WorldWideScience

Sample records for small secure transportable

  1. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  2. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  3. Modified Small Business Network Security

    OpenAIRE

    Md. Belayet Ali; Oveget Das; Md. Shamim Hossain

    2012-01-01

    This paper covers some likely threats and effectivesteps for a secure small business. It also involves a flowchart tocomprehend the overall small business network security easilyand we identify a set of security issues and applyappropriate techniques to satisfy the correspondingsecurity requirements. In respect of all, this document isstrong enough for any small business network security.

  4. Status and determinants of small farming households' food security and role of market access in enhancing food security in rural Pakistan.

    Directory of Open Access Journals (Sweden)

    Umar Ijaz Ahmed

    Full Text Available In most of the developing countries, lack of resources and little market accessibility are among the major factors that affect small farming household food security. This study aims to investigate the status of small farming households' food security, and its determinants including the role of market accessibility factors in enhancing food security at household level. In addition, this study also determines the households' perception about different kinds of livelihoods risks. This study is based on a household survey of 576 households conducted through face-to-face interviews using structured interviews in Punjab, Pakistan. Food security status is calculated using dietary intake method. The study findings show that one-fourth of the households are food insecure. The study findings reveal that farm households perceive increase in food prices, crop diseases, lack of irrigation water and increase in health expenses as major livelihood risks. Further, the results of logistic regression show that family size, monthly income, food prices, health expenses and debt are main factors influencing the food security status of rural households. Furthermore, the market accessibility factors (road distance and transportation cost do significantly affect the small farming household food security. The results suggest that local food security can be enhanced by creating off-farm employment opportunities, improved transportation facilities and road infrastructure.

  5. Australian Experience in Implementing Transport Safety Regulations and Transport Security Recommendations

    International Nuclear Information System (INIS)

    Sarkar, S.

    2016-01-01

    Australian transport safety and security regulatory framework is governed by Commonwealth, State and Territory legislations. There are eleven competent authorities in Australia that includes three Commonwealth authorities, six states and two territory authorities. IAEA Regulations for Safe Transport of Radioactive Material (TS-R-1, 2005 edition) is applied through Australian Radiation Protection and Nuclear Safety Agency (ARPANSA) Code of Practice for Transport of Radioactive Material 2008 by road, rail and waterways not covered by marine legislations. All states and territories apply this Transport Code through their regulatory system. For air transport, the Civil Aviation Act 1988 adopts the requirements of the ICAO Technical Instructions for the Safe Transport of Dangerous Goods by Air DOC 9284, which also adopts TS-R-1. The security of radioactive material in air transport is achieved via the Aviation Transport Security Act 2004. For sea transport Australian Marine Order 41 applies the requirements of IMDG (International Maritime Dangerous Goods) Code which also adopts TS-R-1. The security of radioactive material (nuclear material) is governed by two Commonwealth Agencies namely, ARPANSA and ASNO (Australian Safeguards and Non-proliferation Office) . ARPANSA regulates the security of radioactive sources through ARPANSA Code of Practice for the Security of Radioactive Sources 2007 which is based on the IAEA Draft Security Series. ASNO regulates security of nuclear material including U, Th and Pu through the Nuclear Non-Proliferation (Safeguards) Act, and the object of which is to give effect to certain obligations that Australia has as a party to the NPT, Australia’s safeguards agreement with the IAEA, and other bilateral safeguards agreements and certain obligations that Australia has as a party to the Convention for the Physical Protection of Nuclear Materials (CPPNM). This paper presents the effectiveness of regulatory approaches for safe and secure

  6. The IAEA Assistance Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard R [ORNL; Hawk, Mark B [ORNL; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  7. ICS security in maritime transportation : a white paper examining the security and resiliency of critical transportation infrastructure

    Science.gov (United States)

    2013-07-29

    The John A. Volpe National Transportation Systems Center was asked by the Office of Security of the Maritime Administration to examine the issue of industrial control systems (ICS) security in the Maritime Transportation System (MTS), and to develop ...

  8. The IAEA Assistance and Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Hawk, Mark B [ORNL; Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard [Transport Security and Safety, Oak Ridge; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  9. A method to assess multi-modal hazmat transport security vulnerabilities: Hazmat transport SVA

    NARCIS (Netherlands)

    Reniers, G.L.L.; Dullaert, W.E.H.

    2013-01-01

    The suggested Hazmat transport Security Vulnerability Assessment (SVA) methodology presents a user-friendly approach to determine relative security risk levels of the different modes of hazardous freight transport (i.e., road, railway, inland waterways and pipeline transportation). First, transport

  10. Performativity and the project: enacting urban transport security in Europe

    NARCIS (Netherlands)

    Hoijtink, M.

    2015-01-01

    In April 2011, a large consortium of European rail and security suppliers, transport operators and research organisations launched the Secured Urban Transportation - European Demonstration (SECUR-ED) project with the objective of providing public transport operators with the means to enhance urban

  11. Intra-site Secure Transport Vehicle test and evaluation

    International Nuclear Information System (INIS)

    Scott, S.

    1995-01-01

    In the past many DOE and DoD facilities involved in handling nuclear material realized a need to enhance the safely and security for movement of sensitive materials within their facility, or ''intra-site''. There have been prior efforts to improve on-site transportation; however, there remains a requirement for enhanced on-site transportation at a number of facilities. The requirements for on-site transportation are driven by security, safety, and operational concerns. The Intra-site Secure Transport Vehicle (ISTV) was designed to address these concerns specifically for DOE site applications with a standardized vehicle design. This paper briefly reviews the ISTV design features providing significant enhancement of onsite transportation safety and security, and also describes the test and evaluation activities either complete of underway to validate the vehicle design and operation

  12. 76 FR 5232 - Small Business Information Security Task Force

    Science.gov (United States)

    2011-01-28

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the third meeting of the Small Business Information Security...

  13. 75 FR 77934 - Small Business Information Security Task Force

    Science.gov (United States)

    2010-12-14

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the second meeting of the Small Business Information Security...

  14. 75 FR 70764 - Small Business Information Security Task Force

    Science.gov (United States)

    2010-11-18

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the first meeting of the Small Business Information Security...

  15. 76 FR 11307 - Small Business Information Security Task Force

    Science.gov (United States)

    2011-03-01

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the third meeting of the Small Business Information Security...

  16. Training on Transport Security of Nuclear/Radioactive Materials for Key Audiences

    Energy Technology Data Exchange (ETDEWEB)

    Pope, Ronald; Liu, Yung; Shuler, J.M.

    2016-01-01

    Beginning in 2013, the U.S. Department of Energy (DOE) Packaging Certification Program (PCP), Office of Packaging and Transportation, Office of Environmental Management has sponsored a series of three training courses on Security of Nuclear and Other Radioactive Materials during Transport. These courses were developed and hosted by Argonne National Laboratory staff with guest lecturers from both the U.S. and international organizations and agencies including the U.S. Nuclear Regulatory Commission (NRC), Federal Bureau of Investigation (FBI), the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA), DOE national laboratories, the International Atomic Energy Agency (IAEA), the World Nuclear Transport Institute (WNTI), and the World Institute for Nuclear Security (WINS). Each of the three courses held to date were one-week in length. The courses delved in detail into the regulatory requirements for transport security, focusing on international and U.S.-domestic requirements and guidance documents. Lectures, in-class discussions and small group exercises, including tabletop (TTX) and field exercises were designed to enhance the learning objectives for the participants. For example, the field exercise used the ARG-US radio frequency identification (RFID) remote surveillance system developed by Argonne for DOE/PCP to track and monitor packages in a mock shipment, following in-class exercises of developing a transport security plan (TSP) for the mock shipment, performing a readiness review and identifying needed corrective actions. Participants were able to follow the mock shipment on the webpage in real time in the ARG-US Command Center at Argonne including “staged” incidents that were designed to illustrate the importance of control, command, communication and coordination in ensuring transport security. Great lessons were learned based on feedback from the participant’s course evaluations with the series of the courses. Since the

  17. STATE REGULATION OF CARGO SECURING FOR ROAD TRANSPORT

    Directory of Open Access Journals (Sweden)

    Nikolay Anatolievich Atrokhov

    2015-09-01

    Full Text Available This article examines the legal documents governing the securing of cargo in road transport, provides an overview of international experience in the safety of road transport of goods by means of securing.

  18. International Conference on the Safe and Secure Transport of Radioactive Material: The Next Fifty Years of Transport - Creating a Safe, Secure and Sustainable Framework. Papers and Presentations

    International Nuclear Information System (INIS)

    2011-01-01

    The objective of the conference is to encourage application of appropriate levels of safety and security during transport by: Promoting international discussion on the safety and security of radioactive material transport; Identifying and sharing best practices; Identifying issues and problems; Identifying opportunities, such as providing assistance, to support national adoption of comprehensive transport safety and security frameworks; Developing ideas for coordinating and enhancing transport safety and security. Scope of the Conference: Nuclear and other radioactive material in legal regulated transport (not illicit trafficking, smuggling, etc.); All modes of transport; Safety; Security; Domestic and international movements, including transit; Response to accidents and security events; Legislative and regulatory requirements and approaches; Practical issues such as transport logistics; Regional networks; and Information security and the need for transparency. The conference is not intended to cover the technical topics covered in the PATRAM conference (package design and analysis).

  19. Risk to Water Security on Small Islands

    Science.gov (United States)

    Holding, S. T.; Allen, D. M.

    2013-12-01

    The majority of fresh water available on small islands is shallow groundwater that forms a freshwater lens. Freshwater lenses are generally limited in extent and as such are vulnerable to many stressors that impact water security. These include stressors related to climate change, such as sea level rise, as well as those related to human impacts, such as contamination. Traditionally, water security assessments have focussed on indicators that provide a snapshot of the current condition. However, recent work suggests that in order to effectively manage the water system, it is also important to consider uncertain future impacts to the system by evaluating how different stressors might impact water security. In this study, a framework for assessing risk to water security was developed and tested on Andros Island in The Bahamas. The assessment comprises two main components that characterise the water system: numerical modelling studies and a hazard survey. A baseline numerical model of the freshwater lens throughout Andros Island was developed to simulate the morphology of the freshwater lens and estimate the freshwater resources currently available. The model was prepared using SEAWAT, a density-dependent flow and solute transport code. Various stressors were simulated in the model to evaluate the response of the freshwater lens to predicted future shifts in climate patterns, sea level rise, and changes in water use. A hazard survey was also conducted on the island to collect information related to the storage of contaminants, sanitation infrastructure, waste disposal practices and groundwater abstraction rates. The results of the survey form a geo-spatial database of the location and associated hazards to the freshwater lens. The resulting risk framework provides a ranking of overall risk to water security based on information from the numerical modelling and hazard survey. The risk framework is implemented in a Geographic Information System (GIS) and provides a map

  20. Aviation security : status of transportation security inspector workforce.

    Science.gov (United States)

    2009-02-06

    This report was written in response to House Report 110-181, accompanying H.R. 2638, the Department of Homeland Security Appropriations Bill, 2008. In accordance with direction in that report, we are reporting on the operation of the transportation s...

  1. Security measures in transport of radiation source in Jordan

    Energy Technology Data Exchange (ETDEWEB)

    Mohammad, Alslman [Korea Advanced Institute of Science and Technology, Kaist Daejeon (Korea, Republic of); Choi, Kwang Sik [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2011-05-15

    Radioactive materials are used in Jordan for peaceful applications in medicine, industry, agriculture, environmental science, education and research and military applications. Most of these radioactive sources used are imported, therefore trans-boundary movement is a significant factor in consideration of security measures during movement of these sources. After 11/9 2001 event, IAEA efforts began to focus and concentrate on security in transport of radioactive materials, after the emergence of risks of using these sources in terrorist activities. In 2002, Efforts were initiated by the IAEA to provide additional guidance for security in the transport of radioactive materials, based upon the new security requirements in the Recommendations on the Transport of Dangerous Goods. This paper reviews some of the measures relating to the transport of radioactive materials in Jordan

  2. Security for small computer systems a practical guide for users

    CERN Document Server

    Saddington, Tricia

    1988-01-01

    Security for Small Computer Systems: A Practical Guide for Users is a guidebook for security concerns for small computers. The book provides security advice for the end-users of small computers in different aspects of computing security. Chapter 1 discusses the security and threats, and Chapter 2 covers the physical aspect of computer security. The text also talks about the protection of data, and then deals with the defenses against fraud. Survival planning and risk assessment are also encompassed. The last chapter tackles security management from an organizational perspective. The bo

  3. Report of the DHS Small Vessel Security Institute

    National Research Council Canada - National Science Library

    Brownstein, Charles; Baker, John; Hull, Peter; Minogue, Nicholas; Murphy, George; Winston, Phyllis

    2007-01-01

    The purpose of the National Small Vessel Security Summit (NSVSS) was to engage private, commercial and government stakeholders in discussions on a range of issues involving the security risks posed by small vessels in the U.S...

  4. International Regulations for Transport of Radioactive Materials, History and Security

    International Nuclear Information System (INIS)

    EL-Shinawy, R.M.K.

    2013-01-01

    International Regulations for the transport of radioactive materials have been published by International Atomic Energy Agency (IAEA) since 1961. These Regulations have been widely adopted into national Regulations. Also adopted into different modal Regulations such as International Air Transport Association (IATA) and International Martime Organization (IMO). These Regulations provide standards for insuring a high level of safety of general public, transport workers, property and environment against radiation, contamination, criticality hazard and thermal effects associated with the transport of radioactive wastes and materials. Several reviews conducted in consultation with Member States (MS) and concerned international organizations, resulted in comprehensive revisions till now. Radioactive materials are generally transported by specialized transport companies and experts. Shippers and carriers have designed their transport operations to comply with these international Regulations. About 20 million consignments of radioactive materials take place around the world each year. These materials were used in different fields such as medicine, industry, agriculture, research, consumer product and electric power generation. After September 11,2001, the IAEA and MS have worked together to develop a new guidance document concerning the security in the transport of radioactive materials. IAEA have initiated activities to assist MS in addressing the need for transport security in a comprehensive manner. The security guidance and measures were mentioned and discussed. The transport security becomes more developed and integrated into national Regulations of many countries beside the safety Regulations. IAEA and other International organizations are working with MS to implement transport security programs such as guidance, training, security assessments and upgrade assistance in these fields.

  5. As for the Question of the Relationship Between the Concepts of «Security» and «Transport Security»

    Directory of Open Access Journals (Sweden)

    Nikita S. Ryazanov

    2017-08-01

    Full Text Available This article examines the problems of determining transport security, the correlation of this category with a generic notion of security and its other types. This paper examines the formation and development of modern legislative model for transport security. Threats to the safe and sustainable functioning of the transport complex are indicated by their types are also analyzed. In addition, the Author explores the terms «transport security» and «transport safety», which, despite the similarity of language, are the different contents in the regulations, and, consequently, definition. On the results of the analysis of national legislation, the problems of legal regulation of transportation security pointed out are pointed out and suggestions are made on ways to minimize these problems. According to the results of the research, the Author develops a unified definition of transport security and its object, which is relevant today.

  6. No nation is home alone: understanding the international dimension of homeland security through global transportation security programs

    OpenAIRE

    Tarpey, Dominique

    2016-01-01

    Approved for public release; distribution is unlimited Terrorist actors focus on the global transportation system to introduce threats and target attacks. As the lead department for securing the transportation system into the United States, the Department of Homeland Security (DHS) works both domestically and internationally to implement programs and foreign assistance activities to secure the global transportation network. This thesis examines DHS’ international role by analyzing programs...

  7. Information Security in Small and Medium-Sized Companies

    OpenAIRE

    David Kral

    2011-01-01

    Information security doesn’t involve only large organizations. Small and medium-sized companies must closely examine this issue too, because they are increasingly threatened by cyber attacks. Many of them mistakenly believe, that security of their valuable data is sufficient, or that the attackers are not interested in them. Existing standards and methodologies for implementation and management of information security are often hard to transfer to the environment of small and medium-sized bus...

  8. Transportation Security Institute: recruiting next generation professionals.

    Science.gov (United States)

    2012-08-01

    "The Center for Transportation Training and Research (CTTR), as part of Texas Southern University (TSU), served as host for the 2012 Transportation Security Institute (TSI) in Houston and surrounding area. The 2012 Houston TSI focuses on the mission ...

  9. Nuclear security regulatory framework analysis for small modular reactors in Canada and abroad

    Energy Technology Data Exchange (ETDEWEB)

    Farah, A., E-mail: amjad.farah@uoit.ca [University of Ontario Institute of Technology, Oshawa, ON (Canada)

    2015-07-01

    Small Modular Reactors (SMRs) are gaining global attention as a potential solution for future power plants due to claims of flexibility and cost effectiveness, while maintaining or increasing safety and security. With the change of design and the potential deployment in remote areas, however, challenges arise from a regulatory standpoint, to meet the safety and security regulations while maintaining economic feasibility. This work comprises of a review of the nuclear security regulatory frameworks in place for SMRs in Canada, USA and the IAEA; how they compare to each other, and to those of large reactors. The goal is to gauge what needs to be adjusted in order to address the changes in design between the two reactor sizes. Some key challenges concern the type of reactor, transportation of reactor components and fuel to remote areas, reduced security staff, and increased complexity of emergency planning and evacuation procedures. (author)

  10. Nuclear security regulatory framework analysis for small modular reactors in Canada and abroad

    International Nuclear Information System (INIS)

    Farah, A.

    2015-01-01

    Small Modular Reactors (SMRs) are gaining global attention as a potential solution for future power plants due to claims of flexibility and cost effectiveness, while maintaining or increasing safety and security. With the change of design and the potential deployment in remote areas, however, challenges arise from a regulatory standpoint, to meet the safety and security regulations while maintaining economic feasibility. This work comprises of a review of the nuclear security regulatory frameworks in place for SMRs in Canada, USA and the IAEA; how they compare to each other, and to those of large reactors. The goal is to gauge what needs to be adjusted in order to address the changes in design between the two reactor sizes. Some key challenges concern the type of reactor, transportation of reactor components and fuel to remote areas, reduced security staff, and increased complexity of emergency planning and evacuation procedures. (author)

  11. Report of the DHS National Small Vessel Security Summit

    National Research Council Canada - National Science Library

    Brownstein, Charles; Baker, John; Hull, Peter; Minogue, Nicholas; Murphy, George; Winston, Phyllis

    2007-01-01

    The purpose of the National Small Vessel Security Summit (NSVSS) was to engage private, commercial and government stakeholders in discussions on a range of issues involving the security risks posed by small vessels in the U.S...

  12. Security in the transport of radioactive material - interim guidance for comment

    International Nuclear Information System (INIS)

    Legoux, P.; Wangler, M.

    2004-01-01

    While the IAEA has provided specific guidance for physical protection in the transport of nuclear material, its previous publications have only provided some general guidelines for security of non-nuclear radioactive material in transport. Some basic practical advice has been provided in the requirements of the International Basic Safety Standards for Protection against Ionising Radiation and for the Safety of Radiation Sources (BSS) [1]. These guidelines were primarily directed toward such issues as unintentional exposure to radiation, negligence and inadvertent loss. Recently, the IAEA published a document on the security of sources, which included some general guidance on providing security during transport of the sources. However, it is clear that more guidance is needed for security during the transport of radioactive material in addition to those already existing for nuclear material. Member States have requested guidance on the type and nature of security measures that might be put in place for radioactive material in general during its transport and on the methodology to be used in choosing and implementing such measures. The purpose of the TECDOC on Security in the Transport of Radioactive Material being developed by the IAEA is to provide an initial response to that request. This interim guidance is being developed with a view to harmonizing the security guidance - as much as possible - with existing guidance from the IAEA for the transport of radioactive sources and nuclear material. It is also intended to harmonize with model requirements developed in 2002-2003 by the United Nations Economic and Social Council's Committee of Experts on the Transport of Dangerous Goods and on the Globally Harmonised System of Classification and Labelling of Chemicals which was issued as general security guidelines for all dangerous goods, including radioactive material, and that will shortly be implemented as binding regulations by the international modal authorities

  13. Security in the transport of radioactive material - interim guidance for comment

    Energy Technology Data Exchange (ETDEWEB)

    Legoux, P.; Wangler, M. [International Atomic Energy Agency, Vienna (Austria)

    2004-07-01

    While the IAEA has provided specific guidance for physical protection in the transport of nuclear material, its previous publications have only provided some general guidelines for security of non-nuclear radioactive material in transport. Some basic practical advice has been provided in the requirements of the International Basic Safety Standards for Protection against Ionising Radiation and for the Safety of Radiation Sources (BSS) [1]. These guidelines were primarily directed toward such issues as unintentional exposure to radiation, negligence and inadvertent loss. Recently, the IAEA published a document on the security of sources, which included some general guidance on providing security during transport of the sources. However, it is clear that more guidance is needed for security during the transport of radioactive material in addition to those already existing for nuclear material. Member States have requested guidance on the type and nature of security measures that might be put in place for radioactive material in general during its transport and on the methodology to be used in choosing and implementing such measures. The purpose of the TECDOC on Security in the Transport of Radioactive Material being developed by the IAEA is to provide an initial response to that request. This interim guidance is being developed with a view to harmonizing the security guidance - as much as possible - with existing guidance from the IAEA for the transport of radioactive sources and nuclear material. It is also intended to harmonize with model requirements developed in 2002-2003 by the United Nations Economic and Social Council's Committee of Experts on the Transport of Dangerous Goods and on the Globally Harmonised System of Classification and Labelling of Chemicals which was issued as general security guidelines for all dangerous goods, including radioactive material, and that will shortly be implemented as binding regulations by the international modal

  14. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Science.gov (United States)

    2010-02-23

    ... response to workplace violence, analyzes data as needed, and provides training. Additionally, DHS is... 1974; Department of Homeland Security Transportation Security Administration--023 Workplace Violence... Security Administration--023 Workplace Violence Prevention Program System of Records.'' This system will...

  15. Transportation Security : federal action needed to enhance security efforts : statement of Peter Guerrero, Director, Physical Infrastructure Issues

    Science.gov (United States)

    2003-09-09

    Mr. Guerrero's testimony examines (1) challenges in securing the nation's transportation system; (2) actions transportation operators, as well as state and local governments, have taken since September 11 to enhance security; (3) the federal role in ...

  16. 75 FR 28046 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-002...

    Science.gov (United States)

    2010-05-19

    ... security, law enforcement, immigration, intelligence, or other functions consistent with the routine uses... transportation operators, flight students, and others, where appropriate, for services related to security threat.... Enforce safety- and security-related regulations and requirements; 3. Assess and distribute intelligence...

  17. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... privacy issues, please contact: Jonathan Cantor, (202-343-1717), Acting Chief Privacy Officer, Privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  18. 77 FR 70795 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  19. 77 FR 70792 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ..., VA 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan R. Cantor... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  20. 77 FR 15114 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Science.gov (United States)

    2012-03-14

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire AGENCY: Transportation Security Administration, DHS. ACTION: 30-day Notice. SUMMARY: This notice...

  1. 75 FR 2556 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Science.gov (United States)

    2010-01-15

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire AGENCY: Transportation Security Administration, DHS. ACTION: 30-day notice. SUMMARY: This notice...

  2. Secure Media Independent Handover Message Transport in Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Cho Choong-Ho

    2009-01-01

    Full Text Available The IEEE 802.21 framework for Media Independent Handover (MIH provides seamless vertical handover support for multimode mobile terminals. MIH messages are exchanged over various wireless media between mobile terminals and access networks to facilitate seamless handover. This calls for the need to secure MIH messages against network security threats in the wireless medium. In this paper, we first analyze IPSec/IKEv2 and DTLS security solution for secure MIH message transport. We show that handover latency can be an impediment to the use of IPSec and DTLS solutions. To overcome the handover overhead and hence minimize authentication time, a new secure MIH message transport solution, referred as MIHSec in this paper, is proposed. Experimental results are obtained for MIH between WLAN and Ethernet networks and the impacts of MIH message security on the handover latency are evaluated for IPSec, DTLS, and MIHSec security solutions. The effectiveness of MIHSec is demonstrated.

  3. Analysis and comparison of transportation security systems

    International Nuclear Information System (INIS)

    Rinne, R.L.

    1976-05-01

    The role of modeling in the analysis of transportation security systems is described. Various modeling approaches are outlined. The conflict model developed in Sandia Laboratories' Transportation Mode Analysis for the NRC Special Safeguards Study is used to demonstrate the capability of models to determine system sensitivities and compare alternatives

  4. Molecular transport network security using multi-wavelength optical spins.

    Science.gov (United States)

    Tunsiri, Surachai; Thammawongsa, Nopparat; Mitatha, Somsak; Yupapin, Preecha P

    2016-01-01

    Multi-wavelength generation system using an optical spin within the modified add-drop optical filter known as a PANDA ring resonator for molecular transport network security is proposed. By using the dark-bright soliton pair control, the optical capsules can be constructed and applied to securely transport the trapped molecules within the network. The advantage is that the dark and bright soliton pair (components) can securely propagate for long distance without electromagnetic interference. In operation, the optical intensity from PANDA ring resonator is fed into gold nano-antenna, where the surface plasmon oscillation between soliton pair and metallic waveguide is established.

  5. 49 CFR 209.501 - Review of rail transportation safety and security route analysis.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Review of rail transportation safety and security....820 § 209.501 Review of rail transportation safety and security route analysis. (a) Review of route... establish that the route chosen by the carrier poses the least overall safety and security risk, the...

  6. 77 FR 19680 - Extension of Agency Information Collection Activity Under OMB Review: Rail Transportation Security

    Science.gov (United States)

    2012-04-02

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration [Docket No. TSA-2006-26514] Extension of Agency Information Collection Activity Under OMB Review: Rail Transportation Security AGENCY: Transportation Security Administration, DHS. ACTION: 30-day Notice. SUMMARY: This notice announces that the...

  7. Computer and Network Security in Small Libraries: A Guide for Planning.

    Science.gov (United States)

    Williams, Robert L.

    This manual is intended to provide a free resource on essential network security concepts for non-technical managers of small libraries. Managers of other small nonprofit or community organizations will also benefit from it. An introduction defines network security; outlines three goals of network security; discusses why a library should be…

  8. THE PROBLEM OF PROPER CARGO SECURING IN ROAD TRANSPORT – CASE STUDY

    Directory of Open Access Journals (Sweden)

    Maria CIEŚLA

    2013-12-01

    Full Text Available This paper presents the problem of improper security of cargo in trucks as the cause of about 25% of the accidents that takes place in road transport. Attention was drawn to aspects of legal liability for errors resulting from incorrect load securing according to polish law. Article was enriched with practical examples illustrating the effects of improper cargo securing on transport unit and shows how it had to be prepared properly. When planning the proper transport protection of metal sheets rolled both calculation methods and computer applications were used.

  9. CARONTE project: Creating an Agenda for Research on Transportation Security

    Energy Technology Data Exchange (ETDEWEB)

    Leon Bello, J.; Gonzalez Viosca, E.

    2016-07-01

    Europe’s prosperity relies on effective transport systems. Any attacks and disturbances to land freight and passenger transport would have significant impact on economic growth, territorial cohesion, social development and the environment. Unfortunately, there are weaknesses in the land transport security.The objective of CARONTE project is define a future research agenda for security in land transport that focuses on core gaps caused by emerging risks while avoiding any doubling-up of research elsewhere. Its research agenda will cover all threats, including cyber-crime, and security aspects across all modes of land transportation. At the same time, it will respect the fundamental human rights and privacy of European citizens. The step-by-step method of CARONTE’s consortium has analyzed the state of the art and emerging risks; has identified gaps, analyses and assessments of potential solutions; and has produced an overall research agenda for the future. CARONTE’s results will answer the following questions among others: Which existing research projects merit a follow up and extension? Where are the combinations or synergy effects to be attended? Which themes and topics should be elaborated in new research projects? Who should be involved and integrated in future research projects (stakeholders, authorities, etc.)? The CARONTE consortium includes universities and research institutes, companies, and end-users providing with experience in research and consultancy in transportation, logistics, infrastructure management, security and communications. ITENE - Instituto Tecnológico del Embalaje, Transporte y Logística-has been one of the Project partners among a total of 11 members from eight different countries in the European Union which have also been supported via a High Level Advisory Board. (Author)

  10. Application of the API/NPRA SVA methodology to transportation security issues.

    Science.gov (United States)

    Moore, David A

    2006-03-17

    Security vulnerability analysis (SVA) is becoming more prevalent as the issue of chemical process security is of greater concern. The American Petroleum Institute (API) and the National Petrochemical and Refiner's Association (NPRA) have developed a guideline for conducting SVAs of petroleum and petrochemical facilities in May 2003. In 2004, the same organizations enhanced the guidelines by adding the ability to evaluate transportation security risks (pipeline, truck, and rail). The importance of including transportation and value chain security in addition to fixed facility security in a SVA is that these issues may be critically important to understanding the total risk of the operation. Most of the SVAs done using the API/NPRA SVA and other SVA methods were centered on the fixed facility and the operations within the plant fence. Transportation interfaces alone are normally studied as a part of the facility SVA, and the entire transportation route impacts and value chain disruption are not commonly considered. Particularly from a national, regional, or local infrastructure analysis standpoint, understanding the interdependencies is critical to the risk assessment. Transportation risks may include weaponization of the asset by direct attack en route, sabotage, or a Trojan Horse style attack into a facility. The risks differ in the level of access control and the degree of public exposures, as well as the dynamic nature of the assets. The public exposures along the transportation route need to be carefully considered. Risks may be mitigated by one of many strategies including internment, staging, prioritization, conscription, or prohibition, as well as by administrative security measures and technology for monitoring and isolating the assets. This paper illustrates how these risks can be analyzed by the API/NPRA SVA methodology. Examples are given of a pipeline operation, and other examples are found in the guidelines.

  11. Computer security threats faced by small businesses in Australia

    OpenAIRE

    Hutchings, Alice

    2012-01-01

    In this paper, an overview is provided of computer security threats faced by small businesses. Having identified the threats, the implications for small business owners are described, along with countermeasures that can be adopted to prevent incidents from occurring. The results of the Australian Business Assessment of Computer User Security (ABACUS) survey, commissioned by the Australian Institute of Criminology (AIC), are drawn upon to identify key risks (Challice 2009; Richards 2009). Addi...

  12. Goal system for comparative assessments of nuclear fuel transport under security aspects

    International Nuclear Information System (INIS)

    Behrendt, V.; Schwieren, G.

    1983-01-01

    Due to the great hazard potential of nuclear fuel transports the possibility always exists during transportation that either a single perpetrator or a group of perpetrators will try to get possession of the nuclear fuel. One can assume that at the end of such illegal actions there will be a politically (or otherwise) motivated extortion. Thinking about security one has to face things like sabotage, attacks from inside or outside the system, robbery and/or dispersion of the transported goods. In respect to the security of nuclear transports we carried out an investigation for the German Ministry of the Interior in order to review the different levels of security of different transport systems. This paper deals with the methodological approach, especially with the goal system and the way we executed the investigation

  13. Maritime security : progress made in implementing Maritime Transportation Security Act, but concerns remain : statement of Margaret Wrightson, Director, Homeland Security and Justice Issues

    Science.gov (United States)

    2003-09-09

    After the events of September 11, 2001, concerns were raised over the security of U.S. ports and waterways. In response to the concerns over port security, Congress passed the Maritime Transportation Security Act in November 2002. The act created a b...

  14. Action at sea: Transport security exercise conducted off the coast of Sweden

    International Nuclear Information System (INIS)

    Isaksson, Stig; Jawerth, Nicole

    2015-01-01

    As in an action movie, ships, helicopters and uniformed people set the scene off the coast of Sweden on 6 May 2015 when national authorities conducted an exercise on security while transporting spent nuclear fuel. The exercise was part of a joint project with the IAEA to test and evaluate a new IAEA guide on planning, conducting and evaluating transport security exercises. The test subject and model was the security framework of Sweden’s national nuclear transport system, which regularly ships used fuel from power plants along the coast to the country’s interim storage facility for spent nuclear fuel.

  15. Assessment of Performance Measures for Security of the Maritime Transportation Network, Port Security Metrics : Proposed Measurement of Deterrence Capability

    Science.gov (United States)

    2007-01-03

    This report is the thirs in a series describing the development of performance measures pertaining to the security of the maritime transportation network (port security metrics). THe development of measures to guide improvements in maritime security ...

  16. Security and health protection during the transport of hazardous substances

    International Nuclear Information System (INIS)

    Benkovic, Z.; Bobic, V.

    2009-01-01

    The introduction of this work describes the legal regulations which regulate the conditions and method of the transport of hazardous substances, necessary documentation for storage, forwarding and transport. Hazardous substances are defined and classified according to the ADR. The necessary security measures which are taken for the transport of particular types of hazardous substances are mentioned. Marking and labeling of vehicles for the transport of hazardous substances (plates and lists of hazards), packing and marking of packaging is important. The safety measures which are taken at the filling stations of combustible liquids as well as places specially organized for filling, prohibitions and limitations and necessary transport documentation are mentioned. It is visible from the above mentioned that the activity of the whole security chain is necessary and depends on the good knowledge of basic characteristics and features of substances. All the participants in the security chain have to be familiar with and consistently obey the legal regulations. The manufacturer must know the features of the hazardous substance, supervisory services must be acquainted with the threat and potential danger. The hauler and intervention forces must, in case of accidents and damage, be familiar with the emergency procedures in case of accidents and act properly regarding the threatening dangerous substance.(author)

  17. Safety and security considerations for the transport of spent teletherapy units

    International Nuclear Information System (INIS)

    Mallaupoma, Mario; Paez, Jose; Huatay, Luis; Cruz, Walter

    2008-01-01

    Among the applications of nuclear technology, a practice widely used and generates many benefits to society are teletherapy applications. Many of the teletherapy units used contain a source of cobalt-60 and after their useful life they have to be dismantled and transported to a safe place. In this case were transported two units with an activity of more than 75 TBq . This paper presents safety and security considerations for the transport of the teletherapy units according to the recommendations of actual state of art. It is described all facets of safe transport by means of a set of technical and administrative safety requirements and controls, including the actions required by the consignor and carrier. The main emphasis was put on the stages of transport operations that give rise to exposure to radiation like packing, preparation, loading, handling, storage in transit and movement of packages of radioactive material. On the other side some security actions were considered in order to prevent theft, sabotage or other malicious acts during the transport of the packages. As a conclusion it must be mentioned that both safety and security considerations are very important aspects that must be taking in account for the transport of high activity radioactive material. (author)

  18. 75 FR 28042 - Privacy Act of 1974: System of Records; Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2010-05-19

    ..., VA 20598-6036 or [email protected] . For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0013] Privacy Act of..., Transportation Security Enforcement Record System, System of Records AGENCY: Privacy Office, DHS. ACTION: Notice...

  19. Data security in Intelligent Transport Systems

    Directory of Open Access Journals (Sweden)

    Tomas Zelinka

    2012-10-01

    Full Text Available Intelligent Transport Services expect availability of the secure seamless communications solutions typically covering widely spread areas. Different ITS solutions require different portfolio of telecommunications service quality. These parameters have to correspond with ITS service performance parameters required by specific service. Even though quite extensive range of public wireless data services with reasonable coverage are provided, most of them are provided with no guaranteed quality and security. ITS requirements can be in most parameters easier reached if multi-path communications systems are applied core solution is combined with both public as well as private ones where and when it is needed. Such solution requires implementation of relevant flexible system architecture supported by the efficient decision processes. This paper is concentrated the telecommunications security issues relevant to the ITS wide area networking. Expected level of security varies in dependence on relevant ITS service requirements. Data volumes transferred both in private data vehicle on board networks as well as between vehicles and infrastructure (C2I or other vehicles (C2C progressively grow. Such trend upsurges the fatal problems appearance probability in case security of the wide area networks is not relevantly treated. That is reason why relevant communications security treatment becomes crucial part of the ITS solution. Besides of available "off shelf" security tools we present solution based on non-public universal identifier with dynamical extension (time and position dependency as an autonomous variables and data selection according to actor role or category. Presented results were obtained within projects e-Ident1, DOTEK2 and SRATVU3.

  20. Improvement of economic security management system of municipalities with account of transportation system development: methods of assessment

    Science.gov (United States)

    Khe Sun, Pak; Vorona-Slivinskaya, Lubov; Voskresenskay, Elena

    2017-10-01

    The article highlights the necessity of a complex approach to assess economic security of municipalities, which would consider municipal management specifics. The approach allows comparing the economic security level of municipalities, but it does not describe parameter differences between compared municipalities. Therefore, there is a second method suggested: parameter rank order method. Applying these methods allowed to figure out the leaders and outsiders of the economic security among municipalities and rank all economic security parameters according to the significance level. Complex assessment of the economic security of municipalities, based on the combination of the two approaches, allowed to assess the security level more accurate. In order to assure economic security and equalize its threshold values, one should pay special attention to transportation system development in municipalities. Strategic aims of projects in the area of transportation infrastructure development in municipalities include the following issues: contribution into creating and elaborating transportation logistics and manufacture transport complexes, development of transportation infrastructure with account of internal and external functions of the region, public transport development, improvement of transport security and reducing its negative influence on the environment.

  1. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.

    Science.gov (United States)

    Yang, Bin; Zhang, Jianfeng

    2017-06-28

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.

  2. Study Regarding the Provision of Security and Safety in the International Maritime Transport

    Directory of Open Access Journals (Sweden)

    Liliana POPA

    2011-11-01

    Full Text Available The security in transport has become a crucial issue internationally, especially after the terrorist attacks of September 2001 and even more recently. Maritime, along with aviation, is considered a sensitive and of high-risk transport sector, in terms of security. Moreover, topics related to safety in maritime transport have become very important over the past decades mostly because of the numerous maritime accidents putting in danger both human lives and the environment. Taking into account the global dimension of maritime transport along with the fact that the participation of Asia in the world trade during the past decade has been substantial, the current maritime safety and security practices apply for all areas. This can only be achieved through the application of high standards and regulations setting the prerequisites for safe and secure navigation. In this direction, a significant number of Directives, Regulations and Initiatives on maritime safety and security have been introduced by international and European organizations, such as the International Maritime Organization, (I.M.O., the International Labour Organization (I.L.O. and the European Union (EU. In the framework of this analysis, the levels of compliance of European and Asian countries, regarding the international legislation, is examined while special emphasis is given on the problems and difficulties encountered during the implementation processes. Furthermore, a number of recommendations aiming to enhance the existing levels of safety and security in maritime transport in both examined area is provided.

  3. A review of tsp as one of the transportation security aspects of nuclear materials

    International Nuclear Information System (INIS)

    Wiryono

    2013-01-01

    A review has done for the Transportation Safety Plan (TSP) as one of the aspects of safety in the transport of nuclear materials. The review is necessary to harmonize national regulations with international practice. International practice of using TSP as one of the security requirements in addition to the Radiation Protection Program as a requirement of safety in the transport of nuclear materials. TSP is intended to ensure sound implementation of the transport of nuclear materials. TSP evaluation process can be done with a prescriptive approach, performance, and combinations. TSP contains information about administrative requirements, delivery security and response planning. TSP can be used to ensure the security of the implementation of the transport of nuclear materials effectively and efficiently. BAPETEN should require the applicant to submit the TSP as one document security requirements prior approval transporting nuclear materials. BAPETEN need to define the approach to the formulation and evaluation of TSP. BAPETEN need to set up an evaluation and inspection procedures for the implementation of TSP. (author)

  4. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues

    Science.gov (United States)

    Müthing, Jannis; Jäschke, Thomas

    2017-01-01

    Background Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. Objective The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Methods Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Results Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. Conclusions The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps

  5. Safe and Secure Transportation of Radioactive Materials in Pakistan and Future Challenges

    International Nuclear Information System (INIS)

    Muneer, Muhammad; Ejaz, Asad

    2016-01-01

    PNRA is the sole organization in the country responsible to regulate all matters pertaining to ionizing radiations. For the safety of transport of radioactive material in the country, PNRA has adopted IAEA TS-R-1 as a national regulation. To cover the security aspects and emergency situations, if any, during the transportation of radioactive material, PNRA has issued the regulatory guide on ‘Transportation of Radioactive Material by Road in Pakistan’. In Pakistan, low to medium activity radioactive sources are transported from one place to another by road for the purpose of industrial radiography, well logging, medical application, etc. According to national policy, sealed radioactive sources of half life greater than 1 year and with initial activity of 100 GBq or more imported in the country are required to be returned to country of origin (exported) after its use. Although the activities related to transport of radioactive material remained safe and secure and no major accident/incident has been reported so far, however, the improvement/enhancement in the regulatory infrastructure is a continuous process. In future, more challenges are expected to be faced in the safety of transport packages. This paper will describe the steps taken by PNRA for the safety and security of transport of radioactive material in the country and future challenges. (author)

  6. Security Measures and some Specific Features of the Transport Police Functioning in Russia and Abroad

    Directory of Open Access Journals (Sweden)

    Petr P. Ignatushenko

    2017-03-01

    Full Text Available In the present article specifics of the transport police work in the Russian Federation are discussed, as well as in other countries of the world (USA, Germany, Israel, etc.. Attention is drawn to the need of the role and significance of the Russian police review in the matters of railway and aviation security, as well as safety on river and sea transport. The term “transport security” is a state of security of transport and transport infrastructure, consumers of transport services (passengers from various types of threats (natural and man-made, as well as acts of unlawful interference in the activities of various modes of transport – points put the author. Transport security issues are important for the creation of the transport police system in the Russian Federation, taking into account experience of foreign countries.

  7. Cyber security for remote monitoring and control of small reactors

    Energy Technology Data Exchange (ETDEWEB)

    Trask, D., E-mail: dave.trask@cnl.ca [Atomic Energy of Canada Limited, Chalk River, ON (Canada); Jung, C. [Canadian Nuclear Safety Commission, Ottawa, ON (Canada); MacDonald, M., E-mail: marienna.macdonald@cnl.ca [Atomic Energy of Canada Limited, Chalk River, ON (Canada)

    2014-07-01

    There is growing international interest and activity in the development of small nuclear reactor technology with a number of vendors interested in building small reactors in Canada to serve remote locations. A common theme of small reactor designs proposed for remote Canadian locations is the concept of a centrally located main control centre operating several remotely located reactors via satellite communications. This theme was echoed at a recent IAEA conference where a recommendation was made to study I&C for remotely controlled small modular reactors, including satellite links and cyber security. This paper summarizes the results of an AECL-CNSC research project to analyze satellite communication technologies used for remote monitoring and control functions in order to provide cyber security regulatory considerations. The scope of this research included a basic survey of existing satellite communications technology and its use in industrial control applications, a brief history of satellite vulnerabilities and a broad review of over 50 standards, guidelines, and regulations from recognized institutions covering safety, cyber security, and industrial communication networks including wireless communications in general. This paper concludes that satellite communications should not be arbitrarily excluded by standards or regulation from use for the remote control and monitoring of small nuclear reactors. Instead, reliance should be placed on processes that are independent of any particular technology, such as reducing risks by applying control measures and demonstrating required reliability through good design practices and testing. Ultimately, it is compliance to well-developed standards that yields the evidence to conclude whether a particular application that uses satellite communications is safe and secure. (author)

  8. Cyber security for remote monitoring and control of small reactors

    International Nuclear Information System (INIS)

    Trask, D.; Jung, C.; MacDonald, M.

    2014-01-01

    There is growing international interest and activity in the development of small nuclear reactor technology with a number of vendors interested in building small reactors in Canada to serve remote locations. A common theme of small reactor designs proposed for remote Canadian locations is the concept of a centrally located main control centre operating several remotely located reactors via satellite communications. This theme was echoed at a recent IAEA conference where a recommendation was made to study I&C for remotely controlled small modular reactors, including satellite links and cyber security. This paper summarizes the results of an AECL-CNSC research project to analyze satellite communication technologies used for remote monitoring and control functions in order to provide cyber security regulatory considerations. The scope of this research included a basic survey of existing satellite communications technology and its use in industrial control applications, a brief history of satellite vulnerabilities and a broad review of over 50 standards, guidelines, and regulations from recognized institutions covering safety, cyber security, and industrial communication networks including wireless communications in general. This paper concludes that satellite communications should not be arbitrarily excluded by standards or regulation from use for the remote control and monitoring of small nuclear reactors. Instead, reliance should be placed on processes that are independent of any particular technology, such as reducing risks by applying control measures and demonstrating required reliability through good design practices and testing. Ultimately, it is compliance to well-developed standards that yields the evidence to conclude whether a particular application that uses satellite communications is safe and secure. (author)

  9. General Approaches and Requirements on Safety and Security of Radioactive Materials Transport in Russian Federation

    International Nuclear Information System (INIS)

    Ershov, V.N.; Buchel'nikov, A.E.; Komarov, S.V.

    2016-01-01

    Development and implementation of safety and security requirements for transport of radioactive materials in the Russian Federation are addressed. At the outset it is worth noting that the transport safety requirements implemented are in full accordance with the IAEA's ''Regulations for the Safe Transport of Radioactive Material (2009 Edition)''. However, with respect to security requirements for radioactive material transport in some cases the Russian Federation requirements for nuclear material are more stringent compared to IAEA recommendations. The fundamental principles of safety and security of RM managements, recommended by IAEA documents (publications No. SF-1 and GOV/41/2001) are compared. Its correlation and differences concerning transport matters, the current level and the possibility of harmonization are analysed. In addition a reflection of the general approaches and concrete transport requirements is being evaluated. Problems of compliance assessment, including administrative and state control problems for safety and security provided at internal and international shipments are considered and compared. (author)

  10. Regulatory Framework for the Safe and Secure Transport of Nuclear Material in Japan

    International Nuclear Information System (INIS)

    Konnai, A.; Shibasaki, N.; Ikoma, Y.; Kato, M.; Yamauchi, T.; Iwasa, T.

    2016-01-01

    Regulations for nuclear material transport in Japan are based on international regulations. Safety and security regulations, however, have sometime different aspects which have caused a conflict of operations. This paper aims to introduce framework of safety and security regulations for nuclear material transport in Japan, and shows some issues in cooperation of these regulations. (author)

  11. Development and Testing of Intelligent Alcohol Transportation Security System

    Directory of Open Access Journals (Sweden)

    Velaphi Msomi

    2018-01-01

    Full Text Available The development and testing of intelligent liquid transportation security system are being reported in this paper. The targeted fluid to be secured was ethanol alcohol and this was due to the theft cases occurring during the transportation of this product from the supplier to the customer. The system was developed such that only the radar level sensor (VEGAPULS 62 might be in contact with the fluid and the rest of the system remained outside the liquid carrying container to be secured. The system was developed such that it reports any abnormal liquid level drop through short message service (SMS. The functioning of the developed system was tested through the use of 1040 L Intermediate Bulk Container (IBC filled with water which was hauled for about 1.5 km. The liquid theft was simulated and the system sent two SMS. The first SMS reported the beginning of water level drop and the second one reported the ending of water level drop. The second SMS reported the amount of liquid that was taken out of the container.

  12. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues.

    Science.gov (United States)

    Müthing, Jannis; Jäschke, Thomas; Friedrich, Christoph M

    2017-10-18

    Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks

  13. Peritoneal fluid transport in CAPD patients with different transport rates of small solutes.

    Science.gov (United States)

    Sobiecka, Danuta; Waniewski, Jacek; Weryński, Andrzej; Lindholm, Bengt

    2004-01-01

    Continuous ambulatory peritoneal dialysis (CAPD) patients with high peritoneal solute transport rate often have inadequate peritoneal fluid transport. It is not known whether this inadequate fluid transport is due solely to a too rapid fall of osmotic pressure, or if the decreased effectiveness of fluid transport is also a contributing factor. To analyze fluid transport parameters and the effectiveness of dialysis fluid osmotic pressure in the induction of fluid flow in CAPD patients with different small solute transport rates. 44 CAPD patients were placed in low (n = 6), low-average (n = 13), high-average (n = 19), and high (n = 6) transport groups according to a modified peritoneal equilibration test (PET). The study involved a 6-hour peritoneal dialysis dwell with 2 L 3.86% glucose dialysis fluid for each patient. Radioisotopically labeled serum albumin was added as a volume marker.The fluid transport parameters (osmotic conductance and fluid absorption rate) were estimated using three mathematical models of fluid transport: (1) Pyle model (model P), which describes ultrafiltration rate as an exponential function of time; (2) model OS, which is based on the linear relationship of ultrafiltration rate and overall osmolality gradient between dialysis fluid and blood; and (3) model G, which is based on the linear relationship between ultrafiltration rate and glucose concentration gradient between dialysis fluid and blood. Diffusive mass transport coefficients (K(BD)) for glucose, urea, creatinine, potassium, and sodium were estimated using the modified Babb-Randerson-Farrell model. The high transport group had significantly lower dialysate volume and glucose and osmolality gradients between dialysate and blood, but significantly higher K(BD) for small solutes compared with the other transport groups. Osmotic conductance, fluid absorption rate, and initial ultrafiltration rate did not differ among the transport groups for model OS and model P. Model G yielded

  14. Synchronization and Control of Halo-Chaos in Beam Transport Network with Small World Topology

    International Nuclear Information System (INIS)

    Liu Qiang; Fang Jinqing; Li Yong

    2007-01-01

    The synchronous conditions of two kinds of the small-world (SW) network are studied. The small world topology can affect on dynamical behaviors of the beam transport network (BTN) largely, if the BTN is constructed with the SW topology, the global linear coupling and special linear feedback can realize the synchronization control of beam halo-chaos as well as periodic state in the BTN with the SW topology, respectively. This important result can provide an effective way for the experimental study and the engineering design of the BTN in the high-current accelerator driven radioactive clean nuclear power systems, and may have potential use in prospective applications for halo-chaos secure communication.

  15. Safety and security in transportation of radioactive material- the perception of risk

    Energy Technology Data Exchange (ETDEWEB)

    Ericsson, A.M.; Jaernry, C. [AMC Konsult AB, Bromma (Sweden)

    2004-07-01

    Since the event of September 11, 2001, the way most people look at transportation risk has changed. There is now a lot more focusing on the security concerns related to the transportation of radioactive material. Most people are now more concerned about the risk of terrorist actions or sabotage than of accidents. This is probably due to the fact that the safety record for transportation of radioactive material has so far been very good and that most people experience terrorism and sabotage more scaring and less controllable than general accidents. This paper will compare the safety and the security regulations and discuss synergies and contradictions between the sets of regulations.

  16. Safety and security in transportation of radioactive material- the perception of risk

    International Nuclear Information System (INIS)

    Ericsson, A.M.; Jaernry, C.

    2004-01-01

    Since the event of September 11, 2001, the way most people look at transportation risk has changed. There is now a lot more focusing on the security concerns related to the transportation of radioactive material. Most people are now more concerned about the risk of terrorist actions or sabotage than of accidents. This is probably due to the fact that the safety record for transportation of radioactive material has so far been very good and that most people experience terrorism and sabotage more scaring and less controllable than general accidents. This paper will compare the safety and the security regulations and discuss synergies and contradictions between the sets of regulations

  17. Free water transport, small pore transport and the osmotic pressure gradient

    NARCIS (Netherlands)

    Parikova, Alena; Smit, Watske; Zweers, Machteld M.; Struijk, Dirk G.; Krediet, Raymond T.

    2008-01-01

    BACKGROUND: Water transport in peritoneal dialysis (PD) patients occurs through the small pores and water channels, the latter allowing free water transport (FWT). The osmotic gradient is known to be one of the major determinants of water transport. The objective of the study was to analyse the

  18. Considerations concerning the secure transport of radioactive materials in Romania

    International Nuclear Information System (INIS)

    Vieru, Gheorghe

    2002-01-01

    As UNO member and founding member of the IAEA, Romania has implemented national regulations concerning the transport of radioactive materials in complete safety, complying with recommendations by IAEA and other international organizations. Accordingly, the National Commission for Nuclear Activities Control, CNCAN, issued the Directive no. 374/October 2001 which provides the rules for secure radioactive material transport in Romania on roads, rail ways, sea/fluvial and air ways. The paper presents the main sources of producing radioactive materials focussing the following: mining of natural uranium ore, nuclear fuel fabrication plants, nuclear power plants operation, nuclear research reactors, industrial use of radioactive sources (as gamma radiography), use of radioisotope in scientific, educational or medical units. The paper pays attention to the special routes and containers adopted for most secure transport of radioactive waste. Finally, one presents specific issues relating to identification and evaluation of the risk factors occurring at the transport of radioactive waste, as well as the potential radiological consequences upon population and environment. Estimated are the collective risk doses for different categories of populations from areas adjacent to the routes of radioactive materials transportation. It is stressed that the annual collective dose which the population is exposed to in case of accident is comparable with the dose from the natural (cosmic radiation background)

  19. 75 FR 18867 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-011...

    Science.gov (United States)

    2010-04-13

    ... source categories, retention and disposal, and notification procedure. The Transportation Security... recipients of information about individuals who are their employees, job applicants, or contractors, or.... For each system of records covered by this notice, the retention and disposal sections are updated to...

  20. The Impact of Road Transporter Development Trajectory onto Cargo Safety and Security

    Directory of Open Access Journals (Sweden)

    Márton Lányi

    2018-03-01

    Full Text Available This article attempts to reveal the general behavioural norms of cargo carriers, with a predominant emphasis on security issues. The security awareness level of road transporters has been found hugely dependent on management capabilities. Additionally, this poses a risk factor indicative of a shipment load's quantity and value. At a certain level of road transporter development trajectory, broad research delineates a sharp increase in security awareness, stemming from leadership recognition at larger companies. The results of the following research findings are significantly similar to various well respected scientific theories which verify the hypothesis that the principal barrier to developing a company is a combination of a lack of management capabilities and an unwillingness to adapt to change.

  1. New safety and security requirements for the transport of nuclear and other radioactive materials in Hungary

    International Nuclear Information System (INIS)

    Katona, T.; Horvath, K.; Safar, J.

    2016-01-01

    In addition to the promulgation of mode-specific regulations of international transport of dangerous goods, some Hungarian governmental and ministerial decrees impose further conditions upon the transport of nuclear and other radioactive materials. One of these ministerial decrees on the transport, carriage and packaging of radioactive materials is under revision and it will require • approval of emergency response plan (including security and safety contingency plan); • report on transport incidents and accidents for classifying them in accordance with the INES scale; • the competent authority to request experts’ support for the approval of package designs, radioactive material designs and shipments. Regarding the security of the transport of nuclear and other radioactive materials a new Hungarian governmental decree and a related guidance are about to be published which will supply additional requirements in the field of the transport security especially concerning radioactive materials, implementing - among others - IAEA recommendations of the NSS No9 and No14. The main and relevant features of the Hungarian nuclear regulatory system and the details of both new decrees regarding the safety and security issues of transport of nuclear and other radioactive materials will be discussed. (author)

  2. No Nation Is Home Alone: Understanding The International Dimension Of Homeland Security Through Global Transportation Security Programs

    Science.gov (United States)

    2016-03-01

    global economy have produced security gaps susceptible to exploitation. Transportation infrastructure , such as air and seaports, can be the target...15 Karen DeYoung, “New Issue of Jihadist Magazine Produced by Al-Qaeda in Yemen Suggests Attacks on U.S.,” Washington Post, December 24, 2014. http...is a complex system of people, things, and infrastructure that cross national boundaries; security policies must continue to be implemented to

  3. The public transportation system security and emergency preparedness planning guide

    Science.gov (United States)

    2003-01-01

    Recent events have focused renewed attention on the vulnerability of the nation's critical infrastructure to major events, including terrorism. The Public Transportation System Security and Emergency Preparedness Planning Guide has been prepared to s...

  4. Substantiating the Target Level of Economic Security of Transport Enterprises and the Instrumentarium for Its Provision

    Directory of Open Access Journals (Sweden)

    Lebedko Sergiy A.

    2017-10-01

    Full Text Available The article is aimed at substantiating the methodology for assessing the economic security of transport enterprises, determining the target level and the instrumentarium for its provision. The proposed methodical approach to the assessment of the level of economic security of transport enterprises includes the determination of the level of counteracting threats and is based on the principles of integral estimation. The formed integrated indicator includes both indicators of counteracting the internal (human, managerial and technological, force majeure, financial and external threats (market, stakeholder, power-based, natural, infrastructural. Each measure of counteracting threats is determined by results of assessment of dynamics of the three indicators. A practical testing of the proposed approach is carried out in the case of transport enterprises. Based on the established equation of the regression relationship between the level of economic security and the financial strength, a target level of economic security of transport enterprises has been substantiated. The instrumentarium to provide a targeted level of economic security according to the threat types, including preventive and reactive measures, has been developed.

  5. Security in the transport of radioactive material: Implementing guide. Spanish edition

    International Nuclear Information System (INIS)

    2013-01-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks

  6. Security in the Transport of Radioactive Material. Implementing Guide (French Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks.

  7. Security in the Transport of Radioactive Material. Implementing Guide (Chinese Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks.

  8. IMPLEMENTATION OF SECURITY CONTROLS ACCORDING TO ISO/IEC 27002 IN A SMALL ORGANISATION

    Directory of Open Access Journals (Sweden)

    MATÚŠ HORVÁTH

    2009-12-01

    Full Text Available Information security should be today a key issue in any organization. With the implementation of information security management system (ISMS the organization can identify and reduce risks in this area. This the area of information security management covers a numbers of ISO / IEC 27000 standards, which are based on best practice solutions. However, smaller organizations are often discourages with the implementation of these systems, because of fear of high cost and complexity. Especially due to the fact that the standards does not strictly require implementation of all security controls it is possible to implement these systems in small-size organizations. In this article, we want to point on this fact through describing practical experience with ISMS implementation in small-size organization.

  9. Safeguards and Security by Design (SSBD) for Small Modular Reactors (SMRs) through a Common Global Approach

    Energy Technology Data Exchange (ETDEWEB)

    Badwan, Faris M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Demuth, Scott Francis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Miller, Michael Conrad [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Pshakin, Gennady [Obninsk Institute of Physics and Power Engineering (Russian Federation)

    2015-02-23

    Small Modular Reactors (SMR) with power levels significantly less than the currently standard 1000 to 1600-MWe reactors have been proposed as a potential game changer for future nuclear power. SMRs may offer a simpler, more standardized, and safer modular design by using factory built and easily transportable components. Additionally, SMRs may be more easily built and operated in isolated locations, and may require smaller initial capital investment and shorter construction times. Because many SMRs designs are still conceptual and consequently not yet fixed, designers have a unique opportunity to incorporate updated design basis threats, emergency preparedness requirements, and then fully integrate safety, physical security, and safeguards/material control and accounting (MC&A) designs. Integrating safety, physical security, and safeguards is often referred to as integrating the 3Ss, and early consideration of safeguards and security in the design is often referred to as safeguards and security by design (SSBD). This paper describes U.S./Russian collaborative efforts toward developing an internationally accepted common approach for implementing SSBD/3Ss for SMRs based upon domestic requirements, and international guidance and requirements. These collaborative efforts originated with the Nuclear Energy and Nuclear Security working group established under the U.S.-Russia Bilateral Presidential Commission during the 2009 Presidential Summit. Initial efforts have focused on review of U.S. and Russian domestic requirements for Security and MC&A, IAEA guidance for security and MC&A, and IAEA requirements for international safeguards. Additionally, example SMR design features that can enhance proliferation resistance and physical security have been collected from past work and reported here. The development of a U.S./Russian common approach for SSBD/3Ss should aid the designer of SMRs located anywhere in the world. More specifically, the application of this approach may

  10. Safeguards and Security by Design (SSBD) for Small Modular Reactors (SMRs) through a Common Global Approach

    International Nuclear Information System (INIS)

    Badwan, Faris M.; Demuth, Scott Francis; Miller, Michael Conrad; Pshakin, Gennady

    2015-01-01

    Small Modular Reactors (SMR) with power levels significantly less than the currently standard 1000 to 1600-MWe reactors have been proposed as a potential game changer for future nuclear power. SMRs may offer a simpler, more standardized, and safer modular design by using factory built and easily transportable components. Additionally, SMRs may be more easily built and operated in isolated locations, and may require smaller initial capital investment and shorter construction times. Because many SMRs designs are still conceptual and consequently not yet fixed, designers have a unique opportunity to incorporate updated design basis threats, emergency preparedness requirements, and then fully integrate safety, physical security, and safeguards/material control and accounting (MC&A) designs. Integrating safety, physical security, and safeguards is often referred to as integrating the 3Ss, and early consideration of safeguards and security in the design is often referred to as safeguards and security by design (SSBD). This paper describes U.S./Russian collaborative efforts toward developing an internationally accepted common approach for implementing SSBD/3Ss for SMRs based upon domestic requirements, and international guidance and requirements. These collaborative efforts originated with the Nuclear Energy and Nuclear Security working group established under the U.S.-Russia Bilateral Presidential Commission during the 2009 Presidential Summit. Initial efforts have focused on review of U.S. and Russian domestic requirements for Security and MC&A, IAEA guidance for security and MC&A, and IAEA requirements for international safeguards. Additionally, example SMR design features that can enhance proliferation resistance and physical security have been collected from past work and reported here. The development of a U.S./Russian common approach for SSBD/3Ss should aid the designer of SMRs located anywhere in the world. More specifically, the application of this approach may

  11. U.S. spent fuel transportation security in the post 9/11 world

    International Nuclear Information System (INIS)

    Anne, Catherine; Patterson, John; Williams, Blake

    2002-01-01

    On September 11, 2002 the terrible tragedies in New York, Pennsylvania and Washington, DC changed the world forever. Security issues not only impact our daily lives, but are also in a state flux concerning the shipment of spent nuclear fuel in the United States. The formation of the Homeland Security Advisory System and Interim Compensatory Measures from the NRC, along with other security measures, have affected the way we transport spent nuclear fuel. This paper describes the challenging and demanding way that security is planned, implemented and maintained in support of spent fuel shipments in the United States. (author)

  12. Small-scale Aquaculture to Strengthen Food Security in Cambodia ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Small-scale Aquaculture to Strengthen Food Security in Cambodia (CIFSRF) ... for their families' consumption in the same ponds as large fish, which can be sold for income. ... The project also studies opportunities to scale up the model for broader use ... Assessing improvements in nutrition outcomes following agricultural ...

  13. Transportation Secure Data Center: Real-World Data for Planning, Modeling, and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    2018-01-19

    The Transportation Secure Data Center (TSDC) at www.nrel.gov/tsdc provides free, web-based access to detailed transportation data from a variety of travel surveys conducted across the nation. While preserving the privacy of survey participants, this online repository makes vital transportation data broadly available to users from the comfort of their own desks via a secure online connection. Data Available through the TSDC: Maintained by the U.S. Department of Energy's National Renewable Energy Laboratory (NREL) in partnership with the U.S. Department of Transportation (DOT), the TSDC houses data from travel surveys and studies conducted using global positioning system (GPS) devices. It features millions of data points - second-by-second GPS readings, vehicle characteristics (if applicable), and demographics - for all modes of travel. NREL screens the initial data for quality control, translates each data set into a consistent format, and interprets the data for spatial analysis. NREL's processing routines add information on vehicle fuel economy and road grades and join data points to the road network.

  14. MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries

    International Nuclear Information System (INIS)

    Talarico, Luca; Reniers, Genserik; Sörensen, Kenneth; Springael, Johan

    2015-01-01

    In this paper we present a multi-modal security-transportation model to allocate security resources within a chemical supply chain which is characterized by the use of different transport modes, each having their own security features. We consider security-related risks so as to take measures against terrorist acts which could target critical transportation systems. The idea of addressing security-related issues, by supporting decisions for preventing or mitigating intentional acts on transportation infrastructure, has gained attention in academic research only recently. The decision model presented in this paper is based on game theory and it can be employed to organize intelligence capabilities aimed at securing chemical supply chains. It enables detection and warning against impending attacks on transportation infrastructures and the subsequent adoption of security countermeasures. This is of extreme importance for preventing terrorist attacks and for avoiding (possibly huge) human and economic losses. In our work we also provide data sources and numerical simulations by applying the proposed model to a illustrative multi-modal chemical supply chain. - Highlights: • A model to increase the security in a multimodal chemical supply chain is proposed. • The model considers adaptive opponents having multi-attribute utility functions. • The model is based on game theory using an attacker–defender schema. • The model provides recommendations about where to allocate security measures. • Numerical simulations on a sample multimodal chemical supply chain are shown

  15. 49 CFR 1570.13 - False statements regarding security background checks by public transportation agency or railroad...

    Science.gov (United States)

    2010-10-01

    ... checks by public transportation agency or railroad carrier. 1570.13 Section 1570.13 Transportation Other... regarding security background checks by public transportation agency or railroad carrier. (a) Scope. This... employee of a public transportation agency or a contractor or subcontractor of a public transportation...

  16. Report of the DHS Small Vessel Security Institute

    Science.gov (United States)

    2007-10-19

    Local Government Interests: LtCol Don Holway; Florida Fish and Wildlife Conservation Commission Maj John Fetterman , Maine Department of Marine...AWW program to help fill gaps in law enforcement patrols. 68 National Small Vessel Security Summit Major John C. Fetterman – State of Maine...Major Fetterman currently serves as Vice President of the National Association of State Boating Law Administrators and for the last 30 years has been a

  17. Legal Framework and Best Practice for Improving Transport Security of Radioactive and Nuclear Materials in Croatia

    International Nuclear Information System (INIS)

    Ilijas, B.; Medakovic, S.

    2012-01-01

    Security of transporting radioactive and nuclear materials always poses a demanding task to the holder of the authorization or beneficiary, and especially transporter. Very strict and precise legal framework must be done for this purpose, yet it has not be too complicated to create a great problems in practice. The best balance between efficiency and simplicity should be achieved. In Croatia on power is 'The Dangerous Goods Transport Act' which stipulates the conditions for the carriage of dangerous goods in individual transport modes, obligations of persons participating in the carriage, requirements for packaging and vehicles, conditions for the appointment of safety advisers and safety adviser's rights and duties, competence and conditions for the implementation of training programs for persons participating in transport, competence of the state authorities related to such carriage and supervision of the implementation of the Act. Besides this Act, which regulates the issue in more general way, in preparation is a new 'Ordinance on Physical Security Measures for Radioactive Sources, Nuclear Material and Nuclear Facilities'. The intention of this Ordinance, in the part dealing with transport, is to bring specific approach, in accordance with IAEA guides, forwarding the most of obligations to the holder of the authorization or beneficiary and transporter, leaving state regulatory bodies mostly supervising role. In practice this can create some problems in the beginning, but with rising security awareness and after some experience collected, this can be the best way to achieve satisfactory security, yet not slowing down and complicating regular jobs with radioactive and nuclear materials.(author).

  18. 17 CFR 274.5 - Form N-5, for registration statement of small business investment company under the Securities...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form N-5, for registration statement of small business investment company under the Securities Act of 1933 and the Investment Company...-5, for registration statement of small business investment company under the Securities Act of 1933...

  19. Problems of economic security in Russian transportation and intermediate carrier infrastructure

    Directory of Open Access Journals (Sweden)

    Valeriy Anatol'evich Tsvetkov

    2012-03-01

    Full Text Available This paper reviews the basic problems of economic security in infrastructural ensuring of the implementation of transportation and intermediate carrier potential of Russia: development and reconstruction of communication lines, usage of innovative transportation methods, building a network of transportation and logistics centers, development of regional airport hubs and others. Particular attention is paid to the problems of transportation and transit potential implementation of Siberia and the Far East. It is shown that the increase of transit facilities in the territory of Russia takes place in a competitive market of infrastructure projects. At the same time it is emphasized that along with exhausting the possibilities of commodity economy development, a natural competitive advantage of Russia as a transport bridge between Europe, Asia and America will be implemented in full force.

  20. Problems of economic security in Russian transportation and intermediate carrier infrastructure

    Directory of Open Access Journals (Sweden)

    Valeriy Anatol'evich Tsvetkov

    2012-06-01

    Full Text Available This paper reviews the basic problems of economic security in infrastructural ensuring of the implementation of transportation and intermediate carrier potential of Russia: development and reconstruction of communication lines, usage of innovative transportation methods, building a network of transportation and logistics centers, development of regional airport hubs and others. Particular attention is paid to the problems of transportation and transit potential implementation of Siberia and the Far East. It is shown that the increase of transit facilities in the territory of Russia takes place in a competitive market of infrastructure projects. At the same time it is emphasized that along with exhausting the possibilities of commodity economy development, a natural competitive advantage of Russia as a transport bridge between Europe, Asia and America will be implemented in full force.

  1. 17 CFR 239.24 - Form N-5, form for registration of small business investment company under the Securities Act of...

    Science.gov (United States)

    2010-04-01

    ... registration of small business investment company under the Securities Act of 1933 and the Investment Company... N-5, form for registration of small business investment company under the Securities Act of 1933 and... of 1933 of securities issued by any small business investment company which is registered under the...

  2. Regulatory Framework and Current Practices of the Radioactive Material Safe and Secure Transport in Albania

    International Nuclear Information System (INIS)

    Dollani, K.; Grillo, B.; Telhaj, E.

    2016-01-01

    Attempts for the establishing of a safe and secure radioactive material transport in Albania began a decade ago with formulation of the different regulation in the field of safe and secure handling of the radioactive materials. In 2004 a special regulation for the safe transport of radioactive material was prepared and approved by the National Radiation Protection Commission). This regulation has been based in the IAEA standards for the radioactive material transport and was reviewed periodically. The last regulation of the radioactive material transport was approved by Albanian government through a governmental ordinance. The transport of the radioactive material in Albania is performed by licensed subjects, which fulfill all requirements of the mentioned governmental ordinance. Based in the existing regulation, for each transport of radioactive material, a special permission is issued by NRPC. The issuing of permission allows competent authority to provide necessary information on transport regularity and to have under survey all transports of the radioactive material carried out inside the country. Last year were issued more than 80 permissions for the transport of the different types and categories of the radioactive sources. (author)

  3. Information security awareness in small information technology-dependent business organisations

    OpenAIRE

    2015-01-01

    M.A. (Business Management) Small businesses thrive in the developing economy of South Africa and address the important issue of unemployment and poverty that exist in the country. A large number of these business organisations can be found in the province of Gauteng because of the large and diverse economic contribution the province delivers to the economy of South Africa. With the increased use of technology in the small businesses of Gauteng and South Africa, the risks around cyber-secur...

  4. INFORMATION SECURITY MANAGEMENT: FACTORS THAT INFLUENCE ITS ADOPTION IN SMALL AND MID-SIZED BUSINESSES

    Directory of Open Access Journals (Sweden)

    Abner da Silva Netto

    2008-02-01

    Full Text Available The objectives of this study were verify in what measure the small and medium companies accomplish the management security information and identify which factors influence the small and medium companies to adopt measures of management security information. The source research was exploratory-descriptive and the design used was the survey. The sample was compound of 43 metal production industries located in ABC region. According to management information security literature and Brazilian norm of information security were identified the tools or techniques of management security information and classified it into three layers: physic, logic and human. The study identified that the human layer is the one that presents the major shortage of cares in the companies followed by the logical one. The companies get used to have the antivirus as the main security tool/technique according to the researched companies to guarantee the safety of information. Besides that, the research showed that 59% of the companies have a safety satisfactory level and the main motivator factor to adopt the management security information is "to avoid possible financial loss”. On the other hand, all the inhibitors factors showed important to the researched companies like: lack of knowledge, investments value, organization culture and difficulty to measure cost/benefit.

  5. A Modular, Reusable Latch and Decking System for Securing Payloads During Launch and Planetary Surface Transport

    Science.gov (United States)

    Doggett, William R.; Dorsey, John T.; Jones, Thomas C.; King, Bruce D.; Mikulas, Martin M.

    2011-01-01

    Efficient handling of payloads destined for a planetary surface, such as the moon or mars, requires robust systems to secure the payloads during transport on the ground, in space and on the planetary surface. In addition, mechanisms to release the payloads need to be reliable to ensure successful transfer from one vehicle to another. An efficient payload handling strategy must also consider the devices available to support payload handling. Cranes used for overhead lifting are common to all phases of payload handling on Earth. Similarly, both recent and past studies have demonstrated that devices with comparable functionality will be needed to support lunar outpost operations. A first generation test-bed of a new high performance device that provides the capabilities of both a crane and a robotic manipulator, the Lunar Surface Manipulation System (LSMS), has been designed, built and field tested and is available for use in evaluating a system to secure payloads to transportation vehicles. A payload handling approach must address all phases of payload management including: ground transportation, launch, planetary transfer and installation in the final system. In addition, storage may be required during any phase of operations. Each of these phases requires the payload to be lifted and secured to a vehicle, transported, released and lifted in preparation for the next transportation or storage phase. A critical component of a successful payload handling approach is a latch and associated carrier system. The latch and carrier system should minimize requirements on the: payload, carrier support structure and payload handling devices as well as be able to accommodate a wide range of payload sizes. In addition, the latch should; be small and lightweight, support a method to apply preload, be reusable, integrate into a minimal set of hard-points and have manual interfaces to actuate the latch should a problem occur. A latching system which meets these requirements has been

  6. Transportation security : post-September 11th initiatives and long-term challenges : statement of Gerald L. Dillingham, Director, Physical Infrastructure Issues

    Science.gov (United States)

    2003-04-01

    This testimony responds to the request of the National Commission on Terrorist Attacks Upon the United States for information on GAO's work in transportation security. It addresses (1) transportation security before September 2001; (2) what the feder...

  7. The experience of the Republic of Belarus in the field of safe and secure transport of radioactive material

    International Nuclear Information System (INIS)

    Astashka, R.; Kronava, Z.; Prykhodzka, A.; Tkachonak, I.

    2016-01-01

    The experience of the safe and secure transport of radioactive material of the Republic of Belarus includes domestic and international movements. Transit is a substantial part of international movements taking into account the location of the country. Legislative and regulatory requirements on safety and security of radioactive material transport being in force in the country include the demands making by such state structures as the Department on Nuclear and Radiation Safety, the Department on supervision for the safe industrial activities, the Ministry of Health of the Republic of Belarus. At the same time response to accidents and security events belongs to the scope of activity of special subdivisions of the Ministry for Emergency Situations and the Ministry of Internal Affairs of the Republic of Belarus. For safety purposes all the above-mentioned structures are executing their duties in close collaboration with each other and are following the IAEA safety and security recommendations. The regulatory infrastructure concerning the safe and secure transport of radioactive material of the Republic of Belarus is the subject of the contributed paper. (author)

  8. 14 CFR 135.397 - Small transport category airplane performance operating limitations.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Small transport category airplane... PERSONS ON BOARD SUCH AIRCRAFT Airplane Performance Operating Limitations § 135.397 Small transport category airplane performance operating limitations. (a) No person may operate a reciprocating engine...

  9. 76 FR 27935 - Small Business Size Standards: Transportation and Warehousing

    Science.gov (United States)

    2011-05-13

    ... assistance, SBA establishes small business definitions (referred to as size standards) for private sector... SMALL BUSINESS ADMINISTRATION 13 CFR Part 121 RIN 3245-AG08 Small Business Size Standards: Transportation and Warehousing AGENCY: U.S. Small Business Administration. ACTION: Proposed rule. SUMMARY: The U...

  10. Sediment transport and channel morphology of small, forested streams.

    Science.gov (United States)

    Marwan A. Hassan; Michael Church; Thomas E. Lisle; Francesco Brardinoni; Lee Benda; Gordon E. Grant

    2005-01-01

    This paper reviews sediment transport and channel morphology in small, forested streams in the Pacific Northwest region of North America to assess current knowledge of channel stability and morphology relevant to riparian management practices around small streams. Small channels are defined as ones in which morphology and hydraulics may be significantly influenced by...

  11. Transport in a small aspect ratio torus

    International Nuclear Information System (INIS)

    White, R.B.; Gates, D.A.; Mynick, H.E.

    2005-01-01

    Transport theory in toroidal devices often assumes large aspect ratio and also assumes the poloidal field is small compared to the toroidal field. These assumptions result in transport which in the low collision rate limit is dominated by banana orbits, giving the largest collisionless excursion of a particle from an initial flux surface. However in a small aspect ratio device the gyro radius may be larger than the banana excursion, resulting in significant deviations from the standard neoclassical predictions. In this paper we report numerical simulation of diffusion in low and high beta low aspect ratio equilibria. We also sketch an analytic theory. The diffusion, which we refer to as omniclassical, is a combination of neoclassical and properly averaged classical effects, and can be two or three times the neoclassical value. Good agreement of the analytic theory with numerical simulations is obtained. (author)

  12. Non-contact transportation system of small objects using Ultrasonic Waveguides

    International Nuclear Information System (INIS)

    Nakamura, K; Koyama, D

    2012-01-01

    A transportation system for small object or fluid without contact is investigated being based on ultrasonic levitation. Small objects are suspended against gravity at the nodal points in ultrasonic pressure field due to the sound radiation force generated as the gradient of the energy density of the field. In this study, the trapped object is transported in the horizontal plane by introducing the spatial shift of the standing waves by the switching the lateral modes or travelling waves. The goal of the study is to establish a technology which can provide a total system with the flexibility in composing various transportation paths. Methods for linear/rotary stepping motions and continuous linear transportation are explained in this report. All the transportation tracks are composed of a bending vibrator and a reflector. The design for these acoustic cavity/waveguide is discussed.

  13. Beyond Measure: New Approaches to Analyzing Congressional Oversight of Homeland Security

    Science.gov (United States)

    2015-03-01

    published books and peer reviewed journal articles. The Congressional Research Service being the key source on congressional procedure and theory ...Transportation Committee 1 Senate Homeland Security & Governmental Affairs Committee 15 Senate Small Business & Entrepreneurship 1 Senate Special...military contracting procedures in a war zone are not necessarily oversight of national security functions, reviews of FEMA contracting practices

  14. Comparative study of key exchange and authentication methods in application, transport and network level security mechanisms

    Science.gov (United States)

    Fathirad, Iraj; Devlin, John; Jiang, Frank

    2012-09-01

    The key-exchange and authentication are two crucial elements of any network security mechanism. IPsec, SSL/TLS, PGP and S/MIME are well-known security approaches in providing security service to network, transport and application layers; these protocols use different methods (based on their requirements) to establish keying materials and authenticates key-negotiation and participated parties. This paper studies and compares the authenticated key negotiation methods in mentioned protocols.

  15. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Science.gov (United States)

    2010-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  16. Modelling of Security Principles Within Car-to-Car Communications in Modern Cooperative Intelligent Transportation Systems

    Directory of Open Access Journals (Sweden)

    Jan Durech

    2016-01-01

    Full Text Available Intelligent transportation systems (ITS bring advanced applications that provide innovative services for various transportation modes in the area of traffic control, and enable better awareness for different users. Communication connections between intelligent vehicles with the use of wireless communication standards, so called Vehicular Ad Hoc Networks (VANETs, require ensuring verification of validity of provided services as well as services related to transmission confidentiality and integrity. The goal of this paper is to analyze secure mechanisms utilised in VANET communication within Cooperative Intelligent Transportation Systems (C-ITS with a focus on safety critical applications. The practical part of the contribution is dedicated to modelling of security properties of VANET networks via OPNET Modeler tool extended by the implementation of the OpenSSL library for authentication protocol realisation based on digital signature schemes. The designed models simulate a transmission of authorised alert messages in Car-to-Car communication for several traffic scenarios with recommended Elliptic Curve Integrated Encryption Scheme (ECIES. The obtained results of the throughput and delay in the simulated network are compared for secured and no-secured communications in dependence on the selected digital signature schemes and the number of mobile nodes. The OpenSSL library has also been utilised for the comparison of time demandingness of digital signature schemes based on RSA (Rivest Shamir Adleman, DSA (Digital Signature Algorithm and ECDSA (Elliptic Curve Digital Signature Algorithm for different key-lengths suitable for real time VANET communications for safety-critical applications of C-ITS.

  17. Status of the Regulation for safe and secure transport of radioactive materials in Madagascar

    International Nuclear Information System (INIS)

    Raoelina Andriambololona; Zafimanjato, J.L.R.; Solofoarisina, W.C.; Randriantseheno, H.F.

    2011-01-01

    Radioactive sources are widely used in medicine, in industrial exploration and development, as well as in basic scientific research and education in Madagascar. The ability to use such radioactive materials in these sectors depends on their safe and secure transport both within and between countries. Transport safety of radioactive materials within the country is regulated. The law No. 97-041 on radiation protection and radioactive waste management in Madagascar promulgated in January 1998 and the decree No.2735/94 dealing the transport of radioactive materials promulgated in June 1994 govern all activities related to the transport of radioactive material. This law was established to meet the requirements of the International Basic Safety Standards (BSS, IAEA Safety Series 115). It is not fully consistent with current international standards (GS-R-1). Indeed, in order to enhance the security of radioactive sources, Madagascar has implemented the Code of Conduct and the Guidance on the Import and Export of Radioactive Sources. Faced with delays and denials of shipment of radioactive materials issues, the National Focal Point has been appointed to work with ISC members and the regional networks on the global basis.

  18. Status of the regulation for safe and secure transport of radioactive materials in Madagascar

    International Nuclear Information System (INIS)

    Andriambololona, Raoelina; Zafimanjato, J.L.R.; Solofoarisina, W.C.; Randriantseheno, H.F.

    2016-01-01

    Radioactive sources are widely used in medicine, in industrial exploration and development, as well as in basic scientific research and education in Madagascar. The ability to use such radioactive materials in these sectors depends on their safe and secure transport both within and between countries. Transport safety of radioactive materials within the country is regulated. The law n° 97-041 on radiation protection and radioactive waste management in Madagascar promulgated in January 1998 and the decree n° 2735/94 dealing the transport of radioactive materials promulgated in June 1994 govern all activities related to the transport of radioactive material. This law was established to meet the requirements of the International Basic Safety Standards (BSS, IAEA Safety Series 115). It is not fully consistent with current international standards (GS-R-1). Indeed, in order to enhance the security of radioactive sources, Madagascar has implemented the Code of Conduct and the Guidance on the Import and Export of Radioactive Sources. Faced with delays and denials of shipment of radioactive materials issues, the National Focal Point has been appointed to work with ISC members and the regional networks on the global basis. (author)

  19. Evaluating the transport in small-world and scale-free networks

    International Nuclear Information System (INIS)

    Juárez-López, R.; Obregón-Quintana, B.; Hernández-Pérez, R.; Reyes-Ramírez, I.; Guzmán-Vargas, L.

    2014-01-01

    We present a study of some properties of transport in small-world and scale-free networks. Particularly, we compare two types of transport: subject to friction (electrical case) and in the absence of friction (maximum flow). We found that in clustered networks based on the Watts–Strogatz (WS) model, for both transport types the small-world configurations exhibit the best trade-off between local and global levels. For non-clustered WS networks the local transport is independent of the rewiring parameter, while the transport improves globally. Moreover, we analyzed both transport types in scale-free networks considering tendencies in the assortative or disassortative mixing of nodes. We construct the distribution of the conductance G and flow F to evaluate the effects of the assortative (disassortative) mixing, finding that for scale-free networks, as we introduce different levels of the degree–degree correlations, the power-law decay in the conductances is altered, while for the flow, the power-law tail remains unchanged. In addition, we analyze the effect on the conductance and the flow of the minimum degree and the shortest path between the source and destination nodes, finding notable differences between these two types of transport

  20. Chair Report Consultancy Meeting on Nuclear Security Assessment Methodologies (NUSAM) Transport Case Study Working Group

    Energy Technology Data Exchange (ETDEWEB)

    Shull, Doug [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-08-19

    The purpose of the consultancy assignment was to (i) apply the NUSAM assessment methods to hypothetical transport security table top exercise (TTX) analyses and (ii) document its results to working materials of NUSAM case study on transport. A number of working group observations, using the results of TTX methodologies, are noted in the report.

  1. The strategic measures for the industrial security of small and medium business.

    Science.gov (United States)

    Lee, Chang-Moo

    2014-01-01

    The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures.

  2. The Strategic Measures for the Industrial Security of Small and Medium Business

    Directory of Open Access Journals (Sweden)

    Chang-Moo Lee

    2014-01-01

    Full Text Available The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business, furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures.

  3. Security in the transport of radioactive material: Implementing guide. Spanish edition; La seguridad fisica en el transporte de materiales radiactivos. Guia de aplicacion

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-07-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks.

  4. Implementation of Safety and Security Issues in the Transport of Radioactive Material in Argentina

    International Nuclear Information System (INIS)

    López Vietri, J.; Elechosa, C.; Gerez Miranda, C.; Menossi, S.; Rodríguez Roldán, M.S.; Fernández, A.

    2016-01-01

    This paper is intended to describe implementation of safety and security issues in the transport of radioactive material by the Nuclear Regulatory Authority (in Spanish Autoridad Regulatoria Nuclear, ARN), which is the Competent Authority of Argentina in Safety, Security and Safeguards of radioactive and nuclear material. There are depicted main regulatory activities dealing with the mentioned issues, and relevant milestones of national regulatory standards and guidance applied, that are based on requirements and guides from IAEA. Interfaces between Safety and Security sections are most of the times complementary but sometimes conflictive, therefore the resolution of such conflicts and goals achieved during their implementation are also commented; as well as future joint planned activities between both sections of ARN as a way to provide safety and security without compromising one or the other. (author)

  5. The new context for transport of radioactive and nuclear material

    International Nuclear Information System (INIS)

    Anne, C.; Galtier, J.

    2002-01-01

    The transportation of radioactive and nuclear materials involves all modes of transportation with a predominance for road and for air. It is but a minute fraction dangerous good transportation. Around 10 millions of radioactive packages are shipped annually all over the world of which ninety percent total corresponds to shipments of radioisotopes. In spite of the small volume transported, experience, evolution of transport means and technologies, the trend to constantly improve security and safety and public acceptance have modified the transport environment. During the last few years, new evolutions have applied to the transport of radioactive and nuclear materials in various fields and especially: - Safety - Security - Logistics means - Public acceptance - Quality Assurance. We propose to examine the evolution of these different fields and their impact on transportation methods and means. (authors)

  6. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues

    OpenAIRE

    Müthing, Jannis; Jäschke, Thomas; Friedrich, Christoph M

    2017-01-01

    Background Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to pro...

  7. Ministerial Decree of 16 February 1976 relating to approval of the model certificate of financial security for the transport of radioactive materials

    International Nuclear Information System (INIS)

    1976-01-01

    This Decree by the Minister of Industry, Commerce and Crafts, in consultation with the Minister of Transport, approves the model certificate of financial security for the transport of nuclear materials. This type of certificate issued by nuclear insurers is intended to provide detailed information on the nature of the financial security for damage likely to be caused by the materials in the course of transport; it is required to supply the certificate according to the Paris Convention on Third Party Liability in the Field of Nuclear Energy, ratified by Italy in 1975. The standardised presentation of this certificate enables it to be used in international transport between countries parties to the Paris Convention as proof of the existence of the financial security. (N.E.A.)

  8. The contribution of free water transport and small pore transport to the total fluid removal in peritoneal dialysis

    NARCIS (Netherlands)

    Parikova, Alena; Smit, Watske; Struijk, Dirk G.; Zweers, Machteld M.; Krediet, Raymond T.

    2005-01-01

    BACKGROUND: Water transport in peritoneal dialysis (PD) patients is across the small pores and water channels, the latter allowing free water transport. The objective of the study was to investigate the contribution of each transport route on transcapillary ultrafiltration (TCUF). METHODS: Standard

  9. [Research and implementation of the TLS network transport security technology based on DICOM standard].

    Science.gov (United States)

    Lu, Xiaoqi; Wang, Lei; Zhao, Jianfeng

    2012-02-01

    With the development of medical information, Picture Archiving and Communications System (PACS), Hospital Information System/Radiology Information System(HIS/RIS) and other medical information management system become popular and developed, and interoperability between these systems becomes more frequent. So, these enclosed systems will be open and regionalized by means of network, and this is inevitable. If the trend becomes true, the security of information transmission may be the first problem to be solved. Based on the need for network security, we investigated the Digital Imaging and Communications in Medicine (DICOM) Standard and Transport Layer Security (TLS) Protocol, and implemented the TLS transmission of the DICOM medical information with OpenSSL toolkit and DCMTK toolkit.

  10. Leveraging Service Oriented Architecture to Enhance Information Sharing for Surface Transportation Security

    Science.gov (United States)

    2008-09-01

    Fire and Emergency Management Services, Suffolk County Sheriff’s Department, the U.S. Attorney’s Office, the Bureau of Alcohol, Tobacco and Firearms...mass transit services. These include express and regular bus service, a downtown Skyway monorail , a trolley service and the Stadium Shuttle for various...safety related incidents rather than security, including transportation disruptions due to derailments, accidents, fires , hazardous materials spills

  11. Network secure communications based on beam halo-chaos

    International Nuclear Information System (INIS)

    Liu Qiang; Fang Jinqing; Li Yong

    2010-01-01

    Based on beam halo-chaos synchronization in the beam transport network (line)with small-world effect, using three synchronization methods:the driver-response synchronization, small-world topology coupling synchronization and multi-local small-world topology coupling synchronization, three kinds of secure communication projects were designed respectively, and were studied numerically by the Simulink tool of the Matlab software. Numerical experimental results demonstrate that encryption and decryption of the original signal are realized successfully. It provides effective theoretical foundation and reference for the next engineering design and network experiment. (authors)

  12. International cooperation for the development of consistent and stable transportation regulations to promote and enhance safety and security

    International Nuclear Information System (INIS)

    Strosnider, J.

    2004-01-01

    International commerce of radioactive materials crosses national boundaries, linking separate regulatory institutions with a common purpose and making it necessary for these institutions to work together in order to achieve common safety goals in a manner that does not place an undue burden on industry and commerce. Widespread and increasing use of radioactive materials across the world has led to increases in the transport of radioactive materials. The demand for consistency in the oversight of international transport has also increased to prevent unnecessary delays and costs associated with incongruent or redundant regulatory requirements by the various countries through which radioactive material is transported. The International Atomic Energy Agency (IAEA) is the authority for international regulation of transportation of radioactive materials responsible for promulgation of regulations and guidance for the establishment of acceptable methods of transportation for the international community. As such, the IAEA is seen as the focal point for consensus building between its Member States to develop consistency in transportation regulations and reviews and to ensure the safe and secure transport of radioactive material. International cooperation is also needed to ensure stability in our regulatory processes. Changes to transportation regulations should be based on an anticipated safety benefit supported by risk information and insights gained from continuing experience, evaluation, and research studies. If we keep safety as the principle basis for regulatory changes, regulatory stability will be enhanced. Finally, as we endeavour to maintain consistency and stability in our international regulations, we must be mindful of the new security challenges that lay before the international community as a result of a changing terrorist environment. Terrorism is a problem of global concern that also requires international cooperation and support, as we look for ways to

  13. Transports of radioactive materials. Legal regulations, safety and security concepts, experience

    International Nuclear Information System (INIS)

    Schwarz, Guenther

    2012-01-01

    In Germany, approximately 650,000 to 750,000 units containing radioactive materials for scientific, medical and technical applications are shipped annually by surface, air and water transports. Legally speaking, radioactive materials are dangerous goods which can cause hazards to life, health, property and the environment as a result of faulty handling or accidents in transit. For protection against these hazards, their shipment therefore is regulated in extensive national and international rules of protection and safety. The article contains a topical review of the international and national transport regulations and codes pertaining to shipments of radioactive materials, and of the protection concepts underlying these codes so as to ensure an adequate standard of safety and security in shipping radioactive materials in national and international goods traffic. (orig.)

  14. Small transport aircraft technology

    Science.gov (United States)

    Williams, L. J.

    1983-01-01

    Information on commuter airline trends and aircraft developments is provided to upgrade the preliminary findings of a NASA-formed small transport aircraft technology (STAT) team, established to determine whether the agency's research and development programs could help commuter aircraft manufacturers solve technical problems related to passenger acceptance and use of 19- to 50-passenger aircraft. The results and conclusions of the full set of completed STAT studies are presented. These studies were performed by five airplane manufacturers, five engine manufacturers, and two propeller manufacturers. Those portions of NASA's overall aeronautics research and development programs which are applicable to commuter aircraft design are summarized. Areas of technology that might beneficially be expanded or initiated to aid the US commuter aircraft manufacturers in the evolution of improved aircraft for the market are suggested.

  15. Sample handling and transport for the Secure Automated Fabrication line

    International Nuclear Information System (INIS)

    Sherrell, D.L.; Jensen, J.D.; Genoway, G.G.; Togesen, H.J.

    1983-06-01

    A totally automated system is described which packages, transports, receives, and unpackages sintered plutonium/uranium oxide fuel pellet samples to support automated chemical analysis equipment for the Secure Automated Fabrication (SAF) line. Samples are transferred 100 meters from the fuel production line to a different floor of the facility where automatic determinations are made for purposes of process control and fuel quality certification. The system automatically records identification numbers, net weights sent and received, and all other pertinent information such as fuel lot number, sample point, date, and time of day

  16. Experiences for the Safe and Secure transport of Radioactive Material in Islamic Republic of Iran

    International Nuclear Information System (INIS)

    Hajizadeh, B.; Eshraghi, A.; Deevband, M.R.; Kardan, M.R.

    2016-01-01

    The Iranian Nuclear Regulatory Authority (INRA) has been addressed the actions to be taken in respect of the safe and secure transport of radioactive material. Firstly, INRA translated TS-R-1 and approved it as national standard and imparted it to all entities that engage in transport of radioactive material. Training course was provided for the designers, consignors, carriers and consignees based on their actions in transport of radioactive material. All radioactive material carrier companies were enforced to observe all aspects of national standard and receive an authorized license of National Radiation Protection Department (NRPD). The NRPD has written procedures to regain control of the radiation sources together with the National Waste Management Department. Transport arrangements are in place for imported and exported sources. According to the Code of Conduct on safety and security, the sources category I, II and III have been registered in data bases carefully so far. All the licensees are obligated to inform the Regulatory Authority for any changes in position, application, possession, transfer or waste of radiation sources. There is a formal agreement with the National Security Council to permit the import of scrap metal at major entry points on the borders. Scrap metal importers are required to use these points of entry which are monitored by officers of the NRPD and portal gate monitors which are installed at the main entry points and be controlled from unique centre. If required, the NRPD will supply staff to other border entry points. Presently some portal gate monitors are in progress at the borderline customs also. All the major metal recycling facilities in IRAN have installed portal gate monitors to recheck their scrap metal imports. (author)

  17. Experiences for the Safe and Secure Transport of Radioactive Material in Islamic Republic of Iran

    International Nuclear Information System (INIS)

    Hajizadeh, B.; Eshraghi, A.; Deevband, M.R.; Kardan, M.R.

    2011-01-01

    The Iranian Nuclear Regulatory Authority (INRA) has been addressed the actions to be taken in respect of the safe and secure transport of radioactive material. Firstly, INRA translated TS-R-1 and approved it as national standard and imparted it to all entities that engage in transport of radioactive material. Training course was provided for the designers, consignors, carriers and consignees based on their actions in transport of radioactive material. All radioactive material carrier companies were enforced to observe all aspects of national standard and receive an authorized license of National Radiation Protection Department (NRPD). The NRPD has written procedures to regain control of the radiation sources together with the National Waste Management Department. Transport arrangements are in place for imported and exported sources. According to the Code of Conduct on safety and security, the sources category I, II and III have been registered in data bases carefully so far. All the licensees are obligated to inform the Regulatory Authority for any changes in position, application, possession, transfer or waste of radiation sources. There is a formal agreement with the National Security Council to permit the import of scrap metal at major entry points on the borders. Scrap metal importers are required to use these points of entry which are monitored by officers of the NRPD and portal gate monitors which are installed at the main entry points and be controlled from unique centre. If required, the NRPD will supply staff to other border entry points. Presently some portal gate monitors are in progress at the borderline customs also. All the major metal recycling facilities in IRAN have installed portal gate monitors to recheck their scrap metal imports. (author)

  18. Applicants' preference for impression management tactic in employment interviews by Transportation Security Administration.

    Science.gov (United States)

    Scudder, Joseph N; Lamude, Kevin G

    2009-04-01

    Following past findings on employment interviews, this study hypothesized applicants would have a preference for using self-promoting tactics of impression management over other focuses. Self-reports of impression management tactics were collected from 124 applicants who had interviews for screener positions with the Transportation Security Administration. Contrary to the hypothesis, analysis indicated participants reported they used more ingratiation tactics attempting to praise the interviewer than self-promotion tactics which focused on their own accomplishments. Special qualifications for security jobs which required well-developed perceptual abilities and the controlling structure of the interview context were perhaps responsible for present results differing from prior findings.

  19. Status report on the Small Secure Transportable Autonomous Reactor (SSTAR) /Lead-cooled Fast Reactor (LFR) and supporting research and development.

    Energy Technology Data Exchange (ETDEWEB)

    Sienicki, J. J.; Moisseytsev, A.; Yang, W. S.; Wade, D. C.; Nikiforova, A.; Hanania, P.; Ryu, H. J.; Kulesza, K. P.; Kim, S. J.; Halsey, W. G.; Smith, C. F.; Brown, N. W.; Greenspan, E.; de Caro, M.; Li, N.; Hosemann, P.; Zhang, J.; Yu, H.; Nuclear Engineering Division; LLNL; LANL; Massachusetts Inst. of Tech.; Ecole des Mines de Paris; Oregon State Univ.; Univ.of California at Berkley

    2008-06-23

    This report provides an update on development of a pre-conceptual design for the Small Secure Transportable Autonomous Reactor (SSTAR) Lead-Cooled Fast Reactor (LFR) plant concept and supporting research and development activities. SSTAR is a small, 20 MWe (45 MWt), natural circulation, fast reactor plant for international deployment concept incorporating proliferation resistance for deployment in non-fuel cycle states and developing nations, fissile self-sufficiency for efficient utilization of uranium resources, autonomous load following making it suitable for small or immature grid applications, and a high degree of passive safety further supporting deployment in developing nations. In FY 2006, improvements have been made at ANL to the pre-conceptual design of both the reactor system and the energy converter which incorporates a supercritical carbon dioxide Brayton cycle providing higher plant efficiency (44 %) and improved economic competitiveness. The supercritical CO2 Brayton cycle technology is also applicable to Sodium-Cooled Fast Reactors providing the same benefits. One key accomplishment has been the development of a control strategy for automatic control of the supercritical CO2 Brayton cycle in principle enabling autonomous load following over the full power range between nominal and essentially zero power. Under autonomous load following operation, the reactor core power adjusts itself to equal the heat removal from the reactor system to the power converter through the large reactivity feedback of the fast spectrum core without the need for motion of control rods, while the automatic control of the power converter matches the heat removal from the reactor to the grid load. The report includes early calculations for an international benchmarking problem for a LBE-cooled, nitride-fueled fast reactor core organized by the IAEA as part of a Coordinated Research Project on Small Reactors without Onsite Refueling; the calculations use the same neutronics

  20. Securing public transportation systems an integrated decision analysis framework for the prevention of terrorist attacks as example

    CERN Document Server

    Brauner, Florian

    2017-01-01

    Florian Brauner addresses the risk reduction effects of security measures (SecMe) as well as economic and social effects using terrorist threats in public transportation as use case. SecMe increase the level of security but cause interferences and restrictions for customers (e.g. privacy). This study identifies the interferences and analyzes the acceptance with an empirical survey of customers. A composite indicator for the acceptance of different SecMe is developed and integrated into a risk management framework for multi-criteria decision analysis achieving the right balance of risk reduction, costs, and social acceptance. Contents Assessment of Security Measures for Risk Management Measurement of Objective Effectiveness of Security Measures Against Terrorist Attacks Determination of Subjective Effects of Security Measures (Customer Acceptance Analysis) Cost Analysis of Security Measures Multi-Criteria Decision Support Systems Target Groups Scientists with Interest in Civil Security Research Providers and S...

  1. Impacts of Vehicle (In)Security

    Energy Technology Data Exchange (ETDEWEB)

    Chugg, J.; Rohde, K.

    2015-05-01

    Nuclear and radioactive material is routinely transported worldwide every day. Since 2010, the complexity of the transport vehicle to support such activities has grown exponentially. Many core functions of a vehicle are now handled by small embedded computer modules with more being added each year to enhance the owner’s experience and convenience. With a system as complex as today’s automobile, the potential for cyber security issues is certain. Hackers have begun exploring this new domain with public information increasingly disseminated. Because vehicles are allowed into and around secure nuclear facilities, the potential for using a vehicle as a new cyber entry point or vector into the facility is now plausible and must be mitigated. In addition, compromising such a vehicle could aide in illicit removal of nuclear material, putting sensitive cargo at risk. Because cyber attacks can now be introduced using vehicles, cyber security, needs to be integrated into an organization’s design basis threat document. Essentially, a vehicle now extends the perimeter for which security professionals are responsible.Electronic Control Units (ECU) responsible for handling all core and ancillary vehicle functions are interconnected using the controller area network (CAN) bus. A typical CAN network in a modern automobile contains 50 or more ECUs. The CAN protocol now supports a wide variety of areas, including automotive, road transportation, rail transportation, industrial automation, power generation, maritime, military vehicles, aviation, and medical devices. In many ways, the nuclear industry is employing the CAN bus protocol or other similar broadcast serial networks. This paper will provide an overview of the current state of automobile and CAN Bus security, as well as an overview of what has been publicly disclosed by many research organizations. It will then present several hypotheses of how vehicle security issues may impact nuclear activities. An initial

  2. 49 CFR 8.31 - Industrial security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Industrial security. 8.31 Section 8.31.../ACCESS Access to Information § 8.31 Industrial security. (a) Background. The National Industrial Security... industrial security services for the Department of Transportation. Regulations prescribed by the Secretary of...

  3. 49 CFR 193.2709 - Security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...

  4. 49 CFR 176.162 - Security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Security. 176.162 Section 176.162 Transportation Other Regulations Relating to Transportation PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION... Class 1 (Explosive) Materials Precautions During Loading and Unloading § 176.162 Security. A responsible...

  5. Aviation security : TSA is increasing procurement and deployment of the advanced imaging technology, but challenges to this effort and other areas of aviation security remain : testimony before the Subcommittee on Transportation Security and Infrastructur

    Science.gov (United States)

    2010-03-17

    The attempted bombing of Northwest flight 253 highlighted the importance of detecting improvised explosive devices on passengers. This testimony focuses on (1) the Transportation Security Administrations (TSA) efforts to procure and deploy advance...

  6. Interfacial area transport of bubbly flow in a small diameter pipe

    International Nuclear Information System (INIS)

    Hibiki, Takashi; Takamasa, Tomoji; Ishii, Mamoru

    2001-01-01

    In relation to the development of the interfacial area transport equation, this study focused on modeling of the interfacial area transport mechanism of vertical adiabatic air-water bubbly flows in a relatively small diameter pipe where the bubble size-to-pipe diameter ratio was relatively high and the radial motion of bubbles was restricted by the presence of the pipe wall. The sink term of the interfacial area concentration was modeled by considering wake entrainment as a possible bubble coalescence mechanism, whereas the source term was neglected by assuming negligibly small bubble breakup for low liquid velocity conditions based on visual observation. One-dimensional interfacial area transport equation with the derived sink term was evaluated by using five datasets of vertical adiabatic air-water bubbly flows measured in a 9.0 mm-diameter pipe (superficial gas velocity: 0.013-0.052 m/s, superficial liquid velocity: 0.58-1.0 m/s). The modeled interfacial area transport equation could reproduce the proper trend of the axial interfacial area transport and predict the measured interfacial area concentrations within an average relative deviation of ±11.1%. It was recognized that the present model would be promising for predicting the interfacial area transport of the examined bubbly flows. (author)

  7. Analysis of Small Aircraft as a Transportation System

    Science.gov (United States)

    Dollyhigh, Samuel M.; Yackovetsky, Robert E. (Technical Monitor)

    2002-01-01

    An analysis was conducted to examine the market viability of small aircraft as a transportation mode in competition with automobile and scheduled commercial air travel by estimating the pool of users that would potentially switch to on-demand air travel due to cost/time savings. The basis for the analysis model was the Integrated Air Transportation System Evaluation Tool (IATSET) which was developed under contract to NASA by the Logistics Management Institute. IATSET is a macroeconomic model that predicts at a National level the mode choice between automobile, scheduled air, and on-demand air travel based on the value of a travelers time and monetary cost of the trip. A number of modifications are detailed to the original IATSET to better model the changing small aircraft environment. The potential trip market was modeled for the Eclipse 500 operated as a corporate jet and as an air taxi for the business travel market. The Cirrus 20R and a $80K single engine piston aircraft (based on automobile manufacturing technology) are evaluated in the pleasure and personal business travel market.

  8. Exercise handbook : what transportation security and emergency preparedness leaders need to know to improve emergency preparedness.

    Science.gov (United States)

    2014-02-01

    The U.S. Department of Homeland Security (DHS) has provided extensive general guidance on developing training and exercise programs for public entities, but little had been done to focus that material on the transportation sector specifically. Transp...

  9. Building a National Security Program at a Small School: Identifying Opportunities and Overcoming Challenges

    Science.gov (United States)

    Grossman, Michael; Schortgen, Francis

    2016-01-01

    This article offers insights into the overall program development process and--institutional obstacles and constraints notwithstanding--successful introduction of a new national security program at a small liberal arts university at a time of growing institutional prioritization of science, technology, engineering, and mathematics (STEM) programs.…

  10. 78 FR 70617 - Notice of Funding Availability for the Small Business Transportation Resource Center Program

    Science.gov (United States)

    2013-11-26

    ... assistance, business training programs, business assessment, management training, counseling, marketing and... assessment of the regional small business transportation community needs. (B) General Management & Technical... improve the management of their own small business to expand their transportation- related contracts and...

  11. Biofuels in Africa: growing small-scale opportunities

    Energy Technology Data Exchange (ETDEWEB)

    Sulle, Emmanuel [Tanzania Natural Resources Forum (Tanzania, United Republic of); Fauveaud, Swan [Renewable Energy Group, Environment and Solidarity (France); Vermeulen, Sonja

    2009-11-15

    Global demand for climate-friendly transport fuels is driving vast commercial biofuels projects in developing countries. At the opposite end of the spectrum is small-scale bioenergy production. This offers a way for the poor to meet their energy needs and diversify their livelihoods without compromising food security or environmental integrity. Governments hope that it will be possible to combine the advantages of both large- and small-scale production of biofuels to generate energy security and GDP at the national level, while opening up local opportunities. In Africa, most governments are keen to attract foreign direct investment, and see big business as a strategic means of scaling up rural development. But there is a middle way. By encouraging business models that bridge large and small enterprise, African governments could show that commercial competition can go hand in hand with a range of real local benefits.

  12. Example of a single national regulator responsible for both transport safety and security

    International Nuclear Information System (INIS)

    Karhu, P.; Lahkola, A.; Markkanen, M.; Hellstén, S.

    2016-01-01

    Safety and security in the use of nuclear energy and in the use of radiation, including the transport of nuclear and other radioactive material, share a common objective: to protect people, society, environment, and future generations from the harmful effects of ionizing radiation. Some measures for safety contribute to those for security, and vice versa, while some requirements of one conflict with those of the other. The differences in the requirements arise from the difference in the threat against which the measures are designed: accident vs. intent. A coordinated approach endeavours to take advantage of the similarities and to avoid the problems caused by the differences. One way to implement it is to have one competent authority responsible for the regulatory control of safety and security. It is the experience in Finland that this enables an efficient regulatory system. From the operators’ point of view, a one-stop shop regulatory authority ensures that requirements for safety and security are consistent. Both safety and security require the involvement of and cooperation between several authorities—regulatory, rescue, law enforcement—and operators. The approach in Finland is built on cooperation and a clear division of competences and responsibilities. One regulatory authority provides a fixed point of contact within the professional cooperation network as well as for the public. The one regulatory authority is also easily identifiable, as appropriate, as a point of contact in international cooperation in implementing nuclear and radiation safety and security. Whatever the national regulatory framework and the assignment of responsibilities between authorities, cooperation is essential in house, nationally, and internationally. (author)

  13. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  14. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  15. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  16. 49 CFR 1510.11 - Handling of security service fees.

    Science.gov (United States)

    2010-10-01

    ... air carrier holds neither legal nor equitable interest in the security service fees except for the... 49 Transportation 9 2010-10-01 2010-10-01 false Handling of security service fees. 1510.11 Section 1510.11 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...

  17. Game theoretic analysis of congestion, safety and security traffic and transportation theory

    CERN Document Server

    Zhuang, Jun

    2015-01-01

    Maximizing reader insights into the interactions between game theory, excessive crowding and safety and security elements in traffic and transportation theory, this book establishes a new research angle by illustrating linkages between different research approaches and through laying the foundations for subsequent analysis. Congestion (excessive crowding) is defined in this work as all kinds of flows; e.g., road/sea/air traffic, people, data, information, water, electricity, and organisms. Analyzing systems where congestion occurs – which may be in parallel, series, interlinked, or interdependent, with flows one way or both ways – this book puts forward new congestion models, breaking new ground by introducing game theory and safety/security. Addressing the multiple actors who may hold different concerns regarding system reliability; e.g. one or several terrorists, a government, various local or regional government agencies, or others with stakes for or against system reliability, this book describes how ...

  18. Urea transporter proteins as targets for small-molecule diuretics.

    Science.gov (United States)

    Esteva-Font, Cristina; Anderson, Marc O; Verkman, Alan S

    2015-02-01

    Conventional diuretics such as furosemide and thiazides target salt transporters in kidney tubules, but urea transporters (UTs) have emerged as alternative targets. UTs are a family of transmembrane channels expressed in a variety of mammalian tissues, in particular the kidney. UT knockout mice and humans with UT mutations exhibit reduced maximal urinary osmolality, demonstrating that UTs are necessary for the concentration of urine. Small-molecule screening has identified potent and selective inhibitors of UT-A, the UT protein expressed in renal tubule epithelial cells, and UT-B, the UT protein expressed in vasa recta endothelial cells. Data from UT knockout mice and from rodents administered UT inhibitors support the diuretic action of UT inhibition. The kidney-specific expression of UT-A1, together with high selectivity of the small-molecule inhibitors, means that off-target effects of such small-molecule drugs should be minimal. This Review summarizes the structure, expression and function of UTs, and looks at the evidence supporting the validity of UTs as targets for the development of salt-sparing diuretics with a unique mechanism of action. UT-targeted inhibitors may be useful alone or in combination with conventional diuretics for therapy of various oedemas and hyponatraemias, potentially including those refractory to treatment with current diuretics.

  19. The Air Transportation Policy of Small States: Meeting the Challenges of Globalization

    Science.gov (United States)

    Antoniou, Andreas

    2001-01-01

    The air transport policies of small states are currently at a crossroad. Policy makers in these countries are facing a difficult dilemma: either follow the general trend of liberalization and pay the high cost of the resulting restructuring or maintain the existing regulatory and ownership structures at the risk of isolation thus undermining the viability and sustainability of their air transport sector and their economies in general. This paper proposes to explore the broad issues raised by this difficult dilemma, to outline its special significance in the context of small states and to delineate the options opened to the economic policymakers; in these states. After a brief note on the method of research, we sketch the main elements of the international air transport industry in which the airlines of small states are called upon to act. We then propose to review the main features of the analytical framework of this debate as it pertains to the special circumstances of these states. Then we focus on the challenges facing the airlines of Small States, while the next section proposes a number of the alternative policy options open to the policy makers in these states. The main conclusions are drawn in the final section.

  20. The Influence of Enterprise Diversification on Household Food Security among Small-Scale Sugarcane Farmers: A Case Study of Muhoroni Division, Nyando District, Kenya

    Science.gov (United States)

    Muthoni Thuo, Caroline

    2011-01-01

    This paper examines the levels of household food security and the influence of enterprise diversification on household food security among small-scale sugarcane farmers in Muhoroni division, Nyando District, Kenya. A cross-sectional research design was used in this study. The population consisted of small-scale sugarcane farmers who grow sugarcane…

  1. Transport safety and struggle against malevolent acts: a synergy to be developed - Protecting transports against malevolent acts, Synergies between security and safety: lessons learned from the IAEA international conference, Role of the IRSN transport operational level in the field of safety, Transparency and secret in the field of nuclear material transport

    International Nuclear Information System (INIS)

    Riac, Christian; Flory, Denis; Loiseau, Olivier; Mermaz, Frederic; Demolins, Laurent

    2012-01-01

    The first article proposes an interview with the chief of the security department within the French ministry of Ecology, Sustainable Development, Transports and Housing who comments his missions and his relationships with the ASN and the French Home Office for the protection and control of nuclear materials. A second article discusses the lessons learned from an IAEA international conference about the relationship between the approaches to security and to safety. The third article briefly describes the role of the IRSN transport operational level in the field of safety. The last article discusses how opposite notions like transparency and secret are managed in the case of nuclear material transport

  2. Acoustic Levitation Transportation of Small Objects Using a Ring-type Vibrator

    Science.gov (United States)

    Thomas, Gilles P. L.; Andrade, Marco A. B.; Adamowski, Julio C.; Silva, Eḿílio C. N.

    A new device for noncontact transportation of small solid objects is presented here. Ultrasonic flexural vibrations are generated along the ring shaped vibrator using two Langevin transducers and by using a reflector parallel to the vibrator, small particles are trapped at the nodal points of the resulting acoustic standing wave. The particles are then moved by generating a traveling wave along the vibrator, which can be done by modulating the vibration amplitude of the transducers. The working principle of the traveling wave along the vibrator has been modeled by the superposition of two orthogonal standing waves, and the position of the particles can be predicted by using finite element analysis of the vibrator and the resulting acoustic field. A prototype consisting of a 3 mm thick, 220 mm long, 50 mm wide and 52 mm radius aluminum ring-type vibrator and a reflector of the same length and width was built and small polystyrene spheres have been successfully transported along the straight parts of the vibrator.

  3. 49 CFR 1544.305 - Security Directives and Information Circulars.

    Science.gov (United States)

    2010-10-01

    ... threat assessment or to a specific threat against civil aviation, TSA issues a Security Directive setting... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR...

  4. Production and cost of harvesting, processing, and transporting small-diameter (< 5 inches) trees for energy

    Science.gov (United States)

    Fei Pan; Han-Sup Han; Leonard R. Johnson; William J. Elliot

    2008-01-01

    Dense, small-diameter stands generally require thinning from below to improve fire-tolerance. The resulting forest biomass can be used for energy production. The cost of harvesting, processing, and transporting small-diameter trees often exceeds revenues due to high costs associated with harvesting and transportation and low market values for forest biomass....

  5. Energy access and security strategies in Small Island Developing States

    International Nuclear Information System (INIS)

    Wolf, Franziska; Surroop, Dinesh; Singh, Anirudh; Leal, Walter

    2016-01-01

    Small Islands Developing States (SIDS) are isolated and surrounded by ocean. The generation and use of energy resources are two very important aspects for the development of SIDS. Unfortunately, most of SIDS do not use their potential in respect of energy resources, and they as a result have to depend on the import of fossil fuels in order to meet their energy needs. This increases the overall vulnerability of SIDS as they have to depend on the rising or fluctuating fossil fuels prices. Some SIDS, especially in the geographically dispersed Pacific region, do not have proper access to energy whereas other SIDS struggle more with energy security issue. At the same time, SIDS are most vulnerable to the impacts and effects of climate change, as they are among the ones to be most severely affected in case of natural calamities and sea-level rise. Drawing on experiences from Fiji and Mauritius, this paper explains core elements related to energy access and security in SIDS, contextualizes and discusses barriers and list some of the strategies that may be used to ensure access to and a continuous supply of energy in SIDS. A situational analysis of two SIDS outlines their current energy situation and compares their energy policies to globally accepted criteria for SIDS policies as well as with each other. It is claimed that the diverging energy performances of Fiji and Mauritius cannot be explained by policies differences. The reasons for the varying energy performances may therefore lie in the administrative and institutional mechanisms used by the two countries in implementing their energy policies. Finally, to enable SIDS to reduce their overall vulnerability and become truly sustainable islands, it is recommended to undertake careful assessments of the particular local contexts under which island energy regimes operate. - Highlights: • Core elements related to energy access/security in SIDS, barriers and strategies. • Situational analysis of two SIDS: Fiji and

  6. Analysis of the Sodium Recirculation Theory of Solute Coupled Water Transport in Small Intestine

    DEFF Research Database (Denmark)

    Larsen, E. H.; Sørensen, Jens Nørkær; Sørensen, J. B.

    2002-01-01

    Our previous mathematical model of solute-coupled water transport through the intestinal epithelium is extended for dealing with electrolytes rather than electroneutral solutes. A 3Na+-2K+ pump in the lateral membranes provides the energy-requiring step for driving transjunctional and translateral......, computations predict that the concentration differences between lis and bathing solutions are small for all three ions. Nevertheless, the diffusion fluxes of the ions out of lis significantly exceed their mass transports. It is concluded that isotonic transport requires recirculation of all three ions....... The computed sodium recirculation flux that is required for isotonic transport corresponds to that estimated in experiments on toad small intestine. This result is shown to be robust and independent of whether the apical entrance mechanism for the sodium ion is a channel, a SGLT1 transporter driving inward...

  7. The Small Protein SgrT Controls Transport Activity of the Glucose-Specific Phosphotransferase System.

    Science.gov (United States)

    Lloyd, Chelsea R; Park, Seongjin; Fei, Jingyi; Vanderpool, Carin K

    2017-06-01

    The bacterial small RNA (sRNA) SgrS has been a fruitful model for discovery of novel RNA-based regulatory mechanisms and new facets of bacterial physiology and metabolism. SgrS is one of only a few characterized dual-function sRNAs. SgrS can control gene expression posttranscriptionally via sRNA-mRNA base-pairing interactions. Its second function is coding for the small protein SgrT. Previous work demonstrated that both functions contribute to relief of growth inhibition caused by glucose-phosphate stress, a condition characterized by disrupted glycolytic flux and accumulation of sugar phosphates. The base-pairing activity of SgrS has been the subject of numerous studies, but the activity of SgrT is less well characterized. Here, we provide evidence that SgrT acts to specifically inhibit the transport activity of the major glucose permease PtsG. Superresolution microscopy demonstrated that SgrT localizes to the cell membrane in a PtsG-dependent manner. Mutational analysis determined that residues in the N-terminal domain of PtsG are important for conferring sensitivity to SgrT-mediated inhibition of transport activity. Growth assays support a model in which SgrT-mediated inhibition of PtsG transport activity reduces accumulation of nonmetabolizable sugar phosphates and promotes utilization of alternative carbon sources by modulating carbon catabolite repression. The results of this study expand our understanding of a basic and well-studied biological problem, namely, how cells coordinate carbohydrate transport and metabolism. Further, this work highlights the complex activities that can be carried out by sRNAs and small proteins in bacteria. IMPORTANCE Sequencing, annotation and investigation of hundreds of bacterial genomes have identified vast numbers of small RNAs and small proteins, the majority of which have no known function. In this study, we explore the function of a small protein that acts in tandem with a well-characterized small RNA during metabolic

  8. Transportable, small high-pressure preservation vessel for cells

    International Nuclear Information System (INIS)

    Kamimura, N; Sotome, S; Shimizu, A; Nakajima, K; Yoshimura, Y

    2010-01-01

    We have previously reported that the survival rate of astrocytes increases under high-pressure conditions at 4 0 C. However, pressure vessels generally have numerous problems for use in cell preservation and transportation: (1) they cannot be readily separated from the pressurizing pump in the pressurized state; (2) they are typically heavy and expensive due the use of materials such as stainless steel; and (3) it is difficult to regulate pressurization rate with hand pumps. Therefore, we developed a transportable high-pressure system suitable for cell preservation under high-pressure conditions. This high-pressure vessel has the following characteristics: (1) it can be easily separated from the pressurizing pump due to the use of a cock-type stop valve; (2) it is small and compact, is made of PEEK and weighs less than 200 g; and (3) pressurization rate is regulated by an electric pump instead of a hand pump. Using this transportable high-pressure vessel for cell preservation, we found that astrocytes can survive for 4 days at 1.6 MPa and 4 0 C.

  9. Heavy-flavour transport: from large to small systems

    Energy Technology Data Exchange (ETDEWEB)

    Beraudo, A.; De Pace, A.; Monteno, M.; Nardi, M.; Prino, F.

    2016-12-15

    Predictions for heavy-flavour production in relativistic heavy-ion experiments provided by the POWLANG transport setup, including now also an in-medium hadronization model, are displayed, After showing some representative findings for the Au-Au and Pb-Pb cases, a special focus will be devoted to the results obtained in the small systems formed in proton(deuteron)-nucleus collisions, where recent experimental data suggest the possible formation of a medium featuring a collective behaviour.

  10. Direct detection of SERCA calcium transport and small-molecule inhibition in giant unilamellar vesicles

    International Nuclear Information System (INIS)

    Bian, Tengfei; Autry, Joseph M.; Casemore, Denise; Li, Ji; Thomas, David D.; He, Gaohong; Xing, Chengguo

    2016-01-01

    We have developed a charge-mediated fusion method to reconstitute the sarco/endoplasmic reticulum Ca 2+ -ATPase (SERCA) in giant unilamellar vesicles (GUV). Intracellular Ca 2+ transport by SERCA controls key processes in human cells such as proliferation, signaling, and contraction. Small-molecule effectors of SERCA are urgently needed as therapeutics for Ca 2+ dysregulation in human diseases including cancer, diabetes, and heart failure. Here we report the development of a method for efficiently reconstituting SERCA in GUV, and we describe a streamlined protocol based on optimized parameters (e.g., lipid components, SERCA preparation, and activity assay requirements). ATP-dependent Ca 2+ transport by SERCA in single GUV was detected directly using confocal fluorescence microscopy with the Ca 2+ indicator Fluo-5F. The GUV reconstitution system was validated for functional screening of Ca 2+ transport using thapsigargin (TG), a small-molecule inhibitor of SERCA currently in clinical trials as a prostate cancer prodrug. The GUV system overcomes the problem of inhibitory Ca 2+ accumulation for SERCA in native and reconstituted small unilamellar vesicles (SUV). We propose that charge-mediated fusion provides a widely-applicable method for GUV reconstitution of clinically-important membrane transport proteins. We conclude that GUV reconstitution is a technological advancement for evaluating small-molecule effectors of SERCA.

  11. Small Transport Aircraft Technology /STAT/ Propulsion Study

    Science.gov (United States)

    Heldenbrand, R. W.; Baerst, C. F.; Rowse, J. H.

    1980-01-01

    The NASA Small Transport Aircraft Technology (STAT) Propulsion Study was established to identify technology requirements and define the research and development required for new commuter aircraft. Interim results of the studies defined mission and design characteristics for 30- and 50-passenger aircraft. Sensitivities were defined that relate changes in engine specific fuel consumption (SFC), weight, and cost (including maintenance) to changes in the aircraft direct operating cost (DOC), takeoff gross weight, and empty weight. A comparison of performance and economic characteristics is presented between aircraft powered by 1980 production engines and those powered by a 1990 advanced technology baseline engine.

  12. Effects of taurine on plasma glucose concentration and active glucose transport in the small intestine.

    Science.gov (United States)

    Tsuchiya, Yo; Kawamata, Koichi

    2017-11-01

    Taurine lowers blood glucose levels and improves hyperglycemia. However, its effects on glucose transport in the small intestine have not been investigated. Here, we elucidated the effect of taurine on glucose absorption in the small intestine. In the oral glucose tolerance test, addition of 10 mmol/L taurine suppressed the increase in hepatic portal glucose concentrations. To investigate whether the suppressive effect of taurine occurs via down-regulation of active glucose transport in the small intestine, we performed an assay using the everted sac of the rat jejunum. Addition of taurine to the mucosal side of the jejunum suppressed active glucose transport via sodium-glucose cotransporter 1 (SGLT1). After elimination of chloride ions from the mucosal solution, taurine did not show suppressive effects on active glucose transport. These results suggest that taurine suppressed the increase in hepatic portal glucose concentrations via suppression of SGLT1 activity in the rat jejunum, depending on chloride ions. © 2017 Japanese Society of Animal Science.

  13. Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures

    Directory of Open Access Journals (Sweden)

    Elyes Ben Hamida

    2015-07-01

    Full Text Available Due to the growing number of vehicles on the roads worldwide, road traffic accidents are currently recognized as a major public safety problem. In this context, connected vehicles are considered as the key enabling technology to improve road safety and to foster the emergence of next generation cooperative intelligent transport systems (ITS. Through the use of wireless communication technologies, the deployment of ITS will enable vehicles to autonomously communicate with other nearby vehicles and roadside infrastructures and will open the door for a wide range of novel road safety and driver assistive applications. However, connecting wireless-enabled vehicles to external entities can make ITS applications vulnerable to various security threats, thus impacting the safety of drivers. This article reviews the current research challenges and opportunities related to the development of secure and safe ITS applications. It first explores the architecture and main characteristics of ITS systems and surveys the key enabling standards and projects. Then, various ITS security threats are analyzed and classified, along with their corresponding cryptographic countermeasures. Finally, a detailed ITS safety application case study is analyzed and evaluated in light of the European ETSI TC ITS standard. An experimental test-bed is presented, and several elliptic curve digital signature algorithms (ECDSA are benchmarked for signing and verifying ITS safety messages. To conclude, lessons learned, open research challenges and opportunities are discussed.

  14. 49 CFR 8.9 - Information Security Review Committee.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Information Security Review Committee. 8.9 Section.../DECLASSIFICATION/ACCESS Classification/Declassification of Information § 8.9 Information Security Review Committee. (a) There is hereby established a Department of Transportation Information Security Review Committee...

  15. Specific lysosomal transport of small neutral amino acids

    International Nuclear Information System (INIS)

    Pisoni, R.L.; Flickinger, K.S.; Thoene, J.G.; Christensen, H.N.

    1986-01-01

    Studies of amino acid exodus from lysosomes have allowed us previously to describe transport systems specific for cystine and another for cationic amino acids in fibroblast lysosomes. They are now able to study amino acid uptake into highly purified fibroblast lysosomes obtained by separating crude granular fraction on gradients formed by centrifugation in 35% isoosmotic Percoll solutions. Analog inhibition and saturation studies indicate that L-[ 14 C]proline (50 μM) uptake by fibroblast lysosomes at 37 0 C in 50 mM citrate/tris pH 7.0 buffer containing 0.25 M sucrose is mediated by two transport systems, one largely specific for L-proline and the other for which transport is shared with small neutral amino acids such as alanine, serine and threonine. At 7 mM, L-proline inhibits L-[ 14 C]proline uptake almost completely, whereas ala, ser, val, thr, gly, N-methylalanine and sarcosine inhibit proline uptake by 50-65%. The system shared by alanine, serine and threonine is further characterized by these amino acids strongly inhibiting the uptakes of each other. Lysosomal proline transport is selective for the L-isomer of the amino acid, and is scarcely inhibited by 7 mM arg, glu, asp, leu, phe, his, met, (methylamino) isobutyrate, betaine or N,N-dimethylglycine. Cis or trans-4-hydroxy-L-proline inhibit proline uptake only slightly. In sharp contrast to the fibroblast plasma membrane in which Na + is required for most proline and alanine transport, lysosomal uptake of these amino acids occurs independently of Na +

  16. Analysis of satisfaction factors at urban transport interchanges: Measuring travelers’ attitudes to information, security and waiting

    Energy Technology Data Exchange (ETDEWEB)

    Lois Garcia, D.; Monzon de Caceres, A.; Hernandez del Olmo, S.

    2016-07-01

    Transport interchanges can be considered as a node, where people transfer from one mode to another, and as a place to stay, using facilities and services as well as waiting areas. Reducing disruption of transfer in multimodal trips is a key element for assuring seamless mobility in big cities. Based on previous research (Hernández & Monzón, 2016) this paper aims to explore the predictive capacity of attitudes towards several service factors on general satisfaction with transport interchange. Complementary, it was analyzing how personal and trip characteristics are related to evaluation of some variables, and examining the influence of waiting time on the perceived quality. To that end, a two steps methodology was conducted (personal and on-line interview) in a representative sample of 740 users (54% female, 55% work purpose trip). We performed path analysis to test the model showing a satisfactory statistical fit. The model developed show good performance for predicting general satisfaction at Moncloa Transport Interchange (Madrid, Spain). The outputs of the model indicate that Information and Safety and Security factors predicted 49% of general satisfaction. Furthermore, the results showed also a strong association between evaluation of Design and Environmental quality, factors that not affect directly general satisfaction but do so through Information and Safety & Security perception, acting the last as mediator variables. Nevertheless, spending time queuing inside the interchange show a negative influence on Information and Safety & Security, while age of participants affect negatively to Information, which mean that elder have some cognitive accessibility problems. Moreover, our data shows gender differences in safety perception, since women feel less safe (particularity the youngest) inside the interchange. The results indicate a number of priority measures to enhance. (Author)

  17. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    Objective of this manual is to train security personnel to protect special nuclear materials and nuclear facilities against theft and sabotage as required by 10 CFR Part 73. This volume contains the introduction and rationale

  18. Nonlinear Transport in Organic Thin Film Transistors with Soluble Small Molecule Semiconductor.

    Science.gov (United States)

    Kim, Hyeok; Song, Dong-Seok; Kwon, Jin-Hyuk; Jung, Ji-Hoon; Kim, Do-Kyung; Kim, SeonMin; Kang, In Man; Park, Jonghoo; Tae, Heung-Sik; Battaglini, Nicolas; Lang, Philippe; Horowitz, Gilles; Bae, Jin-Hyuk

    2016-03-01

    Nonlinear transport is intensively explained through Poole-Frenkel (PF) transport mechanism in organic thin film transistors with solution-processed small molecules, which is, 6,13-bis(triisopropylsilylethynyl) (TIPS) pentacene. We outline a detailed electrical study that identifies the source to drain field dependent mobility. Devices with diverse channel lengths enable the extensive exhibition of field dependent mobility due to thermal activation of carriers among traps.

  19. Performance Assessment Transport Modeling of Uranium at the Area 5 Radioactive Waste Management Site at the Nevada National Security Site

    International Nuclear Information System (INIS)

    2010-01-01

    Following is a brief summary of the assumptions that are pertinent to the radioactive isotope transport in the GoldSim Performance Assessment model of the Area 5 Radioactive Waste Management Site, with special emphasis on the water-phase reactive transport of uranium, which includes depleted uranium products. The Area 5 PA model assumes activity disposed in trenches is well mixed within the native alluvium of the trench at the time the facility is closed. Waste containers and waste forms are assumed not to limit the release of radionuclides for transport. In the Area 5 RWMS PA model, the pathways that are considered to bring radioactivity in the waste zone to the surface soils of the closure covers are (1) plant uptake, (2) burrowing animal activity, and (3) advection/dispersion/diffusion in the pore water. Water-phase transport is a minor component of the transport, which is dominated by plant uptake and burrowing animal activity. Because the soil column is mostly dry, upward water flux rates are extremely small, resulting in small advective/dispersive transport of radioactive isotopes in pore water of the unsaturated zone. Reactive transport of radioactive elements in the Area 5 soil pore water are modeled using element-specific partition coefficients (Kds) that partition radioactivity between pore water and soil of the disposal cell, and solubility limits that control the solubility of elements in pore water. Geochemical modeling is not performed in the Area 5 RWMS GoldSim PA model; however, Kds and solubility limits were derived from previous geochemical modeling performed using Area 5 geochemical data. Kds for uranium were developed based on geochemical modeling using the mineral characteristics of soil (alluvium) and the chemical characteristics of water at the site (Carle et al., 2002). In the GoldSim model, uranium Kd is represented with a lognormal distribution with a mean value of 0.8 milliliter per gram (taken from Figure 4.11, Page 4-19 of Carle et al

  20. Securing global trade through secure freight transportation : final report.

    Science.gov (United States)

    2009-12-16

    Given the increased probability of disruptions to global supply chains, and the significant impact these have on national and global economies, the problem is how to secure global trade. The concept of a global trade chain-of-custody has been develop...

  1. Security and Emergency Management Division

    Data.gov (United States)

    Federal Laboratory Consortium — Volpe's Security and Emergency Management Division identifies vulnerabilities, risks, and opportunities to improve the security of transportation systems, critical...

  2. Sensitive Security Information and Transportation Security: Issues and Congressional Options

    National Research Council Canada - National Science Library

    Sollenberger, Mitchel A

    2004-01-01

    .... TSA's application of the SSI regulations has, however, resulted in some controversies over airport security procedures, employee accountability, passenger screening, and airport secrecy agreements...

  3. Oregon department of transportation small business group twice-monthly payments pilot project : summary report.

    Science.gov (United States)

    2008-07-01

    Oregon Department of Transportation (ODOT) recently completed a pilot study on small business payment practices. In the study, three pilot projects were tested where payments to small business contractors were changed from a monthly payment to twice-...

  4. Shipment security update - 2003

    International Nuclear Information System (INIS)

    Patterson, John; Anne, Catherine

    2003-01-01

    At the 2002 RERTR, NAC reported on the interim measures taken by the U.S. Nuclear Regulatory Commission to enhance the security afforded to shipments of spent nuclear fuel. Since that time, there have been a number of additional actions focused on shipment security including training programs sponsored by the U.S. Department of Transportation and the Electric Power Research Council, investigation by the Government Accounting Office, and individual measures taken by shippers and transportation agents. The paper will present a status update regarding this dynamic set of events and provide an objective assessment of the cost, schedule and technical implications of the changing security landscape. (author)

  5. Security improvements for rail movements of SNM

    International Nuclear Information System (INIS)

    Garcia, M.R.; Gronager, J.E.; Shemigon, N.N.

    1998-01-01

    The US Department of Energy (DOE) and the Russian Special Scientific and Production State Enterprise Eleron have teamed to lead a project to enhance the overall security of Russian Ministry of Atomic Energy (MINATOM) transportation of Special Nuclear Material (SNM) shipments. The effort is called the Railcar Transportation Security Project and is part of the overall DOE Material Protection, Control, and Accounting (MPC and A) program addressing the enhancement of nuclear material control, accounting, and physical protection for Russian SNM. The goal of this MPC and A project is to significantly increase the security of Russian MINATOM highly enriched SNM rail shipments. To accomplish this, the MPC and A Railcar Transportation Security program will provide an enhanced, yet cost effective, railcar transportation security system. The system incorporates a balance between the traditional detection, communications, delay, and response security elements to significantly improve the security of MINATOM SNM shipments. The strategy of this program is to use rapid upgrades to implement mature security technologies as quickly as possible. The rapid upgrades emphasize rapidly deployable delay elements, enhanced radio communications, and intrusion detection and surveillance. Upgraded railcars have begun operation during FY98. Subsequent upgrades will build upon the rapid upgrades and eventually be integrated into a final deployed system configuration. This paper provides an overview of the program, with a summary of performance of the deployed railcars

  6. 14 CFR 460.53 - Security.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Security. 460.53 Section 460.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF....53 Security. An operator must implement security requirements to prevent any space flight participant...

  7. Early vertebrate origin and diversification of small transmembrane regulators of cellular ion transport.

    Science.gov (United States)

    Pirkmajer, Sergej; Kirchner, Henriette; Lundell, Leonidas S; Zelenin, Pavel V; Zierath, Juleen R; Makarova, Kira S; Wolf, Yuri I; Chibalin, Alexander V

    2017-07-15

    Small transmembrane proteins such as FXYDs, which interact with Na + ,K + -ATPase, and the micropeptides that interact with sarco/endoplasmic reticulum Ca 2+ -ATPase play fundamental roles in regulation of ion transport in vertebrates. Uncertain evolutionary origins and phylogenetic relationships among these regulators of ion transport have led to inconsistencies in their classification across vertebrate species, thus hampering comparative studies of their functions. We discovered the first FXYD homologue in sea lamprey, a basal jawless vertebrate, which suggests small transmembrane regulators of ion transport emerged early in the vertebrate lineage. We also identified 13 gene subfamilies of FXYDs and propose a revised, phylogeny-based FXYD classification that is consistent across vertebrate species. These findings provide an improved framework for investigating physiological and pathophysiological functions of small transmembrane regulators of ion transport. Small transmembrane proteins are important for regulation of cellular ion transport. The most prominent among these are members of the FXYD family (FXYD1-12), which regulate Na + ,K + -ATPase, and phospholamban, sarcolipin, myoregulin and DWORF, which regulate the sarco/endoplasmic reticulum Ca 2+ -ATPase (SERCA). FXYDs and regulators of SERCA are present in fishes, as well as terrestrial vertebrates; however, their evolutionary origins and phylogenetic relationships are obscure, thus hampering comparative physiological studies. Here we discovered that sea lamprey (Petromyzon marinus), a representative of extant jawless vertebrates (Cyclostomata), expresses an FXYD homologue, which strongly suggests that FXYDs predate the emergence of fishes and other jawed vertebrates (Gnathostomata). Using a combination of sequence-based phylogenetic analysis and conservation of local chromosome context, we determined that FXYDs markedly diversified in the lineages leading to cartilaginous fishes (Chondrichthyes) and bony

  8. Surface transportation security : TSA has taken actions to manage risk, improve coordination, and measure performance, but additional actions would enhance its efforts, April 21, 2010.

    Science.gov (United States)

    2010-04-21

    Terrorist attacks on surface transportation facilities in Moscow, Mumbai, London, and Madrid caused casualties and highlighted the vulnerability of such systems. The Transportation Security Administration (TSA), within the Department of Homeland Secu...

  9. Securing the Aviation Transportation System

    Science.gov (United States)

    2007-12-01

    additional 100,000 airport workers who perform duties in sterile areas (the indoor gate area past the security check point).197 These same...containing thirteen handguns, an assault rifle and eight pounds of marijuana .270 However, two Federal Air Marshals were also onboard the aircraft.271

  10. Why SCADA security is NOT like Computer Centre Security

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    Today, the industralized world lives in symbiosis with control systems (aka SCADA systems): it depends on power distribution, oil production, public transport, automatic production lines. While the convenience is at hand, still too many control systems are designed without any security in mind, lack basic security protections, and are not even robust enough to withstand basic attacks. The Stuxnet worm attacking Siemens PLCs in 2010 was another close call. Attackers currently enjoy hacking control systems, and aim to switch lights off. This presentation shall recap the current situation and discuss the differences (or not) between computer center cyber-security and control system cyber-security.

  11. 49 CFR 1510.7 - Air transportation advertisements and solicitations.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Air transportation advertisements and solicitations. 1510.7 Section 1510.7 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE AND PROCEDURAL RULES PASSENGER CIVIL AVIATION SECURITY SERVICE...

  12. Stakeholder Transportation Scorecard: Reviewing Nevada's Recommendations for Enhancing the Safety and Security of Nuclear Waste Shipments - 13518

    International Nuclear Information System (INIS)

    Dilger, Fred C.; Ballard, James D.; Halstead, Robert J.

    2013-01-01

    As a primary stakeholder in the Yucca Mountain program, the state of Nevada has spent three decades examining and considering national policy regarding spent nuclear fuel and high-level radioactive waste transportation. During this time, Nevada has identified 10 issues it believes are critical to ensuring the safety and security of any spent nuclear fuel transportation program, and achieving public acceptance. These recommendations are: 1) Ship the oldest fuel first; 2) Ship mostly by rail; 3) Use dual-purpose (transportable storage) casks; 4) Use dedicated trains for rail shipments; 5) Implement a full-scale cask testing program; 6) Utilize a National Environmental Policy Act (NEPA) process for the selection of a new rail spur to the proposed repository site; 7) Implement the Western Interstate Energy Board (WIEB) 'straw man' process for route selection; 8) Implement Section 180C assistance to affected States, Tribes and localities through rulemaking; 9) Adopt safety and security regulatory enhancements proposed states; and 10) Address stakeholder concerns about terrorism and sabotage. This paper describes Nevada's proposals in detail and examines their current status. The paper describes the various forums and methods by which Nevada has presented its arguments and sought to influence national policy. As of 2012, most of Nevada's recommendations have been adopted in one form or another, although not yet implemented. If implemented in a future nuclear waste program, the State of Nevada believes these recommendations would form the basis for a successful national transportation plan for shipments to a geologic repository and/or centralized interim storage facility. (authors)

  13. Optimizing sealed transports of small ornamental fish

    Directory of Open Access Journals (Sweden)

    Rui Esteves da Silva

    2014-06-01

    Full Text Available This is a report on multiple simulated long-term transports of small ornamental fish inside plastic bags. The species involved were Diplodus sargus, Gobius paganellus, Gobiusculus flavescens, Lepadogaster lepadogaster and Lipophrys pholis. The objective of such simulations was moving the maximum bioload possible while ensuring 100% survivorship, ultimately resulting in savings for the end-receiver. Transports were simulated over 24, 48 and 72 hours, with increasing animal bioloads per bag. Half of the trials were performed with “regular” saltwater while the other half involved seawater buffered with Amquel ®, sodium carbonate and sodium bicarbonate, with the objective of keeping ammonia low and pH similar to initial baseline values. At the end of each trial, temperature, dissolved oxygen, pH and ammonia were analized and the survival rate calculated and recorded. L. lepadogaster endured the highest bioloads at 100% survivorship (i.e. up to 30 g / L, which is not surprising given the intertidal nature of this species. D. sargus exhibited mortalities with bioloads as low as 3,23 g / L, which echoes its predominantly pelagic nature and relatively lesser ability to endure confinement. The three remaining species showed varying degrees of tolerance to increasing bioloads in transport: L. pholis, also an intertidal species, handled up to 20 g/L over 72 hours, while G. paganellus handled up to 7 g/L over 72 hours, and G. flavescens (a predominantly pelagic species could deal with no more than 6 g/L up to 72 hours.

  14. 14 CFR 129.28 - Flightdeck security.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Flightdeck security. 129.28 Section 129.28... Flightdeck security. (a) After August 20, 2002, except for a newly manufactured airplane on a non-revenue...; or the operator must implement a security program approved by the Transportation Security...

  15. 49 CFR 193.2913 - Security monitoring.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security monitoring. 193.2913 Section 193.2913...: FEDERAL SAFETY STANDARDS Security § 193.2913 Security monitoring. Each protective enclosure and the area.... Monitoring must be by visual observation in accordance with the schedule in the security procedures under...

  16. Grounding the nexus: Examining the integration of small-scale irrigators into a national food security programme in Burkina Faso

    Directory of Open Access Journals (Sweden)

    Brian Dowd-Uribe

    2018-06-01

    Full Text Available The water-food nexus literature examines the synergies and trade-offs of resource use but is dominated by large-scale analyses that do not sufficiently engage the local dimensions of resource management. The research presented here addresses this gap with a local-scale analysis of integrated water and food management in Burkina Faso. Specifically, we analyse the implementation of a national food security campaign (Opération Bondofa to boost maize production in a subbasin that exhibits two important trends in Africa: a large increase in small-scale irrigators and the decentralisation of water management. As surface water levels dropped in the region, entities at different scales asserted increased control over water allocation, exposing the contested nature of new decentralised institutions, and powerful actors’ preference for local control. These scalar power struggles intersected with a lack of knowledge of small-scale irrigators’ cultural practices to produce an implementation and water allocation schedule that did match small-scale irrigator needs, resulting in low initial enthusiasm for the project. Increased attention from national governments to strengthen decentralised water management committees and spur greater knowledge of, and engagement with, small-scale irrigators can result in improved programme design to better incorporate small-scale irrigators into national food security campaigns.

  17. Small Aircraft Transportation System Higher Volume Operations Concept

    Science.gov (United States)

    Abbott, Terence S.; Consiglio, Maria C.; Baxley, Brian T.; Williams, Daniel M.; Jones, Kenneth M.; Adams, Catherine A.

    2006-01-01

    This document defines the Small Aircraft Transportation System (SATS) Higher Volume Operations concept. The general philosophy underlying this concept is the establishment of a newly defined area of flight operations called a Self-Controlled Area (SCA). Within the SCA, pilots would take responsibility for separation assurance between their aircraft and other similarly equipped aircraft. This document also provides details for a number of off-nominal and emergency procedures which address situations that could be expected to occur in a future SCA. The details for this operational concept along with a description of candidate aircraft systems to support this concept are provided.

  18. Surface Transportation Security Priority Assessment

    Science.gov (United States)

    2010-03-01

    intercity buses), and pipelines, and related infrastructure (including roads and highways), that are within the territory of the United States...Modernizing the information technology infrastructure used to vet the identity of travelers and transportation workers  Using terrorist databases to...examination of persons travelling , surface transportation modes tend to operate in a much more open environment, making it difficult to screen workers

  19. 76 FR 81516 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-12-28

    ... Transportation Security Administration's (TSA) Frequent Traveler Program; examine evolving threats in cyber... Evolving Threats in Cyber Security. Basis for Closure: In accordance with Section 10(d) of the Federal... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0111] Homeland Security Advisory Council...

  20. Department of Homeland Security Semiannual Regulatory Agenda

    Science.gov (United States)

    2010-04-26

    ... NUMERICAL LIMITATIONS Legal Authority: 8 USC 1184(g) Abstract: The Department of Homeland Security is... Stage Transportation Security Administration (TSA) 197. AIRCRAFT REPAIR STATION SECURITY Legal Authority.... MODIFICATION OF THE AVIATION SECURITY INFRASTRUCTURE FEE (ASIF) (MARKET SHARE) Legal Authority: 49 USC 44901...

  1. Electromagnetic fields in small systems from a multiphase transport model

    Science.gov (United States)

    Zhao, Xin-Li; Ma, Yu-Gang; Ma, Guo-Liang

    2018-02-01

    We calculate the electromagnetic fields generated in small systems by using a multiphase transport (AMPT) model. Compared to A +A collisions, we find that the absolute electric and magnetic fields are not small in p +Au and d +Au collisions at energies available at the BNL Relativistic Heavy Ion Collider and in p +Pb collisions at energies available at the CERN Large Hadron Collider. We study the centrality dependencies and the spatial distributions of electromagnetic fields. We further investigate the azimuthal fluctuations of the magnetic field and its correlation with the fluctuating geometry using event-by-event simulations. We find that the azimuthal correlation 〈" close="〉cos(ϕα+ϕβ-2 ΨRP)〉">cos2 (ΨB-Ψ2) between the magnetic field direction and the second-harmonic participant plane is almost zero in small systems with high multiplicities, but not in those with low multiplicities. This indicates that the charge azimuthal correlation is not a valid probe to study the chiral magnetic effect (CME) in small systems with high multiplicities. However, we suggest searching for possible CME effects in small systems with low multiplicities.

  2. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  3. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  4. A transportation security system applying RFID and GPS

    Directory of Open Access Journals (Sweden)

    Ruijian Zhang

    2013-03-01

    Full Text Available Purpose: This paper is about developing a centralized, internet based security tool which utilizes RFID and GPS technology to identify drivers and track the load integrity. Design/methodology/approach: The system will accomplish the security testing in real-time using the internet and the U.S. Customs’ database (ACE. A central database and the interfaces and communication between the database and ACE will be established. After the vehicle is loaded, all openings of the tanker are sealed with disposable RFID tag seals. Findings/value: An RFID reader and GPS tracker wirelessly connected with the databases will serve as testing grounds for the implementation of security measures that can help prevent future terrorist attacks and help in ensuring that the goods and products are not compromised while in transit. The system will also reduce the labor work of security check to its minimum. 

  5. Natural gas to improve energy security in Small Island Developing States: A techno-economic analysis

    Directory of Open Access Journals (Sweden)

    Pravesh Raghoo

    Full Text Available There is a paucity of studies on natural gas-based energy production in Small Island Developing States (SIDS even though technological improvements today are likely to make the application of natural gas more and more feasible. The development of natural gas in some of the regions of the Pacific, Africa, Indian Ocean and Caribbean attracts nearby countries and the coming up of the compressed natural gas (CNG technology which can serve regional markets are two motivations for SIDS to develop natural gas-based energy provision. A third factor concerns long-term energy security. Due to continued reliance on fossil fuels and slow uptake of renewable energy, there is a need to diversify SIDS’ energy mix for a sustainable electricity industry. Comparing the opportunities and constraints of liquefied natural gas (LNG and compressed natural gas (CNG in a SIDS-specific context, this paper discusses how to improve the integration of natural gas in prevailing energy regimes in SIDS as an alternative fuel to oil and complementary to renewable energy sources. To illustrate feasibility in practice, a techno-economic analysis is carried out using the island of Mauritius as an example. Keywords: Energy security, Natural gas, Small Island Developing States

  6. Relational Security Moderates the Effect of Serotonin Transporter Gene Polymorphism (5-HTTLPR) on Stress Generation and Depression among Adolescents

    Science.gov (United States)

    Starr, Lisa R.; Hammen, Constance; Brennan, Patricia A.; Najman, Jake M.

    2013-01-01

    Previous research demonstrates that carriers of the short allele of the serotonin transporter gene (5-HTTLPR) show both greater susceptibility to depression in response to stressful life events and higher rates of generation of stressful events in response to depression. The current study examines relational security (i.e., self-reported beliefs…

  7. 49 CFR 193.2715 - Training: security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Training: security. 193.2715 Section 193.2715...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2715 Training: security. (a) Personnel responsible for security at an LNG plant must be trained in accordance with a written plan of...

  8. Secure Execution of Distributed Session Programs

    Directory of Open Access Journals (Sweden)

    Nuno Alves

    2011-10-01

    Full Text Available The development of the SJ Framework for session-based distributed programming is part of recent and ongoing research into integrating session types and practical, real-world programming languages. SJ programs featuring session types (protocols are statically checked by the SJ compiler to verify the key property of communication safety, meaning that parties engaged in a session only communicate messages, including higher-order communications via session delegation, that are compatible with the message types expected by the recipient. This paper presents current work on security aspects of the SJ Framework. Firstly, we discuss our implementation experience from improving the SJ Runtime platform with security measures to protect and augment communication safety at runtime. We implement a transport component for secure session execution that uses a modified TLS connection with authentication based on the Secure Remote Password (SRP protocol. The key technical point is the delicate treatment of secure session delegation to counter a previous vulnerability. We find that the modular design of the SJ Runtime, based on the notion of an Abstract Transport for session communication, supports rapid extension to utilise additional transports whilst separating this concern from the application-level session programming task. In the second part of this abstract, we formally prove the target security properties by modelling the extended SJ delegation protocols in the pi-calculus.

  9. 49 CFR 659.23 - System security plan: contents.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: contents. 659.23 Section 659... State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at a... system security plan; and (e) Document the rail transit agency's process for making its system security...

  10. Cyber Security Scenarios and Control for Small and Medium Enterprises

    Directory of Open Access Journals (Sweden)

    Nilaykumar Kiran SANGANI

    2012-01-01

    Full Text Available As the world advances towards the computing era, security threats keeps on increasing in the form of malware, viruses, internet attack, theft of IS assets / technology and a lot more. This is a major concern for any form of business. Loss in company’s status / liability / reputation is a huge downfall for a running business. We have witnessed the attacks getting carried out; large firm’s data getting breached / government bodies’ sites getting phished / attacked. These huge entities have technology expertise to safeguard their company’s interest against such attacks through investing huge amounts of capital in manpower and secure tools. But what about SMEs? SMEs enrich a huge part of the country’s economy. Big organizations have their own security measures policy which ideally is not applied when it comes to a SME. The aim of this paper is to come out with an Information Security Assurance Cyber Control for SMEs (ISACC against common cyber security threats implemented at a cost effective measure.

  11. Efficient Aviation Security: Strengthening the Analytic Foundation for Making Air Transportation Security Decisions

    Science.gov (United States)

    2012-01-01

    tenfold to account for uninsured and other costs unaccounted for, the result would be in the low billions of dollars rather than tens of billions...Aviation Security GAO—See U.S. Government Accountability Office or, prior to 2004, U.S. General Accounting Office. Ghylin, K. M., C. G . Drury , and A...outweigh their costs . This document seeks to contribute to the national debate on avia- tion security by examining a set of issues that are either

  12. The experience of WNTI with Safety and Security Worldwide

    International Nuclear Information System (INIS)

    Neau, Henry-Jacques

    2016-01-01

    This paper gives an industrial perspective on safety and security issues based on the experience of WNTI members. It describes how safety is invested primarily in the package; not how the package is transported. Transport safety is therefore an engineering challenge, and all necessary technical information is available to enable this to be met. Security in transport involves various measures to guard against intentional malicious acts. The paper describes the international instruments relevant to security in the transport of nuclear fuel cycle materials and how both safety and security regulations must be coordinated and simplified to avoid conflicts. It considers potential risks, which must not be underestimated. However, the assessment of risks must be realistic and quantified, and the requirements placed on the industry appropriate. It is important to dispel exaggerated perceptions of danger in the minds of the public, politicians and regulators. (author)

  13. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  14. 49 CFR 234.211 - Security of warning system apparatus.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Security of warning system apparatus. 234.211... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION GRADE CROSSING SIGNAL SYSTEM SAFETY AND STATE ACTION PLANS Maintenance, Inspection, and Testing Maintenance Standards § 234.211 Security of warning system apparatus...

  15. Stakeholder Transportation Scorecard: Reviewing Nevada's Recommendations for Enhancing the Safety and Security of Nuclear Waste Shipments - 13518

    Energy Technology Data Exchange (ETDEWEB)

    Dilger, Fred C. [Black Mountain Research, Henderson, NV 81012 (United States); Ballard, James D. [Department of Sociology, California State University, Northridge, CA 91330 (United States); Halstead, Robert J. [State of Nevada Agency for Nuclear Projects, Carson City, NV 80906 (United States)

    2013-07-01

    As a primary stakeholder in the Yucca Mountain program, the state of Nevada has spent three decades examining and considering national policy regarding spent nuclear fuel and high-level radioactive waste transportation. During this time, Nevada has identified 10 issues it believes are critical to ensuring the safety and security of any spent nuclear fuel transportation program, and achieving public acceptance. These recommendations are: 1) Ship the oldest fuel first; 2) Ship mostly by rail; 3) Use dual-purpose (transportable storage) casks; 4) Use dedicated trains for rail shipments; 5) Implement a full-scale cask testing program; 6) Utilize a National Environmental Policy Act (NEPA) process for the selection of a new rail spur to the proposed repository site; 7) Implement the Western Interstate Energy Board (WIEB) 'straw man' process for route selection; 8) Implement Section 180C assistance to affected States, Tribes and localities through rulemaking; 9) Adopt safety and security regulatory enhancements proposed states; and 10) Address stakeholder concerns about terrorism and sabotage. This paper describes Nevada's proposals in detail and examines their current status. The paper describes the various forums and methods by which Nevada has presented its arguments and sought to influence national policy. As of 2012, most of Nevada's recommendations have been adopted in one form or another, although not yet implemented. If implemented in a future nuclear waste program, the State of Nevada believes these recommendations would form the basis for a successful national transportation plan for shipments to a geologic repository and/or centralized interim storage facility. (authors)

  16. Innovation in small and mediumsized firms in the security service industry

    DEFF Research Database (Denmark)

    Langergaard, Luise Li; Møller, Jørn Kjølseth; Hansen, Anne Vorre

    2014-01-01

    This article is a study of innovation in the security sector based on an analysis of three Danish security companies. It uncovers the logics and dynamics of innovation in the security business, which is part of the operational service sector. Operational service companies are forced to choose...... activities. In order to overcome this general ‘service squeeze’ and break with a mature market, security companies use different strategies for innovation. These strategies depend on the ability of the individual security companies to activate the innovative resources among employees in order to move...... the business activities further up in the market hierarchy of security services by offering more complex and knowledge-intensive solutions to the customers, thereby reducing price competition and increasing the profits of the business activity in the same way as known from other industries...

  17. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-12-09

    ... security screening and identity verification of individuals, including identification media and identifying... undergoing screening of their person (including identity verification) or property; individuals against whom... addresses, phone numbers); Social Security Number, Fingerprints or other biometric identifiers; Photographs...

  18. Cyber security with radio frequency interferences mitigation study for satellite systems

    Science.gov (United States)

    Wang, Gang; Wei, Sixiao; Chen, Genshe; Tian, Xin; Shen, Dan; Pham, Khanh; Nguyen, Tien M.; Blasch, Erik

    2016-05-01

    Satellite systems including the Global Navigation Satellite System (GNSS) and the satellite communications (SATCOM) system provide great convenience and utility to human life including emergency response, wide area efficient communications, and effective transportation. Elements of satellite systems incorporate technologies such as navigation with the global positioning system (GPS), satellite digital video broadcasting, and information transmission with a very small aperture terminal (VSAT), etc. The satellite systems importance is growing in prominence with end users' requirement for globally high data rate transmissions; the cost reduction of launching satellites; development of smaller sized satellites including cubesat, nanosat, picosat, and femtosat; and integrating internet services with satellite networks. However, with the promising benefits, challenges remain to fully develop secure and robust satellite systems with pervasive computing and communications. In this paper, we investigate both cyber security and radio frequency (RF) interferences mitigation for satellite systems, and demonstrate that they are not isolated. The action space for both cyber security and RF interferences are firstly summarized for satellite systems, based on which the mitigation schemes for both cyber security and RF interferences are given. A multi-layered satellite systems structure is provided with cross-layer design considering multi-path routing and channel coding, to provide great security and diversity gains for secure and robust satellite systems.

  19. 49 CFR 176.4 - Port security and safety regulations.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Port security and safety regulations. 176.4... SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION HAZARDOUS MATERIALS REGULATIONS CARRIAGE BY VESSEL General § 176.4 Port security and safety regulations. (a) Each carrier, master, agent, and charterer of a...

  20. Security region-based small signal stability analysis of power systems with FSIG based wind farm

    Science.gov (United States)

    Qin, Chao; Zeng, Yuan; Yang, Yang; Cui, Xiaodan; Xu, Xialing; Li, Yong

    2018-02-01

    Based on the Security Region approach, the impact of fixed-speed induction generator based wind farm on the small signal stability of power systems is analyzed. Firstly, the key factors of wind farm on the small signal stability of power systems are analyzed and the parameter space for small signal stability region is formed. Secondly, the small signal stability region of power systems with wind power is established. Thirdly, the corresponding relation between the boundary of SSSR and the dominant oscillation mode is further studied. Results show that the integration of fixed-speed induction generator based wind farm will cause the low frequency oscillation stability of the power system deteriorate. When the output of wind power is high, the oscillation stability of the power system is mainly concerned with the inter-area oscillation mode caused by the integration of the wind farm. Both the active power output and the capacity of reactive power compensation of the wind farm have a significant influence on the SSSR. To improve the oscillation stability of power systems with wind power, it is suggested to reasonably set the reactive power compensation capacity for the wind farm through SSSR.

  1. Security in Logistics

    Science.gov (United States)

    Cempírek, Václav; Nachtigall, Petr; Široký, Jaromír

    2016-12-01

    This paper deals with security of logistic chains according to incorrect declaration of transported goods, fraudulent transport and forwarding companies and possible threats caused by political influences. The main goal of this paper is to highlight possible logistic costs increase due to these fraudulent threats. An analysis of technological processes will beis provided, and an increase of these transport times considering the possible threatswhich will beis evaluated economic costs-wise. In the conclusion, possible threat of companies'` efficiency in logistics due to the costs`, means of transport and increase in human resources` increase will beare pointed out.

  2. A sensor monitoring system for telemedicine, safety and security applications

    Science.gov (United States)

    Vlissidis, Nikolaos; Leonidas, Filippos; Giovanis, Christos; Marinos, Dimitrios; Aidinis, Konstantinos; Vassilopoulos, Christos; Pagiatakis, Gerasimos; Schmitt, Nikolaus; Pistner, Thomas; Klaue, Jirka

    2017-02-01

    A sensor system capable of medical, safety and security monitoring in avionic and other environments (e.g. homes) is examined. For application inside an aircraft cabin, the system relies on an optical cellular network that connects each seat to a server and uses a set of database applications to process data related to passengers' health, safety and security status. Health monitoring typically encompasses electrocardiogram, pulse oximetry and blood pressure, body temperature and respiration rate while safety and security monitoring is related to the standard flight attendance duties, such as cabin preparation for take-off, landing, flight in regions of turbulence, etc. In contrast to previous related works, this article focuses on the system's modules (medical and safety sensors and associated hardware), the database applications used for the overall control of the monitoring function and the potential use of the system for security applications. Further tests involving medical, safety and security sensing performed in an real A340 mock-up set-up are also described and reference is made to the possible use of the sensing system in alternative environments and applications, such as health monitoring within other means of transport (e.g. trains or small passenger sea vessels) as well as for remotely located home users, over a wired Ethernet network or the Internet.

  3. Monte Carlo tests of small-world architecture for coarse-grained networks of the United States railroad and highway transportation systems

    Science.gov (United States)

    Aldrich, Preston R.; El-Zabet, Jermeen; Hassan, Seerat; Briguglio, Joseph; Aliaj, Enela; Radcliffe, Maria; Mirza, Taha; Comar, Timothy; Nadolski, Jeremy; Huebner, Cynthia D.

    2015-11-01

    Several studies have shown that human transportation networks exhibit small-world structure, meaning they have high local clustering and are easily traversed. However, some have concluded this without statistical evaluations, and others have compared observed structure to globally random rather than planar models. Here, we use Monte Carlo randomizations to test US transportation infrastructure data for small-worldness. Coarse-grained network models were generated from GIS data wherein nodes represent the 3105 contiguous US counties and weighted edges represent the number of highway or railroad links between counties; thus, we focus on linkage topologies and not geodesic distances. We compared railroad and highway transportation networks with a simple planar network based on county edge-sharing, and with networks that were globally randomized and those that were randomized while preserving their planarity. We conclude that terrestrial transportation networks have small-world architecture, as it is classically defined relative to global randomizations. However, this topological structure is sufficiently explained by the planarity of the graphs, and in fact the topological patterns established by the transportation links actually serve to reduce the amount of small-world structure.

  4. Development of Self-Remediating Packaging for Safe and Secure Transport of Infectious Substances.

    Energy Technology Data Exchange (ETDEWEB)

    Guilinger, Terry Rae; Gaudioso, Jennifer M; Aceto, Donato Gonzalo; Lowe, Kathleen M.; Tucker, Mark D; Salerno, Reynolds Mathewson; Souza, Caroline Ann

    2006-11-01

    As George W. Bush recognized in November 2001, "Infectious diseases make no distinctions among people and recognize no borders." By their very nature, infectious diseases of natural or intentional (bioterrorist) origins are capable of threatening regional health systems and economies. The best mechanism for minimizing the spread and impact of infectious disease is rapid disease detection and diagnosis. For rapid diagnosis to occur, infectious substances (IS) must be transported very quickly to appropriate laboratories, sometimes located across the world. Shipment of IS is problematic since many carriers, concerned about leaking packages, refuse to ship this material. The current packaging does not have any ability to neutralize or kill leaking IS. The technology described here was developed by Sandia National Laboratories to provide a fail-safe packaging system for shipment of IS that will increase the likelihood that critical material can be shipped to appropriate laboratories following a bioterrorism event or the outbreak of an infectious disease. This safe and secure packaging method contains a novel decontaminating material that will kill or neutralize any leaking infectious organisms; this feature will decrease the risk associated with shipping IS, making transport more efficient. 3 DRAFT4

  5. Metro Optical Networks for Homeland Security

    Science.gov (United States)

    Bechtel, James H.

    Metro optical networks provide an enticing opportunity for strengthening homeland security. Many existing and emerging fiber-optic networks can be adapted for enhanced security applications. Applications include airports, theme parks, sports venues, and border surveillance systems. Here real-time high-quality video and captured images can be collected, transported, processed, and stored for security applications. Video and data collection are important also at correctional facilities, courts, infrastructure (e.g., dams, bridges, railroads, reservoirs, power stations), and at military and other government locations. The scaling of DWDM-based networks allows vast amounts of data to be collected and transported including biometric features of individuals at security check points. Here applications will be discussed along with potential solutions and challenges. Examples of solutions to these problems are given. This includes a discussion of metropolitan aggregation platforms for voice, video, and data that are SONET compliant for use in SONET networks and the use of DWDM technology for scaling and transporting a variety of protocols. Element management software allows not only network status monitoring, but also provides optimized allocation of network resources through the use of optical switches or electrical cross connects.

  6. Protecting public health and global freight transportation systems during an influenza pandemic.

    Science.gov (United States)

    Luke, Thomas C; Rodrigue, Jean-Paul

    2008-01-01

    The H5N1 influenza threat is resulting in global preparations for the next influenza pandemic. Pandemic influenza planners are prioritizing scarce vaccine, antivirals, and public health support for different segments of society. The freight, bulk goods, and energy transportation network comprise the maritime, rail, air, and trucking industries. It relies on small numbers of specialized workers who cannot be rapidly replaced if lost due to death, illness, or voluntary absenteeism. Because transportation networks link economies, provide critical infrastructures with working material, and supply citizens with necessary commodities, disrupted transportation systems can lead to cascading failures in social and economic systems. However, some pandemic influenza plans have assigned transportation workers a low priority for public health support, vaccine, and antivirals. The science of Transportation Geography demonstrates that transportation networks and workers are concentrated at, or funnel through, a small number of chokepoints and corridors. Chokepoints should be used to rapidly and efficiently vaccinate and prophylax the transportation worker cohort and to implement transmission prevention measures and thereby protect the ability to move goods. Nations, states, the transportation industry and unions, businesses, and other stakeholders must plan, resource, and exercise, and then conduct a transportation health assurance and security campaign for an influenza pandemic.

  7. The analysis by several neutron transport methods of a small PWR model problem

    International Nuclear Information System (INIS)

    Halsall, M.J.

    1980-09-01

    A small model problem in x-y co-ordinate geometry is specified in detail to permit readers to make their own calculations. The problem is analysed using diffusion theory, differential and integral transport methods and a Monte Carlo code, and a best estimate eigenvalue is deduced. (author)

  8. 10 CFR 871.1 - National security exemption.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national security...

  9. Safe and secure: transportation of radioactive materials

    International Nuclear Information System (INIS)

    Howe, D.

    2015-01-01

    Western Waste Management Facility is Central Transportation Facility for Low and Intermediate waste materials. Transportation support for Stations: Reactor inspection tools and heavy water between stations and reactor components and single bundles of irradiated fuel to AECL-Chalk River for examination. Safety Track Record: 3.2 million kilometres safely travelled and no transportation accident - resulting in a radioactive release.

  10. Surveillance systems for intermodal transportation

    Science.gov (United States)

    Jakovlev, Sergej; Voznak, Miroslav; Andziulis, Arunas

    2015-05-01

    Intermodal container monitoring is considered a major security issue in many major logistic companies and countries worldwide. Current representation of the problem, we face today, originated in 2002, right after the 9/11 attacks. Then, a new worldwide Container Security Initiative (CSI, 2002) was considered that shaped the perception of the transportation operations. Now more than 80 larger ports all over the world contribute to its further development and integration into everyday transportation operations and improve the regulations for the developing regions. Although, these new improvements allow us to feel safer and secure, constant management of transportation operations has become a very difficult problem for conventional data analysis methods and information systems. The paper deals with a proposal of a whole new concept for the improvement of the Containers Security Initiative (CSI) by virtually connecting safety, security processes and systems. A conceptual middleware approach with deployable intelligent agent modules is proposed to be used with possible scenarios and a testbed is used to test the solution. Middleware examples are visually programmed using National Instruments LabView software packages and Wireless sensor network hardware modules. An experimental software is used to evaluate he solution. This research is a contribution to the intermodal transportation and is intended to be used as a means or the development of intelligent transport systems.

  11. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  12. 78 FR 55270 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... their official duties. The computer system also maintains a real-time audit of individuals who access... Secure Flight Program regulations \\4\\ for the purpose of enhancing the security of air travel in the... detection of individuals on federal government watch lists who seek to travel by air, and to facilitate the...

  13. 49 CFR 10.29 - Social Security numbers.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Social Security numbers. 10.29 Section 10.29... INDIVIDUALS Maintenance of Records § 10.29 Social Security numbers. (a) No individual is denied any right... which is required by Federal statute; or (2) The disclosure of a Social Security number when such...

  14. 76 FR 46907 - Ammonium Nitrate Security Program

    Science.gov (United States)

    2011-08-03

    ... Maritime Transportation Security Act NAICS North American Industrial Classification System NPRM Notice of.... Commenters noted, for example, that equipment used for transporting bulk ammonium nitrate, such as hoppers...

  15. Security in Internet

    Directory of Open Access Journals (Sweden)

    Felician ALECU

    2006-01-01

    Full Text Available A very good method that can be used to protect a private network is the implementation of a firewall between Internet and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at the system level. The SSL protocol allows verifying the identity of a WEB server based on a digital certificate issued by a certification authority. Secure data transport over the Internet is done by using encryption methods.

  16. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  17. Small Aircraft Transportation System, Higher Volume Operations Concept: Normal Operations

    Science.gov (United States)

    Abbott, Terence S.; Jones, Kenneth M.; Consiglio, Maria C.; Williams, Daniel M.; Adams, Catherine A.

    2004-01-01

    This document defines the Small Aircraft Transportation System (SATS), Higher Volume Operations (HVO) concept for normal conditions. In this concept, a block of airspace would be established around designated non-towered, non-radar airports during periods of poor weather. Within this new airspace, pilots would take responsibility for separation assurance between their aircraft and other similarly equipped aircraft. Using onboard equipment and procedures, they would then approach and land at the airport. Departures would be handled in a similar fashion. The details for this operational concept are provided in this document.

  18. Shock absorbing evaluation of the rigid polyurethane foam and styrofoam applied to a small transportation package

    International Nuclear Information System (INIS)

    Seo, K.S.; Lee, J.C.; Bang, K.S.; Han, H.S.; Chung, S.H.; Choi, B.I.; Ha, J.H.

    2004-01-01

    The package design objectives for the drop condition are to maintain the integrity of the structural material by reducing the impact force. There are two kinds of the shock absorbing materials such as rigid polyurethane foam (PU) and Styrofoam (EPS: Expanded Poly Styrene). These materials are generally used in small transportation packages. The stress-strain curves were obtained by the compression tests until the PU and EPS reached their lock-up strain. This paper describes that, in the case of a small transportation package of a cylindrical shape, the shock absorbing effects were evaluated by utilizing the compression properties of the PU and EPS foam

  19. Small-sized linear accelerator of 2.5 MeV electrons with a local radiation shield for custom examination of freight transported by motor transport

    International Nuclear Information System (INIS)

    Baklanov, A.V.; Gavrish, Yu.N.; Klinov, A.P.; Krest'yaninov, A.S.; Nikolaev, V.M.; Fomin, L.P.; Linkenbach, H.A.; Geus, G.; Knospel, W.

    2001-01-01

    A new development of a small-sized linear accelerator of 2.5 MeV electrons with a local radiation protection is described. The accelerator is intended for movable facilities of radiation custom of the freight transported by motor transport. Main constructive solutions, mass and dimension characteristics and results of preliminary tests of the accelerator parameters and characteristics of radiation protection are presented [ru

  20. 49 CFR 393.124 - What are the rules for securing concrete pipe?

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 5 2010-10-01 2010-10-01 false What are the rules for securing concrete pipe? 393... Specific Securement Requirements by Commodity Type § 393.124 What are the rules for securing concrete pipe? (a) Applicability. (1) The rules in this section apply to the transportation of concrete pipe on...

  1. Human factors in layers of defense in airport security

    NARCIS (Netherlands)

    Andriessen, H.; Van Gulijk, C.; Ale, B.J.M.

    2012-01-01

    Airport security systems are built up out of layers of defence based on the security-in-depth model (Talbot & Jakeman, 2008). The Transport Safety Authority (TSA) in the United States defined a staggering 20 layers of defence to control security risks. This means that not only security personnel is

  2. 49 CFR 659.27 - Internal safety and security reviews.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Internal safety and security reviews. 659.27... State Oversight Agency § 659.27 Internal safety and security reviews. (a) The oversight agency shall... safety and security reviews in its system safety program plan. (b) The internal safety and security...

  3. 49 CFR 236.1033 - Communications and security requirements.

    Science.gov (United States)

    2010-10-01

    ... Train Control Systems § 236.1033 Communications and security requirements. (a) All wireless... 49 Transportation 4 2010-10-01 2010-10-01 false Communications and security requirements. 236.1033... exceeding the security strength required to protect the data as defined in the railroad's PTCSP and required...

  4. Transportation

    National Research Council Canada - National Science Library

    Adams, James; Carr, Ron; Chebl, Maroun; Coleman, Robert; Costantini, William; Cox, Robert; Dial, William; Jenkins, Robert; McGovern, James; Mueller, Peter

    2006-01-01

    ...., trains, ships, etc.) and maximizing intermodal efficiency. A healthy balance must be achieved between the flow of international commerce and security requirements regardless of transportation mode...

  5. 77 FR 71430 - New Agency Information Collection Activity Under OMB Review: Public Transportation Baseline...

    Science.gov (United States)

    2012-11-30

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration New Agency Information Collection Activity Under OMB Review: Public Transportation Baseline Assessment for Security Enhancement... voluntary site visits with security and operating officials of public transportation systems. This program...

  6. Human Enteroids as a Model of Upper Small Intestinal Ion Transport Physiology and Pathophysiology

    NARCIS (Netherlands)

    J. Foulke-Abel (Jennifer); J. In (Julie); Yin, J. (Jianyi); N.C. Zachos (Nicholas C.); O. Kovbasnjuk (Olga); M.K. Estes (Mary K.); H.R. de Jonge (Hugo); M. Donowitz (Mark)

    2016-01-01

    textabstractBackground & Aims Human intestinal crypt-derived enteroids are a model of intestinal ion transport that require validation by comparison with cell culture and animal models. We used human small intestinal enteroids to study neutral Na+ absorption and stimulated fluid and anion secretion

  7. 40 CFR 205.5-2 - National security exemptions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 205.5-2... PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National security... a national security exemption is required. (c) For purposes of section 11(d) of the Act, any...

  8. Small Molecule Membrane Transporters in the Mammalian Podocyte: A Pathogenic and Therapeutic Target

    Directory of Open Access Journals (Sweden)

    Cristina Zennaro

    2014-11-01

    Full Text Available The intriguingly complex glomerular podocyte has been a recent object of intense study. Researchers have sought to understand its role in the pathogenesis of common proteinuric diseases such as minimal change disease and focal segmental glomerular sclerosis. In particular, considerable effort has been directed towards the anatomic and functional barrier to macromolecular filtration provided by the secondary foot processes, but little attention has been paid to the potential of podocytes to handle plasma proteins beyond the specialization of the slit diaphragm. Renal membrane transporters in the proximal tubule have been extensively studied for decades, particularly in relation to drug metabolism and elimination. Recently, uptake and efflux transporters for small organic molecules have also been found in the glomerular podocyte, and we and others have found that these transporters can engage not only common pharmaceuticals but also injurious endogenous and exogenous agents. We have also found that the activity of podocyte transporters can be manipulated to inhibit pathogen uptake and efflux. It is conceivable that podocyte transporters may play a role in disease pathogenesis and may be a target for future drug development.

  9. RISK MANAGEMENT AS TRANSPORTATION SAFETY PROVISION INSTRUMENT IN RUSSIA

    OpenAIRE

    V. A. Nikolayev

    2012-01-01

    Safety of transportation in Russia is subject to a variety of threats. Discussed in the article are characteristics of major threats to transportation security. State transportation policy directions that make it possible to ensure the security of cargo and passenger transportation are shown. A listof activities and innovative risk management tools that provide for improved safety of railway transportation is proposed.

  10. China's energy security: Perception and reality

    International Nuclear Information System (INIS)

    Leung, Guy C.K.

    2011-01-01

    China, now the world's second-largest economy, is worried about energy security, which underpins the core objectives of Beijing and the political legitimacy of the Communist Party of China. The purpose of this study is to explore certain popular myths about China's energy security. The study consists of six parts. After the introduction, it formulates the obscure concept of 'energy security' and attempts to contextualize it with 'Chinese characteristics.' Then it explicitly points out that the largest driver of oil demand by China as the 'World's Factory' is transport instead of industry. Next, it explores the effectiveness of transnational pipelines as a measure of energy security and explains why they are less effective than many observers have previously assumed. Furthermore, it investigates the global expansion of Chinese national oil companies and questions their actual contribution to energy security. A few concluding remarks then follow. - Research highlights: → Oil is the form of energy that has produced most of China's energy insecurity. → Transport sector, rather than industry, is the largest driver of China's oil demand. → The contribution of oil pipelines to China's energy security is smaller than many assumed. → Acquisition of oil reserves abroad cannot necessarily guarantee China a supply of oil that is more reliable and less expensive. → Energy security is a means; it is not a goal.

  11. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  12. Emerging issues in transportation information infrastructure security

    Science.gov (United States)

    1996-07-31

    On October 26-27, 1995, over two hundred transportation leaders and decision-makers from around the nation convened in Cambridge, Massachusetts to participate in a two day symposium on "Challenges and Opportunities for Global Transportation in the 21...

  13. Beyond the usual suspects: a multidimensional genetic exploration of infant attachment disorganization and security.

    Science.gov (United States)

    Pappa, Irene; Szekely, Eszter; Mileva-Seitz, Viara R; Luijk, Maartje P C M; Bakermans-Kranenburg, Marian J; van IJzendoorn, Marinus H; Tiemeier, Henning

    2015-01-01

    Although the environmental influences on infant attachment disorganization and security are well-studied, little is known about their heritability. Candidate gene studies have shown small, often non-replicable effects. In this study, we gathered the largest sample (N = 657) of ethnically homogenous, 14-month-old children with both observed attachment and genome-wide data. First, we used a Genome-Wide Association Study (GWAS) approach to identify single nucleotide polymorphisms (SNPs) associated with attachment disorganization and security. Second, we annotated them into genes (Versatile Gene-based Association Study) and functional pathways. Our analyses provide evidence of novel genes (HDAC1, ZNF675, BSCD1) and pathways (synaptic transmission, cation transport) associated with attachment disorganization. Similar analyses identified a novel gene (BECN1) but no distinct pathways associated with attachment security. The results of this first extensive, exploratory study on the molecular-genetic basis of infant attachment await replication in large, independent samples.

  14. Very small HTGR nuclear power plant concepts for special terrestrial applications

    International Nuclear Information System (INIS)

    McDonald, C.F.; Goodjohn, A.J.

    1983-01-01

    The role of the very small nuclear power plant, of a few megawatts capacity, is perceived to be for special applications where an energy source as required but the following prevail: 1) no indigenous fossil fuel source, in long transport distances that add substantially to the cost of oil, coal in gas, and 3) secure long-term power production for defense applications with freedom from fuel supply lines. A small High Temperature Gas-Cooled reactor (HTGR) plant could provide the total energy needs for 1) a military installation, 2) an island base of strategic significance, 3) an industrial community or 4) an urban area. The small HTGR is regarded as a fixed-base installation (as opposed to a mobile system). All of the major components would be factory fabricated and transported to the site where emphasis would be placed on minimizing the construction time. The very small HTGR plant, currently in an early stage of design definition, has the potential for meeting the unique needs of the small energy user in both the military and private sectors. The plant may find acceptance for specialized applications in the industrialized nations and to meet the energy needs of developing nations. Emphasis in the design has been placed on safety, simplicity and compactness

  15. The Small Aircraft Transportation System for America: A Case in Public Infrastructure Change

    Science.gov (United States)

    Bowen, Brent D.

    2000-01-01

    The National Aeronautics and Space Administration (NASA), U.S. Department of Transportation, Federal Aviation Administration, industry stakeholders, and academia, have joined forces to pursue the NASA National General Aviation Roadmap leading to a Small Aircraft Transportation System (SATS). This strategic undertaking has a 25-year goal to bring next-generation technologies and improve travel between remote communities and transportation centers in urban areas by utilizing the nation's 5,400 public-use general aviation airports. To facilitate this initiative, a comprehensive upgrade of public infrastructure must be planned, coordinated, and implemented within the framework of the national air transportation system. The Nebraska NASA EPSCoR Program has proposed to deliver research support in key public infrastructure areas in coordination with the General Aviation Program Office at the NASA Langley Research Center. Ultimately, SATS may permit tripling aviation system throughput capacity by tapping the underutilized general aviation facilities to achieve the national goal of doorstep-to-destination travel at four times the speed of highways for the nation's suburban, rural, and remote communities.

  16. RISK MANAGEMENT AS TRANSPORTATION SAFETY PROVISION INSTRUMENT IN RUSSIA

    Directory of Open Access Journals (Sweden)

    V. A. Nikolayev

    2012-01-01

    Full Text Available Safety of transportation in Russia is subject to a variety of threats. Discussed in the article are characteristics of major threats to transportation security. State transportation policy directions that make it possible to ensure the security of cargo and passenger transportation are shown. A listof activities and innovative risk management tools that provide for improved safety of railway transportation is proposed.

  17. 75 FR 49943 - New Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security...

    Science.gov (United States)

    2010-08-16

    ... INFORMATION CONTACT: Joanna Johnson, Office of Information Technology, TSA-11, Transportation Security... Collection Activity Under OMB Review: Pipeline System Operator Security Information AGENCY: Transportation... System Operator Security Information. Type of Request: New collection. OMB Control Number: Not yet...

  18. Transportable high sensitivity small sample radiometric calorimeter

    International Nuclear Information System (INIS)

    Wetzel, J.R.; Biddle, R.S.; Cordova, B.S.; Sampson, T.E.; Dye, H.R.; McDow, J.G.

    1998-01-01

    A new small-sample, high-sensitivity transportable radiometric calorimeter, which can be operated in different modes, contains an electrical calibration method, and can be used to develop secondary standards, will be described in this presentation. The data taken from preliminary tests will be presented to indicate the precision and accuracy of the instrument. The calorimeter and temperature-controlled bath, at present, require only a 30-in. by 20-in. tabletop area. The calorimeter is operated from a laptop computer system using unique measurement module capable of monitoring all necessary calorimeter signals. The calorimeter can be operated in the normal calorimeter equilibration mode, as a comparison instrument, using twin chambers and an external electrical calibration method. The sample chamber is 0.75 in (1.9 cm) in diameter by 2.5 in. (6.35 cm) long. This size will accommodate most 238 Pu heat standards manufactured in the past. The power range runs from 0.001 W to <20 W. The high end is only limited by sample size

  19. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Chinese Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  20. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Arabic Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  1. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Spanish Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objeurity Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit

  2. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (French Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  3. Contribution of Renewables to Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-07-01

    The environmental benefits of renewable energy are well known. But the contribution that they can make to energy security is less widely recognised. This report aims to redress the balance, showing how in electricity generation, heat supply, and transport, renewables can enhance energy security and suggesting policies that can optimise this contribution.

  4. 78 FR 30319 - Intent to Request Renewal From OMB of One Current Public Collection of Information: Security...

    Science.gov (United States)

    2013-05-22

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration [Docket No. TSA-2002-11602] Intent to Request Renewal From OMB of One Current Public Collection of Information: Security Programs for..., Transportation Security Administration, 601 South 12th Street, Arlington, VA 20598-6011. FOR FURTHER INFORMATION...

  5. DOT Cyber Security Assessment Management -

    Data.gov (United States)

    Department of Transportation — This data set contains information about the security and compliance status of FISMA systems within the Department. The information contains detailed descriptions of...

  6. 75 FR 3517 - Notice of Funding Availability for the Small Business Transportation Resource Center Program

    Science.gov (United States)

    2010-01-21

    ..., business assessment, management training, counseling, technical assistance, marketing and outreach, and the... necessary to improve the management of their own small business to expand their transportation-related..., bonding assistance, business counseling, management assistance and direct referrals to DOT agencies at the...

  7. Enersec conference series. Nuclear energy and security (NUSEC). Book of abstracts

    Energy Technology Data Exchange (ETDEWEB)

    Steinhaeusler, F; Heissl, C [Division of Physics and Biophysics, University of Salzburg, Hellbrunnerstrasse 34, Salzburg (Austria)

    2005-07-01

    Full text: After the terror attacks in the last years, the issue of security of nuclear power plants was raised, therefore members of national regulatory agencies, international organizations, and research institutions have engaged in the assessment of the security threats to nuclear facilities and the potential risks to man and the environment in the case of a successful terror attack. The risks range from the theft of nuclear material leading to illicit trafficking, to sabotage of nuclear power plants, and attacks on spent fuel transport resulting in an uncontrolled release of radioactivity. The NUSEC conference was focused on the security-related risks in the nuclear sector and its objective was to provide an overview of the currently available terrorism risk assessment methodology and international security approaches. Papers were presented in the following sessions: security of nuclear material, security of nuclear power plants, security of the transport of nuclear material, security of nuclear waste, national approaches to nuclear security and future outlook. (nevyjel)

  8. Enersec conference series. Nuclear energy and security (NUSEC). Book of abstracts

    International Nuclear Information System (INIS)

    Steinhaeusler, F.; Heissl, C.

    2005-01-01

    Full text: After the terror attacks in the last years, the issue of security of nuclear power plants was raised, therefore members of national regulatory agencies, international organizations, and research institutions have engaged in the assessment of the security threats to nuclear facilities and the potential risks to man and the environment in the case of a successful terror attack. The risks range from the theft of nuclear material leading to illicit trafficking, to sabotage of nuclear power plants, and attacks on spent fuel transport resulting in an uncontrolled release of radioactivity. The NUSEC conference was focused on the security-related risks in the nuclear sector and its objective was to provide an overview of the currently available terrorism risk assessment methodology and international security approaches. Papers were presented in the following sessions: security of nuclear material, security of nuclear power plants, security of the transport of nuclear material, security of nuclear waste, national approaches to nuclear security and future outlook. (nevyjel)

  9. Maritime supply chain security: Navigating through a sea of compliance requirements

    Directory of Open Access Journals (Sweden)

    Emma Maspero

    2008-11-01

    Full Text Available As a direct result of the 9-11 New York attack all modes of freight and passengertransportation were scrutinised for vulnerabilities. Over 90% of international trade takes place via sea transport for at least some part of the supply chain and as a result there has been a drive to better secure maritime transportation. This paper outlines the background to and the rationale behind the most important of the new security measures for maritime transportation and provides an overview of the likely implications for supply chain role-players. In addition the paper endeavours to create awareness of the importance of maritime supply chain security.

  10. Transports of radioactive materials. Legal regulations, safety and security concepts, experience; Befoerderung radioaktiver Stoffe. Rechtsvorschriften, Sicherheits- und Sicherungskonzept, Erfahrungen

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Guenther

    2012-07-15

    In Germany, approximately 650,000 to 750,000 units containing radioactive materials for scientific, medical and technical applications are shipped annually by surface, air and water transports. Legally speaking, radioactive materials are dangerous goods which can cause hazards to life, health, property and the environment as a result of faulty handling or accidents in transit. For protection against these hazards, their shipment therefore is regulated in extensive national and international rules of protection and safety. The article contains a topical review of the international and national transport regulations and codes pertaining to shipments of radioactive materials, and of the protection concepts underlying these codes so as to ensure an adequate standard of safety and security in shipping radioactive materials in national and international goods traffic. (orig.)

  11. National transportation statistics 2010

    Science.gov (United States)

    2010-01-01

    National Transportation Statistics presents statistics on the U.S. transportation system, including its physical components, safety record, economic performance, the human and natural environment, and national security. This is a large online documen...

  12. 49 CFR 659.21 - System security plan: general requirements.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: general requirements. 659.21... State Oversight Agency § 659.21 System security plan: general requirements. (a) The oversight agency shall require the rail transit agency to implement a system security plan that, at a minimum, complies...

  13. 14 CFR 99.7 - Special security instructions.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Special security instructions. 99.7 Section 99.7 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIR TRAFFIC AND GENERAL OPERATING RULES SECURITY CONTROL OF AIR TRAFFIC General § 99.7 Special...

  14. Internal bone transport using a cannulated screw as a mounting device in the treatment of a post-infective ulnar defect.

    Science.gov (United States)

    Tsitskaris, Konstantinos; Havard, Heledd; Bijlsma, Paulien; Hill, Robert A

    2016-04-01

    Bone transport techniques can be used to address the segmental bone loss occurring after debridement for infection. Secure fixation of the bone transport construct to the bone transport segment can be challenging, particularly if the bone is small and osteopenic. We report a case of a segmental ulnar bone defect in a young child treated with internal bone transport using a cannulated screw as the mounting device. We found this technique particularly useful in the treatment of bone loss secondary to infection, where previous treatment and prolonged immobilisation had led to osteopenia. This technique has not been previously reported.

  15. Effectiveness and Limitations of E-Mail Security Protocols

    OpenAIRE

    M. Tariq Banday

    2011-01-01

    Simple Mail Transport Protocol is the most widely adopted protocol for e-mail delivery. However, it lackssecurity features for privacy, authentication of sending party, integrity of e-mail message, nonrepudiationand consistency of e-mail envelope. To make e-mail communication secure and private,e-mail servers incorporate one or more security features using add-on security protocols. The add-onsecurity protocols provide a reasonable security but have several limitations. This paper discussesli...

  16. On the security of SSL/TLS-enabled applications

    OpenAIRE

    Das, Manik Lal; Samdaria, Navkar

    2014-01-01

    SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications aim to provide public key certificate based authentication, secure session key establishment, and symmetric key based traffic confidentiality. A large number of electronic commerce applications, such as stock trading, banking, shopping, and gaming rely on the security strength of the SSL/TLS protocol. In recent times, a potential threat, known as main-in-the-middle (MITM) attack, has been exploited by attackers of...

  17. The Small-Angle Neutron Scattering Data Analysis of the Phospholipid Transport Nanosystem Structure

    Science.gov (United States)

    Zemlyanaya, E. V.; Kiselev, M. A.; Zhabitskaya, E. I.; Aksenov, V. L.; Ipatova, O. M.; Ivankov, O. I.

    2018-05-01

    The small-angle neutron scattering technique (SANS) is employed for investigation of structure of the phospholipid transport nanosystem (PTNS) elaborated in the V.N.Orekhovich Institute of Biomedical Chemistry (Moscow, Russia). The SANS spectra have been measured at the YuMO small-angle spectrometer of IBR-2 reactor (Joint Institute of Nuclear Research, Dubna, Russia). Basic characteristics of polydispersed population of PTNS unilamellar vesicles (average radius of vesicles, polydispersity, thickness of membrane, etc.) have been determined in three cases of the PTNS concentrations in D2O: 5%, 10%, and 25%. Numerical analysis is based on the separated form factors method (SFF). The results are discussed in comparison with the results of analysis of the small-angle X-ray scattering spectra collected at the Kurchatov Synchrotron Radiation Source of the National Research Center “Kurchatov Institute” (Moscow, Russia).

  18. Development of transport mechanical engineering as the condition of maintenance of social and economic security of region

    Directory of Open Access Journals (Sweden)

    Vsevolod Petrovich Babushkin

    2012-12-01

    Full Text Available In the article, the transport role in the decision of problems of innovative and scientifically-technological development of territory is defined. Dependence of quality, completeness and timeliness of granting of transport services on replenishment and updating of park of locomotives, cars, i.e. from a level of development of domestic transport mechanical engineering is shown. The basic problems of development given branches –low competitiveness of made production are revealed. The basic accent in the course of such analysis is made on research of competitive possibilities of the enterprises of railway mechanical engineering of Sverdlovsk area. Such enterprises play the increasing role, become points of development of region’s economy and maintenance of its social and economic safety. The cooperation communications, which have developed in an industrial complex of Sverdlovsk area on the basis of development of modern manufacture on building of electric locomotives, have allowed to generate in region cluster railway mechanical engineering. The structure cluster is shown, development prospects, the estimation of its influence on the economy of Sverdlovsk area and maintenance of its social and economic security is given

  19. Improved Cost Management at Small and Medium Sized Road Transport Companies: Case Hungary

    Directory of Open Access Journals (Sweden)

    Zoltan Bokor

    2015-10-01

    Full Text Available Small and medium sized road freight transport companies located in Hungary are facing strong competition on the logistics market. An advanced cost management system supporting decisions on capacity allocations or pricing may be a competitive advantage for them and indirectly for the whole economy as well. Still, they generally apply simple, traditional cost calculation regimes, potentially sufficient in case of a homogeneous service portfolio. Nevertheless, road haulage companies with heterogeneous service structures may witness information distortions when using traditional costing methods. So it might be recommended for them to introduce better costing principles. To support an improved transport costing, a multi-level full cost allocation model has been set up and tested in this paper. The research results have pointed out that such a methodological development accompanied by the extension of the data collection mechanism can contribute to making the cost management systems of road freight transport companies more effective.

  20. Transportation of Hazardous Evidentiary Material.

    Energy Technology Data Exchange (ETDEWEB)

    Osborn, Douglas.

    2005-06-01

    This document describes the specimen and transportation containers currently available for use with hazardous and infectious materials. A detailed comparison of advantages, disadvantages, and costs of the different technologies is included. Short- and long-term recommendations are also provided.3 DraftDraftDraftExecutive SummaryThe Federal Bureau of Investigation's Hazardous Materials Response Unit currently has hazardous material transport containers for shipping 1-quart paint cans and small amounts of contaminated forensic evidence, but the containers may not be able to maintain their integrity under accident conditions or for some types of hazardous materials. This report provides guidance and recommendations on the availability of packages for the safe and secure transport of evidence consisting of or contaminated with hazardous chemicals or infectious materials. Only non-bulk containers were considered because these are appropriate for transport on small aircraft. This report will addresses packaging and transportation concerns for Hazardous Classes 3, 4, 5, 6, 8, and 9 materials. If the evidence is known or suspected of belonging to one of these Hazardous Classes, it must be packaged in accordance with the provisions of 49 CFR Part 173. The anthrax scare of several years ago, and less well publicized incidents involving unknown and uncharacterized substances, has required that suspicious substances be sent to appropriate analytical laboratories for analysis and characterization. Transportation of potentially hazardous or infectious material to an appropriate analytical laboratory requires transport containers that maintain both the biological and chemical integrity of the substance in question. As a rule, only relatively small quantities will be available for analysis. Appropriate transportation packaging is needed that will maintain the integrity of the substance, will not allow biological alteration, will not react chemically with the substance being

  1. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice

    Science.gov (United States)

    Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim

    2016-01-01

    Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities. PMID:27314358

  2. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice

    Directory of Open Access Journals (Sweden)

    Muhammad Awais Javed

    2016-06-01

    Full Text Available Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.

  3. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice.

    Science.gov (United States)

    Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim

    2016-06-15

    Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.

  4. Handbook of SCADA/control systems security

    CERN Document Server

    Radvanovsky, Robert

    2013-01-01

    The availability and security of many services we rely upon-including water treatment, electricity, healthcare, transportation, and financial transactions-are routinely put at risk by cyber threats. The Handbook of SCADA/Control Systems Security is a fundamental outline of security concepts, methodologies, and relevant information pertaining to the supervisory control and data acquisition (SCADA) systems and technology that quietly operate in the background of critical utility and industrial facilities worldwide. Divided into five sections, the book examines topics comprising functions within

  5. Concept for Energy Security Matrix

    International Nuclear Information System (INIS)

    Kisel, Einari; Hamburg, Arvi; Härm, Mihkel; Leppiman, Ando; Ots, Märt

    2016-01-01

    The following paper presents a discussion of short- and long-term energy security assessment methods and indicators. The aim of the current paper is to describe diversity of approaches to energy security, to structure energy security indicators used by different institutions and papers, and to discuss several indicators that also play important role in the design of energy policy of a state. Based on this analysis the paper presents a novel Energy Security Matrix that structures relevant energy security indicators from the aspects of Technical Resilience and Vulnerability, Economic Dependence and Political Affectability for electricity, heat and transport fuel sectors. Earlier publications by different authors have presented energy security assessment methodologies that use publicly available indicators from different databases. Current paper challenges viability of some of these indicators and introduces new indicators that would deliver stronger energy security policy assessments. Energy Security Matrix and its indicators are based on experiences that the authors have gathered as high-level energy policymakers in Estonia, where all different aspects of energy security can be observed. - Highlights: •Energy security should be analysed in technical, economic and political terms; •Energy Security Matrix provides a framework for energy security analyses; •Applicability of Matrix is limited due to the lack of statistical data and sensitivity of output.

  6. World-wide French experience in research reactor fuel cycle transportation

    International Nuclear Information System (INIS)

    Raisonnier, D.

    1997-01-01

    Since 1963 Transnucleaire has safely performed a large number of national and international transports of radioactive material. Transnucleaire has also designed and supplied suitable packagings for all types of nuclear fuel cycle radioactive material from front-end and back-end products and for power or for research reactors. Transportation of the nuclear fuel material for power reactors is made on a regular and industrial basis. The transportation of material for the research reactor fuel cycle is quite different due to the small quantities involved, the categorisation of material and the numerous places of delivery world-wide. Adapted solutions exist, which require a reactive organisation dealing with all the transportation issues for LEU and HEU products as metal, oxide, fresh fuel elements, spent fuel elements including supply of necessary transport packaging and equipment. This presentation will: - explain the choices made by Transnucleaire and its associates to provide and optimise the corresponding services, - demonstrate the capability to achieve, through reliable partnership, transport operations involving new routes, specific equipment and new political constraints while respecting sophisticated safety and security regulations. (author)

  7. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  8. 49 CFR 659.25 - Annual review of system safety program plan and system security plan.

    Science.gov (United States)

    2010-10-01

    ... system security plan. 659.25 Section 659.25 Transportation Other Regulations Relating to Transportation... and system security plan. (a) The oversight agency shall require the rail transit agency to conduct an annual review of its system safety program plan and system security plan. (b) In the event the rail...

  9. Radioactive material air transportation; Transporte aereo de material radioativo

    Energy Technology Data Exchange (ETDEWEB)

    Pader y Terry, Claudio Cosme [Varig Logistica (VARIGLOG), Sao Paulo, SP (Brazil)

    2002-07-01

    As function of the high aggregated value, safety regulations and the useful life time, the air transportation has been used more regularly because is fast, reliable, and by giving great security to the cargo. Based on the International Atomic Energy Agency (IAEA), the IATA (International Air Transportation Association) has reproduced in his dangerous goods manual (Dangerous Goods Regulations - DGR IATA), the regulation for the radioactive material air transportation. Those documents support this presentation.

  10. China's energy security and strategic choices

    International Nuclear Information System (INIS)

    Pellistrandi, J.

    2010-01-01

    Considering the present day international political and economical situation, China's energy security covers five important aspects: energy supplies security, energy prices security, environment security with respect to energy consumption, energy transport security, R and D security in the domain of energy resources exploration, exploitation and utilisation. Considering the above-mentioned aspects, China's strategic choices should include five major goals: counting on its own energy resources and giving priority to energy saving, participating to the international competition and implementing a national strategic reserves system, readjusting the energy consumption structure and promoting environment protection by developing nuclear energy, harmonizing China's relations with some countries and avoiding political and military conflicts, increasing investment in energy R and D, in particular in clean coal, nuclear, automotive, renewable energy and energy saving technologies. (J.S.)

  11. 76 FR 26549 - Removal of Certain References to Credit Ratings Under the Securities Exchange Act of 1934

    Science.gov (United States)

    2011-05-06

    ... related security'' and ``small business related security,'' respectively, as the Commission considers how... terms ``mortgage related security'' and ``small business related security,'' respectively, as the...),\\9\\ which defines the term ``small business related security.'' In place of the credit rating...

  12. New Concepts and Perspectives on Micro-Rotorcraft and Small Autonomous Rotary-Wing Vehicles

    Science.gov (United States)

    Young, Larry A.; Aiken, E. W.; Johnson, J. L.; Demblewski, R.; Andrews, J.; Aiken, Irwin W. (Technical Monitor)

    2001-01-01

    A key part of the strategic vision for rotorcraft research as identified by senior technologists within the Army/NASA Rotorcraft Division at NASA Ames Research Center is the development and use of small autonomous rotorcraft. Small autonomous rotorcraft are defined for the purposes of this paper to be a class of vehicles that range in size from rotary-wing micro air vehicles (MAVs) to larger, more conventionally sized, rotorcraft uninhabited aerial vehicles (UAVs) - i.e. vehicle gross weights ranging from hundreds of grams to thousands of kilograms. The development of small autonomous rotorcraft represents both a technology challenge and a potential new vehicle class that will have substantial societal impact for: national security, personal transport, planetary science, and public service.

  13. Security in the internet

    International Nuclear Information System (INIS)

    Seibel, R.M.M.; Kocher, K.; Landsberg, P.

    2000-01-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [de

  14. Transportation Security Leadership: The Right Stuff

    National Research Council Canada - National Science Library

    Burke, Karen

    2008-01-01

    .... transportation systems from terrorist threats. With the growing complexity and global nature of the terrorist networks, it requires leadership that is collaborative, integrative, and able to take a holistic leadership approach...

  15. Communication security in open health care networks.

    Science.gov (United States)

    Blobel, B; Pharow, P; Engel, K; Spiegel, V; Krohn, R

    1999-01-01

    Fulfilling the shared care paradigm, health care networks providing open systems' interoperability in health care are needed. Such communicating and co-operating health information systems, dealing with sensitive personal medical information across organisational, regional, national or even international boundaries, require appropriate security solutions. Based on the generic security model, within the European MEDSEC project an open approach for secure EDI like HL7, EDIFACT, XDT or XML has been developed. The consideration includes both securing the message in an unsecure network and the transport of the unprotected information via secure channels (SSL, TLS etc.). Regarding EDI, an open and widely usable security solution has been specified and practically implemented for the examples of secure mailing and secure file transfer (FTP) via wrapping the sensitive information expressed by the corresponding protocols. The results are currently prepared for standardisation.

  16. 49 CFR 15.5 - Sensitive security information.

    Science.gov (United States)

    2010-10-01

    ... held by the Federal government concerning threats against transportation or transportation systems and..., including threat images and descriptions of threat images for threat image projection systems. (10) Security... systems operated by the Federal government that have been identified by the DOT or DHS as critical to...

  17. Securing General Aviation

    National Research Council Canada - National Science Library

    Elias, Bart

    2005-01-01

    .... Because GA plays a small but important role in the U.S. economy, improving upon GA security without unduly impeding air commerce or limiting the freedom of movement by air remains a significant challenge...

  18. Adoption of an information systems security policy in small and medium sized enterprises.

    Directory of Open Access Journals (Sweden)

    Isabel Maria Lopes

    2017-03-01

    Full Text Available Information Systems Security (ISS is a relevant fact for current organizations. This paper focuses on Small and Medium Sized Enterprises (SMEs. This article aims to constitute an empirical study on the applicability of the Action Research (AR method in information systems, more specifically by assessing the adoption of an ISS policy in six SMEs, and identifying the critical success factors in adopting an ISS policy. The research question we intend to answer is to what extent this research method is adequate to reach the proposed goal. The results of the study suggest that AR is a promising means for the evaluation of ISS policies adoption. It can both act as a research method that improves the understanding about the reasons why the policy has been abandoned, and as a change method, assisting practitioners to overcome barriers and suggesting measures to be implemented.

  19. The Maritime Infrastructure Recovery Plan for the National Strategy for Maritime Security

    National Research Council Canada - National Science Library

    2006-01-01

    ... to the jurisdiction of the United States. The MIRP, the Maritime Commerce Security Plan, and the Maritime Transportation System Security Plan were developed in close coordination under the National Strategy for Maritime Security (NSMS...

  20. Application of the smart portal in transportation

    International Nuclear Information System (INIS)

    Kercel, S.W.; Baylor, V.M.; Dress, W.B.; Hickerson, T.W.; Jatko, W.B.; Labaj, L.E.; Muhs, J.D.; Pack, R.M.

    1996-01-01

    Under a program sponsored by the Department of Energy, the Oak Ridge complex is developed a ''Portal-of-the-Future'', or ''smart portal''. This is a security portal for vehicular traffic which is intended to quickly detect explosives, hidden passengers, etc. It uses several technologies, including microwaves, weigh-in-motion, digital image processing, and electroacoustic wavelet-based heartbeat detection. A novel component of particular interest is the Enclosed Space Detection System (ESDS), which detects the presence of persons hiding in a vehicle. The system operates by detecting the presence of a human ballistocardiographic signature. Each time the heart beats, it generates a small but measurable shock wave that propagates through the body. The wave, whose graph is called a ballistocardiogram, is the mechanical analog of the electrocardiogram, which is routinely used for medical diagnosis. The wave is, in turn, coupled to any surface or object with which the body is in contact. If the body is located in an enclosed space, this will result in a measurable deflection of the surface of the enclosure. Independent testing has shown ESDS to be highly reliable. The technologies used in the smart portal operate in real time and allow vehicles to be checked through the portal in much less time than would be required for human inspection. Although not originally developed for commercial transportation, the smart portal has the potential to solve several transportation problems. It could relieve congestion at international highway border crossings by reducing the time required to inspect each vehicle while increasing the level of security. It can reduce highway congestion at the entrance of secure facilities such as prisons. Also, it could provide security at intermodal transfer points, such as airport parking lots and car ferry terminals

  1. Application of the smart portal in transportation

    Energy Technology Data Exchange (ETDEWEB)

    Kercel, S.W.; Baylor, V.M.; Dress, W.B.; Hickerson, T.W.; Jatko, W.B.; Labaj, L.E.; Muhs, J.D.; Pack, R.M.

    1996-12-31

    Under a program sponsored by the Department of Energy, the Oak Ridge complex is developed a ``Portal-of-the-Future``, or ``smart portal``. This is a security portal for vehicular traffic which is intended to quickly detect explosives, hidden passengers, etc. It uses several technologies, including microwaves, weigh-in-motion, digital image processing, and electroacoustic wavelet-based heartbeat detection. A novel component of particular interest is the Enclosed Space Detection System (ESDS), which detects the presence of persons hiding in a vehicle. The system operates by detecting the presence of a human ballistocardiographic signature. Each time the heart beats, it generates a small but measurable shock wave that propagates through the body. The wave, whose graph is called a ballistocardiogram, is the mechanical analog of the electrocardiogram, which is routinely used for medical diagnosis. The wave is, in turn, coupled to any surface or object with which the body is in contact. If the body is located in an enclosed space, this will result in a measurable deflection of the surface of the enclosure. Independent testing has shown ESDS to be highly reliable. The technologies used in the smart portal operate in real time and allow vehicles to be checked through the portal in much less time than would be required for human inspection. Although not originally developed for commercial transportation, the smart portal has the potential to solve several transportation problems. It could relieve congestion at international highway border crossings by reducing the time required to inspect each vehicle while increasing the level of security. It can reduce highway congestion at the entrance of secure facilities such as prisons. Also, it could provide security at intermodal transfer points, such as airport parking lots and car ferry terminals.

  2. Application of the smart portal in transportation

    Science.gov (United States)

    Kercel, Stephen W.; Baylor, Vivian M.; Dress, William B.; Hickerson, Tim W.; Jatko, William B.; Labaj, Leo E.; Muhs, Jeffrey D.; Pack, Richard M.

    1997-02-01

    Under a program sponsored by the Department of Energy, the Oak Ridge complex is developing a `Portal-of-the-Future', or `smart portal.' This is a security portal for vehicular traffic which is intended to quickly detect explosives, hidden passengers, etc. It uses several technologies, including microwaves, weigh-in-motion, digital image processing, and electroacoustic wavelet-based heartbeat detection. A novel component of particular interest is the Enclosed Space Detection System (ESDS), which detects the presence of persons hiding in a vehicle. The system operates by detecting the presence of a human ballistocardiographic signature. Each time the heart beats, it generates a small but measurable shock wave that propagates through the body. The wave, whose graph is called a ballistocardiogram, is the mechanical analog of the electrocardiograms, which is routinely used for medical diagnosis. The wave is, in turn, coupled to any surface or object with which the body is in contact. If the body is located in an enclosed space, this will result in a measurable deflection of the surface of the enclosure. Independent testing has shown ESDS to be highly reliable. The technologies used in the smart portal operate in real time and allow vehicles to be checked through the portal in much less time than would be required for human inspection. Although not originally developed for commercial transportation, the smart portal has the potential to solve several transportation problems. It could relieve congestion at international highway border crossings by reducing the time required to inspect each vehicle while increasing the level of security. It can reduce highway congestion at the entrance of secure facilities such as prisons. Also, it could provide security at intermodal transfer points, such as airport parking lots and car ferry terminals.

  3. Contributing to shipping container security: can passive sensors bring a solution?

    International Nuclear Information System (INIS)

    Janssens-Maenhout, G.; De Roo, F.; Janssens, W.

    2010-01-01

    Illicit trafficking of fissionable material in container cargoes is recognized as a potential weakness in Nuclear Security. Triggered by the attacks of 11 September 2001, measures were undertaken to enhance maritime security in extension to the Safety Of Life At Sea Convention and in line with the US Container Security Initiatives. Effective detection techniques are needed that allow the inspector to intercept illicit trafficking of nuclear weapons components or components of other nuclear explosive devices. Many security measures focus on active interrogation of the container content by X-ray scan, which might be extended with the newly developed tagged neutron inspection system. Both active interrogation techniques can, with the current huge volume of container traffic, only be applied to a limited number of selected containers. The question arises whether a passive detection technique can offer an alternative solution. This study investigates if containers equipped with a small passive detector will register during transport the neutron irradiation by fissionable material such as plutonium in a measurable way. In practice, 4/5 of the containers are about 1/8 filled with hydrogenous material and undergo a typical 2 months route. For this reference case, it was found that the most compatible passive detector would be an activation foil of iridium. Monte-Carlo simulations showed that for the reference case the activity of a 250 μm thin foil with 6 cm 2 cross-section would register 1.2 Bq when it is irradiated by a significant quantity of Reactor-Grade PuO 2 . However this activity drops with almost two orders of magnitude for other fillings and other isotopic compositions and forms of the Pu-source. The procedure of selecting the target material for Pu detection is detailed with the theoretical methods, in order to be useful for other applications. Moreover the value of such additional passive sensors for securing maritime container transport is situated within

  4. Radioactive materials transport

    International Nuclear Information System (INIS)

    Talbi, B.

    1996-01-01

    The development of peaceful applications of nuclear energy results in the increase of transport operations of radioactive materials. Therefore strong regulations on transport of radioactive materials turns out to be a necessity in Tunisia. This report presents the different axes of regulations which include the means of transport involved, the radiation protection of the carriers, the technical criteria of security in transport, the emergency measures in case of accidents and penalties in case of infringement. (TEC). 12 refs., 1 fig

  5. Safety and security in small-scale recovery housing for people with severe mental illness: an inner-city case study.

    Science.gov (United States)

    Whitley, Rob; Harris, Maxine; Drake, Robert E

    2008-02-01

    The authors examined the lived experience of residents with severe mental illness in a small-scale recovery-housing building in the inner city. They attempting to identify and understand factors that influenced adjustment and stability. Four focus groups with 17 residents and participant observation with residents, case managers, and supervisory staff were conducted longitudinally over a two-year period. Data were analyzed according to the tenets of qualitative content analysis. Safety and security was the most prominent issue raised by residents. Serious concerns about this issue could be divided into three categories: threats raised by the behavior of other residents (and their associates), threats raised by strangers, and threats related to loss of self-control. A related theme involved ongoing tension between residents' desire for communal connections and their conflicting desire for a bounded private life. Ongoing attention to the issue of safety and security should be a key component of recovery-oriented housing in inner-city residential areas. Further research may need to compare the experience of safety and security among residents living in recovery housing with the experience of those in independent scatter-site housing and traditional congregate housing.

  6. 49 CFR 174.9 - Safety and security inspection and acceptance.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Safety and security inspection and acceptance. 174... RAIL General Requirements § 174.9 Safety and security inspection and acceptance. (a) At each location... not conform to the safety and security requirements of this subchapter, the carrier may not forward or...

  7. Cycling as a Smart and Green Mode of Transport in Small Touristic Cities

    Directory of Open Access Journals (Sweden)

    Paraskevi Karanikola

    2018-01-01

    Full Text Available Cycling as a mode of transport is a low-cost, health-improving way to travel and offers environmental benefits for the cities that promote it. It is only recently, though, with concerns over climate change, pollution, congestion, and obesity among others, that have cities throughout the world have begun to implement policies to promote cycling. In Greece, however, the use of the bicycle is limited. In Preveza, a small touristic city in Northwestern Greece where the use of the bicycle is prominent when compared to other Greek cities, there are efforts to promote cycling. Through the aid of a structured questionnaire, the residents evaluated the suitability of the city for cycling, the existing infrastructure, appropriate education, and behavior of cyclists and drivers. More than half of the residents use bicycles as their transportation and stated that bicycles are an inexpensive way of transport in the city and had the opinion that the state should encourage bicycle use by supporting subvention in bicycle acquisition. Two-thirds of the residents evaluated the cycling facilities of their city as adequate, but unsafe for young cyclists who do not follow the rules of transport. Adult cyclists, in contrast, were more loyal to the code, but stated that drivers did not respect their presence on the roads. This research provides important information on the perceived shortcomings of cycling as a transport mode in Preveza that may be of interest to towns/cities with similar characteristics.

  8. Bayesian estimation of the hydraulic and solute transport properties of a small-scale unsaturated soil column

    NARCIS (Netherlands)

    Moreira, Paulo H S; Van Genuchten, Martinus Th; Orlande, Helcio R B; Cotta, Renato M.

    2016-01-01

    In this study the hydraulic and solute transport properties of an unsaturated soil were estimated simultaneously from a relatively simple small-scale laboratory column infiltration/outflow experiment. As governing equations we used the Richards equation for variably saturated flow and a physical

  9. [Security aspects on the Internet].

    Science.gov (United States)

    Seibel, R M; Kocher, K; Landsberg, P

    2000-04-01

    Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet.

  10. Safety and security of radioactive sources in industrial radiography in Bangladesh

    Energy Technology Data Exchange (ETDEWEB)

    Mollah, A. S.; Nazrul, M. Abdullah [Industrial Inspection Service Limited, Dhaka (Bangladesh)

    2013-07-01

    Malicious use of radioactive sources can involve dispersal of that material through an explosive device. There has been recognition of the threat posed by the potential malicious misuse of NDT radioactive source by terrorists. The dispersal of radioactive material using conventional explosives, referred to as a 'dirty bomb', could create considerable panic, disruption and area access denial in an urban environment. However, as it is still a relatively new topic among regulators, users, and transport and storage operators worldwide, international assistance and cooperation in developing the necessary regulatory and security infrastructure is required. The most important action in reducing the risk of radiological terrorism is to increase the security of radioactive sources. This paper presents safety and security considerations for the transport and site storage of the industrial radiography sources as per national regulations entitled 'Nuclear Safety and Radiation Control Rules-1997'.The main emphasis was put on the stages of some safety and security actions in order to prevent theft, sabotage or other malicious acts during the transport of the packages. As a conclusion it must be mentioned that both safety and security considerations are very important aspects that must be taking in account for the transport and site storage of radioactive sources used in the practice of industrial radiography. (authors)

  11. Safety and security of radioactive sources in industrial radiography in Bangladesh

    International Nuclear Information System (INIS)

    Mollah, A. S.; Nazrul, M. Abdullah

    2013-01-01

    Malicious use of radioactive sources can involve dispersal of that material through an explosive device. There has been recognition of the threat posed by the potential malicious misuse of NDT radioactive source by terrorists. The dispersal of radioactive material using conventional explosives, referred to as a 'dirty bomb', could create considerable panic, disruption and area access denial in an urban environment. However, as it is still a relatively new topic among regulators, users, and transport and storage operators worldwide, international assistance and cooperation in developing the necessary regulatory and security infrastructure is required. The most important action in reducing the risk of radiological terrorism is to increase the security of radioactive sources. This paper presents safety and security considerations for the transport and site storage of the industrial radiography sources as per national regulations entitled 'Nuclear Safety and Radiation Control Rules-1997'.The main emphasis was put on the stages of some safety and security actions in order to prevent theft, sabotage or other malicious acts during the transport of the packages. As a conclusion it must be mentioned that both safety and security considerations are very important aspects that must be taking in account for the transport and site storage of radioactive sources used in the practice of industrial radiography. (authors)

  12. Transportation Limitation Access to the Small Islands (Case Study: Banggai Laut Regency)

    Science.gov (United States)

    Sunarti, S.

    2018-02-01

    Indonesia is as an archipelago and maritime country, the large number of Islands owned and scattered in all directions makes a challenge for the Government in equitable development. Development in Indonesia has not been spread evenly and tends to focus on the big island, while the smaller islands are still far behind and lack of government attention. One of them is the lack of infrastructure especially the access to the small islands. Among the small islands in Indonesia with minimal maritime infrastructure or transportation is Banggai Laut Regency, Central Sulawesi Province. This Regency is a new regency that separate itself from its previous regency that is Banggai Kepulauan Regency in about 4 years ago. For the development of the Banggai Laut Regency, access to reach that regency is quite difficult. Therefore, the aim of this research is to find infrastructure development strategy to support the development of Banggai Laut Regency. The research method used was the concurrent model mixed method. Data collection method was done with primary data through field observation and interview, secondary data through literature and document review. Analytical techniques used are qualitative descriptive and Map Overlay techniques using GIS to describe the characteristics of study areas and spatial relationships between islands. The results of this research conclude that the Banggai Laut Regency requires infrastructure development particularly maritime transportation to enhance accessibility of the community headed to Banggi Laut Regency or headed to another island from the Banggai Laut Regency.

  13. 49 CFR 659.29 - Oversight agency safety and security reviews.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Oversight agency safety and security reviews. 659... Role of the State Oversight Agency § 659.29 Oversight agency safety and security reviews. At least... safety program plan and system security plan. Alternatively, the on-site review may be conducted in an on...

  14. 17 CFR 240.16a-6 - Small acquisitions.

    Science.gov (United States)

    2010-04-01

    ... (including securities underlying derivative securities, but excluding acquisitions exempted by rule from... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Small acquisitions. 240.16a-6 Section 240.16a-6 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED...

  15. Transport Nuclear Liability Insurance

    International Nuclear Information System (INIS)

    Folens, M.

    2006-01-01

    Although transport of nuclear substances represents only a very small part of the global transport of dangerous goods, it takes place every day all over the world and it is part of our daily life. Transport of nuclear material takes also place at every stage of the nuclear fuel cycle; radioactive materials are carried out all over the world by all major modes of transport: sea, air, road and rail. Despite the large number of nuclear transports, they are not considered as posing a serious risk. A major nuclear incident is almost always associated with the operating of fixed installations such as nuclear power plants; just think about Three Mile Island and Chernobyl. This perception is strengthened by the absence so far of serious accidents in the nuclear transport sector and this finding is in fact proof of the very safe conditions of nuclear transport. But accidents can never be excluded entirely and in some cases damages could be as large as those caused by fixed installations. This means that protection of the interests of possible victims should also be covered in a correct way. That is why the special nuclear liability regime has also been developed to cover damage caused by a nuclear transport accident. As stated by Patrick Reyners, the prime motivation for originally adopting a special nuclear regime was the harmonisation of national legislation and that nowhere more than in the field of international transport operations is such harmonisation felt desirable . The international legal regime has been developed along two tracks, one based on the mode of transport and the other based on the notion of dangerous goods. The linkage between those two tracks is of permanent concern and the mode of transport is the key element to determine which international instrument should be applicable. The purpose of this paper is to briefly introduce the financial security provided by the insurance industry to cover the international nuclear liability regime for nuclear

  16. Improving food and nutritional security of small and marginal coconut growers through diversification of crops and enterprises

    Directory of Open Access Journals (Sweden)

    Maria Luz George

    2010-10-01

    Full Text Available This paper presents the impact of integrating interventions like nutrition gardening, livestock rearing, product diversification and allied income generation activities in small and marginal coconut homesteads along with nutrition education in improving the food and nutritional security as well as the income of the family members. The activities were carried out through registered Community Based Organizations (CBOs in three locations in Kerala, India during 2005-2008. Data was collected before and after the project periods through interviews using a pre-tested questionnaire containing statements indicating the adequacy, quality and diversity of food materials. Fifty respondents each were randomly selected from the three communities, thereby resulting in a total sample size of 150. The data was analysed using SPSS by adopting statistical tools like frequency, average, percentage analysis, t – test and regression. Participatory planning and implementation of diverse interventions notably intercropping and off-farm activities along with nutrition education brought out significant improvements in the food and nutritional security, in terms of frequency and quantity of consumption as well as diet diversity. At the end of the project, 96%of the members became completely food secure and 72% nutritionally secure. The overall consumption of fruits, vegetables and milk by both children and adults and egg by children recorded increase over the project period. Consumption of fish was more than the Recommended Dietary Intake (RDI level during pre and post project periods. Project interventions like nutrition gardening could bring in surplus consumption of vegetables (35% and fruits (10% than RDI. In spite of the increased consumption of green leafy vegetables and milk and milk products over the project period, the levels of consumption were still below the RDI levels. CBO-wise analysis of the consumption patterns revealed the need for location

  17. Climatic change and security stakes

    International Nuclear Information System (INIS)

    Ambrosi, Ph.; Hallegatte, St.

    2006-01-01

    This paper explores the relationships between climate change and security. Potential threats from climate change, as a unique source of stress or together with other factors, to human security are first examined. Some of the most explicit examples illustrate this section: food security, water availability, vulnerability to extreme events and vulnerability of small islands States and coastal zones. By questioning the basic needs of some populations or at least aggravating their precariousness, such risks to human security could also raise global security concerns, which we examine in turn, along four directions: rural exodus with an impoverishment of displaced populations, local conflicts for the use of natural resources, diplomatic tensions and international conflicts, and propagation to initially-unaffected regions through migratory flows. (authors)

  18. Effect of defects on the small polaron formation and transport properties of hematite from first-principles calculations.

    Science.gov (United States)

    Smart, Tyler J; Ping, Yuan

    2017-10-04

    Hematite (α-Fe 2 O 3 ) is a promising candidate as a photoanode material for solar-to-fuel conversion due to its favorable band gap for visible light absorption, its stability in an aqueous environment and its relatively low cost in comparison to other prospective materials. However, the small polaron transport nature in α-Fe 2 O 3 results in low carrier mobility and conductivity, significantly lowering its efficiency from the theoretical limit. Experimentally, it has been found that the incorporation of oxygen vacancies and other dopants, such as Sn, into the material appreciably enhances its photo-to-current efficiency. Yet no quantitative explanation has been provided to understand the role of oxygen vacancy or Sn-doping in hematite. We employed density functional theory to probe the small polaron formation in oxygen deficient hematite, N-doped as well as Sn-doped hematite. We computed the charged defect formation energies, the small polaron formation energy and hopping activation energies to understand the effect of defects on carrier concentration and mobility. This work provides us with a fundamental understanding regarding the role of defects on small polaron formation and transport properties in hematite, offering key insights into the design of new dopants to further improve the efficiency of transition metal oxides for solar-to-fuel conversion.

  19. Packaging and transportation of radioactive materials

    International Nuclear Information System (INIS)

    1978-01-01

    The following topics are discussed in this volume: shielding and criticality; transportation accidents; physical security in transit; transport forecasting and logistics; transportation experience, operations and planning; regulation; standards and quality assurance; risk analysis; and environmental impacts. Separate abstracts are prepared for individual items

  20. 13 CFR 107.825 - Purchasing securities from an underwriter or other third party.

    Science.gov (United States)

    2010-01-01

    ... ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES Financing of Small Businesses by Licensees Structuring Licensee's Financing of Eligible Small Businesses: Types of Financing § 107.825 Purchasing securities from... Financing of the Small Business under the Act; or (2) The securities are acquired to finance a change of...

  1. Transparent Proxy for Secure E-Mail

    Science.gov (United States)

    Michalák, Juraj; Hudec, Ladislav

    2010-05-01

    The paper deals with the security of e-mail messages and e-mail server implementation by means of a transparent SMTP proxy. The security features include encryption and signing of transported messages. The goal is to design and implement a software proxy for secure e-mail including its monitoring, administration, encryption and signing keys administration. In particular, we focus on automatic public key on-the-fly encryption and signing of e-mail messages according to S/MIME standard by means of an embedded computer system whose function can be briefly described as a brouter with transparent SMTP proxy.

  2. 76 FR 35959 - Capital Adequacy Guidelines; Small Bank Holding Company Policy Statement: Treatment of...

    Science.gov (United States)

    2011-06-21

    ... securities issued to the Treasury through the Small Business Lending Fund established under the Small... subject to the Policy Statement as in effect on May 19, 2010. The CPP Subordinated Securities may be... Subordinated Securities from debt. SBLF Subordinated Securities Under the Small Business Jobs Act of 2010 (SBJA...

  3. Center for Coastline Security Technology, Year-2

    National Research Council Canada - National Science Library

    Glegg, Stewart; Glenn, William; Furht, Borko; Beaujean, P. P; Frisk, G; Schock, S; VonEllenrieder, K; Ananthakrishnan, P; An, E; Granata, R

    2007-01-01

    ...), the Imaging Technology Center, the Department of Computer Science and Engineering, and the University Consortium for Intermodal Transportation Safety and Security at Florida Atlantic University...

  4. Packaging and transportation of radioactive materials

    Energy Technology Data Exchange (ETDEWEB)

    None

    1978-01-01

    The following topics are discussed in this volume: shielding and criticality; transportation accidents; physical security in transit; transport forecasting and logistics; transportation experience, operations and planning; regulation; standards and quality assurance; risk analysis; and environmental impacts. Separate abstracts are prepared for individual items. (DC)

  5. Regional, national and international security requirements for the transport of nuclear cargo by sea

    International Nuclear Information System (INIS)

    Booker, P.A.; Barnwell, I.

    2004-01-01

    Since the beginning of the nuclear age in the 1940's, the world has focused on the immense possibilities of nuclear power with both its destructive and productive capabilities. The civil nuclear industry in the UK, as in most nuclear weapons states, grew from the military facilities built in the post war years under the political climate of the Cold War. In the early years of the industry, civil and defence nuclear facilities were inextricably linked both in public perceptions and the regulatory infrastructure under which they operated. The nuclear arms race and the spread of communism overshadowed people's perceptions of there being two separate uses of nuclear material. This was a double edged sword which initially allowed the industry to develop largely unhindered by public concerns but latterly meant the industry could not break away from its roots and to many is still perceived as a dangerous and destructive force. Regulatory frameworks governing all aspects of the industry have developed both nationally and internationally driven by valid public concerns, political agendas and an international consensus that the unregulated use of nuclear material has catastrophic possibilities on an international scale. With the internationalisation of the civil nuclear industry and the costs associated with developing facilities to fully support each stage of the fuel cycle, from enrichment, fuel manufacturing, reprocessing and waste remediation, it became inevitable that a transport infrastructure would develop to make best use of the facilities. Regulations, both national and international are implicit in ensuring the security of nuclear material in transit. Due to the physical size of many of the irradiated fuel packages and implications of the changes to transport safety regulations, international transports of nuclear material, other than within mainland Europe, is predominantly carried out by sea

  6. Regional, national and international security requirements for the transport of nuclear cargo by sea

    Energy Technology Data Exchange (ETDEWEB)

    Booker, P.A.; Barnwell, I. [Marine Operations, BNFL International Transport and British Nuclear Group Security (United Kingdom)

    2004-07-01

    Since the beginning of the nuclear age in the 1940's, the world has focused on the immense possibilities of nuclear power with both its destructive and productive capabilities. The civil nuclear industry in the UK, as in most nuclear weapons states, grew from the military facilities built in the post war years under the political climate of the Cold War. In the early years of the industry, civil and defence nuclear facilities were inextricably linked both in public perceptions and the regulatory infrastructure under which they operated. The nuclear arms race and the spread of communism overshadowed people's perceptions of there being two separate uses of nuclear material. This was a double edged sword which initially allowed the industry to develop largely unhindered by public concerns but latterly meant the industry could not break away from its roots and to many is still perceived as a dangerous and destructive force. Regulatory frameworks governing all aspects of the industry have developed both nationally and internationally driven by valid public concerns, political agendas and an international consensus that the unregulated use of nuclear material has catastrophic possibilities on an international scale. With the internationalisation of the civil nuclear industry and the costs associated with developing facilities to fully support each stage of the fuel cycle, from enrichment, fuel manufacturing, reprocessing and waste remediation, it became inevitable that a transport infrastructure would develop to make best use of the facilities. Regulations, both national and international are implicit in ensuring the security of nuclear material in transit. Due to the physical size of many of the irradiated fuel packages and implications of the changes to transport safety regulations, international transports of nuclear material, other than within mainland Europe, is predominantly carried out by sea.

  7. Keystone Business Models for Network Security Processors

    Directory of Open Access Journals (Sweden)

    Arthur Low

    2013-07-01

    Full Text Available Network security processors are critical components of high-performance systems built for cybersecurity. Development of a network security processor requires multi-domain experience in semiconductors and complex software security applications, and multiple iterations of both software and hardware implementations. Limited by the business models in use today, such an arduous task can be undertaken only by large incumbent companies and government organizations. Neither the “fabless semiconductor” models nor the silicon intellectual-property licensing (“IP-licensing” models allow small technology companies to successfully compete. This article describes an alternative approach that produces an ongoing stream of novel network security processors for niche markets through continuous innovation by both large and small companies. This approach, referred to here as the "business ecosystem model for network security processors", includes a flexible and reconfigurable technology platform, a “keystone” business model for the company that maintains the platform architecture, and an extended ecosystem of companies that both contribute and share in the value created by innovation. New opportunities for business model innovation by participating companies are made possible by the ecosystem model. This ecosystem model builds on: i the lessons learned from the experience of the first author as a senior integrated circuit architect for providers of public-key cryptography solutions and as the owner of a semiconductor startup, and ii the latest scholarly research on technology entrepreneurship, business models, platforms, and business ecosystems. This article will be of interest to all technology entrepreneurs, but it will be of particular interest to owners of small companies that provide security solutions and to specialized security professionals seeking to launch their own companies.

  8. Sediment transport to and from small impoundments in northeast Kansas, March 2009 through September 2011

    Science.gov (United States)

    Foster, Guy M.; Lee, Casey J.; Ziegler, Andrew C.

    2012-01-01

    The U.S. Geological Survey, in cooperation with the Kansas Water Office, investigated sediment transport to and from three small impoundments (average surface area of 0.1 to 0.8 square miles) in northeast Kansas during March 2009 through September 2011. Streamgages and continuous turbidity sensors were operated upstream and downstream from Atchison County, Banner Creek, and Centralia Lakes to study the effect of varied watershed characteristics and agricultural practices on sediment transport in small watersheds in northeast Kansas. Atchison County Lake is located in a predominantly agricultural basin of row crops, with wide riparian buffers along streams, a substantial amount of tile drainage, and numerous small impoundments (less than 0.05 square miles; hereafter referred to as “ponds”). Banner Creek Lake is a predominantly grassland basin with numerous small ponds located in the watershed, and wide riparian buffers along streams. Centralia Lake is a predominantly agricultural basin of row crops with few ponds, few riparian buffers along streams, and minimal tile drainage. Upstream from Atchison County, Banner Creek, and Centralia Lakes 24, 38, and 32 percent, respectively, of the total load was transported during less than 0.1 percent (approximately 0.9 days) of the time. Despite less streamflow in 2011, larger sediment loads during that year indicate that not all storm events transport the same amount of sediment; larger, extreme storms during the spring may transport much larger sediment loads in small Kansas watersheds. Annual sediment yields were 360, 400, and 970 tons per square mile per year at Atchison County, Banner, and Centralia Lake watersheds, respectively, which were less than estimated yields for this area of Kansas (between 2,000 and 5,000 tons per square mile per year). Although Centralia and Atchison County Lakes had similar percentages of agricultural land use, mean annual sediment yields upstream from Centralia Lake were about 2.7 times

  9. Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems

    OpenAIRE

    Lei, Ao; Cruickshank, Haitham; Cao, Y; Asuquo, Philip; Anyigor Ogah, Chibueze Pascal; Sun, Zhili

    2017-01-01

    As modern vehicle and communication technologies advanced apace, people begin to believe that Intelligent Transportation System (ITS) would be achievable in one decade.\\ud ITS introduces information technology to the transportation infrastructures and aims to improve road safety and traffic efficiency. However, security is still a main concern in Vehicular Communication Systems (VCS). This can be addressed through secured group broadcast. Therefore, secure key management schemes are considere...

  10. Improving Network Security with Watchguard UTM Firewall

    OpenAIRE

    Lehmonen, Harri

    2017-01-01

    After working many years in close contact with end customers, the author has noticed that Finnish small and mid-size businesses are not paying as much attention to network security threats as they should. Even though different kind of security threats are probably present and reported often in news, very basic security practices are discarded and no resources are spent advancing the issue. The topic of this thesis is Improving Network Security with Watchguard’s UTM Firewall. It focuses o...

  11. China's energy security: Perception and reality

    Energy Technology Data Exchange (ETDEWEB)

    Leung, Guy C.K., E-mail: guyleung@gmail.co [Hong Kong Energy Studies Centre, Hong Kong Baptist University, Kowloon Tong, Hong Kong Special Administrative Region (Hong Kong)

    2011-03-15

    China, now the world's second-largest economy, is worried about energy security, which underpins the core objectives of Beijing and the political legitimacy of the Communist Party of China. The purpose of this study is to explore certain popular myths about China's energy security. The study consists of six parts. After the introduction, it formulates the obscure concept of 'energy security' and attempts to contextualize it with 'Chinese characteristics.' Then it explicitly points out that the largest driver of oil demand by China as the 'World's Factory' is transport instead of industry. Next, it explores the effectiveness of transnational pipelines as a measure of energy security and explains why they are less effective than many observers have previously assumed. Furthermore, it investigates the global expansion of Chinese national oil companies and questions their actual contribution to energy security. A few concluding remarks then follow. - Research highlights: {yields} Oil is the form of energy that has produced most of China's energy insecurity. {yields} Transport sector, rather than industry, is the largest driver of China's oil demand. {yields} The contribution of oil pipelines to China's energy security is smaller than many assumed. {yields} Acquisition of oil reserves abroad cannot necessarily guarantee China a supply of oil that is more reliable and less expensive. {yields} Energy security is a means; it is not a goal.

  12. Data-Driven Security-Constrained OPF

    DEFF Research Database (Denmark)

    Thams, Florian; Halilbasic, Lejla; Pinson, Pierre

    2017-01-01

    considerations, while being less conservative than current approaches. Our approach can be scalable for large systems, accounts explicitly for power system security, and enables the electricity market to identify a cost-efficient dispatch avoiding redispatching actions. We demonstrate the performance of our......In this paper we unify electricity market operations with power system security considerations. Using data-driven techniques, we address both small signal stability and steady-state security, derive tractable decision rules in the form of line flow limits, and incorporate the resulting constraints...... in market clearing algorithms. Our goal is to minimize redispatching actions, and instead allow the market to determine the most cost-efficient dispatch while considering all security constraints. To maintain tractability of our approach we perform our security assessment offline, examining large datasets...

  13. Computer Security at Nuclear Facilities (French Edition)

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Through its Nuclear Security Programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises Nuclear Security Fundamentals, which include objectives and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking and the inadvertent movement of such material; and to be prepared to respond to a nuclear security event. This publication is in the Technical Guidance

  14. The transport of radioactive materials - Future challenges

    International Nuclear Information System (INIS)

    Wilkinson, W.L.

    2008-01-01

    the part of some commercial transporters, for example shipping lines, to handle radioactive cargoes. The World Nuclear Transport Institute is addressing these issues, for example by facilitating cooperation between consignors and shippers, advice on radiation protection programmes, the provision of a knowledge base to help the various stakeholders in the transport chain and also by its involvement in training courses. There is ample evidence to demonstrate that the real risks to man and the environment from radioactive transport operations are small, not only for severe accident scenarios but also for malicious acts. It is therefore vital that we continue our efforts to dispel irrational fears and reassure the public that under the current IAEA regulatory regime radioactive material transport is a necessary, safe and secure operation. (author)

  15. Bayesian estimation of the hydraulic and solute transport properties of a small-scale unsaturated soil column

    Directory of Open Access Journals (Sweden)

    Moreira Paulo H. S.

    2016-03-01

    Full Text Available In this study the hydraulic and solute transport properties of an unsaturated soil were estimated simultaneously from a relatively simple small-scale laboratory column infiltration/outflow experiment. As governing equations we used the Richards equation for variably saturated flow and a physical non-equilibrium dual-porosity type formulation for solute transport. A Bayesian parameter estimation approach was used in which the unknown parameters were estimated with the Markov Chain Monte Carlo (MCMC method through implementation of the Metropolis-Hastings algorithm. Sensitivity coefficients were examined in order to determine the most meaningful measurements for identifying the unknown hydraulic and transport parameters. Results obtained using the measured pressure head and solute concentration data collected during the unsaturated soil column experiment revealed the robustness of the proposed approach.

  16. Maritime supply chain security: navigating through a sea of compliance requirements

    CSIR Research Space (South Africa)

    Maspero, EL

    2008-11-01

    Full Text Available MTSA Maritime Transportation Security Act RFID Radio Frequency Identification SAFE Security and Accountability For Every port SOLAS Safety Of Life At Sea SST Smart and Secure Tradelane UNCTAD United Nations Conference on Trade and Development... for increased security within maritime shipping and so the SOLAS (the Safety of Lives at Sea) Convention Chapter 11 was amended to provide for the inclusion of the International Ships and Port Facilities Security Code (ISPS Code), which was internationally...

  17. A probabilistic risk-analysis of the transport of small radioactive material type B packages in France

    International Nuclear Information System (INIS)

    Hubert, P.; Pages, P.

    1982-01-01

    The assessment of the accidental risk due to the road transportation of a small package containing γ-ray emitters is performed in France. Analyzing records of road transportation accidents, modeling the package behaviour and estimating the importance of the involved population are the three main steps of the study. The interest of such an anlysis relies on the relative simplicity of the model and the availability of statistical data. This allows modelling of the whole process and study of the various sensitivities. It is also of pratical interest when assessing the cost-effectiveness of some safety/protection measures

  18. A simulation approach for analysis of short-term security of natural gas supply in Colombia

    International Nuclear Information System (INIS)

    Villada, Juan; Olaya, Yris

    2013-01-01

    Achieving security of gas supply implies diversifying gas sources, while having enough supply, transportation, and storage capacity to meet demand peaks and supply interruptions. Devising a strategy for securing gas supply is not straightforward because gas supply depends on complex interactions of production, demand and infrastructure, and it is exposed to economic, regulatory, political, environmental and technical risks. To address this complexity, we propose a simulation approach that replicates the structure of the gas supply chain, including transportation constraints and demand fluctuations. We build and calibrate a computer model for the Colombian gas sector, and run the model to assess the impact of expanding transportation capacity and increasing market flexibility on the security of supply. Our analysis focuses on the operation and planned and proposed expansions of the transportation infrastructure because adequate regulation and development of this infrastructure can contribute to increase the security of supply in the gas sector. We find that proposed import facilities, specifically LNG import terminals at Buenaventura, increase system's security under the current market structure. - Highlights: ► We build a simulation model for analyzing natural gas trade in Colombia. ► The model captures the structure of the gas network and on market rules. ► We simulate investment decisions to increase short-term security of supply. ► Securing supply would need LNG imports and expansion of pipeline capacity.

  19. Biofuels for sustainable transportation

    Energy Technology Data Exchange (ETDEWEB)

    Neufeld, S.

    2000-05-23

    Biomass is an attractive energy source, and transportation fuels made from biomass offer a number of benefits. Developing the technology to produce and use biofuels will create transportation fuel options that can positively impact the national energy security, the economy, and the environment. Biofuels include ethanol, methanol, biodiesel, biocrude, and methane.

  20. 77 FR 25721 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-05-01

    ... meeting will be closed to the public. (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) the Coast Guard consults with the NMSAC on the Global Supply Chain Security... submitting comments. Mail: Docket Management Facility (M-30), U.S. Department of Transportation, West...

  1. Transport of MOX fuel

    International Nuclear Information System (INIS)

    Porter, I.R.; Carr, M.

    1997-01-01

    The regulatory framework which governs the transport of MOX fuel is set out, including packages, transport modes and security requirements. Technical requirements for the packages are reviewed and BNFL's experience in plutonium and MOX fuel transport is described. The safety of such operations and the public perception of safety are described and the question of gaining public acceptance for MOX fuel transport is addressed. The paper concludes by emphasising the need for proactive programmes to improve the public acceptance of these operations. (Author)

  2. Point-to-Point! Validation of the Small Aircraft Transportation System Higher Volume Operations Concept

    Science.gov (United States)

    Williams, Daniel M.

    2006-01-01

    Described is the research process that NASA researchers used to validate the Small Aircraft Transportation System (SATS) Higher Volume Operations (HVO) concept. The four phase building-block validation and verification process included multiple elements ranging from formal analysis of HVO procedures to flight test, to full-system architecture prototype that was successfully shown to the public at the June 2005 SATS Technical Demonstration in Danville, VA. Presented are significant results of each of the four research phases that extend early results presented at ICAS 2004. HVO study results have been incorporated into the development of the Next Generation Air Transportation System (NGATS) vision and offer a validated concept to provide a significant portion of the 3X capacity improvement sought after in the United States National Airspace System (NAS).

  3. A Cluster- Based Secure Active Network Environment

    Institute of Scientific and Technical Information of China (English)

    CHEN Xiao-lin; ZHOU Jing-yang; DAI Han; LU Sang-lu; CHEN Gui-hai

    2005-01-01

    We introduce a cluster-based secure active network environment (CSANE) which separates the processing of IP packets from that of active packets in active routers. In this environment, the active code authorized or trusted by privileged users is executed in the secure execution environment (EE) of the active router, while others are executed in the secure EE of the nodes in the distributed shared memory (DSM) cluster. With the supports of a multi-process Java virtual machine and KeyNote, untrusted active packets are controlled to securely consume resource. The DSM consistency management makes that active packets can be parallelly processed in the DSM cluster as if they were processed one by one in ANTS (Active Network Transport System). We demonstrate that CSANE has good security and scalability, but imposing little changes on traditional routers.

  4. Poverty Mapping Project: Poverty and Food Security Case Studies

    Data.gov (United States)

    National Aeronautics and Space Administration — The Poverty and Food Security Case Studies dataset consists of small area estimates of poverty, inequality, food security and related measures for subnational...

  5. 46 CFR 148.03-7 - During transport.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false During transport. 148.03-7 Section 148.03-7 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DANGEROUS CARGOES CARRIAGE OF SOLID HAZARDOUS MATERIALS IN BULK Minimum Transportation Requirements § 148.03-7 During transport. During the transport of a...

  6. 46 CFR 308.507 - Security for payment of premiums.

    Science.gov (United States)

    2010-10-01

    ....507 Shipping MARITIME ADMINISTRATION, DEPARTMENT OF TRANSPORTATION EMERGENCY OPERATIONS WAR RISK INSURANCE War Risk Cargo Insurance Ii-Open Policy War Risk Cargo Insurance § 308.507 Security for payment of... collateral deposit fund or a surety bond, to secure the payment of the premiums, in an amount which shall at...

  7. Pick-up, transport and release of a molecular cargo using a small-molecule robotic arm

    Science.gov (United States)

    Kassem, Salma; Lee, Alan T. L.; Leigh, David A.; Markevicius, Augustinas; Solà, Jordi

    2016-02-01

    Modern-day factory assembly lines often feature robots that pick up, reposition and connect components in a programmed manner. The idea of manipulating molecular fragments in a similar way has to date only been explored using biological building blocks (specifically DNA). Here, we report on a wholly artificial small-molecule robotic arm capable of selectively transporting a molecular cargo in either direction between two spatially distinct, chemically similar, sites on a molecular platform. The arm picks up/releases a 3-mercaptopropanehydrazide cargo by formation/breakage of a disulfide bond, while dynamic hydrazone chemistry controls the cargo binding to the platform. Transport is controlled by selectively inducing conformational and configurational changes within an embedded hydrazone rotary switch that steers the robotic arm. In a three-stage operation, 79-85% of 3-mercaptopropanehydrazide molecules are transported in either (chosen) direction between the two platform sites, without the cargo at any time fully dissociating from the machine nor exchanging with other molecules in the bulk.

  8. Social security and firm performance

    DEFF Research Database (Denmark)

    Lee, Sangheon; Torm, Nina

    2017-01-01

    This article investigates how social security provision - a key determinant of formality - impacts on small and medium-sized firm performance in Viet Nam. Based on enterprise census data covering all registered firms from 2006 to 2011, the authors find that firms which increase their social...... security coverage by 10 per cent experience a revenue gain of 1.4-2.0 per cent per worker and a profit gain of up to 1.8 per cent, depending on the survival time of the firm. However, given the time lag between 'investment' (in social security contributions) and returns (enhanced firm performance...

  9. 77 FR 1076 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-01-09

    ... associated with updates to MTSA; (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) NMSAC continues to be consulted in regards to the Global Supply Chain Security Initiative... Management Facility (M-30), U.S. Department of Transportation, West Building Ground Floor, Room W12-140, 1200...

  10. Radioactive material air transportation

    International Nuclear Information System (INIS)

    Pader y Terry, Claudio Cosme

    2002-01-01

    As function of the high aggregated value, safety regulations and the useful life time, the air transportation has been used more regularly because is fast, reliable, and by giving great security to the cargo. Based on the International Atomic Energy Agency (IAEA), the IATA (International Air Transportation Association) has reproduced in his dangerous goods manual (Dangerous Goods Regulations - DGR IATA), the regulation for the radioactive material air transportation. Those documents support this presentation

  11. 78 FR 55274 - Privacy Act of 1974; Department of Homeland Security/Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... enforcement, immigration, and intelligence databases, including a fingerprint-based criminal history records... boarding pass printing instruction. If the passenger's identifying information matches the entry on the TSA... enforcement, immigration, intelligence, or other homeland security functions. In addition, TSA may share...

  12. Small modular reactors: Simpler, safer, cheaper?

    International Nuclear Information System (INIS)

    Vujić, Jasmina; Bergmann, Ryan M.; Škoda, Radek; Miletić, Marija

    2012-01-01

    Nuclear energy can play a very significant long-term role for meeting the world’s increasing energy demands, while simultaneously addressing challenges associated with global climate and environmental impact. Many nations of the world, particularly the Asia/Pacific Rim countries, are actively engaged in a major expansion of their nuclear energy complex. The degree to which nuclear energy can address long-term energy needs, either globally or regionally, will be dictated by the pace and adequacy of technical and policy solutions for waste, safety, security, and non-proliferation issues, as well as the capital cost of construction. Small Modular Reactors (SMRs) could successfully address several of these issues. SMRs offer simpler, standardized, and safer modular design by being factory built, requiring smaller initial capital investment, and having shorter construction times. The SMRs could be small enough to be transportable, could be used in isolated locations without advanced infrastructure and without power grid, or could be clustered in a single site to provide a multi-module, large capacity power plant. This paper summarizes some of the basic features of SMRs for early deployment, several advanced SMR concepts, and points out the benefits and challenges in regulatory, economical, safety and security issues. -- Highlights: ► We held a summer forum on SMR technologies at UC Berkeley in July 2010. ► Advantages and disadvantages, technical and economic, of each design were discussed. ► Further literature searches were also done and this paper summarizes prominent designs. ► We conclude SMRs have no large problems preventing their introduction into the nuclear market.

  13. Security assessment in harbours: parameters to be considered

    Energy Technology Data Exchange (ETDEWEB)

    Romero Faz, D.; Camarero Orive, A.

    2016-07-01

    The ports are the main node in the supply chain and freight transportation. The terrorist attacks of September 11, 2001 marked a turning point in global security. Following this event, and from then on, there is a widespread fear of an attack on commercial ports. The development of the International Ship and Port Facility Security (ISPS) Code of the International Maritime Organization (IMO), and the implementation of the measures derived from it, have significantly improved security at port facilities. However, the experience in recent decades indicates the need for adjustments in the security assessment, in order to improve risk assessment, which is sometimes either underestimated or overestimated. As a first result of the investigation, new parameters for assessing security are proposed considering new aspects on the basis of an analysis of the main methodologies specific to port facilities, the analysis of surveys of the responsible managers for the security of the Spanish port system, and the analysis of the security statistics obtained through security forces. (Author)

  14. 75 FR 18863 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-006...

    Science.gov (United States)

    2010-04-13

    ... 12th Street, Arlington, VA, 20598-6036. For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0015] Privacy Act of... Matters Tracking Records AGENCY: Privacy Office, DHS. [[Page 18864

  15. Leveraging Safety Programs to Improve and Support Security Programs

    Energy Technology Data Exchange (ETDEWEB)

    Leach, Janice [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Snell, Mark K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Pratt, R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sandoval, S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-10-01

    There has been a long history of considering Safety, Security, and Safeguards (3S) as three functions of nuclear security design and operations that need to be properly and collectively integrated with operations. This paper specifically considers how safety programmes can be extended directly to benefit security as part of an integrated facility management programme. The discussion will draw on experiences implementing such a programme at Sandia National Laboratories’ Annular Research Reactor Facility. While the paper focuses on nuclear facilities, similar ideas could be used to support security programmes at other types of high-consequence facilities and transportation activities.

  16. Gene expression of transporters and phase I/II metabolic enzymes in murine small intestine during fasting

    Directory of Open Access Journals (Sweden)

    van der Meijde Jolanda

    2007-08-01

    Full Text Available Abstract Background Fasting has dramatic effects on small intestinal transport function. However, little is known on expression of intestinal transport and phase I/II metabolism genes during fasting and the role the fatty acid-activated transcription factor PPARα may play herein. We therefore investigated the effects of fasting on expression of these genes using Affymetrix GeneChip MOE430A arrays and quantitative RT-PCR. Results After 24 hours of fasting, expression levels of 33 of the 253 analyzed transporter and phase I/II metabolism genes were changed. Upregulated genes were involved in transport of energy-yielding molecules in processes such as glycogenolysis (G6pt1 and mitochondrial and peroxisomal oxidation of fatty acids (Cact, Mrs3/4, Fatp2, Cyp4a10, Cyp4b1. Other induced genes were responsible for the inactivation of the neurotransmitter serotonin (Sert, Sult1d1, Dtd, Papst2, formation of eicosanoids (Cyp2j6, Cyp4a10, Cyp4b1, or for secretion of cholesterol (Abca1 and Abcg8. Cyp3a11, typically known because of its drug metabolizing capacity, was also increased. Fasting had no pronounced effect on expression of phase II metabolic enzymes, except for glutathione S-transferases which were down-regulated. Time course studies revealed that some genes were acutely regulated, whereas expression of other genes was only affected after prolonged fasting. Finally, we identified 8 genes that were PPARα-dependently upregulated upon fasting. Conclusion We have characterized the response to fasting on expression of transporters and phase I/II metabolic enzymes in murine small intestine. Differentially expressed genes are involved in a variety of processes, which functionally can be summarized as a increased oxidation of fat and xenobiotics, b increased cholesterol secretion, c increased susceptibility to electrophilic stressors, and d reduced intestinal motility. This knowledge increases our understanding of gut physiology, and may be of relevance

  17. Growth of embryo and gene expression of nutrient transporters in the small intestine of the domestic pigeon (Columba livia)*

    Science.gov (United States)

    Chen, Ming-xia; Li, Xiang-guang; Yang, Jun-xian; Gao, Chun-qi; Wang, Bin; Wang, Xiu-qi; Yan, Hui-chao

    2015-01-01

    The objective of this study was to investigate the relationship between gene expression of nutrient (amino acid, peptide, sodium and proton) transporters in the small intestine and embryonic growth in domestic pigeons (Columba livia). One hundred and twenty-five fertilized eggs were randomly assigned into five groups and were incubated under optimal conditions (temperature of 38.1 °C and relative humidity of 55%). Twenty embryos/birds from each group were sacrificed by cervical dislocation on embryonic day (E) 9, 11, 13, 15 and day of hatch (DOH). The eggs, embryos (without yolk sac), and organs (head, brain, heart, liver, lungs, kidney, gizzard, small intestine, legs, and thorax) were dissected, cleaned, and weighed. Small intestine samples were collected for RNA isolation. The mRNA abundance of intestinal nutrient transporters was evaluated by real-time reverse transcription-polymerase chain reaction (RT-PCR). We classified these ten organs into four types according to the changes in relative weight during embryonic development. In addition, the gene expression of nutrient transporters was differentially regulated by embryonic day. The mRNA abundances of b0,+AT, EAAT3, y+LAT2, PepT1, LAT4, NHE2, and NHE3 increased linearly with age, whereas mRNA abundances of CAT1, CAT2, LAT1, EAAT2, SNAT1, and SNAT2 were increased to higher levels on E9 or E11 and then decreased to lower levels until DOH. The results of correlation analysis showed that the gene expressions of b0,+AT, EAAT3, PepT1, LAT4, NHE2, NHE3, and y+LAT2 had positive correlations with body weight (0.71

  18. Growth of embryo and gene expression of nutrient transporters in the small intestine of the domestic pigeon (Columba livia).

    Science.gov (United States)

    Chen, Ming-xia; Li, Xiang-guang; Yang, Jun-xian; Gao, Chun-qi; Wang, Bin; Wang, Xiu-qi; Yan, Hui-chao

    2015-06-01

    The objective of this study was to investigate the relationship between gene expression of nutrient (amino acid, peptide, sodium and proton) transporters in the small intestine and embryonic growth in domestic pigeons (Columba livia). One hundred and twenty-five fertilized eggs were randomly assigned into five groups and were incubated under optimal conditions (temperature of 38.1 °C and relative humidity of 55%). Twenty embryos/birds from each group were sacrificed by cervical dislocation on embryonic day (E) 9, 11, 13, 15 and day of hatch (DOH). The eggs, embryos (without yolk sac), and organs (head, brain, heart, liver, lungs, kidney, gizzard, small intestine, legs, and thorax) were dissected, cleaned, and weighed. Small intestine samples were collected for RNA isolation. The mRNA abundance of intestinal nutrient transporters was evaluated by real-time reverse transcription-polymerase chain reaction (RT-PCR). We classified these ten organs into four types according to the changes in relative weight during embryonic development. In addition, the gene expression of nutrient transporters was differentially regulated by embryonic day. The mRNA abundances of b(0,+)AT, EAAT3, y(+)LAT2, PepT1, LAT4, NHE2, and NHE3 increased linearly with age, whereas mRNA abundances of CAT1, CAT2, LAT1, EAAT2, SNAT1, and SNAT2 were increased to higher levels on E9 or E11 and then decreased to lower levels until DOH. The results of correlation analysis showed that the gene expressions of b(0,+)AT, EAAT3, PepT1, LAT4, NHE2, NHE3, and y(+)LAT2 had positive correlations with body weight (0.71

  19. Profitability and sustainability of small - medium scale palm biodiesel plant

    Science.gov (United States)

    Solikhah, Maharani Dewi; Kismanto, Agus; Raksodewanto, Agus; Peryoga, Yoga

    2017-06-01

    The mandatory of biodiesel application at 20% blending (B20) has been started since January 2016. It creates huge market for biodiesel industry. To build large-scale biodiesel plant (> 100,000 tons/year) is most favorable for biodiesel producers since it can give lower production cost. This cost becomes a challenge for small - medium scale biodiesel plants. However, current biodiesel plants in Indonesia are located mainly in Java and Sumatra, which then distribute biodiesel around Indonesia so that there is an additional cost for transportation from area to area. This factor becomes an opportunity for the small - medium scale biodiesel plants to compete with the large one. This paper discusses the profitability of small - medium scale biodiesel plants conducted on a capacity of 50 tons/day using CPO and its derivatives. The study was conducted by performing economic analysis between scenarios of biodiesel plant that using raw material of stearin, PFAD, and multi feedstock. Comparison on the feasibility of scenarios was also conducted on the effect of transportation cost and selling price. The economic assessment shows that profitability is highly affected by raw material price so that it is important to secure the source of raw materials and consider a multi-feedstock type for small - medium scale biodiesel plants to become a sustainable plant. It was concluded that the small - medium scale biodiesel plants will be profitable and sustainable if they are connected to palm oil mill, have a captive market, and are located minimally 200 km from other biodiesel plants. The use of multi feedstock could increase IRR from 18.68 % to 56.52 %.

  20. 78 FR 46594 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Science.gov (United States)

    2013-08-01

    ... business card that directs customers to an online portal, a customer satisfaction card with survey... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer Satisfaction Performance...

  1. Incorporating security into the transportation planning process.

    Science.gov (United States)

    2009-03-01

    The transportation system is an important network established to ensure the mobility of people and goods between destinations. In addition, it also serves a vital role in responding to disasters, and therefore deserves special attention when those di...

  2. 41 CFR 109-40.305-50 - Negotiations involving national security.

    Science.gov (United States)

    2010-07-01

    ... national security. 109-40.305-50 Section 109-40.305-50 Public Contracts and Property Management Federal... Management § 109-40.305-50 Negotiations involving national security. Title 49 U.S.C., section 10721(b)(2... rate established * * * for transportation provided to the U.S. Government would endanger the National...

  3. Modeling of a Small Transportation Company’s Start-Up with Limited Data during Economic Recession

    Directory of Open Access Journals (Sweden)

    Xiaoping Fang

    2013-01-01

    Full Text Available This paper presents a modeling method for analyzing a small transportation company’s start-up and growth during a global economic crisis which had an impact on China which is designed to help the owners make better investment and operating decisions with limited data. Since there is limited data, simple regression model and binary regression model failed to generate satisfactory results, so an additive periodic time series model was built to forecast business orders and income. Since the transportation market is segmented by business type and transportation distance, a polynomial model and logistic curve model were constructed to forecast the growth trend of each segmented transportation market, and the seasonal influence function was fitted by seasonal ratio method. Although both of the models produced satisfactory results and showed very nearly the same of goodness-of-fit in the sample, the logistic model presented better forecasting performance out of the sample therefore closer to the reality. Additionally, by checking the development trajectory of the case company’s business and the financial crisis in 2008, the modeling and analysis suggest that the sample company is affected by national macroeconomic factors such as GDP and import & export, and this effect comes with a time lag of one to two years.

  4. Small Aircraft Transportation System, Higher Volume Operations Concept: Off-Nominal Operations

    Science.gov (United States)

    Abbott, Terence S.; Consiglio, Maria C.; Baxley, Brian T.; Williams, Daniel M.; Conway, Sheila R.

    2005-01-01

    This document expands the Small Aircraft Transportation System, (SATS) Higher Volume Operations (HVO) concept to include off-nominal conditions. The general philosophy underlying the HVO concept is the establishment of a newly defined area of flight operations called a Self-Controlled Area (SCA). During periods of poor weather, a block of airspace would be established around designated non-towered, non-radar airports. Aircraft flying enroute to a SATS airport would be on a standard instrument flight rules flight clearance with Air Traffic Control providing separation services. Within the SCA, pilots would take responsibility for separation assurance between their aircraft and other similarly equipped aircraft. Previous work developed the procedures for normal HVO operations. This document provides details for off-nominal and emergency procedures for situations that could be expected to occur in a future SCA.

  5. Digital intelligence sources transporter

    International Nuclear Information System (INIS)

    Zhang Zhen; Wang Renbo

    2011-01-01

    It presents from the collection of particle-ray counting, infrared data communication, real-time monitoring and alarming, GPRS and other issues start to realize the digital management of radioactive sources, complete the real-time monitoring of all aspects, include the storing of radioactive sources, transporting and using, framing intelligent radioactive sources transporter, as a result, achieving reliable security supervision of radioactive sources. (authors)

  6. What Isn't Working and New Requirements. The Need to Harmonize Safety and Security Requirements

    International Nuclear Information System (INIS)

    Flory, D.

    2011-01-01

    The year 2011 marks the 50th anniversary of the first IAEA regulations governing the transport of radioactive material. However transport safety at the IAEA obviously predates this, since the regulations took time to develop. In 1957, GC. 1/1 already states: 'The Agency should undertake studies with a view to the establishment of regulations relating to the international transportation of radioactive materials. ...'. And goes further: 'The transport of radioisotopes and radiation sources has brought to light many problems and involves the need for uniform packaging and shipping regulations ... facilitate the acceptance of such materials by sea and air carriers'. This conference reiterates the challenge given then through the sub-title 'The next fifty years - Creating a Safe, Secure and Sustainable Framework'. Looking back, we can see that the sustainable framework was a goal in 1957, where radioactive material could be transported should it be desired. Since these early days we have added to safety the need to ensure security. However we still see the same calls today to eradicate denial of shipment, which might suggest we have not progressed. But the picture today is very different - we have today well established requirements for safe transport of radioactive material, and the recommendations for security in transport are coming of age for all radioactive materials. The outstanding issue would seem to be harmonisation, not just between safety and security in IAEA documents, but also harmonisation between Member States.

  7. 75 FR 29567 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Science.gov (United States)

    2010-05-26

    ... business card that directs customers to an online portal. All responses are voluntary and there is no... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer Satisfaction Performance...

  8. Transport safety of irradiated fuel; Seguridad en el transporte de combustible irradiado.

    Energy Technology Data Exchange (ETDEWEB)

    Rosa Giménez, R. de la

    2016-07-01

    The complication of the transport of spent fuel is significant not only because of the danger of the transported good itself but also for the size of the package. The number of this kind of expeditions are supposed to increase considerably in the coming years, for that reason is necessary for specialized companies such as ETSA be prepared. To this end, ETSA has already implemented most of the measures necessary to ensure safety - security of transport, not only during its execution but throughout the preparation.

  9. The small intestinal epithelia of beef steers differentially express sugar transporter messenger ribonucleic acid in response to abomasal versus ruminal infusion of starch hydrolysate.

    Science.gov (United States)

    Liao, S F; Harmon, D L; Vanzant, E S; McLeod, K R; Boling, J A; Matthews, J C

    2010-01-01

    In mammals, the absorption of monosaccharides from small intestinal lumen involves at least 3 sugar transporters (SugT): sodium-dependent glucose transporter 1 (SGLT1; gene SLC5A1) transports glucose and galactose, whereas glucose transporter (GLUT) 5 (GLUT5; gene SLC2A5) transports fructose, across the apical membrane of enterocytes. In contrast, GLUT2 (gene SLC2A2) transports all of these sugars across basolateral and apical membranes. To compare the distribution patterns and sensitivity with nutritional regulation of these 3 SugT mRNA in beef cattle small intestinal tissue, 18 ruminally and abomasally catheterized Angus steers (BW approximately 260 kg) were assigned to water (control), ruminal cornstarch (partially hydrolyzed by alpha-amylase; SH), or abomasal SH infusion treatments (n = 6) and fed an alfalfa-cube-based diet at 1.3 x NE(m) requirement. The SH infusions amounted to 20% of ME intake. After 14- or 16-d of infusion, steers were killed; duodenal, jejunal, and ileal epithelia harvested; and total RNA extracted. The relative amount of SugT mRNA in epithelia was determined using real-time reverse transcription-PCR quantification methods. Basal expression of GLUT2 and SGLT1 mRNA was greater (P content of GLUT5 mRNA was greater (P content of GLUT5 mRNA in small intestinal epithelia was not affected (P > or = 0.16) by either SH infusion treatment. In contrast, GLUT2 and SGLT1 mRNA content in the ileal epithelium was increased (P content also was increased (P = 0.07) by 64% after ruminal SH infusion. These results demonstrate that the ileum of beef cattle small intestine adapts to an increased luminal supply of glucose by increasing SGLT1 and GLUT2 mRNA content, whereas increased ruminal SH supply results in duodenal upregulation of SGLT1 mRNA content. These adaptive responses of GLUT2 and SGLT1 mRNA to abomasal or ruminal SH infusion suggest that beef cattle can adapt to increase their carbohydrate assimilation through small intestinal epithelia, assuming

  10. Estimated routine radiation doses to transportation workers in alternative spent-fuel transportation systems

    International Nuclear Information System (INIS)

    Schneider, K.J.; Smith, R.I.; Daling, P.M.; Ross, W.A.; McNair, G.W.

    1988-01-01

    The federal system for the management of spent fuel and high-level radioactive waste includes the acceptance by the US Department of Energy (DOE) of the spent fuel or waste loaded in casks at the reactor or other waste generators, its transportation to a repository, and its handling and final emplacement in the repository. The DOE plans to implement a transportation system that is safe, secure, efficient, and cost-effective and will meet applicable regulatory safety and security requirements. The DOE commissioned the Pacific Northwest Laboratory (PNL) to develop estimates of the routine radiation doses that would result from the operation of a system postulated using current designs and practices. From that evaluation, PNL identified activities/operations that result in the higher fraction of doses, proposed conceptual alternatives that would effectively reduce such exposures, and evaluated the cost-effectiveness of such alternatives. The study is one of a series used in making overall system design and operational decisions in the development of the DOE's spent-fuel/high-level waste transportation system. This paper contains the highlights from the PNL study of the estimated radiation doses to the transportation workers in a postulated reference transportation system and potential alternatives to that system

  11. Packaging and transport of radioisotopes

    International Nuclear Information System (INIS)

    Taylor, C.B.G.

    1976-01-01

    The importance of radioisotope traffic is emphasized. More than a million packages are being transported each year, mostly for medical uses. The involvement of public transport services and the incidental dose to the public (which is very small) are appreciably greater than for movements connected with the nuclear fuel cycle. Modern isotope packages are described, and an outline given of the problems of a large radioisotope manufacturer who has to package many different types of product. Difficulties caused by recent uncoordinated restrictions on the use of passenger aircraft are mentioned. Some specific problems relating to radioisotope packaging are discussed. These include the crush resistance of Type A packages, the closure of steel drums, the design of secure closures for large containers, the Type A packaging of liquids, leak tightness criteria of Type B packages, and the use of 'unit load' overpacks to consign a group of individually approved packages together as a single shipment. Reference is made to recent studies of the impact of radioisotope shipments on the environment. Cost/benefit analysis is important in this field - an important public debate is only just beginning. (author)

  12. Clinical course teaching in transport of critically ill patients: Small group methods

    Directory of Open Access Journals (Sweden)

    Mohammad Taghi Beigmohammadi

    2016-10-01

    Full Text Available Critically ill patient transfer is potentially risky and may be lead to morbidity and mortality. Physicians' skill is very important for safe transport. We want to evaluate the effect of clinical course teaching on the promotion of physicians' abilities in the transport of critically ill patients. In an interventional study, 320 interns, male and female, were taught about patient transfer in two groups include in one day clinical course as the small group system (n=160 and other group the lecture base learning (n=160. In the clinical course, each participant under observation of an anesthesiologist in the operation room and ICU was acquainted with mask ventilation, intubation and learned to work with a defibrillator, infusion pump, portable ventilator and pulse oximeter. In lecture group, the anesthesiologist explained the topics by video and dummy. At the end of education course, the interns’ abilities were evaluated based on checklist method and scored by the project colleague in all educational items. Three hundred twenty interns, 122 males, and 198 females; were enrolled, two groups. The clinical course training caused improvements in the interns’ knowledge and abilities in intubation and use of the defibrillator and portable ventilator vs.lecture group significantly (P<0.005. The males were better than females in laryngoscopy, but the progress of the females was significantly better than males (P=0.003. The rate of adverse events was reduced significantly after clinical course teaching (P=0.041 Clinical course teaching could promote interns' clinical competencies in the transport of critically ill patients.

  13. It Security Issues Within the Video Game Industry

    OpenAIRE

    STEPHEN MOHR; SYED (SHAWON) RAHMAN,

    2011-01-01

    IT security issues are an important aspect for each and every organization within the video game industry. Within the video game industry alone, you might not normally think of security risks being an issue. But as we can and have seen in recent news, no company is immune to security risks no matter how big or how small. While each of these organizations will never be exactly the same as the next, there are common security issues that can and do affect each and every video game company. In or...

  14. Application of the Quality Functional Deployment Method in Mobility Aid Securement System Design

    Science.gov (United States)

    1992-12-01

    The Independent Locking Securement System Project (ILS System Project) is a : successful attempt to respond to the transportation community's need for a : "universal" securement/restraint system that will accommodate most wheeled : mobility aids, inc...

  15. Paleoclassical transport explains electron transport barriers in RTP and TEXTOR

    NARCIS (Netherlands)

    Hogeweij, G. M. D.; Callen, J.D.

    2008-01-01

    The recently developed paleoclassical transport model sets the minimum level of electron thermal transport in a tokamak. This transport level has proven to be in good agreement with experimental observations in many cases when fluctuation-induced anomalous transport is small, i.e. in (near-) ohmic

  16. Latvian Security and Defense Policy within the Twenty-First Century Security Environment

    Directory of Open Access Journals (Sweden)

    Rublovskis Raimonds

    2014-12-01

    Full Text Available The aim of this paper is to analyze fundamental factors which form and profoundly shape security and defense policy of the Republic of Latvia. One can argue that historical background, geographical location, common institutional history within the former Soviet Union, the Russia factor, the relative smallness of the territory of state and the population, the ethnic composition of the population, the low density of the population and rather limited financial and manpower resources available for the defense of the Republic of Latvia are the key factors of influence on the state security and defense policy. The core principles of the security and defense policy of Latvia are the membership in powerful global military alliance of NATO and bilateral strategic partnership with the United States. However, security and defense cooperation among the three Baltic States as well as enhanced cooperation within the Baltic-Nordic framework is seen as an important supplementary factor for the increased security of the Republic of Latvia. Latvia has developed a sustainable legal and institutional framework in order to contribute to state security and defense; however, security challenges and significant changes within the global security environment of the twenty-first century will further challenge the ability of the Republic of Latvia to sustain its current legal framework, and more importantly, current institutional structure of Latvian security and defense architecture. Significant internal and external challenges will impact the fundamental pillars of Latvian security and defense policy, such as American strategic shift to the Pacific, and lack of political will to increase defense budgets in European part of NATO. It has to be clear that very independence, security and defense of the Republic of Latvia depend on the ability of NATO to remain an effective organization with timely and efficient decision-making, and the ability of the United States to remain

  17. Big data analytics — A review of data-mining models for small and medium enterprises in the transportation sector.

    OpenAIRE

    Selamat, Siti Aishah Mohd; Prakoonwit, Simant; Sahandi, Reza; Khan, W.; Ramachandran, M.

    2018-01-01

    The need for small and medium enterprises (SMEs) to adopt data analytics has reached a critical point, given the surge of data implied by the advancement of technology. Despite data mining (DM) being widely used in the transportation sector, it is staggering to note that there are minimal research case studies being done on the application of DM by SMEs, specifically in the transportation sector. From the extensive review conducted, the three most common DM models used by large enterprises in...

  18. Frontiers in transport phenomena research and education: Energy systems, biological systems, security, information technology and nanotechnology

    Energy Technology Data Exchange (ETDEWEB)

    Bergman, T.L.; Faghri, A. [Department of Mechanical Engineering, The University of Connecticut, Storrs, CT 06269-3139 (United States); Viskanta, R. [School of Mechanical Engineering, Purdue University, West Lafayette, IN 47907-2088 (United States)

    2008-09-15

    A US National Science Foundation-sponsored workshop entitled ''Frontiers in Transport Phenomena Research and Education: Energy Systems, Biological Systems, Security, Information Technology, and Nanotechnology'' was held in May of 2007 at the University of Connecticut. The workshop provided a venue for researchers, educators and policy-makers to identify frontier challenges and associated opportunities in heat and mass transfer. Approximately 300 invited participants from academia, business and government from the US and abroad attended. Based upon the final recommendations on the topical matter of the workshop, several trends become apparent. A strong interest in sustainable energy is evident. A continued need to understand the coupling between broad length (and time) scales persists, but the emerging need to better understand transport phenomena at the macro/mega scale has evolved. The need to develop new metrology techniques to collect and archive reliable property data persists. Societal sustainability received major attention in two of the reports. Matters involving innovation, entrepreneurship, and globalization of the engineering profession have emerged, and the responsibility to improve the technical literacy of the public-at-large is discussed. Integration of research thrusts and education activities is highlighted throughout. Specific recommendations, made by the panelists with input from the international heat transfer community and directed to the National Science Foundation, are included in several reports. (author)

  19. AREVA Logistics Business Unit Transportation Risk Management Initiative

    International Nuclear Information System (INIS)

    Anne, C.

    2009-01-01

    A safe, secure and reliable transportation organization is a key component for the success of the nuclear industry. With the forecasted increase of radioactive material transport flows in future and the changing environment, AREVA Logistic Business Unit (L-BU) must ensure that safety and security risks are minimized but also ensure of the chain supply for its various facilities (mines, conversion, enrichment, fuel manufacturing, reprocessing, etc). AREVA L-BU Unit is implementing a transportation risk management initiative for the radioactive shipments of the AREVA group across all the Business Unit involved in shipments of radioactive and nuclear materials. The paper will present the four main components of the risk management. (authors)

  20. Communications issues for international radioactive materials transport, Post 9/11

    Energy Technology Data Exchange (ETDEWEB)

    Brown, A.A. [International Transport, BNFL, Warrington, Cheshire (United Kingdom); Hartenstein, M. [Transport External Affairs, Marketing, Sales and Projects Div., Cogema Logistics, Saint Quentin en Yvelines (France); Nawano, M. [Transport Headquarters, Overseas Reprocessing Committee, Tokyo (Japan)

    2004-07-01

    The terrorist attacks of September 11{sup th} 2001 in New York and Washington (9/11) have increased government, public and media concern over terrorist attacks in general and attack on transport systems in particular. Antinuclear groups have increasingly made unsubstantiated claims about the terrorist threat to Radioactive Materials Transport and the consequences of such a threat being realised. At the same time, the international and national security regulations relating to Nuclear Materials Transport have been reviewed and tightened since 9/11. These changes have in some cases restricted the information that can be made publicly available. It is against this background that the Industry must operate and seek to inform the public through its communications activities whilst remaining within the new security framework of security regulations. These activities must necessarily provide sufficient information to counter the incorrect claims made by opponents, allay fears of the public as far as possible and provide factual and scientifically rigorous data without compromising security.

  1. Communications issues for international radioactive materials transport, Post 9/11

    International Nuclear Information System (INIS)

    Brown, A.A.; Hartenstein, M.; Nawano, M.

    2004-01-01

    The terrorist attacks of September 11 th 2001 in New York and Washington (9/11) have increased government, public and media concern over terrorist attacks in general and attack on transport systems in particular. Antinuclear groups have increasingly made unsubstantiated claims about the terrorist threat to Radioactive Materials Transport and the consequences of such a threat being realised. At the same time, the international and national security regulations relating to Nuclear Materials Transport have been reviewed and tightened since 9/11. These changes have in some cases restricted the information that can be made publicly available. It is against this background that the Industry must operate and seek to inform the public through its communications activities whilst remaining within the new security framework of security regulations. These activities must necessarily provide sufficient information to counter the incorrect claims made by opponents, allay fears of the public as far as possible and provide factual and scientifically rigorous data without compromising security

  2. The effect of infrastructural challenges on food security in Ntambanana, KwaZulu-Natal, South Africa

    Directory of Open Access Journals (Sweden)

    Mosa Selepe

    2014-01-01

    Full Text Available Rural infrastructural inadequacies in South Africa are well documented, but their effects on local food security remain relatively unexplored. The present study investigated the effects of insufficient infrastructural services on food security issues at household and community level in the area of Ntambanana, which is characterised as a dry environment with few water reservoir facilities effective farming. Focus group discussions were held with existing groupings of men and women, and interviews were conducted with governmental officials and community members. A questionnaire then was used to confirm responses and test the reliability of information from the interviews. Our study found that there was poor infrastructure and inadequate support from relevant organisations; the roads were not in good condition limiting access to market facilities and other destinations and lack of an efficient and effective transportation system crippling the performance of small-scale farmers. Recommendations emerging from this study include the need for attention to be paid to address the fundamental deficiencies that hinder food security. Better infrastructure would enable rural areas to compete with the urban markets and to attract internal and external investors.

  3. The IRSN has appraised the security of the TN 117 parcel model loaded with new or irradiated fuels

    International Nuclear Information System (INIS)

    2009-10-01

    This document reports the examination made by the IRSN on the security of a parcel design which is to be used for the transportation of new or irradiated nuclear fuels and more precisely for the transportation of fissile radionuclides with a high radioactivity. According to this content, this packaging must therefore comply with some radioactive material transport security regulations which correspond to specific mechanical, thermal and immersion requirements. After a description of the parcel design, this report comments the experimental and numerical results of the parcel structural analysis, and recommends some further investigations. It also briefly comments the results of a thermal analysis, and of a security-criticality analysis. The parcel security appears to depend on the fuel pencil watertightness

  4. 49 CFR 387.303 - Security for the protection of the public: Minimum limits.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 5 2010-10-01 2010-10-01 false Security for the protection of the public: Minimum... Insurance for Motor Carriers and Property Brokers § 387.303 Security for the protection of the public... convenience of the user, the revised text is set forth as follows: § 387.303 Security for the protection of...

  5. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-07-22

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  6. Nuclear safeguards and security: we can do better.

    Energy Technology Data Exchange (ETDEWEB)

    Johnston, R. G. (Roger G.); Warner, Jon S.; Garcia, A. R. E. (Anthony R. E.); Martinez, R. K. (Ronald K.); Lopez, L. N. (Leon N.); Pacheco, A. N. (Adam N.); Trujillo, S. J. (Sonia J.); Herrera, A. M. (Alicia M.); Bitzer, E. G. (Edward G.), III

    2005-01-01

    There are a number of practical ways to significantly improve nuclear safeguards and security. These include recognizing and minimizing the insider threat; using adversarial vulnerability assessments to find vulnerabilities and countermeasures; fully appreciating the disparate nature of domestic and international nuclear safeguards; improving tamper detection and tamper-indicating seals; not confusing the inventory and security functions; and recognizing the limitations of GPS tracking, contact memory buttons, and RFID tags. The efficacy of nuclear safeguards depends critically on employing sophisticated security strategies and effective monitoring hardware. The Vulnerability Assessment Team (VAT) at Los Alamos National Laboratory has extensively researched issues associated with nuclear safeguards, especially in the areas of tamper/intrusion detection, transport security, and vulnerability assessments. This paper discusses some of our findings, recommendations, and warnings.

  7. Low carbon scenarios for transport in India: Co-benefits analysis

    International Nuclear Information System (INIS)

    Dhar, Subash; Shukla, Priyadarshi R.

    2015-01-01

    Dependence on oil for transport is a concern for India's policymakers on three counts – energy security, local environment and climate change. Rapid urbanisation and accompanying motorisation has created some of the most polluting cities in India and rising demand for oil is leading to higher imports, besides causing more CO 2 emissions. The government of India wants to achieve the climate goals through a sustainability approach that simultaneously addresses other environment and developmental challenges. This paper analyses a sustainable low carbon transport (SLCT) scenario based on sustainable strategies for passenger and freight mobility, vehicle technologies and fuel using global CO 2 prices that correspond to 2 °C global stabilisation target. The scenarios span from years 2010 to 2050 and are analysed using the energy system model-ANSWER MARKAL. The SLCT scenario has improved energy security (cumulative oil demand lower by 3100 Mtoe), improved air quality (PM 2.5 emissions never exceed the existing levels) and the cumulative CO 2 emissions are lower by 13 billion t CO 2 thereby showing that achieving development objectives with CO 2 co-benefits is feasible. -- Highlights: •India's BAU transitions pose challenges for energy security and climate change. •Sustainable transport policies deliver benefits for air quality and energy security. •Sustainable transport policies fall short of mitigation needed for 2 °C stabilisation. •Transport sector becomes increasingly dependent on electricity. •Low carbon policies are essential to clean transport and electricity generation

  8. Secure Communication in Vehicular Networks - PRESERVE Demo

    NARCIS (Netherlands)

    Lagana, M.; Feiri, Michael; Sall, M.; Lange, M.; Tomatis, A.; Papadimitratos, P.

    2012-01-01

    Security and privacy are fundamental prerequisites for the deployment of vehicular communications. The near-deployment status of Safety Applications for Intelligent Transport Systems (ITS) calls for strong evidence on the applicability of proposed research solutions, notably close-to-reality

  9. Computer Security at Nuclear Facilities. Reference Manual (Arabic Edition)

    International Nuclear Information System (INIS)

    2011-01-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Through its Nuclear Security Programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises Nuclear Security Fundamentals, which include objectives and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking and the inadvertent movement of such material; and to be prepared to respond to a nuclear security event. This publication is in the Technical Guidance

  10. Computer Security at Nuclear Facilities. Reference Manual (Russian Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Through its Nuclear Security Programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises Nuclear Security Fundamentals, which include objectives and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking and the inadvertent movement of such material; and to be prepared to respond to a nuclear security event. This publication is in the Technical Guidance

  11. Computer Security at Nuclear Facilities. Reference Manual (Chinese Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Through its Nuclear Security Programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises Nuclear Security Fundamentals, which include objectives and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking and the inadvertent movement of such material; and to be prepared to respond to a nuclear security event. This publication is in the Technical Guidance

  12. Lecture 13: Control System Cyber Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Today, the industralized world lives in symbiosis with control systems: it depends on power distribution, oil production, public transport, automatic production lines. While the convenience is at hand, still too many control systems are designed without any security in mind, lack basic security protections, and are not even robust enough to withstand basic attacks. The Stuxnet worm attacking Siemens PLCs in 2010 was another close call. Attackers currently enjoy hacking control systems, and aim to switch lights off. This presentation shall recap the current situation and outline why the presenter is still waiting for a change in paradigm. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and...

  13. Nanotechnology in the Security

    CERN Document Server

    Kruchinin, Sergei

    2015-01-01

    The topics discussed at the NATO Advanced Research Workshop "Nanotechnology in the Security Systems" included nanophysics,   nanotechnology,  nanomaterials, sensors, biosensors security systems, explosive  detection . There have been many significant advances in the past two years and some entirely new directions of research are just opening up. Recent advances in nanoscience have demonstrated that fundamentally new physical phenomena  are found when systems are reduced in size with  dimensions, comparable to the fundamental microscopic  length scales of the investigated material. Recent developments in nanotechnology and measurement techniques now allow experimental investigation of transport properties of nanodevices. This work will be of interest to researchers working in spintronics, molecular electronics and quantum information processing.

  14. Integrating Safety and Security in the EU: Past developments and suggested ways forward

    International Nuclear Information System (INIS)

    Rossi, Loris

    2016-01-01

    The Framework provided by the UN Model Regulation for the Transport of Dangerous Goods is the core of the legislation on transport of radioactive material (and all classes of dangerous goods) in the EU. This has resulted in European agreements ADR, RID and ADN for international transport as well as a single directive for land transport within the EU. In addition the EU has adopted a range of directives and regulations dealing specifically with several aspects of safety of nuclear and radioactive material. While the overall safety framework is now well developed and fairly stable, a security framework is evolving, based on the IAEA recommendations. In the EU, several initiatives such as the CBRN action plan and the review of the application of telematics for the transport of dangerous goods will most likely result in more developments coming on stream in the near future. This suggests that an integrated approach would be beneficial to avoid divergent developments and to keep track of new developments in an orderly fashion. An integrated approach for a safe and secure supply chain for radioactive material is proposed. The framework for a supply chain can be built around the extensive corpus of legislation/recommendations and concepts that are already existing (such as the “Known Consignor” in the framework of the EU aviation security or the “Authorised Economic Operator” in the EU Community Custom Code). This would allow for the need to maintain control of the numerous proposals that are taking place. Advantages and drawbacks are outlined. More generally, the development of an integrated safe and secure supply chain would bring clarity and transparency to the overall system of provisions for a safe and secure management of radioactive material. (author)

  15. Transport Technologies and Policy Scenarios to 2050

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-10-15

    As part of the major WEC study on Scenarios to 2050, a specific investigation was undertaken on measures required in the transport sector to secure sustainable energy and sustainable mobility in the future. This report outlines the results conducted by a study group of international WEC transport experts and gives concrete policy recommendations to develop sustainable transport systems.

  16. Cyber security challenges in Smart Cities: Safety, security and privacy

    Science.gov (United States)

    Elmaghraby, Adel S.; Losavio, Michael M.

    2014-01-01

    The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the “Internet of Things.” Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect. PMID:25685517

  17. Cyber security challenges in Smart Cities: Safety, security and privacy

    Directory of Open Access Journals (Sweden)

    Adel S. Elmaghraby

    2014-07-01

    Full Text Available The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the “Internet of Things.” Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect.

  18. Cyber security challenges in Smart Cities: Safety, security and privacy.

    Science.gov (United States)

    Elmaghraby, Adel S; Losavio, Michael M

    2014-07-01

    The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the "Internet of Things." Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect.

  19. Energy policy in transport and transport policy

    International Nuclear Information System (INIS)

    Van Dender, Kurt

    2009-01-01

    Explanations for, and indirect evidence of, imperfections in the market for private passenger vehicle fuel economy suggest there is a reasonable case for combining fuel economy standards and fuel or carbon taxes to contribute to an energy policy that aims to reduce greenhouse gas emissions and improve energy security. Estimates of key elasticities, including the rebound effect, indicate that the positive and negative side-effects of fuel economy measures on transport activities and external costs are limited. However, an energy policy for transport does not replace a transport policy that aims to manage the main transport externalities including congestion and local pollution. Conventional marginal cost estimates and standard cost-benefit reasoning suggest that policies that address congestion and local pollution likely bring benefits at least as large as those from fuel economy measures. But the large uncertainty on the possible effects of greenhouse gas emissions constitutes a strong challenge for standard cost-benefit reasoning. Emerging results from methods to cope with this uncertainty suggest that policies to stimulate the widespread adoption of low-carbon technologies in transport are justified.

  20. Energy policy in transport and transport policy

    Energy Technology Data Exchange (ETDEWEB)

    Van Dender, Kurt [Joint Transport Research Centre of the International Transport Forum and the OECD, 2 rue Andre Pascale, F-75775 Paris Cedex 16 (France)

    2009-10-15

    Explanations for, and indirect evidence of, imperfections in the market for private passenger vehicle fuel economy suggest there is a reasonable case for combining fuel economy standards and fuel or carbon taxes to contribute to an energy policy that aims to reduce greenhouse gas emissions and improve energy security. Estimates of key elasticities, including the rebound effect, indicate that the positive and negative side-effects of fuel economy measures on transport activities and external costs are limited. However, an energy policy for transport does not replace a transport policy that aims to manage the main transport externalities including congestion and local pollution. Conventional marginal cost estimates and standard cost-benefit reasoning suggest that policies that address congestion and local pollution likely bring benefits at least as large as those from fuel economy measures. But the large uncertainty on the possible effects of greenhouse gas emissions constitutes a strong challenge for standard cost-benefit reasoning. Emerging results from methods to cope with this uncertainty suggest that policies to stimulate the widespread adoption of low-carbon technologies in transport are justified. (author)

  1. Maritime Safety and Security Challenges – 3D Simulation Based Training

    OpenAIRE

    Christoph Felsenstein; Knud Benedict; Michael Baldauf

    2013-01-01

    Maritime Safety and Security on board ships very much depends on well trained crews. That is why training and exercising emergency response procedures as well as efficiency in reliable management are extremely necessary. On the other hand research as well as technological development in safety and security, tools and other kinds of technical and organizational systems contribute to further improvement and guarantee high levels of safety and security in maritime transportation. Simulation faci...

  2. External Costs of Transport in the U.S.

    OpenAIRE

    Delucchi, Mark A.; McCubbin, Donald R.

    2010-01-01

    In this chapter we report estimates of the external costs of transport in the United States.1 Generally, we cover road, rail, air, and water transport; passenger transport and freight transport; and congestion, accident, air pollution, climate change, noise, water pollution, and energy-security costs. However, we were not able to find estimates for all cost categories; in particular, there are fewer estimates for freight transport than for passenger transport, fewer estimates for water transp...

  3. The European Union’s Aviation Security Mission in South Sudan

    DEFF Research Database (Denmark)

    Højstrup Christensen, Gitte; Kammel, Arnold; Rodt, Annemarie Peen

    of the security situation in the country, all EU personnel were evacuated in January 2014, and the mission was (informally) terminated after fulfilling its mandated deployment period. Even though the mission had succeeded in training 350 personnel prior to the evacuation, its contribution to the overall security......When South Sudan gained independence in 2011, the new country needed assistance from external actors during the transition to prevent the security situation from deteriorating. In 2012 the EU launched its Aviation Security Mission (EUAVSEC) in South Sudan as part of its Common Security and Defence...... Policy. This came in response to a South Sudanese request for EU support and assistance in strengthening the security in Juba International Airport, as it had proven difficult for South Sudan to establish a fully operational transport hub. The EU estimated that an improvement of the airport security...

  4. 14 CFR 129.25 - Airplane security.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Airplane security. 129.25 Section 129.25 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIR CARRIERS... AND FOREIGN OPERATORS OF U.S.-REGISTERED AIRCRAFT ENGAGED IN COMMON CARRIAGE General § 129.25 Airplane...

  5. Securing the energy industry : perspectives in security risk management

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, G.L. [Anadarko Canada Corp., Calgary, AB (Canada)

    2003-07-01

    This presentation offered some perspectives in security risk management as it relates to the energy sector. Since the events of September 11, 2001 much attention has been given to terrorism and the business is reviewing protection strategies. The paper made reference to each of the following vulnerabilities in the energy sector: information technology, globalization, business restructuring, interdependencies, political/regulatory change, and physical/human factors. The vulnerability of information technology is that it can be subject to cyber and virus attacks. Dangers of globalization lie in privacy and information security, forced nationalization, organized crime, and anti-globalization efforts. It was noted that the Y2K phenomenon provided valuable lessons regarding interdependencies and the effects of power outages, water availability, transportation disruption, common utility corridor accidents, and compounding incidents. The paper also noted the conflict between the government's desire to have a resilient infrastructure that can withstand and recover from attacks versus a company's ability to afford this capability. The physical/human factors that need to be considered in risk management include crime, domestic terrorism, and disasters such as natural disasters, industrial disasters and crisis. The energy industry has geographically dispersed vulnerable systems. It has done a fair job of physical security and has good emergency management practices, but it was noted that the industry cannot protect against all threats. A strategy of vigilance and awareness is needed to deal with threats. Other strategies include contingency planning, physical security, employee communication, and emergency response plans. tabs., figs.

  6. Safeguards and security aspects of a potential Canadian used-fuel disposal facility

    International Nuclear Information System (INIS)

    Smith, R.M.; Wuschke, D.; Baumgartner, P.

    1994-09-01

    Large quantities of highly radioactive used fuel have been produced by Canadian nuclear generating stations. Conceptual design and development is under way to assess a means of disposing of this used fuel within a vault located 500 to 1000 m deep in plutonic rock in the Canadian Shield. In parallel with this work, the safeguards and physical security measures that will be required for this used fuel during transportation, packaging, and containment in a disposal vault are being studied in Canada, in several other countries that have similar requirements and by the International Atomic Energy Agency. Canadian commitments and regulations applicable to used-fuel transportation and disposal are described. The experience gained from applying safeguards and physical security measures at similar facilities is considered together with the availability of equipment that might be used in applying these measures. Possible safeguards and physical security measures are outlined and considered. These measures are based on the conceptual design studies for a reference Used-Fuel Disposal Centre and associated transportation systems undertaken by Atomic Energy of Canada Limited and Ontario Hydro. These studies show that effective and practical safeguards, which meet present IAEA objectives, can be applied to the used fuel in transportation and at a disposal facility. They also show that physical security measures can be employed that have a high probability of preventing theft or sabotage. 27 refs., 8 figs., 3 tabs., glossary, 2 appendices

  7. Safeguards and security aspects of a potential Canadian used-fuel disposal facility

    Energy Technology Data Exchange (ETDEWEB)

    Smith, R M; Wuschke, D; Baumgartner, P

    1994-09-01

    Large quantities of highly radioactive used fuel have been produced by Canadian nuclear generating stations. Conceptual design and development is under way to assess a means of disposing of this used fuel within a vault located 500 to 1000 m deep in plutonic rock in the Canadian Shield. In parallel with this work, the safeguards and physical security measures that will be required for this used fuel during transportation, packaging, and containment in a disposal vault are being studied in Canada, in several other countries that have similar requirements and by the International Atomic Energy Agency. Canadian commitments and regulations applicable to used-fuel transportation and disposal are described. The experience gained from applying safeguards and physical security measures at similar facilities is considered together with the availability of equipment that might be used in applying these measures. Possible safeguards and physical security measures are outlined and considered. These measures are based on the conceptual design studies for a reference Used-Fuel Disposal Centre and associated transportation systems undertaken by Atomic Energy of Canada Limited and Ontario Hydro. These studies show that effective and practical safeguards, which meet present IAEA objectives, can be applied to the used fuel in transportation and at a disposal facility. They also show that physical security measures can be employed that have a high probability of preventing theft or sabotage. 27 refs., 8 figs., 3 tabs., glossary, 2 appendices.

  8. Security Requirements for New Threats at International Airports

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2018-03-01

    Full Text Available The paper refers to security requirements for new threats international airports, taking specifically into consideration current challenges within processing of passengers, in light of types of current major threats, in a way ensuring positive passenger experience within their journey. In addition, within the scope of this paper, presented initial outcome of study research among professional aviation stakeholder?s environment, on current threats in the area of security and protection of airport infrastructure. The airports are a very demanding environment: seasonal traffic, fluctuating passenger volumes and last minute changes mean there is a lot of flexibility required in order to meet specific needs of airport authorities and their clients or the passengers (Dolnik, 2009. Therefore, security in aviation sector has been a big issue for civil aviation authorities, as airports are susceptible targets for terrorist attacks. The list of incidents is extensive and gets longer every year despite strict security measures. Within decades, aviation has become the backbone of our global economy bringing people to business, tourists to vacation destinations and products to markets. Statistically flying remains the safest mode of travelling compared to other modes of transportation. However, simultaneously terrorists and criminals continue in their quest to explore new ways of disrupting air transportation and the challenge to secure airports and airline assets remain real. This calls for greater awareness of security concerns in the aviation sector. The key element, how to protects against terrorist modus operandi, is to stay ahead of recent threats, incidents and breaches occurring worldwide. It requires implementation of effective data sharing systems, in order to proactively monitor potential risks and vulnerabilities within different type of aviation ecosystems.

  9. Industry example of how Safety and Security are applied within the Organizations: The Transnubel example

    International Nuclear Information System (INIS)

    Bairiot, X.

    2016-01-01

    During more than 40 years of transport of radioactive materials, Transnubel noticed the evolution regarding Safety and Security requirements. These requirements have to be met within the frame of commercial activities, with constraints as planning, cost control, availabilities, .... In addition, other requirements issued by customers, eventually linked with Safety and Security, have also to be taken in account. Since many years, the company is therefore organized for all daily activities on basis of a Quality System: this Quality System, based on the ISO 9000, aims to give an answer to the ISO 9000 requirements, but also to the safety requirements, which are integrated at different levels in the Quality System. The trend of the last years concerning Security has an impact on the organization and documentation in the company. Due to the legal requirements, the implementation has not been possible within the same ISO 9000 structure. As a result, a Security system as been created on a similar basis as the ISO 9000: security manual, security procedures and security working instructions. Two systems therefore are existing within our company: a Quality System including Safety, and a Security System. In the frame of our international transports, we need to rely on the flexibility of our Quality System and Security System to allow us to take in account national regulations: the regulations dealing with Security and Safety (and their interpretations) are national competences, and differ once borders are crossed. The presentation will give an overview of the implementation of the Safety and Security aspects in the company: the structure and the implementation. And will try to answer the question: is the increase of the structure / documents always a benefit to the execution of the transports? (author)

  10. Aspects with Program Analysis for Security Policies

    DEFF Research Database (Denmark)

    Yang, Fan

    Enforcing security policies to IT systems, especially for a mobile distributed system, is challenging. As society becomes more IT-savvy, our expectations about security and privacy evolve. This is usually followed by changes in regulation in the form of standards and legislation. In many cases......, small modification of the security requirement might lead to substantial changes in a number of modules within a large mobile distributed system. Indeed, security is a crosscutting concern which can spread to many business modules within a system, and is difficult to be integrated in a modular way....... This dissertation explores the principles of adding challenging security policies to existing systems with great flexibility and modularity. The policies concerned cover both classical access control and explicit information flow policies. We built our solution by combining aspect-oriented programming techniques...

  11. Nuclear transport - The regulatory dimension

    International Nuclear Information System (INIS)

    Green, L.

    2002-01-01

    The benefits that the peaceful applications of nuclear energy have brought to society are due in no small part to industry's capacity to transport radioactive materials safely, efficiently and reliably. The nuclear transport industry has a vital role in realising a fundamental objective of the International Atomic Energy Agency (IAEA) as stated in its statute to accelerate and enlarge the contribution of atomic energy to peace, health and prosperity throughout the world. The context in which transports currently take place is complex, and rapidly changing. In many respects transport is being viewed as an integral market issue and not a subsidiary concern. The availability of carriers drives routing decisions and changes in material flows necessitate new approaches to packaging and transport scenarios. Pressures on the transport sector are not without serious consequences; they can cause delays and in some cases cancellation of planned movements. Complex routings and the necessary use of chartered carriers can push up costs and work against cost efficiency. Since the events of 11 September 2001 the security of nuclear transports has contributed an added dimension to how transports take place. Transports of radioactive material have an outstanding safety record, indeed the transport of such materials could be regarded as a model for the transport of other classes of dangerous goods. This safety record is achieved by two inter-related factors. It is due primarily to well founded regulations developed by such key intergovernmental organisations as the IAEA, with the essential contributions of the member states who participate in the implementation of regulations and the review process. It is due also to the professionalism of those in the industry. There is a necessary synergy between the two - between the regulators whose task it is to make and to enforce the rules for safe, efficient and reliable transport and those whose job it is to transport within the rules. It

  12. Modeling of a Small Transportation Company’s Start-up with Limited Data during Economic Recession

    OpenAIRE

    Fang, Xiaoping; Ansell, Jonathan; Chen, Weiya

    2014-01-01

    This paper presents a modeling method for analyzing a small transportation company’s start-up and growth during a global economic crisis which had an impact on in China which is designed to help the owners make better investment and operating decisions with limited data. Since there is limited data, simple regression model and binary regression model failed to generate satisfactory results, so an additive periodic time series model was built to forecast business orders and income. Since the t...

  13. IAEA Nuclear Security - Achievements 2002-2011

    International Nuclear Information System (INIS)

    2012-03-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes is real. This calls for a collective commitment to the control of, and accountancy for, material, as well as to adequate levels of protection in order to prevent criminal or unauthorized access to the material or associated facilities. Sharing of knowledge and experience, coordination among States and collaboration with other international organizations, initiatives and industries supports an effective international nuclear security framework. In 2001, the Board of Governors tasked the IAEA with improving nuclear security worldwide. The report that follows provides an overview of accomplishments over the last decade and reflects the importance that States assign to keeping material in the right hands. The IAEA has established a comprehensive nuclear security programme, described first in the Nuclear Security Plan of 2002-2005 and subsequently in the second plan of 2006- 2009. Activities included developing internationally accepted nuclear security guidance, supporting international legal instruments, protecting material and facilities, securing transport and borders, detecting and interdicting illicit nuclear trafficking, strengthening human resource capacity and preparing response plans should a nuclear security event occur. The IAEA has begun the implementation of its third Nuclear Security Plan, to be completed at the end of 2013. This approach to nuclear security recognizes that an effective national nuclear security regime builds on a number of factors: the implementation of relevant international legal instruments; IAEA guidance and standards; information protection; physical protection; material accounting and control; detection of, and response to, trafficking in such material; national response plans and contingency measures. Implemented in a systematic manner, these building blocks make up a sustainable national nuclear security regime and contribute to global

  14. Design and development of a prototypical software for semi-automatic generation of test methodologies and security checklists for IT vulnerability assessment in small- and medium-sized enterprises (SME)

    Science.gov (United States)

    Möller, Thomas; Bellin, Knut; Creutzburg, Reiner

    2015-03-01

    The aim of this paper is to show the recent progress in the design and prototypical development of a software suite Copra Breeder* for semi-automatic generation of test methodologies and security checklists for IT vulnerability assessment in small and medium-sized enterprises.

  15. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  16. 77 FR 43039 - Federal Acquisition Regulation; Contractors Performing Private Security Functions Outside the...

    Science.gov (United States)

    2012-07-23

    ... expatriate security company (the source is 32 CFR 159.3, section (3) of the definition of ``covered contract.... Such firms are, by definition, not small businesses because they are not U.S. firms. In the small... unpredictable high-threat environment where personnel performing security functions may be called upon to use...

  17. A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks

    Science.gov (United States)

    Shahzad, Aamir; Lee, Malrey; Xiong, Neal Naixue; Jeong, Gisung; Lee, Young-Keun; Choi, Jae-Young; Mahesar, Abdul Wheed; Ahmad, Iftikhar

    2016-01-01

    In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design. PMID:26950129

  18. A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks.

    Science.gov (United States)

    Shahzad, Aamir; Lee, Malrey; Xiong, Neal Naixue; Jeong, Gisung; Lee, Young-Keun; Choi, Jae-Young; Mahesar, Abdul Wheed; Ahmad, Iftikhar

    2016-03-03

    In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design.

  19. A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2016-03-01

    Full Text Available In Industrial systems, Supervisory control and data acquisition (SCADA system, the pseudo-transport layer of the distributed network protocol (DNP3 performs the functions of the transport layer and network layer of the open systems interconnection (OSI model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design.

  20. The Ship Tethered Aerostat Remote Sensing System (STARRS): Observations of Small-Scale Surface Lateral Transport During the LAgrangian Submesoscale ExpeRiment (LASER)

    Science.gov (United States)

    Carlson, D. F.; Novelli, G.; Guigand, C.; Özgökmen, T.; Fox-Kemper, B.; Molemaker, M. J.

    2016-02-01

    The Consortium for Advanced Research on the Transport of Hydrocarbon in the Environment (CARTHE) will carry out the LAgrangian Submesoscale ExpeRiment (LASER) to study the role of small-scale processes in the transport and dispersion of oil and passive tracers. The Ship-Tethered Aerostat Remote Sensing System (STARRS) will observe small-scale surface dispersion in the open ocean. STARRS is built around a high-lift-capacity (30 kg) helium-filled aerostat. STARRS is equipped with a high resolution digital camera. An integrated GNSS receiver and inertial navigation system permit direct geo-rectification of the imagery. Consortium for Advanced Research on the Transport of Hydrocarbon in the Environment (CARTHE) will carry out the LAgrangian Submesoscale ExpeRiment (LASER) to study the role of small-scale processes in the transport and dispersion of oil and passive tracers. The Ship-Tethered Aerostat Remote Sensing System (STARRS) was developed to produce observational estimates of small-scale surface dispersion in the open ocean. STARRS is built around a high-lift-capacity (30 kg) helium-filled aerostat. STARRS is equipped with a high resolution digital camera. An integrated GNSS receiver and inertial navigation system permit direct geo-rectification of the imagery. Thousands of drift cards deployed in the field of view of STARRS and tracked over time provide the first observational estimates of small-scale (1-500 m) surface dispersion in the open ocean. The STARRS imagery will be combined with GPS-tracked surface drifter trajectories, shipboard observations, and aerial surveys of sea surface temperature in the DeSoto Canyon. In addition to obvious applications to oil spill modelling, the STARRS observations will provide essential benchmarks for high resolution numerical modelsDrift cards deployed in the field of view of STARRS and tracked over time provide the first observational estimates of small-scale (1-100 m) surface dispersion in the open ocean. The STARRS

  1. Energy for Transport

    DEFF Research Database (Denmark)

    Figueroa, Maria; Lah, Oliver; Fulton, Lewis M.

    2014-01-01

    Global transportation energy use is steeply rising, mainly as a result of increasing population and economic activity. Petroleum fuels remain the dominant energy source, reflecting advantages such as high energy density, low cost, and market availability. The movement of people and freight makes......, cost, distribution, infrastructure, storage, and public acceptability. The transition to low-carbon equitable and sustainable transport will take time but can be fostered by numerous short- and medium-term strategies that would benefit energy security, health, productivity, and sustainability....

  2. CYBER SECURITY FOR AIRPORTS

    OpenAIRE

    Kasthurirangan Gopalakrishnan; Manimaran Govindarasu; Doug W. Jacobson; Brent M. Phares

    2013-01-01

    In today’s information age, government organizations and business enterprises are heavily relying on interconnected computer systems to manage a variety of public services including energy, transportation, water, etc. While this increased connectivity has many operational advantages benefitting the public, they have also become vulnerable to cyber attacks such as Corporate Security Breaches, Spear Phishing, and Social Media Fraud. The aviation sector is one the critical infrastructure systems...

  3. Information Analysis Methodology for Border Security Deployment Prioritization and Post Deployment Evaluation

    International Nuclear Information System (INIS)

    Booker, Paul M.; Maple, Scott A.

    2010-01-01

    Due to international commerce, cross-border conflicts, and corruption, a holistic, information driven, approach to border security is required to best understand how resources should be applied to affect sustainable improvements in border security. The ability to transport goods and people by land, sea, and air across international borders with relative ease for legitimate commercial purposes creates a challenging environment to detect illicit smuggling activities that destabilize national level border security. Smuggling activities operated for profit or smuggling operations driven by cross border conflicts where militant or terrorist organizations facilitate the transport of materials and or extremists to advance a cause add complexity to smuggling interdiction efforts. Border security efforts are further hampered when corruption thwarts interdiction efforts or reduces the effectiveness of technology deployed to enhance border security. These issues necessitate the implementation of a holistic approach to border security that leverages all available data. Large amounts of information found in hundreds of thousands of documents can be compiled to assess national or regional borders to identify variables that influence border security. Location data associated with border topics of interest may be extracted and plotted to better characterize the current border security environment for a given country or region. This baseline assessment enables further analysis, but also documents the initial state of border security that can be used to evaluate progress after border security improvements are made. Then, border security threats are prioritized via a systems analysis approach. Mitigation factors to address risks can be developed and evaluated against inhibiting factor such as corruption. This holistic approach to border security helps address the dynamic smuggling interdiction environment where illicit activities divert to a new location that provides less resistance

  4. Internetting tactical security sensor systems

    Science.gov (United States)

    Gage, Douglas W.; Bryan, W. D.; Nguyen, Hoa G.

    1998-08-01

    The Multipurpose Surveillance and Security Mission Platform (MSSMP) is a distributed network of remote sensing packages and control stations, designed to provide a rapidly deployable, extended-range surveillance capability for a wide variety of military security operations and other tactical missions. The baseline MSSMP sensor suite consists of a pan/tilt unit with video and FLIR cameras and laser rangefinder. With an additional radio transceiver, MSSMP can also function as a gateway between existing security/surveillance sensor systems such as TASS, TRSS, and IREMBASS, and IP-based networks, to support the timely distribution of both threat detection and threat assessment information. The MSSMP system makes maximum use of Commercial Off The Shelf (COTS) components for sensing, processing, and communications, and of both established and emerging standard communications networking protocols and system integration techniques. Its use of IP-based protocols allows it to freely interoperate with the Internet -- providing geographic transparency, facilitating development, and allowing fully distributed demonstration capability -- and prepares it for integration with the IP-based tactical radio networks that will evolve in the next decade. Unfortunately, the Internet's standard Transport layer protocol, TCP, is poorly matched to the requirements of security sensors and other quasi- autonomous systems in being oriented to conveying a continuous data stream, rather than discrete messages. Also, its canonical 'socket' interface both conceals short losses of communications connectivity and simply gives up and forces the Application layer software to deal with longer losses. For MSSMP, a software applique is being developed that will run on top of User Datagram Protocol (UDP) to provide a reliable message-based Transport service. In addition, a Session layer protocol is being developed to support the effective transfer of control of multiple platforms among multiple control

  5. Transport cross section for small-angle scattering

    International Nuclear Information System (INIS)

    D'yakonov, M.I.; Khaetskii, A.V.

    1991-01-01

    Classical mechanics is valid for describing potential scattering under the conditions (1) λ much-lt α and (2) U much-gt ℎυ/α, where λ is the de Broglie wavelength, α is the characteristic size of the scatterer, U is the characteristic value of the potential energy, and υ is the velocity of the scattered particle. The second of these conditions means that the typical value of the classical scattering angle is far larger than the diffraction angle λ/α. In this paper the authors show that this second condition need not hold in a derivation of the transport cross section. In other words, provided that the condition λ much-lt α holds, it is always possible to calculate the transport cross section from the expressions of classical mechanics, even in the region U approx-lt ℎυ/α, where the scattering is diffractive,and the differential cross section is greatly different from the classical cross section. The transport cross section is found from the classical expression even in the anticlassical case U much-lt ℎυ/α, where the Born approximation can be used

  6. Dossier: transport of radioactive materials; Dossier: le transport des matieres radioactives

    Energy Technology Data Exchange (ETDEWEB)

    Mignon, H. [CEA Centre d`Etudes Nucleaires de Saclay, 91 - Gif-sur-Yvette (France). Direction du Cycle du Combustible; Niel, J.Ch. [CEA Centre d`Etudes Nucleaires de Fontenay-aux-Roses, 92 (France). Inst. de Protection et de Surete Nucleaire; Canton, H. [CEA Cesta, 33 - Bordeaux (France); Brachet, Y. [Transnucleaire, 75 - Paris (France); Turquet de Beauregard, G.; Mauny, G. [CIS bio international, France (France); Robine, F.; Plantet, F. [Prefecture de la Moselle (France); Pestel Lefevre, O. [Ministere de l`Equipement, des transports et du logement, (France); Hennenhofer, G. [BMU, Ministere de l`environnement, de la protection de la nature et de la surete des reacteurs (Germany); Bonnemains, J. [Association Robin des Bois (France)

    1997-12-01

    This dossier is entirely devoted to the transportation of radioactive and fissile materials of civil use. It comprises 9 papers dealing with: the organization of the control of the radioactive materials transport safety (safety and security aspects, safety regulations, safety analysis and inspection, emergency plans, public information), the technical aspects of the regulation concerning the transport of radioactive materials (elaboration of regulations and IAEA recommendations, risk assessments, defense in depth philosophy and containers, future IAEA recommendations, expertise-research interaction), the qualification of containers (regulations, test facilities), the Transnucleaire company (presentation, activity, containers for spent fuels), the packages of radioactive sources for medical use (flux, qualification, safety and transport), an example of accident during radioactive materials transportation: the Apach train derailment (February 4, 1997), the sea transport of radioactive materials (international maritime organization (OMI), international maritime dangerous goods (IMDG) code, irradiated nuclear fuel (INF) safety rules), the transport of radioactive materials in Germany, and the point of view from an external observer. (J.S.)

  7. 12 CFR 16.8 - Small issues.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Small issues. 16.8 Section 16.8 Banks and....8 Small issues. (a) The OCC will deem offers and sales of bank issued securities that satisfy the requirements of Commission Regulation A (17 CFR part 230, Regulation A—Conditional Small Issues Exemption) to...

  8. Transportation management and security during the 2004 Democratic National Convention

    Science.gov (United States)

    2005-01-05

    The transportation operations plan for the 2004 Democratic National Convention (DNC) in Boston, Massachusetts, was not a typical transportation plan driven by goals such as mobility and air quality. The DNC was the first national political convention...

  9. Physical security of nuclear facilities

    International Nuclear Information System (INIS)

    Dixon, H.

    1987-01-01

    A serious problem with present security systems at nuclear facilities is that the threats and standards prepared by the NRC and DOE are general, and the field offices are required to develop their own local threats and, on that basis, to prepared detailed specifications for security systems at sites in their jurisdiction. As a result, the capabilities of the systems vary across facilities. Five steps in particular are strongly recommended as corrective measures: 1. Those agencies responsible for civil nuclear facilities should jointly prepare detailed threat definitions, operational requirements, and equipment specifications to protect generic nuclear facilities, and these matters should be issued as policy. The agencies should provide sufficient detail to guide the design of specific security systems and to identify candidate components. 2. The DOE, NRC, and DOD should explain to Congress why government-developed security and other military equipment are not used to upgrade existing security systems and to stock future ones. 3. Each DOE and NRC facility should be assessed to determine the impact on the size of the guard force and on warning time when personnel-detecting radars and ground point sensors are installed. 4. All security guards and technicians should be investigated for the highest security clearance, with reinvestigations every four years. 5. The processes and vehicles used in intrafacility transport of nuclear materials should be evaluated against a range of threats and attack scenarios, including violent air and vehicle assaults. All of these recommendations are feasible and cost-effective. The appropriate congressional subcommittees should direct that they be implemented as soon as possible

  10. ENSURING THE SAFETY OF ROAD TRANSPORTATION OF GOODS

    Directory of Open Access Journals (Sweden)

    Liudmila Nikolaevna Andronikova

    2017-05-01

    Full Text Available The article investigates Russian and foreign regulatory documents, governing the issues of cargo securing in road transport, and sets out recommendations to ensure the safety of road transportation of goods by means of their attachment.

  11. Evolution of nuclear security regulatory activities in Brazil

    International Nuclear Information System (INIS)

    Mello, Luiz A. de; Monteiro Filho, Joselio S.; Belem, Lilia M.J.; Torres, Luiz F.B.

    2009-01-01

    The changing of the world scenario in the last 15 years has increased worldwide the concerns about overall security and, as a consequence, about the nuclear and radioactive material as well as their associated facilities. Considering the new situation, in February 2004, the Brazilian National Nuclear Energy Commission (CNEN), decided to create the Nuclear Security Office. This Office is under the Coordination of Nuclear Safeguards and Security, in the Directorate for Safety, Security and Safeguards (Regulatory Directorate). Before that, security regulation issues were dealt in a decentralized manner, within that Directorate, by different licensing groups in specific areas (power reactors, fuel cycle facilities, radioactive facilities, transport of nuclear material, etc.). This decision was made in order to allow a coordinated approach on the subject, to strengthen the regulation in nuclear/radioactive security, and to provide support to management in the definition of institutional security policies. The CNEN Security Office develops its work based in the CNEN Physical Protection Regulation for Nuclear Operational Units - NE-2.01, 1996, the Convention on the Physical Protection of Nuclear Material and the IAEA Nuclear Security Series . This paper aims at presenting the activities developed and the achievements obtained by this new CNEN office, as well as identifying the issues and directions for future efforts. (author)

  12. Overview of NWMO's transportation engagement plan

    Energy Technology Data Exchange (ETDEWEB)

    Facella, J. [Nuclear Waste Management Organization, Toronto, ON (Canada)

    2015-07-01

    This paper describes the activities of the Nuclear Waste Management Organization (NWMO) in transportation of nuclear waste. Transportation is a technical and social consideration in the siting process. A transportation route must be identified, or be capable of development, which ensures safe and secure transportation to the site. Beyond safety, transportation is also an important consideration in identifying and assessing effects on well-being. NWMO is in the early phases of an engagement program.

  13. Regional Integrated Tenets to Reinforce the Safety and Security of Radioactive Sources (ClearZone)

    International Nuclear Information System (INIS)

    Salzer, P.

    2003-01-01

    The EURATOM Research and Training Programme on Nuclear Energy includes 2 main fields - fusion energy research and management of radioactive waste, radiation protection and other activities of nuclear technology and safety.Seven instruments (mechanisms) for projects management are used - 'Network of Excellence' (NOE); 'Integrated Project' (IP); 'Specific Targeted Research Project' or 'Specific Targeted Training Project' (STREP); 'Co-ordination Action' (CA); Actions to Promote and Develop Human Resources and Mobility Specific Support Actions; Integrated Infrastructure Initiatives. Two consecutive sub-projects are proposed: 'small' - countries of the Visegrad four + Austrian participant -within the 6th FP 'Specific Supported Actions' and 'large' - participation of more countries in the region - more oriented to practical implementation of the 'small' project findings - intention to use the 6th Framework Programme resources to co-financing the implementation activities. The main objectives are: to create effective lines of defense (prevention -detection - categorization - transport - storage) against malicious use of radioactive sources; to achieve and maintain a high level of safety and security of radioactive sources; to arise the radioactive sources management safety and security culture at the Central European region. Consortium of 11 organisations from Czech Republic, Slovak Republic, Austria, Hungary and Poland is established for the Project implementation. The Project task are grouped in the following areas: legislation, infrastructure, practices; metallurgical industry, cross border control; instrumentation and metrology; information system

  14. 76 FR 52133 - Defense Federal Acquisition Regulation Supplement; Contractors Performing Private Security...

    Science.gov (United States)

    2011-08-19

    ... Outside the United States.'' DFARS 225.302-3, Definitions, provides the definition of ``private security... this total, 361, or 20 percent, were awarded to small businesses. Firms performing private security... private security functions in response to a perceived immediate threat; (2) Ensure that all employees of...

  15. Leveraging brightness from transportation lighting systems through light source color.

    Science.gov (United States)

    2013-11-01

    Roadway transportation lighting is installed for multiple reasons including traffic safety and pedestrian : security. Judgments of pedestrian safety and security along roadways are not strictly correlated to : specified light levels, but the color of...

  16. MOX fuel transport: the French experience

    International Nuclear Information System (INIS)

    Sanchis, H.; Verdier, A.; Sanchis, H.

    1999-01-01

    In the back-end of the fuel cycle, several leading countries have chosen the Reprocessing, Conditioning, Recycling (RCR) option. Plutonium recycling in the form of MOX fuel is a mature industry, with successful operational experience and large-scale fabrication plants an several European countries. The COGEMA Group has developed the industrialized products to master the RCR operation including transport COGEMA subsidiary, TRANSNUCLEAIRE has been operating MOX fuel transports on an industrial scale for more than 10 years. In 1998, around 200 transports of Plutonium materials have been organised by TRANSNUCLEAIRE. These transports have been carried out by road between various facilities in Europe: reprocessing plants, manufacturing plants and power plants. The materials transported are either: PuO 2 and MOX powder; BWR and PWR MOX fuel rods; BWR and PWR MOX fuel assemblies. Because MOX fuel transport is subject to specific safety, security and fuel integrity requirements, the MOX fuel transport system implemented by TRANSNUCLEAIRE is fully dedicated. Packaging have been developed, licensed and manufactured for each kind of MOX material in compliance with relevant regulations. A fleet of vehicles qualified according to existing physical protection regulations is operated by TRANSNUCLEAIRE. TRANSNUCLEAIRE has gained a broad experience in MOX transport in 10 years. Technical and operational know-how has been developed and improved for each step: vehicles and packaging design and qualification; vehicle and packaging maintenance; transport operations. Further developments are underway to increase the payload of the packaging and to improve the transport conditions, safety and security remaining of course top priority. (authors)

  17. Security of water treatment facilities

    Energy Technology Data Exchange (ETDEWEB)

    Forsha, C.A. [Univ. of Pittsburgh at Johnstown, Johnstowne, PA (United States)

    2002-06-15

    The safety of the nation's water supply is at risk. Although harm may or may not be done to water sources, the fear is definitely a factor. No matter what size system supplies water, the community will expect increased security. Decisions must be made as to how much will be spent on security and what measures will be taken with the money. Small systems often have a difficult time in finding a direction to focus on. Physical and electronic protection is less involved because of the scale of service. Biological contamination is difficult to prevent if the assailants are determined. Small-scale water storage and low magnitudes of flow increase a contamination threat. Large systems have a size advantage when dealing with biological contamination because of the dilution factor, but physical and electronic protection is more involved. Large-scale systems are more likely to overlook components. A balance is maintained through anything dealing with the public. Having greater assurance that water quality will be maintained comes at the cost of knowing less about how water is protected and treated, and being banned from public land within watersheds that supply drinking water. Whether good or bad ideas are being implemented, security of water treatment facilities is changing. (author)

  18. Security of water treatment facilities

    International Nuclear Information System (INIS)

    Forsha, C.A.

    2002-01-01

    The safety of the nation's water supply is at risk. Although harm may or may not be done to water sources, the fear is definitely a factor. No matter what size system supplies water, the community will expect increased security. Decisions must be made as to how much will be spent on security and what measures will be taken with the money. Small systems often have a difficult time in finding a direction to focus on. Physical and electronic protection is less involved because of the scale of service. Biological contamination is difficult to prevent if the assailants are determined. Small-scale water storage and low magnitudes of flow increase a contamination threat. Large systems have a size advantage when dealing with biological contamination because of the dilution factor, but physical and electronic protection is more involved. Large-scale systems are more likely to overlook components. A balance is maintained through anything dealing with the public. Having greater assurance that water quality will be maintained comes at the cost of knowing less about how water is protected and treated, and being banned from public land within watersheds that supply drinking water. Whether good or bad ideas are being implemented, security of water treatment facilities is changing. (author)

  19. Transport of nuclear substances in Canada

    Energy Technology Data Exchange (ETDEWEB)

    Faille, S. [Canadian Nuclear Safety Commission, Ottawa, ON (Canada)

    2015-07-01

    CNSC Regulates all Nuclear-related facilities and activities including Uranium mines and mill;, uranium fuel fabrication and processing; nuclear power plants; nuclear substance processing; industrial and medical applications; nuclear research and education; transport; export/import control; security and safeguards and waste management facilities. Our mandate is to protect the health, safety and security of Canadians and the environment, and implement Canada's International commitments on the peaceful use of nuclear energy and disseminate objective scientific, technical and regulatory information to the public. Based on the International Atomic Energy Agency (IAEA) Regulations for the Safe Transport of Radioactive Material, 1996 Edition, Revised and currently being revised to reflect the 2012 edition of the IAEA Regulations.

  20. Transport of nuclear substances in Canada

    International Nuclear Information System (INIS)

    Faille, S.

    2015-01-01

    CNSC Regulates all Nuclear-related facilities and activities including Uranium mines and mill;, uranium fuel fabrication and processing; nuclear power plants; nuclear substance processing; industrial and medical applications; nuclear research and education; transport; export/import control; security and safeguards and waste management facilities. Our mandate is to protect the health, safety and security of Canadians and the environment, and implement Canada's International commitments on the peaceful use of nuclear energy and disseminate objective scientific, technical and regulatory information to the public. Based on the International Atomic Energy Agency (IAEA) Regulations for the Safe Transport of Radioactive Material, 1996 Edition, Revised and currently being revised to reflect the 2012 edition of the IAEA Regulations.

  1. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  2. Paleoclassical transport explains electron transport barriers in RTP and TEXTOR

    Energy Technology Data Exchange (ETDEWEB)

    Hogeweij, G M D [FOM-Institute for Plasma Physics Rijnhuizen, Association EURATOM-FOM, PO Box 1207, NL-3430 BE Nieuwegein (Netherlands); Callen, J D [University of Wisconsin, Madison, WI 53706-1609 (United States)

    2008-06-15

    The recently developed paleoclassical transport model sets the minimum level of electron thermal transport in a tokamak. This transport level has proven to be in good agreement with experimental observations in many cases when fluctuation-induced anomalous transport is small, i.e. in (near-)ohmic plasmas in small to medium size tokamaks, inside internal transport barriers (ITBs) or edge transport barriers (H-mode pedestal). In this paper predictions of the paleoclassical transport model are compared in detail with data from such kinds of discharges: ohmic discharges from the RTP tokamak, EC heated RTP discharges featuring both dynamic and shot-to-shot scans of the ECH power deposition radius and off-axis EC heated discharges from the TEXTOR tokamak. For ohmically heated RTP discharges the T{sub e} profiles predicted by the paleoclassical model are in reasonable agreement with the experimental observations, and various parametric dependences are captured satisfactorily. The electron thermal ITBs observed in steady state EC heated RTP discharges and transiently after switch-off of off-axis ECH in TEXTOR are predicted very well by the paleoclassical model.

  3. Advanced physical protection systems for facilities and transportation

    International Nuclear Information System (INIS)

    Jones, O.E.

    1976-01-01

    Sandia Laboratories is developing advanced physical protection safeguards in order to improve the security of special nuclear materials, facilities, and transportation. Computer models are being used to assess the cost-effectiveness of alternative systems for protecting facilities against external attack which may include internal assistance, and against internal theft or sabotage. Physical protection elements such as admittance controls, portals and detectors, perimeter and interior intrusion alarms, fixed and remotely activated barriers, and secure communications are being evaluated, adapted, and where required, developed. New facilities safeguards concepts which involve ''control loops'' between physical protection and materials control elements are being evolved jointly between Sandia Laboratories and Los Alamos Scientific Laboratory. Special vehicles and digital communications equipment have been developed for the ERDA safe-secure transportation system. The current status and direction of these activities are surveyed

  4. Advanced physical protection systems for facilities and transportation

    International Nuclear Information System (INIS)

    Jones, O.E.

    1976-01-01

    Sandia Laboratories is developing advanced physical protection safeguards in order to improve the security of special nuclear materials, facilities, and transportation. Computer models are being used to assess the cost-effectiveness of alternative systems for protecting facilities against external attack which may include internal assistance, and against internal theft or sabotage. Physical protection elements such as admittance controls, portals and detectors, perimeter and interior intrusion alarms, fixed and remotely-activated barriers, and secure communications are being evaluated, adapted, and where required, developed. New facilities safeguards concepts which involve (control loops) between physical protection and materials control elements are being evolved jointly between Sandia Laboratories and Los Alamos Scientific Laboratory. Special vehicles and digital communications equipment have been developed for the ERDA safe-secure transportation system. The current status and direction of these activities are surveyed

  5. 'Acting like chameleons’: on the McDonaldization of private security

    NARCIS (Netherlands)

    van Steden, R.; de Waard, J.

    2013-01-01

    Private security is a fragmented industry with tens of thousands of small- and medium-sized suppliers worldwide. However, with the arrival in the market of multinational brands such as Group 4 Securicor and Securitas, we are witnessing a McDonaldization of security commodities. This development

  6. Best Practices and Lessons Learned In LANL Approaches to Transportation Security

    Energy Technology Data Exchange (ETDEWEB)

    Drypolcher, Katherine Carr [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-10-24

    Presentation includes slides on Physical Protection of Material in Transit; Graded Approach for Implementation Controls; Security Requirements; LANL Lessons Learned; Shipping Violation; Unmonitored Shipment; Foreign shipment; and the Conclusion.

  7. Information Security Issues in Higher Education and Institutional Research

    Science.gov (United States)

    Custer, William L.

    2010-01-01

    Information security threats to educational institutions and their data assets have worsened significantly over the past few years. The rich data stores of institutional research are especially vulnerable, and threats from security breaches represent no small risk. New genres of threat require new kinds of controls if the institution is to prevent…

  8. Tokamak electron heat transport by direct numerical simulation of small scale turbulence

    International Nuclear Information System (INIS)

    Labit, B.

    2002-10-01

    In a fusion machine, understanding plasma turbulence, which causes a degradation of the measured energy confinement time, would constitute a major progress in this field. In tokamaks, the measured ion and electron thermal conductivities are of comparable magnitude. The possible sources of turbulence are the temperature and density gradients occurring in a fusion plasma. Whereas the heat losses in the ion channel are reasonably well understood, the origin of the electron losses is more uncertain. In addition to the radial velocity associated to the fluctuations of the electric field, electrons are more affected than ions by the magnetic field fluctuations. In experiments, the confinement time can be conveniently expressed in terms of dimensionless parameters. Although still somewhat too imprecise, these scaling laws exhibit strong dependencies on the normalized pressure β or the normalized Larmor radius, ρ * . The present thesis assesses whether a tridimensional, electromagnetic, nonlinear fluid model of plasma turbulence driven by a specific instability can reproduce the dependence of the experimental electron heat losses on the dimensionless parameters β and ρ * . The investigated interchange instability is the Electron Temperature Gradient driven one (ETG). The model is built by using the set of Braginskii equations. The developed simulation code is global in the sense that a fixed heat flux is imposed at the inner boundary, leaving the gradients free to evolve. From the nonlinear simulations, we have put in light three characteristics for the ETG turbulence: the turbulent transport is essentially electrostatic; the potential and pressure fluctuations form radially elongated cells called streamers; the transport level is very low compared to the experimental values. The thermal transport dependence study has shown a very small role of the normalized pressure, which is in contradiction with the Ohkama's formula. On the other hand, the crucial role of the

  9. Crime and public transport: designing a safer journey

    CSIR Research Space (South Africa)

    Kruger, Tinus

    2007-07-01

    Full Text Available This paper addresses issues related to transport and security with a particular focus on the role that the physical environment plays in increasing or reducing opportunities for crime. The focus is on crime problems on public transport and the use...

  10. International codes concerning the security of radioisotopes

    International Nuclear Information System (INIS)

    Kusama, Keiji

    2013-01-01

    Explained is the title subject with international and Japanese official argument or publications and actions, where the security is defined as protection of sealed and unsealed radioisotopes (RI) from malicious acts. IAEA worked out the Code of Conduct on the Safety and Security of Radioactive Sources in 2004 based on its preceding argument and with the turning point of the terrorism 3.11 (2001), and Nuclear Security Recommendations on radioactive material and associated facilities (2011), for whose prerequisite, Security of radioactive sources: implementing guide (2009) and Security in the transport of radioactive material (2008) had been drawn up. The Code of Conduct indicates the security system to regulate the sealed sources that each nation has to build up through legislation, setup of regulatory agency, registration of the sources, provision of concerned facilities with radiation protection, etc. For attaining this purpose, IAEA defined Guidance on the Import and Export of Radioactive Sources (2005, 2012), Categorization of radioactive sources (2005) and Dangerous quantities of radioactive material (D-VALUES) (2006). For updating the related matters, IAEA holds international conferences somewhere in the world every year. The Nuclear Security Recommendations indicate the nation's responsibility of building up and maintaining the security system above with well-balanced measures between the safe and secure use of RI without the invalid inhibition of their usage. Japan government worked out the concept essential for ensuring the nuclear security in Sep. 2011, in which for RI, defined were the risk and benefit in use and security, and securing role of the present legal systems concerning the safety handling and objective RI involved in their registration system. Securing measures of RI in such usage as medical and industrial aids must be of advanced usefulness and safety in harmony with activities of other countries. (T.T)

  11. Autonomic computing meets SCADA security

    OpenAIRE

    Nazir, S; Patel, S; Patel, D

    2017-01-01

    © 2017 IEEE. National assets such as transportation networks, large manufacturing, business and health facilities, power generation, and distribution networks are critical infrastructures. The cyber threats to these infrastructures have increasingly become more sophisticated, extensive and numerous. Cyber security conventional measures have proved useful in the past but increasing sophistication of attacks dictates the need for newer measures. The autonomic computing paradigm mimics the auton...

  12. Integrating Safety, Operations, Security, and Safeguards (ISOSS) into the design of small modular reactors : a handbook.

    Energy Technology Data Exchange (ETDEWEB)

    Middleton, Bobby D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mendez, Carmen Margarita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-10-01

    The existing regulatory environment for nuclear reactors impacts both the facility design and the cost of operations once the facility is built. Delaying the consideration of regulatory requirements until late in the facility design - or worse, until after construction has begun - can result in costly retrofitting as well as increased operational costs to fulfill safety, security, safeguards, and emergency readiness requirements. Considering the scale and scope, as well as the latest design trends in the next generation of nuclear facilities, there is an opportunity to evaluate the regulatory requirements and optimize the design process for Small Modular Reactors (SMRs), as compared to current Light Water Reactors (LWRs). To this end, Sandia has embarked on an initiative to evaluate the interactions of regulations and operations as an approach to optimizing the design of SMR facilities, supporting operational efficiencies, as well as regulatory requirements. The early stages of this initiative consider two focus areas. The first focus area, reported by LaChance, et al. (2007), identifies the regulatory requirements established for the current fleet of LWR facilities regarding Safety, Security, Operations, Safeguards, and Emergency Planning, and evaluates the technical bases for these requirements. The second focus area, developed in this report, documents the foundations for an innovative approach that supports a design framework for SMR facilities that incorporates the regulatory environment, as well as the continued operation of the facility, into the early design stages, eliminating the need for costly retrofitting and additional operating personnel to fulfill regulatory requirements. The work considers a technique known as Integrated Safety, Operations, Security and Safeguards (ISOSS) (Darby, et al., 2007). In coordination with the best practices of industrial operations, the goal of this effort is to develop a design framework that outlines how ISOSS

  13. 19 CFR 10.542 - Third country transportation.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Third country transportation. 10.542 Section 10.542 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF... Trade Agreement Rules of Origin § 10.542 Third country transportation. (a) General. A good will not be...

  14. The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets

    Directory of Open Access Journals (Sweden)

    Antonio Santos-Olmo

    2016-07-01

    Full Text Available The information society is increasingly more dependent on Information Security Management Systems (ISMSs, and the availability of these kinds of systems is now vital for the development of Small and Medium-Sized Enterprises (SMEs. However, these companies require ISMSs that have been adapted to their special features, and which are optimized as regards the resources needed to deploy and maintain them. This article shows how important the security culture within ISMSs is for SMEs, and how the concept of security culture has been introduced into a security management methodology (MARISMA is a Methodology for “Information Security Management System in SMEs” developed by the Sicaman Nuevas Tecnologías Company, Research Group GSyA and Alarcos of the University of Castilla-La Mancha. for SMEs. This model is currently being directly applied to real cases, thus allowing a steady improvement to be made to its implementation.

  15. The IAEA Nuclear Security Programme Combating Nuclear Terrorism

    International Nuclear Information System (INIS)

    2010-01-01

    Discusses the four threats of nuclear terrorism,which are theft of a nuclear weapon, theft of material to make an improvised nuclear explosive device,theft of other radioactive material for an Radiological dispersal device and sabotage of a facility or transport. The IAEA Nuclear Security programme combating Nuclear Terrorism therefore adopts a comprehensive approach. The programme addresses the need to cover nuclear and other radioactive materials, nuclear facilities and transports, non-nuclear, medical and industrial applications of sources

  16. Role of small lead-cooled fast reactors for international deployment in worldwide sustainable nuclear energy supply

    International Nuclear Information System (INIS)

    Sienicki, J.J.; Wade, D.C.; Moisseytsev, A.

    2008-01-01

    Most recently, the global nuclear energy partnership (GNEP) has identified, as one of its key objectives, the development and demonstration of concepts for small and medium-sized reactors (SMRs) that can be globally deployed while assuring a high level of proliferation resistance. Lead-cooled systems offer several key advantages in meeting these goals. The small lead-cooled fast reactor concept known as the small secure transportable autonomous reactor (SSTAR) has been under ongoing development as part of the US advanced nuclear energy systems programs. Meeting future worldwide projected energy demands during this century (e.g., 1000 to 2000 GWe by 2050) in a sustainable manner while maintaining CO2 emissions at or below today's level will require massive deployments of nuclear reactors in non-fuel cycle states as well as fuel cycle states. The projected energy demands of non-fuel cycle states will not be met solely through the deployment of Light Water Reactors (LWRs) in those states without using up the world's resources of fissile material (e.g., known plus speculative virgin uranium resources = 15 million tonnes). The present U.S. policy is focused upon domestic deployment of large-scale LWRs and sodium-cooled fast spectrum Advanced Burner Reactors (ABRs) working in a symbiotic relationship that burns existing fissile material while destroying the actinides which are generated. Other major nuclear nations are carrying out the development and deployment of SFR breeders as witness the planning for SFR breeder deployments in France, Japan, China, India, and Russia. Small (less that 300 MWe) and medium (300 to 700 MWe) size reactors are better suited to the growing economies and infrastructures of many non-fuel cycle states and developing nations. For those deployments, fast reactor converters which are fissile self-sufficient by creating as much fissile material as they consume are preferred to breeders that create more fissile material than they consume. Thus

  17. 49 CFR 1580.203 - Reporting significant security concerns.

    Science.gov (United States)

    2010-10-01

    ... TRANSPORTATION SECURITY Passenger Rail Including Passenger Railroad Carriers, Rail Transit Systems, Tourist... railroad carrier hosting an operation described in paragraph (a)(1) of this section. (3) Each tourist... transit line, and route, as applicable. (4) Origination and termination locations for the affected...

  18. A Lightweight Protocol for Secure Video Streaming.

    Science.gov (United States)

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  19. 77 FR 10943 - Small Business Size Standards: Transportation and Warehousing

    Science.gov (United States)

    2012-02-24

    ... 14.0 Transportation. 485510 Charter Bus Industry 7.0 14.0 485991 Special Needs Transportation... NAICS Sector 48-49. That represents 0.7 percent of total firms in industries in that Sector that have... Limousine Service 14.0 485410 School and Employee Bus 14.0 Transportation. 485510 Charter Bus Industry 14.0...

  20. Security of Radioactive Sources. Implementing Guide (French Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    There are concerns that terrorist or criminal groups could gain access to high activity radioactive sources and use these sources maliciously. The IAEA is working with Member States to increase control, accounting and security of radioactive sources to prevent their malicious use and the associated potential consequences. Based on extensive input from technical and legal experts, this implementation guide sets forth guidance on the security of sources and will serve as a useful tool for legislators and regulators, physical protection specialists and facility and transport operators, as well as for law enforcement officers.

  1. Truck shipment risks for assessing hazardous materials - a new paradigm incorporating safety and security

    Energy Technology Data Exchange (ETDEWEB)

    Greenberg, A.; McSweeney, T.; Allen, J.; Lepofsky, M. [Battelle Memorial Inst., Columbus, OH (United States); Abkowitz, M. [Dept. of Civil Engineering, Vanderbilt Univ., Nashville, TN (United States)

    2004-07-01

    Recent terrorist events, most notably September 11, 2001, have taught us that transportation risk management must be performed with a different lens to accommodate terrorism scenarios that would have previously been considered unlikely to warrant serious attention. Given these circumstances, a new paradigm is needed for managing the risks associated with highway transport of hazardous materials. In particular, this paradigm must: 1) more explicitly consider security threat and vulnerability, and 2) integrate security considerations into an overall framework for addressing natural and man-made disasters, be they accidental or planned. This paper summarizes the results of a study sponsored by the U.S. Department of Transportation, Federal Motor Carrier Safety Administration for the purpose of exploring how a paradigm might evolve in which both safety and security risks can be evaluated as a systematic, integrated process. The work was directed at developing a methodology for assessing the impacts of hazardous materials safety and security incident consequences when transported by highway. This included consideration of the manner in which these materials could be involved in initiating events as well as potential outcomes under a variety of release conditions. The methodology is subsequently applied to various classes of hazardous materials to establish an economic profile of the impacts that might be expected if a major release were to occur. The paper concludes with a discussion of the findings and implications associated with this effort.

  2. Truck shipment risks for assessing hazardous materials - a new paradigm incorporating safety and security

    International Nuclear Information System (INIS)

    Greenberg, A.; McSweeney, T.; Allen, J.; Lepofsky, M.; Abkowitz, M.

    2004-01-01

    Recent terrorist events, most notably September 11, 2001, have taught us that transportation risk management must be performed with a different lens to accommodate terrorism scenarios that would have previously been considered unlikely to warrant serious attention. Given these circumstances, a new paradigm is needed for managing the risks associated with highway transport of hazardous materials. In particular, this paradigm must: 1) more explicitly consider security threat and vulnerability, and 2) integrate security considerations into an overall framework for addressing natural and man-made disasters, be they accidental or planned. This paper summarizes the results of a study sponsored by the U.S. Department of Transportation, Federal Motor Carrier Safety Administration for the purpose of exploring how a paradigm might evolve in which both safety and security risks can be evaluated as a systematic, integrated process. The work was directed at developing a methodology for assessing the impacts of hazardous materials safety and security incident consequences when transported by highway. This included consideration of the manner in which these materials could be involved in initiating events as well as potential outcomes under a variety of release conditions. The methodology is subsequently applied to various classes of hazardous materials to establish an economic profile of the impacts that might be expected if a major release were to occur. The paper concludes with a discussion of the findings and implications associated with this effort

  3. Transportation Self-Efficacy and Social Problem-Solving of Persons Who Are Blind or Visually Impaired.

    Science.gov (United States)

    Crudden, Adele; O'Mally, Jamie; Antonelli, Karla

    2016-01-01

    Social problem-solving skills and transportation self-efficacy were assessed for 48 vocational rehabilitation consumers with visual disabilities who required assistance securing work transportation. Social problem solving was at the upper end of the normed average; transportation self-efficacy averaged 101.5 out of 140. Level of vision loss was not associated with score differences; urban residence related to slightly higher self-efficacy than suburban or rural residency. Participants appeared to have the skills necessary to secure employment transportation, but were less confident about transportation-seeking activities that required more initiative of social interaction. Training and information might help consumers gain confidence in these tasks and increase viable transportation options.

  4. The application of algorithm in taxi security system

    Science.gov (United States)

    Luo, Chengyu

    2017-08-01

    With the booming of the society and economy today, Taxis and private cars have gradually become one of the most popular tools in transportation for their low price and convenience. However, because of the breakdown in the security system, a few accidents occurred due to the illegal taxi. The unreliable security management has attributed to the lack of trust in taxi companies and relevant regulatory authorities, which considered to be the reason why people are worried about it. Accordingly, we put forward a design for a taxi security system, making use of modern technology such as NFC, iBeacon, GPS combined with algorithms, automatically recognize the taxi we take, and reflecting basic information of taxi and driver on our mobile phone.

  5. Determination of ISRA Framework Using Delphi Methodology for Small and Midsized Enterprises

    Science.gov (United States)

    Shah, Ashish

    2017-01-01

    Unfathomable a few decades ago, the velocity of revolution in information technology (IT) security is accelerating. Small and midsized enterprises (SMEs) continue to make IT security a highest priority and foster security controls to safeguard their environments from adverse effects. Information technology security professionals must rely on one…

  6. On the security of SSL/TLS-enabled applications

    Directory of Open Access Journals (Sweden)

    Manik Lal Das

    2014-01-01

    Full Text Available SSL/TLS (Secure Socket Layer/Transport Layer Security-enabled web applications aim to provide public key certificate based authentication, secure session key establishment, and symmetric key based traffic confidentiality. A large number of electronic commerce applications, such as stock trading, banking, shopping, and gaming rely on the security strength of the SSL/TLS protocol. In recent times, a potential threat, known as main-in-the-middle (MITM attack, has been exploited by attackers of SSL/TLS-enabled web applications, particularly when naive users want to connect to an SSL/TLS-enabled web server. In this paper, we discuss about the MITM threat to SSL/TLS-enabled web applications. We review the existing space of solutions to counter the MITM attack on SSL/TLS-enabled applications, and then, we provide an effective solution which can resist the MITM attack on SSL/TLS-enabled applications. The proposed solution uses a soft-token based approach for user authentication on top of the SSL/TLS’s security features. We show that the proposed solution is secure, efficient and user friendly in comparison to other similar approaches.

  7. The economics of energy security

    International Nuclear Information System (INIS)

    Bohi, D.R.; Toman, M.A.; Walls, M.A.

    1996-01-01

    The results of research on energy security that has been conducted over the past 20 years are brought together and expanded. Chapter 2 lays out basic conceptual arguments regarding the economic externalities and the military premium, as well as the general problem of identifying a market failure. Chapter 3 provides a brief history of the oil price shocks of the 1970s and reviews the empirical evidence on the energy security externalities laid out in Chapter 2. Chapter 4 builds on the material in Chapter 3 to critique published estimates of the overall premium associated with oil imports or oil consumption. Chapter 5 examines how the oil market has changed in the twenty years since the first oil shock of the 1970s and assesses the effect of these changes on price behavior and market efficiency. Chapters 6 and 7 focus on two sectors in which the energy security debate is being carried out through concrete policy measures: the choice of electricity generation technology and the market for transportation fuels. In Chapter 8, we summarize our assessments of potential energy security externalities and examine their implications for a variety of policy measures at the national and subnational levels. 7 figs., 11 tabs., 200 refs

  8. It’s Not New: Historical U.S. Army Security Forces Assistance Efforts

    Science.gov (United States)

    2012-12-06

    obligation.30 In a recent article published by Small Wars Journal, Kip Whittington , a research associate at the National Defense University...operations in Afghanistan, Whittington believes that building capable indigenous national security institutions meets U.S. and international security...29Ibid., 11. 30Ibid. 31Kip Whittington , “An Afghanistan Without Institutions: A World Without Rest,” Small Wars Journal 8, no. 2 (February 2012

  9. CHINA’S STRATEGY OF ENERGY SECURITY IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Xing Li

    2013-01-01

    Full Text Available U.S.recently launched strategy of rebalancing to Asia worsens the atmosphere forChina’s energy security and increases the risks for energy transportation from Africa and theMiddle East. The diversification of energy sources is a reasonable strategic choice, so the importance of the Eurasian continent forChinaincreases. Central Asia does not play anymore a supporting role in the agenda ofChina’s energy security strategy. It is rather becoming a region of major strategic importance.

  10. Recent trends in air transport sustainibility

    Energy Technology Data Exchange (ETDEWEB)

    Benito, A.; Alonso, G.

    2016-07-01

    The target of this paper is to analyse the main elements of Air Transport sustainability, studying their evolution during the last years and establishing the future prevalent trends, which might be modified by the application of the adequate policies. Air Transport sustainability is considered as integrated by five basic characteristics: physical accessibility, economic affordability, safety, security and environmental impact. Each one of them has its own influence on the development of this transportation mode and all of them are required in order to achieve a sustainable development. After defining the structural elements of the five characteristics and the corresponding quantitative indicators, the paper studies the recent evolution of such indicators and extrapolates the most likely future trends, having taken into account the most relevant limitations presently existent or potentially appearing in the near future. The most important policies being presently studied (future aircraft designs, infrastructure developments, potential safety and security new rules and tentative environmental action programs) are evaluated, considering the potential repercussions on sustainability progress. Some combinations of them are suggested as the most efficient alternatives for preserving the sustainable development of XXI century air transport. (Author)

  11. A National MagLev Transportation System

    Science.gov (United States)

    Wright, Michael R.

    2003-01-01

    The case for a national high-speed magnetic-levitation (MagLev) transportation system is presented. Focus is on current issues facing the country, such as national security, the economy, transportation, technology, and the environment. NASA s research into MagLev technology for launch assist is also highlighted. Further, current socio-cultural norms regarding motor-vehicle-based transportation systems are questioned in light of the problems currently facing the U.S. The multidisciplinary benefits of a long-distance MagLev system support the idea that such a system would be an important element of a truly multimodal U.S. transportation infrastructure.

  12. Transporting spent nuclear fuel: an overview

    International Nuclear Information System (INIS)

    1986-03-01

    Although high-level radioactive waste from both commercial and defense activities will be shipped to the repository, this booklet focuses on various aspects of transporting commercial spent fuel, which accounts for the majority of the material to be shipped. The booklet is intended to give the reader a basic understanding of the following: the reasons for transportation of spent nuclear fuel, the methods by which it is shipped, the safety and security precautions taken for its transportation, emergency response procedures in the event of an accident, and the DOE program to develop a system uniquely appropriate to NWPA transportation requirements

  13. Infant nutrition in Saskatoon: barriers to infant food security.

    Science.gov (United States)

    Partyka, Brendine; Whiting, Susan; Grunerud, Deanna; Archibald, Karen; Quennell, Kara

    2010-01-01

    We explored infant nutrition in Saskatoon by assessing current accessibility to all forms of infant nourishment, investigating challenges in terms of access to infant nutrition, and determining the use and effectiveness of infant nutrition programs and services. We also examined recommendations to improve infant food security in Saskatoon. Semi-structured community focus groups and stakeholder interviews were conducted between June 2006 and August 2006. Thematic analysis was used to identify themes related to infant feeding practices and barriers, as well as recommendations to improve infant food security in Saskatoon. Our study showed that infant food security is a concern among lower-income families in Saskatoon. Barriers that limited breastfeeding sustainability or nourishing infants through other means included knowledge of feeding practices, lack of breastfeeding support, access and affordability of infant formula, transportation, and poverty. Infant nutrition and food security should be improved by expanding education and programming opportunities, increasing breastfeeding support, and identifying acceptable ways to provide emergency formula. If infant food security is to be addressed successfully, discussion and change must occur in social policy and family food security contexts.

  14. Recommendations on Future Operational Environments Command Control and Cyber Security

    OpenAIRE

    Goztepe, Kerim

    2015-01-01

    It is a well-known fact that today a nation's telecommunication networks, critical infrastructure, and information systems are vulnerable to growing number of attacks in cyberspace. Cyber space contains very different problems involving various sets of threats, targets and costs. Cyber security is not only problem of banking, communication or transportation. It also threatens core systems of army as command control. Some significant recommendations on command control (C2) and cyber security h...

  15. 78 FR 4968 - Privacy Act of 1974, Computer Matching Program-U.S. Small Business Administration and U.S...

    Science.gov (United States)

    2013-01-23

    ... Small Business Administration (SBA) and the Department of Homeland Security, Federal Emergency... Security Officer, Office of the Chief Information Officer, Small Business Administration. Eric Won, Chief... SMALL BUSINESS ADMINISTRATION Privacy Act of 1974, Computer Matching Program--U.S. Small Business...

  16. Connected Vehicle Pilot Deployment Program phase 1 : security management operating concept : New York City : final report.

    Science.gov (United States)

    2016-05-18

    This document describes the Security Management Operating Concept (SMOC) for the New York City Department of Transportation (NYCDOT) Connected Vehicle Pilot Deployment (CVPD) Project. This SMOC outlines the security mechanisms that will be used to pr...

  17. Coal Mines Security System

    OpenAIRE

    Ankita Guhe; Shruti Deshmukh; Bhagyashree Borekar; Apoorva Kailaswar; Milind E.Rane

    2012-01-01

    Geological circumstances of mine seem to be extremely complicated and there are many hidden troubles. Coal is wrongly lifted by the musclemen from coal stocks, coal washeries, coal transfer and loading points and also in the transport routes by malfunctioning the weighing of trucks. CIL —Coal India Ltd is under the control of mafia and a large number of irregularities can be contributed to coal mafia. An Intelligent Coal Mine Security System using data acquisition method utilizes sensor, auto...

  18. Wireless Network Penetration Testing and Security Auditing

    Directory of Open Access Journals (Sweden)

    Wang Shao-Long

    2016-01-01

    Full Text Available IEEE802.11 wireless wireless networks have security issues that are vulnerable to a variety of attacks. Due to using radio to transport data, attackers can bypass firewalls, sniff sensitive information, intercept packets and send malicious packets. Security auditing and penetration testing is expected to ensure wireless networks security. The contributions of this work are analyzed the vulnerability and types of attacks pertaining to IEEE 802.11 WLAN, performed well known attacks in a laboratory environment to conduct penetration tests to confirm whether our wireless network is hackable or not. WAIDPS is configured as auditing tool to view wireless attacks, such as WEP/WPA/WPA2 cracking, rouge access points, denial of service attack. WAIDPS is designed to detect wireless intrusion with additional features. Penetration testing and auditing will mitigate the risk and threatening to protect WALN.

  19. Cyber Security and Resilient Systems

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  20. Cyber Security and Resilient Systems

    International Nuclear Information System (INIS)

    Anderson, Robert S.

    2009-01-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation's cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested - both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  1. Transweb and trafficking in illicit nuclear materials: beyond the borders of physical security

    International Nuclear Information System (INIS)

    Ballard, J.D.; Dilger, F.

    2005-01-01

    Full text: Transweb is a developing threat assessment analytical protocol that uses real time GIS based assessments (a.k.a., GTA for GIS Threat Assessment) to better understand potential trafficking in illicit nuclear materials that may come from energy related sites and/or weapons production facilities. This is not a physical security protocol nor is this program a border check format like the DOE's Second Line of Defense which is designed to detect special nuclear fuels. Transweb is a tool that allows the user to look at surreptitious transportation pathways that may be used to move illicit nuclear materials after they have already breached traditional physical security barriers and allows for movement prediction and potential mitigation/intervention if they are not traveling on the highways or railways, traversing the waterways, or entering ports equipped with detecting equipment like that deployed in Second Line of Defense program. Transweb is for the real world, a world where physical security may be breached and the smugglers that capture these materials do not follow the most traveled highways, railways, or waterways in a given society. Transweb focuses on the less obvious transportation routes that may be the most likely ways that illicit nuclear materials will be transported. Thus this program offers an additional layer of security analysis not currently in use as physical protection or as border mitigation. (author)

  2. CD147: a small molecule transporter ancillary protein at the crossroad of multiple hallmarks of cancer and metabolic reprogramming.

    Science.gov (United States)

    Kendrick, Agnieszka A; Schafer, Johnathon; Dzieciatkowska, Monika; Nemkov, Travis; D'Alessandro, Angelo; Neelakantan, Deepika; Ford, Heide L; Pearson, Chad G; Weekes, Colin D; Hansen, Kirk C; Eisenmesser, Elan Z

    2017-01-24

    Increased expression of CD147 in pancreatic cancer has been proposed to play a critical role in cancer progression via CD147 chaperone function for lactate monocarboxylate transporters (MCTs). Here, we show for the first time that CD147 interacts with membrane transporters beyond MCTs and exhibits a protective role for several of its interacting partners. CD147 prevents its interacting partner's proteasome-dependent degradation and incorrect plasma membrane localization through the CD147 transmembrane (TM) region. The interactions with transmembrane small molecule and ion transporters identified here indicate a central role of CD147 in pancreatic cancer metabolic reprogramming, particularly with respect to amino acid anabolism and calcium signaling. Importantly, CD147 genetic ablation prevents pancreatic cancer cell proliferation and tumor growth in vitro and in vivo in conjunction with metabolic rewiring towards amino acid anabolism, thus paving the way for future combined pharmacological treatments.

  3. Hazardous materials safety and security technology field operational test. Volume II, evaluation final report synthesis

    Science.gov (United States)

    2004-11-11

    The catastrophic events of September 11, 2001 and the ongoing war on terrorism have heightened the level of concern from Federal government officials and the transportation industry regarding the secure transport of hazardous materials (HAZMAT). Secu...

  4. National Security sUAS Flight Restrictions over Select Facilities - Download data

    Data.gov (United States)

    Department of Transportation — As mandated by the FAA Extension, Safety, and Security Act of 2016 the Federal Aviation Administration has established, at the request of various Government agencies...

  5. Computer Security: “Heartbleed” - a disaster for privacy

    CERN Multimedia

    Computer Security Team

    2014-01-01

    "On a scale of 1 to 10, this is an 11,” claimed the famous security expert Bruce Schneier (see here). Indeed, the serious vulnerability dubbed “Heartbleed” affects everyone who relies on secure and private Internet communication. You cannot avoid it, so let’s see how it affects you.   “Heartbleed” is the name that's been given to a vulnerability for OpenSSL (CVE-2014-0160). This software implements “the Secure Socket Layer (SSL v2/v3) and Transport Layer Security (TLS) protocols as well as a full-strength general purpose cryptography library”. SSL and TLS protocols are used to encrypt any communication between a client and a server, and to ensure that your communication is safe from eavesdropping or spying - that is, until 2012, when this bug was introduced. It allows the extraction of the first 64 kB from the memory of a server or client using OpenSSL (not necessarily web servers), and can potent...

  6. Security, privacy, and confidentiality issues on the Internet.

    Science.gov (United States)

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to 'sign' a message whereby the private key of an individual can be used to 'hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a 'digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers.

  7. Assessment of Performance Measures for Security of the Maritime Transportation Network. Port Security Metrics: Proposed Measurement of Deterrence Capability

    National Research Council Canada - National Science Library

    Hoaglund, Robert; Gazda, Walter

    2007-01-01

    The goal of this analysis is to provide ASCO and its customers with a comprehensive approach to the development of quantitative performance measures to assess security improvements to the port system...

  8. Transportation Network Topologies

    Science.gov (United States)

    Alexandrov, Natalia (Editor)

    2004-01-01

    The existing U.S. hub-and-spoke air transportation system is reaching saturation. Major aspects of the current system, such as capacity, safety, mobility, customer satisfaction, security, communications, and ecological effects, require improvements. The changing dynamics - increased presence of general aviation, unmanned autonomous vehicles, military aircraft in civil airspace as part of homeland defense - contributes to growing complexity of airspace. The system has proven remarkably resistant to change. NASA Langley Research Center and the National Institute of Aerospace conducted a workshop on Transportation Network Topologies on 9-10 December 2003 in Williamsburg, Virginia. The workshop aimed to examine the feasibility of traditional methods for complex system analysis and design as well as potential novel alternatives in application to transportation systems, identify state-of-the-art models and methods, conduct gap analysis, and thus to lay a foundation for establishing a focused research program in complex systems applied to air transportation.

  9. Organizing a complex transport while guaranteeing safety and transparency: the example of vitrified wastes sent back to Germany

    International Nuclear Information System (INIS)

    Krochmaluk, Julie; Lebrun, Marc; Delmestre, Alain; Barbey, Pierre; Bonvalot, Vanessa; Belleville, Didier; Rollinger, Patrice; Alter, Ulrich

    2012-01-01

    This chapter is made of several small articles entitled: - 'Les controles avant le depart du convoi franco-allemand' (Controls before the departure of the French-German convoy); - 'La supervision des transports de matieres radioactives: une approche extensive de la surete des operations' (The supervision of radioactive material transports: an extended approach of operation safety); - 'Le dispositif d'information du public sur le transport des substances radioactives mis en place par l'ASN' (The plan implemented by the ASN for public information on nuclear materials transport); - 'Le recours de l'ASN a l'expertise de l'ACRO sur le convoi de colis de dechets vitrifies vers l'Allemagne' (The appeal of the ASN to the ACRO's expertise on the vitrified parcel convoy to Germany); - 'La participation du collectif STOP-EPR a l'inspection de l'ASN du convoi de colis de dechets vitrifies vers l'Allemagne' (The participation of the STOP-EPR collective to the control by the ASN of the vitrified parcel convoy to Germany); - 'La securite et la surete: des valeurs que le Groupe SNCF partage' (Security and safety: values which are shared by the SNCF Group); - 'Le transport de matieres nucleaires entre la France et l'Allemagne au cours des 40 dernieres annees' (Transport of nuclear materials between France and Germany during the last 40 years). Addressing the case of vitrified wastes transported back to Germany, the articles indicate the controls performed in France before convoy departure, discuss the approach adopted for the safety of radioactive material transport, comment the management of public information by the ASN for such transports, comment the intervention of the ACRO (Association for the control of radioactivity in western France) on the request of the ASN and the participation of a collective group (STOP-EPR) to the inspection of a convoy, outline the commitment of the French Railways (SNCF) in terms of security and safety, and give a qualitative and quantitative

  10. VTrans Small Culvert Inventory - Culverts

    Data.gov (United States)

    Vermont Center for Geographic Information — Vermont Agency of Transportation Small Culvert Inventory: Culverts. This data contains small culverts locations along VTrans maintained roadways. The data was...

  11. Fluid transport with time on peritoneal dialysis: the contribution of free water transport and solute coupled water transport

    NARCIS (Netherlands)

    Coester, Annemieke M.; Smit, Watske; Struijk, Dirk G.; Krediet, Raymond T.

    2009-01-01

    Ultrafiltration in peritoneal dialysis occurs through endothelial water channels (free water transport) and together with solutes across small pores: solute coupled water transport. A review is given of cross-sectional studies and on the results of longitudinal follow-up

  12. Kinetics of transmembrane transport of small molecules into electropermeabilized cells.

    Science.gov (United States)

    Pucihar, Gorazd; Kotnik, Tadej; Miklavcic, Damijan; Teissié, Justin

    2008-09-15

    The transport of propidium iodide into electropermeabilized Chinese hamster ovary cells was monitored with a photomultiplier tube during and after the electric pulse. The influence of pulse amplitude and duration on the transport kinetics was investigated with time resolutions from 200 ns to 4 ms in intervals from 400 micros to 8 s. The transport became detectable as early as 60 micros after the start of the pulse, continued for tens of seconds after the pulse, and was faster and larger for higher pulse amplitudes and/or longer pulse durations. With fixed pulse parameters, transport into confluent monolayers of cells was slower than transport into suspended cells. Different time courses of fluorescence increase were observed during and at various times after the pulse, reflecting different transport mechanisms and ongoing membrane resealing. The data were compared to theoretical predictions of the Nernst-Planck equation. After a delay of 60 micros, the time course of fluorescence during the pulse was approximately linear, supporting a mainly electrophoretic solution of the Nernst-Planck equation. The time course after the pulse agreed with diffusional solution of the Nernst-Planck equation if the membrane resealing was assumed to consist of three distinct components, with time constants in the range of tens of microseconds, hundreds of microseconds, and tens of seconds, respectively.

  13. A deeper look at climate change and national security.

    Energy Technology Data Exchange (ETDEWEB)

    Baker, Arnold Barry; Backus, George A.; Romig, Alton Dale, Jr.

    2010-03-01

    Climate change is a long-term process that will trigger a range of multi-dimensional demographic, economic, geopolitical, and national security issues with many unknowns and significant uncertainties. At first glance, climate-change-related national security dimensions seem far removed from today's major national security threats. Yet climate change has already set in motion forces that will require U.S. attention and preparedness. The extent and uncertainty associated with these situations necessitate a move away from conventional security practices, toward a small but flexible portfolio of assets to maintain U.S. interests. Thoughtful action is required now if we are to acquire the capabilities, tools, systems, and institutions needed to meet U.S. national security requirements as they evolve with the emerging stresses and shifts of climate change.

  14. Impact of electro-magnetic stabilization, small- scale turbulence and multi-scale interactions on heat transport in JET

    Science.gov (United States)

    Mantica, Paola

    2016-10-01

    Heat transport experiments in JET, based on ICRH heat flux scans and temperature modulation, have confirmed the importance of two transport mechanisms that are often neglected in modeling experimental results, but are crucial to reach agreement between theory and experiment and may be significant in ITER. The first mechanism is the stabilizing effect of the total pressure gradient (including fast ions) on ITG driven ion heat transport. Such stabilization is found in non-linear gyro-kinetic electro-magnetic simulations using GENE and GYRO, and is the explanation for the observed loss of ion stiffness in the core of high NBI-power JET plasmas. The effect was recently observed also in JET plasmas with dominant ICRH heating and small rotation, due to ICRH fast ions, which is promising for ITER. Such mechanism dominates over ExB flow shear in the core and needs to be included in quasi-linear models to increase their ability to capture the relevant physics. The second mechanism is the capability of small- scale ETG instabilities to carry a significant fraction of electron heat. A decrease in Te peaking is observed when decreasing Zeff Te/Ti, which cannot be ascribed to TEMs but is in line with ETGs. Non-linear GENE single-scale simulations of ETGs and ITG/TEMs show that the ITG/TEM electron heat flux is not enough to match experiment. TEM stiffness is also much lower than measured. In the ETG single scale simulations the external flow shear is used to saturate the ETG streamers. Multi-scale simulations are ongoing, in which the ion zonal flows are the main saturating mechanism for ETGs. These costly simulations should provide the final answer on the importance of ETG-driven electron heat flux in JET. with JET contributors [F.Romanelli, Proc.25thIAEA FEC]. Supported by EUROfusion Grant 633053.

  15. E-Commerce and Security Governance in Developing Countries

    Science.gov (United States)

    Sanayei, Ali.; Rajabion, Lila

    Security is very often mentioned as one of the preconditions for the faster growth of e-commerce. Without a secure and reliable internet, customer will continue to be reluctant to provide confidential information online, such as credit card number. Moreover, organizations of all types and sizes around the world rely heavily on technologies of electronic commerce (e-commerce) for conducting their day-to-day business transaction. Providing organizations with a secure e-commerce environment is a major issue and challenging one especially in Middle Eastern countries. Without secure e-commerce, it is almost impossible to take advantage of the opportunities offered by e-commerce technologies. E-commerce can create opportunities for small entrepreneurs in Middle Eastern countries. This requires removing infrastructure blockages in telecommunications and logistics alongside the governance of e-commerce with policies on consumer protection, security of transactions, privacy of records and intellectual property. In this paper, we will explore the legal implications of e-commerce security governance by establishing who is responsible for ensuring compliance with this discipline, demonstrating the value to be derived from information security governance, the methodology of applying information security governance, and liability for non-compliance with this discipline. Our main focus will be on analyzing the importance and implication of e-commerce security governance in developing countries.

  16. Fire and explosion security in the petroleum sector

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    The conference has 12 presentations on topics regarding fire fighting, explosions and development scenarios, safety and security aspects, management of safety issues and measures and preparedness. Some accidents and fires are discussed. Some important problems with LNG with respects to plants, transport, fires and risk assessment are presented.

  17. Threats to financial system security

    Energy Technology Data Exchange (ETDEWEB)

    McGovern, D.E.

    1997-06-01

    The financial system in the United States is slowly migrating from the bricks and mortar of banks on the city square to branch banks, ATM`s, and now direct linkage through computers to the home. Much work has been devoted to the security problems inherent in protecting property and people. The impact of attacks on the information aspects of the financial system has, however, received less attention. Awareness is raised through publicized events such as the junk bond fraud perpetrated by Milken or gross mismanagement in the failure of the Barings Bank through unsupervised trading activities by Leeson in Singapore. These events, although seemingly large (financial losses may be on the order of several billion dollars), are but small contributors to the estimated $114 billion loss to all types of financial fraud in 1993. Most of the losses can be traced to the contribution of many small attacks perpetrated against a variety of vulnerable components and systems. This paper explores the magnitude of these financial system losses and identifies new areas for security to be applied to high consequence events.

  18. IAEA Completes Nuclear Security Advisory Mission in Ecuador

    International Nuclear Information System (INIS)

    2018-01-01

    An International Atomic Energy Agency (IAEA) team of experts today completed a nuclear security advisory mission in Ecuador. The mission was carried out at the request of the Government of Ecuador. The scope of the two-week International Physical Protection Advisory Service (IPPAS) mission included the legislative and regulatory framework for the security of radioactive material, regulatory licensing, inspection and enforcement as well as coordination among authorities and other stakeholders involved in nuclear security. In September 2017, Ecuador ratified the 2005 Amendment to the Convention on the Physical Protection of Nuclear Material (CPPNM) and its incorporation into the nuclear security regime was also included in the scope of the mission. The IPPAS team carried out a number of visits, including to a steel company that uses gamma radiography, two hospitals, the National Polytechnic University and a company that transports radioactive material. In addition, the team visited a temporary storage facility for disused radioactive sources in Alóag, a town about 50 km south of the capital, Quito. The team observed that Ecuador is making efforts towards enhancing its national nuclear security regime. The team provided recommendations and suggestions to support Ecuador in enhancing and sustaining nuclear security. Good practices were identified that can serve as examples to other IAEA Member States to help strengthen their nuclear security activities.

  19. Cyber Security Scenarios and Control for Small and Medium Enterprises

    OpenAIRE

    Nilaykumar Kiran SANGANI; Balakrishnan VIJAYAKUMAR

    2012-01-01

    As the world advances towards the computing era, security threats keeps on increasing in the form of malware, viruses, internet attack, theft of IS assets / technology and a lot more. This is a major concern for any form of business. Loss in company’s status / liability / reputation is a huge downfall for a running business. We have witnessed the attacks getting carried out; large firm’s data getting breached / government bodies’ sites getting phished / attacked. These huge entities hav...

  20. Chosen Ciphertext Security with Optimal Ciphertext Overhead

    Science.gov (United States)

    Abe, Masayuki; Kiltz, Eike; Okamoto, Tatsuaki

    Every public-key encryption scheme has to incorporate a certain amount of randomness into its ciphertexts to provide semantic security against chosen ciphertext attacks (IND-CCA). The difference between the length of a ciphertext and the embedded message is called the ciphertext overhead. While a generic brute-force adversary running in 2t steps gives a theoretical lower bound of t bits on the ciphertext overhead for IND-CPA security, the best known IND-CCA secure schemes demand roughly 2t bits even in the random oracle model. Is the t-bit gap essential for achieving IND-CCA security? We close the gap by proposing an IND-CCA secure scheme whose ciphertext overhead matches the generic lower bound up to a small constant. Our scheme uses a variation of a four-round Feistel network in the random oracle model and hence belongs to the family of OAEP-based schemes. Maybe of independent interest is a new efficient method to encrypt long messages exceeding the length of the permutation while retaining the minimal overhead.