 and/or inflammatory mediators in MCMA children. Thirty g of dark cocoa with 680 mg of total flavonols were given daily for 10.11± 3.4 days (range 9 to 24 days to 18 children (10.55yrs, SD =1.45; 11F/7M. Key metabolite ratios in frontal white matter and in hippocampus pre and during cocoa intervention were quantified by magnetic resonance spectroscopy. ET-1 significantly decreased after cocoa treatment (p=0.0002. Fifteen children (83% showed a marginally significant individual improvement in one or both of the applied simple short memory tasks. Endothelial dysfunction is a key feature of exposure to particulate matter and decreased endothelin-1 bioavailability is likely useful for brain function in the context of air pollution. Our findings suggest that cocoa interventions may be critical for early implementation of neuroprotection of highly exposed urban children. Multi-domain nutraceutical interventions could limit the risk for endothelial dysfunction, cerebral hypoperfusion, neuroinflammation, cognitive deficits, structural volumetric detrimental brain effects, and the early development of the neuropathological hallmarks of Alzheimer’s and Parkinson’s diseases.

  6. Improving Student Engagement in the Study of Professional Ethics: Concepts and an Example in Cyber Security

    OpenAIRE

    Bustard, John D.

    2017-01-01

    In spite of the acknowledged importance of professional ethics, technical students often show little enthusiasm for studying the subject. This paper considers how such engagement might be improved. Four guiding principles for promoting engagement are identified: (1) aligning teaching content with student interests; (2) taking a pragmatic rather than a philosophical approach to issue resolution; (3) addressing the full complexity of real-world case studies; and (4) covering content in a way th...

  7. Flexible deep-ultraviolet light-emitting diodes for significant improvement of quantum efficiencies by external bending

    KAUST Repository

    Shervin, Shahab; Oh, Seung Kyu; Park, Hyun Jung; Lee, Keon Hwa; Asadirad, Mojtaba; Kim, Seung Hwan; Kim, Jeomoh; Pouladi, Sara; Lee, Sung-Nam; Li, Xiaohang; Kwak, Joon-Seop; Ryou, Jae-Hyun

    2018-01-01

    Deep ultraviolet (DUV) light at the wavelength range of 250‒280 nm (UVC spectrum) is essential for numerous applications such as sterilization, purification, sensing, and communication. III-nitride-based DUV light-emitting diodes (DUV LEDs), like other solid-state lighting sources, offer a great potential to replace the conventional gas-discharged lamps with short lifetimes and toxic-element-bearing nature. However, unlike visible LEDs, the DUV LEDs are still suffering from low quantum efficiencies (QEs) and low optical output powers. In this work, reported is a new route to improve QEs of AlGaN-based DUV LEDs using mechanical flexibility of recently developed bendable thin-film structures. Numerical studies show that electronic band structures of AlGaN heterostructures and resulting optical and electrical characteristics of the devices can be significantly modified by external bending through active control of piezoelectric polarization. Internal quantum efficiency (IQE) is enhanced higher than three times, when the DUV LEDs are moderately bent to induce in-plane compressive strain in the heterostructure. Furthermore, efficiency droop at high injection currents is mitigated and turn-on voltage of diodes decreases with the same bending condition. The concept of bendable DUV LEDs with a controlled external strain can provide a new path for high-output-power and high-efficiency devices.

  8. Flexible deep-ultraviolet light-emitting diodes for significant improvement of quantum efficiencies by external bending

    KAUST Repository

    Shervin, Shahab

    2018-01-26

    Deep ultraviolet (DUV) light at the wavelength range of 250‒280 nm (UVC spectrum) is essential for numerous applications such as sterilization, purification, sensing, and communication. III-nitride-based DUV light-emitting diodes (DUV LEDs), like other solid-state lighting sources, offer a great potential to replace the conventional gas-discharged lamps with short lifetimes and toxic-element-bearing nature. However, unlike visible LEDs, the DUV LEDs are still suffering from low quantum efficiencies (QEs) and low optical output powers. In this work, reported is a new route to improve QEs of AlGaN-based DUV LEDs using mechanical flexibility of recently developed bendable thin-film structures. Numerical studies show that electronic band structures of AlGaN heterostructures and resulting optical and electrical characteristics of the devices can be significantly modified by external bending through active control of piezoelectric polarization. Internal quantum efficiency (IQE) is enhanced higher than three times, when the DUV LEDs are moderately bent to induce in-plane compressive strain in the heterostructure. Furthermore, efficiency droop at high injection currents is mitigated and turn-on voltage of diodes decreases with the same bending condition. The concept of bendable DUV LEDs with a controlled external strain can provide a new path for high-output-power and high-efficiency devices.

  9. Novel ventilation design of combining spacer and mesh structure in sports T-shirt significantly improves thermal comfort.

    Science.gov (United States)

    Sun, Chao; Au, Joe Sau-chuen; Fan, Jintu; Zheng, Rong

    2015-05-01

    This paper reports on novel ventilation design in sports T-shirt, which combines spacer and mesh structure, and experimental evidence on the advantages of design in improving thermal comfort. Evaporative resistance (Re) and thermal insulation (Rc) of T-shirts were measured using a sweating thermal manikin under three different air velocities. Moisture permeability index (i(m)) was calculated to compare the different designed T-shirts. The T-shirts of new and conventional designs were also compared by wearer trials, which were comprised of 30 min treadmill running followed by 10 min rest. Skin temperature, skin relative humidity, heart rate, oxygen inhalation and energy expenditure were monitored, and subjective sensations were asked. Results demonstrated that novel T-shirt has 11.1% significant lower im than control sample under windy condition. The novel T-shirt contributes to reduce the variation of skin temperature and relative humidity up to 37% and 32%, as well as decrease 3.3% energy consumption during exercise. Copyright © 2014 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  10. Significant improvement of thermal stability of glucose 1-dehydrogenase by introducing disulfide bonds at the tetramer interface.

    Science.gov (United States)

    Ding, Haitao; Gao, Fen; Liu, Danfeng; Li, Zeli; Xu, Xiaohong; Wu, Min; Zhao, Yuhua

    2013-12-10

    Rational design was applied to glucose 1-dehydrogenase (LsGDH) from Lysinibacillus sphaericus G10 to improve its thermal stability by introduction of disulfide bridges between subunits. One out of the eleven mutants, designated as DS255, displayed significantly enhanced thermal stability with considerable soluble expression and high specific activity. It was extremely stable at pH ranging from 4.5 to 10.5, as it retained nearly 100% activity after incubating at different buffers for 1h. Mutant DS255 also exhibited high thermostability, having a half-life of 9900min at 50°C, which was 1868-fold as that of its wild type. Moreover, both of the increased free energy of denaturation and decreased entropy of denaturation of DS255 suggested that the enzyme structure was stabilized by the engineered disulfide bonds. On account of its robust stability, mutant DS255 would be a competitive candidate in practical applications of chiral chemicals synthesis, biofuel cells and glucose biosensors. Copyright © 2013 Elsevier Inc. All rights reserved.

  11. Imparting improvements in electrochemical sensors: evaluation of different carbon blacks that give rise to significant improvement in the performance of electroanalytical sensing platforms

    International Nuclear Information System (INIS)

    Vicentini, Fernando Campanhã; Ravanini, Amanda E.; Figueiredo-Filho, Luiz C.S.; Iniesta, Jesús; Banks, Craig E.; Fatibello-Filho, Orlando

    2015-01-01

    Three different carbon black materials have been evaluated as a potential modifier, however, only one demonstrated an improvement in the electrochemical properties. The carbon black structures were characterised with SEM, XPS and Raman spectroscopy and found to be very similar to that of amorphous graphitic materials. The modifications utilised were constructed by three different strategies (using ultrapure water, chitosan and dihexadecylphosphate). The fabricated sensors are electrochemically characterised using N,N,N',N'-tetramethyl-para-phenylenediamine and both inner-sphere and outer-sphere redox probes, namely potassium ferrocyanide(II) and hexaammineruthenium(III) chloride, in addition to the biologically relevant and electroactive analytes, dopamine (DA) and acetaminophen (AP). Comparisons are made with an edge-plane pyrolytic graphite and glassy-carbon electrode and the benefits of carbon black implemented as a modifier for sensors within electrochemistry are explored, as well as the characterisation of their electroanalytical performances. We reveal significant improvements in the electrochemical performance (excellent sensitivity, faster heterogeneous electron transfer rate (HET)) over that of a bare glassy-carbon and edge-plane pyrolytic graphite electrode and thus suggest that there are substantial advantages of using carbon black as modifier in the fabrication of electrochemical based sensors. Such work is highly important and informative for those working in the field of electroanalysis where electrochemistry can provide portable, rapid, reliable and accurate sensing protocols (bringing the laboratory into the field), with particular relevance to those searching for new electrode materials

  12. Potential impact on food safety and food security from persistent organic pollutants in top soil improvers on Mediterranean pasture

    International Nuclear Information System (INIS)

    Brambilla, G.; Abate, V.; Battacone, G.; De Filippis, S.P.; Esposito, M.; Esposito, V.; Miniero, R.

    2016-01-01

    The organic carbon of biosolids from civil wastewater treatment plants binds persistent organic pollutants (POPs), such as polychlorodibenzo -dioxins and -furans (PCDD/Fs), dioxin and non-dioxin -like polychlorobiphenyls (DL and NDL-PCBs), polybrominated diphenyl ethers (PBDEs), and perfluorooctane sulfonic acid (PFOS). The use of such biosolids, derived digestates and composts as top soil improvers (TSIs) may transfer POPs into the food chain. We evaluated the potential carry-over of main bioavailable congeners from amended soil-to-milk of extensive farmed sheep. Such estimates were compared with regulatory limits (food security) and human intakes (food safety). The prediction model was based on farming practices, flocks soil intake, POPs toxicokinetics, and dairy products intake in children, of the Mediterranean area. TSI contamination ranged between 0.20–113 ng WHO-TEQ/kg dry matter for PCDD/Fs and DL-PCBs (N = 56), 3.40–616 μg/kg for ∑_6 NDL-PCBs (N = 38), 0.06–17.2 and 0.12–22.3 μg/kg for BDE no. 47 and no. 99, 0.872–89.50 μg/kg for PFOS (N = 27). For a 360 g/head/day soil intake of a sheep with an average milk yield of 2.0 kg at 6.5% of fat percentage, estimated soil quality standards supporting milk safety and security were 0.75 and 4.0 ng WHO-TEQ/kg for PCDD/Fs and DL-PCBs, and 3.75 and 29.2 μg/kg for ∑_6 NDL-PCBs, respectively. The possibility to use low-contaminated TSIs to maximize agriculture benefits and if the case, to progressively mitigate highly contaminated soils is discussed. - Highlights: • Top soil improvers were characterized for selected POPs content, in Italy. • Grazing behaviour makes sheep sensitive to top soil contamination. • Environmental quality standards for grazing areas were modelled • The impact on Mediterranean sheep milk safety/security was evaluated. • Low contaminated TSIs support safe intake and compliance of dairy products.

  13. Potential impact on food safety and food security from persistent organic pollutants in top soil improvers on Mediterranean pasture

    Energy Technology Data Exchange (ETDEWEB)

    Brambilla, G.; Abate, V. [Istituto Superiore di sanità, Veterinary Public Health Dept, Viale Regina Elena 299, 00161 Rome (Italy); Battacone, G. [Università degli Studi di Sassari, Agricultural Science, Viale Italia, 39 07100 Sassari (Italy); De Filippis, S.P. [Istituto Superiore di sanità, Toxicological Chemistry Unit, Viale Regina Elena 299, 00161 Rome (Italy); Esposito, M. [Istituto Zooprofilattico Sperimentale del Mezzogiorno, Via Salute 2, 08055 Portici, (Neaples) (Italy); Esposito, V. [Agenzia Regionale Per la Protezione dell' Ambiente Regione Puglia, Via Anfiteatro 8, 74100 Taranto (Italy); Miniero, R. [Istituto Superiore di sanità, Toxicological Chemistry Unit, Viale Regina Elena 299, 00161 Rome (Italy)

    2016-02-01

    The organic carbon of biosolids from civil wastewater treatment plants binds persistent organic pollutants (POPs), such as polychlorodibenzo -dioxins and -furans (PCDD/Fs), dioxin and non-dioxin -like polychlorobiphenyls (DL and NDL-PCBs), polybrominated diphenyl ethers (PBDEs), and perfluorooctane sulfonic acid (PFOS). The use of such biosolids, derived digestates and composts as top soil improvers (TSIs) may transfer POPs into the food chain. We evaluated the potential carry-over of main bioavailable congeners from amended soil-to-milk of extensive farmed sheep. Such estimates were compared with regulatory limits (food security) and human intakes (food safety). The prediction model was based on farming practices, flocks soil intake, POPs toxicokinetics, and dairy products intake in children, of the Mediterranean area. TSI contamination ranged between 0.20–113 ng WHO-TEQ/kg dry matter for PCDD/Fs and DL-PCBs (N = 56), 3.40–616 μg/kg for ∑{sub 6} NDL-PCBs (N = 38), 0.06–17.2 and 0.12–22.3 μg/kg for BDE no. 47 and no. 99, 0.872–89.50 μg/kg for PFOS (N = 27). For a 360 g/head/day soil intake of a sheep with an average milk yield of 2.0 kg at 6.5% of fat percentage, estimated soil quality standards supporting milk safety and security were 0.75 and 4.0 ng WHO-TEQ/kg for PCDD/Fs and DL-PCBs, and 3.75 and 29.2 μg/kg for ∑{sub 6} NDL-PCBs, respectively. The possibility to use low-contaminated TSIs to maximize agriculture benefits and if the case, to progressively mitigate highly contaminated soils is discussed. - Highlights: • Top soil improvers were characterized for selected POPs content, in Italy. • Grazing behaviour makes sheep sensitive to top soil contamination. • Environmental quality standards for grazing areas were modelled • The impact on Mediterranean sheep milk safety/security was evaluated. • Low contaminated TSIs support safe intake and compliance of dairy products.

  14. A Container-based Trusted Multi-level Security Mechanism

    Directory of Open Access Journals (Sweden)

    Li Xiao-Yong

    2017-01-01

    Full Text Available Multi-level security mechanism has been widely applied in the military, government, defense and other domains in which information is required to be divided by security-level. Through this type of security mechanism, users at different security levels are provided with information at corresponding security levels. Traditional multi-level security mechanism which depends on the safety of operating system finally proved to be not practical. We propose a container-based trusted multi-level security mechanism in this paper to improve the applicability of the multi-level mechanism. It guarantees multi-level security of the system through a set of multi-level security policy rules and trusted techniques. The technical feasibility and application scenarios are also discussed. The ease of realization, strong practical significance and low cost of our method will largely expand the application of multi-level security mechanism in real life.

  15. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  16. Affordable nutrient solutions for improved food security as evidenced by crop trials.

    Science.gov (United States)

    van der Velde, Marijn; See, Linda; You, Liangzhi; Balkovič, Juraj; Fritz, Steffen; Khabarov, Nikolay; Obersteiner, Michael; Wood, Stanley

    2013-01-01

    The continuing depletion of nutrients from agricultural soils in Sub-Saharan African is accompanied by a lack of substantial progress in crop yield improvement. In this paper we investigate yield gaps for corn under two scenarios: a micro-dosing scenario with marginal increases in nitrogen (N) and phosphorus (P) of 10 kg ha(-1) and a larger yet still conservative scenario with proposed N and P applications of 80 and 20 kg ha(-1) respectively. The yield gaps are calculated from a database of historical FAO crop fertilizer trials at 1358 locations for Sub-Saharan Africa and South America. Our approach allows connecting experimental field scale data with continental policy recommendations. Two critical findings emerged from the analysis. The first is the degree to which P limits increases in corn yields. For example, under a micro-dosing scenario, in Africa, the addition of small amounts of N alone resulted in mean yield increases of 8% while the addition of only P increased mean yields by 26%, with implications for designing better balanced fertilizer distribution schemes. The second finding was the relatively large amount of yield increase possible for a small, yet affordable amount of fertilizer application. Using African and South American fertilizer prices we show that the level of investment needed to achieve these results is considerably less than 1% of Agricultural GDP for both a micro-dosing scenario and for the scenario involving higher yet still conservative fertilizer application rates. In the latter scenario realistic mean yield increases ranged between 28 to 85% in South America and 71 to 190% in Africa (mean plus one standard deviation). External investment in this low technology solution has the potential to kick start development and could complement other interventions such as better crop varieties and improved economic instruments to support farmers.

  17. Cryptosporidium and other intestinal parasitic infections among HIV patients in southern Ethiopia: significance of improved HIV-related care.

    Science.gov (United States)

    Shimelis, Techalew; Tassachew, Yayehyirad; Lambiyo, Tariku

    2016-05-10

    Intestinal parasitic infections are known to cause gastroenteritis, leading to higher morbidity and mortality, particularly in people living with HIV/AIDS. This study aimed to determine the prevalence of Cryptosporidium and other intestinal parasitic infections among HIV patients receiving care at a hospital in Ethiopia where previous available baseline data helps assess if improved HIV-related care has reduced infection rates. A cross-sectional study was conducted at Hawassa University Hospital in southern Ethiopia from May, 2013 to March, 2014. A consecutive sample of 491 HIV- infected patients with diarrhea or a CD4 T cell count intestinal parasites. The study was approved by the Institutional Review Board of the College of Medicine and Health Sciences, Hawassa University. Physicians managed participants found to be infected with any pathogenic intestinal parasite. The overall prevalence of intestinal parasitic infections among the study population was 35.8 %. The most prevalent parasites were Cryptosporidium (13.2 %), followed by Entamoeba histolytica/dispar (10.2 %), and Giardia lamblia (7.9 %). The rate of single and multiple infections were 25.5 and 10.3 %, respectively. Patients with a CD4 T cell count intestinal parasitic infection or cryptosporidiosis compared to those with counts ≥ 200 cells/μl, but with some type of diarrhea. The study shows high prevalence of intestinal parasitic infections in the study population. However, the results in the current report are significantly lower compared to previous findings in the same hospital. The observed lower infection rate is encouraging and supports the need to strengthen and sustain the existing intervention measures in order to further reduce intestinal parasitic infections in people living with HIV/AIDS.

  18. Extended-release niacin/laropiprant significantly improves lipid levels in type 2 diabetes mellitus irrespective of baseline glycemic control

    Directory of Open Access Journals (Sweden)

    Bays HE

    2015-02-01

    Full Text Available Harold E Bays,1 Eliot A Brinton,2 Joseph Triscari,3 Erluo Chen,3 Darbie Maccubbin,3 Alexandra A MacLean,3 Kendra L Gibson,3 Rae Ann Ruck,3 Amy O Johnson-Levonas,3 Edward A O’Neill,3 Yale B Mitchel3 1Louisville Metabolic & Atherosclerosis Research Center (L-MARC, Louisville, KY, USA; 2Utah Foundation for Biomedical Research, Salt Lake City, UT, USA; 3Merck & Co, Inc., Whitehouse Station, NJ, USA Background: The degree of glycemic control in patients with type 2 diabetes mellitus (T2DM may alter lipid levels and may alter the efficacy of lipid-modifying agents. Objective: Evaluate the lipid-modifying efficacy of extended-release niacin/laropiprant (ERN/LRPT in subgroups of patients with T2DM with better or poorer glycemic control. Methods: Post hoc analysis of clinical trial data from patients with T2DM who were randomized 4:3 to double-blind ERN/LRPT or placebo (n=796, examining the lipid-modifying effects of ERN/LRPT in patients with glycosylated hemoglobin or fasting plasma glucose levels above and below median baseline levels. Results: At Week 12 of treatment, ERN/LRPT significantly improved low-density lipoprotein cholesterol, high-density lipoprotein cholesterol (HDL-C, non-high-density lipoprotein cholesterol, triglycerides, and lipoprotein (a, compared with placebo, with equal efficacy in patients above or below median baseline glycemic control. Compared with placebo, over 36 weeks of treatment more patients treated with ERN/LRPT had worsening of their diabetes and required intensification of antihyperglycemic medication, irrespective of baseline glycemic control. Incidences of other adverse experiences were generally low in all treatment groups. Conclusion: The lipid-modifying effects of ERN/LRPT are independent of the degree of baseline glycemic control in patients with T2DM (NCT00485758. Keywords: lipid-modifying agents, hyperglycemia, LDL, HDL, triglycerides

  19. Report: ECHO Data Quality Audit – Phase I Results: The Integrated Compliance Information System Needs Security Controls to Protect Significant Non-Compliance Data

    Science.gov (United States)

    Report #09-P-0226, August 31, 2009. End users of the Permit Compliance System and Integrated Compliance Information System National Pollutant Discharge Elimination System can override the Significant Non-Compliance data field without more access controls.

  20. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system.

    Science.gov (United States)

    Das, Ashok Kumar; Bruhadeshwar, Bezawada

    2013-10-01

    Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.

  1. Potential impact on food safety and food security from persistent organic pollutants in top soil improvers on Mediterranean pasture.

    Science.gov (United States)

    Brambilla, G; Abate, V; Battacone, G; De Filippis, S P; Esposito, M; Esposito, V; Miniero, R

    2016-02-01

    The organic carbon of biosolids from civil wastewater treatment plants binds persistent organic pollutants (POPs), such as polychlorodibenzo -dioxins and -furans (PCDD/Fs), dioxin and non-dioxin -like polychlorobiphenyls (DL and NDL-PCBs), polybrominated diphenyl ethers (PBDEs), and perfluorooctane sulfonic acid (PFOS). The use of such biosolids, derived digestates and composts as top soil improvers (TSIs) may transfer POPs into the food chain. We evaluated the potential carry-over of main bioavailable congeners from amended soil-to-milk of extensive farmed sheep. Such estimates were compared with regulatory limits (food security) and human intakes (food safety). The prediction model was based on farming practices, flocks soil intake, POPs toxicokinetics, and dairy products intake in children, of the Mediterranean area. TSI contamination ranged between 0.20-113 ng WHO-TEQ/kg dry matter for PCDD/Fs and DL-PCBs (N = 56), 3.40-616 μg/kg for ∑6 NDL-PCBs (N = 38), 0.06-17.2 and 0.12-22.3 μg/kg for BDE no. 47 and no. 99, 0.872-89.50 μg/kg for PFOS (N = 27). For a 360 g/head/day soil intake of a sheep with an average milk yield of 2.0 kg at 6.5% of fat percentage, estimated soil quality standards supporting milk safety and security were 0.75 and 4.0 ng WHO-TEQ/kg for PCDD/Fs and DL-PCBs, and 3.75 and 29.2 μg/kg for ∑6 NDL-PCBs, respectively. The possibility to use low-contaminated TSIs to maximize agriculture benefits and if the case, to progressively mitigate highly contaminated soils is discussed.

  2. Security and Emergency Management Division

    Data.gov (United States)

    Federal Laboratory Consortium — Volpe's Security and Emergency Management Division identifies vulnerabilities, risks, and opportunities to improve the security of transportation systems, critical...

  3. Interventions that effectively target Anopheles funestus mosquitoes could significantly improve control of persistent malaria transmission in south-eastern Tanzania.

    Science.gov (United States)

    Kaindoa, Emmanuel W; Matowo, Nancy S; Ngowo, Halfan S; Mkandawile, Gustav; Mmbando, Arnold; Finda, Marcelina; Okumu, Fredros O

    2017-01-01

    An. arabiensis (44.1%). Though An. arabiensis is still the most abundant vector species here, the remaining malaria transmission is predominantly mediated by An. funestus, possibly due to high insecticide resistance and high survival probabilities. Interventions that effectively target An. funestus mosquitoes could therefore significantly improve control of persistent malaria transmission in south-eastern Tanzania.

  4. Interventions that effectively target Anopheles funestus mosquitoes could significantly improve control of persistent malaria transmission in south–eastern Tanzania

    Science.gov (United States)

    Matowo, Nancy S.; Ngowo, Halfan S.; Mkandawile, Gustav; Mmbando, Arnold; Finda, Marcelina; Okumu, Fredros O.

    2017-01-01

    An. arabiensis (44.1%). Though An. arabiensis is still the most abundant vector species here, the remaining malaria transmission is predominantly mediated by An. funestus, possibly due to high insecticide resistance and high survival probabilities. Interventions that effectively target An. funestus mosquitoes could therefore significantly improve control of persistent malaria transmission in south–eastern Tanzania. PMID:28542335

  5. Exploring the association of urban or rural county status and environmental, nutrition- and lifestyle-related resources with the efficacy of SNAP-Ed (Supplemental Nutrition Assistance Program-Education) to improve food security.

    Science.gov (United States)

    Rivera, Rebecca L; Dunne, Jennifer; Maulding, Melissa K; Wang, Qi; Savaiano, Dennis A; Nickols-Richardson, Sharon M; Eicher-Miller, Heather A

    2018-04-01

    To investigate the association of policy, systems and environmental factors with improvement in household food security among low-income Indiana households with children after a Supplemental Nutrition Assistance Program-Education (SNAP-Ed) direct nutrition education intervention. Household food security scores measured by the eighteen-item US Household Food Security Survey Module in a longitudinal randomized and controlled SNAP-Ed intervention study conducted from August 2013 to April 2015 were the response variable. Metrics to quantify environmental factors including classification of urban or rural county status; the number of SNAP-authorized stores, food pantries and recreational facilities; average fair market housing rental price; and natural amenity rank were collected from government websites and data sets covering the years 2012-2016 and used as covariates in mixed multiple linear regression modelling. Thirty-seven Indiana counties, USA, 2012-2016. SNAP-Ed eligible adults from households with children (n 328). None of the environmental factors investigated were significantly associated with changes in household food security in this exploratory study. SNAP-Ed improves food security regardless of urban or rural location or the environmental factors investigated. Expansion of SNAP-Ed in rural areas may support food access among the low-income population and reduce the prevalence of food insecurity in rural compared with urban areas. Further investigation into policy, systems and environmental factors of the Social Ecological Model are warranted to better understand their relationship with direct SNAP-Ed and their impact on diet-related behaviours and food security.

  6. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  7. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  8. Methods for improving power system security by certifying dynamic stability in island operation

    Energy Technology Data Exchange (ETDEWEB)

    Granfors, S.; Krantz, N. [Solvina, Goteborg (Sweden)

    2007-07-01

    In response to concerns regarding the vulnerability of power systems around the world to major blackouts, a study was conducted to test island operation capability at power plants. Island operation refers to cases where one or more generators are connected to a limited power grid where there is no external voltage or frequency reference. In island operation, each generator is large enough to have a significant impact on the frequency and voltage in the grid. The ability to operate an isolated island grid can be beneficial for industries or hospitals, as well as for different rural areas. This study identified control parameters and evaluated power plant processes through step responses and frequency analysis. A hardware-in-the-loop (HWIL) simulation technique was proposed for island operation/power restoration testing. The proposed method made it possible to perform safe field studies of power stations that were synchronized to the main grid. More than 40 frequency control tests were conducted on different kinds of power plants in Sweden during normal operation. Most errors were found to be caused by improper operation and unstable conditions. Nearly all machines were stabilized after tuning. It was shown that newly built, identically designed and tuned turbines behave differently due to individual components. This paper addressed issues such as mechanical backlash, unsatisfying calibration of measuring equipment and improper tuning of controllers. In order to tune and optimize frequency control the choice of control algorithm is critical. Several different implementations were used during the tests, but the most successful was based on a separate control mode for island operation including gate-opening feedback for calculating droop. 4 refs., 8 figs.

  9. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  10. RFID security a lightweight paradigm

    CERN Document Server

    Khattab, Ahmed; Amini, Esmaeil; Bayoumi, Magdy

    2017-01-01

    This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of interesting topics portraying the current state-of-the-art in RFID technology and how it can be integrated with today’s Internet of Things (IoT) vision. The authors describe a first-of-its-kind, lightweight symmetric authenticated encryption cipher called Redundant Bit Security (RBS), which enables significant, multi-faceted performance improvements compared to existing cryptosystems. This book is a must-read for anyone aiming to overcome the constraints of practical implementation in RFID security technologies.

  11. Security dialogues: building better relationships between security and business

    OpenAIRE

    Ashenden, Debi; Lawrence, Darren

    2016-01-01

    In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes. By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff.

  12. Significant survival improvement of patients with recurrent breast cancer in the periods 2001-2008 vs. 1992-2000

    Directory of Open Access Journals (Sweden)

    Nishimura Sumiko

    2011-03-01

    Full Text Available Abstract Background It is unclear whether individualized treatments based on biological factors have improved the prognosis of recurrent breast cancer. The purpose of this study is to evaluate the survival improvement of patients with recurrent breast cancer after the introduction of third generation aromatase inhibitors (AIs and trastuzumab. Methods A total of 407 patients who received first diagnosis of recurrent breast cancer and treatment at National Kyushu Cancer Center between 1992 and 2008 were retrospectively evaluated. As AIs and trastuzumab were approved for clinical use in Japan in 2001, the patients were divided into two time cohorts depending on whether the cancer recurred before or after 2001. Cohort A: 170 patients who were diagnosed between 1992 and 2000. Cohort B: 237 patients who were diagnosed between 2001 and 2008. Tumor characteristics, treatments, and outcome were compared. Results Fourteen percent of cohort A and 76% of cohort B received AIs and/or trastuzumab (P Conclusions The prognosis of patients with recurrent breast cancer was improved over time following the introduction of AIs and trastuzumab and the survival improvement was apparent in HR- and/or HER-2-positive tumors.

  13. Significant Improvement in Sleep in People with Intellectual Disabilities Living in Residential Settings by Non-Pharmaceutical Interventions

    Science.gov (United States)

    Hylkema, T.; Vlaskamp, C.

    2009-01-01

    Background: Although about 15 to 50 percent of people with intellectual disabilities (ID) living in residential settings suffer from sleep problems, scant attention is paid to these problems. Most available studies focus on pharmaceutical solutions. In this study we focus on improving sleep in people with intellectual disabilities living in…

  14. Fundamental quantitative security in quantum key generation

    International Nuclear Information System (INIS)

    Yuen, Horace P.

    2010-01-01

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographic context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.

  15. Improvement of security techniques and protection of biometric data in biometric systems: Presentation of International Standard ISO 24745

    OpenAIRE

    Milinković, Milorad

    2017-01-01

    This paper presents the International Standard ISO 24745 as a potential security tool for biometric information protection, more precisely as a tool for privacy protection in biometric systems. This is one of the latest internationally accepted standards that address the security issues of biometric systems.

  16. Joining Forces for Food Security - Linking Earth Observation and Crowd-sourcing for improved Decision-support

    Science.gov (United States)

    Enenkel, M.; Dorigo, W.; See, L. M.; Vinck, P.; Papp, A.

    2014-12-01

    Droughts statistically exceed all other natural disasters in complexity, spatio-temporal extent and number of people affected. Triggered by crop failure, food insecurity is a major manifestation of agricultural drought and water scarcity. However, other socio-economic precursors, such as chronically low levels of disaster preparedness, hampered access to food security or a lack of social safety nets are equally important factors. We will present the first results of the SATIDA (Satellite Technologies for Improved Drought-Risk Assessment) project, which advances three complementary developments. First, an existing drought indicator is enhanced by replacing in-situ measurements on rainfall and surface air temperature with satellite-derived datasets. We identify the vegetation status via a new noise-corrected and gap-filled vegetation index. In addition, we introduce a soil moisture component to close the gap between rainfall deficiencies, extreme temperature and the first visible impacts of atmospheric anomalies on vegetation. Second, once calibrated, the index is forced with seasonal forecasts to quantify their uncertainty and added value in the regions of interest. Third, a mobile application is developed to disseminate relevant visualizations to decision-makers in affected areas, to collect additional information about socio-economic conditions and to validate the output of the drought index in real conditions. Involving Doctors without Borders (MSF) as a key user, SATIDA aims at decreasing uncertainties in decision-making via a more holistic risk framework, resulting in longer lead times for disaster logistics in the preparedness phase.

  17. Agroecology and sustainable food systems: Participatory research to improve food security among HIV-affected households in northern Malawi.

    Science.gov (United States)

    Nyantakyi-Frimpong, Hanson; Mambulu, Faith Nankasa; Bezner Kerr, Rachel; Luginaah, Isaac; Lupafya, Esther

    2016-09-01

    This article shares results from a long-term participatory agroecological research project in northern Malawi. Drawing upon a political ecology of health conceptual framework, the paper explores whether and how participatory agroecological farming can improve food security and nutrition among HIV-affected households. In-depth interviews were conducted with 27 farmers in HIV-affected households in the area near Ekwendeni Trading Centre in northern Malawi. The results show that participatory agroecological farming has a strong potential to meet the food, dietary, labour and income needs of HIV-affected households, whilst helping them to manage natural resources sustainably. As well, the findings reveal that place-based politics, especially gendered power imbalances, are imperative for understanding the human impacts of the HIV/AIDS epidemic. Overall, the study adds valuable insights into the literature on the human-environment dimensions of health. It demonstrates that the onset of disease can radically transform the social relations governing access to and control over resources (e.g., land, labour, and capital), and that these altered social relations in turn affect sustainable disease management. The conclusion highlights how the promotion of sustainable agroecology could help to partly address the socio-ecological challenges associated with HIV/AIDS. Copyright © 2016 Elsevier Ltd. All rights reserved.

  18. Brief Communication: Upper Air Relaxation in RACMO2 Significantly Improves Modelled Interannual Surface Mass Balance Variability in Antarctica

    Science.gov (United States)

    van de Berg, W. J.; Medley, B.

    2016-01-01

    The Regional Atmospheric Climate Model (RACMO2) has been a powerful tool for improving surface mass balance (SMB) estimates from GCMs or reanalyses. However, new yearly SMB observations for West Antarctica show that the modelled interannual variability in SMB is poorly simulated by RACMO2, in contrast to ERA-Interim, which resolves this variability well. In an attempt to remedy RACMO2 performance, we included additional upper-air relaxation (UAR) in RACMO2. With UAR, the correlation to observations is similar for RACMO2 and ERA-Interim. The spatial SMB patterns and ice-sheet-integrated SMB modelled using UAR remain very similar to the estimates of RACMO2 without UAR. We only observe an upstream smoothing of precipitation in regions with very steep topography like the Antarctic Peninsula. We conclude that UAR is a useful improvement for regional climate model simulations, although results in regions with steep topography should be treated with care.

  19. Improving winter leaf area index estimation in evergreen coniferous forests and its significance in carbon and water fluxes modeling

    Science.gov (United States)

    Wang, R.; Chen, J. M.; Luo, X.

    2016-12-01

    Modeling of carbon and water fluxes at the continental and global scales requires remotely sensed LAI as inputs. For evergreen coniferous forests (ENF), severely underestimated winter LAI has been one of the issues for mostly available remote sensing products, which could cause negative bias in the modeling of Gross Primary Productivity (GPP) and evapotranspiration (ET). Unlike deciduous trees which shed all the leaves in winter, conifers retains part of their needles and the proportion of the retained needles depends on the needle longevity. In this work, the Boreal Ecosystem Productivity Simulator (BEPS) was used to model GPP and ET at eight FLUXNET Canada ENF sites. Two sets of LAI were used as the model inputs: the 250m 10-day University of Toronto (U of T) LAI product Version 2 and the corrected LAI based on the U of T LAI product and the needle longevity of the corresponding tree species at individual sites. Validating model daily GPP (gC/m2) against site measurements, the mean RMSE over eight sites decreases from 1.85 to 1.15, and the bias changes from -0.99 to -0.19. For daily ET (mm), mean RMSE decreases from 0.63 to 0.33, and the bias changes from -0.31 to -0.16. Most of the improvements occur in the beginning and at the end of the growing season when there is large correction of LAI and meanwhile temperature is still suitable for photosynthesis and transpiration. For the dormant season, the improvement in ET simulation mostly comes from the increased interception of precipitation brought by the elevated LAI during that time. The results indicate that model performance can be improved by the application the corrected LAI. Improving the winter RS LAI can make a large impact on land surface carbon and energy budget.

  20. Improving Safety, Economic, Substantiality, and Security of Nuclear Energy with Canadian Super-Critical Water-cooled Reactor Concept

    International Nuclear Information System (INIS)

    Hamilton, Holly; Pencer, Jeremy; Yetisir, Metin; Leung, Laurence

    2012-01-01

    Super-Critical Water-cooled Reactor is one of the six design concepts being developed under the Generation IV International Forum. It is the only concept evolving from the water-cooled reactors and taking advantages of the balance-of-plant design and operation experience of the fossil-power plants. Canada is developing the SCR concept from the well-established pressure-tube reactor technology. The Canadian SCWR maintains modular design approach using relative small fuel channels with the separation of coolant and moderator. It is equipped with an advanced fuel channel design that is capable to transfer decay heat from the fuel to the moderator under the long-term cooling stage. Coupled with the advanced passive-moderator cooling system, cooling of fuel and fuel channel is continuous even without external power or operator intervention. The Canadian SCWR is operating at a pressure of 25 MPa with a core outlet temperature of 625 deg. C. This has led to a drastic increase in thermal efficiency to 48% from 34% of the current fleet of reactors (a 40% rise in relative efficiency). With the high core outlet temperature, a direct thermal cycle has been adopted and has led to simplification in plant design attributing to the cost reduction compared to the current reactor designs. The Canadian SCWR adopts the advanced Thorium fuel cycle to enhance the substantiality, economic, and security. than uranium in the world (estimated to be three times more). This provides the long-term fuel supply. Thorium's price is stable compared to uranium and is consistently lower than uranium. This would maintain the predictability and economic of fuel supply. Thorium itself is a non-fissile material and once irradiated requires special handling. This improves proliferative resistance. The objective of this paper is to highlight these improvements in generating nuclear energy with the Canadian SCWR

  1. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  2. Migration ability and Toll-like receptor expression of human mesenchymal stem cells improves significantly after three-dimensional culture.

    Science.gov (United States)

    Zhou, Panpan; Liu, Zilin; Li, Xue; Zhang, Bing; Wang, Xiaoyuan; Lan, Jing; Shi, Qing; Li, Dong; Ju, Xiuli

    2017-09-16

    While the conventional two-dimensional (2D) culture protocol is well accepted for the culture of mesenchymal stem cells (MSCs), this method fails to recapitulate the in vivo native three-dimensional (3D) cellular microenvironment, and may result in phenotypic changes, and homing and migration capacity impairments. MSC preparation in 3D culture systems has been considered an attractive preparatory and delivery method recently. We seeded human umbilical cord-derived MSCs (hUCMSCs) in a 3D culture system with porcine acellular dermal matrix (PADM), and investigated the phenotypic changes, the expression changes of some important receptors, including Toll-like receptors (TLRs) and C-X-C chemokine receptor type 4 (CXCR4) when hUCMSCs were transferred from 2D to 3D systems, as well as the alterations in in vivo homing and migration potential. It was found that the percentage of CD105-positive cells decreased significantly, whereas that of CD34- and CD271-positive cells increased significantly in 3D culture, compared to that in 2D culture. The mRNA and protein expression levels of TLR2, TLR3, TLR4, TLR6, and CXCR4 in hUCMSCs were increased significantly upon culturing with PADM for 3 days, compared to the levels in 2D culture. The numbers of migratory 3D hUCMSCs in the heart, liver, spleen, and bone marrow were significantly greater than the numbers of 2D hUCMSCs, and the worst migration occurred in 3D + AMD3100 (CXCR4 antagonist) hUCMSCs. These results suggested that 3D culture of hUCMSCs with PADM could alter the phenotypic characteristics of hUCMSCs, increase their TLR and CXCR4 expression levels, and promote their migratory and homing capacity in which CXCR4 plays an important role. Copyright © 2017 Elsevier Inc. All rights reserved.

  3. The patient's safety - For a dynamics of improvement. Nr 3. How to analyze your significant radiation protection events?

    International Nuclear Information System (INIS)

    2012-07-01

    The objective of this publication is to present event analysis methods which are the most frequently used by radiotherapy departments. After an indication of key figures concerning radiotherapy patients, sessions and events, the document indicates the objectives and steps of an event analysis. It presents various analysis methods: Ishikawa diagram (or 5M method or causes-effects diagram), the cause tree, the ALARM method (association of litigation and risk management), the ORION method. It proposes a comparison between these five methods, their possibilities, their limits. Good practices are outlined in terms of data acquisition, method choice, event analysis, and improvement actions. The use of the cause tree analysis is commented by members of the Limoges hospital radiotherapy department, and that of the Ishikawa method by a member of the Beauvais hospital

  4. Different surgical strategies for chronic pancreatitis significantly improve long-term outcome: a comparative single center study

    Directory of Open Access Journals (Sweden)

    Hildebrand P

    2010-08-01

    Full Text Available Abstract Objective In general, chronic pancreatitis (CP primarily requires conservative treatment. The chronic pain syndrome and complications make patients seek surgical advice, frequently after years of progression. In the past, surgical procedures involving drainage as well as resection have been employed successfully. The present study compared the different surgical strategies. Patients and Methods From March 2000 until April 2005, a total of 51 patients underwent surgical treatment for CP at the Department of surgery, University of Schleswig-Holstein, Campus Lübeck. Out of those 51 patients, 39 (76.5% were operated according to the Frey procedure, and in 12 cases (23.5% the Whipple procedure was performed. Patient data were documented prospectively throughout the duration of the hospital stay. The evaluation of the postoperative pain score was carried out retrospectively with a validated questionnaire. Results Average operating time was 240 minutes for the Frey group and 411 minutes for the Whipple group. The medium number of blood transfusions was 1 in the Frey group and 4.5 in the Whipple group. Overall morbidity was 21% in the Frey group and 42% in the Whipple group. 30-day mortality was zero for all patients. During the median follow-up period of 50 months, an improvement in pain score was observed in 93% of the patients of the Frey group and 67% of the patients treated according to the Whipple procedure. Conclusion The results show that both the Frey procedure as well as partial pancreaticoduodenectomy are capable of improving chronic pain symptoms in CP. As far as later endocrine and exocrine pancreatic insufficiency is concerned, however, the extended drainage operation according to Frey proves to be advantageous compared to the traditional resection procedure by Whipple. Accordingly, the Frey procedure provides us with an organ-preserving surgical procedure which treats the complications of CP sufficiently, thus being an

  5. Significant improvement of bone mineral density by denosumab treatment in Japanese osteoporotic patients following breast cancer treatment

    Directory of Open Access Journals (Sweden)

    Nakamura Y

    2018-03-01

    Full Text Available Yukio Nakamura,1,2 Mikio Kamimura,3 Akio Morikawa,4 Akira Taguchi,5 Takako Suzuki,1 Hiroyuki Kato1 1Department of Orthopaedic Surgery, Shinshu University School of Medicine, Matsumoto, 2Department of Orthopedic Surgery, Showa-Inan General Hospital, Komagane, 3Center for Osteoporosis and Spinal Disorders, Kamimura Orthopaedic Clinic, Matsumoto, 4Department of Surgery, Showa-Inan General Hospital, Komagane, 5Department of Oral and Maxillofacial Radiology, School of Dentistry, Matsumoto Dental University, Shiojiri, Japan Background: The aim of this study was to evaluate the effects of denosumab in patients with osteoporosis (OP and non-metastatic breast cancer following treatment of 1 surgery, 2 surgery and aromatase inhibitors, and 3 surgery, aromatase inhibitors, and anti-cancer agents, compared with those in primary OP patients. Patients and methods: In this retrospective 24-month study, patients were divided into the primary OP group (34 cases or OP receiving breast cancer treatment group (breast cancer group; 17 cases. We measured serum calcium, whole parathyroid hormone (PTH, 1,25OH2D3, bone alkaline phosphatase (BAP, tartrate-resistant acid phosphatase-5b (TRACP-5b, and bone mineral density (BMD of the lumbar 1–4 vertebrae (L-BMD and bilateral total hips (H-BMD for 24 months. Results: The percent changes of serum calcium in the breast cancer group were significantly lower than those in the primary OP group at 1 week, 1 and 12 months. The percent changes of whole PTH in the primary OP group were significantly lower than those in the breast cancer group at 2 and 4 months. Significant differences were found between the groups at 18 months (-34.5% in the primary OP group and -52.6% in the breast cancer group, respectively for the percent changes of BAP. Significant differences were found between the groups at 12, 18, and 24 months (-39.7% in the primary OP group and -64.0% in the breast cancer group at 24 months, respectively for the percent

  6. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  7. Significant Improvement Selected Mediators of Inflammation in Phenotypes of Women with PCOS after Reduction and Low GI Diet

    Directory of Open Access Journals (Sweden)

    Małgorzata Szczuko

    2017-01-01

    Full Text Available Many researchers suggest an increased risk of atherosclerosis in women with polycystic ovary syndrome. In the available literature, there are no studies on the mediators of inflammation in women with PCOS, especially after dietary intervention. Eicosanoids (HETE and HODE were compared between the biochemical phenotypes of women with PCOS (normal and high androgens and after the 3-month reduction diet. Eicosanoid profiles (9(S-HODE, 13(S-HODE, 5(S-HETE, 12(S-HETE, 15(S-HETE, 5(S-oxoETE, 16(R-HETE, 16(S-HETE and 5(S, 6(R-lipoxin A4, 5(S, 6(R, 15(R-lipoxin A4 were extracted from 0.5 ml of plasma using solid-phase extraction RP-18 SPE columns. The HPLC separations were performed on a 1260 liquid chromatograph. No significant differences were found in the concentration of analysed eicosanoids in phenotypes of women with PCOS. These women, however, have significantly lower concentration of inflammatory mediators than potentially healthy women from the control group. Dietary intervention leads to a significant (p<0.01 increase in the synthesis of proinflammatory mediators, reaching similar levels as in the control group. The development of inflammatory reaction in both phenotypes of women with PCOS is similar. The pathways for synthesis of proinflammatory mediators in women with PCOS are dormant, but can be stimulated through a reduction diet. Three-month period of lifestyle change may be too short to stimulate the pathways inhibiting inflammatory process.

  8. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an

  9. Report: EPA Should Improve Management Practices and Security Controls for Its Network Directory Service System and Related Servers

    Science.gov (United States)

    Report #12-P-0836, September 20, 2012. EPA's OEI is not managing key system management documentation, system administration functions, the granting and monitoring of privileged accounts, and the application of security controls associated with its DSS.

  10. Improving ward environments and developing skills for discharge with the implementation of self-catering on a low secure forensic unit.

    Science.gov (United States)

    O'Reilly, Alison

    2016-01-01

    The opportunities for service users to develop skills for more independent living and take control of their environments are limited in secure mental health units. This paper will outline a quality improvement project that changed how the catering services were delivered in a low secure unit in East London NHS Foundation Trust (ELFT). A Quality Improvement methodology was adopted incorporating the Plan, Do, Study, Act (PDSA) cycle which included the trial of service users preparing their own meals on a daily basis. The participation rates were measured and functional daily living skills were recorded. Following success of the trial, long-term implementation of self-catering was agreed, with service users being supported to prepare a shared evening meal every day on the ward with an average of 60% participation. Functional living skills indicated an improvement in the area of process skills. The project aligned with ELFT's aims of service users working in collaboration with staff to implement changes in service delivery.

  11. A study to determine whether targeted education significantly improves the perception of human torture in medical students in India.

    Science.gov (United States)

    Husain, Munawwar; Ghaffar, Usama B; Usmani, Jawed Ahmad; Rivzi, Shameem Jahan

    2010-08-01

    This study was undertaken to find out the knowledge of torture in MBBS students. A fair comparison was done by selecting two groups of medical students; one, to whom torture was not taught ie, pretaught group (PrTG, n = 125), and second, to whom torture was taught in classroom ie, post-taught group (PoTG, n = 110) in more than one sessions. The topic on torture was taught under many headings maximising the effort to cover as much as possible; namely, definition, geographical distribution, types of torture (physical, psychological and sexual), post-torture sequelae, sociopolitical environment prevailing in the country, doctors' involvement in torture, rehabilitation of torture victims and the UNO's role in containment of torture. In all a questionnaire was designed having MCQ types on these aspects. It was found that significant level of difference in perception and knowledge about torture existed amongst the groups, and this was further accentuated in medical and non-medical intratopics. 'P' value of each question was computed separately. It was found that the study was statistically significant and reestablished the need of fortifying the gossameric firmament of education specific to torture.

  12. Improving the physical layer security of wireless communication networks using spread spectrum coding and artificial noise approach

    CSIR Research Space (South Africa)

    Adedeji, K

    2016-09-01

    Full Text Available at the application layer to protect the messages against eavesdropping. However, the evolution of strong deciphering mechanisms has made conventional cryptography-based security techniques ineffective against attacks from an intruder. Figure 1: Layer protocol... communication networks with passive and active eavesdropper,” IEEE Globecom; Wireless Communication System, pp. 4868-4873, 2012. [9] Y. Zou, X. Wang and W. Shen, “Optimal relay selection for physical layer security in cooperative wireless networks,” IEEE...

  13. Attachment security as a mechanism linking foster care placement to improved mental health outcomes in previously institutionalized children.

    Science.gov (United States)

    McLaughlin, Katie A; Zeanah, Charles H; Fox, Nathan A; Nelson, Charles A

    2012-01-01

    Children reared in institutions experience elevated rates of psychiatric disorders. Inability to form a secure attachment relationship to a primary caregiver is posited to be a central mechanism in this association. We determined whether the ameliorative effect of a foster care (FC) intervention on internalizing disorders in previously institutionalized children was explained by the development of secure attachment among children placed in FC. Second we evaluated the role of lack of attachment in an institutionalized sample on the etiology of internalizing disorders within the context of a randomized trial. A sample of 136 children (aged 6-30 months) residing in institutions was recruited in Bucharest, Romania. Children were randomized to FC (n = 68) or to care as usual (CAU; n = 68). Foster parents were recruited, trained, and overseen by the investigative team. Attachment security at 42 months was assessed using the Strange Situation Procedure, and internalizing disorders at 54 months were assessed using the Preschool Age Psychiatric Assessment. Girls in FC had fewer internalizing disorders than girls in CAU (OR = 0.17, p = .006). The intervention had no effect on internalizing disorders in boys (OR = 0.47, p = .150). At 42 months, girls in FC were more likely to have secure attachment than girls in CAU (OR = 12.5, p security predicted lower rates of internalizing disorders in both sexes. Development of attachment security fully mediated intervention effects on internalizing disorders in girls. Placement into FC facilitated the development of secure attachment and prevented the onset of internalizing disorders in institutionalized girls. The differential effects of FC on attachment security in boys and girls explained gender differences in the intervention effects on psychopathology. Findings provide evidence for the critical role of disrupted attachment in the etiology of internalizing disorders in children exposed to institutionalization. © 2011 The Authors

  14. Drilling for improvement : Statoil and Halliburton report significant cost savings and more accurate well placement at the Leismer demonstration project

    Energy Technology Data Exchange (ETDEWEB)

    Jaremko, D.

    2010-07-15

    This article discussed new improvements in steam assisted gravity drainage (SAGD) made by Statoil and Halliburton at the Leismer demonstration project. The Leismer project is Statoil's inaugural project in oil sands development, and will have a capacity to produce 10,000 barrels per day through 4 separate well pads with 23 well pairs. Challenges to the project included the long lateral sections required for the well pairs to remain parallel to each other while remaining within the target formation. An azimuthal deep resistivity (ADR) tool was used to detect the proximity of the wellbore to shale and water zones. Use of the tool allowed operators to modify the planned well trajectory in order to optimize placements within the reservoir. A rotary steerable system (RSS) was used increase injection times. The project was completed 6 to 8 weeks ahead of schedule. Applications have now been filed for a further 10 phases that will produce 240,000 barrels per day. 1 fig.

  15. Icariin combined with human umbilical cord mesenchymal stem cells significantly improve the impaired kidney function in chronic renal failure.

    Science.gov (United States)

    Li, Wen; Wang, Li; Chu, Xiaoqian; Cui, Huantian; Bian, Yuhong

    2017-04-01

    At present, the main therapy for chronic renal failure (CRF) is dialysis and renal transplantation, but neither obtains satisfactory results. Human umbilical cord mesenchymal stem cells (huMSCs) are isolated from the fetal umbilical cord which has a high self-renewal and multi-directional differentiation potential. Icariin (ICA), a kidney-tonifying Chinese Medicine can enhance the multipotency of huMSCs. Therefore, this work seeks to employ the use of ICA-treated huMSCs for the treatment of chronic renal failure. Blood urea nitrogen and creatinine (Cr) analyses showed amelioration of functional parameters in ICA-treated huMSCs for the treatment of CRF rats at 3, 7, and 14 days after transplantation. ICA-treated huMSCs can obviously increase the number of cells in injured renal tissues at 3, 7, and 14 days after transplantation by optical molecular imaging system. Hematoxylin-eosin staining demonstrated that ICA-treated huMSCs reduced the levels of fibrosis in CRF rats at 14 days after transplantation. Superoxide dismutase and Malondialdehyde analyses showed that ICA-treated huMSCs reduced the oxidative damage in CRF rats. Moreover, transplantation with ICA-treated huMSCs decreased inflammatory responses, promoted the expression of growth factors, and protected injured renal tissues. Taken together, our findings suggest that ICA-treated huMSCs could improve the kidney function in CRF rats.

  16. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  17. Can conditional cash transfers improve the uptake of nutrition interventions and household food security? Evidence from Odisha's Mamata scheme.

    Directory of Open Access Journals (Sweden)

    Kalyani Raghunathan

    Full Text Available There is considerable global evidence on the effectiveness of cash transfers in improving health and nutrition outcomes; however, the evidence from South Asia, particularly India, is limited. In the context of India where more than a third of children are undernourished, and where there is considerable under-utilization of health and nutrition interventions, it is opportune to investigate the impact of cash transfer programs on the use of interventions. We study one conditional cash transfer program, Mamata scheme, implemented in the state of Odisha, in India that targeted pregnant and lactating women. Using survey data on 1161 households from three districts in the state of Odisha, we examine the effect of the scheme on eight outcomes: 1 pregnancy registration; 2 receipt of antenatal services; 3 receipt of iron and folic acid (IFA tablets; 4 exposure to counseling during pregnancy; 5 exposure to postnatal counseling; 6 exclusive breastfeeding; 7 full immunization; and 8 household food security. We conduct regression analyses and correct for endogeneity using nearest-neighbor matching and inverse-probability weighting models. We find that the receipt of payments from the Mamata scheme is associated with a 5 percentage point (pp increase in the likelihood of receiving antenatal services, a 10 pp increase in the likelihood of receiving IFA tablets, and a decline of 0.84 on the Household Food Insecurity Access Scale. These results provide the first quantitative estimates of effects associated with the Mamata scheme, which can inform the design of government policies related to conditional cash transfers.

  18. Improving radiation awareness and feeling of personal security of non-radiological medical staff by implementing a traffic light system in computed tomography

    Energy Technology Data Exchange (ETDEWEB)

    Heilmaier, C.; Mayor, A.; Zuber, N.; Weishaupt, D. [Stadtspital Triemli, Zurich (Switzerland). Dept. of Radiology; Fodor, P. [Stadtspital Triemli, Zurich (Switzerland). Dept. of Anesthesiology and Intensive Care Medicine

    2016-03-15

    Non-radiological medical professionals often need to remain in the scanning room during computed tomography (CT) examinations to supervise patients in critical condition. Independent of protective devices, their position significantly influences the radiation dose they receive. The purpose of this study was to assess if a traffic light system indicating areas of different radiation exposure improves non-radiological medical staff's radiation awareness and feeling of personal security. Phantom measurements were performed to define areas of different dose rates and colored stickers were applied on the floor according to a traffic light system: green = lowest, orange = intermediate, and red = highest possible radiation exposure. Non-radiological medical professionals with different years of working experience evaluated the system using a structured questionnaire. Kruskal-Wallis and Spearman's correlation test were applied for statistical analysis. Fifty-six subjects (30 physicians, 26 nursing staff) took part in this prospective study. Overall rating of the system was very good, and almost all professionals tried to stand in the green stickers during the scan. The system significantly increased radiation awareness and feeling of personal protection particularly in staff with ? 5 years of working experience (p < 0.05). The majority of non-radiological medical professionals stated that staying in the green stickers and patient care would be compatible. Knowledge of radiation protection was poor in all groups, especially among entry-level employees (p < 0.05). A traffic light system in the CT scanning room indicating areas with lowest, in-termediate, and highest possible radiation exposure is much appreciated. It increases radiation awareness, improves the sense of personal radiation protection, and may support endeavors to lower occupational radiation exposure, although the best radiation protection always is to re-main outside the CT room during the scan.

  19. Improving radiation awareness and feeling of personal security of non-radiological medical staff by implementing a traffic light system in computed tomography

    International Nuclear Information System (INIS)

    Heilmaier, C.; Mayor, A.; Zuber, N.; Weishaupt, D.; Fodor, P.

    2016-01-01

    Non-radiological medical professionals often need to remain in the scanning room during computed tomography (CT) examinations to supervise patients in critical condition. Independent of protective devices, their position significantly influences the radiation dose they receive. The purpose of this study was to assess if a traffic light system indicating areas of different radiation exposure improves non-radiological medical staff's radiation awareness and feeling of personal security. Phantom measurements were performed to define areas of different dose rates and colored stickers were applied on the floor according to a traffic light system: green = lowest, orange = intermediate, and red = highest possible radiation exposure. Non-radiological medical professionals with different years of working experience evaluated the system using a structured questionnaire. Kruskal-Wallis and Spearman's correlation test were applied for statistical analysis. Fifty-six subjects (30 physicians, 26 nursing staff) took part in this prospective study. Overall rating of the system was very good, and almost all professionals tried to stand in the green stickers during the scan. The system significantly increased radiation awareness and feeling of personal protection particularly in staff with ? 5 years of working experience (p < 0.05). The majority of non-radiological medical professionals stated that staying in the green stickers and patient care would be compatible. Knowledge of radiation protection was poor in all groups, especially among entry-level employees (p < 0.05). A traffic light system in the CT scanning room indicating areas with lowest, in-termediate, and highest possible radiation exposure is much appreciated. It increases radiation awareness, improves the sense of personal radiation protection, and may support endeavors to lower occupational radiation exposure, although the best radiation protection always is to re-main outside the CT room during the scan.

  20. Improvement of Fabry Disease-Related Gastrointestinal Symptoms in a Significant Proportion of Female Patients Treated with Agalsidase Beta

    DEFF Research Database (Denmark)

    Wilcox, William R; Feldt-Rasmussen, Ulla; Martins, Ana Maria

    2018-01-01

    of organ involvement. Although variable, gastrointestinal symptoms are among the most common and significant early clinical manifestations; they tend to persist into adulthood if left untreated. To further understand the effects of sustained enzyme replacement therapy (ERT) with agalsidase beta......Fabry disease, an X-linked inherited lysosomal storage disorder, is caused by mutations in the gene encoding α-galactosidase, GLA. In patients with Fabry disease, glycosphingolipids accumulate in various cell types, triggering a range of cellular and tissue responses that result in a wide spectrum...... on gastrointestinal symptoms in heterozygotes, a data analysis of female patients enrolled in the Fabry Registry was conducted. To be included, females of any age must have received agalsidase beta (average dose 1.0 mg/kg every 2 weeks) for at least 2.5 years. Measured outcomes were self-reported gastrointestinal...

  1. Towards an improved prediction of the free radical scavenging potency of flavonoids: the significance of double PCET mechanisms.

    Science.gov (United States)

    Amić, Ana; Marković, Zoran; Dimitrić Marković, Jasmina M; Stepanić, Višnja; Lučić, Bono; Amić, Dragan

    2014-01-01

    The 1H(+)/1e(-) and 2H(+)/2e(-) proton-coupled electron transfer (PCET) processes of free radical scavenging by flavonoids were theoretically studied for aqueous and lipid environments using the PM6 and PM7 methods. The results reported here indicate that the significant contribution of the second PCET mechanism, resulting in the formation of a quinone/quinone methide, effectively discriminates the active from inactive flavonoids. The predictive potency of descriptors related to the energetics of second PCET mechanisms (the second O-H bond dissociation enthalpy (BDE2) related to hydrogen atom transfer (HAT) mechanism, and the second electron transfer enthalpy (ETE2) related to sequential proton loss electron transfer (SPLET) mechanism) are superior to the currently used indices, which are related to the first 1H(+)/1e(-) processes, and could serve as primary descriptors in development of the QSAR (quantitative structure-activity relationships) of flavonoids. Copyright © 2013 Elsevier Ltd. All rights reserved.

  2. Pt-decorated GaN nanowires with significant improvement in H2 gas-sensing performance at room temperature.

    Science.gov (United States)

    Abdullah, Q N; Yam, F K; Hassan, Z; Bououdina, M

    2015-12-15

    Superior sensitivity towards H2 gas was successfully achieved with Pt-decorated GaN nanowires (NWs) gas sensor. GaN NWs were fabricated via chemical vapor deposition (CVD) route. Morphology (field emission scanning electron microscopy and transmission electron microscopy) and crystal structure (high resolution X-ray diffraction) characterizations of the as-synthesized nanostructures demonstrated the formation of GaN NWs having a wurtzite structure, zigzaged shape and an average diameter of 30-166nm. The Pt-decorated GaN NWs sensor shows a high response of 250-2650% upon exposure to H2 gas concentration from 7 to 1000ppm respectively at room temperature (RT), and then increases to about 650-4100% when increasing the operating temperature up to 75°C. The gas-sensing measurements indicated that the Pt-decorated GaN NWs based sensor exhibited efficient detection of H2 at low concentration with excellent sensitivity, repeatability, and free hysteresis phenomena over a period of time of 100min. The large surface-to-volume ratio of GaN NWs and the catalytic activity of Pt metal are the most influential factors leading to the enhancement of H2 gas-sensing performances through the improvement of the interaction between the target molecules (H2) and the sensing NWs surface. The attractive low-cost, low power consumption and high-performance of the resultant decorated GaN NWs gas sensor assure their uppermost potential for H2 gas sensor working at low operating temperature. Copyright © 2015 Elsevier Inc. All rights reserved.

  3. Rebuilding Iraq: DoD and State Department Have Improved Oversight and Coordination of Private Security Contractors in Iraq, but Further Actions are Needed to Sustain Improvements

    Science.gov (United States)

    2008-07-01

    MNC-I Multi-National Corps-Iraq MNF-I Multi-National Force-Iraq PSC private security contractor RSO Regional Security Office TOC tactical...maritime and territorial jurisdiction’ to include a housing complex leased by the U.S. military on a military base in Germany where a sexual assault...and monitored by RSO personnel in the RSO TOC . Motorcade vehicles are equipped with video cameras that record and document motorcade movements and

  4. Human factors in network security

    OpenAIRE

    Jones, Francis B.

    1991-01-01

    Human factors, such as ethics and education, are important factors in network information security. This thesis determines which human factors have significant influence on network security. Those factors are examined in relation to current security devices and procedures. Methods are introduced to evaluate security effectiveness by incorporating the appropriate human factors into network security controls

  5. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  6. Amphoteric Ion-Exchange Membranes with Significantly Improved Vanadium Barrier Properties for All-Vanadium Redox Flow Batteries.

    Science.gov (United States)

    Nibel, Olga; Rojek, Tomasz; Schmidt, Thomas J; Gubler, Lorenz

    2017-07-10

    All-vanadium redox flow batteries (VRBs) have attracted considerable interest as promising energy-storage devices that can allow the efficient utilization of renewable energy sources. The membrane, which separates the porous electrodes in a redox flow cell, is one of the key components in VRBs. High rates of crossover of vanadium ions and water through the membrane impair the efficiency and capacity of a VRB. Thus, membranes with low permeation rate of vanadium species and water are required, also characterized by low resistance and stability in the VRB environment. Here, we present a new design concept for amphoteric ion-exchange membranes, based on radiation-induced grafting of vinylpyridine into an ethylene tetrafluoroethylene base film and a two-step functionalization to introduce cationic and anionic exchange sites, respectively. During long-term cycling, redox flow cells containing these membranes showed higher efficiency, less pronounced electrolyte imbalance, and significantly reduced capacity decay compared to the cells with the benchmark material Nafion 117. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  7. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  8. Post-exposure Treatment with Anti-rabies VHH and Vaccine Significantly Improves Protection of Mice from Lethal Rabies Infection

    Science.gov (United States)

    Terryn, Sanne; Francart, Aurélie; Rommelaere, Heidi; Stortelers, Catelijne; Van Gucht, Steven

    2016-01-01

    Post-exposure prophylaxis (PEP) against rabies infection consists of a combination of passive immunisation with plasma-derived human or equine immune globulins and active immunisation with vaccine delivered shortly after exposure. Since anti-rabies immune globulins are expensive and scarce, there is a need for cheaper alternatives that can be produced more consistently. Previously, we generated potent virus-neutralising VHH, also called Nanobodies, against the rabies glycoprotein that are effectively preventing lethal disease in an in vivo mouse model. The VHH domain is the smallest antigen-binding functional fragment of camelid heavy chain-only antibodies that can be manufactured in microbial expression systems. In the current study we evaluated the efficacy of half-life extended anti-rabies VHH in combination with vaccine for PEP in an intranasal rabies infection model in mice. The PEP combination therapy of systemic anti-rabies VHH and intramuscular vaccine significantly delayed the onset of disease compared to treatment with anti-rabies VHH alone, prolonged median survival time (35 versus 14 days) and decreased mortality (60% versus 19% survival rate), when treated 24 hours after rabies virus challenge. Vaccine alone was unable to rescue mice from lethal disease. As reported also for immune globulins, some interference of anti-rabies VHH with the antigenicity of the vaccine was observed, but this did not impede the synergistic effect. Post exposure treatment with vaccine and human anti-rabies immune globulins was unable to protect mice from lethal challenge. Anti-rabies VHH and vaccine act synergistically to protect mice after rabies virus exposure, which further validates the possible use of anti-rabies VHH for rabies PEP. PMID:27483431

  9. Post-exposure Treatment with Anti-rabies VHH and Vaccine Significantly Improves Protection of Mice from Lethal Rabies Infection.

    Directory of Open Access Journals (Sweden)

    Sanne Terryn

    2016-08-01

    Full Text Available Post-exposure prophylaxis (PEP against rabies infection consists of a combination of passive immunisation with plasma-derived human or equine immune globulins and active immunisation with vaccine delivered shortly after exposure. Since anti-rabies immune globulins are expensive and scarce, there is a need for cheaper alternatives that can be produced more consistently. Previously, we generated potent virus-neutralising VHH, also called Nanobodies, against the rabies glycoprotein that are effectively preventing lethal disease in an in vivo mouse model. The VHH domain is the smallest antigen-binding functional fragment of camelid heavy chain-only antibodies that can be manufactured in microbial expression systems. In the current study we evaluated the efficacy of half-life extended anti-rabies VHH in combination with vaccine for PEP in an intranasal rabies infection model in mice. The PEP combination therapy of systemic anti-rabies VHH and intramuscular vaccine significantly delayed the onset of disease compared to treatment with anti-rabies VHH alone, prolonged median survival time (35 versus 14 days and decreased mortality (60% versus 19% survival rate, when treated 24 hours after rabies virus challenge. Vaccine alone was unable to rescue mice from lethal disease. As reported also for immune globulins, some interference of anti-rabies VHH with the antigenicity of the vaccine was observed, but this did not impede the synergistic effect. Post exposure treatment with vaccine and human anti-rabies immune globulins was unable to protect mice from lethal challenge. Anti-rabies VHH and vaccine act synergistically to protect mice after rabies virus exposure, which further validates the possible use of anti-rabies VHH for rabies PEP.

  10. Constitutive overexpression of the TaNF-YB4 gene in transgenic wheat significantly improves grain yield.

    Science.gov (United States)

    Yadav, Dinesh; Shavrukov, Yuri; Bazanova, Natalia; Chirkova, Larissa; Borisjuk, Nikolai; Kovalchuk, Nataliya; Ismagul, Ainur; Parent, Boris; Langridge, Peter; Hrmova, Maria; Lopato, Sergiy

    2015-11-01

    Heterotrimeric nuclear factors Y (NF-Ys) are involved in regulation of various vital functions in all eukaryotic organisms. Although a number of NF-Y subunits have been characterized in model plants, only a few have been functionally evaluated in crops. In this work, a number of genes encoding NF-YB and NF-YC subunits were isolated from drought-tolerant wheat (Triticum aestivum L. cv. RAC875), and the impact of the overexpression of TaNF-YB4 in the Australian wheat cultivar Gladius was investigated. TaNF-YB4 was isolated as a result of two consecutive yeast two-hybrid (Y2H) screens, where ZmNF-YB2a was used as a starting bait. A new NF-YC subunit, designated TaNF-YC15, was isolated in the first Y2H screen and used as bait in a second screen, which identified two wheat NF-YB subunits, TaNF-YB2 and TaNF-YB4. Three-dimensional modelling of a TaNF-YB2/TaNF-YC15 dimer revealed structural determinants that may underlie interaction selectivity. The TaNF-YB4 gene was placed under the control of the strong constitutive polyubiquitin promoter from maize and introduced into wheat by biolistic bombardment. The growth and yield components of several independent transgenic lines with up-regulated levels of TaNF-YB4 were evaluated under well-watered conditions (T1-T3 generations) and under mild drought (T2 generation). Analysis of T2 plants was performed in large deep containers in conditions close to field trials. Under optimal watering conditions, transgenic wheat plants produced significantly more spikes but other yield components did not change. This resulted in a 20-30% increased grain yield compared with untransformed control plants. Under water-limited conditions transgenic lines maintained parity in yield performance. © The Author 2015. Published by Oxford University Press on behalf of the Society for Experimental Biology.

  11. Marrying Step Feed with Secondary Clarifier Improvements to Significantly Increase Peak Wet Weather Treatment Capacity: An Integrated Methodology.

    Science.gov (United States)

    Daigger, Glen T; Siczka, John S; Smith, Thomas F; Frank, David A; McCorquodale, J A

    2017-08-01

      The need to increase the peak wet weather secondary treatment capacity of the City of Akron, Ohio, Water Reclamation Facility (WRF) provided the opportunity to test an integrated methodology for maximizing the peak wet weather secondary treatment capacity of activated sludge systems. An initial investigation, consisting of process modeling of the secondary treatment system and computational fluid dynamics (CFD) analysis of the existing relatively shallow secondary clarifiers (3.3 and 3.7 m sidewater depth in 30.5 m diameter units), indicated that a significant increase in capacity from 416 000 to 684 000 m3/d or more was possible by adding step feed capabilities to the existing bioreactors and upgrading the existing secondary clarifiers. One of the six treatment units at the WRF was modified, and an extensive 2-year testing program was conducted to determine the total peak wet weather secondary treatment capacity achievable. The results demonstrated that a peak wet weather secondary treatment capacity approaching 974 000 m3/d is possible as long as secondary clarifier solids and hydraulic loadings could be separately controlled using the step feed capability provided. Excellent sludge settling characteristics are routinely experienced at the City of Akron WRF, raising concerns that the identified peak wet weather secondary treatment capacity could not be maintained should sludge settling characteristics deteriorate for some reason. Computational fluid dynamics analysis indicated that the impact of the deterioration of sludge settling characteristics could be mitigated and the identified peak wet weather secondary treatment capacity maintained by further use of the step feed capability provided to further reduce secondary clarifier solids loading rates at the identified high surface overflow rates. The results also demonstrated that effluent limits not only for total suspended solids (TSS) and five-day carbonaceous biochemical oxygen demand (cBOD5) could be

  12. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  13. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks"

    Science.gov (United States)

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes’ participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.’s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.’s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic. PMID:26580963

  14. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Science.gov (United States)

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  15. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Directory of Open Access Journals (Sweden)

    Mojtaba Alizadeh

    Full Text Available Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  16. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  17. Tanzanian farmers' knowledge and attitudes to GM biotechnology and the potential use of GM crops to provide improved levels of food security. A Qualitative Study

    OpenAIRE

    Herron Caroline M; Newell James N; Lewis Christopher P; Nawabu Haidari

    2010-01-01

    Abstract Background Genetically Modified (GM) crops have been championed as one possible method to improve food security and individual nutritional status in sub Saharan Africa. Understanding and acceptability of GM crop technology to farmers and consumers have not been assessed. We developed a qualitative research study involving farmers as both producers and consumers to gauge the understanding of GM crop technology, its acceptability, and identifying issues of concern. Methods Nineteen ind...

  18. Barriers and Potential Improvements for Needle and Syringe Exchange Programs (NSPs in China: A Qualitative Study from Perspectives of Both Health and Public Security Sectors.

    Directory of Open Access Journals (Sweden)

    Fung Kuen Koo

    Full Text Available This study explores the acceptability, the barriers to the implementation of needle and syringe exchange programs (NSPs and the potential improvement strategies in China from the perspectives of governmental health and public security officials. Purposive sampling was used for recruitment of participants who had been involved in NSPs implementation. Semi-Structured individual interviews were conducted in Mandarin to address three aspects of NSPs: (1 participants' attitudes towards NSPs, (2 participants' opinions on the effectiveness and barriers of NSPs, and (3 suggestions for improving the program. Content analysis was used to analyse the translated interview data. A total of 68 participants from 12 Hunan counties were interviewed (34 from each of the Bureau of Health and the Narcotic Division. Both groups recognised the importance and effectiveness of NSPs in HIV prevention, but public security officials regarded NSPs as a temporary intervention in place of punitive measures. Most health officials (32/34 regarded the main barriers to its implementation as administrative and structural, whereas participants from Narcotics Division (n=24 questioned the legitimacy of NSPs and concerned about the poor management of drug users' risk behaviours. Close cooperation between the health and public security sectors, engagement of the drug user community and an enabling policy environment were reportedly to be critical for potential improvements of NSPs in China. Misconceptions about NSPs encourage drug users' addictive behaviour, and an unclear leadership and insufficient support de-motivate the participants from the Bureau of Health and the Narcotics Division to actively support the program implementation.

  19. Microsoft Windows Server 2003: Security Enhancements and New Features

    National Research Council Canada - National Science Library

    Montehermoso, Ronald

    2004-01-01

    .... Windows NT and Windows 2000 were known to have numerous security vulnerabilities; hence Microsoft focused on improving security by making Windows Server 2003 secure by design, secure by default, secure in deployment...

  20. Defense Infrastructure: More Accurate Data Would Allow DOD to Improve the Tracking, Management, and Security of Its Leased Facilities

    Science.gov (United States)

    2016-03-01

    they traverse land [e.g., runway, road, rail line, pipeline, fence, pavement , electrical distribution line] and are reported by a linear unit of...locations. Furthermore, these officials stated that the new risk- based Interagency Security Committee standards provide a more flexible risk-based

  1. A Surveillance Society and the Conflict State: Leveraging Ubiquitous Surveillance and Biometrics Technology to Improve Homeland Security

    Science.gov (United States)

    2002-09-01

    of Industrial Organizations AIDS: Acquired Immune Deficiency Syndrome ANSI: American National Standards Institute APHIS: Animal, Plant, and Health...between a specific person and an impostor than any other type of identification technique. They provide the additional, convenient security...preferable to an impostor being able to defeat the system (Ashbourn, p. 56). Retina scanning systems are resistant to fraud since duplicate artificial

  2. Remote sensing evaluation of fire hazard : Towards operational tools for improving the security of citizens and protecting the environment

    NARCIS (Netherlands)

    Maffei, C.; Gambardella, C.; Menenti, M.

    2015-01-01

    Forest fires are a threat for both the environment and the security of citizens. This is particularly relevant in the Mediterranean, where the population density is high, and long dry summers drive vegetation into fireprone conditions. Policy makers underline the key role of prevention over damage

  3. Technical difficulties. Recent health IT security breaches are unlikely to improve the public's perception about the safety of personal data.

    Science.gov (United States)

    Becker, Cinda

    2006-02-20

    Consumers who claimed in recent surveys that they were "more afraid of cyber crimes than physical crimes" may have had reason for caution. A spate of well-publicized information thefts and security breaches at healthcare organizations have eroded trust in technology, says Carol Diamond, left, of the Markle Foundation, and that could have an adverse effect on acceptance of electronic medical records.

  4. The Personal Information Security Assistant

    NARCIS (Netherlands)

    Kegel, Roeland Hendrik,Pieter

    The human element is often found to be the weakest link in the information security chain. The Personal Information Security Assistant project aims to address this by improving the privacy and security awareness of end-users and by aligning the user's personal IT environment to the user's security

  5. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  6. Process Security in Chemical Engineering Education

    Science.gov (United States)

    Piluso, Cristina; Uygun, Korkut; Huang, Yinlun; Lou, Helen H.

    2005-01-01

    The threats of terrorism have greatly alerted the chemical process industries to assure plant security at all levels: infrastructure-improvement-focused physical security, information-protection-focused cyber security, and design-and-operation-improvement-focused process security. While developing effective plant security methods and technologies…

  7. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  8. Improving smallholder food security through investigations of carcass composition and beef marketing of buffalo and cattle in northern Lao PDR.

    Science.gov (United States)

    Nampanya, Sonevilay; Khounsy, Syseng; Phonvisay, Aloun; Bush, Russell David; Windsor, Peter Andrew

    2015-04-01

    This study determined the carcass composition of Lao indigenous buffalo (Bubalus bubalis) and cattle (Bos indicus), then examined trends in bovine meat marketing following review of records of beef production and prices in the two major cities of Luang Prabang (LPB) and Xieng Khoung (XK) provinces in northern Laos. Samples from 41 buffalo and 81 cattle (n = 122) were collected from animals slaughtered in May-June 2014, with live weights, carcass weights and other carcass-related variables collected. The animals were classified into four age cohort groups (6 years) with quantitative and dichotomous qualitative traits determined. There were significant differences in buffalo and cattle predicted mean carcass weights between age classification categories (p = 0.003 and 0.001) but not in dressing percentages (p = 0.1 and 0.1). The carcass weight of buffalo was 104 (±23.1)-176 (±12.0) kg compared to 65 (±8.7)-84 (±6.5) kg of cattle, with dressing percentages of 37-40 and 39-42 %, respectively. Despite an average bovine meat price increase of 42-48 % between 2011 and 2013, there was a reduction in the numbers of large ruminants slaughtered in the surveyed cities of LPB (11 %) and XK (7 %), with bovine meat availability per person of 5.2-6.6 kg (LPB) and 3.0-3.8 kg (XK). Improving the sustainability of the bovine meat supply in Laos requires a systems approach involving improvements to animal health and production, livestock marketing, plus the critical development of improved slaughterhouse facilities enabling a meat-processing sector to emerge. This development pathway is of particular importance for building the capacity of Laos to reduce food insecurity and alleviate the poverty of its largely rural smallholder community.

  9. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  10. Five-year results from a prospective multicentre study of percutaneous pulmonary valve implantation demonstrate sustained removal of significant pulmonary regurgitation, improved right ventricular outflow tract obstruction and improved quality of life

    DEFF Research Database (Denmark)

    Hager, Alfred; Schubert, Stephan; Ewert, Peter

    2017-01-01

    . The EQ-5D quality of life utility index and visual analogue scale scores were both significantly improved six months post PPVI and remained so at five years. CONCLUSIONS: Five-year results following PPVI demonstrate resolved moderate or severe pulmonary regurgitation, improved right ventricular outflow...

  11. Parliamentary control of security information agency in terms of security culture: State and problems

    Directory of Open Access Journals (Sweden)

    Radivojević Nenad

    2013-01-01

    Full Text Available Even though security services have the same function as before, today they have different tasks and significantly more work than before. Modern security problems of the late 20th and early 21st century require states to reorganize their security services, adapting them to the new changes. The reorganization involves, among other things, giving wider powers of the security services, in order to effectively counter the growing and sophisticated security threats, which may also lead to violations of human rights and freedoms. It is therefore necessary to define the right competence, organization, authority and control of these services. In democratic countries, there are several institutions with different levels of control of security services. Parliament is certainly one of the most important institutions in that control, both in the world and in our country. Powers, finance, the use of special measures and the nature and scope of work of the Security Information Agency are certainly object of the control of the National Assembly. What seems to be the problem is achieving a balance between the need for control of security services and security services to have effective methods for combating modern security problems. This paper presents the legal framework related to the National Assembly control of the Security Intelligence Agency, as well as the practical problems associated with this type of control. We analyzed the role of security culture as one of the factors of that control. In this regard, it provides guidance for the practical work of the members of parliament who control the Security Intelligence Agency, noting in particular the importance of and the need for continuous improvement of security culture representatives.

  12. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  13. Water System Security and Resilience in Homeland Security Research

    Science.gov (United States)

    EPA's water security research provides tools needed to improve infrastructure security and to recover from an attack or contamination incident involving chemical, biological, or radiological (CBR) agents or weapons.

  14. Forensic nursing in secure environments.

    Science.gov (United States)

    Shelton, Deborah

    2009-01-01

    There are few well-designed studies of corrections or prison nursing roles. This study seeks to describe the corrections or prison role of forensic nurses in the United States who provide care in secure environments. National data detailing the scope of practice in secure environments are limited. This pencil and paper survey describes the roles of 180 forensic nurses from 14 states who work in secure environments. Descriptive statistics are utilized. A repeated measures ANOVA with post hoc analyses was implemented. These nurses were older than average in age, but had 10 years or less experience in forensic nursing practice. Two significant roles emerged to "promote and implement principles that underpin effective quality and practice" and to "assess, develop, implement, and improve programs of care for individuals." Significant roles varied based upon the security classification of the unit or institution in which the nurses were employed. Access to information about these nurses and their nursing practice was difficult in these closed systems. Minimal data are available nationally, indicating a need for collection of additional data over time to examine changes in role. It is through such developments that forensic nursing provided in secure environments will define its specialization and attract the attention it deserves.

  15. Addition of 2-(ethylamino)acetonitrile group to nitroxoline results in significantly improved anti-tumor activity in vitro and in vivo.

    Science.gov (United States)

    Mitrović, Ana; Sosič, Izidor; Kos, Špela; Tratar, Urša Lampreht; Breznik, Barbara; Kranjc, Simona; Mirković, Bojana; Gobec, Stanislav; Lah, Tamara; Serša, Gregor; Kos, Janko

    2017-08-29

    Lysosomal cysteine peptidase cathepsin B, involved in multiple processes associated with tumor progression, is validated as a target for anti-cancer therapy. Nitroxoline, a known antimicrobial agent, is a potent and selective inhibitor of cathepsin B, hence reducing tumor progression in vitro and in vivo . In order to further improve its anti-cancer properties we developed a number of derivatives using structure-based chemical synthesis. Of these, the 7-aminomethylated derivative (compound 17 ) exhibited significantly improved kinetic properties over nitroxoline, inhibiting cathepsin B endopeptidase activity selectively. In the present study, we have evaluated its anti-cancer properties. It was more effective than nitroxoline in reducing tumor cell invasion and migration, as determined in vitro on two-dimensional cell models and tumor spheroids, under either endpoint or real time conditions. Moreover, it exhibited improved action over nitroxoline in impairing tumor growth in vivo in LPB mouse fibrosarcoma tumors in C57Bl/6 mice. Taken together, the addition of a 2-(ethylamino)acetonitrile group to nitroxoline at position 7 significantly improves its pharmacological characteristics and its potential for use as an anti-cancer drug.

  16. Auditing Organizational Security

    Science.gov (United States)

    2017-01-01

    Organi- zation for Standardiza- tion ( ISO ): ISO 27000 : Information Systems Se- curity Management. A robust program of internal auditing of a...improvement is the basis and underpinning of the ISO . All processes must be considered ongoing and never at an “end state.” Top management develops a...security management system, including security policies and security objectives, plus threats and risks. Orga- nizations already working with ISO 9000

  17. Economic security of modern Russia: the current state and prospects

    Directory of Open Access Journals (Sweden)

    Karanina Elena

    2018-01-01

    Full Text Available In the conditions of instability of the world economy and the introduction of sanctions against Russia by a number of countries, the problem of ensuring national economic security has become particularly relevant. This topic also has a high scientific, practical and social significance, as it allows to identify possible gaps in the economic security of modern Russia and timely develop mechanisms to eliminate them to protect the national interests of the state. The purpose of this article is to determine the state and prospects of improving the economic security of modern Russia. This can be achieved by solving the following tasks: review of existing methods to evaluate the economic security of country, conduct a SWOT analysis of economic security of modern Russia, the development of suggestions for its improvement. This research analyzes various aspects of the economic security of modern Russia. As a result, the author developed an integrated method to ensuring the economic security of the country, as well as a matrix of economic security within this method. The way of increase of economic security of modern Russia is offered. Thus, to overcome the threats for the economic security of modern Russia, it is necessary to implement the recommendations developed by the authors, including the establishment of their own production and the construction of an innovatively oriented model of the economy. This will ensure the economic security of modern Russia and its stable development in the future.

  18. Security analysis with improved design of post-confirmation mechanism for quantum sealed-bid auction with single photons

    Science.gov (United States)

    Zhang, Ke-Jia; Kwek, Leong-Chuan; Ma, Chun-Guang; Zhang, Long; Sun, Hong-Wei

    2018-02-01

    Quantum sealed-bid auction (QSA) has been widely studied in quantum cryptography. For a successful auction, post-confirmation is regarded as an important mechanism to make every bidder verify the identity of the winner after the auctioneer has announced the result. However, since the auctioneer may be dishonest and collude with malicious bidders in practice, some potential loopholes could exist. In this paper, we point out two types of collusion attacks for a particular post-confirmation technique with EPR pairs. And it is not difficult to see that there exists no unconditionally secure post-confirmation mechanism in the existing QSA model, if the dishonest participants have the ability to control multiparticle entanglement. In the view of this, we note that some secure implementation could exist if the participants are supposed to be semi-quantum, i.e., they can only control single photons. Finally, two potential methods to design post-confirmation mechanism are presented in this restricted scenario.

  19. Format of medical order sheet improves security of antibiotics prescription: The experience of an intensive care unit.

    Science.gov (United States)

    Wasserfallen, Jean-Blaise; Bütschi, Anne-Joëlle; Muff, Patrik; Biollaz, Jérôme; Schaller, Marie-Denise; Pannatier, André; Revelly, Jean-Pierre; Chiolero, René

    2004-03-01

    To assess whether formatting the medical order sheet has an effect on the accuracy and security of antibiotics prescription. Prospective assessment of antibiotics prescription over time, before and after the intervention, in comparison with a control ward. The medical and surgical intensive care unit (ICU) of a university hospital. All patients hospitalized in the medical or surgical ICU between February 1 and April 30, 1997, and July 1 and August 31, 2000, for whom antibiotics were prescribed. Formatting of the medical order sheet in the surgical ICU in 1998. Compliance with the American Society of Hospital Pharmacists' criteria for prescription safety was measured. The proportion of safe orders increased in both units, but the increase was 4.6 times greater in the surgical ICU (66% vs. 74% in the medical ICU and 48% vs. 74% in the surgical ICU). For unsafe orders, the proportion of ambiguous orders decreased by half in the medical ICU (9% vs. 17%) and nearly disappeared in the surgical ICU (1% vs. 30%). The only missing criterion remaining in the surgical ICU was the drug dose unit, which could not be preformatted. The aim of antibiotics prescription (either prophylactic or therapeutic) was indicated only in 51% of the order sheets. Formatting of the order sheet markedly increased security of antibiotics prescription. These findings must be confirmed in other settings and with different drug classes. Formatting the medical order sheet decreases the potential for prescribing errors before full computerized prescription is available.

  20. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  1. Co-overexpressing a Plasma Membrane and a Vacuolar Membrane Sodium/Proton Antiporter Significantly Improves Salt Tolerance in Transgenic Arabidopsis Plants

    Science.gov (United States)

    Pehlivan, Necla; Sun, Li; Jarrett, Philip; Yang, Xiaojie; Mishra, Neelam; Chen, Lin; Kadioglu, Asim; Shen, Guoxin; Zhang, Hong

    2016-01-01

    The Arabidopsis gene AtNHX1 encodes a vacuolar membrane-bound sodium/proton (Na+/H+) antiporter that transports Na+ into the vacuole and exports H+ into the cytoplasm. The Arabidopsis gene SOS1 encodes a plasma membrane-bound Na+/H+ antiporter that exports Na+ to the extracellular space and imports H+ into the plant cell. Plants rely on these enzymes either to keep Na+ out of the cell or to sequester Na+ into vacuoles to avoid the toxic level of Na+ in the cytoplasm. Overexpression of AtNHX1 or SOS1 could improve salt tolerance in transgenic plants, but the improved salt tolerance is limited. NaCl at concentration >200 mM would kill AtNHX1-overexpressing or SOS1-overexpressing plants. Here it is shown that co-overexpressing AtNHX1 and SOS1 could further improve salt tolerance in transgenic Arabidopsis plants, making transgenic Arabidopsis able to tolerate up to 250 mM NaCl treatment. Furthermore, co-overexpression of AtNHX1 and SOS1 could significantly reduce yield loss caused by the combined stresses of heat and salt, confirming the hypothesis that stacked overexpression of two genes could substantially improve tolerance against multiple stresses. This research serves as a proof of concept for improving salt tolerance in other plants including crops. PMID:26985021

  2. Co-overexpressing a Plasma Membrane and a Vacuolar Membrane Sodium/Proton Antiporter Significantly Improves Salt Tolerance in Transgenic Arabidopsis Plants.

    Science.gov (United States)

    Pehlivan, Necla; Sun, Li; Jarrett, Philip; Yang, Xiaojie; Mishra, Neelam; Chen, Lin; Kadioglu, Asim; Shen, Guoxin; Zhang, Hong

    2016-05-01

    The Arabidopsis gene AtNHX1 encodes a vacuolar membrane-bound sodium/proton (Na(+)/H(+)) antiporter that transports Na(+) into the vacuole and exports H(+) into the cytoplasm. The Arabidopsis gene SOS1 encodes a plasma membrane-bound Na(+)/H(+) antiporter that exports Na(+) to the extracellular space and imports H(+) into the plant cell. Plants rely on these enzymes either to keep Na(+) out of the cell or to sequester Na(+) into vacuoles to avoid the toxic level of Na(+) in the cytoplasm. Overexpression of AtNHX1 or SOS1 could improve salt tolerance in transgenic plants, but the improved salt tolerance is limited. NaCl at concentration >200 mM would kill AtNHX1-overexpressing or SOS1-overexpressing plants. Here it is shown that co-overexpressing AtNHX1 and SOS1 could further improve salt tolerance in transgenic Arabidopsis plants, making transgenic Arabidopsis able to tolerate up to 250 mM NaCl treatment. Furthermore, co-overexpression of AtNHX1 and SOS1 could significantly reduce yield loss caused by the combined stresses of heat and salt, confirming the hypothesis that stacked overexpression of two genes could substantially improve tolerance against multiple stresses. This research serves as a proof of concept for improving salt tolerance in other plants including crops. © The Author 2016. Published by Oxford University Press on behalf of Japanese Society of Plant Physiologists.

  3. Transforming Security Screening With Biometrics

    National Research Council Canada - National Science Library

    Hearnsberger, Brian J

    2003-01-01

    ... and identity theft to dramatically improve physical security. Today, biometric technology could be implemented to transform physical security by enhancing screening procedures currently in use at U.S...

  4. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  5. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  6. Global Positioning System : significant challenges in sustaining and upgrading widely used capabilities : report to the Subcommittee on National Security and Foreign Affairs, Committee on Oversight and Government Reform, House of Representatives.

    Science.gov (United States)

    2009-04-01

    The Global Positioning System (GPS), which provides positioning, navigation, and timing data to users worldwide, has become essential to U.S. national security and a key tool in an expanding array of public service and commercial applications at home...

  7. Vitamin D and Calcium Addition during Denosumab Therapy over a Period of Four Years Significantly Improves Lumbar Bone Mineral Density in Japanese Osteoporosis Patients

    Directory of Open Access Journals (Sweden)

    Takako Suzuki

    2018-02-01

    Full Text Available This study investigated whether or not vitamin D and calcium supplementation affected bone metabolism and bone mineral density (BMD over a period of four years of denosumab therapy in patients with primary osteoporosis. Patients were divided into a denosumab monotherapy group (22 cases or a denosumab plus vitamin D and calcium supplementation group (combination group, 21 cases. We measured serum bone alkaline phosphatase (BAP, tartrate-resistant acid phosphatase (TRACP-5b, urinary N-terminal telopeptide of type-I collagen (NTX, and BMD of the lumbar 1–4 vertebrae (L-BMD and bilateral hips (H-BMD at baseline and at 12, 24, 36, and 48 months of treatment. There were no significant differences in patient background. Serum BAP, TRACP-5b, and urinary NTX were significantly and comparably inhibited in both groups from 12 to 48 months versus baseline values. L-BMD was significantly increased at every time point in both groups, while H-BMD was significantly increased at every time point in the combination group only. There were significant differences between the groups for L-BMD at 24, 36, and 48 months (P < 0.05 and for H-BMD at 12 months (P < 0.05. Compared with denosumab monotherapy, combination therapy of denosumab plus vitamin D and calcium significantly increased H-BMD at 12 months and L-BMD from 24 to 48 months. These findings indicate that continuous vitamin D and calcium supplementation is important, especially for 12 months to improve H-BMD and from 24 to 48 months to improve L-BMD.

  8. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  9. Significant improvement of olfactory performance in sleep apnea patients after three months of nasal CPAP therapy - Observational study and randomized trial.

    Directory of Open Access Journals (Sweden)

    Bettina Boerner

    Full Text Available The olfactory function highly impacts quality of life (QoL. Continuous positive airway pressure is an effective treatment for obstructive sleep apnea (OSA and is often applied by nasal masks (nCPAP. The influence of nCPAP on the olfactory performance of OSA patients is unknown. The aim of this study was to assess the sense of smell before initiation of nCPAP and after three months treatment, in moderate and severe OSA patients.The sense of smell was assessed in 35 patients suffering from daytime sleepiness and moderate to severe OSA (apnea/hypopnea index ≥ 15/h, with the aid of a validated test battery (Sniffin' Sticks before initiation of nCPAP therapy and after three months of treatment. Additionally, adherent subjects were included in a double-blind randomized three weeks CPAP-withdrawal trial (sub-therapeutic CPAP pressure.Twenty five of the 35 patients used the nCPAP therapy for more than four hours per night, and for more than 70% of nights (adherent group. The olfactory performance of these patients improved significantly (p = 0.007 after three months of nCPAP therapy. When considering the entire group of patients, olfaction also improved significantly (p = 0.001. In the randomized phase the sense of smell of six patients deteriorated under sub-therapeutic CPAP pressure (p = 0.046 whereas five patients in the maintenance CPAP group showed no significant difference (p = 0.501.Olfactory performance improved significantly after three months of nCPAP therapy in patients suffering from moderate and severe OSA. It seems that this effect of nCPAP is reversible under sub-therapeutic CPAP pressure.ISRCTN11128866.

  10. Water security evaluation in Yellow River basin

    Science.gov (United States)

    Jiang, Guiqin; He, Liyuan; Jing, Juan

    2018-03-01

    Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.

  11. Effects of a community scorecard on improving the local health system in Eastern Democratic Republic of Congo: qualitative evidence using the most significant change technique.

    Science.gov (United States)

    Ho, Lara S; Labrecque, Guillaume; Batonon, Isatou; Salsi, Viviana; Ratnayake, Ruwan

    2015-01-01

    More than a decade of conflict has weakened the health system in the Democratic Republic of Congo and decreased its ability to respond to the needs of the population. Community scorecards have been conceived as a way to increase accountability and responsiveness of service providers, but there is limited evidence of their effects, particularly in fragile and conflict-affected contexts. This paper describes the implementation of community scorecards within a community-driven reconstruction project in two provinces of eastern Democratic Republic of Congo. Between June 2012 and November 2013, 45 stories of change in the health system were collected from village development committee, health committee, community members (20 men and 18 women) and healthcare providers (n = 7) in 25 sites using the Most Significant Change technique. Stories were analyzed qualitatively for content related to the types and mechanisms of change observed. The most salient changes were related to increased transparency and community participation in health facility management, and improved quality of care. Quality of care included increased access to services, improved patient-provider relationships, improved performance of service providers, and improved maintenance of physical infrastructure. Changes occurred through many different mechanisms including provider actions in response to information, pressure from community representatives, or supervisors; and joint action and improved collaboration by health facility committees and providers. Although it is often assumed that confrontation is a primary mechanism for citizens to change state-provided services, this study demonstrates that healthcare providers may also be motivated to change through other means. Positive experiences of community scorecards can provide a structured space for interface between community members and the health system, allowing users to voice their opinions and preferences and bridge information gaps for both

  12. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    physical protection system is not covered by such studies, since this type of detection gives no information on either the effectiveness or the reliability of the MC and A systems. A critical scenario is defined as one which leads to discrepancies involving substantial amounts of NM or for which the detection delay is long. Special care is taken when analysing these scenarios. For critical scenarios, sensitivity analysis could be made to determine the smallest quantity of NM the disappearance of which could be detected or the criteria leading to the detection of the disappearance in the control system or in the accounting system. The threats taken into account are identified with reference to the design basis threat specified by the competent authority. Both internal and external threats are taken in account. Internal threats are defined as attempts by insiders to steal quantities of nuclear material, either once or on several occasions; accumulating these quantities leads to a significant quantity of NM. External threats are defined as attempts by groups of aggressors to steal significant amounts of nuclear material. Two hypotheses are taken into account to test the ability of the physical protection system to counter threats of this type. The first is based on a small group of aggressors with limited resources and the second involves a larger team with more sophisticated resources. Of course security studies have to be carried out in compliance with the corresponding confidentiality rules. In addition, such studies have to be regularly updated, notably if significant modifications are made in the MC and A or PP systems. It is important that security studies are available in the facilities for competent personnel, as it gives the rationale behind control and protection of NM. In particular, it could be used, in a performance-based approach, to support analysis reports or to illustrate that the required level of security has been reached. (author)

  13. VMware vCloud security

    CERN Document Server

    Sarkar, Prasenjit

    2013-01-01

    VMware vCloud Security provides the reader with in depth knowledge and practical exercises sufficient to implement a secured private cloud using VMware vCloud Director and vCloud Networking and Security.This book is primarily for technical professionals with system administration and security administration skills with significant VMware vCloud experience who want to learn about advanced concepts of vCloud security and compliance.

  14. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  15. While Working Around Security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    Users of technology encounter various IT security mechanisms in their everyday lives. If these mechanisms fail to support everyday activities, they either get in the way, or the users find a way to work around them. Even though users manage to carry out everyday activities by using substandard...... IT security mechanisms or via workarounds, it will influence their experience of security. If researchers and designers only focus on IT security artifacts and fail to take the user experience into account, incorrect processes or workarounds will occur. Accordingly, to get users to follow the correct process...... may seem to be a criterion of success, even though it may yield a less appropriate experience of security. This dissertation deals with an improved understanding of IT security sensitive IT artifacts and presents three design methods, and a framework for addressing the complexities and contingencies...

  16. While working around security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg; Bødker, Susanne; Petersen, Marianne Graves

    This paper describes our work at two levels. First of all the paper discusses how users of IT deal with issues of IT security in their everyday life. Secondly, we discuss how the kind of understanding of IT security that comes out of careful analyses of use confronts the ways in which usable...... IT security is established in the literature. Recent literature has called for better conceptual models as a starting point for improving IT security. In contrast to such models we propose to dress up designers by helping them better understand the work that goes into everyday security. The result...... is a methodological toolbox that helps address and design for usable and useful IT security. We deploy examples of analyses and design, carried out by ourselves and by others to fine-tune our design perspective; in particular we use examples from three current research projects....

  17. Gross anatomy of network security

    Science.gov (United States)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  18. Joining forces for food security - Linking earth observation and crowd-sourcing for improved decision-support to aid organizations

    Science.gov (United States)

    Enenkel, M.; Dorigo, W.; See, L. M.; Vinck, P.; Pham, P.

    2013-12-01

    Droughts statistically exceed all other natural disasters in spatio-temporal extent, number of people affected or financial loss. Triggered by crop failure, food insecurity is a major manifestation of agricultural drought and water scarcity. However, other socio-economic precursors, such as chronically low levels of disaster preparedness, hampered access to food security or a lack of social safety nets are equally important factors. Consequently, this study is focused on two complementary developments - a new satellite-derived agricultural drought index and a mobile phone application. The Combined Drought Index (CDI) is enhanced by replacing field measurements of temperature and rainfall modelled/assimilated data. The vegetation component is replaced by a smoothed NDVI dataset. A soil moisture component is introduced to close the gap between rainfall deficiencies and the first visible impacts of atmospheric anomalies on vegetation. The mobile phone application enables the validation of drought index outputs and gives aid organizations an opportunity to increase the speed of socio-economic vulnerability assessments. Supported by Doctors without Borders (MSF) this approach aims at decreasing uncertainties in decision-making via a more holistic risk framework.

  19. Network Security Visualization

    National Research Council Canada - National Science Library

    1999-01-01

    The application of interactive, three-dimensional viewing techniques to the representation of security-related, computer network status and events is expected to improve the timeliness and efficiency...

  20. A facile template method to synthesize significantly improved LiNi0.5Mn1.5O4 using corn stalk as a bio-template

    International Nuclear Information System (INIS)

    Liu, Guiyang; Kong, Xin; Sun, Hongyan; Wang, Baosen; Yi, Zhongzhou; Wang, Quanbiao

    2014-01-01

    In order to simplify the template method for the synthesis of cathode materials for lithium ion batteries, a facile template method using plant stalks as bio-templates has been introduced. Based on this method, LiNi 0.5 Mn 1.5 O 4 spinel with a significantly improved electrochemical performance has been synthesized using corn stalk as a template. X-ray diffraction (XRD), Fourier transform infrared pectroscopy (FTIR) and scanning electron microscope (SEM) have been used to investigate the phase composition and micro-morphologies of the products. Charge-discharge measurements in lithium cells, cyclic voltammetry (CV) and Electrochemical impedance spectroscopy (EIS) have been used to study the electrochemical performance of the products. The results indicate that the templated product exhibits higher crystallinity than that of non-templated product. Both of the templated product and the non-templated product are combination of the ordered space group P4 3 32 and the disordered Fd-3 m. The specific BET surface area of the templated product is about twice larger than that of the non-templated product. Moreover, the electrochemical performances of the templated product including specific capacity, cycling stability and rate capability are significantly improved as compared with the non-templated product, due to its higher crystallinity, larger Li + diffusion coefficient and lower charge transfer resistance