WorldWideScience

Sample records for stability enhancing security

  1. FINANCIAL STABILITY AS A FACTOR ECONOMIC SECURITY

    Directory of Open Access Journals (Sweden)

    A. V. Endovitskaya

    2015-01-01

    Full Text Available Summary. The article examines the linkages between financial stability and the level of its economic security. Considered the content of financial stability, represented by its own definition, we studied the basic conditions to achieve it. The logic diagram showing the location of financial stability and financial security to ensure the economic security of the business entity. A system of internal and external factors affecting the financial stability and endanger financial stability and financial security company. It has been established that it is the internal factors such as the availability of financial resources and financial position, capital structure, the company's ability to generate profits determine the level of economic security and its ability to withstand the negative impact of external and internal threats. The necessity of improving the financial sustainability in order to improve the economic security of the enterprise. On the basis of the research proposed matrix of risks affecting the financial stability and economic security, which allows to determine the probability of their occurrence and impact. It presents the economic, social, human, financial, organizational, economic, innovative and productive tools to increase the stability and financial security of an economic entity. List considered standard measures will make a plan of action to minimize the adverse impacts and enhance financial stability and security. Therefore, a prerequisite for the economic security of the enterprise is the attainment of financial stability.

  2. Measuring Stability and Security in Iraq

    National Research Council Canada - National Science Library

    2006-01-01

    ... of the report, "Stability and Security in Iraq," describes trends and progress towards meeting goals for political stability, strengthening economic activity, and achieving a stable security environment in Iraq...

  3. Measuring Stability and Security in Iraq

    National Research Council Canada - National Science Library

    2005-01-01

    .... The initial section of the report, "Stability and Security in Iraq," describes trends and progress towards meeting goals for political stability, economic progress, and achieving a stable security environment in Iraq...

  4. Security Analysis and the Contribution of UPFC for Improving Voltage Stability

    Directory of Open Access Journals (Sweden)

    Asma Meddeb

    2018-02-01

    Full Text Available The occurrence of many failures in the power system can lead to power instability and affects the system parameters to go beyond its operating limits. It may lead to obstructing the secure operations and reliability of power systems. Ensuring power system security needs proper actions to be taken for the undesirable contingency. Thus, security analysis is important tasks in modern energy management systems. This paper proposes an approach based on the Newton Raphson power flow method for power system security analysis. Firstly, the contingencies will be specified to assess their impact on the transient stability. Secondly, the selected contingencies will be classified in the order of severity. In addition, the integration of the Unified Power Flow Controller (UPFC to enhance the transient stability of the power system is considered. The proposed method is implemented on the IEEE-14 bus system. We performed this case study using the well-known software EUROSTAG.

  5. Measuring Stability and Security in Iraq

    National Research Council Canada - National Science Library

    2006-01-01

    .... The first section of the report, Stability and Security in Iraq, describes trends and progress towards meeting goals for political stability, strengthening economic activity, and achieving a stable...

  6. Safety, Security, and Stability: The Role of Nuclear Control Regimes in a Proliferated World

    National Research Council Canada - National Science Library

    Collins, James

    1995-01-01

    ... with developing and deploying nuclear weapons. The US, in the past, has refused to provide technical assistance to enhance the safety, security, and stability of proliferating countries' nuclear arsenals-we believe this policy...

  7. Power system security enhancement through direct non-disruptive load control

    Science.gov (United States)

    Ramanathan, Badri Narayanan

    The transition to a competitive market structure raises significant concerns regarding reliability of the power grid. A need to build tools for security assessment that produce operating limit boundaries for both static and dynamic contingencies is recognized. Besides, an increase in overall uncertainty in operating conditions makes corrective actions at times ineffective leaving the system vulnerable to instability. The tools that are in place for stability enhancement are mostly corrective and suffer from lack of robustness to operating condition changes. They often pose serious coordination challenges. With deregulation, there have also been ownership and responsibility issues associated with stability controls. However, the changing utility business model and the developments in enabling technologies such as two-way communication, metering, and control open up several new possibilities for power system security enhancement. This research proposes preventive modulation of selected loads through direct control for power system security enhancement. Two main contributions of this research are the following: development of an analysis framework and two conceptually different analysis approaches for load modulation to enhance oscillatory stability, and the development and study of algorithms for real-time modulation of thermostatic loads. The underlying analysis framework is based on the Structured Singular Value (SSV or mu) theory. Based on the above framework, two fundamentally different approaches towards analysis of the amount of load modulation for desired stability performance have been developed. Both the approaches have been tested on two different test systems: CIGRE Nordic test system and an equivalent of the Western Electric Coordinating Council test system. This research also develops algorithms for real-time modulation of thermostatic loads that use the results of the analysis. In line with some recent load management programs executed by utilities, two

  8. Analyzing Security-Enhanced Linux Policy Specifications

    National Research Council Canada - National Science Library

    Archer, Myla

    2003-01-01

    NSA's Security-Enhanced (SE) Linux enhances Linux by providing a specification language for security policies and a Flask-like architecture with a security server for enforcing policies defined in the language...

  9. Measuring Stability and Security in Iraq

    National Research Council Canada - National Science Library

    2007-01-01

    ... 1308 of Public Law 110-28. The report includes specific performance indicators and measures of progress toward political, economic, and security stability in Iraq, as directed in that legislation...

  10. Measuring Stability and Security in Iraq

    National Research Council Canada - National Science Library

    2007-01-01

    This report to Congress, Measuring Stability and Security in Iraq, is submitted pursuant to Section 9010 of the Department of Defense Appropriations Act 2007, Public Law 109-289 as amended by Section...

  11. Enhancing Security and Stability in Afghanistan

    Science.gov (United States)

    2015-12-01

    Helmand and Kandahar, were as expected, but the ANDSF were also forced to confront insecurity at a higher level than expected in other parts of the...creating a sense of insecurity that undercuts perceptions of the Afghan government’s ability to provide security. The increase in violence over the...able to defeat the ANDSF on the battlefield in 2016, countering insurgent propaganda will remain a challenge as the insurgents advertise the perceived

  12. Using digital watermarking to enhance security in wireless medical image transmission.

    Science.gov (United States)

    Giakoumaki, Aggeliki; Perakis, Konstantinos; Banitsas, Konstantinos; Giokas, Konstantinos; Tachakra, Sapal; Koutsouris, Dimitris

    2010-04-01

    During the last few years, wireless networks have been increasingly used both inside hospitals and in patients' homes to transmit medical information. In general, wireless networks suffer from decreased security. However, digital watermarking can be used to secure medical information. In this study, we focused on combining wireless transmission and digital watermarking technologies to better secure the transmission of medical images within and outside the hospital. We utilized an integrated system comprising the wireless network and the digital watermarking module to conduct a series of tests. The test results were evaluated by medical consultants. They concluded that the images suffered no visible quality degradation and maintained their diagnostic integrity. The proposed integrated system presented reasonable stability, and its performance was comparable to that of a fixed network. This system can enhance security during the transmission of medical images through a wireless channel.

  13. Enhancing implementation security of QKD

    Science.gov (United States)

    Tamaki, Kiyoshi

    2017-10-01

    Quantum key distribution (QKD) can achieve information-theoretic security, which is a provable security against any eavesdropping, given that all the devices the sender and the receiver employ operate exactly as the theory of security requires. Unfortunately, however, it is difficult for practical devices to meet all such requirements, and therefore more works have to be done toward guaranteeing information-theoretic security in practice, i.e., implementation security. In this paper, we review our recent efforts to enhance implementation security. We also have a brief look at a flaw in security proofs and present how to fix it.

  14. Measuring Stability and Security in Iraq

    National Research Council Canada - National Science Library

    2008-01-01

    ... 1308 of Public Law 110-28 and Section 1224 of Public Law 110-181.1 The report includes specific performance indicators and measures of progress toward political, economic, and security stability in Iraq, as directed in that legislation...

  15. Measuring Stability and Security in Iraq

    National Research Council Canada - National Science Library

    2008-01-01

    ... by Section 1308 of Public Law 110-28 and Section 1224 of Public Law 110-181. The report includes specific performance indicators and measures of progress toward political, economic, and security stability in Iraq, as directed in that legislation...

  16. Congestion management enhancing transient stability of power systems

    International Nuclear Information System (INIS)

    Esmaili, Masoud; Shayanfar, Heidar Ali; Amjady, Nima

    2010-01-01

    In a competitive electricity market, where market parties try to maximize their profits, it is necessary to keep an acceptable level of power system security to retain the continuity of electricity services to customers at a reasonable cost. Congestion in a power system is turned up due to network limits. After relieving congestion, the network may be operated with a reduced transient stability margin because of increasing the contribution of risky participants. In this paper, a novel congestion management method based on a new transient stability criterion is introduced. Using the sensitivity of corrected transient stability margin with respect to generations and demands, the proposed method so alleviates the congestion that the network can more retain its transient security compared with earlier methods. The proposed transient stability index is constructed considering the likelihood of credible faults. Indeed, market parties participate by their security-effective bids rather than raw bids. Results of testing the proposed method along with the earlier ones on the New-England test system elaborate the efficiency of the proposed method from the viewpoint of providing a better transient stability margin with a lower security cost. (author)

  17. Security and Stability in Africa: A Development Approach

    Science.gov (United States)

    2010-01-01

    Dar el Salaam in 1998, and against Israeli interests in Kenya in 2002. Wars, lawlessness, and corruption have also fostered international crime on...operations are an important way for military forces to foster stability and security through economic and political development. These operations show...security and exports of unwisely breaking up large commercial farms. Within families, such dualism also exists, which is a legacy of colonial policies

  18. Development and analysis of security policies in security enhanced Android

    OpenAIRE

    Rimando, Ryan A.

    2012-01-01

    Approved for public release; distribution is unlimited. This thesis examines Security Enhanced Android. Both its policy and its additional security features are explored. The policy is examined in depth, providing a better understanding of the security provided by SE Android. We analyze the default SE Android policy. We identify a potential weakness and change the policy to facilitate control over communication channels. A proof-of-concept set of applications is developed to demonstrate ho...

  19. Stability, Security, Transition and Reconstruction Operations Conference

    Science.gov (United States)

    2010-12-16

    integration and measureable outcome of security, stability and prosperity. Introduction 4 • Background • Nature of Non-permissive environments...stage, And all the men and women merely players – William Shakespeare • Sharing the Experience • Reinventing the wheel 11 Conclusion – The

  20. Enhanced security in the nuclear industry

    International Nuclear Information System (INIS)

    Frappier, G.

    2007-01-01

    This article describes the security in the nuclear industry. After 9/11, Canada's nuclear regulator - the Canadian Nuclear Safety Commission (CNSC) - determined that the entire industry (including its own organization) faced a need for significant enhancements in their approach to security.

  1. CAR SECURITY ENHANCEMENT IN PARKING AREAS

    OpenAIRE

    NANYONGA BERINDA; AYESIGA LINDSEY PATRA; BYEKWASO FAISAL; NATULINDA LADAN

    2017-01-01

    Over time, car thefts have been reported within Kampala parking areas. This has been majorly due to inefficient security measures of the available parking systems which focus mainly on the car and not the driver, making parking management a challenge. The focus of this survey was to explore the requirements of a new system called Car to Driver Matching Security System to enhance security of cars in Kampala, in particular, from the experience of 15 people. The data collected was then analyzed ...

  2. Application of the Concept of Intrusion Tolerant System for Evaluating Cyber Security Enhancements

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Chanyoung; Seong, Poong Hyun [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    One of the major problems is that nuclear industry is in very early stage in dealing with cyber security issues. It is because that cyber security has received less attention compared to other safety problems. In addition, late adoption of digital I and C systems has resulted in lower level of cyber security advancements in nuclear industry than ones in other industries. For the cyber security of NPP I and C systems, many regulatory documents, guides and standards were already published. These documents include cyber security plans, methods for cyber security assessments and comprehensive set of security controls. However, methods which can help assess how much security is improved if a specific security control is applied are not included in these documents. Hence, NPP I and C system designers may encounter difficulties when trying to apply security controls with limited structure and cost. In order to provide useful information about cyber security issues including cyber security enhancements, this paper suggests a framework to evaluate how much cyber security is improved when a specific cyber security enhancement is applied in NPPs. In order to provide useful information about cyber security issues including cyber security enhancements, this paper suggests a framework to evaluate how much cyber security is improved when a specific cyber security enhancement is applied in NPPs. The extent of cyber security improvement caused by security enhancement was defined as reduction ratio of the failure probability to secure the system from cyber-attack as Eq.1. The concept of 'intrusion tolerant system' was applied to not only prevent cyber-attacks but also limit the extent of damage in this study. For applying the concept of intrusion tolerant system to NPP, the event tree was constructed with some assumptions. Cyber security improvement caused by cyber security enhancement can be estimated as Eq.3. By comparing current system to the enhanced system, it is

  3. Application of the Concept of Intrusion Tolerant System for Evaluating Cyber Security Enhancements

    International Nuclear Information System (INIS)

    Lee, Chanyoung; Seong, Poong Hyun

    2016-01-01

    One of the major problems is that nuclear industry is in very early stage in dealing with cyber security issues. It is because that cyber security has received less attention compared to other safety problems. In addition, late adoption of digital I and C systems has resulted in lower level of cyber security advancements in nuclear industry than ones in other industries. For the cyber security of NPP I and C systems, many regulatory documents, guides and standards were already published. These documents include cyber security plans, methods for cyber security assessments and comprehensive set of security controls. However, methods which can help assess how much security is improved if a specific security control is applied are not included in these documents. Hence, NPP I and C system designers may encounter difficulties when trying to apply security controls with limited structure and cost. In order to provide useful information about cyber security issues including cyber security enhancements, this paper suggests a framework to evaluate how much cyber security is improved when a specific cyber security enhancement is applied in NPPs. In order to provide useful information about cyber security issues including cyber security enhancements, this paper suggests a framework to evaluate how much cyber security is improved when a specific cyber security enhancement is applied in NPPs. The extent of cyber security improvement caused by security enhancement was defined as reduction ratio of the failure probability to secure the system from cyber-attack as Eq.1. The concept of 'intrusion tolerant system' was applied to not only prevent cyber-attacks but also limit the extent of damage in this study. For applying the concept of intrusion tolerant system to NPP, the event tree was constructed with some assumptions. Cyber security improvement caused by cyber security enhancement can be estimated as Eq.3. By comparing current system to the enhanced system, it is possible to

  4. Modeling Security-Enhanced Linux Policy Specifications for Analysis (Preprint)

    National Research Council Canada - National Science Library

    Archer, Myla; Leonard, Elizabeth; Pradella, Matteo

    2003-01-01

    Security-Enhanced (SE) Linux is a modification of Linux initially released by NSA in January 2001 that provides a language for specifying Linux security policies and, as in the Flask architecture, a security server...

  5. Civil-military relations : enhancing international security

    OpenAIRE

    Fekete, Florian

    2003-01-01

    Approved for public release; distribution is unlimited The thesis describes how civil-military relations at the international level enhance international security, in particular, the way of development of international society in trying to orient its progress towards international peace, security and sustainable development. It focuses upon civil-military relationships in the League of Nations and the United Nations, the North Atlantic Treaty Organization, The International Committee of Re...

  6. An assessment of the effectiveness of fuel cycle technologies for the national energy security enhancement in the electricity sector

    International Nuclear Information System (INIS)

    Kim, Hyun Jun; Jun, Eunju; Chang, Soon Heung; Kim, Won Joon

    2009-01-01

    Energy security, in the 21st century, draws significant attention in most countries worldwide, because the national security and sustainable development depend largely on energy security. The anticipated fossil energy depletion and the instability of their supply drive many countries to consider nuclear energy as their alternative energy source for the enhancement of their national energy security. In this study, indicators measuring the level of energy security in the electric power sector are developed and applied for the assessment of the effectiveness of four electric power system schemes which deploy different nuclear fuel cycle technologies, with consideration for the diversification of the energy markets and the vulnerability to economic disruption. Results show that the contribution of the closed fuel cycle scheme is larger than the once-through fuel cycle scheme in the perspective of energy security. In addition, the completely closed fuel cycle with the spent fuel recycling enhances the national energy security to the maximum extent compared to all other fuel cycle schemes. Since a completely closed fuel cycle is hardly affected by the uranium price changes, this scheme is found to be the most favorable scheme, ensuring the stable profit of utilities and stabilizing the electricity tariff. In addition, the completely closed fuel cycle scheme provides the best enhancement of national energy security with respect to energy supply, under reasonable price conditions. The indicators developed in this study can be utilized as a useful instrument for the measurement of the level of the energy security, especially by the countries importing energy resources for the generation of electric power.

  7. Mother-Child Attachment From Infancy to the Preschool Years: Predicting Security and Stability.

    Science.gov (United States)

    Meins, Elizabeth; Bureau, Jean-François; Fernyhough, Charles

    2018-05-01

    Relations between maternal mind-mindedness (appropriate and nonattuned mind-related comments), children's age-2 perspective-taking abilities, and attachment security at 44 (n = 165) and 51 (n = 128) months were investigated. Nonattuned comments predicted insecure preschool attachment, via insecure 15-month attachment security (44-month attachment) and poorer age-2 perspective-taking abilities (51-month attachment). With regard to attachment stability, higher perspective-taking abilities distinguished the stable secure groups from (a) the stable insecure groups and (b) children who changed from secure to insecure (at trend level). These effects were independent of child gender, stressful life events, and socioeconomic status (SES). The contribution of these findings to our understanding of stability and change in attachment security from infancy to the preschool years is discussed. © 2017 The Authors. Child Development © 2017 Society for Research in Child Development, Inc.

  8. 75 FR 37971 - Providing Stability and Security for Medicare Reimbursements

    Science.gov (United States)

    2010-06-30

    ... Part IV The President Memorandum of June 25, 2010--Providing Stability and Security for Medicare Reimbursements #0; #0; #0; Presidential Documents #0; #0; #0;#0;Federal Register / Vol. 75, No. 125 / Wednesday...

  9. USign--a security enhanced electronic consent model.

    Science.gov (United States)

    Li, Yanyan; Xie, Mengjun; Bian, Jiang

    2014-01-01

    Electronic consent becomes increasingly popular in the healthcare sector given the many benefits it provides. However, security concerns, e.g., how to verify the identity of a person who is remotely accessing the electronic consent system in a secure and user-friendly manner, also arise along with the popularity of electronic consent. Unfortunately, existing electronic consent systems do not pay sufficient attention to those issues. They mainly rely on conventional password based authentication to verify the identity of an electronic consent user, which is far from being sufficient given that identity theft threat is real and significant in reality. In this paper, we present a security enhanced electronic consent model called USign. USign enhances the identity protection and authentication for electronic consent systems by leveraging handwritten signatures everyone is familiar with and mobile computing technologies that are becoming ubiquitous. We developed a prototype of USign and conducted preliminary evaluation on accuracy and usability of signature verification. Our experimental results show the feasibility of the proposed model.

  10. Security assurances and regional stability

    International Nuclear Information System (INIS)

    Sanders, B.

    1995-01-01

    This paper discusses whether and how security assurances affect political stability in geographic regions. Before embarking on what is necessarily a limited analysis of a complex subject, I point out that the subject is by no means new. For centuries, vast areas of the world have been affected by forces used against them by more powerful States, which at one time or another incorporated large parts of them into overseas colonies or contiguous empires. The new factors are the emancipation of those areas into independent regions, made up of States that play their own parts in international affairs, and the possession by a handful of Powers, outside or on the edge of those regions, of a specific form of superior force: nuclear weapons. (author)

  11. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    International Nuclear Information System (INIS)

    Rogers, E.; deBoer, G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-01-01

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC and A). Though MPC and A systems can significantly upgrade nuclear security, they do not eliminate the 'human factor.' Gen. Eugene Habiger, a former 'Assistant Secretary for Safeguards and Security' at the U.S. Department of Energy's (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that 'good security is 20% equipment and 80% people.' Although eliminating the 'human factor' is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  12. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Rogers,E.; deBoer,G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  13. Secure Handshake in Wi-Fi Connection (A Secure and Enhanced Communication Protocol)

    OpenAIRE

    Ranbir Sinha; Nishant Behar; Devendra Singh

    2012-01-01

    This paper presents a concept of enhancing the security in wireless communication. A Computer Network is an interconnected group of autonomous computing nodes, which use a well-defined, mutually agreed set of rules and conventions known as protocols, interact with one-another meaningfully and allow resource sharing preferably in a predictable and controllable manner. Communication has a major impact on today’s business. It is desired to communicate data with high security. These days wireless...

  14. An Enhanced Vigenere Cipher For Data Security

    Directory of Open Access Journals (Sweden)

    Aized Amin Soofi

    2015-08-01

    Full Text Available In todays world the amount of data that is exchanged has increased in the last few years so securing the information has become a crucial task. Cryptography is an art of converting plain text message into unreadable message. Encryption algorithms play an important role in information security systems. Encryption is considered as one of the most powerful tool for secure transmission of data over the communication network. Vigenere technique is an example of polyalphabetic stream cipher it has various limitations such as Kasiski and Friedman attack to find the length of encryption key. In this paper an enhanced version of traditional vigenere cipher has been proposed that eliminates the chances of Kaisiski and Friedman attack. Proposed technique also provides better security against cryptanalysis and pattern prediction.

  15. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Crawford,C.; de Boer,G.; De Castro, K; Landers, Ph.D., J; Rogers, E

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." This paper will describe some of the key elements of a comprehensive, sustainable nuclear security culture enhancement program and how implementation can mitigate the insider threat.

  16. Brief analysis of Jiangsu grid security and stability based on multi-infeed DC index in power system

    Science.gov (United States)

    Zhang, Wenjia; Wang, Quanquan; Ge, Yi; Huang, Junhui; Chen, Zhengfang

    2018-02-01

    The impact of Multi-infeed HVDC has gradually increased to security and stability operating in Jiangsu power grid. In this paper, an appraisal method of Multi-infeed HVDC power grid security and stability is raised with Multi-Infeed Effective Short Circuit Ratio, Multi-Infeed Interaction Factor and Commutation Failure Immunity Index. These indices are adopted in security and stability simulating calculation of Jiangsu Multi-infeed HVDC system. The simulation results indicate that Jiangsu power grid is operating with a strong DC system. It has high level of power grid security and stability, and meet the safety running requirements. Jinpin-Suzhou DC system is located in the receiving end with huge capacity, which is easily leading to commutation failure of the transmission line. In order to resolve this problem, dynamic reactive power compensation can be applied in power grid near Jinpin-Suzhou DC system. Simulation result shows this method is feasible to commutation failure.

  17. Strategy to Enhance International Supply Chain Security

    National Research Council Canada - National Science Library

    2007-01-01

    .... at 1901, 1903, October 13, 2006) which require the development of a strategic plan to enhance the security of the international supply chain, including protocols for the expeditious resumption of the flow of trade following...

  18. Friendship Security, But Not Friendship Intimacy, Moderates the Stability of Anxiety During Preadolescence.

    Science.gov (United States)

    Wood, Megan A; Bukowski, William M; Santo, Jonathan B

    2017-01-01

    A two-wave longitudinal study of 380 preadolescents (M age = 10.87) from largely middle-class schools in Montréal, Québec, Canada, assessed the hypothesis that friendship security, but not friendship intimacy, moderates the stability of anxiety during adolescence. This central but largely overlooked question about peer relations concerns which aspects of friendship account for the effects of friendship on emotional adjustment. Anxiety and friendship quality were measured via self-report questionnaires, employing the Network of Relationships Inventory for security and intimacy items. An index of friendship durability, which combined reciprocity and stability within first- and second-best friendship choices, was derived from sociometric measures. A latent variable path analysis examined with structural equation modeling showed that anxiety was less stable for children who perceived their friendships as secure. The moderating effect of intimacy was statistically nonsignificant. A follow-up analysis showed that the effects of security did not result from friendship durability. These findings provide support for the long-standing but previously unaddressed hypothesis that security, rather than intimacy, accounts for friendship's effect on anxiety reduction during early adolescence.

  19. Noise Enhanced Stability

    International Nuclear Information System (INIS)

    Spagnolo, B.; Agudov, N.V.; Dubkov, A.A.

    2004-01-01

    The noise can stabilize a fluctuating or a periodically driven metastable state in such a way that the system remains in this state for a longer time than in the absence of white noise. This is the noise enhanced stability phenomenon, observed experimentally and numerically in different physical systems. After shortly reviewing all the physical systems where the phenomenon was observed, the theoretical approaches used to explain the effect are presented. Specifically the conditions to observe the effect in systems: (a) with periodical driving force, and (b) with random dichotomous driving force, are discussed. In case (b) we review the analytical results concerning the mean first passage time and the nonlinear relaxation time as a function of the white noise intensity, the parameters of the potential barrier, and of the dichotomous noise. (author)

  20. Genetic Moderation of Stability in Attachment Security from Early Childhood to Age 18 Years: A Replication Study

    Science.gov (United States)

    Raby, K. Lee; Roisman, Glenn I.; Booth-LaForce, Cathryn

    2015-01-01

    A longstanding question for attachment theory and research is whether genetically based characteristics of the child influence the development of attachment security and its stability over time. This study attempted to replicate and extend recent findings indicating that the developmental stability of attachment security is moderated by oxytocin…

  1. A case for avoiding security-enhanced HTTP tools to improve security for Web-based applications

    Energy Technology Data Exchange (ETDEWEB)

    Wood, B.

    1996-03-01

    This paper describes some of the general weaknesses of the current popular Hypertext Transmission Protocol (HTTP) security standards and products in an effort to show that these standards are not appealing for many applications. The author will then show how one can treat HTTP browsers and servers as untrusted elements in the network so that one can rely on other mechanisms to achieve better overall security than can be attained through today`s security-enhanced HTTP tools.

  2. Transportation Security : federal action needed to enhance security efforts : statement of Peter Guerrero, Director, Physical Infrastructure Issues

    Science.gov (United States)

    2003-09-09

    Mr. Guerrero's testimony examines (1) challenges in securing the nation's transportation system; (2) actions transportation operators, as well as state and local governments, have taken since September 11 to enhance security; (3) the federal role in ...

  3. The Stability and the Security of the Tangle

    OpenAIRE

    Bramas , Quentin

    2018-01-01

    In this paper we study the stability and the security of the Tangle, which is the distributed data structure at the base of the IOTA protocol. The contribution of this paper is twofold. Firstly we present simple model to analyze the Tangle and give the first formal analyzes of the average number of unconfirmed transactions and the average confirmation time of a transaction. Secondly we define the notion of assiduous honest majority that captures the fact that the honest nodes have more hashin...

  4. Communications and Integration Enhancements to Improve Homeland Security

    National Research Council Canada - National Science Library

    Sando, Terrance W

    2007-01-01

    .... Homeland Security responses. These technology enhancements and processes combined with the force capabilities that the National Guard has recently created, when integrated with other national capabilities, will greatly improve...

  5. Enhancing China’s energy security: Determining influential factors and effective strategic measures

    International Nuclear Information System (INIS)

    Ren, Jingzheng; Sovacool, Benjamin K.

    2014-01-01

    Highlights: • The most influential factors affecting China’s energy security are identified. • Fuzzy AHP is used to quantify the importance of influential factors. • Strategic measures for enhancing China’s energy security are prioritized. • Fuzzy AHP is used to determine the priorities of the strategic measures. - Abstract: This study investigates the most influential factors affecting China’s energy security. It also identifies the most effective strategic measures for enhancing it. Fuzzy AHP has been used to determine weights for ranking the importance of Chinese energy security factors, and it has also been used to determine the priorities of the strategic measures with respect to enhancing those same factors. The study argues that a low proportion of renewable energy penetration is the most severe factor threatening China’s energy security, and that conducting research and development on energy technologies and improving energy efficiency is the most salient, positive, and necessary strategic measure

  6. Collaborative Decision Making Process for Complex Defense, Security and Stability Challenges

    NARCIS (Netherlands)

    Bemmel, I.E. van; Eikelboom, A.R.

    2014-01-01

    How to intervene in crises and conflicts? How to cope with complex challenges in the field of defense, security and stability? Questions like these are difficult to answer due to amongst others the involvement of multiple stakeholders that contribute to these complex challenges and need to cooperate

  7. Security and Stability Analysis of Wind Farms Integration into Distribution Network

    Science.gov (United States)

    Guan-yang, Li; Hongzhao, Wang; Guanglei, Li; Yamei, Cheng; Hong-zheng, Liu; Yi, Sun

    2017-05-01

    With the increasing share of the wind power in the power system, wind power fluctuations will cause obvious negative impacts on weak local grid. This paper firstly establish electromechanical transient simulation model for doubly fed induction wind turbine, then use Matlab/Simulink to achieve power flow calculation and transient simulation of power system including wind farms, the local synchronous generator, load, etc, finally analyze wind power on the impact of the local power grid under typical circumstances. The actual calculated results indicate that wind mutation causes little effect on the power grid, but when the three-phase short circuit fault happens, active power of wind power decreases sharply and the voltage of location of wind power into the grid also drop sharply, finally wind farm split from power system. This situation is not conducive to security and stability of the local power grid. It is necessary to develop security and stability measures in the future.

  8. Cyber security issues in online games

    Science.gov (United States)

    Zhao, Chen

    2018-04-01

    With the rapid development of the Internet, online gaming has become a way of entertainment for many young people in the modern era. However, in recent years, cyber security issues in online games have emerged in an endless stream, which have also caused great attention of many game operators. Common cyber security problems in the game include information disclosure and cyber-attacks. These problems will directly or indirectly cause economic losses to gamers. Many gaming companies are enhancing the stability and security of their network or gaming systems in order to enhance the gaming user experience. This article has carried out the research of the cyber security issues in online games by introducing the background and some common cyber security threats, and by proposing the latent solution. Finally, it speculates the future research direction of the cyber security issues of online games in the hope of providing feasible solution and useful information for game operators.

  9. Design and Analysis of Secure Routing Protocol for Wireless Sensor Networks

    Science.gov (United States)

    Wang, Jiong; Zhang, Hua

    2017-09-01

    In recent years, with the development of science and technology and the progress of the times, China's wireless network technology has become increasingly prosperous and it plays an important role in social production and life. In this context, in order to further to enhance the stability of wireless network data transmission and security enhancements, the staff need to focus on routing security and carry out related work. Based on this, this paper analyzes the design of wireless sensor based on secure routing protocol.

  10. Enhancing China’s Energy Security: Determining Influential Factors and Effective Strategic Measures

    DEFF Research Database (Denmark)

    Ren, Jingzheng; Sovacool, Benjamin

    2014-01-01

    This study investigates the most influential factors affecting China’s energy security. It also identifies the most effective strategic measures for enhancing it. Fuzzy AHP has been used to determine weights for ranking the importance of Chinese energy security factors, and it has also been used...... to determine the priorities of the strategic measures with respect to enhancing those same factors. The study argues that a low proportion of renewable energy penetration is the most severe factor threatening China’s energy security, and that conducting research and development on energy technologies...

  11. Subnanometric stabilization of plasmon-enhanced optical microscopy

    International Nuclear Information System (INIS)

    Yano, Taka-aki; Ichimura, Taro; Kuwahara, Shota; Verma, Prabhat; Kawata, Satoshi

    2012-01-01

    We have demonstrated subnanometric stabilization of tip-enhanced optical microscopy under ambient condition. Time-dependent thermal drift of a plasmonic metallic tip was optically sensed at subnanometer scale, and was compensated in real-time. In addition, mechanically induced displacement of the tip, which usually occurs when the amount of tip-applied force varies, was also compensated in situ. The stabilization of tip-enhanced optical microscopy enables us to perform long-time and robust measurement without any degradation of optical signal, resulting in true nanometric optical imaging with high reproducibility and high precision. The technique presented is applicable for AFM-based nanoindentation with subnanometric precision. (paper)

  12. Haiti’s Army, Stabilization and Security Sector Governance

    Directory of Open Access Journals (Sweden)

    Geoff Burt

    2016-09-01

    Full Text Available Haiti’s long and difficult security sector reform (SSR process has entered a new phase. The reinstatement of the Haitian armed forces, nearly 20 years after former President Jean-Bertrand Aristide disbanded them, adds a new set of actors and more complexity to a process already struggling to deliver results amidst a seemingly endless series of political crises. The armed forces must be an impartial and apolitical institution if they are to contribute to stability in Haiti – an uncertain proposition given their past inability to stay out of the political arena. Building on a summary of the latest developments in the reinstatement process, this paper discusses its implications for Haiti’s prolonged international engagement. In particular, the paper focuses on the process to develop a new White Paper on Defence and National Security in Haiti. This process has the potential to contribute to two of the most significant shortcomings of SSR in Haiti, a limited focus on security sector governance and a lack of local ownership. The reinstatement process has been an interesting test case of the international donor community’s commitment to the concept of local ownership, long held to be a moral and practical pillar of international engagement. Though reinstatement has been driven by Haitian authorities, the process has struggled to make progress without donor support, raising questions about the appropriate role of international actors in strategic decision-making at the national level. Regardless of their initial reaction to reinstatement, Haiti’s international donors risk missing an opportunity to influence the development of an important pillar of Haiti’s post-MINUSTAH security sector by choosing to remain on the sidelines.

  13. 77 FR 25188 - Extension of Agency Information Collection Activity Under OMB Review: Enhanced Security...

    Science.gov (United States)

    2012-04-27

    ... general aviation (GA) aircraft operators who wish to fly into and/or out of Ronald Reagan Washington.... Information Collection Requirement Title: Enhanced Security Procedures at Ronald Reagan Washington National...] Extension of Agency Information Collection Activity Under OMB Review: Enhanced Security Procedures at Ronald...

  14. Security enhancement of double random phase encoding using rear-mounted phase masking

    Science.gov (United States)

    Chen, Junxin; Zhang, Yu; Li, Jinchang; Zhang, Li-bo

    2018-02-01

    In this paper, a security enhancement for double random phase encoding (DRPE) by introducing a rear-mounted phase masking procedure is presented. Based on exhaustively studying the cryptanalysis achievements of DRPE and its variants, invalidation of the second lens, which plays a critical role in cryptanalyzing processes, is concluded. The improved system can exploit the security potential of the second lens and consequently strengthen the security of DRPE. Experimental results and security analyses are presented in detail to demonstrate the security potential of the proposed cryptosystem.

  15. Study on Enhancing nuclear security cooperation in Northeast Asia

    International Nuclear Information System (INIS)

    Lee, Jounghoon; Heo, Chul

    2015-01-01

    Regional and global cooperation in nuclear security was urged. Nevertheless, it is hard to seek a successful example of regional cooperation in nuclear security, with the exception of EURATOM. Northeast Asia which includes China, Russia, Japan, ROK and, DPRK has many nuclear issues. For example, the concerns of the international community were raised when the DPRK has conducted three nuclear tests. Countries in this region also possess many nuclear power plants and materials. However, there has been no attempt at creating a community or organization for multinational security in this region. In this paper, we discuss various ways of enhancing nuclear security cooperation in Northeast Asia. We begin with an examination of current global, regional and national nuclear security cooperation efforts. We then discuss directions and strategies for nuclear security cooperation in Northeast Asia, and offer some detailed cooperation agendas to be considers. Northeast Asia countries have tried to cooperate in many areas such as energy, environment, economy, and policy. However, nuclear security issues have not been discussed seriously. We need to start cooperating on nuclear security issues, because a nuclear security event may affect several countries. One country may not be able to respond to such an event independently. In order to gain cooperate in nuclear security, we have to be able to suggest pertinent agendas to Northeast Asia countries. R and D, education and training of nuclear security may be a good suggestion for starting cooperation. And more practical and detailed agendas such as joint response and information sharing may be suggested for cooperation strengthening

  16. Study on Enhancing nuclear security cooperation in Northeast Asia

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jounghoon; Heo, Chul [Korea Institute of Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    Regional and global cooperation in nuclear security was urged. Nevertheless, it is hard to seek a successful example of regional cooperation in nuclear security, with the exception of EURATOM. Northeast Asia which includes China, Russia, Japan, ROK and, DPRK has many nuclear issues. For example, the concerns of the international community were raised when the DPRK has conducted three nuclear tests. Countries in this region also possess many nuclear power plants and materials. However, there has been no attempt at creating a community or organization for multinational security in this region. In this paper, we discuss various ways of enhancing nuclear security cooperation in Northeast Asia. We begin with an examination of current global, regional and national nuclear security cooperation efforts. We then discuss directions and strategies for nuclear security cooperation in Northeast Asia, and offer some detailed cooperation agendas to be considers. Northeast Asia countries have tried to cooperate in many areas such as energy, environment, economy, and policy. However, nuclear security issues have not been discussed seriously. We need to start cooperating on nuclear security issues, because a nuclear security event may affect several countries. One country may not be able to respond to such an event independently. In order to gain cooperate in nuclear security, we have to be able to suggest pertinent agendas to Northeast Asia countries. R and D, education and training of nuclear security may be a good suggestion for starting cooperation. And more practical and detailed agendas such as joint response and information sharing may be suggested for cooperation strengthening.

  17. Double polymer sheathed carbon nanotube supercapacitors show enhanced cycling stability

    Science.gov (United States)

    Zhao, Wenqi; Wang, Shanshan; Wang, Chunhui; Wu, Shiting; Xu, Wenjing; Zou, Mingchu; Ouyang, An; Cao, Anyuan; Li, Yibin

    2015-12-01

    Pseudo-materials are effective in boosting the specific capacitance of supercapacitors, but during service their degradation may also be very strong, causing reduced cycling stability. Here, we show that a carbon nanotube sponge grafted by two conventional pseudo-polymer layers in sequence can serve as a porous supercapacitor electrode with significantly enhanced cycling stability compared with single polymer grafting. Creating conformal polymer coatings on the nanotube surface and the resulting double-sheath configuration are important structural factors leading to the enhanced performance. Combining different polymers as double sheaths as reported here might be a potential route to circumvent the dilemma of pseudo-materials, and to simultaneously improve the capacitance and stability for various energy storage devices.Pseudo-materials are effective in boosting the specific capacitance of supercapacitors, but during service their degradation may also be very strong, causing reduced cycling stability. Here, we show that a carbon nanotube sponge grafted by two conventional pseudo-polymer layers in sequence can serve as a porous supercapacitor electrode with significantly enhanced cycling stability compared with single polymer grafting. Creating conformal polymer coatings on the nanotube surface and the resulting double-sheath configuration are important structural factors leading to the enhanced performance. Combining different polymers as double sheaths as reported here might be a potential route to circumvent the dilemma of pseudo-materials, and to simultaneously improve the capacitance and stability for various energy storage devices. Electronic supplementary information (ESI) available. See DOI: 10.1039/c5nr05978j

  18. An Enhanced Erasure Code-Based Security Mechanism for Cloud Storage

    Directory of Open Access Journals (Sweden)

    Wenfeng Wang

    2014-01-01

    Full Text Available Cloud computing offers a wide range of luxuries, such as high performance, rapid elasticity, on-demand self-service, and low cost. However, data security continues to be a significant impediment in the promotion and popularization of cloud computing. To address the problem of data leakage caused by unreliable service providers and external cyber attacks, an enhanced erasure code-based security mechanism is proposed and elaborated in terms of four aspects: data encoding, data transmission, data placement, and data reconstruction, which ensure data security throughout the whole traversing into cloud storage. Based on the mechanism, we implement a secure cloud storage system (SCSS. The key design issues, including data division, construction of generator matrix, data encoding, fragment naming, and data decoding, are also described in detail. Finally, we conduct an analysis of data availability and security and performance evaluation. Experimental results and analysis demonstrate that SCSS achieves high availability, strong security, and excellent performance.

  19. Security Enhancement for Data Migration in the Cloud

    Directory of Open Access Journals (Sweden)

    Jean Raphael Ngnie Sighom

    2017-06-01

    Full Text Available In today’s society, cloud computing has significantly impacted nearly every section of our lives and business structures. Cloud computing is, without any doubt, one of the strategic directions for many companies and the most dominating infrastructure for enterprises as long as end users. Instead of buying IT equipment (hardware and/or software and managing it themselves, many organizations today prefer to buy services from IT service providers. The number of service providers increase dramatically and the cloud is becoming the tools of choice for more cloud storage services. However, as more personal information and data are moved to the cloud, into social media sites, DropBox, Baidu WangPan, etc., data security and privacy issues are questioned. Daily, academia and industry seek to find an efficient way to secure data migration in the cloud. Various solution approaches and encryption techniques have been implemented. In this work, we will discuss some of these approaches and evaluate the popular ones in order to find the elements that affect system performance. Finally, we will propose a model that enhances data security and privacy by combining Advanced Encryption Standard-256, Information Dispersal Algorithms and Secure Hash Algorithm-512. Our protocol achieves provable security assessments and fast execution times for medium thresholds.

  20. International cooperation for the development of consistent and stable transportation regulations to promote and enhance safety and security

    International Nuclear Information System (INIS)

    Strosnider, J.

    2004-01-01

    International commerce of radioactive materials crosses national boundaries, linking separate regulatory institutions with a common purpose and making it necessary for these institutions to work together in order to achieve common safety goals in a manner that does not place an undue burden on industry and commerce. Widespread and increasing use of radioactive materials across the world has led to increases in the transport of radioactive materials. The demand for consistency in the oversight of international transport has also increased to prevent unnecessary delays and costs associated with incongruent or redundant regulatory requirements by the various countries through which radioactive material is transported. The International Atomic Energy Agency (IAEA) is the authority for international regulation of transportation of radioactive materials responsible for promulgation of regulations and guidance for the establishment of acceptable methods of transportation for the international community. As such, the IAEA is seen as the focal point for consensus building between its Member States to develop consistency in transportation regulations and reviews and to ensure the safe and secure transport of radioactive material. International cooperation is also needed to ensure stability in our regulatory processes. Changes to transportation regulations should be based on an anticipated safety benefit supported by risk information and insights gained from continuing experience, evaluation, and research studies. If we keep safety as the principle basis for regulatory changes, regulatory stability will be enhanced. Finally, as we endeavour to maintain consistency and stability in our international regulations, we must be mindful of the new security challenges that lay before the international community as a result of a changing terrorist environment. Terrorism is a problem of global concern that also requires international cooperation and support, as we look for ways to

  1. Securities and banking: bridges and walls

    Directory of Open Access Journals (Sweden)

    Tommaso Padoa-Schioppa

    2002-09-01

    Full Text Available The paper examines the relationship between banking and securities activities in the light of financial market developments (securitisation, institutionalization of investment, emergence of complex financial instruments, conglomeration and consolidation, with particular reference to Europe. The enhanced links between banking and securitiesbusinesses have generated increased and new risks to financial institutions. However, banks' stability remains crucial for the stability of the financial system as a whole, because of their unique role as provider of liquidity. The paper also addresses the implications of the banking-securities combination for regulatory and supervisory arrangements. The exporting of prudential requirements traditional in banking (such as capital ratios into the securities field, and the importing of securities regulation (such as transparency requirements into the banking sector, can be deemed mutually beneficial. As regards supervision, there is a need to monitor the continued effectiveness of the current framework. This entails strengthening co-operation both at the national level and on a cross-border basis among sectoral supervisors in the micro-prudential field, and between them and central banks in the macro-prudential field.

  2. Enhancement of Email Security in Nuclear Malaysia

    International Nuclear Information System (INIS)

    Mohd Fauzi Haris; Raja Murzaferi Raja Moktar; Saaidi Ismail; Mohd Dzul Aiman Aslan; Mohamad Safuan Sulaiman

    2013-01-01

    Task to protect network and data security is not simple and easy. The more advance ICT technology available in the market, the more dependability to the knowledge, skills and appropriate tools would be in order one to cater these threats. Cyber security threats can be considered almost impossible to be demolished or at least to be avoided totally and what we really need is technical capabilities that may include appropriate knowledge and tools to reduce the cyber threats in the organization. Email is one of the important today's application that is being used by many people all around the globe either they are in corporate organizations, government bodies, students and teachers. The total number of worldwide email accounts is expected to increase from 3.3 billion accounts in 2012 to over 4.3 billion accounts by year-end 2016. This represents an average annual growth rate of 6% over the next four years [1]. Parallel with the increment of the usage, number of abusive and misuse of the email is also reported either in the form of spamming, delivery of malicious file attachments, phishing and others. These show the importance to tighten up the security of the email. This paper will discuss and share actions that have been taken by IT Center to enhance the security of official email application. (author)

  3. Enhanced Security for Online Exams Using Group Cryptography

    Science.gov (United States)

    Jung, I. Y.; Yeom, H. Y.

    2009-01-01

    While development of the Internet has contributed to the spread of online education, online exams have not been widely adopted. An online exam is defined here as one that takes place over the insecure Internet, and where no proctor is in the same location as the examinees. This paper proposes an enhanced secure online exam management environment…

  4. Optimal Allocation of Wind Turbines by Considering Transmission Security Constraints and Power System Stability

    Directory of Open Access Journals (Sweden)

    Rodrigo Palma-Behnke

    2013-01-01

    Full Text Available A novel optimization methodology consisting of finding the near optimal location of wind turbines (WTs on a planned transmission network in a secure and cost-effective way is presented on this paper. While minimizing the investment costs of WTs, the algorithm allocates the turbines so that a desired wind power energy-penetration level is reached. The optimization considers both transmission security and power system stability constraints. The results of the optimization provide regulators with a support instrument to give proper signals to WT investors, in order to achieve secure and cost effective wind power network integration. The proposal is especially aimed at countries in the initial stage of wind power development, where the WT network integration process can still be influenced by policy-makers. The proposed methodology is validated with a real power system. Obtained results are compared with those generated from a business-as-usual (BAU scenario, in which the WT network allocation is made according to existing WT projects. The proposed WT network allocation scheme not only reduces the total investment costs associated with a determined wind power energy target, but also improves power system stability.

  5. Method for enhancing the thermal stability of ionic compounds

    DEFF Research Database (Denmark)

    2013-01-01

    This invention relates to a method for enhancing the thermal stability of ionic compounds including ionic liquids, by immobilization on porous solid support materials having a pore diameter of between about 20-200 AA, wherein the solid support does not have a pore size of 90 AA.......This invention relates to a method for enhancing the thermal stability of ionic compounds including ionic liquids, by immobilization on porous solid support materials having a pore diameter of between about 20-200 AA, wherein the solid support does not have a pore size of 90 AA....

  6. Some Thoughts about Literature as a Means of Advancing Sustainable Unity and Stability in the Contemporary Nigerian State

    Science.gov (United States)

    Anaso, George Nwaorah; Nwabudike, Christopher Eziafa

    2014-01-01

    An in-depth investigation was conducted on the possibility of literature employed to enhance cohesion, sustainable unity, national stability, and security of lives and property in the contemporary Nigeria. These three elements--unity, national stability, and security of lives and property are considered the key pillars of a modern state, the…

  7. Power system stability enhancement using facts controllers: a review

    International Nuclear Information System (INIS)

    Abido, M. A

    2009-01-01

    In recent years, power demand has increased substantially while the expansion of power generation and transmission has been severely limited due to limited resources and environmental restrictions. As a consequence, some transmission lines are heavily loaded and the system stability becomes a power transfer-limiting factor. Flexible AC transmission systems (FACTS) controllers have been mainly used for solving various power system steady state control problems. However, recent studies reveal that FACTS controllers could be employed to enhance power system stability in addition to their main function of power flow control. The literature shows an increasing interest in this subject for the last two decades, where the enhancement of system stability using FACTS controllers has been extensively investigated. This paper presents a comprehensive review on the research and developments in the power system stability enhancement using FACTS damping controllers. Several technical issues related to FACTS installations have been highlighted and performance comparison of different FACTS controllers has been discussed. In addition, some of the utility experience, real-world installations, and semiconductor technology development have been reviewed and summarized. Applications of FACTS to other power system studies have also been discussed. About two hundred twenty seven research publications have been classified and appended for a quick reference. (author)

  8. 2007 Stability, Security, Transition and Reconstruction Operations Conference

    Science.gov (United States)

    2007-11-28

    narcotics Foster sustainable economy U.S.PRT tasks Jalalabad June 2007 Who can respond to which challeges ? 2. Battlespace or Humanitarian Space...Education Integrated Interagency Stabilization and Reconstruction Training Plug and Play System Lessons Learned from the Field USAID NGOs World Bank ...World Bank , IMF? Expanding the Focus… At the US and NATO Strategic/Operational Level Enhanced/new structures and procedures to improve: Interaction

  9. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  10. Status and determinants of small farming households' food security and role of market access in enhancing food security in rural Pakistan.

    Directory of Open Access Journals (Sweden)

    Umar Ijaz Ahmed

    Full Text Available In most of the developing countries, lack of resources and little market accessibility are among the major factors that affect small farming household food security. This study aims to investigate the status of small farming households' food security, and its determinants including the role of market accessibility factors in enhancing food security at household level. In addition, this study also determines the households' perception about different kinds of livelihoods risks. This study is based on a household survey of 576 households conducted through face-to-face interviews using structured interviews in Punjab, Pakistan. Food security status is calculated using dietary intake method. The study findings show that one-fourth of the households are food insecure. The study findings reveal that farm households perceive increase in food prices, crop diseases, lack of irrigation water and increase in health expenses as major livelihood risks. Further, the results of logistic regression show that family size, monthly income, food prices, health expenses and debt are main factors influencing the food security status of rural households. Furthermore, the market accessibility factors (road distance and transportation cost do significantly affect the small farming household food security. The results suggest that local food security can be enhanced by creating off-farm employment opportunities, improved transportation facilities and road infrastructure.

  11. Windows Vista Kernel-Mode: Functions, Security Enhancements and Flaws

    Directory of Open Access Journals (Sweden)

    Mohammed D. ABDULMALIK

    2008-06-01

    Full Text Available Microsoft has made substantial enhancements to the kernel of the Microsoft Windows Vista operating system. Kernel improvements are significant because the kernel provides low-level operating system functions, including thread scheduling, interrupt and exception dispatching, multiprocessor synchronization, and a set of routines and basic objects.This paper describes some of the kernel security enhancements for 64-bit edition of Windows Vista. We also point out some weakness areas (flaws that can be attacked by malicious leading to compromising the kernel.

  12. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks.

    Science.gov (United States)

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-11

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.

  13. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks

    Science.gov (United States)

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-01

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719

  14. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-03-21

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.

  15. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  16. Superamphiphobic cotton fabrics with enhanced stability

    Energy Technology Data Exchange (ETDEWEB)

    Xu, Bi, E-mail: xubi@dhu.edu.cn [National Engineering Research Center for Dyeing and Finishing of Textiles, Donghua University, Shanghai 201620 (China); Key Laboratory of Science & Technology of Eco-Textile, Ministry of Education, Donghua University, Shanghai 201620 (China); College of Chemistry, Chemical Engineering and Biotechnology, Donghua University, Shanghai 201620 (China); Ding, Yinyan; Qu, Shaobo [College of Chemistry, Chemical Engineering and Biotechnology, Donghua University, Shanghai 201620 (China); Cai, Zaisheng, E-mail: zshcai@dhu.edu [College of Chemistry, Chemical Engineering and Biotechnology, Donghua University, Shanghai 201620 (China)

    2015-11-30

    Highlights: • Superamphiphobic cotton fabrics were prepared. • Water and hexadecane contact angels reach to 164.4° and 156.3°, respectively. • Nanoporous organically modified silica alcogel particles were synthesized. • The superamphiphobic cotton fabrics exhibit enhanced stability against abrasion, laundering and acid. - Abstract: Superamphiphobic cotton fabrics were prepared by alternately depositing organically modified silica alcogel (ormosil) particles onto chitosan precoated cotton fabrics and subsequent 1H, 1H, 2H, 2H-perfluorooctyltrimethoxysilane (PFOTMS) modification. Transmission electron microscopy and scanning electron microscopy images reveal that the ormosil particles display a fluffy, sponge-like nanoporous structure, and the entire cotton fiber surface is covered with highly porous networks. PFOTMS acts as not only a modifier to lower the surface energy of the cotton fabric but also a binder to enhance the coating stability against abrasion and washing. The treated cotton fabrics show highly liquid repellency with the water, cooking oil and hexadecane contact angels reaching to 164.4°, 160.1° and 156.3°, respectively. Meanwhile, the treated cotton fabrics exhibit good abrasion resistance and high laundering durability, which can withstand 10,000 cycles of abrasion and 30 cycles of machine wash without apparently changing the superamphiphobicity. The superamphiphobic cotton fabric also shows high acid stability, and can withstand 98% H{sub 2}SO{sub 4}. Moreover, the superamphiphobic coating has almost no influence on the other physical properties of the cotton fabrics including tensile strength, whiteness and air permeability. This durable non-wetting surface may provide a wide range of new applications in the future.

  17. Resonating, Rejecting, Reinterpreting: Mapping the Stabilization Discourse in the United Nations Security Council, 2000–14

    Directory of Open Access Journals (Sweden)

    David Curran

    2015-10-01

    Full Text Available This article charts the evolution of the conceptualisation of stabilization in the UN Security Council (UNSC during the period 2001–2014. UNSC open meetings provide an important dataset for a critical review of stabilization discourse and an opportunity to chart the positions of permanent Members, rotating Members and the UN Secretariat towards this concept. This article is the first to conduct an analysis of this material to map the evolution of stabilization in this critical chamber of the UN. This dataset of official statements will be complemented by a review of open source reporting on UNSC meetings and national stabilization doctrines of the ‘P3’ – France, the UK and the US. These countries have developed national stabilization doctrines predominantly to deal with cross-governmental approaches to counterinsurgency operations conducted during the 2000s. The article therefore presents a genealogy of the concept of stabilization in the UNSC to help understand implications for its future development in this multilateral setting. This article begins by examining efforts by the P3 to ‘upload’ their conceptualisations of stabilization into UN intervention frameworks. Secondly, the article uses a content analysis of UNSC debates during 2000–2014 to explore the extent to which the conceptualisation of stabilization resonated with other Council members, were rejected in specific contexts or in general, or were re-interpreted by member states to suit alternative security agendas and interests. Therefore, the article not only examines the UNSC debates surrounding existing UN ‘stabilization operations’ (MONUSCO, MINUSTAH, MINUSCA, MINUSMA, which could be regarded as evidence that this ‘western’ concept has resonated with other UNSC members and relevant UN agencies, but also documents the appearance of stabilization in other contexts too. The article opens new avenues of research into concepts of stabilization within the UN, and

  18. Inorganic electret with enhanced charge stability for energy harvesting

    DEFF Research Database (Denmark)

    Wang, Fei; Hansen, Ole

    2013-01-01

    We report a new surface treatment of inorganic electret materials which enhances the charge stability. Coating the surfaces with 1H, 1H, 2H, 2H - perfluorodecyltrichlorosilane (FDTS) makes the electret surface more hydrophobic which improves the surface charge stability under high humidity condit...... conditions. Thermal tests show that the thermal stability of charge in the inorganic electrets is also much better than that of polymer materials such as CYTOP. A demonstrator device with SiO2 electrets shows promising results for energy harvesting applications....

  19. Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes

    Directory of Open Access Journals (Sweden)

    Qinghe Du

    2018-01-01

    Full Text Available The Internet of Things (IoT is expected to accommodate every object which exists in this world or likely to exist in the near future. The enormous scale of the objects is challenged by big security concerns, especially for common information dissemination via multicast services, where the reliability assurance for multiple multicast users at the cost of increasing redundancy and/or retransmissions also benefits eavesdroppers in successfully decoding the overheard signals. The objective of this work is to address the security challenge present in IoT multicast applications. Specifically, with the presence of the eavesdropper, an adaptive fountain code design is proposed in this paper to enhance the security for multicast in IoT. The main novel features of the proposed scheme include two folds: (i dynamical encoding scheme which can effectively decrease intercept probability at the eavesdropper; (ii increasing the transmission efficiency compared with the conventional nondynamical design. The analysis and simulation results show that the proposed scheme can effectively enhance information security while achieving higher transmission efficiency with a little accredited complexity, thus facilitating the secured wireless multicast transmissions over IoT.

  20. Enhanced Physical Stability of Amorphous Drug Formulations via Dry Polymer Coating.

    Science.gov (United States)

    Capece, Maxx; Davé, Rajesh

    2015-06-01

    Although amorphous solid drug formulations may be advantageous for enhancing the bioavailability of poorly soluble active pharmaceutical ingredients, they exhibit poor physical stability and undergo recrystallization. To address this limitation, this study investigates stability issues associated with amorphous solids through analysis of the crystallization behavior for acetaminophen (APAP), known as a fast crystallizer, using a modified form of the Avrami equation that kinetically models both surface and bulk crystallization. It is found that surface-enhanced crystallization, occurring faster at the free surface than in the bulk, is the major impediment to the stability of amorphous APAP. It is hypothesized that a novel use of a dry-polymer-coating process referred to as mechanical-dry-polymer-coating may be used to inhibit surface crystallization and enhance stability. The proposed process, which is examined, simultaneously mills and coats amorphous solids with polymer, while avoiding solvents or solutions, which may otherwise cause stability or crystallization issues during coating. It is shown that solid dispersions of APAP (64% loading) with a small particle size (28 μm) could be prepared and coated with the polymer, carnauba wax, in a vibratory ball mill. The resulting amorphous solid was found to have excellent stability as a result of inhibition of surface crystallization. © 2015 Wiley Periodicals, Inc. and the American Pharmacists Association.

  1. Enhancing Security by System-Level Virtualization in Cloud Computing Environments

    Science.gov (United States)

    Sun, Dawei; Chang, Guiran; Tan, Chunguang; Wang, Xingwei

    Many trends are opening up the era of cloud computing, which will reshape the IT industry. Virtualization techniques have become an indispensable ingredient for almost all cloud computing system. By the virtual environments, cloud provider is able to run varieties of operating systems as needed by each cloud user. Virtualization can improve reliability, security, and availability of applications by using consolidation, isolation, and fault tolerance. In addition, it is possible to balance the workloads by using live migration techniques. In this paper, the definition of cloud computing is given; and then the service and deployment models are introduced. An analysis of security issues and challenges in implementation of cloud computing is identified. Moreover, a system-level virtualization case is established to enhance the security of cloud computing environments.

  2. Security-Enhanced Push Button Configuration for Home Smart Control.

    Science.gov (United States)

    Han, Junghee; Park, Taejoon

    2017-06-08

    With the emergence of smart and converged home services, the need for the secure and easy interplay of various devices has been increased. Push Button Configuration (PBC) is one of the technologies proposed for easy set-up of a secure session between IT and consumer devices. Although the Wi-Fi Direct specification explicitly states that all devices must support the PBC method, its applicability is very limited. This is because the security vulnerability of PBC can be maliciously exploited so that attackers can make illegitimate sessions with consumer devices. To address this problem, this paper proposes a novel Security-enhanced PBC (SePBC) scheme with which we can uncover suspicious or malicious devices. The proposed mechanism has several unique features. First, we develop a secure handshake distance measurement protocol by preventing an adversary sitting outside the region from maliciously manipulating its distance to be fake. Second, it is compatible with the original Wi-Fi PBC without introducing a brand-new methodology. Finally, SePBC uses lightweight operations without CPU-intensive cryptography computation and employs inexpensive H/W. Moreover, it needs to incur little overhead when there is no attack. This paper also designs and implements the proposed SePBC in the real world. Our experimental results and analysis show that the proposed SePBC scheme effectively defeats attacks on PBC while minimizing the modification of the original PBC equipment.

  3. Enhancing Global Health Security: US Africa Command's Disaster Preparedness Program.

    Science.gov (United States)

    Morton Hamer, Melinda J; Reed, Paul L; Greulich, Jane D; Beadling, Charles W

    2018-03-07

    US Africa Command's Disaster Preparedness Program (DPP), implemented by the Center for Disaster and Humanitarian Assistance Medicine, partnered with US Government agencies and international organizations to promote stability and security on the African continent by engaging with African Partner Nations' (PN) civil and military authorities to improve disaster management capabilities. From 2008 to 2015, DPP conducted disaster preparedness and response programming with 17 PNs. DPP held a series of engagements with each, including workshops, strategic planning, developing preparedness and response plans, tabletop exercises, and prioritizing disaster management capability gaps identified through the engagements. DPP partners collected data for each PN to further capacity building efforts. Thus far, 9 countries have completed military pandemic plans, 10 have developed national pandemic influenza plans, 9 have developed military support to civil authorities plans, and 11 have developed disaster management strategic work plans. There have been 20 national exercises conducted since 2009. DPP was cited as key in implementation of Ebola response plans in PNs, facilitated development of disaster management agencies in DPP PNs, and trained nearly 800 individuals. DPP enhanced PNs' ability to prepare and respond to crises, fostering relationships between international agencies, and improving civil-military coordination through both national and regional capacity building. (Disaster Med Public Health Preparedness. 2018;page 1 of 11).

  4. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-06-01

    Full Text Available Wireless sensor networks (WSNs consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC for WSNs. However, it turned out that Yeh et al.’s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.’s protocol. However, Shi et al.’s improvement introduces other security weaknesses. In this paper, we show that Shi et al.’s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  5. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Science.gov (United States)

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-06-10

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  6. Big Data-Based Approach to Detect, Locate, and Enhance the Stability of an Unplanned Microgrid Islanding

    Energy Technology Data Exchange (ETDEWEB)

    Jiang, Huaiguang; Li, Yan; Zhang, Yingchen; Zhang, Jun Jason; Gao, David Wenzhong; Muljadi, Eduard; Gu, Yi

    2017-10-01

    In this paper, a big data-based approach is proposed for the security improvement of an unplanned microgrid islanding (UMI). The proposed approach contains two major steps: the first step is big data analysis of wide-area monitoring to detect a UMI and locate it; the second step is particle swarm optimization (PSO)-based stability enhancement for the UMI. First, an optimal synchrophasor measurement device selection (OSMDS) and matching pursuit decomposition (MPD)-based spatial-temporal analysis approach is proposed to significantly reduce the volume of data while keeping appropriate information from the synchrophasor measurements. Second, a random forest-based ensemble learning approach is trained to detect the UMI. When combined with grid topology, the UMI can be located. Then the stability problem of the UMI is formulated as an optimization problem and the PSO is used to find the optimal operational parameters of the UMI. An eigenvalue-based multiobjective function is proposed, which aims to improve the damping and dynamic characteristics of the UMI. Finally, the simulation results demonstrate the effectiveness and robustness of the proposed approach.

  7. Trustworthy reconfigurable systems enhancing the security capabilities of reconfigurable hardware architectures

    CERN Document Server

    Feller, Thomas

    2014-01-01

    ?Thomas Feller sheds some light on trust anchor architectures fortrustworthy reconfigurable systems. He is presenting novel concepts enhancing the security capabilities of reconfigurable hardware.Almost invisible to the user, many computer systems are embedded into everyday artifacts, such as cars, ATMs, and pacemakers. The significant growth of this market segment within the recent years enforced a rethinking with respect to the security properties and the trustworthiness of these systems. The trustworthiness of a system in general equates to the integrity of its system components. Hardware-b

  8. Power system security enhancement with unified power flow controller under multi-event contingency conditions

    Directory of Open Access Journals (Sweden)

    S. Ravindra

    2017-03-01

    Full Text Available Power system security analysis plays key role in enhancing the system security and to avoid the system collapse condition. In this paper, a novel severity function is formulated using transmission line loadings and bus voltage magnitude deviations. The proposed severity function and generation fuel cost objectives are analyzed under transmission line(s and/or generator(s contingency conditions. The system security under contingency conditions is analyzed using optimal power flow problem. An improved teaching learning based optimization (ITLBO algorithm has been presented. To enhance the system security under contingency conditions in the presence of unified power flow controller (UPFC, it is necessary to identify an optimal location to install this device. Voltage source based power injection model of UPFC, incorporation procedure and optimal location identification strategy based on line overload sensitivity indexes are proposed. The entire proposed methodology is tested on standard IEEE-30 bus test system with supporting numerical and graphical results.

  9. Enhanced stabilization of collagen by furfural.

    Science.gov (United States)

    Lakra, Rachita; Kiran, Manikantan Syamala; Usha, Ramamoorthy; Mohan, Ranganathan; Sundaresan, Raja; Korrapati, Purna Sai

    2014-04-01

    Furfural (2-furancarboxaldehyde), a product derived from plant pentosans, has been investigated for its interaction with collagen. Introduction of furfural during fibril formation enhanced the thermal and mechanical stability of collagen. Collagen films treated with furfural exhibited higher denaturation temperature (Td) (pFurfural and furfural treated collagen films did not have any cytotoxic effect. Rheological characterization showed an increase in shear stress and shear viscosity with increasing shear rate for treated collagen. Circular dichroism (CD) studies indicated that the furfural did not have any impact on triple helical structure of collagen. Scanning electron microscopy (SEM) of furfural treated collagen exhibited small sized porous structure in comparison with untreated collagen. Thus this study provides an alternate ecologically safe crosslinking agent for improving the stability of collagen for biomedical and industrial applications. Copyright © 2014 Elsevier B.V. All rights reserved.

  10. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

    Science.gov (United States)

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  11. Delay-enhanced stability and stochastic resonance in perception bistability under non-Gaussian noise

    International Nuclear Information System (INIS)

    Yang, Tao; Zeng, Chunhua; Liu, Ruifen; Wang, Hua; Mei, Dongcheng

    2015-01-01

    In this paper we investigate the effect of time delay in an attractor network model of perception bistability driven by non-Gaussian noise. Using delay Langevin and Fokker–Planck approaches, the theoretical analysis of the model is presented. It is found that the mean first-passage time (MFPT) as a function of the time delay exhibits a maximum, which is identified as the characteristic of the delay-enhanced stability of the system. This is different to the case of noise-enhanced stability. The non-Gaussian noise-enhanced stability of the system is also analyzed. The signal-to-noise ratio (SNR) as a function of the noise intensity exhibits a maximum. This maximum implies the identifying characteristic of stochastic resonance (SR), and the time delay and non-Gaussian noise can enhance the SR phenomenon. (paper)

  12. SecMAS: Security Enhanced Monitoring and Analysis Systems for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ding Chao

    2016-01-01

    Full Text Available The monitoring, control, and security guarantee for the communication in the wireless sensor networks (WSNs are currently treated as three independent issues and addressed separately through specialized tools. However, most cases of WSNs applications requires the network administrator change the network configuration in a very short time to response to the change of observed phenomenon with security guarantee. To meet this requirement, we propose a security enhanced monitoring and control platform named SecMAS for WSNs, which provides the real-time visualization about network states and online reconfiguration of the network properties and behaviours in a resource-efficient way. Besides, basic cryptographic primitives and part of the anomaly detection functionalities are implemented in SecMAS to enabling the secure communication in WSNs. Furthermore, we conduct experiments to evaluate the performance of SecMAS in terms of the latency, throughput, communication overhead, and the security capacity. The experimental results demonstrate that the SecMAS system achieves stable, efficient and secure data collection with lightweight quick-response network control.

  13. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards

    Directory of Open Access Journals (Sweden)

    Younghwa An

    2012-01-01

    Full Text Available Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das’s authentication scheme, and we have shown that Das’s authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das’s authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  14. International Conference on Nuclear Security: Enhancing Global Efforts. Summary of an International Conference

    International Nuclear Information System (INIS)

    2014-01-01

    The International Conference on Nuclear Security: Enhancing Global Efforts was organized by the IAEA and held in Vienna on 1-5 July 2013. The conference was organized in cooperation with the following organizations and initiatives: the European Union; the Global Initiative to Combat Nuclear Terrorism (GICNT); the International Criminal Police Organization (INTERPOL); the Institute of Nuclear Materials Management (INMM); the Nuclear Threat Initiative (NTI); the Organization for Security and Co-operation in Europe (OSCE); the Partnership for Global Security; the Police Community of the Americas (AMERIPOL); the United Nations Interregional Crime and Justice Research Institute (UNICRI); the United Nations Office on Drugs and Crime (UNODC); the World Institute for Nuclear Security (WINS); the World Nuclear Association (WNA); and the World Nuclear Transport Institute (WNTI). A total of 34 ministers participated in the ministerial session of the conference. Altogether, the conference attracted more than 1300 registered participants from 125 IAEA Member States and 21 organizations. The aim of the conference was to review the international community's experience and achievements to date in strengthening nuclear security, to enhance the understanding of current approaches to nuclear security worldwide and identify trends, and to provide a global forum for ministers, policymakers and senior officials to formulate views on future directions and priorities for nuclear security. This book contains the President's Summary of the conference and a summary of the ministerial session, the full text of the ministerial declaration adopted by the conference and summaries of the main conference sessions. The attached CD-ROM contains the full conference programme, the list of conference participants, the national statements from the ministerial session and a selection of papers

  15. Security region-based small signal stability analysis of power systems with FSIG based wind farm

    Science.gov (United States)

    Qin, Chao; Zeng, Yuan; Yang, Yang; Cui, Xiaodan; Xu, Xialing; Li, Yong

    2018-02-01

    Based on the Security Region approach, the impact of fixed-speed induction generator based wind farm on the small signal stability of power systems is analyzed. Firstly, the key factors of wind farm on the small signal stability of power systems are analyzed and the parameter space for small signal stability region is formed. Secondly, the small signal stability region of power systems with wind power is established. Thirdly, the corresponding relation between the boundary of SSSR and the dominant oscillation mode is further studied. Results show that the integration of fixed-speed induction generator based wind farm will cause the low frequency oscillation stability of the power system deteriorate. When the output of wind power is high, the oscillation stability of the power system is mainly concerned with the inter-area oscillation mode caused by the integration of the wind farm. Both the active power output and the capacity of reactive power compensation of the wind farm have a significant influence on the SSSR. To improve the oscillation stability of power systems with wind power, it is suggested to reasonably set the reactive power compensation capacity for the wind farm through SSSR.

  16. Security-Enhanced Autonomous Network Management

    Science.gov (United States)

    Zeng, Hui

    2015-01-01

    Ensuring reliable communication in next-generation space networks requires a novel network management system to support greater levels of autonomy and greater awareness of the environment and assets. Intelligent Automation, Inc., has developed a security-enhanced autonomous network management (SEANM) approach for space networks through cross-layer negotiation and network monitoring, analysis, and adaptation. The underlying technology is bundle-based delay/disruption-tolerant networking (DTN). The SEANM scheme allows a system to adaptively reconfigure its network elements based on awareness of network conditions, policies, and mission requirements. Although SEANM is generically applicable to any radio network, for validation purposes it has been prototyped and evaluated on two specific networks: a commercial off-the-shelf hardware test-bed using Institute of Electrical Engineers (IEEE) 802.11 Wi-Fi devices and a military hardware test-bed using AN/PRC-154 Rifleman Radio platforms. Testing has demonstrated that SEANM provides autonomous network management resulting in reliable communications in delay/disruptive-prone environments.

  17. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriat...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development.......When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...

  18. Intelligent data analysis for e-learning enhancing security and trustworthiness in online learning systems

    CERN Document Server

    Miguel, Jorge; Xhafa, Fatos

    2016-01-01

    Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information security within e-Learning based on trustworthiness assessment and prediction. Over the past decade, many learning management systems have appeared in the education market. Security in these systems is essential for protecting against unfair and dishonest conduct-most notably cheating-however, e-Learning services are often designed and implemented without considering security requirements. This book provides functional approaches of trustworthiness analysis, modeling, assessment, and prediction for stronger security and support in online learning, highlighting the security deficiencies found in most online collaborative learning systems. The book explores trustworthiness methodologies based on collective intelligence than can overcome these deficiencies. It examines trustworthiness analysis that utilizes the large amounts of data-learning activities generate. In addition, as proc...

  19. Viability of Hydrogen Pathways that Enhance Energy Security: A Comparison of China and Denmark

    DEFF Research Database (Denmark)

    Ren, Jingzheng; Andreasen, Kristian Peter; Sovacool, Benjamin

    2014-01-01

    When designed and built properly, hydrogen energy systems can enhance energy security through technological diversification and minimizing dependence on foreign imports of energy fuels. However, hydrogen can be produced from different feedstocks according to separate pathways, and these different...... pathways create particular consequences on a nation's overall energy security. The objective of this study is to investigate the superiorities and inferiorities of hydrogen pathways from the perspective of China and Denmark, and to determine which pathways best contribute to national energy security...

  20. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    Directory of Open Access Journals (Sweden)

    Feng Tao

    2017-01-01

    Full Text Available Tor (The Second Onion Router is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was used to prevent the behaviors of attackers from inserting controlled nodes and conspiring to make DDos attacks. The integrated security of Tor system was enhanced in our scheme. In addition we have proved the scheme.

  1. Enhancing stability of industrial turbines using adjustable partial arc bearings

    Science.gov (United States)

    Chasalevris, Athanasios; Dohnal, Fadi

    2016-09-01

    The paper presents the principal of operation, the simulation and the characteristics of two partial-arc journal bearings of variable geometry and adjustable/controllable stiffness and damping properties. The proposed journals are supposed to consist of a scheme that enables the periodical variation of bearing properties. Recent achievements of suppressing rotor vibrations using plain circular journal bearings of variable geometry motivate the further extension of the principle to bearings of applicable geometry for industrial turbines. The paper describes the application of a partial-arc journal bearing to enhance stability of high speed industrial turbines. The proposed partial-arc bearings with adjustable/controllable properties enhance stability and they introduce stable margins in speeds much higher than the 1st critical.

  2. A Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication

    Directory of Open Access Journals (Sweden)

    Susan Gottschlich

    2017-12-01

    Full Text Available Two technology trends – a move toward software defined capabilities and toward networked devices – support both unprecedented innovations and requirements for security. A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user’s identity and identity is in turn used to establish which of its capabilities the user is authorized to access. While multiple authentication steps, known as multifactor authentication, are being used more widely throughout the military, government, businesses, and consumer sectors, the selection and implementation of which authentication factors to require is typically defined by security policy. Security policy is in turn typically established by a security organization that may have no formal metrics or means to guide its selection of authentication factors. This paper will present a taxonomy for describing authentication factors including important attributes that characterize authentication robustness to aid in the selection of factors that are consistent with the user’s mission. One particular authentication factor that I have developed will be discussed in the context of this taxonomy to motivate the need to broaden current definitions and security policies. The ultimate goal of this paper is to inspire the development of standards for authentication technologies to both support mission aware authentication innovation and to inform decision making about security policies concerning user authentication and authorization. Further, this paper aims to demonstrate that such an approach will fundamentally enhance both security and usability of increasingly networked, software-defined devices, equipment and software applications.

  3. Good Manufacturing Practices (GMP) / Good Laboratory Practices (GLP) Review and Applicability for Chemical Security Enhancements

    Energy Technology Data Exchange (ETDEWEB)

    Iveson, Steven W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). International Chemical Security Threat Reduction

    2014-11-01

    Global chemical security has been enhanced through the determined use and integration of both voluntary and legislated standards. Many popular standards contain components that specifically detail requirements for the security of materials, facilities and other vital assets. In this document we examine the roll of quality management standards and how they affect the security culture within the institutions that adopt these standards in order to conduct business within the international market place. Good manufacturing practices and good laboratory practices are two of a number of quality management systems that have been adopted as law in many nations. These standards are designed to protect the quality of drugs, medicines, foods and analytical test results in order to provide the world-wide consumer with safe and affective products for consumption. These standards provide no established security protocols and yet manage to increase the security of chemicals, materials, facilities and the supply chain via the effective and complete control over the manufacturing, the global supply chains and testing processes. We discuss the means through which these systems enhance security and how nations can further improve these systems with additional regulations that deal specifically with security in the realm of these management systems. We conclude with a discussion of new technologies that may cause disruption within the industries covered by these standards and how these issues might be addressed in order to maintain or increase the level of security within the industries and nations that have adopted these standards.

  4. Security Enhancement of Wireless Sensor Networks Using Signal Intervals.

    Science.gov (United States)

    Moon, Jaegeun; Jung, Im Y; Yoo, Jaesoo

    2017-04-02

    Various wireless technologies, such as RF, Bluetooth, and Zigbee, have been applied to sensor communications. However, the applications of Bluetooth-based wireless sensor networks (WSN) have a security issue. In one pairing process during Bluetooth communication, which is known as simple secure pairing (SSP), the devices are required to specify I/O capability or user interference to prevent man-in-the-middle (MITM) attacks. This study proposes an enhanced SSP in which a nonce to be transferred is converted to a corresponding signal interval. The quantization level, which is used to interpret physical signal intervals, is renewed at every connection by the transferred nonce and applied to the next nonce exchange so that the same signal intervals can represent different numbers. Even if attackers eavesdrop on the signals, they cannot understand what is being transferred because they cannot determine the quantization level. Furthermore, the proposed model does not require exchanging passkeys as data, and the devices are secure in the case of using a fixed PIN. Subsequently, the new quantization level is calculated automatically whenever the same devices attempt to connect with each other. Therefore, the pairing process can be protected from MITM attacks and be convenient for users.

  5. The enhancement of security in healthcare information systems.

    Science.gov (United States)

    Liu, Chia-Hui; Chung, Yu-Fang; Chen, Tzer-Shyong; Wang, Sheng-De

    2012-06-01

    With the progress and the development of information technology, the internal data in medical organizations have become computerized and are further established the medical information system. Moreover, the use of the Internet enhances the information communication as well as affects the development of the medical information system that a lot of medical information is transmitted with the Internet. Since there is a network within another network, when all networks are connected together, they will form the "Internet". For this reason, the Internet is considered as a high-risk and public environment which is easily destroyed and invaded so that a relevant protection is acquired. Besides, the data in the medical network system are confidential that it is necessary to protect the personal privacy, such as electronic patient records, medical confidential information, and authorization-controlled data in the hospital. As a consequence, a medical network system is considered as a network requiring high security that excellent protections and managerial strategies are inevitable to prevent illegal events and external attacks from happening. This study proposes secure medical managerial strategies being applied to the network environment of the medical organization information system so as to avoid the external or internal information security events, allow the medical system to work smoothly and safely that not only benefits the patients, but also allows the doctors to use it more conveniently, and further promote the overall medical quality. The objectives could be achieved by preventing from illegal invasion or medical information being stolen, protecting the completeness and security of medical information, avoiding the managerial mistakes of the internal information system in medical organizations, and providing the highly-reliable medical information system.

  6. Vastly enhancing the chemical stability of phosphorene by employing an electric field.

    Science.gov (United States)

    Gao, Junfeng; Zhang, Gang; Zhang, Yong-Wei

    2017-03-23

    Currently, a major hurdle preventing phosphorene from various electronic applications is its rapid oxidation under ambient conditions. Thus how to enhance its chemical stability by suppressing oxidation becomes an urgent task. Here, we reveal a highly effective procedure to suppress the oxidation of phosphorene by employing a suitable van der Waals (vdW) substrate and a vertical electric field. Our first-principles study shows that the phosphorene-MoSe 2 vdW heterostructure is able to reverse the stability of physisorption and chemisorption of molecular O 2 on phosphorene. With further application of a vertical electric field of -0.6 V Å -1 , the energy barrier for oxidation is able to further increase to 0.91 eV, leading to a 10 5 times enhancement in its lifetime compared with that without using the procedure at room temperature. Our work presents a viable strategy to vastly enhance the chemical stability of phosphorene in air.

  7. Enhancement of security using structured phase masked in optical image encryption on Fresnel transform domain

    Science.gov (United States)

    Yadav, Poonam Lata; Singh, Hukum

    2018-05-01

    To enhance the security in optical image encryption system and to protect it from the attackers, this paper proposes new digital spiral phase mask based on Fresnel Transform. In this cryptosystem the Spiral Phase Mask (SPM) used is a hybrid of Fresnel Zone Plate (FZP) and Radial Hilbert Mask (RHM) which makes the key strong and enhances the security. The different keys used for encryption and decryption purposed make the system much more secure. Proposed scheme uses various structured phase mask which increases the key space also it increases the number of parameters which makes it difficult for the attackers to exactly find the key to recover the original image. We have also used different keys for encryption and decryption purpose to make the system much more secure. The strength of the proposed cryptosystem has been analyzed by simulating on MATLAB 7.9.0(R2008a). Mean Square Errors (MSE) and Peak Signal to Noise Ratio (PSNR) are calculated for the proposed algorithm. The experimental results are provided to highlight the effectiveness and sustainability of proposed cryptosystem and to prove that the cryptosystem is secure for usage.

  8. Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2015-07-01

    Full Text Available Information technology (IT security has become a major concern due to the growing demand for information and massive development of client/server applications for various types of applications running on modern IT infrastructure. How has security been taken into account and which paradigms are necessary to minimize security issues while increasing efficiency, reducing the influence on transmissions, ensuring protocol independency and achieving substantial performance? We have found cryptography to be an absolute security mechanism for client/server architectures, and in this study, a new security design was developed with the MODBUS protocol, which is considered to offer phenomenal performance for future development and enhancement of real IT infrastructure. This study is also considered to be a complete development because security is tested in almost all ways of MODBUS communication. The computed measurements are evaluated to validate the overall development, and the results indicate a substantial improvement in security that is differentiated from conventional methods.

  9. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  10. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-01-01

    Full Text Available An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user’s biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen’s scheme.

  11. C-5 Propynyl Modifications Enhance the Mechanical Stability of DNA.

    Science.gov (United States)

    Aschenbrenner, Daniela; Baumann, Fabian; Milles, Lukas F; Pippig, Diana A; Gaub, Hermann E

    2015-07-20

    Increased thermal or mechanical stability of DNA duplexes is desired for many applications in nanotechnology or -medicine where DNA is used as a programmable building block. Modifications of pyrimidine bases are known to enhance thermal stability and have the advantage of standard base-pairing and easy integration during chemical DNA synthesis. Through single-molecule force spectroscopy experiments with atomic force microscopy and the molecular force assay we investigated the effect of pyrimidines harboring C-5 propynyl modifications on the mechanical stability of double-stranded DNA. Utilizing these complementary techniques, we show that propynyl bases significantly increase the mechanical stability if the DNA is annealed at high temperature. In contrast, modified DNA complexes formed at room temperature and short incubation times display the same stability as non-modified DNA duplexes. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  12. Relevance of Linear Stability Results to Enhanced Oil Recovery

    Science.gov (United States)

    Ding, Xueru; Daripa, Prabir

    2012-11-01

    How relevant can the results based on linear stability theory for any problem for that matter be to full scale simulation results? Put it differently, is the optimal design of a system based on linear stability results is optimal or even near optimal for the complex nonlinear system with certain objectives of interest in mind? We will address these issues in the context of enhanced oil recovery by chemical flooding. This will be based on an ongoing work. Supported by Qatar National Research Fund (a member of the Qatar Foundation).

  13. Prioritizing low-carbon energy sources to enhance China’s energy security

    International Nuclear Information System (INIS)

    Ren, Jingzheng; Sovacool, Benjamin K.

    2015-01-01

    Highlights: • Four dimensions and ten metrics are used for energy security assessment. • Both qualitative and quantitative metrics are considered for energy security. • AHP has been used to quantify qualitative metrics. • TOPSIS method has been used for prioritize the low-carbon energy sources. • Sensitivity analysis and integrated ranking have been carried out. - Abstract: This paper explores how low-carbon systems compare to each other in terms of their net effect on Chinese energy security, and how they ought to be ranked and strategized into an optimal and integrated resource plan. The paper utilizes Analytic Hierarchy Process (AHP) to first determine the relative performances of hydroelectricity, wind energy, solar energy, biomass energy, and nuclear power with respect to the energy security dimensions of availability, affordability, accessibility, and acceptability. Both qualitative and quantitative metrics are considered. It relies on AHP to calculate the relative weights of the qualitative metrics attached to these dimensions of energy security for each of our five low carbon energy sources. Then, energy security performance is determined by aggregating multiple, weighted metrics into a generic index based on the method of TOPSIS and then tweaked with a sensitivity analysis. Finally, an integrated method has been developed to rank the low-carbon energy systems from most to least important, with major implications for Chinese decision-makers and stakeholders. We conclude that hydroelectricity and wind power are the two low-carbon energy sources with the most potential to enhance China’s energy security. By contrast, nuclear and solar power have the least potential

  14. Transient Stability Enhancement in Power System Using Static VAR Compensator (SVC

    Directory of Open Access Journals (Sweden)

    Youssef MOULOUDI

    2012-12-01

    Full Text Available In this paper, an indirect adaptive fuzzy excitation and static VAR (unit of reactive power, volt-ampere reactive compensator (SVC controller is proposed to enhance transient stability for the power system, which based on input-output linearization technique. A three-bus system, which contains a generator and static VAR compensator (SVC, is considered in this paper, the SVC is located at the midpoint of the transmission lines. Simulation results show that the proposed controller compared with a controller based on tradition linearization technique can enhance the transient stability of the power system under a large sudden fault, which may occur nearly at the generator bus terminal.

  15. Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs.

    Science.gov (United States)

    Huang, Changqin; Ma, Ming; Liu, Xiao; Liu, Anfeng; Zuo, Zhengbang

    2017-06-17

    Fog (from core to edge) computing is a newly emerging computing platform, which utilizes a large number of network devices at the edge of a network to provide ubiquitous computing, thus having great development potential. However, the issue of security poses an important challenge for fog computing. In particular, the Internet of Things (IoT) that constitutes the fog computing platform is crucial for preserving the security of a huge number of wireless sensors, which are vulnerable to attack. In this paper, a new unequal probability marking approach is proposed to enhance the security performance of logging and migration traceback (LM) schemes in tree-based wireless sensor networks (WSNs). The main contribution of this paper is to overcome the deficiency of the LM scheme that has a higher network lifetime and large storage space. In the unequal probability marking logging and migration (UPLM) scheme of this paper, different marking probabilities are adopted for different nodes according to their distances to the sink. A large marking probability is assigned to nodes in remote areas (areas at a long distance from the sink), while a small marking probability is applied to nodes in nearby area (areas at a short distance from the sink). This reduces the consumption of storage and energy in addition to enhancing the security performance, lifetime, and storage capacity. Marking information will be migrated to nodes at a longer distance from the sink for increasing the amount of stored marking information, thus enhancing the security performance in the process of migration. The experimental simulation shows that for general tree-based WSNs, the UPLM scheme proposed in this paper can store 1.12-1.28 times the amount of stored marking information that the equal probability marking approach achieves, and has 1.15-1.26 times the storage utilization efficiency compared with other schemes.

  16. Security Enhancement of Wireless Sensor Networks Using Signal Intervals

    Directory of Open Access Journals (Sweden)

    Jaegeun Moon

    2017-04-01

    Full Text Available Various wireless technologies, such as RF, Bluetooth, and Zigbee, have been applied to sensor communications. However, the applications of Bluetooth-based wireless sensor networks (WSN have a security issue. In one pairing process during Bluetooth communication, which is known as simple secure pairing (SSP, the devices are required to specify I/O capability or user interference to prevent man-in-the-middle (MITM attacks. This study proposes an enhanced SSP in which a nonce to be transferred is converted to a corresponding signal interval. The quantization level, which is used to interpret physical signal intervals, is renewed at every connection by the transferred nonce and applied to the next nonce exchange so that the same signal intervals can represent different numbers. Even if attackers eavesdrop on the signals, they cannot understand what is being transferred because they cannot determine the quantization level. Furthermore, the proposed model does not require exchanging passkeys as data, and the devices are secure in the case of using a fixed PIN. Subsequently, the new quantization level is calculated automatically whenever the same devices attempt to connect with each other. Therefore, the pairing process can be protected from MITM attacks and be convenient for users.

  17. 17 CFR 240.17a-1 - Recordkeeping rule for national securities exchanges, national securities associations...

    Science.gov (United States)

    2010-04-01

    ... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and the...

  18. Physical Layer Built-In Security Analysis and Enhancement Algorithms for CDMA Systems

    Directory of Open Access Journals (Sweden)

    Li Tongtong

    2007-01-01

    Full Text Available Historically developed for secure communication and military use, CDMA has been identified as a major modulation and multiple-access technique for 3G systems and beyond. In addition to the wide bandwidth and low power-spectrum density which make CDMA signals robust to narrowband jamming and easy to be concealed within the noise floor, the physical layer built-in information privacy of CDMA system is provided by pseudorandom scrambling. In this paper, first, security weakness of the operational and proposed CDMA airlink interfaces is analyzed. Second, based on the advanced encryption standard (AES, we propose to enhance the physical layer built-in security of CDMA systems through secure scrambling. Performance analysis demonstrates that while providing significantly improved information privacy, CDMA systems with secure scrambling have comparable computational complexity and overall system performance with that of conventionally scrambled systems. Moreover, it is shown that by scrambling the training sequence and the message sequence separately with two independent scrambling sequences, both information privacy and system performance can be further improved. The proposed scheme can readily be applied to 3G systems and beyond.

  19. Enhancing regional security agreements through cooperative monitoring

    International Nuclear Information System (INIS)

    Pregenzer, A.L.

    1995-05-01

    This paper proposes that strengthening regional capabilities for formulating and implementing arms control and confidence-building measures is a tangible method of enhancing regional security. It discusses the importance of developing a regional infrastructure for arms control and confidence building and elucidates the role of technology in facilitating regional arms control and confidence-building agreements. In addition, it identifies numerous applications for regional cooperative monitoring in the areas of arms control, resource management, international commerce and disaster response. The Cooperative Monitoring Center at Sandia National Laboratories, whose aim is to help individual countries and regions acquire the tools they need to develop their own solutions to regional problems, is discussed briefly. The paper ends with recommendations for establishing regional cooperative monitoring centers

  20. Titoli e attività bancaria: ponti e mura (Securities and Banking: Bridges and Walls

    Directory of Open Access Journals (Sweden)

    Tommaso Padoa-Schioppa

    2002-12-01

    Full Text Available The paper examines the relationship between banking and securities activities in the light of financial market developments (securitisation, institutionalization of investment, emergence of complex financial instruments, conglomeration and consolidation, with particular reference to Europe. The enhanced links between banking and securities businesses have generated increased and new risks to financial institutions. However, banks' stability remains crucial for the stability of the financial system as a whole, because of their unique role as provider of liquidity. The paper also addresses the implications of the banking-securities combination for regulatory and supervisory arrangements. The exporting of prudential requirements traditional in banking (such as capital ratios into the securities field, and the importing of securities regulation (such as transparency requirements into the banking sector, can be deemed mutually beneficial. As regards supervision, there is a need to monitor the continued effectiveness of the current framework. This entails strengthening co-operation both at the national level and on a cross-border basis among sectoral supervisors in the micro-prudential field, and between them and central banks in the macro-prudential field.

  1. Printable luminescent down shifter for enhancing efficiency and stability of organic photovoltaics

    DEFF Research Database (Denmark)

    Kettle, J.; Bristow, N.; Gethin, D.T.

    2016-01-01

    monitoring, using a 16-cell monolithically connected OPV module. By applying the LDS layer, a ~5% relative enhancement in photocurrent is observed for both sets of devices. More significantly, indoor light soaking tests on single cell devices without encapsulation showed an 850% enhancement in the measured...... half-life (T50%). The OPV modules were encapsulated and tested for outdoor stability over a 70 day period in the Negev desert, Israel. The modules made with the LDS filter are shown to match the stability of those made with a commercial UV filter and outperform the modules with no filter applied...

  2. Enhancing energy security in Malayia: the challenges towards sustainable environment

    International Nuclear Information System (INIS)

    Sahid, E J M; Peng, L Y; Siang, C Ch

    2013-01-01

    Energy is known as one of the essential ingredients for economic development and security of energy supply is crucial in ensuring continuous economic development of a country. Malaysia's proven domestic oil reserves are estimated to last for another 25 years, while that of gas for another 39 years as of 2011. Despite the depleting indigenous energy resources, the primary energy demand has continued to grow robustly, at an annual rate of 6.3 percent per year from 1990 to 2010, while the primary energy import has grown 7.2% per year and the primary energy export has grown at a slower rate of 1.9% per year. This worrying trend is further compounded by the faster rate of primary oil import averaging 10.5% per year while the primary energy export has shrink at a rate of 1.4% per year. This paper has identified two main concerns namely overdependence on fossil fuel and increasing energy import dependency in creating a precarious position towards energy self-sufficiency. The study will analyse the energy security of the country and explore possible options and challenges in enhancing the energy supply security toward sustainable environment.

  3. Nanocaged enzymes with enhanced catalytic activity and increased stability against protease digestion

    Science.gov (United States)

    Zhao, Zhao; Fu, Jinglin; Dhakal, Soma; Johnson-Buck, Alexander; Liu, Minghui; Zhang, Ting; Woodbury, Neal W.; Liu, Yan; Walter, Nils G.; Yan, Hao

    2016-01-01

    Cells routinely compartmentalize enzymes for enhanced efficiency of their metabolic pathways. Here we report a general approach to construct DNA nanocaged enzymes for enhancing catalytic activity and stability. Nanocaged enzymes are realized by self-assembly into DNA nanocages with well-controlled stoichiometry and architecture that enabled a systematic study of the impact of both encapsulation and proximal polyanionic surfaces on a set of common metabolic enzymes. Activity assays at both bulk and single-molecule levels demonstrate increased substrate turnover numbers for DNA nanocage-encapsulated enzymes. Unexpectedly, we observe a significant inverse correlation between the size of a protein and its activity enhancement. This effect is consistent with a model wherein distal polyanionic surfaces of the nanocage enhance the stability of active enzyme conformations through the action of a strongly bound hydration layer. We further show that DNA nanocages protect encapsulated enzymes against proteases, demonstrating their practical utility in functional biomaterials and biotechnology. PMID:26861509

  4. Nanocaged enzymes with enhanced catalytic activity and increased stability against protease digestion

    Science.gov (United States)

    Zhao, Zhao; Fu, Jinglin; Dhakal, Soma; Johnson-Buck, Alexander; Liu, Minghui; Zhang, Ting; Woodbury, Neal W.; Liu, Yan; Walter, Nils G.; Yan, Hao

    2016-02-01

    Cells routinely compartmentalize enzymes for enhanced efficiency of their metabolic pathways. Here we report a general approach to construct DNA nanocaged enzymes for enhancing catalytic activity and stability. Nanocaged enzymes are realized by self-assembly into DNA nanocages with well-controlled stoichiometry and architecture that enabled a systematic study of the impact of both encapsulation and proximal polyanionic surfaces on a set of common metabolic enzymes. Activity assays at both bulk and single-molecule levels demonstrate increased substrate turnover numbers for DNA nanocage-encapsulated enzymes. Unexpectedly, we observe a significant inverse correlation between the size of a protein and its activity enhancement. This effect is consistent with a model wherein distal polyanionic surfaces of the nanocage enhance the stability of active enzyme conformations through the action of a strongly bound hydration layer. We further show that DNA nanocages protect encapsulated enzymes against proteases, demonstrating their practical utility in functional biomaterials and biotechnology.

  5. Titoli e attività bancaria: ponti e mura (Securities and Banking: Bridges and Walls

    Directory of Open Access Journals (Sweden)

    Tommaso Padoa-Schioppa

    2012-04-01

    Full Text Available The paper examines the relationship between banking and securities activities in the light of financial market developments (securitisation, institutionalization of investment, emergence of complex financial instruments, conglomeration and consolidation, with particular reference to Europe. The enhanced links between banking and securities businesses have generated increased and new risks to financial institutions. However, banks' stability remains crucial for the stability of the financial system as a whole, because of their unique role as provider of liquidity. The paper also addresses the implications of the banking-securities combination for regulatory and supervisory arrangements. The exporting of prudential requirements traditional in banking (such as capital ratios into the securities field, and the importing of securities regulation (such as transparency requirements into the banking sector, can be deemed mutually beneficial. As regards supervision, there is a need to monitor the continued effectiveness of the current framework. This entails strengthening co-operation both at the national level and on a cross-border basis among sectoral supervisors in the micro-prudential field, and between them and central banks in the macro-prudential field.  JEL Codes: G21, G28, G10Keywords: Bank, Banking, Financial Institution, Financial Market, Securities

  6. Security for whom? Stabilisation and civilian protection in Colombia.

    Science.gov (United States)

    Elhawary, Samir

    2010-10-01

    This paper focuses on three periods of stabilisation in Colombia: the Alliance for Progress (1961-73) that sought to stem the threat of communist revolution in Latin America; Plan Colombia and President Alvaro Uribe's 'democratic security' policy (2000-07) aimed at defeating the guerrillas and negotiating a settlement with the paramilitaries; and the current 'integrated approach', adopted from 2007, to consolidate more effectively the state's control of its territory.(1) The paper assesses the extent to which these stabilisation efforts have enhanced the protection of civilians and ultimately finds that in all three periods there has been a disconnect between the discourse and the practice of stabilisation. While they have all sought to enhance security, in actual fact, they have privileged the security of the state and its allies at the expense of the effective protection of the civilian population. This has not only led to widespread human rights abuses but also has undermined the long-term stability being pursued. © 2010 The Author(s). Journal compilation © Overseas Development Institute, 2010.

  7. Enhancing maternal sensitivity and infant attachment security with video feedback: an exploratory study in Italy.

    Science.gov (United States)

    Cassibba, Rosalinda; Castoro, Germana; Costantino, Elisabetta; Sette, Giovanna; Van Ijzendoorn, Marinus H

    2015-01-01

    This study aims to explore whether a short-term and attachment-based video-feedback intervention, the Video-Feedback Intervention to Promote Positive Parenting With Discussions on the Representational Level (VIPP-R; F. Juffer, M.J. Bakermans-Kranenburg, & M.H. van IJzendoorn, 2008), might be effective in enhancing maternal sensitivity and in promoting infants' attachment security in an Italian sample of dyads with primiparous mothers. Moreover, we explore whether the effectiveness of VIPP-R might be different for parents with insecure attachment representations who might be most in need of preventive intervention, as compared to parents who already have a more balanced and secure state of mind. Thirty-two infants (40% female) and their mothers participated in the study. The sample was divided into an intervention group (n = 16) and a comparison group (n = 16). At 6 and 13 months of age, the Adult Attachment Interview (AAI; M. Main, N. Kaplan, & J. Cassidy, 1985) was administered. Moreover, a 30-min mother-infant play situation was videotaped and coded for maternal sensitivity with the Emotional Availability Scales (Z. Biringen, J. Robinson, & R.N. Emde, 2000). At 13 months of age, the Strange Situation Procedure (M.D.S. Ainsworth, M.D. Blehar, E. Waters, & S. Wall, 1978) was used to assess the security of mother-infant attachment. Results revealed a significant interaction effect between intervention and AAI security for infant attachment security; moreover, main effects of AAI security and intervention for maternal sensitivity were found. The VIPP-R appears effective in enhancing maternal sensitivity and infant attachment security, although only mothers with an insecure attachment representation may benefit from the intervention. © 2014 Michigan Association for Infant Mental Health.

  8. A framework to enhance security of physically unclonable functions using chaotic circuits

    Science.gov (United States)

    Chen, Lanxiang

    2018-05-01

    As a new technique for authentication and key generation, physically unclonable function (PUF) has attracted considerable attentions, with extensive research results achieved already. To resist the popular machine learning modeling attacks, a framework to enhance the security of PUFs is proposed. The basic idea is to combine PUFs with a chaotic system of which the response is highly sensitive to initial conditions. For this framework, a specific construction which combines the common arbiter PUF circuit, a converter, and the Chua's circuit is given to implement a more secure PUF. Simulation experiments are presented to further validate the framework. Finally, some practical suggestions for the framework and specific construction are also discussed.

  9. Quantum-Enhanced Cyber Security: Experimental Computation on Quantum-Encrypted Data

    Science.gov (United States)

    2017-03-02

    AFRL-AFOSR-UK-TR-2017-0020 Quantum-Enhanced Cyber Security: Experimental Computation on Quantum- Encrypted Data Philip Walther UNIVERSITT WIEN Final...on Quantum- Encrypted Data 5a.  CONTRACT NUMBER 5b.  GRANT NUMBER FA9550-16-1-0004 5c.  PROGRAM ELEMENT NUMBER 61102F 6. AUTHOR(S) Philip Walther 5d...1010 AT 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) EOARD Unit 4515 APO AE 09421-4515 10

  10. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    Full Text Available With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  11. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    Science.gov (United States)

    Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  12. Security enhanced multi-factor biometric authentication scheme using bio-hash function

    Science.gov (United States)

    Lee, Youngsook; Moon, Jongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867

  13. Soil Stabilization Methods with Potential for Application at the Nevada National Security Site: A Literature Review

    Energy Technology Data Exchange (ETDEWEB)

    Shillito, Rose [DRI; Fenstermaker, Lynn [DRI

    2014-01-01

    Nuclear testing at the Nevada National Security Site (NNSS) has resulted in large areas of surficial radionuclide-contaminated soils. Much of the radionuclide contamination is found at or near the soil surface, and due to the dry climate setting, and the long half-life of radioactive isotopes, soil erosion poses a long-term health risk at the NNSS. The objective of this literature review is to present a survey of current stabilization methods used for minimizing soil erosion, both by water and wind. The review focuses on in situ uses of fundamental chemical and physical mechanisms for soil stabilization. A basic overview of the physical and chemical properties of soil is also presented to provide a basis for assessing stabilization methods. Some criteria for stabilization evaluation are identified based on previous studies at the NNSS. Although no specific recommendations are presented as no stabilization method, alone or in combination, will be appropriate in all circumstances, discussions of past and current stabilization procedures and specific soil tests that may aid in current or future soil stabilization activities at the NNSS are presented. However, not all Soils Corrective Action Sites (CASs) or Corrective Action Units (CAUs) will require stabilization of surficial radionuclide-contaminated soils. Each Soils CAS or CAU should be evaluated for site-specific conditions to determine if soil stabilization is necessary or practical for a given specific site closure alternative. If stabilization is necessary, then a determination will be made as to which stabilization technique is the most appropriate for that specific site.

  14. Security and Political Stability in the Mediterranean

    Directory of Open Access Journals (Sweden)

    Antonio Marquina

    1997-09-01

    Full Text Available The author revises with a critical eye the treatment given the issue of security during the Euro-Mediterranean process from the Declaration of Barcelona to the Conference at Malta. According to Marquina, no idea of security exists which gives backbone to theEuro-Mediterranen process and the documents themselves contain incoherencies and significant imprecisions, especially regarding the concepts of cooperative security, preventative diplomacy and ‘good neighbor’ relations. These principles appear to be rather underexplained in both their conceptual and operative aspects. On one hand, the information about matters that affect security is exchanged on both a voluntary and official basis and can be, as such, thus opaque and not always reliable; on the other hand, the issues thataffect security are so wide-ranging that the operative approach - the communications network, mechanisms for early-warning, the conciliation and peaceful resolution of controversies - seems hardly realistic. With respect to confidence-building measures, the author considers that these should be linked to arms control agreements, which are more in accord with the stated objectives of defense sufficiency and the non-proliferation of weapons of mass destruction. Marquina also maintains that the role of civil society and the importance of cultural dialogue - both fundamental to conflict prevention - have not been reinforced even though the principal problems of security in the region are due to structural imbalances –military, economical, political– and, precisely the disparities amongcultures. In this sense, the EU states might consider putting forward unilateral policies that restrict such disparities, provided that a certain reciprocity of policy is put forth from the southern states in the Mediterranean.

  15. Secure authentication system that generates seed from biometric information.

    Science.gov (United States)

    Kim, Yeojin; Ahn, Jung-Ho; Byun, Hyeran

    2005-02-10

    As biometric recognition techniques are gradually improved, the stability of biometric authentication systems are enhanced. Although bioinformation has properties that make it resistant to fraud, biometric authentication systems are not immune to hacking. We show a secure biometric authentication system (1) to guarantee the integrity of biometric information by mixing data by use of a biometric key and (2) to raise recognition rates by use of bimodal biometrics.

  16. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  17. Enhancement of small signal stability of a DFIG-based wind power ...

    African Journals Online (AJOL)

    International Journal of Engineering, Science and Technology ... logic controllers for enhancing the small signal stability of DFIG-based wind integrated power system. ... state space model, eigenvalue analysis, fuzzy logic based tuning circuits ...

  18. 17 CFR 240.17a-6 - Right of national securities exchange, national securities association, registered clearing...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Right of national securities exchange, national securities association, registered clearing agency or the Municipal Securities... and Reports of Certain Stabilizing Activities § 240.17a-6 Right of national securities exchange...

  19. VMCast: A VM-Assisted Stability Enhancing Solution for Tree-Based Overlay Multicast.

    Directory of Open Access Journals (Sweden)

    Weidong Gu

    Full Text Available Tree-based overlay multicast is an effective group communication method for media streaming applications. However, a group member's departure causes all of its descendants to be disconnected from the multicast tree for some time, which results in poor performance. The above problem is difficult to be addressed because overlay multicast tree is intrinsically instable. In this paper, we proposed a novel stability enhancing solution, VMCast, for tree-based overlay multicast. This solution uses two types of on-demand cloud virtual machines (VMs, i.e., multicast VMs (MVMs and compensation VMs (CVMs. MVMs are used to disseminate the multicast data, whereas CVMs are used to offer streaming compensation. The used VMs in the same cloud datacenter constitute a VM cluster. Each VM cluster is responsible for a service domain (VMSD, and each group member belongs to a specific VMSD. The data source delivers the multicast data to MVMs through a reliable path, and MVMs further disseminate the data to group members along domain overlay multicast trees. The above approach structurally improves the stability of the overlay multicast tree. We further utilized CVM-based streaming compensation to enhance the stability of the data distribution in the VMSDs. VMCast can be used as an extension to existing tree-based overlay multicast solutions, to provide better services for media streaming applications. We applied VMCast to two application instances (i.e., HMTP and HCcast. The results show that it can obviously enhance the stability of the data distribution.

  20. Enhancing water security in a rapidly developing shale gas region

    Directory of Open Access Journals (Sweden)

    Shannon Holding

    2017-06-01

    New hydrological insights for the region: Initiatives and tools enhancing water security in the region include strategic partnerships and stakeholder collaborations, policy and regulation development, and data collection and distribution efforts. The contributions and limitations of each of these are discussed. A vulnerability mapping framework is presented which addresses data gaps and provides a tool for decision-making surrounding risk to water quality from various hazards. An example vulnerability assessment was conducted for wastewater transport along pipeline and trucking corridors.

  1. Energy Security: From Deal Killers to Game Changers

    Science.gov (United States)

    Cooke, Charlie

    2010-03-01

    Five energy security ``deal killers" are identified: 1) Global warming and CO2 emissions from fossil fuel combustion; 2) Intermittent energy sources (wind, solar) and the presence and stability of the grid; 3) Penetration of plant defenses to produce transportation fuels from biomass; 4) Mimicking nature: artificial photosynthesis for solar energy to fuels; and 5) Spent fuel from nuclear power reactors. Transformational basic research is required to successfully change the ground rules, to transform these ``deal killers" into ``game changers." T hey are: 1) Offsetting carbon capture and storage costs through enhanced oil recovery and methane generation from high temperature geothermal saline aquifers; 2) Electrical energy storage, through batteries and super-capacitors; 3) Genetic modification of plant cell walls, and catalytic methods for transforming plant sugars into fuels; 4) Separation of solar-induced electrons from holes, and catalysis to produce fuels; and 5) Closing the nuclear fuel cycle. Basic research can revolutionize our approach to carbon-free energy by enhancing nature to achieve energy security.

  2. Implementing Physical Protection Education for an Enhanced Nuclear Security Culture

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jeong Ho; Kim, Hyun Chul; Shin, Ick Hyun; Lee, Hyung Kyung; Choe, Kwan Kyoo [KINAC, Daejeon (Korea, Republic of)

    2013-10-15

    In this paper, we are going to outline our efforts and experiences at implementing physical protection education. KINAC (as the only designated educational institute) places great effort in delivering an effective and a high-quality education program for physical protection. We have also provided a way for nuclear operators to share the lessons they have gained through their own experiences. We made physical protection education an important communication channel, not only among nuclear operators but also between operators and a regulatory body. There is growing attention given to education and training on the subject of physical protection in order to enhance the nuclear security culture. The IAEA recommends that all personnel in organizations directly involved with the nuclear industry receive regularly education in physical protection according to the recently revised INFCIRC/225/Rev.5. The Korea Institute of Nuclear Nonproliferation and Control (KINAC) and the Nuclear Safety and Security Commission (NSSC), which are mainly responsible for the national nuclear security regime, have already recognized the importance of education and training in physical protection. The NSSC enacted its decree on physical protection education and training in 2010. KINAC was designated as the first educational institute in 2011 and implemented physical protection education as mandatory from 2012.

  3. Implementing Physical Protection Education for an Enhanced Nuclear Security Culture

    International Nuclear Information System (INIS)

    Lee, Jeong Ho; Kim, Hyun Chul; Shin, Ick Hyun; Lee, Hyung Kyung; Choe, Kwan Kyoo

    2013-01-01

    In this paper, we are going to outline our efforts and experiences at implementing physical protection education. KINAC (as the only designated educational institute) places great effort in delivering an effective and a high-quality education program for physical protection. We have also provided a way for nuclear operators to share the lessons they have gained through their own experiences. We made physical protection education an important communication channel, not only among nuclear operators but also between operators and a regulatory body. There is growing attention given to education and training on the subject of physical protection in order to enhance the nuclear security culture. The IAEA recommends that all personnel in organizations directly involved with the nuclear industry receive regularly education in physical protection according to the recently revised INFCIRC/225/Rev.5. The Korea Institute of Nuclear Nonproliferation and Control (KINAC) and the Nuclear Safety and Security Commission (NSSC), which are mainly responsible for the national nuclear security regime, have already recognized the importance of education and training in physical protection. The NSSC enacted its decree on physical protection education and training in 2010. KINAC was designated as the first educational institute in 2011 and implemented physical protection education as mandatory from 2012

  4. Origin of Activity and Stability Enhancement for Ag3PO4 Photocatalyst after Calcination

    Directory of Open Access Journals (Sweden)

    Pengyu Dong

    2016-11-01

    Full Text Available Pristine Ag3PO4 microspheres were synthesized by a co-precipitation method, followed by being calcined at different temperatures to obtain a series of calcined Ag3PO4 photocatalysts. This work aims to investigate the origin of activity and stability enhancement for Ag3PO4 photocatalyst after calcination based on the systematical analyses of the structures, morphologies, chemical states of elements, oxygen defects, optical absorption properties, separation and transfer of photogenerated electron-hole pairs, and active species. The results indicate that oxygen vacancies (VO˙˙ are created and metallic silver nanoparticles (Ag NPs are formed by the reaction of partial Ag+ in Ag3PO4 semiconductor with the thermally excited electrons from Ag3PO4 and then deposited on the surface of Ag3PO4 microspheres during the calcination process. Among the calcined Ag3PO4 samples, the Ag3PO4-200 sample exhibits the best photocatalytic activity and greatly enhanced photocatalytic stability for photodegradation of methylene blue (MB solution under visible light irradiation. Oxygen vacancies play a significantly positive role in the enhancement of photocatalytic activity, while metallic Ag has a very important effect on improving the photocatalytic stability. Overall, the present work provides some powerful evidences and a deep understanding on the origin of activity and stability enhancement for the Ag3PO4 photocatalyst after calcination.

  5. Enhancement of stability of various nZVI suspensions used in groundwater remediation with environmentally friendly organic stabilizers

    Science.gov (United States)

    Schmid, Doris; Wagner, Stephan; Velimirović, Milica; Laumann, Susanne; Micić, Vesna; Hofmann, Thilo

    2014-05-01

    The use of nanoscale zero-valent iron (nZVI) particles for in situ remediation of polluted soil and groundwater has been shown as one of the most promising techniques [1]. The success of this technology depends on the mobility, reactivity, and longevity of nZVI particles. The mobility of nZVI particles depends on the properties of the single particles, stability of the particle suspension, and the aquifer material [1,2]. In order to enhance the mobility of nZVI, the mobility-decisive properties of the nZVI particles in suspension such as concentration, size distribution, surface charge, and sedimentation rate have to be investigated and optimized. Previous studies showed that pristine nZVI particles aggregate rapidly in water, reducing the particles radius of influence after injection [3]. In order to prevent aggregation and sedimentation of the nZVI particles, and consequently improve the stability of nZVI suspension and therefore the mobility of the nZVI particles, surface stabilizers can be used to provide electrostatic repulsion and steric or electrosteric stabilization [3,4]. The objective of this lab-scale study is to investigate the potential for enhancing the stability of different nZVI suspensions by means of environmentally friendly organic stabilizers, including carboxymethyl cellulose, pectin, alginate, xanthan, and guar gum. The different nZVI particles used included pristine and polyacrylic acid-coated nZVI particles provided in suspension (Nanofer 25 and Nanofer 25S, respectively, NANOIRON s.r.o., Czech Republic), air-stable nZVI particles (Nanofer Star, (NANOIRON s.r.o., Czech Republic), and milled iron flakes (UVR-FIA, Germany). In order to study the enhancement of nZVI stability (1 g L-1 total iron) different concentrations of organic stabilizers (1-20 wt.%) were applied in these nZVI suspensions. Each nZVI suspension was freshly prepared and treated for 10 minutes with Ultra-Turrax (15 000 rpm) and 10 minutes ultrasonic bath prior to

  6. Stabilizing Niger

    DEFF Research Database (Denmark)

    Hahonou, Eric Komlavi

    international intervention in Niger. Their main objective is to secure their own strategic, economic and political interests by strengthening the Nigerien authorities through direct intervention and capacity building activities. For western states reinforcing state security institutions and stabilizing elite...

  7. The Importance of the Study of Cognitive Performance Enhancement for U.S. National Security.

    Science.gov (United States)

    Malish, Richard G

    2017-08-01

    The American military is embarking on the 'Third Offset'-a strategy designed to produce seismic shifts in the future of warfare. Central to the approach is the conjoining of humans, technology, and machines to deliver a decisive advantage on the battlefield. Because technology will spread rapidly and globally, tactical overmatch will occur when American operators possess a competitive edge in cognition. Investigation of cognitive enhancing therapeutics is not widely articulated as an adjunct to the Third Offset, yet failure to study promising agents could represent a strategic vulnerability. Because of its legacy of research into therapeutic agents to enhance human-machine interplay, the aerospace medical community represents a front-running candidate to perform this work. Notably, there are strong signals emanating from gambling, academic, and video-gaming enterprises that already-developed stimulants and other agents provide cognitive benefits. These agents should be studied not only for reasons of national security, but also because cognitive enhancement may be a necessary step in the evolution of humankind. To illustrate these points, this article will assert that: 1) the need to preserve and enhance physical and cognitive health will become more and more important over the next century; 2) aeromedical specialists are in a position to take the lead in the endeavor to enhance cognition; 3) signals of enhancement of the type useful to both military and medical efforts exist aplenty in today's society; and 4) the aeromedical community should approach human enhancement research deliberately but carefully.Malish RG. The importance of the study of cognitive performance enhancement for U.S. national security. Aerosp Med Hum Perform. 2017; 88(8):773-778.

  8. Sowing the Seeds of Strategic Success Across West Africa: Propagating the State Partnership Program to Shape the Security Environment

    Science.gov (United States)

    2017-06-09

    region’s continued growth in economics , population, influence, and the correlating 17 increase in risks to stability from radicalization and...environment and stem the tide of regional instability . The National Guard’s State Partnership Program is a security cooperation tool that Geographic... instability . The National Guard’s State Partnership Program is a security cooperation tool that Geographic Combatant Commanders can leverage to enhance the

  9. Hybrid algorithm for rotor angle security assessment in power systems

    Directory of Open Access Journals (Sweden)

    D. Prasad Wadduwage

    2015-08-01

    Full Text Available Transient rotor angle stability assessment and oscillatory rotor angle stability assessment subsequent to a contingency are integral components of dynamic security assessment (DSA in power systems. This study proposes a hybrid algorithm to determine whether the post-fault power system is secure due to both transient rotor angle stability and oscillatory rotor angle stability subsequent to a set of known contingencies. The hybrid algorithm first uses a new security measure developed based on the concept of Lyapunov exponents (LEs to determine the transient security of the post-fault power system. Later, the transient secure power swing curves are analysed using an improved Prony algorithm which extracts the dominant oscillatory modes and estimates their damping ratios. The damping ratio is a security measure about the oscillatory security of the post-fault power system subsequent to the contingency. The suitability of the proposed hybrid algorithm for DSA in power systems is illustrated using different contingencies of a 16-generator 68-bus test system and a 50-generator 470-bus test system. The accuracy of the stability conclusions and the acceptable computational burden indicate that the proposed hybrid algorithm is suitable for real-time security assessment with respect to both transient rotor angle stability and oscillatory rotor angle stability under multiple contingencies of the power system.

  10. ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6

    Science.gov (United States)

    You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki

    Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.

  11. Novel security enhancement technique against eavesdropper for OCDMA system using 2-D modulation format with code switching scheme

    Science.gov (United States)

    Singh, Simranjit; Kaur, Ramandeep; Singh, Amanvir; Kaler, R. S.

    2015-03-01

    In this paper, security of the spectrally encoded-optical code division multiplexed access (OCDMA) system is enhanced by using 2-D (orthogonal) modulation technique. This is an effective approach for simultaneous improvement of the system capacity and security. Also, the results show that the hybrid modulation technique proved to be a better option to enhance the data confidentiality at higher data rates using minimum utilization of bandwidth in a multiuser environment. Further, the proposed system performance is compared with the current state-of-the-art OCDMA schemes.

  12. Enhancing Food Security through Information and Communication ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... national food security, and prior approval of the government's National Food Security and Nutrition Policy 2006-2015. In alignment with these governmental commitments, this project will enable researchers to provide policymakers with practical and sustainable solutions that directly respond to national food security goals ...

  13. Optical and tribomechanical stability of optically variable interference security devices prepared by dual ion beam sputtering.

    Science.gov (United States)

    Çetinörgü-Goldenberg, Eda; Baloukas, Bill; Zabeida, Oleg; Klemberg-Sapieha, Jolanta; Martinu, Ludvik

    2011-07-01

    Optical security devices applied to banknotes and other documents are exposed to different types of harsh environments involving the cycling of temperature, humidity, chemical agents, and tribomechanical intrusion. In the present work, we study the stability of optically variable devices, namely metameric interference filters, prepared by dual ion beam sputtering onto polycarbonate and glass substrates. Specifically, we assess the color difference as well as the changes in the mechanical properties and integrity of all-dielectric and metal-dielectric systems due to exposure to bleach, detergent and acetone agents, and heat and humidity. The results underline a significant role of the substrate material, of the interfaces, and of the nature and microstructure of the deposited films in long term stability under everyday application conditions.

  14. A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform

    Directory of Open Access Journals (Sweden)

    Srinivas Koppu

    2017-01-01

    Full Text Available An enhanced secure image chaotic cryptosystem has been proposed based on hybrid CMT-Lanczos algorithm. We have achieved fast encryption and decryption along with privacy of images. The pseudorandom generator has been used along with Lanczos algorithm to generate root characteristics and eigenvectors. Using hybrid CMT image, pixels are shuffled to accomplish excellent randomness. Compared with existing methods, the proposed method had more robustness to various attacks: brute-force attack, known cipher plaintext, chosen-plaintext, security key space, key sensitivity, correlation analysis and information entropy, and differential attacks. Simulation results show that the proposed methods give better result in protecting images with low-time complexity.

  15. Secure and privacy enhanced gait authentication on smart phone.

    Science.gov (United States)

    Hoang, Thang; Choi, Deokjai

    2014-01-01

    Smart environments established by the development of mobile technology have brought vast benefits to human being. However, authentication mechanisms on portable smart devices, particularly conventional biometric based approaches, still remain security and privacy concerns. These traditional systems are mostly based on pattern recognition and machine learning algorithms, wherein original biometric templates or extracted features are stored under unconcealed form for performing matching with a new biometric sample in the authentication phase. In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. Gait signals are acquired by using an inertial sensor named accelerometer in the mobile device and error correcting codes are adopted to deal with the natural variation of gait measurements. We evaluate our proposed system on a dataset consisting of gait samples of 34 volunteers. We achieved the lowest false acceptance rate (FAR) and false rejection rate (FRR) of 3.92% and 11.76%, respectively, in terms of key length of 50 bits.

  16. Secure and Privacy Enhanced Gait Authentication on Smart Phone

    Directory of Open Access Journals (Sweden)

    Thang Hoang

    2014-01-01

    Full Text Available Smart environments established by the development of mobile technology have brought vast benefits to human being. However, authentication mechanisms on portable smart devices, particularly conventional biometric based approaches, still remain security and privacy concerns. These traditional systems are mostly based on pattern recognition and machine learning algorithms, wherein original biometric templates or extracted features are stored under unconcealed form for performing matching with a new biometric sample in the authentication phase. In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. Gait signals are acquired by using an inertial sensor named accelerometer in the mobile device and error correcting codes are adopted to deal with the natural variation of gait measurements. We evaluate our proposed system on a dataset consisting of gait samples of 34 volunteers. We achieved the lowest false acceptance rate (FAR and false rejection rate (FRR of 3.92% and 11.76%, respectively, in terms of key length of 50 bits.

  17. 1 THE HUMANITIES AND NATIONAL IDENTITY, SECURITY AND ...

    African Journals Online (AJOL)

    User

    ethnicity in favour of social stability as a pre-requisite for security. ... Humanities, National Identity, Ethnicity, Security and Political. Stability. .... instability. They are often used in open violence during elections where contending political ...

  18. Fluorinated Phosphorene: Electrochemical Synthesis, Atomistic Fluorination, and Enhanced Stability.

    Science.gov (United States)

    Tang, Xian; Liang, Weiyuan; Zhao, Jinlai; Li, Zhongjun; Qiu, Meng; Fan, Taojian; Luo, Crystal Shaojuan; Zhou, Ye; Li, Yu; Guo, Zhinan; Fan, Dianyuan; Zhang, Han

    2017-12-01

    Phosphorene has attracted great interest due to its unique electronic and optoelectronic properties owing to its tunable direct and moderate band-gap in association with high carrier mobility. However, its intrinsic instability in air seriously hinders its practical applications, and problems of technical complexity and in-process degradation exist in currently proposed stabilization strategies. A facile pathway in obtaining and stabilizing phosphorene through a one-step, ionic liquid-assisted electrochemical exfoliation and synchronous fluorination process is reported in this study. This strategy enables fluorinated phosphorene (FP) to be discovered and large-scale, highly selective few-layer FP (3-6 atomic layers) to be obtained. The synthesized FP is found to exhibit unique morphological and optical characteristics. Possible atomistic fluorination configurations of FP are revealed by core-level binding energy shift calculations in combination with spectroscopic measurements, and the results indicate that electrolyte concentration significantly modulates the fluorination configurations. Furthermore, FP is found to exhibit enhanced air stability thanks to the antioxidation and antihydration effects of the introduced fluorine adatoms, and demonstrate excellent photothermal stability during a week of air exposure. These findings pave the way toward real applications of phosphorene-based nanophotonics. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  19. DefenseLink: Securing Afganistan, Stabilization & Growth

    Science.gov (United States)

    since, the International Security Assistance Force, under NATO leadership, has taken charge of extensive conditions for the growth of an effective, democratic national government in Afghanistan. As the lead member

  20. Stabilizing ultrasmall Au clusters for enhanced photoredox catalysis.

    Science.gov (United States)

    Weng, Bo; Lu, Kang-Qiang; Tang, Zichao; Chen, Hao Ming; Xu, Yi-Jun

    2018-04-18

    Recently, loading ligand-protected gold (Au) clusters as visible light photosensitizers onto various supports for photoredox catalysis has attracted considerable attention. However, the efficient control of long-term photostability of Au clusters on the metal-support interface remains challenging. Herein, we report a simple and efficient method for enhancing the photostability of glutathione-protected Au clusters (Au GSH clusters) loaded on the surface of SiO 2 sphere by utilizing multifunctional branched poly-ethylenimine (BPEI) as a surface charge modifying, reducing and stabilizing agent. The sequential coating of thickness controlled TiO 2 shells can further significantly improve the photocatalytic efficiency, while such structurally designed core-shell SiO 2 -Au GSH clusters-BPEI@TiO 2 composites maintain high photostability during longtime light illumination conditions. This joint strategy via interfacial modification and composition engineering provides a facile guideline for stabilizing ultrasmall Au clusters and rational design of Au clusters-based composites with improved activity toward targeting applications in photoredox catalysis.

  1. Novel Approaches to Enhance Mobile WiMAX Security

    Directory of Open Access Journals (Sweden)

    Taeshik Shon

    2010-01-01

    Full Text Available The IEEE 802.16 Working Group on Broadband Wireless Access Standards released IEEE 802.16-2004 which is a standardized technology for supporting broadband and wireless communication with fixed and nomadic access. After the IEEE 802.16-2004 standard, a new advanced and revised standard was released as the IEEE 802.16e-2005 amendment which is foundation of Mobile WiMAX network supporting handover and roaming capabilities. In the area of security aspects, compared to IEEE 802.16-2004, IEEE 802.16e, called Mobile WiMAX, adopts improved security architecture—PKMv2 which includes EAP authentication, AES-based authenticated encryption, and CMAC or HMAC message protection. However, there is no guarantee that PKMv2-based Mobile WiMAX network will not have security flaws. In this paper, we investigate the current Mobile WiMAX security architecture focusing mainly on pointing out new security vulnerabilities such as a disclosure of security context in network entry, a lack of secure communication in network domain, and a necessity of efficient handover supporting mutual authentication. Based on the investigation results, we propose a novel Mobile WiMAX security architecture, called RObust and Secure MobilE WiMAX (ROSMEX, to prevent the new security vulnerabilities.

  2. Enhancing Security and Stability in Afghanistan

    Science.gov (United States)

    2016-06-01

    accept Afghan constitutional safeguards for women and ethnic minorities. As the Afghan government works toward this end, developing ANDSF...the 2001 Authorization for the Use of Military Force and the President’s constitutional authority as the Commander in Chief as its domestic legal...Czech Republic 288 Slovakia 83 Denmark 82 Slovenia 0 Estonia 5 Spain 25 Finland 22 Sweden 26 Georgia 867 FYR of Macedonia 39 Germany 884 Turkey 743

  3. Time for Stability in Derivatives Markets – a New Look at Central Counterparty Clearing for Securities Markets

    OpenAIRE

    Thorsten V. Koeppl

    2011-01-01

    The recent financial crisis has driven many plans for improving the stability and resilience of the global financial system. One concept, managing the risk of default in securities or financial derivatives markets through central counterparties, receives scrutiny in this report. The author examines the role centralized clearing parties could play in improving system resilience. These centralized clearing parties are institutions that interpose themselves between counterparties in financial tr...

  4. Enhancing Experiment Central Service Reliability: from delivery to security and virtualization

    CERN Document Server

    Donno, Flavia; Buzykaev, Alexey; Saiz Santos, Maria Dolores

    2011-01-01

    The four LHC experiments rely on experiment specific services running on machines mainly located at CERN. Some of these services have been rated by the experiments as very critical: any loss or degradation of performance has a major impact on the experiment's production and analysis activities. It is therefore important to provide a reliable and robust operational environment. In this work we describe the strategy based on service deployment, security and virtualization adopted to enhance the reliability of ATLAS and CMS central services.

  5. An enhanced performance through agent-based secure approach for mobile ad hoc networks

    Science.gov (United States)

    Bisen, Dhananjay; Sharma, Sanjeev

    2018-01-01

    This paper proposes an agent-based secure enhanced performance approach (AB-SEP) for mobile ad hoc network. In this approach, agent nodes are selected through optimal node reliability as a factor. This factor is calculated on the basis of node performance features such as degree difference, normalised distance value, energy level, mobility and optimal hello interval of node. After selection of agent nodes, a procedure of malicious behaviour detection is performed using fuzzy-based secure architecture (FBSA). To evaluate the performance of the proposed approach, comparative analysis is done with conventional schemes using performance parameters such as packet delivery ratio, throughput, total packet forwarding, network overhead, end-to-end delay and percentage of malicious detection.

  6. Aluminum nanostructures with strong visible-range SERS activity for versatile micropatterning of molecular security labels.

    Science.gov (United States)

    Lay, Chee Leng; Koh, Charlynn Sher Lin; Wang, Jing; Lee, Yih Hong; Jiang, Ruibin; Yang, Yijie; Yang, Zhe; Phang, In Yee; Ling, Xing Yi

    2018-01-03

    The application of aluminum (Al)-based nanostructures for visible-range plasmonics, especially for surface-enhanced Raman scattering (SERS), currently suffers from inconsistent local electromagnetic field distributions and/or inhomogeneous distribution of probe molecules. Herein, we lithographically fabricate structurally uniform Al nanostructures which enable homogeneous adsorption of various probe molecules. Individual Al nanostructures exhibit strong local electromagnetic field enhancements, in turn leading to intense SERS activity. The average SERS enhancement factor (EF) for individual nanostructures exceeds 10 4 for non-resonant probe molecules in the visible spectrum. These Al nanostructures also retain more than 70% of their original SERS intensities after one-month storage, displaying superb stability under ambient conditions. We further achieve tunable polarization-dependent SERS responses using anisotropic Al nanostructures, facilitating the design of sophisticated SERS-based security labels. Our micron-sized security label comprises two-tier security features, including a machine-readable hybrid quick-response (QR) code overlaid with a set of ciphertexts. Our work demonstrates the versatility of Al-based structures in low-cost modern chemical nano-analytics and forgery protection.

  7. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  8. Both solubility and chemical stability of curcumin are enhanced by solid dispersion in cellulose derivative matrices.

    Science.gov (United States)

    Li, Bin; Konecke, Stephanie; Wegiel, Lindsay A; Taylor, Lynne S; Edgar, Kevin J

    2013-10-15

    Amorphous solid dispersions (ASD) of curcumin (Cur) in cellulose derivative matrices, hydroxypropylmethylcellulose acetate succinate (HPMCAS), carboxymethylcellulose acetate butyrate (CMCAB), and cellulose acetate adipate propionate (CAAdP) were prepared in order to investigate the structure-property relationship and identify polymer properties necessary to effectively increase Cur aqueous solution concentration. XRD results indicated that all investigated solid dispersions were amorphous, even at a 9:1 Cur:polymer ratio. Both stability against crystallization and Cur solution concentration from these ASDs were significantly higher than those from physical mixtures and crystalline Cur. Remarkably, curcumin was also stabilized against chemical degradation in solution. Chemical stabilization was polymer-dependent, with stabilization in CAAdP>CMCAB>HPMCAS>PVP, while matrices enhanced solution concentration as PVP>HPMCAS>CMCAB≈CAAdP. HPMCAS/Cur dispersions have useful combinations of pH-triggered release profile, chemical stabilization, and strong enhancement of Cur solution concentration. Copyright © 2013 Elsevier Ltd. All rights reserved.

  9. Enhancing Activity and Stability of Uricase from Lactobacillus plantarum by Zeolite immobilization

    Science.gov (United States)

    Iswantini, D.; Nurhidayat, N.; Sarah

    2017-03-01

    Lactobacillus plantarum has been known be able to produce uricase for uric acid biosensor. Durability and stability of L. plantarum in generating uricase enzyme was low. Hence, we tried to enhance its durability and stability by immobilizing it onto activated 250 mg zeolite at room temperature using 100 μL L.plantarum suspension and 2.87 mM uric acid, while Michaelis-Menten constant (KM) and Vmax were obtained at 6.7431 mM and 0.9171 µA consecutively, and the linearity range was 0.1-3.3 mM (R2 = 0.9667). Limit of detection (LOD) and limit of quantification (LOQ) value of the measurement were 0.4827 mM and 1.6092 mM respectively. Biosensor stability treatment was carried out in two different treatments, using the same electrode and using disposable electrode. The disposable electrode stability showed better result based on repeated measurements, but stability was still need improvement.

  10. Microsoft Windows Server 2003: Security Enhancements and New Features

    National Research Council Canada - National Science Library

    Montehermoso, Ronald

    2004-01-01

    .... Windows NT and Windows 2000 were known to have numerous security vulnerabilities; hence Microsoft focused on improving security by making Windows Server 2003 secure by design, secure by default, secure in deployment...

  11. 2008 Stability, Security, Transition and Reconstruction Operations Conference

    Science.gov (United States)

    2008-09-04

    Facilitator Power of Public-Private Partnerships • Health Professional Education • Greater Access to Care China Diabetes Education Program Dominican Republic...Argentina Canada Chile Colombia Ecuador Peru Uruguay Interagency, multinational, inter-institutional partnerships State Department Homeland Security...Disaster Preparedness Disaster Response Regional Response Capacity OFDA-LAC / MDROs Regional Security System (RSS) UNCLASSIFIED ECUADOR / KY PERU / WV

  12. Enhanced Stability of Inactivated Influenza Vaccine Encapsulated in Dissolving Microneedle Patches.

    Science.gov (United States)

    Chu, Leonard Y; Ye, Ling; Dong, Ke; Compans, Richard W; Yang, Chinglai; Prausnitz, Mark R

    2016-04-01

    This study tested the hypothesis that encapsulation of influenza vaccine in microneedle patches increases vaccine stability during storage at elevated temperature. Whole inactivated influenza virus vaccine (A/Puerto Rico/8/34) was formulated into dissolving microneedle patches and vaccine stability was evaluated by in vitro and in vivo assays of antigenicity and immunogenicity after storage for up to 3 months at 4, 25, 37 and 45°C. While liquid vaccine completely lost potency as determined by hemagglutination (HA) activity within 1-2 weeks outside of refrigeration, vaccine in microneedle patches lost 40-50% HA activity during or shortly after fabrication, but then had no significant additional loss of activity over 3 months of storage, independent of temperature. This level of stability required reduced humidity by packaging with desiccant, but was not affected by presence of oxygen. This finding was consistent with additional stability assays, including antigenicity of the vaccine measured by ELISA, virus particle morphological structure captured by transmission electron microscopy and protective immune responses by immunization of mice in vivo. These data show that inactivated influenza vaccine encapsulated in dissolving microneedle patches has enhanced stability during extended storage at elevated temperatures.

  13. Cross-linkable liposomes stabilize a magnetic resonance contrast-enhancing polymeric fastener.

    Science.gov (United States)

    Smith, Cartney E; Kong, Hyunjoon

    2014-04-08

    Liposomes are commonly used to deliver drugs and contrast agents to their target site in a controlled manner. One of the greatest obstacles in the performance of such delivery vehicles is their stability in the presence of serum. Here, we demonstrate a method to stabilize a class of liposomes that load gadolinium, a magnetic resonance (MR) contrast agent, as a model cargo on their surfaces. We hypothesized that the sequential adsorption of a gadolinium-binding chitosan fastener on the liposome surface followed by covalent cross-linking of the lipid bilayer would provide enhanced stability and improved MR signal in the presence of human serum. To investigate this hypothesis, liposomes composed of diyne-containing lipids were assembled and functionalized via chitosan conjugated with a hydrophobic anchor and diethylenetriaminepentaacetic acid (DTPA). This postadsorption cross-linking strategy served to stabilize the thermodynamically favorable association between liposome and polymeric fastener. Furthermore, the chitosan-coated, cross-linked liposomes proved more effective as delivery vehicles of gadolinium than uncross-linked liposomes due to the reduced liposome degradation and chitosan desorption. Overall, this study demonstrates a useful method to stabilize a broad class of particles used for systemic delivery of various molecular payloads.

  14. Natural polyphenols enhance stability of crosslinked UHMWPE for joint implants.

    Science.gov (United States)

    Shen, Jie; Gao, Guorong; Liu, Xincai; Fu, Jun

    2015-03-01

    Radiation-crosslinked UHMWPE has been used for joint implants since the 1990s. Postirradiation remelting enhances oxidative stability, but with some loss in strength and toughness. Vitamin E-stabilized crosslinked UHMWPE has shown improved strength and stability as compared with irradiated and remelted UHMWPE. With more active phenolic hydroxyl groups, natural polyphenols are widely used in the food and pharmaceutical industries as potent stabilizers and could be useful for oxidative stability in crosslinked UHMWPE. We asked whether UHMWPE blended with polyphenols would (1) show higher oxidation resistance after radiation crosslinking; (2) preserve the mechanical properties of UHMWPE after accelerated aging; and (3) alter the wear resistance of radiation-crosslinked UHMWPE. The polyphenols, gallic acid and dodecyl gallate, were blended with medical-grade UHMWPE followed by consolidation and electron beam irradiation at 100 kGy. Radiation-crosslinked virgin and vitamin E-blended UHMWPEs were used as reference materials. The UHMWPEs were aged at 120 °C in air with oxidation levels analyzed by infrared spectroscopy. Tensile (n = 5 per group) and impact (n = 3 per group) properties before and after aging as per ASTM F2003 were evaluated. The wear rates were examined by pin-on-disc testing (n = 3 per group). The data were reported as mean ± SDs. Statistical analysis was performed by using Student's t-test for a two-tailed distribution with unequal variance for tensile and impact data obtained with n ≥ 3. A significant difference is defined with p Accelerated aging of these polyphenol-blended UHMWPEs resulted in ultimate tensile strength of 50.4 ± 1.4 MPa and impact strength of 53 ± 5 kJ/m(2) for 100 kGy-irradiated UHMWPE with 0.05 wt% dodecyl gallate, for example, in comparison to 51.2 ± 0.7 MPa (p = 0.75) and 58 ± 5 kJ/m(2) (p = 0.29) before aging. The pin-on-disc wear rates of 100 kGy-irradiated UHMWPE with 0.05 wt% dodecyl gallate and 0.05 wt% gallic acid

  15. Towards passive and active laser stabilization using cavity-enhanced atomic interaction

    DEFF Research Database (Denmark)

    Schäffer, Stefan Alaric; Christensen, Bjarke Takashi Røjle; Rathmann, Stefan Mossor

    2017-01-01

    Ultra stable frequency references such as the ones used in optical atomic clocks and for quantum metrology may be obtained by stabilizing a laser to an optical cavity that is stable over time. State-of-the-art frequency references are constructed in this way, but their stabilities are currently...... experimental efforts derived from these proposals, to use cavity-enhanced interaction with atomic 88Sr samples as a frequency reference for laser stabilization. Such systems can be realized using both passive and active approaches where either the atomic phase response is used as an error signal, or the narrow...... atomic transition itself is used as a source for a spectrally pure laser. Both approaches shows the promise of being able to compete with the current state of the art in stable lasers and have similar limitations on their ultimately achievable linewidths [1, 2]....

  16. Enhancing Parliamentary Oversight for Effective Security Sector ...

    African Journals Online (AJOL)

    2015-06-09

    Jun 9, 2015 ... transition from violent conflict or prolonged authoritarian rule. .... State whose primary interest was to secure his regime and prevent ... June 12, 1993 presidential elections triggered the emergence of violent non-state security.

  17. Integration of the advanced transparency framework to advanced nuclear systems : enhancing Safety, Operations, Security and Safeguards (SOSS)

    International Nuclear Information System (INIS)

    Mendez, Carmen Margarita; Rochau, Gary Eugene; Cleary, Virginia D.

    2008-01-01

    The advent of the nuclear renaissance gives rise to a concern for the effective design of nuclear fuel cycle systems that are safe, secure, nonproliferating and cost-effective. We propose to integrate the monitoring of the four major factors of nuclear facilities by focusing on the interactions between Safeguards, Operations, Security, and Safety (SOSS). We proposed to develop a framework that monitors process information continuously and can demonstrate the ability to enhance safety, operations, security, and safeguards by measuring and reducing relevant SOSS risks, thus ensuring the safe and legitimate use of the nuclear fuel cycle facility. A real-time comparison between expected and observed operations provides the foundation for the calculation of SOSS risk. The automation of new nuclear facilities requiring minimal manual operation provides an opportunity to utilize the abundance of process information for monitoring SOSS risk. A framework that monitors process information continuously can lead to greater transparency of nuclear fuel cycle activities and can demonstrate the ability to enhance the safety, operations, security and safeguards associated with the functioning of the nuclear fuel cycle facility. Sandia National Laboratories (SNL) has developed a risk algorithm for safeguards and is in the process of demonstrating the ability to monitor operational signals in real-time though a cooperative research project with the Japan Atomic Energy Agency (JAEA). The risk algorithms for safety, operations and security are under development. The next stage of this work will be to integrate the four algorithms into a single framework

  18. Enhanced stability of black phosphorus field-effect transistors with SiO₂ passivation.

    Science.gov (United States)

    Wan, Bensong; Yang, Bingchao; Wang, Yue; Zhang, Junying; Zeng, Zhongming; Liu, Zhongyuan; Wang, Wenhong

    2015-10-30

    Few-layer black phosphorus (BP) has attracted much attention due to its high mobility and suitable band gap for potential applic5ations in optoelectronics and flexible devices. However, its instability under ambient conditions limits its practical applications. Our investigations indicate that by passivation of the mechanically exfoliated BP flakes with a SiO2 layer, the fabricated BP field-effect transistors (FETs) exhibit greatly enhanced environmental stability. Compared to the unpassivated BP devices, which show a fast drop of on/off current ratio by a factor of 10 after one week of ambient exposure, the SiO2-passivated BP devices display a high retained on/off current ratio of over 600 after one week of exposure, just a little lower than the initial value of 810. Our investigations provide an effective route to passivate the few-layer BPs for enhancement of their environmental stability.

  19. Public assessment of new surveillance-oriented security technologies: Beyond the trade-off between privacy and security.

    Science.gov (United States)

    Pavone, Vincenzo; Esposti, Sara Degli

    2012-07-01

    As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.

  20. Conflicts in the Horn of Africa and their Consequences on Sudan's Stability and Security

    Directory of Open Access Journals (Sweden)

    Elfatih Abdullahi Abdel Salam

    1995-06-01

    Full Text Available Armed conflicts in the Horn of Africa have been raging in that region for the last forty years with tragic consequences for human life and for economic advancement. These conflicts have three different, but overlapping dimensions: the intrastate, the interstate, and the global levels. The conflicts are of a decided relevance for the Sudan, and particularly to the rebellion in the southern Sudan. The lack of security and stability in southern Sudan forced hundreds of thousand southerners into neighbouring countries, especially Ethiopia and Uganda. Likewise, the Sudan hosted hundreds of thousands Eritreans, Ethiopians, and Ugandans caught in the crossfire of their national conflicts. This development not only created a heavy economic burden on these relatively poor and economically underdeveloped communities, but led to strained political relations among governments. The Sudan has deep-seated security concerns emanating from the tragic developments in that part of the world. It is argued that one practical step to defuse the situation is to look for political solutions for essentially political problems. The next step that follows logically from the first step is to establish economic cooperation arrangements with a view to creating a future economic community in that African region.

  1. Security-enhanced chaos communication with time-delay signature suppression and phase encryption.

    Science.gov (United States)

    Xue, Chenpeng; Jiang, Ning; Lv, Yunxin; Wang, Chao; Li, Guilan; Lin, Shuqing; Qiu, Kun

    2016-08-15

    A security-enhanced chaos communication scheme with time delay signature (TDS) suppression and phase-encrypted feedback light is proposed, in virtue of dual-loop feedback with independent high-speed phase modulation. We numerically investigate the property of TDS suppression in the intensity and phase space and quantitatively discuss security of the proposed system by calculating the bit error rate of eavesdroppers who try to crack the system by directly filtering the detected signal or by using a similar semiconductor laser to synchronize the link signal and extract the data. The results show that TDS embedded in the chaotic carrier can be well suppressed by properly setting the modulation frequency, which can keep the time delay a secret from the eavesdropper. Moreover, because the feedback light is encrypted, without the accurate time delay and key, the eavesdropper cannot reconstruct the symmetric operation conditions and decode the correct data.

  2. Optimizing Tube Precurvature to Enhance Elastic Stability of Concentric Tube Robots.

    Science.gov (United States)

    Ha, Junhyoung; Park, Frank C; Dupont, Pierre E

    2017-02-01

    Robotic instruments based on concentric tube technology are well suited to minimally invasive surgery since they are slender, can navigate inside small cavities and can reach around sensitive tissues by taking on shapes of varying curvature. Elastic instabilities can arise, however, when rotating one precurved tube inside another. In contrast to prior work that considered only tubes of piecewise constant precurvature, we allow precurvature to vary along the tube's arc length. Stability conditions for a planar tube pair are derived and used to formulate an optimal design problem. An analytic formulation of the optimal precurvature function is derived that achieves a desired tip orientation range while maximizing stability and respecting bending strain limits. This formulation also includes straight transmission segments at the proximal ends of the tubes. The result, confirmed by both numerical and physical experiment, enables designs with enhanced stability in comparison to designs of constant precurvature.

  3. Multimedia Security System for Security and Medical Applications

    Science.gov (United States)

    Zhou, Yicong

    2010-01-01

    This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…

  4. What kind of cyber security? Theorising cyber security and mapping approaches

    OpenAIRE

    Laura Fichtner

    2018-01-01

    Building on conceptual work on security and cyber security, the paper explores how different approaches to cyber security are constructed. It outlines structural components and presents four common approaches. Each of them suggests a different role for the actors involved and is motivated and justified by different values such as privacy, economic order and national security. When a cyber security policy or initiative is chosen by policymakers, the analysis of the underlying approach enhances...

  5. Application of Evolutionary Mechanisms of Enhancers for Development Effective Artificial Intelligence Systems for Providing Data Security

    Directory of Open Access Journals (Sweden)

    M. L. Garanina

    2010-06-01

    Full Text Available This article describes the base approaches of the methods of evolutionary mechanisms (special type of genes — enhancers for parameterizations of AI systems genotype. This method can help in increasing adaptability of AI systems for providing data security.

  6. Rapid stabilization of thawing soils For enhanced vehicle mobility: a field demonstration project

    Science.gov (United States)

    1999-02-01

    Thawing soil presents a formidable challenge for vehicle operations cross-country and on unsurfaced roads. To mitigate the problem, a variety of stabilization techniques were evaluated for their suitability for rapid employment to enhance military ve...

  7. Feasibility of a novel participatory multi-sector continuous improvement approach to enhance food security in remote Indigenous Australian communities.

    Science.gov (United States)

    Brimblecombe, J; Bailie, R; van den Boogaard, C; Wood, B; Liberato, S C; Ferguson, M; Coveney, J; Jaenke, R; Ritchie, J

    2017-12-01

    Food insecurity underlies and compounds many of the development issues faced by remote Indigenous communities in Australia. Multi-sector approaches offer promise to improve food security. We assessed the feasibility of a novel multi-sector approach to enhance community food security in remote Indigenous Australia. A longitudinal comparative multi-site case study, the Good Food Systems Good Food for All Project, was conducted (2009-2013) with four Aboriginal communities. Continuous improvement meetings were held in each community. Data from project documents and store sales were used to assess feasibility according to engagement, uptake and sustainability of action, and impact on community diet, as well as identifying conditions facilitating or hindering these. Engagement was established where: the community perceived a need for the approach; where trust was developed between the community and facilitators; where there was community stability; and where flexibility was applied in the timing of meetings. The approach enabled stakeholders in each community to collectively appraise the community food system and plan action. Actions that could be directly implemented within available resources resulted from developing collaborative capacity. Actions requiring advocacy, multi-sectoral involvement, commitment or further resources were less frequently used. Positive shifts in community diet were associated with key areas where actions were implemented. A multi-sector participatory approach seeking continuous improvement engaged committed Aboriginal and non-Aboriginal stakeholders and was shown to have potential to shift community diet. Provision of clear mechanisms to link this approach with higher level policy and decision-making structures, clarity of roles and responsibilities, and processes to prioritise and communicate actions across sectors should further strengthen capacity for food security improvement. Integrating this approach enabling local decision-making into

  8. Distributed fiber optic sensing enhances pipeline safety and security

    Energy Technology Data Exchange (ETDEWEB)

    Frings, Jochen; Walk, Tobias [ILF Consulting Engineers, Munich (Germany)

    2011-09-15

    Pipelines are efficient, highly reliable and safe means of transportation. However, despite intensive right of way surveillance by foot, car and out of the air, pipeline leaks and illegal tappings are a reality - sometimes with catastrophic results. These events show a gap in real-time monitoring caused by the highly distributed nature of pipelines. Parts of this gap now can be closed with distributed fiber optic sensing technology. Using various physical effects this technology is apt to detect temperature, strain, vibrations and sound with very good localization over spans up to 50 km with a single sensor cable. Various field tested applications like leakage detection, third party activity monitoring and intrusion detection or ground movement detection as well as integrity monitoring proof that distributed fiber optic sensing can enhance pipeline safety and security. (orig.)

  9. 17 CFR 240.17a-19 - Form X-17A-19 Report by national securities exchanges and registered national securities...

    Science.gov (United States)

    2010-04-01

    ... national securities exchanges and registered national securities associations of changes in the membership... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and registered national securities associations of changes in the membership status of any of their members...

  10. An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1.

    Science.gov (United States)

    Kiah, M L Mat; Nabi, Mohamed S; Zaidan, B B; Zaidan, A A

    2013-10-01

    This study aims to provide security solutions for implementing electronic medical records (EMRs). E-Health organizations could utilize the proposed method and implement recommended solutions in medical/health systems. Majority of the required security features of EMRs were noted. The methods used were tested against each of these security features. In implementing the system, the combination that satisfied all of the security features of EMRs was selected. Secure implementation and management of EMRs facilitate the safeguarding of the confidentiality, integrity, and availability of e-health organization systems. Health practitioners, patients, and visitors can use the information system facilities safely and with confidence anytime and anywhere. After critically reviewing security and data transmission methods, a new hybrid method was proposed to be implemented on EMR systems. This method will enhance the robustness, security, and integration of EMR systems. The hybrid of simple object access protocol/extensible markup language (XML) with advanced encryption standard and secure hash algorithm version 1 has achieved the security requirements of an EMR system with the capability of integrating with other systems through the design of XML messages.

  11. Protection enhances community and habitat stability: evidence from a mediterranean marine protected area.

    Science.gov (United States)

    Fraschetti, Simonetta; Guarnieri, Giuseppe; Bevilacqua, Stanislao; Terlizzi, Antonio; Boero, Ferdinando

    2013-01-01

    Rare evidences support that Marine Protected Areas (MPAs) enhance the stability of marine habitats and assemblages. Based on nine years of observation (2001-2009) inside and outside a well managed MPA, we assessed the potential of conservation and management actions to modify patterns of spatial and/or temporal variability of Posidonia oceanica meadows, the lower midlittoral and the shallow infralittoral rock assemblages. Significant differences in both temporal variations and spatial patterns were observed between protected and unprotected locations. A lower temporal variability in the protected vs. unprotected assemblages was found in the shallow infralittoral, demonstrating that, at least at local scale, protection can enhance community stability. Macrobenthos with long-lived and relatively slow-growing invertebrates and structurally complex algal forms were homogeneously distributed in space and went through little fluctuations in time. In contrast, a mosaic of disturbed patches featured unprotected locations, with small-scale shifts from macroalgal stands to barrens, and harsh temporal variations between the two states. Opposite patterns of spatial and temporal variability were found for the midlittoral assemblages. Despite an overall clear pattern of seagrass regression through time, protected meadows showed a significantly higher shoot density than unprotected ones, suggesting a higher resistance to local human activities. Our results support the assumption that the exclusion/management of human activities within MPAs enhance the stability of the structural components of protected marine systems, reverting or arresting threat-induced trajectories of change.

  12. Unification of Information Security Policies for Network Security Solutions

    Directory of Open Access Journals (Sweden)

    D.S. Chernyavskiy

    2012-03-01

    Full Text Available Diversity of command languages on network security solutions’ (NSS interfaces causes problems in a process of information security policy (ISP deployment. Unified model for security policy representation and implementation in NSS could aid to avoid such problems and consequently enhance efficiency of the process. The proposed solution is Unified language for network security policy (ULNSP. The language is based on formal languages theory, and being coupled with its translator, ULNSP makes it possible to formalize and implement ISP independently of particular NSS.

  13. Maintaining the stability of nonlinear differential equations by the enhancement of HPM

    International Nuclear Information System (INIS)

    Hosein Nia, S.H.; Ranjbar, A.N.; Ganji, D.D.; Soltani, H.; Ghasemi, J.

    2008-01-01

    Homotopy perturbation method is an effective method to find a solution of a nonlinear differential equation. In this method, a nonlinear complex differential equation is transformed to a series of linear and nonlinear parts, almost simpler differential equations. These sets of equations are then solved iteratively. Finally, a linear series of the solutions completes the answer if the convergence is maintained. In this Letter, the need for stability verification is shown through some examples. Consequently, HPM is enhanced by a preliminary assumption. The idea is to keep the inherent stability of nonlinear dynamic, even the selected linear part is not

  14. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Directory of Open Access Journals (Sweden)

    Dongwoo Kang

    Full Text Available The Proxy Mobile IPv6 (PMIPv6 is a network-based mobility management protocol that allows a Mobile Node(MN connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG. As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  15. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Science.gov (United States)

    Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho

    2017-01-01

    The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  16. Enhanced Dynamic Voltage Stability Support by VSC-HVDC for Offshore Wind Applications using Trajectory Sensitivity Analysis

    DEFF Research Database (Denmark)

    Liu, Hongzhi; Chen, Zhe; Liu, Leo

    2013-01-01

    The integration of large-scale wind power plants changes the structure, configuration and operation of conventional power systems and brings challenges to the security and stability of power systems. Dynamic voltage stability of power systems with high wind penetration is one of the critical issues....... In this paper, VSC-HVDC transmission system is used to integrate a large-scale wind power plant into the onshore power grid. For different voltage support strategies of VSC-HVDC, a trajectory sensitivity analysisbased approach is proposed to find the minimum onshore VSC capacity with which the VSC-HVDC can...... provide enough support for the improvement of system voltage stability after a disturbance. Sensitivities of reactive power output of VSC to its capacity increase are calculated instead of the sensitivities of bus voltage magnitude towards the reactive power injection variation of VSC. Simulation results...

  17. A hybrid superconducting fault current limiter for enhancing transient stability in Korean power systems

    Science.gov (United States)

    Seo, Sangsoo; Kim, Seog-Joo; Moon, Young-Hwan; Lee, Byongjun

    2013-11-01

    Additional power generation sites have been limited in Korea, despite the fact load demands are gradually increasing. In order to meet these increasing demands, Korea’s power system company has begun constructing new generators at existing sites. Thus, multi-unit plants can create problems in terms of transient stability when a large disturbance occurs. This paper proposes a hybrid superconducting fault current limiter (SFCL) application to enhance the transient stability of multi-unit power plants. SFCLs reduce fault currents, and limitation currents decrease the imbalance of the mechanical and electrical torque of the generators, resulting in an improvement in transient stability.

  18. Measuring Stability and Security in Iraq: Report to Congress in Accordance with the Department of Defense Appropriations Act 2007 (Section 9010, Public Law 109-289)

    National Research Council Canada - National Science Library

    2006-01-01

    This report to Congress includes specific performance indicators and measures of progress toward political, economic, and security stability in Iraq, as directed in Section 9010, DoD Defense Appropriations Act 2007...

  19. Enhancing the Safety and Security of Radioactive Sources

    International Nuclear Information System (INIS)

    Hickey, J.

    2004-01-01

    The NRC initiatives to improve safety and security of sources began before 091101 and include both international and domestic activities. They supported the development and implementation of the IAEA Code of Conduct, which provides categorization of sources of concern, based on risk, improvement of regulatory programs of all member countries and improvement of safety and security of sources. International activities include the IAEA International Conference on Security of Sources (Vienna, Austria, March, 2003), the trilateral cooperation with Canada and Mexico, the assistance to individual countries to improve security and the proposed rule on export and import of radioactive material. The domestic initiatives are to issue the security orders and advisories to licensees, issue the panoramic irradiator orders (June 2003), issue the manufacturer orders (January 2004), complete the interim national source inventory, develop the national source tracking system, maintain the orphan source registration and retrieval program and upgrade the emergency preparedness

  20. Enhancing the Safety, Security and Resilience of ICT and Scada Systems Using Action Research

    Science.gov (United States)

    Johnsen, Stig; Skramstad, Torbjorn; Hagen, Janne

    This paper discusses the results of a questionnaire-based survey used to assess the safety, security and resilience of information and communications technology (ICT) and supervisory control and data acquisition (SCADA) systems used in the Norwegian oil and gas industry. The survey identifies several challenges, including the involvement of professionals with different backgrounds and expertise, lack of common risk perceptions, inadequate testing and integration of ICT and SCADA systems, poor information sharing related to undesirable incidents and lack of resilience in the design of technical systems. Action research is proposed as a process for addressing these challenges in a systematic manner and helping enhance the safety, security and resilience of ICT and SCADA systems used in oil and gas operations.

  1. Magnesium ferrite nanocrystal clusters for magnetorheological fluid with enhanced sedimentation stability

    Science.gov (United States)

    Wang, Guangshuo; Ma, Yingying; Li, Meixia; Cui, Guohua; Che, Hongwei; Mu, Jingbo; Zhang, Xiaoliang; Tong, Yu; Dong, Xufeng

    2017-01-01

    In this study, magnesium ferrite (MgFe2O4) nanocrystal clusters were synthesized using an ascorbic acid-assistant solvothermal method and evaluated as a candidate for magnetorheological (MR) fluid. The morphology, microstructure and magnetic properties of the MgFe2O4 nanocrystal clusters were investigated in detail by field emission scanning electron microscopy (FESEM), transmission electron microscope (TEM), thermogravimetric analyzer (TGA), X-ray diffraction (XRD) and superconducting quantum interference device (SQUID). The MgFe2O4 nanocrystal clusters were suspended in silicone oil to prepare MR fluid and the MR properties were tested using a Physica MCR301 rheometer fitted with a magneto-rheological module. The prepared MR fluid showed typical Bingham plastic behavior, changing from a liquid-like to a solid-like structure under an external magnetic field. Compared with the conventional carbonyl iron particles, MgFe2O4 nanocrystal clusters-based MR fluid demonstrated enhanced sedimentation stability due to the reduced mismatch in density between the particles and the carrier medium. In summary, the as-prepared MgFe2O4 nanocrystal clusters are regarded as a promising candidate for MR fluid with enhanced sedimentation stability.

  2. Origin of Shear Stability and Compressive Ductility Enhancement of Metallic Glasses by Metal Coating

    Science.gov (United States)

    Sun, B. A.; Chen, S. H.; Lu, Y. M.; Zhu, Z. G.; Zhao, Y. L.; Yang, Y.; Chan, K. C.; Liu, C. T.

    2016-01-01

    Metallic glasses (MGs) are notorious for the poor macroscopic ductility and to overcome the weakness various intrinsic and extrinsic strategies have been proposed in past decades. Among them, the metal coating is regarded as a flexible and facile approach, yet the physical origin is poorly understood due to the complex nature of shear banding process. Here, we studied the origin of ductile enhancement in the Cu-coating both experimentally and theoretically. By examining serrated shear events and their stability of MGs, we revealed that the thin coating layer plays a key role in stopping the final catastrophic failure of MGs by slowing down shear band dynamics and thus retarding its attainment to a critical instable state. The mechanical analysis on interplay between the coating layer and shear banding process showed the enhanced shear stability mainly comes from the lateral tension of coating layer induced by the surface shear step and the bonding between the coating layer and MGs rather than the layer thickness is found to play a key role in contributing to the shear stability. PMID:27271435

  3. Energy and water tradeoffs in enhancing food security: A selective international assessment

    International Nuclear Information System (INIS)

    Mushtaq, Shahbaz; Maraseni, Tek Narayan; Maroulis, Jerry; Hafeez, Mohsin

    2009-01-01

    Rice is the major staple food in most Asian countries. However, with rapidly growing populations, sustained high productivity and yields through improving water productivity is critically important. Increasingly complex energy-agriculture relationships require an in-depth understanding of water and energy tradeoffs. This study contributes to energy and food policies by analysing the complex energy, water and economics dynamics across a selection of major rice growing countries. The results show that tradeoffs exist between yield and energy inputs with high yield attributed to higher levels of energy input. The selected developed countries show higher energy productivity, relative to all other energy inputs, compared to the selected developing counties, owing to enhanced mechanisation, on-farm technology and improved farm management. Among all countries, China has the highest water productivity due to water-saving irrigation practices. These practices offer opportunities for developed and developing countries to increase water productivity at the same time taking advantage of economic and energy benefits of reduced pumping. Sustained production from agriculture is vital to food security. Improved irrigation practices can offset environmental footprints in the short run but their large-scale implementation remains an issue. In the long run, investments are needed to buffer the negative impacts of food production on the environment. Investments to boost water productivity and improved energy use efficiency in crop production are two pathways to reduce energy dependency, enhanced natural resource sustainability and ensuring future food security.

  4. On the stabilizing role of species diffusion in chemical enhanced oil recovery

    Science.gov (United States)

    Daripa, Prabir; Gin, Craig

    2015-11-01

    In this talk, the speaker will discuss a problem on the stability analysis related to the effect of species diffusion on stabilization of fingering in a Hele-Shaw model of chemical enhanced oil recovery. The formulation of the problem is motivated by a specific design principle of the immiscible interfaces in the hope that this will lead to significant stabilization of interfacial instabilities, there by improving oil recovery in the context of porous media flow. Testing the merits of this hypothesis poses some challenges which will be discussed along with some numerical results based on current formulation of this problem. Several open problems in this context will be discussed. This work is currently under progress. Supported by the grant NPRP 08-777-1-141 from the Qatar National Research Fund (a member of The Qatar Foundation).

  5. Enhancement of thermal stability of silver(I) acetylacetonate by platinum(II) acetylacetonate

    Czech Academy of Sciences Publication Activity Database

    Křenek, T.; Kovářík, T.; Pola, M.; Jakubec, Ivo; Bezdička, Petr; Bastl, Zdeněk; Pokorná, Dana; Urbanová, Markéta; Galíková, Anna; Pola, Josef

    2013-01-01

    Roč. 554, FEB (2013), s. 1-7 ISSN 0040-6031 Institutional support: RVO:61388980 ; RVO:61388955 ; RVO:67985858 Keywords : thermal gravimetric analysis * differential scanning calorimetry * silver(I) acetylacetonate * platinum(II) acetylacetonate * enhancement of thermal stability Subject RIV: CA - Inorganic Chemistry; CF - Physical ; Theoretical Chemistry (UFCH-W) Impact factor: 2.105, year: 2013

  6. Enhancing QR Code Security

    OpenAIRE

    Zhang, Linfan; Zheng, Shuang

    2015-01-01

    Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come af...

  7. 78 FR 48076 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Science.gov (United States)

    2013-08-07

    ...-2011-0268] RIN 3150-AJ07 Facility Security Clearance and Safeguarding of National Security Information..., Classified National Security Information. The rule would allow licensees flexibility in determining the means... licensee security education and training programs and enhances the protection of classified information...

  8. Privacy and Security Research Group workshop on network and distributed system security: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1993-05-01

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

  9. Fragile States, Infectious Disease and Health Security: The Case for Timor-Leste

    Directory of Open Access Journals (Sweden)

    John M. Quinn

    2014-01-01

    Full Text Available Timor-Leste is a very young and developing nation state. Endemic infectious disease and weakened health security coupled with its growing and inclusive public institutions keep Timor-Leste fragile and in transition on the spectrum of state stability. The objective here is to systematically review Timor-Leste's state and public health successes, showing how a fragile state can consistently improve its status on the continuum of stability and improve health security for the population. The case study follows a state case study approach, together with a disease burden review and a basic description of the health portrait in relation to Timor-Leste's fragile state status. Disease burden and health security are directly proportional to state stability and indirectly proportional to state failure. Timor-Leste is a clear example of how public health can feed into increased state stability. Our discussion attempts to describe how the weak and fragile island nation of Timor-Leste can continue on its current path of transition to state stability by increasing health security for its citizens. We surmise that this can be realized when public policy focuses on primary healthcare access, inclusive state institutions, basic hygiene and preventative vaccination programs. Based on our review, the core findings indicate that by increasing health security, a positive feedback loop of state stability follows. The use of Timor-Leste as a case study better describes the connection between public health and health security; and state stability, development and inclusive state institutions that promote health security.

  10. Dynamic Voltage Stability Studies using a Modified IEEE 30-Bus System

    Directory of Open Access Journals (Sweden)

    Oluwafemi Emmanuel Oni

    2016-09-01

    Full Text Available Power System stability is an essential study in the planning and operation of an efficient, economic, reliable and secure electric power system because it encompasses all the facet of power systems operations, from planning, to conceptual design stages of the project as well as during the systems operating life span. This paper presents different scenario of power system stability studies on a modified IEEE 30-bus system which is subjected to different faults conditions. A scenario whereby the longest high voltage alternating current (HVAC line is replaced with a high voltage direct current (HVDC line was implemented. The results obtained show that the HVDC line enhances system stability more compared to the contemporary HVAC line. Dynamic analysis using RMS simulation tool was used on DigSILENT PowerFactory.

  11. Evaluation of enhancements to Thevenin equivalent based methods for real-time voltage stability assessment

    DEFF Research Database (Denmark)

    Perez, Angel; Jóhannsson, Hjörtur; Østergaard, Jacob

    2014-01-01

    The possibilities offered by the use of Phasor Measurement Units (PMU) in real - time monitoring provide interesting ways to ensure secure operation of power systems. This paper studies the specific case of voltage stability and the possible improvements to the Thevenin equivalent methods, which...... is applied generally with local measurements. This paper uses the PMU measurements to calculate the grid transformation coefficients to obtain wide - area information. This is achieved by studying the generator's electromo tive force estimated using values in the coefficient transformation matrix...

  12. Structural Design Optimization of a Tiltrotor Aircraft Composite Wing to Enhance Whirl Flutter Stability

    DEFF Research Database (Denmark)

    Kim, Taeseong; Kim, Jaehoon; Shin, Sang Joon

    2013-01-01

    In order to enhance the aeroelastic stability of a tiltrotor aircraft, a structural optimization framework is developed by applying a multi-level optimization approach. Each optimization level is designed to achieve a different purpose; therefore, relevant optimization schemes are selected for each...... level. Enhancement of the aeroelastic stability is selected as an objective in the upper-level optimization. This is achieved by seeking the optimal structural properties of a composite wing, including its mass, vertical, chordwise, and torsional stiffness. In the upper-level optimization, the response...... surface method (RSM), is selected. On the other hand, lower-level optimization seeks to determine the local detailed cross-sectional parameters, such as the ply orientation angles and ply thickness, which are relevant to the wing structural properties obtained at the upper-level. To avoid manufacturing...

  13. Reimagining SSR in Contexts of Security Pluralism

    Directory of Open Access Journals (Sweden)

    Megan Price

    2017-07-01

    Full Text Available Within the repertoire of international stabilization interventions, security sector reform (SSR and other conventional efforts to strengthen security and governance institutions remain central. There is increasing recognition that the policies and practices operating under the rubric of SSR are blind to the empirical reality of 'security pluralism' in most stabilization contexts. In these contexts, both security providers directly authorized by the state (police, army and a multitude of other coercive actors engage in producing and reproducing order, and enjoy varying degrees of public authority and legitimacy. Recognizing this, research was undertaken in three cities (Beirut, Nairobi, and Tunis to discern the conditions enabling various security providers to forge constructive relations with local populations and governance actors. Drawing on insights generated by these case studies, this article problematizes conventional state-centric approaches and argues for a bold reimagining of SSR. It makes the case for an SSR approach that prioritizes promoting the accountability and responsiveness of all security providers, integrating efforts to strengthen the social determinants of security, and enabling a phased transition from relational to rules-based systems of security provision and governance.

  14. Engineering bright solitons to enhance the stability of two-component Bose–Einstein condensates

    International Nuclear Information System (INIS)

    Radha, R.; Vinayagam, P.S.; Sudharsan, J.B.; Liu, Wu-Ming; Malomed, Boris A.

    2015-01-01

    We consider a system of coupled Gross–Pitaevskii (GP) equations describing a binary quasi-one-dimensional Bose–Einstein condensate (BEC) with intrinsic time-dependent attractive interactions, placed in a time-dependent expulsive parabolic potential, in a special case when the system is integrable (a deformed Manakov's system). Since the nonlinearity in the integrable system which represents binary attractive interactions exponentially decays with time, solitons are also subject to decay. Nevertheless, it is shown that the robustness of bright solitons can be enhanced in this system, making their respective lifetime longer, by matching the time dependence of the interaction strength (adjusted with the help of the Feshbach-resonance management) to the time modulation of the strength of the parabolic potential. The analytical results, and their stability, are corroborated by numerical simulations. In particular, we demonstrate that the addition of random noise does not impact the stability of the solitons. - Highlights: • We formulate a versatile mechanism to enhance the lifetime of vectorial condensates employing Feshbach Resonance. • Vectorial condensates in a transient harmonic trap are more long lived compared to their counterpart in a time independent harmonic trap. • Corroborate the exact analytical results with numerical simulations. • Addition of random noise does not impact the stability of vector BECs.

  15. Engineering bright solitons to enhance the stability of two-component Bose–Einstein condensates

    Energy Technology Data Exchange (ETDEWEB)

    Radha, R., E-mail: radha_ramaswamy@yahoo.com [Centre for Nonlinear Science, PG and Research Dept. of Physics, Govt. College for Women (Autonomous), Kumbakonam 612001 (India); Vinayagam, P.S.; Sudharsan, J.B. [Centre for Nonlinear Science, PG and Research Dept. of Physics, Govt. College for Women (Autonomous), Kumbakonam 612001 (India); Liu, Wu-Ming, E-mail: wmliu@iphy.ac.cn [Beijing National Laboratory for Condensed Matter Physics, Institute of Physics, Chinese Academy of Sciences, Beijing-100190 (China); Malomed, Boris A., E-mail: malomed@post.tau.ac.il [Department of Physical Electronics, School of Electrical Engineering, Faculty of Engineering, Tel Aviv University, Tel Aviv 69978 (Israel)

    2015-12-04

    We consider a system of coupled Gross–Pitaevskii (GP) equations describing a binary quasi-one-dimensional Bose–Einstein condensate (BEC) with intrinsic time-dependent attractive interactions, placed in a time-dependent expulsive parabolic potential, in a special case when the system is integrable (a deformed Manakov's system). Since the nonlinearity in the integrable system which represents binary attractive interactions exponentially decays with time, solitons are also subject to decay. Nevertheless, it is shown that the robustness of bright solitons can be enhanced in this system, making their respective lifetime longer, by matching the time dependence of the interaction strength (adjusted with the help of the Feshbach-resonance management) to the time modulation of the strength of the parabolic potential. The analytical results, and their stability, are corroborated by numerical simulations. In particular, we demonstrate that the addition of random noise does not impact the stability of the solitons. - Highlights: • We formulate a versatile mechanism to enhance the lifetime of vectorial condensates employing Feshbach Resonance. • Vectorial condensates in a transient harmonic trap are more long lived compared to their counterpart in a time independent harmonic trap. • Corroborate the exact analytical results with numerical simulations. • Addition of random noise does not impact the stability of vector BECs.

  16. Employment flexibility, job security and job satisfaction of knowledge workers in Poland

    OpenAIRE

    Wilzcynska, Aleksandra; Batorski, Dominik; Torrent Sellens, Joan

    2014-01-01

    A number of empirical studies have shown a positive influence of employment stability on job satisfaction. Employment stability, usually measured by a proxy, "type of contract”, may affect one's job satisfaction directly, as well as through an impact on other relative variables, such as job security, as a stable position seem to bring individuals a sense of security. The aim of the research is to investigate the relationships between job security, employment stability and job satisfaction of ...

  17. Study on Enhancement Principle and Stabilization for the Luminol-H2O2-HRP Chemiluminescence System.

    Directory of Open Access Journals (Sweden)

    Lihua Yang

    Full Text Available A luminol-H2O2-HRP chemiluminescence system with high relative luminescent intensity (RLU and long stabilization time was investigated. First, the comparative study on the enhancement effect of ten compounds as enhancers to the luminol-H2O2-HRP chemiluminescence system was carried out, and the results showed that 4-(imidazol-1-ylphenol (4-IMP, 4-iodophenol (4-IOP, 4-bromophenol (4-BOP and 4-hydroxy-4'-iodobiphenyl (HIOP had the best performance. Based on the experiment, the four enhancers were dissolved in acetone, acetonitrile, methanol, and dimethylformamide (DMF with various concentrations, the results indicated that 4-IMP, 4-IOP, 4-BOP and HIOP dissolved in DMF with the concentrations of 0.2%, 3.2%, 1.6% and 3.2% could get the highest RLU values. Subsequently, the influences of pH, ionic strength, HRP, 4-IMP, 4-IOP, 4-BOP, HIOP, H2O2 and luminol on the stabilization of the luminol-H2O2-HRP chemiluminescence system were studied, and we found that pH value, ionic strength, 4-IMP, 4-IOP, 4-BOP, HIOP, H2O2 and luminol have little influence on luminescent stabilization, while HRP has a great influence. In different ranges of HRP concentration, different enhancers should be selected. When the concentration is within the range of 0~6 ng/mL, 4-IMP should be selected. When the concentration of HRP ranges from 6 to 25 ng/mL, 4-IOP was the best choice. And when the concentration is within the range of 25~80 ng/mL, HIOP should be selected as the enhancer. Finally, the three well-performing chemiluminescent enhanced solutions (CESs have been further optimized according to the three enhancers (4-IMP, 4-IOP and HIOP in their utilized HRP concentration ranges.

  18. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  19. Hollow wall to stabilize and enhance ignition hohlraums

    Science.gov (United States)

    Vandenboomgaerde, M.; Grisollet, A.; Bonnefille, M.; Clérouin, J.; Arnault, P.; Desbiens, N.; Videau, L.

    2018-01-01

    In the context of the indirect-drive scheme of the inertial-confinement fusion, performance of the gas-filled hohlraums at the National Ignition Facility appears to be reduced. Experiments ascertain a limited efficacy of the laser beam propagation and x-ray conversion. One identified issue is the growth of the gold plasma plume (or bubble) which is generated near the ends of the hohlraum by the impact of the laser beams. This bubble impedes the laser propagation towards the equator of the hohlraum. Furthermore, for high foot or low foot laser pulses, the gold-gas interface of the bubble can be unstable. If this instability should grow to mixing, the x-ray conversion could be degraded. A novel hollow-walled hohlraum is designed, which drastically reduces the growth of the gold bubble and stabilizes the gold-gas interface. The hollow walls are built from the combination of a thin gold foil and a gold domed-wall. We theoretically explain how the bubble expansion can be delayed and the gold-gas interface stabilized. This advanced design lets the laser beams reach the waist of the hohlraum. As a result, the x-ray drive on the capsule is enhanced, and more spherical implosions are obtained. Furthermore, this design only requires intermediate gas fill density to be efficient.

  20. A flexible privacy enhanced and secured ICT architecture for a smart grid project with active cosumers in the city of Zwolle-NL

    NARCIS (Netherlands)

    Montes Portela, C.; Rooden, H.; Kohlmann, J.; Leersum, van D.; Geldtmeijer, D.A.M.; Slootweg, J.G.; van Eekelen, Marko

    2013-01-01

    This paper presents the ICT architecture for a Smart Grid project with consumer interaction in the city of Zwolle, the Netherlands. It describes the privacy and security enhancing measures applied to ensure a positive sum of necessary functionality and respect for consumer’s privacy and secure

  1. Solid Waste Biodegradation Enhancements and the Evaluation of Analytical Methods Used to Predict Waste Stability

    OpenAIRE

    Kelly, Ryan J.

    2002-01-01

    Conventional landfills are built to dispose of the increasing amount of municipal solid waste (MSW) generated each year. A relatively new type of landfill, called a bioreactor landfill, is designed to optimize the biodegradation of the contained waste to stabilized products. Landfills with stabilized waste pose little threat to the environment from ozone depleting gases and groundwater contamination. Limited research has been done to determine the importance of biodegradation enhancement tech...

  2. Genetic engineering of crops: a ray of hope for enhanced food security.

    Science.gov (United States)

    Gill, Sarvajeet Singh; Gill, Ritu; Tuteja, Renu; Tuteja, Narendra

    2014-01-01

    Crop improvement has been a basic and essential chase since organized cultivation of crops began thousands of years ago. Abiotic stresses as a whole are regarded as the crucial factors restricting the plant species to reach their full genetic potential to deliver desired productivity. The changing global climatic conditions are making them worse and pointing toward food insecurity. Agriculture biotechnology or genetic engineering has allowed us to look into and understand the complex nature of abiotic stresses and measures to improve the crop productivity under adverse conditions. Various candidate genes have been identified and transformed in model plants as well as agriculturally important crop plants to develop abiotic stress-tolerant plants for crop improvement. The views presented here are an attempt toward realizing the potential of genetic engineering for improving crops to better tolerate abiotic stresses in the era of climate change, which is now essential for global food security. There is great urgency in speeding up crop improvement programs that can use modern biotechnological tools in addition to current breeding practices for providing enhanced food security.

  3. A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiang Zhou

    2014-04-01

    Full Text Available Data aggregation is an important technique for reducing the energy consumption of sensor nodes in wireless sensor networks (WSNs. However, compromised aggregators may forge false values as the aggregated results of their child nodes in order to conduct stealthy attacks or steal other nodes’ privacy. This paper proposes a Secure-Enhanced Data Aggregation based on Elliptic Curve Cryptography (SEDA-ECC. The design of SEDA-ECC is based on the principles of privacy homomorphic encryption (PH and divide-and-conquer. An aggregation tree disjoint method is first adopted to divide the tree into three subtrees of similar sizes, and a PH-based aggregation is performed in each subtree to generate an aggregated subtree result. Then the forged result can be identified by the base station (BS by comparing the aggregated count value. Finally, the aggregated result can be calculated by the BS according to the remaining results that have not been forged. Extensive analysis and simulations show that SEDA-ECC can achieve the highest security level on the aggregated result with appropriate energy consumption compared with other asymmetric schemes.

  4. PDF and cAMP enhance PER stability in Drosophila clock neurons

    Science.gov (United States)

    Li, Yue; Guo, Fang; Shen, James; Rosbash, Michael

    2014-01-01

    The neuropeptide PDF is important for Drosophila circadian rhythms: pdf01 (pdf-null) animals are mostly arrhythmic or short period in constant darkness and have an advanced activity peak in light–dark conditions. PDF contributes to the amplitude, synchrony, as well as the pace of circadian rhythms within clock neurons. PDF is known to increase cAMP levels in PDR receptor (PDFR)-containing neurons. However, there is no known connection of PDF or of cAMP with the Drosophila molecular clockworks. We discovered that the mutant period gene perS ameliorates the phenotypes of pdf-null flies. The period protein (PER) is a well-studied repressor of clock gene transcription, and the perS protein (PERS) has a markedly short half-life. The result therefore suggests that the PDF-mediated increase in cAMP might lengthen circadian period by directly enhancing PER stability. Indeed, increasing cAMP levels and cAMP-mediated protein kinase A (PKA) activity stabilizes PER, in S2 tissue culture cells and in fly circadian neurons. Adding PDF to fly brains in vitro has a similar effect. Consistent with these relationships, a light pulse causes more prominent PER degradation in pdf01 circadian neurons than in wild-type neurons. The results indicate that PDF contributes to clock neuron synchrony by increasing cAMP and PKA, which enhance PER stability and decrease clock speed in intrinsically fast-paced PDFR-containing clock neurons. We further suggest that the more rapid degradation of PERS bypasses PKA regulation and makes the pace of clock neurons more uniform, allowing them to avoid much of the asynchrony caused by the absence of PDF. PMID:24707054

  5. Synthesis and Characterisation of Biocompatible Polymer-Conjugated Magnetic Beads for Enhancement Stability of Urease.

    Science.gov (United States)

    Doğaç, Yasemin Ispirli; Teke, Mustafa

    2016-04-01

    We reported natural polymer-conjugated magnetic featured urease systems for removal of urea effectively. The optimum temperature (20-60 °C), optimum pH (3.0-10.0), kinetic parameters, thermal stability (4-70 °C), pH stability (4.0-9.0), operational stability (0-250 min), reusability (18 times) and storage stability (24 weeks) were studied for characterisation of the urease-encapsulated biocompatible polymer-conjugated magnetic beads. Also, the surface groups and chemical structure of the magnetic beads were determined by using attenuated total reflectance Fourier transform infrared spectroscopy (ATR-FTIR). The all urease-encapsulated magnetic beads protected their stability of 30-45 % relative activity at 70 °C. A significant increase was observed at their pH stability compared with the free urease for both acidic and alkaline medium. Besides this, their repeatability activity were approximately 100 % during 4(th) run. They showed residual activity of 50 % after 16 weeks. The importance of this work is enhancement stability of immobilised urease by biocompatible polymer-conjugated magnetic beads for the industrial application based on removal of urea.

  6. Application of a combined superconducting fault current limiter and STATCOM to enhancement of power system transient stability

    Energy Technology Data Exchange (ETDEWEB)

    Mahdad, Belkacem, E-mail: bemahdad@mselab.org; Srairi, K.

    2013-12-15

    Highlights: •A simple interactive model SFCL–STATCOM Controller is proposed to enhance the transient stability. •The STATCOM controller is integrated in coordination with the SFCL to support the excessive reactive power during fault. •Voltage stability index based continuation power flow is used to locate the STATCOM and the SFCL. •The clearing time improved compared to other cases (with only SFCL, with only STATCOM). •The choice of the STATCOM parameters is very important to exploit efficiently the integration of STATCOM Controller. -- Abstract: Stable and reliable operation of the power system network is dependent on the dynamic equilibrium between energy production and power demand under large disturbance such as short circuit or important line tripping. This paper investigates the use of combined model based superconducting fault current limiter (SFCL) and shunt FACTS Controller (STATCOM) for assessing the transient stability of a power system considering the automatic voltage regulator. The combined model located at a specified branch based on voltage stability index using continuation power flow. The main role of the proposed combined model is to achieve simultaneously a flexible control of reactive power using STATCOM Controller and to reduce fault current using superconducting technology based SFCL. The proposed combined model has been successfully adapted within the transient stability program and applied to enhance the transient power system stability of the WSCC9-Bus system. Critical clearing time (CCT) has been used as an index to evaluate and validate the contribution of the proposed coordinated Controller. Simulation results confirm the effectiveness and perspective of this combined Controller to enhance the dynamic power system performances.

  7. Security Analysis of Yeh-Tsai Security Mechanism

    Science.gov (United States)

    Yum, Dae Hyun; Shin, Jong Hoon; Lee, Pil Joong

    Yeh and Tsai recently proposed an enhanced mobile commerce security mechanism. They modified the lightweight security mechanism due to Lam, Chung, Gu, and Sun to relieve the burden of mobile clients. However, this article shows that a malicious WAP gateway can successfully obtain the mobile client's PIN by sending a fake public key of a mobile commerce server and exploiting information leakage caused by addition operation. We also present a countermeasure against the proposed attack.

  8. Cyber Deterrence and Stability

    Energy Technology Data Exchange (ETDEWEB)

    Goychayev, Rustam [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Carr, Geoffrey A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Weise, Rachel A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Donnelly, David A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Clements, Samuel L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Benz, Jacob M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Rodda, Kabrena E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bartholomew, Rachel A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); McKinnon, Archibald D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Andres, Richard B. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2017-09-30

    Throughout the 20th and early 21st centuries, deterrence and arms control have been cornerstones of strategic stability between the superpowers. However, the weaponization of the cyber realm by State actors and the multipolar nature of cyber conflict now undermines that stability. Strategic stability is the state in which nations believe that if they act aggressively to undermine U.S. national interests and the post-World War II liberal democratic order, the consequences will outweigh the benefits. The sense of lawlessness and lack of consequences in the cyber realm embolden States to be more aggressive in taking actions that undermine stability. Accordingly, this paper examines 1) the role of deterrence and arms control in securing cyber stability, and 2) the limitations and challenges associated with these traditional national security paradigms as applied to this emerging threat domain. This paper demonstrates that many 20th-century deterrence and arms control concepts are not particularly applicable in the cyber realm. However, they are not entirely irrelevant. The United States can distill lessons learned from this rich deterrence and arms control experience to develop and deploy a strategy to advance cyber stability.

  9. Enhancement of Frequency Stability Using Synchronization of a Cantilever Array for MEMS-Based Sensors

    Directory of Open Access Journals (Sweden)

    Francesc Torres

    2016-10-01

    Full Text Available Micro and nano electromechanical resonators have been widely used as single or multiple-mass detection sensors. Smaller devices with higher resonance frequencies and lower masses offer higher mass responsivities but suffer from lower frequency stability. Synchronization phenomena in multiple MEMS resonators have become an important issue because they allow frequency stability improvement, thereby preserving mass responsivity. The authors present an array of five cantilevers (CMOS-MEMS system that are forced to vibrate synchronously to enhance their frequency stability. The frequency stability has been determined in closed-loop configuration for long periods of time by calculating the Allan deviation. An Allan deviation of 0.013 ppm (@ 1 s averaging time for a 1 MHz cantilever array MEMS system was obtained at the synchronized mode, which represents a 23-fold improvement in comparison with the non-synchronized operation mode (0.3 ppm.

  10. What kind of cyber security? Theorising cyber security and mapping approaches

    Directory of Open Access Journals (Sweden)

    Laura Fichtner

    2018-05-01

    Full Text Available Building on conceptual work on security and cyber security, the paper explores how different approaches to cyber security are constructed. It outlines structural components and presents four common approaches. Each of them suggests a different role for the actors involved and is motivated and justified by different values such as privacy, economic order and national security. When a cyber security policy or initiative is chosen by policymakers, the analysis of the underlying approach enhances our understanding of how this shapes relationships between actors and of the values prioritised, promoted and inscribed into the concerned technologies.

  11. Does a crouched leg posture enhance running stability and robustness?

    Science.gov (United States)

    Blum, Yvonne; Birn-Jeffery, Aleksandra; Daley, Monica A; Seyfarth, Andre

    2011-07-21

    Humans and birds both walk and run bipedally on compliant legs. However, differences in leg architecture may result in species-specific leg control strategies as indicated by the observed gait patterns. In this work, control strategies for stable running are derived based on a conceptual model and compared with experimental data on running humans and pheasants (Phasianus colchicus). From a model perspective, running with compliant legs can be represented by the planar spring mass model and stabilized by applying swing leg control. Here, linear adaptations of the three leg parameters, leg angle, leg length and leg stiffness during late swing phase are assumed. Experimentally observed kinematic control parameters (leg rotation and leg length change) of human and avian running are compared, and interpreted within the context of this model, with specific focus on stability and robustness characteristics. The results suggest differences in stability characteristics and applied control strategies of human and avian running, which may relate to differences in leg posture (straight leg posture in humans, and crouched leg posture in birds). It has been suggested that crouched leg postures may improve stability. However, as the system of control strategies is overdetermined, our model findings suggest that a crouched leg posture does not necessarily enhance running stability. The model also predicts different leg stiffness adaptation rates for human and avian running, and suggests that a crouched avian leg posture, which is capable of both leg shortening and lengthening, allows for stable running without adjusting leg stiffness. In contrast, in straight-legged human running, the preparation of the ground contact seems to be more critical, requiring leg stiffness adjustment to remain stable. Finally, analysis of a simple robustness measure, the normalized maximum drop, suggests that the crouched leg posture may provide greater robustness to changes in terrain height

  12. Enhancing Economic Stability Utilizing the High Technologies in Community Colleges: A Case Study.

    Science.gov (United States)

    Mehnert, Barbara H.; Kurki, Allan W.

    Strategies to enhance the economic stability of community colleges through high technology approaches are discussed in this paper. First, general economic problems facing higher education are identified, and the ways in which they influence community colleges are described. Next, 10 strategies to aid in the economic recovery of community colleges…

  13. Ecosystem Management: Tomorrow’s Approach to Enhancing Food Security under a Changing Climate

    Directory of Open Access Journals (Sweden)

    Mike Rivington

    2011-06-01

    Full Text Available This paper argues that a sustainable ecosystem management approach is vital to ensure the delivery of essential ‘life support’ ecosystem services and must be mainstreamed into societal conscience, political thinking and economic processes. Feeding the world at a time of climate change, environmental degradation, increasing human population and demand for finite resources requires sustainable ecosystem management and equitable governance. Ecosystem degradation undermines food production and the availability of clean water, hence threatening human health, livelihoods and ultimately societal stability. Degradation also increases the vulnerability of populations to the consequences of natural disasters and climate change impacts. With 10 million people dying from hunger each year, the linkages between ecosystems and food security are important to recognize. Though we all depend on ecosystems for our food and water, about seventy per cent of the estimated 1.1 billion people in poverty around the world live in rural areas and depend directly on the productivity of ecosystems for their livelihoods. Healthy ecosystems provide a diverse range of food sources and support entire agricultural systems, but their value to food security and sustainable livelihoods are often undervalued or ignored. There is an urgent need for increased financial investment for integrating ecosystem management with food security and poverty alleviation priorities. As the world’s leaders worked towards a new international climate change agenda in Cancun, Mexico, 29 November–10 December 2010 (UNFCCC COP16, it was clear that without a deep and decisive post-2012 agreement and major concerted effort to reduce the food crisis, the Millennium Development Goals will not be attained. Political commitment at the highest level will be needed to raise the profile of ecosystems on the global food agenda. It is recommended that full recognition and promotion be given of the linkages

  14. Considerations to Enhance the Florida Domestic Security Strategic Plan

    Science.gov (United States)

    2011-03-01

    security strategies. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION ...Thank you all. xvi THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION A. PROBLEM STATEMENT After the terrorist attacks of September 11, 2001...State Homeland Security Strategy (Nebraska Emergency Mangement Agency, 2009) • Vermont Homeland Security Strategy (Vermont Department of Public

  15. Enhanced coercivity thermal stability realized in Nd–Fe–B thin films diffusion-processed by Nd–Co alloys

    Energy Technology Data Exchange (ETDEWEB)

    Zhong, Hui; Fu, Yanqing [Key laboratory of electromagnetic processing of materials (EPM), Ministry of Education, Northeastern University, Shenyang 110819 (China); Department of Physics and Chemistry of Materials, School of Materials Science and Engineering, Northeastern University, Shenyang 110819 (China); Li, Guojian; Liu, Tie [Key laboratory of electromagnetic processing of materials (EPM), Ministry of Education, Northeastern University, Shenyang 110819 (China); Cui, Weibin, E-mail: cuiweibin@epm.neu.edu.cn [Key laboratory of electromagnetic processing of materials (EPM), Ministry of Education, Northeastern University, Shenyang 110819 (China); Department of Physics and Chemistry of Materials, School of Materials Science and Engineering, Northeastern University, Shenyang 110819 (China); Liu, Wei; Zhang, Zhidong [Shenyang National Laboratory for Materials Science, Institute of Metal Research (IMR), Chinese Academy of Sciences (CAS), Shenyang 110016 (China); Wang, Qiang, E-mail: wangq@mail.neu.edu.cn [Key laboratory of electromagnetic processing of materials (EPM), Ministry of Education, Northeastern University, Shenyang 110819 (China)

    2017-03-15

    A proposed Nd{sub 2}Fe{sub 14}B-core/Nd{sub 2}(Fe, Co){sub 14}B-shell microstructure was realized by diffusion-processing textured Nd{sub 14}Fe{sub 77}B{sub 9} single-layer film with Nd{sub 100−x}Co{sub x} (x=10, 20 and 40) alloys to improve the coercivity thermal stability. The ambient coercivity was increased from around 1 T in single-layer film to nearly 2 T in diffusion-processed films, which was due to the Nd-rich grain boundaries as seen from transmission electron microscopy (TEM) images. The coercivity thermal stability was improved by the core/shell microstructure because Nd-rich grain boundaries provided the high ambient coercivity and Co-rich shell provided the improved coercivity stability. - Highlights: • Core–shell microstructure proposed for enhancing the coercivity thermal stability. • Coercivity enhanced to nearly 2 T by diffusion-processing with Nd–Co alloy. • Good squareness and highly textured microstructure obtained. • Nd-rich phases observed by TEM after diffusion process. • Coercivity thermal stability improved with minor Co addition in grain boundary regions.

  16. GECM-Based Voltage Stability Assessment Using Wide-Area Synchrophasors

    Directory of Open Access Journals (Sweden)

    Heng-Yi Su

    2017-10-01

    Full Text Available Voltage instability is a crucial issue in the secure operation of power grids. Several methods for voltage stability assessment were presented. Some of them are highly computationally intensive, while others are reported not to work properly under all circumstances. This paper proposes a new methodology based on the generator equivalent circuit model (GECM and the phasor measurement unit (PMU technology for online voltage stability monitoring of a power grid. First, the proposed methodology utilizes synchronized phasor (synchrophasor measurements to determine the impedance parameters of a transmission grid by means of the recursive least squares (RLS algorithm. Furthermore, it incorporates the dynamic models of generators to handle the cases with generator reactive power limit violations. After that, an enhanced voltage stability index with GECMs incorporated is developed for reliable and accurate voltage stability assessment. The proposed methodology was first demonstrated on several standard IEEE power systems, and then applied to a practical power system, the Taiwan power (Taipower system. The test results demonstrate the flexibility and effectiveness of the proposed methodology.

  17. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Paramasivan

    2014-01-01

    Full Text Available Mobile ad hoc networks (MANETs are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  18. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    Science.gov (United States)

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  19. Enhanced stabilization of Pb, Zn, and Cd in contaminated soils using oxalic acid-activated phosphate rocks.

    Science.gov (United States)

    Zhang, Zhuo; Guo, Guanlin; Wang, Mei; Zhang, Jia; Wang, Zhixin; Li, Fasheng; Chen, Honghan

    2018-01-01

    Phosphate amendments, especially phosphate rock (PR), are one of the most commonly used materials to stabilize heavy metals in contaminated soils. However, most of PR reserve consists of low-grade ore, which limits the efficiency of PR for stabilizing heavy metals. This study was to enhance the stabilization of heavy metals through improving the available phosphorous (P) release of PR by oxalic acid activation. Raw PR and activated PR (APR) were characterized by scanning electron microscopy-energy dispersive X-ray spectroscopy (SEM-EDS), X-ray powder diffraction (XRD), Brunauer-Emmett-Teller (BET) surface analysis, and laser diffraction to determine the changes of structure and composition of APR. The stabilization effectiveness of lead (Pb), zinc (Zn), and cadmium (Cd) in soils by APR was investigated through toxicity leaching test and speciation analysis. The results indicated that after treatment by oxalic acid, (1) the crystallinity of the fluorapatite phase of PR transformed into the weddellite phase; (2) the surface area of PR increased by 37%; (3) the particle size of PR became homogenized (20-70 μm); and (4) the available P content in PR increased by 22 times. These changes of physicochemical characteristics of PR induced that APR was more effective to transform soil heavy metals from the non-residual fraction to the residual fraction and enhance the stabilization efficiency of Pb, Zn, and Cd than PR. These results are significant for the future use of low-grade PR to stabilize heavy metals.

  20. Stability enhancement of P3HT:PCBM polymer solar cells using thermally evaporated MoO3 anode buffer layer

    Science.gov (United States)

    Ameen, M. Yoosuf; Shamjid, P.; Abhijith, T.; Radhakrishnan, Thulasi; Reddy, V. S.

    2018-02-01

    Polymer solar cells have been fabricated with thermally evaporated MoO3 as anode buffer layer (ABL). The stability of MoO3 and PEDOT:PSS based devices was examined under different test conditions. The MoO3 based device exhibited a slightly better efficiency and significantly higher stability compared to PEDOT:PSS based device. At a relative humidity of 45% the unencapsulated PEDOT:PSS based device degraded completely within 96 h. On the other hand, MoO3 based device retained more than 60% of its initial efficiency after 96 h. The reason behind stability enhancement was investigated by measuring time-evolution of reflectance and hole-current. Experimental results revealed that the stability enhancement for MoO3 based device originates from the reduction in degradation of anode/active layer interface.

  1. Can low-carbon societies deliver on energy security?

    International Nuclear Information System (INIS)

    Jewell, Jessica

    2015-01-01

    The impact of low-carbon policies on energy security depends on both the timing and intensity of these policies, and the definition of energy security: security of what?; security for whom?; and security from which threats? The priorities of the EU’s 2030 climate/energy package and energy security show little if any alignment. Global climate stabilization policies benefit the energy security of India, China, and the EU, but may have negative impacts on export revenues of the U.S. and other energy exporters.

  2. Security improvements for rail movements of SNM

    International Nuclear Information System (INIS)

    Garcia, M.R.; Gronager, J.E.; Shemigon, N.N.

    1998-01-01

    The US Department of Energy (DOE) and the Russian Special Scientific and Production State Enterprise Eleron have teamed to lead a project to enhance the overall security of Russian Ministry of Atomic Energy (MINATOM) transportation of Special Nuclear Material (SNM) shipments. The effort is called the Railcar Transportation Security Project and is part of the overall DOE Material Protection, Control, and Accounting (MPC and A) program addressing the enhancement of nuclear material control, accounting, and physical protection for Russian SNM. The goal of this MPC and A project is to significantly increase the security of Russian MINATOM highly enriched SNM rail shipments. To accomplish this, the MPC and A Railcar Transportation Security program will provide an enhanced, yet cost effective, railcar transportation security system. The system incorporates a balance between the traditional detection, communications, delay, and response security elements to significantly improve the security of MINATOM SNM shipments. The strategy of this program is to use rapid upgrades to implement mature security technologies as quickly as possible. The rapid upgrades emphasize rapidly deployable delay elements, enhanced radio communications, and intrusion detection and surveillance. Upgraded railcars have begun operation during FY98. Subsequent upgrades will build upon the rapid upgrades and eventually be integrated into a final deployed system configuration. This paper provides an overview of the program, with a summary of performance of the deployed railcars

  3. As-grown graphene/copper nanoparticles hybrid nanostructures for enhanced intensity and stability of surface plasmon resonance

    Science.gov (United States)

    Li, Yun-Fei; Dong, Feng-Xi; Chen, Yang; Zhang, Xu-Lin; Wang, Lei; Bi, Yan-Gang; Tian, Zhen-Nan; Liu, Yue-Feng; Feng, Jing; Sun, Hong-Bo

    2016-11-01

    The transfer-free fabrication of the high quality graphene on the metallic nanostructures, which is highly desirable for device applications, remains a challenge. Here, we develop the transfer-free method by direct chemical vapor deposition of the graphene layers on copper (Cu) nanoparticles (NPs) to realize the hybrid nanostructures. The graphene as-grown on the Cu NPs permits full electric contact and strong interactions, which results in a strong localization of the field at the graphene/copper interface. An enhanced intensity of the localized surface plasmon resonances (LSPRs) supported by the hybrid nanostructures can be obtained, which induces a much enhanced fluorescent intensity from the dye coated hybrid nanostructures. Moreover, the graphene sheets covering completely and uniformly on the Cu NPs act as a passivation layer to protect the underlying metal surface from air oxidation. As a result, the stability of the LSPRs for the hybrid nanostructures is much enhanced compared to that of the bare Cu NPs. The transfer-free hybrid nanostructures with enhanced intensity and stability of the LSPRs will enable their much broader applications in photonics and optoelectronics.

  4. Global Nuclear Safety and Security Network

    International Nuclear Information System (INIS)

    Guo Lingquan

    2013-01-01

    The objectives of the Regulatory Network are: - to contribute to the effectiveness of nuclear regulatory systems; - to contribute to continuous enhancements, and - to achieve and promote radiation and nuclear safety and security by: • Enhancing the effectiveness and efficiency of international cooperation in the regulation of nuclear and radiation safety of facilities and activities; • Enabling adequate access by regulators to relevant safety and security information; • Promoting dissemination of information on safety and security issues as well as information of good practices for addressing and resolving these issues; • Enabling synergies among different web based networks with a view to strengthening and enhancing the global nuclear safety framework and serving the specific needs of regulators and international organizations; • Providing additional information to the public on international regulatory cooperation in safety and security matters

  5. Enhanced stability of steep channel beds to mass failure and debris flow initiation

    Science.gov (United States)

    Prancevic, J.; Lamb, M. P.; Ayoub, F.; Venditti, J. G.

    2015-12-01

    Debris flows dominate bedrock erosion and sediment transport in very steep mountain channels, and are often initiated from failure of channel-bed alluvium during storms. While several theoretical models exist to predict mass failures, few have been tested because observations of in-channel bed failures are extremely limited. To fill this gap in our understanding, we performed laboratory flume experiments to identify the conditions necessary to initiate bed failures in non-cohesive sediment of different sizes (D = 0.7 mm to 15 mm) on steep channel-bed slopes (S = 0.45 to 0.93) and in the presence of water flow. In beds composed of sand, failures occurred under sub-saturated conditions on steep bed slopes (S > 0.5) and under super-saturated conditions at lower slopes. In beds of gravel, however, failures occurred only under super-saturated conditions at all tested slopes, even those approaching the dry angle of repose. Consistent with theoretical models, mass failures under super-saturated conditions initiated along a failure plane approximately one grain-diameter below the bed surface, whereas the failure plane was located near the base of the bed under sub-saturated conditions. However, all experimental beds were more stable than predicted by 1-D infinite-slope stability models. In partially saturated sand, enhanced stability appears to result from suction stress. Enhanced stability in gravel may result from turbulent energy losses in pores or increased granular friction for failures that are shallow with respect to grain size. These grain-size dependent effects are not currently included in stability models for non-cohesive sediment, and they may help to explain better the timing and location of debris flow occurrence.

  6. Transforming Security Screening With Biometrics

    National Research Council Canada - National Science Library

    Hearnsberger, Brian J

    2003-01-01

    ... and identity theft to dramatically improve physical security. Today, biometric technology could be implemented to transform physical security by enhancing screening procedures currently in use at U.S...

  7. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  8. Concepts and Practices of Cooperative Security

    DEFF Research Database (Denmark)

    Keating, Vincent; Wheeler, Nicholas J

    2013-01-01

    This chapter considers how the security dilemma can be overcome in ways that promote cooperation and even trust, mitigating or transcending the international uncertainty that can otherwise inhibit interstate cooperation. It argues that there are two mechanisms to create the trust necessary...... for the development of a security community, Charles Osgood's GRIT strategy and a unilateral 'leap of trust.' Both of these, however, initially require elites to develop security dilemma sensibility. The long-term stability of security communities is fundamentally linked to the presence of embedded trust among...

  9. Enhanced ionic transport in fine-grained scandia-stabilized zirconia ceramics

    Energy Technology Data Exchange (ETDEWEB)

    Abdala, Paula M.; Lamas, Diego G. [CINSO (Centro de Investigaciones en Solidos), CONICET-CITEFA, J.B. de La Salle 4397 (B1603ALO) Villa Martelli, Pcia. de Buenos Aires (Argentina); Custo, Graciela S. [Gerencia de Area Seguridad Nuclear y Ambiente, Gerencia Quimica, Departamento Quimica Analitica, Centro Atomico Constituyentes, Comision Nacional de Energia Atomica, Av. Constituyentes 1499 (B1650KNA) San Martin, Pcia. de Buenos Aires (Argentina)

    2010-06-01

    In this work, the transport properties of fine-grained scandia-stabilized zirconia ceramics with low Si content have been investigated. These materials were prepared from ZrO{sub 2}-6 mol% Sc{sub 2}O{sub 3} nanopowders synthesized by a nitrate-lysine gel-combustion route. High relative densities and excellent electrical properties were obtained, even for sintering temperatures as low as 1350 C. Our electrochemical impedance spectroscopy study showed that both the volume fraction of grain boundaries and the specific grain-boundary conductivity are significantly enhanced with decreasing grain size, resulting in a higher total ionic conductivity. (author)

  10. Enhanced Stability of DNA Nanostructures by Incorporation of Unnatural Base Pairs.

    Science.gov (United States)

    Liu, Qing; Liu, Guocheng; Wang, Ting; Fu, Jing; Li, Rujiao; Song, Linlin; Wang, Zhen-Gang; Ding, Baoquan; Chen, Fei

    2017-11-03

    Self-assembled DNA nanostructures hold great promise in the fields of nanofabrication, biosensing and nanomedicine. However, the inherent low stability of the DNA double helices, formed by weak interactions, largely hinders the assembly and functions of DNA nanostructures. In this study, we redesigned and constructed a six-arm DNA junction by incorporation of the unnatural base pairs 5-Me-isoC/isoG and A/2-thioT into the double helices. They not only retained the structural integrity of the DNA nanostructure, but also showed enhanced thermal stability and resistance to T7 Exonuclease digestion. This research may expand the applications of DNA nanostructures in nanofabrication and biomedical fields, and furthermore, the genetic alphabet expansion with unnatural base pairs may enable us to construct more complicated and diversified self-assembled DNA nanostructures. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  11. Stabilizing the CH2 Domain of an Antibody by Engineering in an Enhanced Aromatic Sequon.

    Science.gov (United States)

    Chen, Wentao; Kong, Leopold; Connelly, Stephen; Dendle, Julia M; Liu, Yu; Wilson, Ian A; Powers, Evan T; Kelly, Jeffery W

    2016-07-15

    Monoclonal antibodies (mAbs) exhibiting highly selective binding to a protein target constitute a large and growing proportion of the therapeutics market. Aggregation of mAbs results in the loss of their therapeutic efficacy and can result in deleterious immune responses. The CH2 domain comprising part of the Fc portion of Immunoglobulin G (IgG) is typically the least stable domain in IgG-type antibodies and therefore influences their aggregation propensity. We stabilized the CH2 domain by engineering an enhanced aromatic sequon (EAS) into the N-glycosylated C'E loop and observed a 4.8 °C increase in the melting temperature of the purified IgG1 Fc fragment. This EAS-stabilized CH2 domain also conferred enhanced stability against thermal and low pH induced aggregation in the context of a full-length monoclonal IgG1 antibody. The crystal structure of the EAS-stabilized (Q295F/Y296A) IgG1 Fc fragment confirms the design principle, i.e., the importance of the GlcNAc1•F295 interaction, and surprisingly reveals that the core fucose attached to GlcNAc1 also engages in an interaction with F295. Inhibition of core fucosylation confirms the contribution of the fucose-Phe interaction to the stabilization. The Q295F/Y296A mutations also modulate the binding affinity of the full-length antibody to Fc receptors by decreasing the binding to low affinity Fc gamma receptors (FcγRIIa, FcγRIIIa, and FcγRIIIb), while maintaining wild-type binding affinity to FcRn and FcγRI. Our results demonstrate that engineering an EAS into the N-glycosylated reverse turn on the C'E loop leads to stabilizing N-glycan-protein interactions in antibodies and that this modification modulates antibody-Fc receptor binding.

  12. Enhancement of Orthodontic Anchor Screw Stability Under Immediate Loading by Ultraviolet Photofunctionalization Technology.

    Science.gov (United States)

    Takahashi, Maiko; Motoyoshi, Mitsuru; Inaba, Mizuki; Hagiwara, Yoshiyuki; Shimizu, Noriyoshi

    Ultraviolet (UV)-mediated photofunctionalization technology is intended to enhance the osseointegration capability of titanium implants. There are concerns about orthodontic anchor screws loosening under immediate loading protocols in adolescent orthodontic treatment. The purpose of this in vivo study was to evaluate the effects of photofunctionalization on the intrabony stability of orthodontic titanium anchor screws and bone-anchor screw contact under immediate loading in growing rats. Custom-made titanium anchor screws (1.4 mm in diameter and 4.0 mm in length) with or without photofunctionalization pretreatment were placed on the proximal epiphysis of the tibial bone in 6-week-old male Sprague-Dawley rats and were loaded immediately after placement. After 2 weeks of loading, the stability of the anchor screws was evaluated using a Periotest device, and the bone-anchor screw contact ratio (BSC) was assessed by a histomorphometric analysis using field-emission scanning electron microscopy. In the unloaded group, Periotest values (PTVs) were ~25 for UV-untreated screws and 13 for UVtreated screws (P < .01), while in the immediate-loading group, PTVs were 28 for UV-untreated screws and 16 for UV-treated screws (P < .05). Significantly less screw mobility was observed in both UV-treated groups regardless of the loading protocol. The BSC was increased ~1.8 fold for UV-treated screws, compared with UV-untreated screws, regardless of the loading protocol. Photofunctionalization enhanced the intrabony stability of orthodontic anchor screws under immediate loading in growing rats by increasing bone-anchor screw contact.

  13. Risk-informed, performance-based safety-security interface

    International Nuclear Information System (INIS)

    Mrowca, B.; Eltawila, F.

    2012-01-01

    Safety-security interface is a term that is used as part of the commercial nuclear power security framework to promote coordination of the many potentially adverse interactions between plant security and plant safety. Its object is to prevent the compromise of either. It is also used to describe the concept of building security into a plant's design similar to the long standing practices used for safety therefore reducing the complexity of the operational security while maintaining or enhancing overall security. With this in mind, the concept of safety-security interface, when fully implemented, can influence a plant's design, operation and maintenance. It brings the approach use for plant security to one that is similar to that used for safety. Also, as with safety, the application of risk-informed techniques to fully implement and integrate safety and security is important. Just as designers and operators have applied these techniques to enhance and focus safety, these same techniques can be applied to security to not only enhance and focus the security but also to aid in the implementation of effective techniques to address the safety-security interfaces. Implementing this safety-security concept early within the design process can prevent or reduce security vulnerabilities through low cost solutions that often become difficult and expensive to retrofit later in the design and/or post construction period. These security considerations address many of the same issues as safety in ensuring that the response of equipment and plant personnel are adequate. That is, both safety and security are focused on reaching safe shutdown and preventing radiological release. However, the initiation of challenges and the progression of actions in response these challenges and even the definitions of safe shutdown can be considerably different. This paper explores the techniques and limitations that are employed to fully implement a risk-informed, safety-security interface

  14. Rethinking Ethiopian Secured Transactions Law through ...

    African Journals Online (AJOL)

    Various countries have reformed their secured transaction laws recognizing the significance of modern secured transactions law in enhancing access to credit and economic development. Ethiopia has not undertaken comprehensive secured transactions law reform, despite the demonstrable mismatch between the legal ...

  15. 76 FR 51255 - Security Zone; Potomac River, Georgetown Channel, Washington, DC

    Science.gov (United States)

    2011-08-18

    ... officials, mitigate potential terrorist acts, and enhance public and maritime safety and security. The Coast... officials, mitigating potential terrorist acts and enhancing public and maritime safety security. Under 5 U... and enhancing public and maritime safety and security. Background and Purpose The President of the...

  16. An Enhanced Asymptotic Expansion for the Stability of Nonlinear Elastic Structures

    DEFF Research Database (Denmark)

    Christensen, Claus Dencker; Byskov, Esben

    2010-01-01

    A new, enhanced asymptotic expansion applicable to stability of structures made of nonlinear elastic materials is established. The method utilizes “hyperbolic” terms instead of the conventional polynomial terms, covers full kinematic nonlinearity and is applied to nonlinear elastic Euler columns...... with two different types of cross-section. Comparison with numerical results show that our expansion provides more accurate predictions of the behavior than usual expansions. The method is based on an extended version of the principle of virtual displacements that covers cases with auxiliary conditions...

  17. Fabrication of amorphous curcumin nanosuspensions using β-lactoglobulin to enhance solubility, stability, and bioavailability.

    Science.gov (United States)

    Aditya, N P; Yang, Hanjoo; Kim, Saehoon; Ko, Sanghoon

    2015-03-01

    Curcumin has low aqueous stability and solubility in its native form. It also has a low bioavailability which presents a major barrier to its use in fortifying food products. The aim of this work was to reduce the size of curcumin crystals to the nanoscale and subsequently stabilize them in an amorphous form. To this end, amorphous curcumin nanosuspensions were fabricated using the antisolvent precipitation method with β-lactoglobulin (β-lg) as a stabilizer. The resulting amorphous curcumin nanosuspensions were in the size range of 150-175 nm with unimodal size distribution. The curcumin particles were amorphous and were molecularly dispersed within the β-lg as confirmed by differential scanning calorimetry (DSC) and X-ray diffraction (XRD) studies. The solubility of the amorphous curcumin nanosuspension was enhanced ∼35-fold due to the reduced size and lower crystallinity. Among the formulations, the amorphous curcumin nanosuspensions stabilized with β-lg and prepared at pH 3.4 (β-lg-cur 3.4), showed maximum aqueous stability which was >90% after 30 days. An in vitro study using Caco-2 cell lines showed a significant increase in curcumin bioavailability after stabilization with β-lg. Copyright © 2015 Elsevier B.V. All rights reserved.

  18. Some Thoughts about Literature as a Means of Advancing Sustainable Unity and Stability in the Contemporary Nigerian State

    Directory of Open Access Journals (Sweden)

    Anaso George Nwaorah

    2014-06-01

    Full Text Available An in depth investigation was conducted on the possibility of literature employed to enhance cohesion, sustainable unity, national stability and security of lives and property in the contemporary Nigeria. These three elements- Unity, national stability and security of lives and property are considered the key-pillars of a modern state, the absence of which render the Country volatile and uninhabitable. The contemporary Nigeria lacks these elements in a large dose, thereby rendering it a country without peace and security. This has been the root cause of the current nationwide agitation for a national conference required to define the future for a country that has existed for a century, but still grappling unsuccessfully, with the problems of nationhood. This paper identified the cause of the problems to arise from the multi-ethnic composition of the one-hundred and seventy million people and over three hundred different ethnic nationals of Nigeria. The fact of uniting so many ethnic groups into one country is not peculiar to Nigeria, as many other countries have a similar composition.

  19. Transboundary natural area protection: Broadening the definition of national security

    Science.gov (United States)

    Haven B. Cook

    2007-01-01

    This paper looks at the definition and concept of national security, and examines how the environment is linked with national security. The traditional, state view of national security that guides most foreign policy includes the concepts of military power, sovereignty and geopolitical stability. This paper advocates broadening the definition of security to include...

  20. Technical impacts of high penetration levels of wind power on power system stability

    DEFF Research Database (Denmark)

    Flynn, Damian; Rather, Z.; Ardal, Atle

    2017-01-01

    With increasing penetrations of wind generation, based on power-electronic converters, power systems are transitioning away from well-understood synchronous generator-based systems, with growing implications for their stability. Issues of concern will vary with system size, wind penetration level......, geographical distribution and turbine type, network topology, electricity market structure, unit commitment procedures, and other factors. However, variable-speed wind turbines, both onshore and connected offshore through DC grids, offer many control opportunities to either replace or enhance existing...... capabilities. Achieving a complete understanding of future stability issues, and ensuring the effectiveness of new measures and policies, is an iterative procedure involving portfolio development and flexibility assessment, generation cost simulations, load flow, and security analysis, in addition...

  1. Security in the Americas: Neither Evolution Nor Devolution-Impasse

    National Research Council Canada - National Science Library

    Manwaring, Max

    2004-01-01

    Contemporary security and stability are fragile in the Western Hemisphere. As a corollary, an insecure and unstable hemisphere threatens regional national security and sovereignty, regional economic and socio-political development, U.S...

  2. Stability Enhancement of a Power System Containing High-Penetration Intermittent Renewable Generation

    OpenAIRE

    Morel, Jorge; Obara, Shin’ya; Morizane, Yuta

    2015-01-01

    This paper considers the transient stability enhancement of a power system containing large amounts of solar and wind generation in Japan. Following the Fukushima Daiichi nuclear disaster there has been an increasing awareness on the importance of a distributed architecture, based mainly on renewable generation, for the Japanese power system. Also, the targets of CO2 emissions can now be approached without heavily depending on nuclear generation. Large amounts of renewable generation leads to...

  3. Using RFID to Enhance Security in Off-Site Data Storage

    Directory of Open Access Journals (Sweden)

    Enrique de la Hoz

    2010-08-01

    Full Text Available Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system’s benefits in terms of efficiency and failure prevention.

  4. Using RFID to Enhance Security in Off-Site Data Storage

    Science.gov (United States)

    Lopez-Carmona, Miguel A.; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R.

    2010-01-01

    Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system’s benefits in terms of efficiency and failure prevention. PMID:22163638

  5. Using RFID to enhance security in off-site data storage.

    Science.gov (United States)

    Lopez-Carmona, Miguel A; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2010-01-01

    Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system's benefits in terms of efficiency and failure prevention.

  6. Entanglement enhances security in quantum communication

    International Nuclear Information System (INIS)

    Demkowicz-Dobrzanski, Rafal; Sen, Aditi; Sen, Ujjwal; Lewenstein, Maciej

    2009-01-01

    Secret sharing is a protocol in which a 'boss' wants to send a classical message secretly to two 'subordinates', such that none of the subordinates is able to know the message alone, while they can find it if they cooperate. Quantum mechanics is known to allow for such a possibility. We analyze tolerable quantum bit error rates in such secret sharing protocols in the physically relevant case when the eavesdropping is local with respect to the two channels of information transfer from the boss to the two subordinates. We find that using entangled encoding states is advantageous to legitimate users of the protocol. We therefore find that entanglement is useful for secure quantum communication. We also find that bound entangled states with positive partial transpose are not useful as a local eavesdropping resource. Moreover, we provide a criterion for security in secret sharing--a parallel of the Csiszar-Koerner criterion in single-receiver classical cryptography.

  7. A Novel Computer Virus Propagation Model under Security Classification

    Directory of Open Access Journals (Sweden)

    Qingyi Zhu

    2017-01-01

    Full Text Available In reality, some computers have specific security classification. For the sake of safety and cost, the security level of computers will be upgraded with increasing of threats in networks. Here we assume that there exists a threshold value which determines when countermeasures should be taken to level up the security of a fraction of computers with low security level. And in some specific realistic environments the propagation network can be regarded as fully interconnected. Inspired by these facts, this paper presents a novel computer virus dynamics model considering the impact brought by security classification in full interconnection network. By using the theory of dynamic stability, the existence of equilibria and stability conditions is analysed and proved. And the above optimal threshold value is given analytically. Then, some numerical experiments are made to justify the model. Besides, some discussions and antivirus measures are given.

  8. Data-Driven Security-Constrained OPF

    DEFF Research Database (Denmark)

    Thams, Florian; Halilbasic, Lejla; Pinson, Pierre

    2017-01-01

    considerations, while being less conservative than current approaches. Our approach can be scalable for large systems, accounts explicitly for power system security, and enables the electricity market to identify a cost-efficient dispatch avoiding redispatching actions. We demonstrate the performance of our......In this paper we unify electricity market operations with power system security considerations. Using data-driven techniques, we address both small signal stability and steady-state security, derive tractable decision rules in the form of line flow limits, and incorporate the resulting constraints...... in market clearing algorithms. Our goal is to minimize redispatching actions, and instead allow the market to determine the most cost-efficient dispatch while considering all security constraints. To maintain tractability of our approach we perform our security assessment offline, examining large datasets...

  9. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  10. 17 CFR 242.104 - Stabilizing and other activities in connection with an offering.

    Science.gov (United States)

    2010-04-01

    ... the principal market if the security has traded in the principal market on the day stabilizing is... security has traded in that market on the day stabilizing is initiated or on the last preceding business... expressed in a currency other than the currency of the principal market for the security, such bid may be...

  11. Energy Security and Sub-Saharan Africa

    Directory of Open Access Journals (Sweden)

    Emily Meierding

    2013-02-01

    Full Text Available Published by Palgrave MacmillanOver the last decade the topic of energy security has reappeared on global policy agendas. Most analyses of international energy geopolitics examine the interests and behaviour of powerful energy-importing countries like the US and China. This chapter begins by examining foreign powers’ expanded exploitation of oil and uranium resources in Sub-Saharan Africa. It goes on to examine how energy importers’ efforts to enhance their energy security through Africa are impacting energy security within Africa. It assesses Sub-Saharan states’ attempts to increase consumption of local oil and uranium reserves. Observing the constraints on these efforts, it then outlines some alternative strategies that have been employed to enhance African energy security. It concludes that, while local community-based development projects have improved the well-being of many households, they are not a sufficient guarantor of energy security. Inadequate petroleum access, in particular, remains a development challenge. Foreign powers’ efforts to increase their oil security are undermining the energy security of Sub-Saharan African citizens.

  12. Enhancing Stability of Perovskite Solar Cells to Moisture by the Facile Hydrophobic Passivation.

    Science.gov (United States)

    Hwang, Insung; Jeong, Inyoung; Lee, Jinwoo; Ko, Min Jae; Yong, Kijung

    2015-08-12

    In this study, a novel and facile passivation process for a perovskite solar cell is reported. Poor stability in ambient atmosphere, which is the most critical demerit of a perovskite solar cell, is overcome by a simple passivation process using a hydrophobic polymer layer. Teflon, the hydrophobic polymer, is deposited on the top of a perovskite solar cell by a spin-coating method. With the hydrophobic passivation, the perovskite solar cell shows negligible degradation after a 30 day storage in ambient atmosphere. Suppressed degradation of the perovskite film is proved in various ways: X-ray diffraction, light absorption spectrum, and quartz crystal microbalance. This simple but effective passivation process suggests new kind of approach to enhance stability of perovskite solar cells to moisture.

  13. Enhancing MISP with Fast Mobile IPv6 Security

    Directory of Open Access Journals (Sweden)

    Ilsun You

    2011-01-01

    Full Text Available The Mobile Broadband Association has developed the MIS and MISAUTH protocols as link-layer fast authentication protocols. A combination of MIS and MISAUTH protocols, called as MISP, provides secure and fast connection for a wireless access network, but it has been reported that MISP creates a weak session key and suffers from a denial-of-service attack. In addition, a transaction with an authentication server that is required for every authentication is considered as a delay factor during handovers. In this paper, we present an improvement of MISP that utilizes the fast handover approach of Fast Mobile IPv6 and minimizes an involvement of the authentication server while eliminating identified security drawbacks of MISP. The formal security analysis is performed to verify the correctness of the proposed scheme. Moreover, the handover performance of the proposed scheme is compared with an existing scheme.

  14. Stabilizing salt-bridge enhances protein thermostability by reducing the heat capacity change of unfolding.

    Directory of Open Access Journals (Sweden)

    Chi-Ho Chan

    Full Text Available Most thermophilic proteins tend to have more salt bridges, and achieve higher thermostability by up-shifting and broadening their protein stability curves. While the stabilizing effect of salt-bridge has been extensively studied, experimental data on how salt-bridge influences protein stability curves are scarce. Here, we used double mutant cycles to determine the temperature-dependency of the pair-wise interaction energy and the contribution of salt-bridges to ΔC(p in a thermophilic ribosomal protein L30e. Our results showed that the pair-wise interaction energies for the salt-bridges E6/R92 and E62/K46 were stabilizing and insensitive to temperature changes from 298 to 348 K. On the other hand, the pair-wise interaction energies between the control long-range ion-pair of E90/R92 were negligible. The ΔC(p of all single and double mutants were determined by Gibbs-Helmholtz and Kirchhoff analyses. We showed that the two stabilizing salt-bridges contributed to a reduction of ΔC(p by 0.8-1.0 kJ mol⁻¹ K⁻¹. Taken together, our results suggest that the extra salt-bridges found in thermophilic proteins enhance the thermostability of proteins by reducing ΔC(p, leading to the up-shifting and broadening of the protein stability curves.

  15. Enhanced Secure Trusted AODV (ESTA Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dilraj Singh

    2015-09-01

    Full Text Available The self-organizing nature of the Mobile Ad hoc Networks (MANETs provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in the network and, in turn, such nodes try to crumble the working of the network by dropping the maximum data under transmission. In this paper, a new protocol is proposed which is based on the widely used Ad hoc On-Demand Distance Vector (AODV protocol, Enhanced Secure Trusted AODV (ESTA, which makes use of multiple paths along with use of trust and asymmetric cryptography to ensure data security. The results, based on NS-3 simulation, reveal that the proposed protocol is effectively able to counter the blackhole nodes in three different scenarios.

  16. Congestion management considering voltage security of power systems

    International Nuclear Information System (INIS)

    Esmaili, Masoud; Shayanfar, Heidar Ali; Amjady, Nima

    2009-01-01

    Congestion in a power network is turned up due to system operating limits. To relieve congestion in a deregulated power market, the system operator pays to market participants, GENCOs and DISCOs, to alter their active powers considering their bids. After performing congestion management, the network may be operated with a low security level because of hitting some flows their upper limit and some voltages their lower limit. In this paper, a novel congestion management method based on the voltage stability margin sensitivities is introduced. Using the proposed method, the system operator so alleviates the congestion that the network can more retain its security. The proposed method not only makes the system more secure after congestion management than other methods already presented for this purpose but also its cost of providing security is lower than the earlier methods. Test results of the proposed method along with the earlier ones on the New-England test system elaborate the efficiency of the proposed method from the viewpoint of providing a better voltage stability margin and voltage profile as well as a lower security cost. (author)

  17. Collaborative eHealth Meets Security: Privacy-Enhancing Patient Profile Management.

    Science.gov (United States)

    Sanchez-Guerrero, Rosa; Mendoza, Florina Almenarez; Diaz-Sanchez, Daniel; Cabarcos, Patricia Arias; Lopez, Andres Marin

    2017-11-01

    Collaborative healthcare environments offer potential benefits, including enhancing the healthcare quality delivered to patients and reducing costs. As a direct consequence, sharing of electronic health records (EHRs) among healthcare providers has experienced a noteworthy growth in the last years, since it enables physicians to remotely monitor patients' health and enables individuals to manage their own health data more easily. However, these scenarios face significant challenges regarding security and privacy of the extremely sensitive information contained in EHRs. Thus, a flexible, efficient, and standards-based solution is indispensable to guarantee selective identity information disclosure and preserve patient's privacy. We propose a privacy-aware profile management approach that empowers the patient role, enabling him to bring together various healthcare providers as well as user-generated claims into an unique credential. User profiles are represented through an adaptive Merkle Tree, for which we formalize the underlying mathematical model. Furthermore, performance of the proposed solution is empirically validated through simulation experiments.

  18. The novel approach to enhance seed security: dual anti-counterfeiting methods applied on tobacco pelleted seeds.

    Science.gov (United States)

    Guan, Yajing; Wang, Jianchen; Tian, Yixin; Hu, Weimin; Zhu, Liwei; Zhu, Shuijin; Hu, Jin

    2013-01-01

    Seed security is of prime importance for agriculture. To protect true seeds from being faked, more secure dual anti-counterfeiting technologies for tobacco (Nicotiana tabacum L.) pelleted seed were developed in this paper. Fluorescein (FR), rhodamine B (RB), and magnetic powder (MP) were used as anti-counterfeiting labels. According to their different properties and the special seed pelleting process, four dual-labeling treatments were conducted for two tobacco varieties, MS Yunyan85 (MSYY85) and Honghua Dajinyuan (HHDJY). Then the seed germination and seedling growth status were investigated, and the fluorescence in cracked pellets and developing seedlings was observed under different excitation lights. The results showed that FR, RB, and MP had no negative effects on the germination, seedling growth, and MDA content of the pelleted seeds, and even some treatments significantly enhanced seedling dry weight, vigor index, and shoot height in MS YY85, and increased SOD activity and chlorophyll content in HHDJY as compared to the control. In addition, the cotyledon tip of seedlings treated with FR and MP together represented bright green fluorescence under illumination of blue light (478 nm). And the seedling cotyledon vein treated with RB and MP together showed red fluorescence under green light (546 nm). All seeds pelleted with magnetic powder of proper concentration could be attracted by a magnet. Thus, it indicated that those new dual-labeling methods that fluorescent compound and magnetic powder simultaneously applied in the same seed pellets definitely improved anti-counterfeiting technology and enhanced the seed security. This technology will ensure that high quality seed will be used in the crop production.

  19. The novel approach to enhance seed security: dual anti-counterfeiting methods applied on tobacco pelleted seeds.

    Directory of Open Access Journals (Sweden)

    Yajing Guan

    Full Text Available Seed security is of prime importance for agriculture. To protect true seeds from being faked, more secure dual anti-counterfeiting technologies for tobacco (Nicotiana tabacum L. pelleted seed were developed in this paper. Fluorescein (FR, rhodamine B (RB, and magnetic powder (MP were used as anti-counterfeiting labels. According to their different properties and the special seed pelleting process, four dual-labeling treatments were conducted for two tobacco varieties, MS Yunyan85 (MSYY85 and Honghua Dajinyuan (HHDJY. Then the seed germination and seedling growth status were investigated, and the fluorescence in cracked pellets and developing seedlings was observed under different excitation lights. The results showed that FR, RB, and MP had no negative effects on the germination, seedling growth, and MDA content of the pelleted seeds, and even some treatments significantly enhanced seedling dry weight, vigor index, and shoot height in MS YY85, and increased SOD activity and chlorophyll content in HHDJY as compared to the control. In addition, the cotyledon tip of seedlings treated with FR and MP together represented bright green fluorescence under illumination of blue light (478 nm. And the seedling cotyledon vein treated with RB and MP together showed red fluorescence under green light (546 nm. All seeds pelleted with magnetic powder of proper concentration could be attracted by a magnet. Thus, it indicated that those new dual-labeling methods that fluorescent compound and magnetic powder simultaneously applied in the same seed pellets definitely improved anti-counterfeiting technology and enhanced the seed security. This technology will ensure that high quality seed will be used in the crop production.

  20. Critical Perspective on ASEAN's Security Policy Under ASEAN Political and Security Community

    Directory of Open Access Journals (Sweden)

    Irawan Jati

    2016-03-01

    Full Text Available   Despite economic integration challenges, ASEAN faces greater security challenges. It is obvious to assert that a stable economic development requires a secure regional atmosphere. The most probable threats against ASEAN are ranging from hostile foreign entities infiltration, intra and inter states disputes, radical religious movements, human trafficking, drugs and narcotics smuggling, cybercrimes and environmental disasters. In 2009, ASEAN established the ASEAN Political and Security Community as the umbrella of ASEAN’s political and security initiatives. APSC slots in some significant fora; ASEAN Intergovernmental Commission on Human Rights (AICHR, ASEAN Foreign Ministers Meeting (AMM,  ASEAN Regional Forum (ARF, ASEAN Defense Minister’s Meeting (ADMM, ASEAN Law Ministers Meeting (ALAWMM, and ASEAN Ministerial Meeting on Transnational Crimes (AMMTC. The wide array of these forums signify ASEAN efforts to confront double features of security; the traditional and nontraditional or critical security. The traditional security considers state security as the primary object security. While the critical security tends to focus on non-state aspects such as individual human being as its referent object. Even though some argue that APSC has been able to preserve the stability in the region, it still lack of confidence in solving critical issues such as territorial disputes and irregular migrants problems.Therefore, this piece would examine the fundamental questions: How does ASEAN address beyond state security issues in its security policy through APSC? To search for the answer this paper would apply critical security studies approach. Critical security posits that threats are not always for the states but in many cases for the people. Based on the examination of ASEAN security policies, this paper argues that ASEAN’s security policy has touched the non-traditional security issues but showing slow progress on its development and application. 

  1. Validation of enhanced stabilization of municipal solid waste under controlled leachate recirculation using FTIR and XRD.

    Science.gov (United States)

    Sethi, Sapna; Kothiyal, N C; Nema, Arvind K

    2012-07-01

    Leachate recirculation at neutral PH accompanied with buffer/nutrients addition has been used successfully in earlier stabilization of municipal solid waste in bioreactor landfills. In the present study, efforts were made to enhance the stabilization rate of municipal solid waste (MSW) and organic solid waste (OSW) in simulated landfill bioreactors by controlling the pH of recirculated leachate towards slightly alkaline side in absence of additional buffer and nutrients addition. Enhanced stabilization in waste samples was monitored with the help of analytical tools like Fourier Transform Infrared Spectroscopy (FTIR) and X-Ray Diffraction (XRD). Predominance of bands assigned to inorganic compounds and comparatively lower intensities of bands for organic compounds in the FTIR spectra of waste samples degraded with leachate recirculation under controlled pH confirmed higher rate of biodegradation and mineralization of waste than the samples degraded without controlled leachate recirculation. XRD spectra also confirmed to a greater extent of mineralization in the waste samples degraded under leachate recirculation with controlled pH. Comparison of XRD spectra of two types of wastes pointed out higher degree of mineralization in organic solid waste as compared to municipal solid waste.

  2. FINANCIAL-ECONOMICAL ENTERPRISE SECURITY STRATEGY FORMING IN THE TERMS OF UNCONFORMITY

    Directory of Open Access Journals (Sweden)

    Galyna Mykhayliv

    2016-03-01

    Full Text Available Theoretical points as for definition of “financial-economical security” have been researched and summing up. The present attitude were analyzed as for the financial-economical enterprise security forming in the terms of unconformity and system attitude necessity stipulated for strategy system management by a financial-economical enterprise security. Keywords: financial-economical enterprise security, strategy management, financial security, economical security, financial stability, economical security, external JEL: M 20

  3. Image Encryption Using Stream Cipher Based on Nonlinear Combination Generator with Enhanced Security

    Directory of Open Access Journals (Sweden)

    Belmeguenaï Aîssa

    2013-03-01

    Full Text Available The images are very largely used in our daily life; the security of their transfer became necessary. In this work a novel image encryption scheme using stream cipher algorithm based on nonlinear combination generator is developed. The main contribution of this work is to enhance the security of encrypted image. The proposed scheme is based on the use the several linear feedback shifts registers whose feedback polynomials are primitive and of degrees are all pairwise coprimes combined by resilient function whose resiliency order, algebraic degree and nonlinearity attain Siegenthaler’s and Sarkar, al.’s bounds. This proposed scheme is simple and highly efficient. In order to evaluate performance, the proposed algorithm was measured through a series of tests. These tests included visual test and histogram analysis, key space analysis, correlation coefficient analysis, image entropy, key sensitivity analysis, noise analysis, Berlekamp-Massey attack, correlation attack and algebraic attack. Experimental results demonstrate the proposed system is highly key sensitive, highly resistance to the noises and shows a good resistance against brute-force, statistical attacks, Berlekamp-Massey attack, correlation attack, algebraic attack and a robust system which makes it a potential candidate for encryption of image.

  4. Uganda; Financial System Stability Assessment, including Reports on the Observance of Standards and Codes on the following topics: Monetary and Financial Policy Transparency, Banking Supervision, Securities Regulation, and Payment Systems

    OpenAIRE

    International Monetary Fund

    2003-01-01

    This paper presents findings of Uganda’s Financial System Stability Assessment, including Reports on the Observance of Standards and Codes on Monetary and Financial Policy Transparency, Banking Supervision, Securities Regulation, Insurance Regulation, Corporate Governance, and Payment Systems. The banking system in Uganda, which dominates the financial system, is fundamentally sound, more resilient than in the past, and currently poses no threat to macroeconomic stability. A major disruption ...

  5. Enhanced thermal stability of RuO2/polyimide interface for flexible device applications

    Science.gov (United States)

    Music, Denis; Schmidt, Paul; Chang, Keke

    2017-09-01

    We have studied the thermal stability of RuO2/polyimide (Kapton) interface using experimental and theoretical methods. Based on calorimetric and spectroscopic analyses, this inorganic-organic system does not exhibit any enthalpic peaks as well as all bonds in RuO2 and Kapton are preserved up to 500 °C. In addition, large-scale density functional theory based molecular dynamics, carried out in the same temperature range, validates the electronic structure and points out that numerous Ru-C and a few Ru-O covalent/ionic bonds form across the RuO2/Kapton interface. This indicates strong adhesion, but there is no evidence of Kapton degradation upon thermal excitation. Furthermore, RuO2 does not exhibit any interfacial bonds with N and H in Kapton, providing additional evidence for the thermal stability notion. It is suggested that the RuO2/Kapton interface is stable due to aromatic architecture of Kapton. This enhanced thermal stability renders Kapton an appropriate polymeric substrate for RuO2 containing systems in various applications, especially for flexible microelectronic and energy devices.

  6. New Security Development and Trends to Secure the SCADA Sensors Automated Transmission during Critical Sessions

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2015-10-01

    Full Text Available Modern technology enhancements have been used worldwide to fulfill the requirements of the industrial sector, especially in supervisory control and data acquisition (SCADA systems as a part of industrial control systems (ICS. SCADA systems have gained popularity in industrial automations due to technology enhancements and connectivity with modern computer networks and/or protocols. The procurement of new technologies has made SCADA systems important and helpful to processing in oil lines, water treatment plants, and electricity generation and control stations. On the other hand, these systems have vulnerabilities like other traditional computer networks (or systems, especially when interconnected with open platforms. Many international organizations and researchers have proposed and deployed solutions for SCADA security enhancement, but most of these have been based on node-to-node security, without emphasizing critical sessions that are linked directly with industrial processing and automation. This study concerns SCADA security measures related to critical processing with specified sessions of automated polling, analyzing cryptography mechanisms and deploying the appropriate explicit inclusive security solution in a distributed network protocol version 3 (DNP3 stack, as part of a SCADA system. The bytes flow through the DNP3 stack with security computational bytes within specified critical intervals defined for polling. We took critical processing knowledge into account when designing a SCADA/DNP3 testbed and deploying a cryptography solution that did not affect communications.

  7. Beijing’s Quest for Stability in its Neighborhood:

    DEFF Research Database (Denmark)

    Odgaard, Liselotte

    2017-01-01

    on the use of force, on international legitimacy, and on institutional frameworks for security management. As China is increasingly asserting its security, economic, and institutional interests in Central Asia, similarities and differences have become apparent in relations with Russia. Increased mutual...... concern for continued regional stability has encouraged Beijing and Moscow to coordinate their policies across a wide range of issue areas. Stability allows them to focus attention and resources on each of their different geostrategic priorities....

  8. Intra-site Secure Transport Vehicle test and evaluation

    International Nuclear Information System (INIS)

    Scott, S.

    1995-01-01

    In the past many DOE and DoD facilities involved in handling nuclear material realized a need to enhance the safely and security for movement of sensitive materials within their facility, or ''intra-site''. There have been prior efforts to improve on-site transportation; however, there remains a requirement for enhanced on-site transportation at a number of facilities. The requirements for on-site transportation are driven by security, safety, and operational concerns. The Intra-site Secure Transport Vehicle (ISTV) was designed to address these concerns specifically for DOE site applications with a standardized vehicle design. This paper briefly reviews the ISTV design features providing significant enhancement of onsite transportation safety and security, and also describes the test and evaluation activities either complete of underway to validate the vehicle design and operation

  9. Smart security and securing data through watermarking

    Science.gov (United States)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  10. The use of synthetic ligaments in the design of an enhanced stability total knee joint replacement.

    Science.gov (United States)

    Stokes, Michael D; Greene, Brendan C; Pietrykowski, Luke W; Gambon, Taylor M; Bales, Caroline E; DesJardins, John D

    2018-03-01

    Current total knee replacement designs work to address clinically desired knee stability and range of motion through a balance of retained anatomy and added implant geometry. However, simplified implant geometries such as bearing surfaces, posts, and cams are often used to replace complex ligamentous constraints that are sacrificed during most total knee replacement procedures. This article evaluates a novel total knee replacement design that incorporates synthetic ligaments to enhance the stability of the total knee replacement system. It was hypothesized that by incorporating artificial cruciate ligaments into a total knee replacement design at specific locations and lengths, the stability of the total knee replacement could be significantly altered while maintaining active ranges of motion. The ligament attachment mechanisms used in the design were evaluated using a tensile test, and determined to have a safety factor of three with respect to expected ligamentous loading in vivo. Following initial computational modeling of possible ligament orientations, a physical prototype was constructed to verify the function of the design by performing anterior/posterior drawer tests under physiologic load. Synthetic ligament configurations were found to increase total knee replacement stability up to 94% compared to the no-ligament case, while maintaining total knee replacement flexion range of motion between 0° and 120°, indicating that a total knee replacement that incorporates synthetic ligaments with calibrated location and lengths should be able to significantly enhance and control the kinematic performance of a total knee replacement system.

  11. Dynamic State Estimation for Multi-Machine Power System by Unscented Kalman Filter With Enhanced Numerical Stability

    Energy Technology Data Exchange (ETDEWEB)

    Qi, Junjian; Sun, Kai; Wang, Jianhui; Liu, Hui

    2018-03-01

    In this paper, in order to enhance the numerical stability of the unscented Kalman filter (UKF) used for power system dynamic state estimation, a new UKF with guaranteed positive semidifinite estimation error covariance (UKFGPS) is proposed and compared with five existing approaches, including UKFschol, UKF-kappa, UKFmodified, UKF-Delta Q, and the squareroot UKF (SRUKF). These methods and the extended Kalman filter (EKF) are tested by performing dynamic state estimation on WSCC 3-machine 9-bus system and NPCC 48-machine 140-bus system. For WSCC system, all methods obtain good estimates. However, for NPCC system, both EKF and the classic UKF fail. It is found that UKFschol, UKF-kappa, and UKF-Delta Q do not work well in some estimations while UKFGPS works well in most cases. UKFmodified and SRUKF can always work well, indicating their better scalability mainly due to the enhanced numerical stability.

  12. Silylated Zeolites with Enhanced Hydrothermal Stability for the Aqueous-Phase Hydrogenation of Levulinic Acid to γ-Valerolactone

    Science.gov (United States)

    Vu, Hue-Tong; Harth, Florian M.; Wilde, Nicole

    2018-05-01

    A systematic silylation approach using mono-, di- and trichlorosilanes with different alkyl chain lengths was employed to enhance the hydrothermal stability of zeolite Y. DRIFT spectra of the silylated zeolites indicate that the attachment of the silanes takes place at surface silanol groups. Regarding hydrothermal stability under aqueous-phase processing conditions, i.e., pH ≈ 2, 473 K and autogenous pressure, the selective silylation of the zeolite surface using monochlorosilanes has no considerable influence. By using trichlorosilanes, the hydrothermal stability of zeolite Y can be improved significantly as proven by a stability test in an aqueous solution of 0.6 M levulinic acid (LA) and 0.2 M formic acid (FA) at 473 K. However, the silylation with trichlorosilanes results in a significant loss of total specific pore volume and total specific surface area, e.g., 0.35 cm3 g-1 and 507 m2 g 1 for the silylated zeolite Y functionalized with n octadecyltrichlorosilane compared to 0.51 cm3 g 1 and 788 m2 g-1 for the parent zeolite Y. The hydrogenation of LA to γ valerolactone (GVL) was conducted over 3 wt.-% Pt on zeolite Y (3PtY) silylated with either n octadecyltrichlorosilane or methyltrichlorosilane using different reducing agents, e.g., FA or H2. While in the stability test an enhanced hydrothermal stability was found for zeolite Y silylated with n octadecyltrichlorosilane, its stability in the hydrogenation of LA was far less pronounced. Only by applying an excess amount of methyltrichlorosilane, i.e., 10 mmol per 1 g of zeolite Y, presumably resulting in a high degree of polymerization among the silanes, a recognizable improvement of the stability of the 3 PtY catalyst could be achieved. Nonetheless, the pore blockage found for zeolite Y silylated with an excess amount of methyltrichlorosilane was reflected in a drastically lower GVL yield at 493 K using FA as reducing agent, i.e., 12% vs. 34% for 3PtY after 24 h.

  13. Silylated Zeolites With Enhanced Hydrothermal Stability for the Aqueous-Phase Hydrogenation of Levulinic Acid to γ-Valerolactone

    Directory of Open Access Journals (Sweden)

    Hue-Tong Vu

    2018-05-01

    Full Text Available A systematic silylation approach using mono-, di-, and trichlorosilanes with different alkyl chain lengths was employed to enhance the hydrothermal stability of zeolite Y. DRIFT spectra of the silylated zeolites indicate that the attachment of the silanes takes place at surface silanol groups. Regarding hydrothermal stability under aqueous-phase processing (APP conditions, i.e., pH ≈ 2, 473 K and autogenous pressure, the selective silylation of the zeolite surface using monochlorosilanes has no considerable influence. By using trichlorosilanes, the hydrothermal stability of zeolite Y can be improved significantly as proven by a stability test in an aqueous solution of 0.2 M levulinic acid (LA and 0.6 M formic acid (FA at 473 K. However, the silylation with trichlorosilanes results in a significant loss of total specific pore volume and total specific surface area, e.g., 0.35 cm3 g−1 and 507 m2 g−1 for the silylated zeolite Y functionalized with n-octadecyltrichlorosilane compared to 0.51 cm3 g−1 and 788 m2 g−1 for the parent zeolite Y. The hydrogenation of LA to γ-valerolactone (GVL was conducted over 3 wt.-% Pt on zeolite Y (3PtY silylated with either n-octadecyltrichlorosilane or methyltrichlorosilane using different reducing agents, e.g., FA or H2. While in the stability test an enhanced hydrothermal stability was found for zeolite Y silylated with n-octadecyltrichlorosilane, its stability in the hydrogenation of LA was far less pronounced. Only by applying an excess amount of methyltrichlorosilane, i.e., 10 mmol per 1 g of zeolite Y, presumably resulting in a high degree of polymerization among the silanes, a recognizable improvement of the stability of the 3 PtY catalyst could be achieved. Nonetheless, the pore blockage found for zeolite Y silylated with an excess amount of methyltrichlorosilane was reflected in a drastically lower GVL yield at 493 K using FA as reducing agent, i.e., 12 vs. 34% for 3PtY after 24 h.

  14. Stabilization of dendritic spine clusters and hyperactive Ras-MAPK signaling predict enhanced motor learning in an autistic savant mouse model

    Directory of Open Access Journals (Sweden)

    Ryan Thomas Ash

    2014-03-01

    Full Text Available That both prominent behavioral inflexibility and exceptional learning abilities are seen occasionally in autistic patients is a mystery. We hypothesize that these altered patterns of learning and memory can arise from a pathological imbalance between the stability and plasticity of internal neural representations. We evaluated this hypothesis in the mouse model of MECP2 duplication syndrome, which demonstrates enhanced motor learning, stereotyped behaviors, and social avoidance. Learning-associated structural plasticity was measured in the motor cortex of MECP2 duplication mice by 2-photon imaging (Fig. 1A. An increased stabilization rate of learning-associated dendritic spines was observed in mutants, and this correlated with rotarod performance. Analysis of the spatial distribution of stabilized spines revealed that the mutant’s increased spine stabilization was due to a specific increase in the stability of spines jointly formed in ~9-micron clusters. Clustered spine stabilization but not isolated spine stabilization predicted enhanced motor performance in MECP2 duplication mice (Fig. 1B. Biochemical assays of Ras-MAPK and mTOR pathway activation demonstrated profound hyperphosphorylation of MAPK in the motor cortex of MECP2 duplication mice with motor training (Fig. 1C. Taken together these data suggest that a pathological bias towards hyperstability of learning-associated dendritic spine clusters driven by hyperactive Ras-MAPK signaling could contribute to neurobehavioral phenotypes in this form of syndromic autism.

  15. Thermo-cleavable polymers: Materials with enhanced photochemical stability

    DEFF Research Database (Denmark)

    Manceau, Matthieu; Petersen, Martin Helgesen; Krebs, Frederik C

    2010-01-01

    Photochemical stability of three thermo-cleavable polymers was investigated as thin films under atmospheric conditions. A significant increase in lifetime was observed once the side-chain was cleaved emphasizing the detrimental effect of solubilizing groups on the photochemical stability of conju......Photochemical stability of three thermo-cleavable polymers was investigated as thin films under atmospheric conditions. A significant increase in lifetime was observed once the side-chain was cleaved emphasizing the detrimental effect of solubilizing groups on the photochemical stability...... of conjugated polymers. In addition to their ease of processing, thermo-cleavable polymers thus also offer a greater intrinsic stability under illumination....

  16. Report on Enhancing Security and Stability in Afghanistan

    Science.gov (United States)

    2015-06-01

    11 international terrorist groups, and accept Afghanistan’s constitution , including its protections for the rights of women and minorities...Slovakia 39 Finland 80 Slovenia 7 Georgia 885 Spain 294 Germany 850 Sweden 30 Greece 4 FYR of Macedonia 38 Hungary 97 Turkey 503 Iceland 4 Ukraine...advisors work with the MoD and the MoI to ensure the ANDSF respect the rule of law and operate in accordance with Afghanistan’s constitution

  17. Power allocation and cooperative jamming for enhancing physical layer security in opportunistic relay networks in the presence of interference

    KAUST Repository

    Abd El-Malek, Ahmed H.; Salhab, Anas M.; Zummo, Salam A.; Alouini, Mohamed-Slim

    2017-01-01

    In this paper, the impact of cochannel interference on the secrecy performance of dual-hop decode-and-forward relaying is investigated. In particular, the outage and intercept probabilities are obtained for the opportunistic relay selection (ORS) model in the presence of nonidentical interfering signals under a single/multiple passive eavesdropper(s) attack. Moreover, the proposed work enhances physical layer security performance of ORS model using cooperative jamming (CJ) techniques. Therefore, new closed-form expressions are derived for the intercept and outage probabilities of the CJ-ORS model in the presence of interference over Rayleigh fading channels. Moreover, the analyses are generalized to the case of multiple eavesdroppers where closed-form expressions are derived for the intercept probability. To reveal more insights on the proposed work secrecy performance, asymptotic closed-form expressions for the intercept and outage probabilities are obtained. Using these asymptotic expressions, a power allocation optimization problem is formulated and solved for enhancing the system security. The derived analytical formulas herein are supported by numerical and simulation results to clarify the main contributions of the paper. The results show that, although the cochannel interference increases the system outage probability, it might improve the system secrecy performance. Moreover, the proposed CJ-ORS model is shown to enhance the system secrecy performance compared to ORS model.

  18. Power allocation and cooperative jamming for enhancing physical layer security in opportunistic relay networks in the presence of interference

    KAUST Repository

    Abd El-Malek, Ahmed H.

    2017-04-18

    In this paper, the impact of cochannel interference on the secrecy performance of dual-hop decode-and-forward relaying is investigated. In particular, the outage and intercept probabilities are obtained for the opportunistic relay selection (ORS) model in the presence of nonidentical interfering signals under a single/multiple passive eavesdropper(s) attack. Moreover, the proposed work enhances physical layer security performance of ORS model using cooperative jamming (CJ) techniques. Therefore, new closed-form expressions are derived for the intercept and outage probabilities of the CJ-ORS model in the presence of interference over Rayleigh fading channels. Moreover, the analyses are generalized to the case of multiple eavesdroppers where closed-form expressions are derived for the intercept probability. To reveal more insights on the proposed work secrecy performance, asymptotic closed-form expressions for the intercept and outage probabilities are obtained. Using these asymptotic expressions, a power allocation optimization problem is formulated and solved for enhancing the system security. The derived analytical formulas herein are supported by numerical and simulation results to clarify the main contributions of the paper. The results show that, although the cochannel interference increases the system outage probability, it might improve the system secrecy performance. Moreover, the proposed CJ-ORS model is shown to enhance the system secrecy performance compared to ORS model.

  19. Structure-based stabilization of HIV-1 gp120 enhances humoral immune responses to the induced co-receptor binding site.

    Directory of Open Access Journals (Sweden)

    Barna Dey

    2009-05-01

    Full Text Available The human immunodeficiency virus type 1 (HIV-1 exterior envelope glycoprotein, gp120, possesses conserved binding sites for interaction with the primary virus receptor, CD4, and also for the co-receptor, generally CCR5. Although gp120 is a major target for virus-specific neutralizing antibodies, the gp120 variable elements and its malleable nature contribute to evasion of effective host-neutralizing antibodies. To understand the conformational character and immunogenicity of the gp120 receptor binding sites as potential vaccine targets, we introduced structure-based modifications to stabilize gp120 core proteins (deleted of the gp120 major variable regions into the conformation recognized by both receptors. Thermodynamic analysis of the re-engineered core with selected ligands revealed significant stabilization of the receptor-binding regions. Stabilization of the co-receptor-binding region was associated with a marked increase in on-rate of ligand binding to this site as determined by surface plasmon resonance. Rabbit immunization studies showed that the conformational stabilization of core proteins, along with increased ligand affinity, was associated with strikingly enhanced humoral immune responses against the co-receptor-binding site. These results demonstrate that structure-based approaches can be exploited to stabilize a conformational site in a large functional protein to enhance immunogenic responses specific for that region.

  20. Enhancement of efficiency and stability of phosphorescent OLEDs based on heterostructured light-emitting layers

    Energy Technology Data Exchange (ETDEWEB)

    Chin, Byung Doo, E-mail: bdchin@dankook.ac.kr [Department of Polymer Science and Engineering and Center for Photofunctional Energy Materials, Dankook University, Jukjeon-dong, Suji-gu, Yongin-si, Gyeonggi-do 448-701 (Korea, Republic of)

    2011-03-23

    The light-emitting efficiency and stability of a phosphorescent organic light-emitting device (OLED), whose emission characteristics are strongly dominated not only by the energy transfer but also by the charge carrier trapping influenced by heterostructured emissive layers, are studied. The variation of the material combination of the heterostructured emitter, both for mixed and double layer configuration, affects the charge injection behaviour, luminous efficiency and stability. Both double and mixed emitter configurations yield low-voltage and high-efficiency behaviour (51 lm W{sup -1} at 1000 cd m{sup -2}; 30 lm W{sup -1} at 10 000 cd m{sup -2}). Such an improvement in power efficiency at elevated brightness is sufficiently universal, while the enhancement of device half-lifetime is rather sensitive to the circumstantial layout of heterostructural emitters. With an optimal mixture of hole-transport type and electron-transport type, a half-lifetime of more than 2500 h at 4000 cd m{sup -2} is obtained, which is 8 times the half-lifetime of control devices with a single emitter structure. The origin and criterion for enhancement of efficiency and lifetime are discussed in terms of the carrier transport behaviour with a specific device architecture.

  1. Stability Enhancement of a Power System Containing High-Penetration Intermittent Renewable Generation

    Directory of Open Access Journals (Sweden)

    Jorge Morel

    2015-06-01

    Full Text Available This paper considers the transient stability enhancement of a power system containing large amounts of solar and wind generation in Japan. Following the Fukushima Daiichi nuclear disaster there has been an increasing awareness on the importance of a distributed architecture, based mainly on renewable generation, for the Japanese power system. Also, the targets of CO2 emissions can now be approached without heavily depending on nuclear generation. Large amounts of renewable generation leads to a reduction in the total inertia of the system because renewable generators are connected to the grid by power converters, and transient stability becomes a significant issue. Simulation results show that sodium-sulfur batteries can keep the system in operation and stable after strong transient disturbances, especially for an isolated system. The results also show how the reduction of the inertia in the system can be mitigated by exploiting the kinetic energy of wind turbines.

  2. Test and Evaluation for Enhanced Security: A Quantitative Method to Incorporate Expert Knowledge into Test Planning Decisions.

    Energy Technology Data Exchange (ETDEWEB)

    Rizzo, Davinia [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Blackburn, Mark [Stevens Inst. of Technology, Hoboken, NJ (United States)

    2017-03-01

    Complex systems are comprised of technical, social, political and environmental factors as well as the programmatic factors of cost, schedule and risk. Testing these systems for enhanced security requires expert knowledge in many different fields. It is important to test these systems to ensure effectiveness, but testing is limited to due cost, schedule, safety, feasibility and a myriad of other reasons. Without an effective decision framework for Test and Evaluation (T&E) planning that can take into consideration technical as well as programmatic factors and leverage expert knowledge, security in complex systems may not be assessed effectively. Therefore, this paper covers the identification of the current T&E planning problem and an approach to include the full variety of factors and leverage expert knowledge in T&E planning through the use of Bayesian Networks (BN).

  3. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System.

    Science.gov (United States)

    You, Ilsun; Kwon, Soonhyun; Choudhary, Gaurav; Sharma, Vishal; Seo, Jung Taek

    2018-06-08

    The Internet of Things (IoT) utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN), but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN), which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security) is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO) and the Security-Enhanced Option (SEO). The protocol is validated through Burrows⁻Abadi⁻Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two

  4. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System

    Directory of Open Access Journals (Sweden)

    Ilsun You

    2018-06-01

    Full Text Available The Internet of Things (IoT utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN, but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN, which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO and the Security-Enhanced Option (SEO. The protocol is validated through Burrows–Abadi–Needham (BAN logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with

  5. A new reconfiguration scheme for voltage stability enhancement of radial distribution systems

    International Nuclear Information System (INIS)

    Arun, M.; Aravindhababu, P.

    2009-01-01

    Network reconfiguration is an operation problem, which entails altering the topological structure of the distribution feeders by rearranging the status of switches in order to obtain an optimal configuration in order to minimise the system losses. This paper presents a new reconfiguration algorithm that enhances voltage stability and improves the voltage profile besides minimising losses without incurring any additional cost for installation of capacitors, tap changing transformers and related switching equipment in the distribution system. Test results on a 69 node distribution system reveal the superiority of this algorithm.

  6. Enhancement and stabilization of plasma using collinear long-short double-pulse laser-induced breakdown spectroscopy

    Science.gov (United States)

    Cui, Minchao; Deguchi, Yoshihiro; Wang, Zhenzhen; Fujita, Yuki; Liu, Renwei; Shiou, Fang-Jung; Zhao, Shengdun

    2018-04-01

    A collinear long-short dual-pulse laser-induced breakdown spectroscopy (DP-LIBS) method was employed to enhance and stabilize the laser-induced plasma from steel sample. The long-pulse-width laser beam with the pulse width of 60 μs was generated by a Nd: YAG laser which was operated at FR (free running) mode. The comparative experiments were carried out between single pulse LIBS (SP-LIBS) and long-short DP-LIBS. The recorded results showed that the emission intensities and the temperature of plasma were enhanced by long-short DP-LIBS. The plasma images showed that the plasma was bigger and had a longer lifetime in long-short DP-LIBS situation. Through the calculation of time-resolved plasma temperature and intensity ratio, it can be concluded that the plasma was stabilized by the long-pulse-width laser beam. The long-short DP-LIBS method also generated the stable plasma condition from the samples with different initial temperatures, which overcame the difficulties of LIBS in the online measurement for steel production line.

  7. Enhanced structural stability of DNA origami nanostructures by graphene encapsulation

    International Nuclear Information System (INIS)

    Matković, Aleksandar; Vasić, Borislav; Pešić, Jelena; Gajić, Radoš; Prinz, Julia; Bald, Ilko; Milosavljević, Aleksandar R

    2016-01-01

    We demonstrate that a single-layer graphene replicates the shape of DNA origami nanostructures very well. It can be employed as a protective layer for the enhancement of structural stability of DNA origami nanostructures. Using the AFM based manipulation, we show that the normal force required to damage graphene encapsulated DNA origami nanostructures is over an order of magnitude greater than for the unprotected ones. In addition, we show that graphene encapsulation offers protection to the DNA origami nanostructures against prolonged exposure to deionized water, and multiple immersions. Through these results we demonstrate that graphene encapsulated DNA origami nanostructures are strong enough to sustain various solution phase processing, lithography and transfer steps, thus extending the limits of DNA-mediated bottom-up fabrication. (paper)

  8. Transducer-based fiber Bragg grating high-temperature sensor with enhanced range and stability

    Science.gov (United States)

    Mamidi, Venkata Reddy; Kamineni, Srimannarayana; Ravinuthala, Lakshmi Narayana Sai Prasad; Tumu, Venkatappa Rao

    2017-09-01

    Fiber Bragg grating (FBG)-based high-temperature sensor with enhanced-temperature range and stability has been developed and tested. The sensor consists of an FBG and a mechanical transducer, which furnishes a linear temperature-dependent tensile strain on FBG by means of differential linear thermal expansion of two different ceramic materials. The designed sensor is tested over a range: 20°C to 1160°C and is expected to measure up to 1500°C.

  9. Securing Financial Stability: Problems and Prospects for New EU Members, Report on the SUERF Seminar jointly organised with the Central Bank of Malta

    DEFF Research Database (Denmark)

    Balling, Morten

    2003-01-01

    topics are monetary policy transparency, preservation of investor confidence, the adequacy of the legal framework governing the financial sector, asset price volatility, size and volatility of cross-border capital flows, implications of bank privatisations, increasing market shares of foreign banks......The article gives an overview of twelve contributions to a seminar organised in March 2003 by SUERF in cooperation with the Central Bank of Malta. The contributions analyse from different perspectives the problems related to securing financial stability in the EU accession countries. Important......, integration of European supervisory systems, choice of exchange rate regime and government debt policy. Four of the contributions are country case studies in which the financial stability experiences of countries that have become members of the EMU are described. Udgivelsesdato: July...

  10. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    Science.gov (United States)

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-01

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443

  11. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2016-01-01

    Full Text Available Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3 design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.

  12. Observer enhanced control for spin-stabilized tethered formation in earth orbit

    Science.gov (United States)

    Guang, Zhai; Yuyang, Li; Liang, Bin

    2018-04-01

    This paper addresses the issues relevant to control of spin-stabilized tethered formation in circular orbit. Due to the dynamic complexities and nonlinear perturbations, it is challenging to promote the control precision for the formation deployment and maintenance. In this work, the formation dynamics are derived with considering the spinning rate of the central body, then major attention is dedicated to develop the nonlinear disturbance observer. To achieve better control performance, the observer-enhanced controller is designed by incorporating the disturbance observer into the control loop, benefits from the disturbance compensation are demonstrated, and also, the dependences of the disturbance observer performance on some important parameters are theoretically and numerically analyzed.

  13. Security enhanced BioEncoding for protecting iris codes

    Science.gov (United States)

    Ouda, Osama; Tsumura, Norimichi; Nakaguchi, Toshiya

    2011-06-01

    Improving the security of biometric template protection techniques is a key prerequisite for the widespread deployment of biometric technologies. BioEncoding is a recently proposed template protection scheme, based on the concept of cancelable biometrics, for protecting biometric templates represented as binary strings such as iris codes. The main advantage of BioEncoding over other template protection schemes is that it does not require user-specific keys and/or tokens during verification. Besides, it satisfies all the requirements of the cancelable biometrics construct without deteriorating the matching accuracy. However, although it has been shown that BioEncoding is secure enough against simple brute-force search attacks, the security of BioEncoded templates against more smart attacks, such as record multiplicity attacks, has not been sufficiently investigated. In this paper, a rigorous security analysis of BioEncoding is presented. Firstly, resistance of BioEncoded templates against brute-force attacks is revisited thoroughly. Secondly, we show that although the cancelable transformation employed in BioEncoding might be non-invertible for a single protected template, the original iris code could be inverted by correlating several templates used in different applications but created from the same iris. Accordingly, we propose an important modification to the BioEncoding transformation process in order to hinder attackers from exploiting this type of attacks. The effectiveness of adopting the suggested modification is validated and its impact on the matching accuracy is investigated empirically using CASIA-IrisV3-Interval dataset. Experimental results confirm the efficacy of the proposed approach and show that it preserves the matching accuracy of the unprotected iris recognition system.

  14. Agriculture in Bangladesh : A Note on Food Security by Enhancing Productivity

    OpenAIRE

    World Bank

    2009-01-01

    Awami League's Election Manifesto 2008 appropriately recognizes the importance of ensuring food security for all in Bangladesh. Food Security requires increasing agricultural growth which in turn is a key factor in reducing poverty in the country. Food security also requires increasing agricultural production and protecting consumers. Sustained production increases, in turn, require tec...

  15. Potential risks and threats to international security

    Directory of Open Access Journals (Sweden)

    Iurie RICHICINSCHI

    2016-12-01

    Full Text Available Today we can ascertain with certainty that in the early part of the 21st century, the challenges addressed to the current security environment tend to become increasingly diffuse, less predictable and multidimensional, being both a feature of external security, as well as an internal one and, of course, becoming an indispensable part of security policies and strategies. Therefore, the need for international cooperation as a foundation for the stability of the security environment has increased. It should provide a sense of trust and peace by ensuring the absence of danger both for the individual and for the community to which he belongs.

  16. Nonlinear Synergetic Governor Controllers for Steam Turbine Generators to Enhance Power System Stability

    Directory of Open Access Journals (Sweden)

    Xingbao Ju

    2017-07-01

    Full Text Available This paper proposes a decentralized nonlinear synergetic governor controller (NSGC for turbine generators to enhance power system stability by using synergetic control theory and the feedback linearization technique. The precise feedback linearization model of a turbine-generator with a steam valve control is obtained, at first, by using a feedback linearization technique. Then based on this model, a manifold is defined as a linear combination of the deviation of the rotor angle, speed deviation, and speed derivative. The control law of the proposed NSGC is deduced and the stability condition of the whole closed-loop system is subsequently analyzed. According to the requirement of the primary frequency regulation, an additional proportional integral (PI controller is designed to dynamically track the steady-state value of the rotor angle. Case studies are undertaken based on a single-machine infinite-bus system and the New England system, respectively. Simulation results show that the proposed NSGC can suppress the power oscillations and improve transient stability more effectively in comparison with the conventional proportional-integral-derivative (PID governor controller. Moreover, the proposed NSGC is robust to the variations of the system operating conditions.

  17. Intelligent Control of UPFC for Enhancing Transient Stability on Multi-Machine Power Systems

    Directory of Open Access Journals (Sweden)

    Hassan Barati

    2010-01-01

    Full Text Available One of the benefit of FACTS devices is increase of stability in power systems with control active and reactive power at during the fault in power system. Although, the power system stabilizers (PSSs have been one of the most common controls used to damp out oscillations, this device may not produce enough damping especially to inter-area mode and therefore, there is an increasing interest in using FACTS devices to aid in damping of these oscillations. In This paper, UPFC is used for damping oscillations and to enhance the transient stability performance of power systems. The controller parameters are designed using an efficient version of the Takagi-Sugeno fuzzy control scheme. The function based Takagi-Sugeno-Kang (TSK fuzzy controller uses. For optimization parameters of fuzzy PI controller, the GA, PSO and HGAPSO algorithms are used. The computer simulation results, the effect of UPFC with conventional PI controller, fuzzy PI controller and intelligent controllers (GA, PSO and HGAPSO for damping the local-mode and inter-area mode of under large and small disturbances in the four-machine two-area power system evaluated and compared.

  18. Study on stability of a-SiCOF films deposited by plasma enhanced chemical vapor deposition

    International Nuclear Information System (INIS)

    Ding Shijin; Zhang Qingquan; Wang Pengfei; Zhang Wei; Wang Jitao

    2001-01-01

    Low-dielectric-constant a-SiCOF films have been prepared from TEOS, C 4 F 8 and Ar by using plasma enhanced chemical vapor deposition method. With the aid of X-ray photoelectron spectroscopy (XPS) and Fourier transform infrared spectroscopy (FTIR), the chemical bonding configuration, thermal stability and resistance to water of the films are explored

  19. The Nuclear Safeguards and Security Activities under Euratom Research and Training Programme

    International Nuclear Information System (INIS)

    Abousahl, S.; Palajova, Z.; Janssens, W.A.M.; Luetzenkirchen, K.; Goncalves, J.G.M.; Aregbe, Y.; )

    2015-01-01

    Nuclear safeguards and security are absolute priorities for the EU. At technical level, the Joint Research Centre (JRC) as the European Commission's in-house science service plays an important role in the field of nuclear research, training and education that include nuclear safety, safeguards and security. The JRC's nuclear research activities are defined in a Council Regulation on the research and training programme of the European Atomic Energy Community. The JRC works closely with EC safeguards authority, whose mission is to ensure that nuclear material within the EU is not diverted from its intended use according to Euratom treaty. Technologies, methodologies and trainings are developed according to the Euratom Safeguards inspectorate's needs. In the area of nuclear security, the JRC contributes to the development of specific expertise in the field of nuclear forensics and border security detection as well as related training efforts for first front-line responders and national experts. The JRC provides its expert support for the implementation of internal EU action plans mainly in the field of radiological and nuclear security. At an international level, the JRC cooperates with the IAEA mainly through the EC support programme on the control of nuclear materials and facilities in order to avoid proliferation or diversion. Close cooperation with IAEA nuclear security is developed through the recent signature of a dedicated practical arrangement. Key partnerships have also been developed in the field of safeguards and security with the US-DoE, Russia, Japan and China. In addition, JRC contributes significantly to the EU nuclear safeguards and security outreach activities implemented under the Instrument for Nuclear Safety Cooperation and Instrument contributing to Stability and Peace. In this paper we will highlight some of the JRC contributions to the enhancement of nuclear safeguards and security at EU and international levels. (author)

  20. Stability Proxies for Water-in-Oil Emulsions and Implications in Aqueous-based Enhanced Oil Recovery

    Directory of Open Access Journals (Sweden)

    Mehrnoosh Moradi

    2011-07-01

    Full Text Available Several researchers have proposed that mobility control mechanisms can positively contribute to oil recovery in the case of emulsions generated in Enhanced-Oil Recovery (EOR operations. Chemical EOR techniques that use alkaline components or/and surfactants are known to produce undesirable emulsions that create operational problems and are difficult to break. Other water-based methods have been less studied in this sense. EOR processes such as polymer flooding and LoSalTM injection require adjustments of water chemistry, mainly by lowering the ionic strength of the solution or by decreasing hardness. The decreased ionic strength of EOR solutions can give rise to more stable water-in-oil emulsions, which are speculated to improve mobility ratio between the injectant and the displaced oil. The first step toward understanding the connection between the emulsions and EOR mechanisms is to show that EOR conditions, such as salinity and hardness requirements, among others, are conducive to stabilizing emulsions. In order to do this, adequate stability proxies are required. This paper reviews commonly used emulsion stability proxies and explains the advantages and disadvantage of methods reviewed. This paper also reviews aqueous-based EOR processes with focus on heavy oil to contextualize in-situ emulsion stabilization conditions. This context sets the basis for comparison of emulsion stability proxies.

  1. 78 FR 55270 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... their official duties. The computer system also maintains a real-time audit of individuals who access... Secure Flight Program regulations \\4\\ for the purpose of enhancing the security of air travel in the... detection of individuals on federal government watch lists who seek to travel by air, and to facilitate the...

  2. Inducing half-metallicity with enhanced stability in zigzag graphene nanoribbons via fluorine passivation

    Energy Technology Data Exchange (ETDEWEB)

    Jaiswal, Neeraj K., E-mail: neerajkjaiswal@gmail.com [Discipline of Physics, Indian Institute of Information Technology Design & Manufacturing, Jabalpur 482005 (India); Tyagi, Neha [Department of Applied Physics, Delhi Technological University, Delhi 110042 (India); Kumar, Amit [Discipline of Physics, Indian Institute of Information Technology Design & Manufacturing, Jabalpur 482005 (India); Srivastava, Pankaj [Nanomaterials Research Group, ABV-Indian Institute of Information Technology & Management, Gwalior 474015 (India)

    2017-02-28

    Highlights: • F passivated zigzag graphene nanoribbon (F-ZGNR) are more favorable than pristine ones. • External electric field induces half metallicity in F-ZGNR. • The observed half metallicity is independent of ribbon widths. • Enhanced stability makes F-ZGNR preferable over pristine ribbon. - Abstract: Half metals are the primary ingredients for the realization of novel spintronic devices. In the present work, by employing density functional theory based first-principles calculation, we predict half metallic behavior in fluorine passivated zigzag graphene nanoribbons (F-ZGNR). Four different structures have been investigated viz. one edge F passivated ZGNR (F-ZGNR-1), both edges F passivated ZGNR (F-ZGNR-2), F passivation on alternate sites in first configuration (alt-1) and F passivation on alternate sites in second configuration (alt-2). Interestingly, it is noticed that F passivation is analogous to H passivation (pristine), however, F-ZGNR are reckoned energetically more stable than pristine ones. An spin induced band gap is noticed for all F-ZGNR irrespective of their widths although its magnitude is slightly less than the pristine counterparts. With an external transverse electric field, ribbons undergo semiconducting to half metallic transformation. The observed half metallic character with enhanced stability present F-ZGNR as a better candidate than pristine ZGNR towards the realization of upcoming spintronic devices.

  3. The Land Component Role in Maritime Security

    Science.gov (United States)

    2016-12-31

    nations for resources. They must also confront maritime threats, which include piracy , armed robbery, damage to the marine environment (i.e. pollution...such as an armed attack from a military vessel. Most definitions also usually include security from crimes at sea, such as piracy , armed robbery...security through stability operations, one must accept that any effective government must focus on basic governmental functions – providing for the

  4. The association between state attachment security and state Mindfulness.

    Directory of Open Access Journals (Sweden)

    Christopher A Pepping

    Full Text Available Recent research suggests that attachment and mindfulness are related, though the nature of this association is unclear. Here we present two studies examining whether there is a causal relationship between state attachment and state mindfulness. Study 1 investigated the effects of experimentally increasing state mindfulness on state attachment security. State mindfulness was successfully enhanced, but this led to no change in state attachment security. Study 2 investigated the effects of experimentally enhancing state attachment security on state mindfulness. State attachment security was successfully enhanced, but this did not lead to any change in state mindfulness. These findings suggest that there is not a direct, immediate causal relationship between state attachment and state mindfulness as a result of brief experimental manipulations. Future research should examine these associations in longer term interventions.

  5. Perspectives of Security Ensuring within the Framework of Barcelona Process

    Directory of Open Access Journals (Sweden)

    T N Kirabaev

    2009-06-01

    Full Text Available Barcelona process was aimed to become an important mechanism in the realization of ideas of peace, stability and security ensuring in the Mediterranean Sea region. Cooperation in the sphere of security ensuring means openness of the regional states, social and economic reforms, human rights protection. The article deals with the problem of security ensuring by nonmilitary means.

  6. 75 FR 28757 - Security Zone; Potomac River, Washington Channel, Washington, DC

    Science.gov (United States)

    2010-05-24

    ... potential terrorist acts, and enhance public and maritime safety and security. The Coast Guard was unable to...-ranking government officials, mitigating potential terrorist acts and enhancing public and maritime safety... terrorist acts and enhancing public and maritime safety and security. Basis and Purpose The Coast Guard will...

  7. Bee species diversity enhances productivity and stability in a perennial crop.

    Directory of Open Access Journals (Sweden)

    Shelley R Rogers

    Full Text Available Wild bees provide important pollination services to agroecoystems, but the mechanisms which underlie their contribution to ecosystem functioning--and, therefore, their importance in maintaining and enhancing these services-remain unclear. We evaluated several mechanisms through which wild bees contribute to crop productivity, the stability of pollinator visitation, and the efficiency of individual pollinators in a highly bee-pollination dependent plant, highbush blueberry. We surveyed the bee community (through transect sampling and pan trapping and measured pollination of both open- and singly-visited flowers. We found that the abundance of managed honey bees, Apis mellifera, and wild-bee richness were equally important in describing resulting open pollination. Wild-bee richness was a better predictor of pollination than wild-bee abundance. We also found evidence suggesting pollinator visitation (and subsequent pollination are stabilized through the differential response of bee taxa to weather (i.e., response diversity. Variation in the individual visit efficiency of A. mellifera and the southeastern blueberry bee, Habropoda laboriosa, a wild specialist, was not associated with changes in the pollinator community. Our findings add to a growing literature that diverse pollinator communities provide more stable and productive ecosystem services.

  8. Bee species diversity enhances productivity and stability in a perennial crop.

    Science.gov (United States)

    Rogers, Shelley R; Tarpy, David R; Burrack, Hannah J

    2014-01-01

    Wild bees provide important pollination services to agroecoystems, but the mechanisms which underlie their contribution to ecosystem functioning--and, therefore, their importance in maintaining and enhancing these services-remain unclear. We evaluated several mechanisms through which wild bees contribute to crop productivity, the stability of pollinator visitation, and the efficiency of individual pollinators in a highly bee-pollination dependent plant, highbush blueberry. We surveyed the bee community (through transect sampling and pan trapping) and measured pollination of both open- and singly-visited flowers. We found that the abundance of managed honey bees, Apis mellifera, and wild-bee richness were equally important in describing resulting open pollination. Wild-bee richness was a better predictor of pollination than wild-bee abundance. We also found evidence suggesting pollinator visitation (and subsequent pollination) are stabilized through the differential response of bee taxa to weather (i.e., response diversity). Variation in the individual visit efficiency of A. mellifera and the southeastern blueberry bee, Habropoda laboriosa, a wild specialist, was not associated with changes in the pollinator community. Our findings add to a growing literature that diverse pollinator communities provide more stable and productive ecosystem services.

  9. Integrating EDDS-enhanced washing with low-cost stabilization of metal-contaminated soil from an e-waste recycling site.

    Science.gov (United States)

    Beiyuan, Jingzi; Tsang, Daniel C W; Ok, Yong Sik; Zhang, Weihua; Yang, Xin; Baek, Kitae; Li, Xiang-Dong

    2016-09-01

    While chelant-enhanced soil washing has been widely studied for metal extraction from contaminated soils, there are concerns about destabilization and leaching of residual metals after remediation. This study integrated 2-h soil washing enhanced by biodegradable ethylenediaminedisuccinic acid (EDDS) and 2-month stabilization using agricultural waste product (soybean stover biochar pyrolyzed at 300 and 700 °C), industrial by-product (coal fly ash (CFA)), and their mixture. After integration with 2-month stabilization, the leachability and mobility of residual metals (Cu, Zn, and Pb) in the field-contaminated soil were significantly reduced, especially for Cu, in comparison with 2-h EDDS washing alone. This suggested that the metals destabilized by EDDS-washing could be immobilized by subsequent stabilization with biochar and CFA. Moreover, when the remediation performance was evaluated for phytoavailability and bioaccessibility, prior EDDS washing helped to achieve a greater reduction in the bioavailable fraction of metals than sole stabilization treatment. This was probably because the weakly-bound metals were first removed by EDDS washing before stabilization. Both individual and combined applications of biochar and CFA showed comparable effectiveness regardless of the difference in material properties, possibly due to the high level of amendments (150 ton ha(-1)). Based on the mobility and bioaccessibility results, the estimated human health risk (primarily resulting from Pb) could be mitigated to an acceptable level in water consumption pathway or reduced by half in soil ingestion pathway. These results suggest that an integration of EDDS washing with soil stabilization can alleviate post-remediation impacts of residual metals in the treated soil. Copyright © 2016 Elsevier Ltd. All rights reserved.

  10. International Nuclear Security Education Network (INSEN) and the Nuclear Security Training and Support Centre (NSSC) Network

    International Nuclear Information System (INIS)

    Nikonov, Dmitriy

    2013-01-01

    International Nuclear Security Education Network established in 2010: A partnership between the IAEA and universities, research institutions and other stakeholders - •Promotion of nuclear security education; • Development of educational materials; • Professional development for faculty members; • Collaborative research and resource sharing. Currently over 90 members from 38 member states. Mission: to enhance global nuclear security by developing, sharing and promoting excellence in nuclear security education. Nuclear Security Support Centre: Primary objectives are: • Develop human resources through the implementation of a tailored training programme; • Develop a network of experts; • Provide technical support for lifecycle equipment management and scientific support for the detection of and the response to nuclear security events

  11. International Cooperation for Enhancing Nuclear Safety, Security, Safeguards and Non-proliferation : 60 Years of IAEA and EURATOM

    CERN Document Server

    Abousahl, Said; Plastino, Wolfango

    2018-01-01

    This open access book examines key aspects of international cooperation to enhance nuclear safety, security, safeguards, and non-proliferation, thereby assisting in development and maintenance of the verification regime and fostering progress toward a nuclear weapon-free world. The book opens by addressing important political, institutional, and legal dimensions. Current challenges are discussed and attempts made to identify possible solutions and future improvements. Subsequent sections consider scientific developments that have the potential to increase the effectiveness of implementation of international regimes, particularly in critical areas, technology foresight, and the ongoing evaluation of current capabilities. The closing sections examine scientific and technical challenges and discuss the role of international cooperation and actions of the scientific community in leading the world toward peace and security. The book – which celebrates 60 years of IAEA Atoms for Peace and Development and the EURA...

  12. Enhanced capacity and stability for the separation of cesium in electrically switched ion exchange

    International Nuclear Information System (INIS)

    Tawfic, A.F.; Dickson, S.E.; Kim, Y.; Mekky, W.

    2015-01-01

    Electrically switched ion exchange (ESIX) can be used to separate ionic contaminants from industrial wastewater, including that generated by the nuclear industry. The ESIX method involves sequential application of reduction and oxidation potentials to an ion exchange film to induce the respective loading and unloading of cesium. This technology is superior to conventional methods (e.g electrodialysis reversal or reverse osmosis) as it requires very little energy for ionic separation. In previous studies, ESIX films have demonstrated relatively low ion exchange capacities and limited film stabilities over repeated potential applications. In this study, the methodology for the deposition of electro-active films (nickel hexacyanoferrate) on nickel electrodes was modified to improve the ion exchange capacity for cesium removal using ESIX. Cyclic voltammetry was used to investigate the ion exchange capacity and stability. Scanning electron microscopy (SEM) was used to characterize the modified film surfaces. Additionally, the films were examined for the separation of cesium ions. This modified film preparation technique enhanced the ion exchange capacity and improves the film stability compared to previous methods for the deposition of ESIX films. (authors)

  13. Enhanced capacity and stability for the separation of cesium in electrically switched ion exchange

    Energy Technology Data Exchange (ETDEWEB)

    Tawfic, A.F.; Dickson, S.E.; Kim, Y. [McMaster University, Hamilton, ON (Canada); Mekky, W. [AMEC NSS, Power and Process America, Toronto (Canada)

    2015-03-15

    Electrically switched ion exchange (ESIX) can be used to separate ionic contaminants from industrial wastewater, including that generated by the nuclear industry. The ESIX method involves sequential application of reduction and oxidation potentials to an ion exchange film to induce the respective loading and unloading of cesium. This technology is superior to conventional methods (e.g electrodialysis reversal or reverse osmosis) as it requires very little energy for ionic separation. In previous studies, ESIX films have demonstrated relatively low ion exchange capacities and limited film stabilities over repeated potential applications. In this study, the methodology for the deposition of electro-active films (nickel hexacyanoferrate) on nickel electrodes was modified to improve the ion exchange capacity for cesium removal using ESIX. Cyclic voltammetry was used to investigate the ion exchange capacity and stability. Scanning electron microscopy (SEM) was used to characterize the modified film surfaces. Additionally, the films were examined for the separation of cesium ions. This modified film preparation technique enhanced the ion exchange capacity and improves the film stability compared to previous methods for the deposition of ESIX films. (authors)

  14. Don't Drop Your Guard: Securing Nuclear Facilities

    International Nuclear Information System (INIS)

    Lööf, Susanna

    2013-01-01

    You're never quite finished with nuclear security. ''Even the most advanced security system for radioactive or nuclear material needs to be continuously updated to ensure that it remains effective,'' says Arvydas Stadalnikas, an IAEA Senior Nuclear Security Officer. ''Security can always be improved. Even if you think you have the best system for today, it may require enhancements because of the changing environment,'' he said. To help States with this daunting task, the IAEA offers support through its International Physical Protection Advisory Service (IPPAS) which includes in-depth analysis of the physical protection and nuclear security followed by expert advice. The IAEA has carried out 58 missions to 37 countries since the IPPAS programme was launched in 1996, helping States translate international conventions, codes and guidance on nuclear security into practice. Although each mission focuses on improving the security in a specific country, ''the programme has benefits that reach far beyond the recipient State's national borders,'' Stadalnikas noted. ''Each IPPAS mission helps improve global nuclear security because enhanced security in one country means that you improve globally. Deficiencies in one country could open the way for malicious acts, which can have worldwide effects,'' he said

  15. Engineering bright solitons to enhance the stability of two-component Bose-Einstein condensates

    Science.gov (United States)

    Radha, R.; Vinayagam, P. S.; Sudharsan, J. B.; Liu, Wu-Ming; Malomed, Boris A.

    2015-12-01

    We consider a system of coupled Gross-Pitaevskii (GP) equations describing a binary quasi-one-dimensional Bose-Einstein condensate (BEC) with intrinsic time-dependent attractive interactions, placed in a time-dependent expulsive parabolic potential, in a special case when the system is integrable (a deformed Manakov's system). Since the nonlinearity in the integrable system which represents binary attractive interactions exponentially decays with time, solitons are also subject to decay. Nevertheless, it is shown that the robustness of bright solitons can be enhanced in this system, making their respective lifetime longer, by matching the time dependence of the interaction strength (adjusted with the help of the Feshbach-resonance management) to the time modulation of the strength of the parabolic potential. The analytical results, and their stability, are corroborated by numerical simulations. In particular, we demonstrate that the addition of random noise does not impact the stability of the solitons.

  16. Enhancing the crumb rubber modified asphalt’s storage stability through the control of its internal network structure

    Directory of Open Access Journals (Sweden)

    Mohyeldin Ragab

    2018-01-01

    Full Text Available The current research investigated the effect of the internal network structure developed in the crumb rubber modified asphalt (CRMA on its storage stability. The authors investigated the influence of asphalt-crumb rubber modifier (CRM interaction parameters (interaction time, interaction speed, and interaction temperature on the development of the internal network structure in CRMA. The authors found that the existence of three dimensional (3D network structures in the CRMA enhanced its storage stability. Fourier Transform Infrared (FTIR Spectroscopy was utilized to determine the nature of CRM components responsible for the development of 3D network structure in the liquid phase of CRMA. This was achieved by monitoring the changes of the IR distinctive peaks in the CRMA liquid phase. Dissolution tests and thermo gravimetric analysis (TGA were carried out on the extracted CRM after interaction with asphalt to determine the role of CRM dissolved amounts and released components on the development of 3D network structure in CRMA. The asphalt-CRM interaction parameters were found to be essential to induce the formation of the 3D network structure within the liquid phase of the CRMA through controlling the swelling, dissolution and release of CRM components into the asphalt liquid phase. The existence of 3D network structure in the CRMA had determinant impact on the enhancement of its storage stability. Keywords: Storage stability, Three dimensional (3D network, Crumb rubber modified asphalt

  17. The national security dividend of global carbon mitigation

    International Nuclear Information System (INIS)

    Mignone, Bryan K.

    2007-01-01

    Energy and environmental security objectives are often conflated in political circles and in the popular press. Results from a well-established integrated assessment model suggest that policies designed to stabilize atmospheric carbon dioxide concentrations at levels above ∼500 ppm generally do not align with policies to curb global oil dependence, because these atmospheric objectives can be achieved largely through reductions in global coal consumption. Policies designed to stabilize atmospheric carbon dioxide at levels below ∼500 ppm, on the other hand, directly facilitate the alignment of environmental and security objectives because atmospheric targets in this range demand significant reductions in both coal and oil use. Greater recognition that investment in carbon mitigation can yield significant security dividends may alter the political cost-benefit calculus of energy-importing nations and could increase the willingness of some key global actors to seek binding cooperative targets under any post-Kyoto climate treaty regime

  18. The contribution of the DOE's R ampersand D budget in natural gas to energy price security

    International Nuclear Information System (INIS)

    Sutherland, R.J.

    1992-01-01

    The energy price volatility model suggests that some of the proposed natural gas programs can contribute to energy price stability. The sector most vulnerable to fuel price variations is, of course, the transportation sector. The most effective strategy to achieve energy pace stability is to reduce petroleum consumption in this sector. The natural gas vehicle program is therefore recommended as potentially important and worthy of further consideration. At this point, distinguishing the merits of various subprograms is not feasible. This result farther supports the conclusion that the DOE's energy R ampersand D portfolio is not efficiently balanced and an increase in oil and gas research should be a high priority. The DOE has responded favorably and has significantly increased its proposed research with the explicit objective of displacing oil in the transportation sector. The enhanced research and development program for energy security, in the NES, proposes major funding, increases in this area. To recommend the further increases proposed by the industry, a careful analysis of incremental benefits and costs is required. The proposed natural as supply program is intended to enhance the future supply of natural gas. As explained above, enhanced gas supplies can reduce the volatility of gas prices and severe the link between gas and oil prices. The gas supply program is recommended as a potentially important strategy to ensure energy price stability. The importance of this point merits restatement. Oil price volatility affects directly the transportation and industrial sectors. The residential, commercial and electric utility sectors are not highly oil dependent. However, oil prices have affected gas prices and gas is used extensively the residential, commercial, industrial and electric utility sectors. Energy price stability is enhanced in these sectors by severing, the link, between oil and gas prices

  19. SiC-dopped MCM-41 materials with enhanced thermal and hydrothermal stabilities

    International Nuclear Information System (INIS)

    Wang, Yingyong; Jin, Guoqiang; Tong, Xili; Guo, Xiangyun

    2011-01-01

    Graphical abstract: Novel SiC-dopped MCM-41 materials were synthesized by adding silicon carbide suspension in the molecular sieve precursor solvent followed by in situ hydrothermal synthesis. The dopped materials have a wormhole-like mesoporous structure and exhibit enhanced thermal and hydrothermal stabilities. Highlights: → SiC-dopped MCM-41 was synthesized by in situ hydrothermal synthesis of molecular sieve precursor combined with SiC. → The dopped MCM-41 materials show a wormhole-like mesoporous structure. → The thermal stability of the dopped materials have an increment of almost 100 o C compared with the pure MCM-41. → The hydrothermal stability of the dopped materials is also better than that of the pure MCM-41. -- Abstract: SiC-dopped MCM-41 mesoporous materials were synthesized by the in situ hydrothermal synthesis, in which a small amount of SiC was added in the precursor solvent of molecular sieve before the hydrothermal treatment. The materials were characterized by X-ray diffraction, transmission electron microscopy, X-ray photoelectron spectroscopy, N 2 physical adsorption and thermogravimetric analysis, respectively. The results show that the thermal and hydrothermal stabilities of MCM-41 materials can be improved obviously by incorporating a small amount of SiC. The structure collapse temperature of SiC-dopped MCM-41 materials is 100 o C higher than that of pure MCM-41 according to the differential scanning calorimetry analysis. Hydrothermal treatment experiments also show that the pure MCM-41 will losses it's ordered mesoporous structure in boiling water for 24 h while the SiC-dopped MCM-41 materials still keep partial porous structure.

  20. Thermal conductivity enhancement of sodium acetate trihydrate by adding graphite powder and the effect on stability of supercooling

    DEFF Research Database (Denmark)

    Johansen, Jakob Berg; Dannemand, Mark; Kong, Weiqiang

    2015-01-01

    . The graphite powder was stabilized using carboxymetyl cellulose and successfully tested in heating and supercooling cycles with no loss of performance. Thermal conductivity enhancing properties of graphite powder was shown in samples. Since the experiments were conducted in small scale, at 200 g per sample......, large scale experiments are required to validate graphite as a thermo conductivity enhancing agent, suitable for use in seasonal heat storage applications utilizing SAT....

  1. Black Sea Energy Security - Present and Future

    Directory of Open Access Journals (Sweden)

    Florinel Iftode

    2011-05-01

    Full Text Available We chose this theme to highlight the need for continuous and sustained human society to secure energy resources needed to survive, needs reflected in an increasingly in recent years in the strategies adopted at both states, as at the level of international organizations. Achieving security and stability in the wider Black Sea area has been among the priorities of each country's interests in this region. In this context, state and non-state actors were being called to come up with new solutions to achieve those interests. Certainly not in all cases the negotiations were completed or not yet found a generally accepted formula for others to apply, but most of them show off their values. The main environmental threats to security environment in the Black Sea region are represented by ethnic conflicts and territorial secessionism. A significant contribution to the security environment of the Black Sea region has the phenomenon of globalization, which in this region is manifested by a steady increase in traffic and volume of shipping passage of communication, which largely affects the security in the region. Globalization and the need for energy resources in the Black Sea was an important area not only as energy transport route, but as a potential supplier of material energy (oil and natural gas. Black Sea Basin can be stabilized and secured only by the will and input from all States and interested international organizations in pragmatic and effective institutional frameworks, meant to promote and protect the common interests of countries decided to participate in actions aimed at ensuring a stable environment security.

  2. Hydrogel Tethering Enhances Interdomain Stabilization of Single-Chain Antibodies

    Energy Technology Data Exchange (ETDEWEB)

    Xiong, Yijia [Department; Ford, Nicole R. [Marine; Hecht, Karen A. [Marine; Roesijadi, Guritno [Marine; Department; Squier, Thomas C. [Department

    2017-10-12

    Self-assembly of recombinant proteins within the biosilica of living diatoms represents a means to construct functional materials in a reproducible and scalable manner that enable applications that harness the inherent specificities of proteins to sense and respond to environmental cues. Here we describe the use of a silaffin-derived lysine-rich 39 amino-acid targeting sequence (Sil3T8) to direct a single chain fragment variable (scFv) antibody or an enhanced green fluorescent protein (EGFP) to assemble within the biosilica frustule, resulting in abundances in excess of 200,000 proteins per frustule. The fluorescence of either a derivative of trinitrotoluene (TNT) bound to the scFv or the endogenous fluorescence of EGFP was used to monitor pro-tein conformational dynamics, accessibility to external quenchers, binding affinity, and conformational stability. We find that proteins within isolated frustules undergo isotropic rotational motions with two-fold increases in rotational correlation times, which are indicative of weak macromolecular associations within the biosilica. Solvent accessibilities and high-affinity (pM) binding are comparable to those in solution. In contrast to solution conditions, scFv antibod-ies within the biosilica matrix retain their binding affinity in the presence of chaotropic agents (i.e., 8 M urea). These results argue that dramatic increases in protein conforma-tional stability within the biosilica frustule matrices arise through molecular crowding, acting to retain native protein folds and associated functionality to allow the utility of engineered proteins under a range of harsh environmental conditions associated with environmental sensing and industrial catalytic transformations.

  3. Enhanced exo-inulinase activity and stability by fusion of an inulin-binding module.

    Science.gov (United States)

    Zhou, Shun-Hua; Liu, Yuan; Zhao, Yu-Juan; Chi, Zhe; Chi, Zhen-Ming; Liu, Guang-Lei

    2016-09-01

    In this study, an inulin-binding module from Bacillus macerans was successfully fused to an exo-inulinase from Kluyveromyces marxianus, creating a hybrid functional enzyme. The recombinant exo-inulinase (rINU), the hybrid enzyme (rINUIBM), and the recombinant inulin-binding module (rIBM) were, respectively, heterologously expressed and biochemically characterized. It was found that both the inulinase activity and the catalytic efficiency (k cat/K m(app)) of the rINUIBM were considerably higher than those of rINU. Though the rINU and the rINUIBM shared the same optimum pH of 4.5, the optimum temperature of the rINUIBM (60 °C) was 5 °C higher than that of the rINU. Notably, the fused IBM significantly enhanced both the pH stability and the thermostability of the rINUIBM, suggesting that the rINUIBM obtained would have more extensive potential applications. Furthermore, the fusion of the IBM could substantially improve the inulin-binding capability of the rINUIBM, which was consistent with the determination of the K m(app). This meant that the fused IBM could play a critical role in the recognition of polysaccharides and enhanced the hydrolase activity of the associated inulinase by increasing enzyme-substrate proximity. Besides, the extra supplement of the independent non-catalytic rIBM could also improve the inulinase activity of the rINU. However, this improvement was much better in case of the fusion. Consequently, the IBM could be designated as a multifunctional domain that was responsible for the activity enhancement, the stabilization, and the substrate binding of the rINUIBM. All these features obtained in this study make the rINUIBM become an attractive candidate for an efficient inulin hydrolysis.

  4. 77 FR 2450 - Security Zone; Potomac and Anacostia Rivers, Washington, DC

    Science.gov (United States)

    2012-01-18

    ... terrorist acts, and enhance public and maritime safety and security. The Coast Guard was unable to publish a... terrorist acts and enhancing public and maritime safety security. Under 5 U.S.C. 553(d)(3), the Coast Guard...-ranking government officials, mitigating potential terrorist acts and enhancing public and maritime safety...

  5. Security, insecurity and health.

    Science.gov (United States)

    Coupland, Robin

    2007-03-01

    An examination of the nexus of security, insecurity and health shows that security is a prerequisite for health. The many and varied ways that armed violence--including threats of armed violence--can affect people's health can be documented by formal studies; however, valuable data also exist in other reports, such as media reports. The health community needs to recognize that people's insecurity is a massive global health issue. The foreign policies of donor governments should incorporate recognition that documentation, analysis and publication of data describing the impact of insecurity on people's health can lead to the creation of policies to enhance people's security.

  6. Performativity and the project: enacting urban transport security in Europe

    NARCIS (Netherlands)

    Hoijtink, M.

    2015-01-01

    In April 2011, a large consortium of European rail and security suppliers, transport operators and research organisations launched the Secured Urban Transportation - European Demonstration (SECUR-ED) project with the objective of providing public transport operators with the means to enhance urban

  7. Global energy security and the implications for the EU

    International Nuclear Information System (INIS)

    Umbach, Frank

    2010-01-01

    The following article will analyse the global and geopolitical dimensions of the future international energy security and its implications for Europe and the EU-27. In this context, I will discuss to which extent the EU's newly proclaimed 'Energy Action Plan' of the EU Spring summit of 2007 and its declared common energy (foreign) policy are a sufficient strategy to cope with the new global and geopolitical challenges. The article concludes the following: (1) The interlinkage between globally designed traditional energy security concepts - that rely just on economic factors and 'market-strategies' - and domestic as well as regional political stability demands new thinking with regard to both energy supply security and foreign and security policies. (2) Although after the Russian-Ukrainian gas conflict in January 2006, energy security has forced its way up the European energy and foreign policy agendas, the EU-27 member states have largely failed to forge a coherent European energy security and energy foreign policy strategy after their Spring summit of 2007 because its declared political solidarity has been still lacking. But the 2nd Strategic Energy Review of November 2008 has recommended new initiatives to overcome this lack by promoting concrete infrastructure and other projects for enhancing Europe's supply security and its political solidarity as part of a common energy (foreign) policy. If the EU is able to implement the March 2007 and November 2008 decisions, the EU oil and gas demand will drastically reduce and freeze at current levels. In this case, Putin's energy policies by using Russia's energy resources and pipeline monopolies as a political instrument to enforce its economic and geopolitical interests will be proved as self-defeating in Russia's long-term strategic interests. It will reduce Gazprom's gas exports to a much smaller EU gas market than originally forecasted as the result of a deliberate EU policy of decreasing its overall gas demand and

  8. Leadership Stability in Army Reserve Component Units

    Science.gov (United States)

    2013-01-01

    OMB control number. 1. REPORT DATE 2013 2. REPORT TYPE 3. DATES COVERED 00-00-2013 to 00-00-2013 4. TITLE AND SUBTITLE Leadership Stability in...standards for research quality and objectivity. Leadership Stability in Army Reserve Component Units Thomas F. Lippiatt, J. Michael Polich NATIONAL SECURITY...RESEARCH DIVISION Leadership Stability in Army Reserve Component Units Thomas F. Lippiatt, J. Michael Polich Prepared for the Office of the

  9. Enhancement of ionic conductivity in stabilized zirconia ceramics under millimeter-wave irradiation heating

    International Nuclear Information System (INIS)

    Kishimoto, Akira; Ayano, Keiko; Hayashi, Hidetaka

    2011-01-01

    Ionic conductivity in yttria-stabilized zirconia ceramics under millimeter-wave irradiation heating was compared with that obtained using conventional heating. The former was found to result in higher conductivity than the latter. Enhancement of the ionic conductivity and the reduction in activation energy seemed to depend on self-heating resulting from the millimeter-wave irradiation. Millimeter-wave irradiation heating restricted the degradation in conductivity accompanying over-substitution, suggesting the optimum structure that provided the maximum conductivity could be different between the two heating methods.

  10. Security in the Asia Pacific region

    International Nuclear Information System (INIS)

    1999-01-01

    The Working Group began by discussing the meaning of security in terms of its comprehensive, cooperative and human dimensions. In doing so, the members of the Group focused on major issues which could endanger regional stability and non-proliferation. In order to identify the major problems and sources of tension, it was agreed that the Group would concentrate on two sub-regions, namely, East Asia and South East Asia and then to compare these briefly with South Asia and Latin America, the aim being to identify common security concerns. The discussion was framed in terms of: (i) evaluating the adequacy of the existing institutional framework for security cooperation; (ii) evaluating linkages between economic development and security; and (iii) seeking ways to reduce tension and to increase security in the region. Discussion was focused on the broad subject of security risks and challenges as well as opportunities for effective cooperative security in the Asia Pacific region. Attention was devoted to ways of changing Cold War mentalities, which still hinder the normalization process and the achievement of comprehensive security cooperation among the countries in the region

  11. Security enhancement mechanism based on contextual authentication and role analysis for 2G-RFID systems.

    Science.gov (United States)

    Tang, Wan; Chen, Min; Ni, Jin; Yang, Ximin

    2011-01-01

    The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.

  12. Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems

    Directory of Open Access Journals (Sweden)

    Ximin Yang

    2011-06-01

    Full Text Available The traditional Radio Frequency Identification (RFID system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.

  13. Available transfer capability calculation considering voltage stability margin

    International Nuclear Information System (INIS)

    Pan, Xiong; Xu, Guoyu

    2005-01-01

    To make the electricity trades carry out successfully, the calculation of available transfer capability (ATC) must coordinate the relationship between the security and economic benefits. In this paper, a model for ATC calculations accorded with trade-off mechanism in electricity market was set up. The impact of branch outage contingency on the static voltage stability margin was analyzed, and contingency ranking was performed through sensitivity indices of branch flows with respect to the loading margin. Optimal power flow based on primal-dual interior point method was applied to obtain ATC when the N-1 security constraints were included. The calculation results of IEEE 30-bus and IEEE 118-bus systems show that the proposed model and method are valid. (author) (N-1 security constraints; Electricity market; Available transfer capability; Optimal power flow; Voltage stability)

  14. Enhancing Parliamentary Oversight for Effective Security Sector ...

    African Journals Online (AJOL)

    The provision of the most essential public good – security in accordance with the will of the people is very germane to the consolidation of democratic governance. Though, the Nigerian state is set to inaugurate her 8th National Assembly on 9th June, 2015, the capacity of the nation's parliamentary body (National Assembly) ...

  15. Enhanced Cycling Stability of Rechargeable Li-O2 Batteries Using High Concentration Electrolytes

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Bin; Xu, Wu; Yan, Pengfei; Sun, Xiuliang; Bowden, Mark E.; Read, Jeffrey; Qian, Jiangfeng; Mei, Donghai; Wang, Chong M.; Zhang, Jiguang

    2016-01-26

    The electrolyte stability against reactive reduced-oxygen species is crucial for the development of rechargeable Li-O2 batteries. In this work, we systematically investigated the effect of lithium salt concentration in 1,2-dimethoxyethane (DME)-based electrolytes on the cycling stability of Li-O2 batteries. Cells with high concentration electrolyte illustrate largely enhanced cycling stability under both the full discharge/charge (2.0-4.5 V vs. Li/Li+) and the capacity limited (at 1,000 mAh g-1) conditions. These cells also exhibit much less reaction-residual on the charged air electrode surface, and much less corrosion to the Li metal anode. The density functional theory calculations are conducted on the molecular orbital energies of the electrolyte components and the Gibbs activation barriers for superoxide radical anion to attack DME solvent and Li+-(DME)n solvates. In a highly concentrated electrolyte, all DME molecules have been coordinated with salt and the C-H bond scission of a DME molecule becomes more difficult. Therefore, the decomposition of highly concentrated electrolyte in a Li-O2 battery can be mitigated and both air-cathodes and Li-metal anodes exhibits much better reversibility. As a results, the cyclability of Li-O2 can be largely improved.

  16. A Forward-secure Grouping-proof Protocol for Multiple RFID Tags

    Directory of Open Access Journals (Sweden)

    Liu Ya-li

    2012-09-01

    Full Text Available Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT. The proposed grouping-proof protocols recently have security and/or privacy omission and these schemes afford order-dependence by relaying message among tags through an RFID reader. In consequence, aiming at enhancing the robustness, improving scalability, reducing the computation costs on resource-constrained devices, and meanwhile combing Computational Intelligence (CI with Secure Multi-party Communication (SMC, a Forward-Secure Grouping-Proof Protocol (FSGP for multiple RFID tags based on Shamir's (, secret sharing is proposed. In comparison with the previous grouping-proof protocols, FSGP has the characteristics of forward-security and order-independence addressing the scalability issue by avoiding relaying message. Our protocol provides security enhancement, performance improvement, and meanwhile controls the computation cost, which equilibrates both security and low cost requirements for RFID tags.

  17. Railway infrastructure security

    CERN Document Server

    Sforza, Antonio; Vittorini, Valeria; Pragliola, Concetta

    2015-01-01

    This comprehensive monograph addresses crucial issues in the protection of railway systems, with the objective of enhancing the understanding of railway infrastructure security. Based on analyses by academics, technology providers, and railway operators, it explains how to assess terrorist and criminal threats, design countermeasures, and implement effective security strategies. In so doing, it draws upon a range of experiences from different countries in Europe and beyond. The book is the first to be devoted entirely to this subject. It will serve as a timely reminder of the attractiveness of the railway infrastructure system as a target for criminals and terrorists and, more importantly, as a valuable resource for stakeholders and professionals in the railway security field aiming to develop effective security based on a mix of methodological, technological, and organizational tools. Besides researchers and decision makers in the field, the book will appeal to students interested in critical infrastructur...

  18. Visitor Safety and Security in Barbados: Stakeholder Perceptions

    Directory of Open Access Journals (Sweden)

    Clifford Griffin

    2010-12-01

    Full Text Available Is information about the nature, location and incidence of crimes against tourists/visitors sufficient to develop meaningful visitor safety and security policy? Are the views of key tourism stakeholder groups useful in informing and enhancing visitor safety and security policy? To answer these questions, this study analyzes 24 years of recorded crime data against visitors to Barbados and survey data of key tourism stakeholder groups and concludes: 1 that information about the nature, location and incidence of crimes against visitors is necessary but not sufficient to inform visitor safety and security policy; and 2 that the views and input of key stakeholders are essential if destinations are to become more effective in enhancing visitor safety and security.

  19. Impacts of Floods Events on Food Security

    Science.gov (United States)

    Caporali, E.; Pacetti, T.; Rulli, M. C.

    2017-12-01

    The analysis of the interactions among natural disasters and food security is particularly significant for developing countries where food availability (one of the four pillars of food security together with access, utilization and stability) can be highly jeopardize by extreme events that damage the primary access to food, i.e. the agriculture. The main objective of this study is to analyze the impact of flood events on food security for two disastrous flood events in Bangladesh on 2007 and in Pakistan on 2010, selected here as case studies based on the existing literature related to extreme floods.The adopted methodology integrates remote sensing data, agricultural statistics, and water footprint values in order to (i) evaluating the potentially affected agricultural areas; (ii) converting the affected areas into crop loss; (iii) estimating the associated calories and water footprint losses. In Bangladesh, the estimated lost rice is around 12.5% of the total potential production, which implies a 5.3% calories loss with respect to the total potential energy provided by rice and 4.4% of total WF associated to national food supply. In Pakistan, the results show a crops loss of 19% for sugarcane and 40% for rice, with a related calories loss of 8.5% and a WF loss of 13.5%.The results highlight the countries vulnerability to flood, being both countries strongly dependent on local agricultural production. The 2007 flood event reflected critically upon Bangladeshi food security, almost doubling the existing food deficit. The same happened in Pakistan where an already scarce food supply has been worsened by the 2010 flood.Method results are fully repeatable; whereas, for remote sensed data the sources of data are valid worldwide and the data regarding land use and crops characteristics are strongly site specific, which need to be carefully evaluated.These case studies stress the importance of integrating different analysis approaches to carry out an assessment of the

  20. Elevated CO2 and water addition enhance nitrogen turnover in grassland plants with implications for temporal stability.

    Science.gov (United States)

    Dijkstra, Feike A; Carrillo, Yolima; Blumenthal, Dana M; Mueller, Kevin E; LeCain, Dan R; Morgan, Jack A; Zelikova, Tamara J; Williams, David G; Follett, Ronald F; Pendall, Elise

    2018-05-01

    Temporal variation in soil nitrogen (N) availability affects growth of grassland communities that differ in their use and reuse of N. In a 7-year-long climate change experiment in a semi-arid grassland, the temporal stability of plant biomass production varied with plant N turnover (reliance on externally acquired N relative to internally recycled N). Species with high N turnover were less stable in time compared to species with low N turnover. In contrast, N turnover at the community level was positively associated with asynchrony in biomass production, which in turn increased community temporal stability. Elevated CO 2 and summer irrigation, but not warming, enhanced community N turnover and stability, possibly because treatments promoted greater abundance of species with high N turnover. Our study highlights the importance of plant N turnover for determining the temporal stability of individual species and plant communities affected by climate change. © 2018 John Wiley & Sons Ltd/CNRS.

  1. TCIA Secure Cyber Critical Infrastructure Modernization.

    Energy Technology Data Exchange (ETDEWEB)

    Keliiaa, Curtis M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-02-01

    The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.

  2. Water security evaluation in Yellow River basin

    Science.gov (United States)

    Jiang, Guiqin; He, Liyuan; Jing, Juan

    2018-03-01

    Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.

  3. DST-funded information security centre of competence

    CSIR Research Space (South Africa)

    Taute, B

    2009-06-06

    Full Text Available &D that will lead to commercialisation and transfer of R&D outputs in Information Security. Three Market opportunities exist following this initiative. It relates to innovative products and services that contribute to enhanced National Cyber Security, innovative...

  4. A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.

    Science.gov (United States)

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Li, Fagen

    2016-01-01

    Patient medication safety is an important issue in patient medication systems. In order to prevent medication errors, integrating Radio Frequency Identification (RFID) technology into automated patient medication systems is required in hospitals. Based on RFID technology, such systems can provide medical evidence for patients' prescriptions and medicine doses, etc. Due to the mutual authentication between the medication server and the tag, RFID authentication scheme is the best choice for automated patient medication systems. In this paper, we present a RFID mutual authentication scheme based on elliptic curve cryptography (ECC) to enhance patient medication safety. Our scheme can achieve security requirements and overcome various attacks existing in other schemes. In addition, our scheme has better performance in terms of computational cost and communication overhead. Therefore, the proposed scheme is well suitable for patient medication systems.

  5. Application of a sensor fusion algorithm for improving grasping stability

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jae Hyeon; Yoon, Hyun Suck; Moon, Hyung Pil; Choi, Hyouk Ryeol; Koo Ja Choon [Sungkyunkwan University, Suwon (Korea, Republic of)

    2015-07-15

    A robot hand normally employees various sensors that are packaged in small form factor, perform with delicately accurate, and cost mostly very expensive. Grasping operation of the hand relies especially on accuracy of those sensors. Even with a set of advanced sensory systems embedded in a robot hand, securing a stable grasping is still challenging task. The present work makes an attempt to improve force sensor accuracy by applying sensor fusion method. An optimal weight value sensor fusion method formulated with Kalman filters is presented and tested in the work. Using a set of inexpensive sensors, the work achieves a reliable force sensing and applies the enhanced sensor stability to an object pinch grasping.

  6. Application of a sensor fusion algorithm for improving grasping stability

    International Nuclear Information System (INIS)

    Kim, Jae Hyeon; Yoon, Hyun Suck; Moon, Hyung Pil; Choi, Hyouk Ryeol; Koo Ja Choon

    2015-01-01

    A robot hand normally employees various sensors that are packaged in small form factor, perform with delicately accurate, and cost mostly very expensive. Grasping operation of the hand relies especially on accuracy of those sensors. Even with a set of advanced sensory systems embedded in a robot hand, securing a stable grasping is still challenging task. The present work makes an attempt to improve force sensor accuracy by applying sensor fusion method. An optimal weight value sensor fusion method formulated with Kalman filters is presented and tested in the work. Using a set of inexpensive sensors, the work achieves a reliable force sensing and applies the enhanced sensor stability to an object pinch grasping.

  7. Fault ride-through enhancement using an enhanced field oriented control technique for converters of grid connected DFIG and STATCOM for different types of faults.

    Science.gov (United States)

    Ananth, D V N; Nagesh Kumar, G V

    2016-05-01

    With increase in electric power demand, transmission lines were forced to operate close to its full load and due to the drastic change in weather conditions, thermal limit is increasing and the system is operating with less security margin. To meet the increased power demand, a doubly fed induction generator (DFIG) based wind generation system is a better alternative. For improving power flow capability and increasing security STATCOM can be adopted. As per modern grid rules, DFIG needs to operate without losing synchronism called low voltage ride through (LVRT) during severe grid faults. Hence, an enhanced field oriented control technique (EFOC) was adopted in Rotor Side Converter of DFIG converter to improve power flow transfer and to improve dynamic and transient stability. A STATCOM is coordinated to the system for obtaining much better stability and enhanced operation during grid fault. For the EFOC technique, rotor flux reference changes its value from synchronous speed to zero during fault for injecting current at the rotor slip frequency. In this process DC-Offset component of flux is controlled, decomposition during symmetric and asymmetric faults. The offset decomposition of flux will be oscillatory in a conventional field oriented control, whereas in EFOC it was aimed to damp quickly. This paper mitigates voltage and limits surge currents to enhance the operation of DFIG during symmetrical and asymmetrical faults. The system performance with different types of faults like single line to ground, double line to ground and triple line to ground was applied and compared without and with a STATCOM occurring at the point of common coupling with fault resistance of a very small value at 0.001Ω. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.

  8. Physical and Cross-Layer Security Enhancement and Resource Allocation for Wireless Networks

    Science.gov (United States)

    Bashar, Muhammad Shafi Al

    2011-01-01

    In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…

  9. ZigBee-2007 Security Essentials

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2008-01-01

    ZigBee is a fairly new but promising standard for wireless networks due to its low resource requirements. As in other wireless network standards, security is an important issue and each new version of the ZigBee Specification enhances the level of the ZigBee security. In this paper, we present...... the security essentials of the latest ZigBee Specification, ZigBee-2007. We explain the key concepts, protocols, and computations. In addition, we formulate the protocols using standard protocol narrations. Finally, we identify the key challenges to be considered for consolidating ZigBee....

  10. Competition and system stability -- The reward and the penalty

    International Nuclear Information System (INIS)

    Mansour, Y.

    2000-01-01

    The business protocols and rules of the competitive electricity market are resulting in fragmentation of the historical vertically integrated structures. Electric services are offered at either cost or market-based prices depending on their type and the level of competition in a particular product. System stabilizing measures are essential for maintaining system security, yet their value is either underestimated or not understood. This paper describes practical methods to quantify the value of some of the stabilizing measures and ways to ensure maintaining the dynamic security of the power systems through business procedures and monetary sanctions

  11. Vibration-enhanced posture stabilization achieved by tactile supplementation: may blind individuals get extra benefits?

    Science.gov (United States)

    Magalhães, Fernando Henrique; Kohn, André Fabio

    2011-08-01

    Diminished balance ability poses a serious health risk due to the increased likelihood of falling, and impaired postural stability is significantly associated with blindness and poor vision. Noise stimulation (by improving the detection of sub-threshold somatosensory information) and tactile supplementation (i.e., additional haptic information provided by an external contact surface) have been shown to improve the performance of the postural control system. Moreover, vibratory noise added to the source of tactile supplementation (e.g., applied to a surface that the fingertip touches) has been shown to enhance balance stability more effectively than tactile supplementation alone. In view of the above findings, in addition to the well established consensus that blind subjects show superior abilities in the use of tactile information, we hypothesized that blind subjects may take extra benefits from the vibratory noise added to the tactile supplementation and hence show greater improvements in postural stability than those observed for sighted subjects. If confirmed, this hypothesis may lay the foundation for the development of noise-based assistive devices (e.g., canes, walking sticks) for improving somatosensation and hence prevent falls in blind individuals. Copyright © 2011 Elsevier Ltd. All rights reserved.

  12. Shipment security update - 2003

    International Nuclear Information System (INIS)

    Patterson, John; Anne, Catherine

    2003-01-01

    At the 2002 RERTR, NAC reported on the interim measures taken by the U.S. Nuclear Regulatory Commission to enhance the security afforded to shipments of spent nuclear fuel. Since that time, there have been a number of additional actions focused on shipment security including training programs sponsored by the U.S. Department of Transportation and the Electric Power Research Council, investigation by the Government Accounting Office, and individual measures taken by shippers and transportation agents. The paper will present a status update regarding this dynamic set of events and provide an objective assessment of the cost, schedule and technical implications of the changing security landscape. (author)

  13. Chitosan nanocomposite films: enhanced electrical conductivity, thermal stability, and mechanical properties.

    Science.gov (United States)

    Marroquin, Jason B; Rhee, K Y; Park, S J

    2013-02-15

    A novel, high-performance Fe(3)O(4)/MWNT/Chitosan nanocomposite has been prepared by a simple solution evaporation method. A significant synergistic effect of Fe(3)O(4) and MWNT provided enhanced electrical conductivity, mechanical properties, and thermal stability on the nanocomposites. A 5% (wt) loading of Fe(3)O(4)/MWNT in the nanocomposite increased conductivity from 5.34×10(-5) S/m to 1.49×10(-2) S/m compared to 5% (wt) MWNT loadings. The Fe(3)O(4)/MWNT/Chitosan films also exhibited increases in tensile strength and modulus of 70% and 155%, respectively. The integral procedure decomposition temperature (IPDT) was enhanced from 501 °C to 568 °C. These effects resulted from a number of factors: generation of a greater number of conductive channels through interactions between MWNT and Fe(3)O(4) surfaces, a higher relative crystallinity, the antiplasticizing effects of Fe(3)O(4), a restricted mobility and hindrance of depolymerization of the Chitosan chain segments, as well as uniform distribution, improved dispersion, and strong interfacial adhesion between the MWNT and Chitosan matrix. Copyright © 2012 Elsevier Ltd. All rights reserved.

  14. [Food security in Mexico].

    Science.gov (United States)

    Urquía-Fernández, Nuria

    2014-01-01

    An overview of food security and nutrition in Mexico is presented, based on the analysis of the four pillars of food security: availability, access, utilization of food, and stability of the food supply. In addition, the two faces of malnutrition in Mexico were analyzed: obesity and undernourishment. Data were gathered from the food security indicators of the United Nations's Food and Agriculture Organization, from the Mexican Scale of Food Security, and from the National Health and Nutrition Survey. Mexico presents an index of availability of 3 145 kilocalories per person per day, one of the highest indexes in the world, including both food production and imports. In contrast, Mexico is affected by a double burden of malnutrition: whereas children under five present 14% of stunt, 30% of the adult population is obese. Also, more than 18% of the population cannot afford the basic food basket (food poverty). Using perception surveys, people reports important levels of food insecurity, which concentrates in seven states of the Mexican Federation. The production structure underlying these indicators shows a very heterogeneous landscape, which translates in to a low productivity growth across the last years. Food security being a multidimensional concept, to ensure food security for the Mexican population requires a revision and redesign of public productive and social policies, placing a particular focus on strengthening the mechanisms of institutional governance.

  15. Enhanced conjugation stability and blood circulation time of macromolecular gadolinium-DTPA contrast agent

    Energy Technology Data Exchange (ETDEWEB)

    Jenjob, Ratchapol [Department of New Drug Development, School of Medicine, Inha University, 2F A-dong, Jeongseok Bldg., Sinheung-dong 3-ga, Jung-gu, Incheon 400-712 (Korea, Republic of); Kun, Na [Department of Biotechnology, The Catholic University of Korea, 43 Jibong-ro, Wonmi-gu, Bucheon-si, Gyeonggi-do 420-743 (Korea, Republic of); Ghee, Jung Yeon [Utah-Inha DDS and Advanced Therapeutics, B-403 Meet-You-All Tower, SongdoTechnopark, 7–50, Songdo-dong, Yeonsu-gu, Incheon 406-840 (Korea, Republic of); Shen, Zheyu; Wu, Xiaoxia [Division of Functional Materials and Nano-Devices, Ningbo Institute of Materials Technology & Engineering (NIMTE), Chinese Academy of Sciences, 519 Zhuangshi Street, Zhenhai District, Ningbo, Zhejiang 315201 (China); Cho, Steve K., E-mail: scho@gist.ac.kr [Division of Liberal Arts and Science, GIST College, Gwangju Institute of Science and Technology, Gwangju 500-712 (Korea, Republic of); Lee, Don Haeng [Utah-Inha DDS and Advanced Therapeutics, B-403 Meet-You-All Tower, SongdoTechnopark, 7–50, Songdo-dong, Yeonsu-gu, Incheon 406-840 (Korea, Republic of); Department of Internal Medicine, School of Medicine, Inha University Hospital, Incheon 420-751 (Korea, Republic of); Yang, Su-Geun, E-mail: Sugeun.Yang@Inha.ac.kr [Department of New Drug Development, School of Medicine, Inha University, 2F A-dong, Jeongseok Bldg., Sinheung-dong 3-ga, Jung-gu, Incheon 400-712 (Korea, Republic of)

    2016-04-01

    In this study, we prepared macromolecular MR T1 contrast agent: pullulan-conjugated Gd diethylene triamine pentaacetate (Gd-DTPA-Pullulan) and estimated residual free Gd{sup 3+}, chelation stability in competition with metal ions, plasma and tissue pharmacokinetics, and abdominal MR contrast on rats. Residual free Gd{sup 3+} in Gd-DTPA-Pullulan was measured using colorimetric spectroscopy. The transmetalation of Gd{sup 3+} incubated with Ca{sup 2+} was performed by using a dialysis membrane (MWCO 100–500 Da) and investigated by ICP-OES. The plasma concentration profiles of Gd-DTPA-Pullulan were estimated after intravenous injection at a dose 0.1 mmol/kg of Gd. The coronal-plane abdominal images of normal rats were observed by MR imaging. The content of free Gd{sup 3+}, the toxic residual form, was less than 0.01%. Chelation stability of Gd-DTPA-Pullulan was estimated, and only 0.2% and 0.00045% of Gd{sup 3+} were released from Gd-DTPA-Pullulan after 2 h incubation with Ca{sup 2+} and Fe{sup 2+}, respectively. Gd-DTPA-Pullulan displayed the extended plasma half-life (t{sub 1/2,α} = 0.43 h, t{sub 1/2,β} = 2.32 h), much longer than 0.11 h and 0.79 h of Gd-EOB-DTPA. Abdominal MR imaging showed Gd-DTPA-Pullulan maintained initial MR contrast for 30 min. The extended plasma half-life of Gd-DTPA-Pullulan probably allows the prolonged MR acquisition time in clinic with enhanced MR contrast. - Highlights: • Macromolecule (pullulan) conjugated Gd contrast agent (Gd-DTPA-Pullulan) showed the extended plasma half-life (t{sub 1/2,α} = 0.43 h, t{sub 1/2,β} = 2.32 h) in comparison with Gd-EOB-DTPA • Gd-DTPA-pullulan T1 contrast agent exhibited strong chelation stability against Gd. • The extended blood circulation attributed the enhanced and prolonged MR contrast on abdominal region of rats. • The extended blood circulation may provide prolonged MR acquisition time window in clinics.

  16. FOOD SECURITY IN ROMANIA

    Directory of Open Access Journals (Sweden)

    Silviu STANCIU

    2015-12-01

    Full Text Available The increasing world population, the limitation of the natural availability for food production, the climate issues and the food consumption need for modification imposed a continuous updating of the food security concept. Although Romania has sufficient natural resources, which may ensure, by means of proper exploitation, the population’s food needs, the lack of a unitary approach at the government level, materialized in the dependence on imports and in fluctuations in the agro-food production, leads to a re-evaluation of national food needs. National food security may be affected by a series of risks and threats, which appeared due to an imbalance connected with the availability, the utility and the stability of the agro-food sector, interdependent elements that must be functional. The present article proposes an analysis of food security in Romania, with a short presentation of the concept in an international context.

  17. Evaluation of nuclear energy in the context of energy security

    International Nuclear Information System (INIS)

    Irie, Kazutomo; Kanda, Keiji

    2002-01-01

    This paper analyzes the view expressed by the Japanese government on the role of nuclear energy for energy security through scrutiny of Japan's policy documents. The analysis revealed that the contribution by nuclear energy to Japan's energy security has been defined in two ways. Nuclear energy improves short-term energy security with its characteristics such as political stability in exporting countries of uranium, easiness of stockpiling of nuclear fuels, stability in power generation cost, and reproduction of plutonium and other fissile material for use by reprocessing of spent fuel. Nuclear energy also contributes to medium- and long-term energy security through its characteristics that fissile material can be reproduced (multiplied in the case of breeder reactor) from spent fuels. Further contribution can be expected by nuclear fusion. Japan's energy security can be strengthened not only by expanding the share of nuclear energy in total energy supply, but also by improving nuclear energy's characteristics which are related to energy security. Policy measures to be considered for such improvement will include (a) policy dialogue with exporting countries of uranium, (b) government assistance to development of uranium mines, (c) nuclear fuel stockpiling, (d) reprocessing and recycling of spent fuels, (e) development of fast breeder reactor, and (f) research of nuclear fusion. (author)

  18. The Potential Use of Agroforestry Community Gardens as a Sustainable Import-Substitution Strategy for Enhancing Food Security in Subarctic Ontario, Canada

    Directory of Open Access Journals (Sweden)

    Maren Oelbermann

    2013-09-01

    Full Text Available The high prevalence of food insecurity experienced by northern First Nations partially results from dependence on an expensive import-based food system that typically lacks nutritional quality and further displaces traditional food systems. In the present study, the feasibility of import substitution by Agroforestry Community Gardens (AFCGs as socio-ecologically and culturally sustainable means of enhancing food security was explored through a case study of Fort Albany First Nation in subarctic Ontario, Canada. Agroforestry is a diverse tree-crop agricultural system that has enhanced food security in the tropics and subtropics. Study sites were selected for long-term agroforestry research to compare Salix spp. (willow-dominated AFCG plots to a “no tree” control plot in Fort Albany. Initial soil and vegetative analysis revealed a high capacity for all sites to support mixed produce with noted modifications, as well as potential competitive and beneficial willow-crop interactions. It is anticipated that inclusion of willow trees will enhance the long-term productive capacity of the AFCG test plots. As an adaptable and dynamic system, AFCGs have potential to act as a more reliable local agrarian system and a refuge for culturally significant plants in high-latitude First Nation socio-ecological systems, which are particularly vulnerable to rapid cultural, climatic, and ecological change.

  19. Intrinsically secure fast reactors with dense cores

    International Nuclear Information System (INIS)

    Slessarev, Igor

    2007-01-01

    Secure safety, resistance to weapons material proliferation and problems of long-lived wastes remain the most important 'painful points' of nuclear power. Many innovative reactor concepts have been developed aimed at a radical enhancement of safety. The promising potential of innovative nuclear reactors allows for shifting accents in current reactor safety 'strategy' to reveal this worth. Such strategy is elaborated focusing on the priority for intrinsically secure safety features as well as on sure protection being provided by the first barrier of defence. Concerning the potential of fast reactors (i.e. sodium cooled, lead-cooled, etc.), there are no doubts that they are able to possess many favourable intrinsically secure safety features and to lay the proper foundation for a new reactor generation. However, some of their neutronic characteristics have to be radically improved. Among intrinsically secure safety properties, the following core parameters are significantly important: reactivity margin values, reactivity feed-back and coolant void effects. Ways of designing intrinsically secure safety features in fast reactors (titled hereafter as Intrinsically Secure Fast Reactors - ISFR) can be found in the frame of current reactor technologies by radical enhancement of core neutron economy and by optimization of core compositions. Simultaneously, respecting resistance to proliferation, by using non-enriched fuel feed as well as a core breeding gain close to zero, are considered as the important features (long-lived waste problems will be considered in a separate paper). This implies using the following reactor design options as well as closed fuel cycles with natural U as the reactor feed: ·Ultra-plate 'dense cores' of the ordinary (monolithic) type with negative total coolant void effects. ·Modular type cores. Multiple dense modules can be embedded in the common reflector for achieving the desired NPP total power. The modules can be used also independently (as

  20. Contribution of Renewables to Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-07-01

    The environmental benefits of renewable energy are well known. But the contribution that they can make to energy security is less widely recognised. This report aims to redress the balance, showing how in electricity generation, heat supply, and transport, renewables can enhance energy security and suggesting policies that can optimise this contribution.

  1. A Cyber Federal Deposit Insurance Corporation Achieving Enhanced National Security

    Science.gov (United States)

    2017-12-21

    machine is being bridged by wearables, augmented reality (AR), and artificial intelligence (AI). In this near-future the uncanny valley no longer...and security represent key pol- icy, security, and business tradeoffs, connectivity and national cybersecurity are similarly dialectical choices. On...Consumer Electronics Show (CES), is at once the digital sycophant’s dream and the cybersecurity hermit’s nightmare, as each connected gewgaw and

  2. Enhancing Financial Security in Agricultural Business: Financial and Property Aspects

    OpenAIRE

    Yuliya Bezdushna

    2014-01-01

    The article provides the analysis of information support for the developing agrarian businesses financial security activities. The impact of financial statements on financial security has been proved through generalization procedure of such calculating indicators as operating margin, return on assets, total liquidity ratio and financial autonomy ratio. A causal effect between mass underestimation of operating fixed assets in accounting and inflated profitability rates in agribusinesses operat...

  3. A fuzzy genetic approach for network reconfiguration to enhance voltage stability in radial distribution systems

    International Nuclear Information System (INIS)

    Sahoo, N.C.; Prasad, K.

    2006-01-01

    This paper presents a fuzzy genetic approach for reconfiguration of radial distribution systems (RDS) so as to maximize the voltage stability of the network for a specific set of loads. The network reconfiguration involves a mechanism for selection of the best set of branches to be opened, one from each loop, such that the reconfigured RDS possesses desired performance characteristics. This discrete solution space is better handled by the proposed scheme, which maximizes a suitable optimizing function (computed using two different approaches). In the first approach, this function is chosen as the average of a voltage stability index of all the buses in the RDS, while in the second approach, the complete RDS is reduced to a two bus equivalent system and the optimizing function is the voltage stability index of this reduced two bus system. The fuzzy genetic algorithm uses a suitable coding and decoding scheme for maintaining the radial nature of the network at every stage of genetic evolution, and it also uses a fuzzy rule based mutation controller for efficient search of the solution space. This method, tested on 69 bus and 33 bus RDSs, shows promising results for the both approaches. It is also observed that the network losses are reduced when the voltage stability is enhanced by the network reconfiguration

  4. SS-mPEG chemical modification of recombinant phospholipase C for enhanced thermal stability and catalytic efficiency.

    Science.gov (United States)

    Fang, Xian; Wang, Xueting; Li, Guiling; Zeng, Jun; Li, Jian; Liu, Jingwen

    2018-05-01

    PEGylation is one of the most promising and extensively studied strategies for improving the properties of proteins as well as enzymic physical and thermal stability. Phospholipase C, hydrolyzing the phospholipids offers tremendous applications in diverse fields. However, the poor thermal stability and higher cost of production have restricted its industrial application. This study focused on improving the stabilization of recombinant PLC by chemical modification with methoxypolyethylene glycol-Succinimidyl Succinate (SS-mPEG, MW 5000). PLC gene from isolate Bacillus cereus HSL3 was fused with SUMO, a novel small ubiquitin-related modifier expression vector and over expressed in Escherichia coli. The soluble fraction of SUMO-PLC reached 80% of the total recombinant protein. The enzyme exhibited maximum catalytic activity at 80 °C and was relatively thermostable at 40-70 °C. It showed extensive substrate specificity pattern and marked activity toward phosphatidylcholine, which made it a typical non-specific PLC for industrial purpose. SS-mPEG-PLC complex exhibited an enhanced thermal stability at 70-80 °C and the catalytic efficiency (K cat /K m ) had increased by 3.03 folds compared with free PLC. CD spectrum of SS-mPEG-PLC indicated a possible enzyme aggregation after chemical modification, which contributed to the higher thermostability of SS-mPEG-PLC. The increase of antiparallel β sheets in secondary structure also made it more stable than parallel β sheets. The presence of SS-mPEG chains on the enzyme molecule surface somewhat changed the binding rate of the substrates, leading to a significant improvement in catalytic efficiency. This study provided an insight into the addition of SS-mPEG for enhancing the industrial applications of phospholipase C at higher temperature. Copyright © 2018 Elsevier B.V. All rights reserved.

  5. Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce.

    Science.gov (United States)

    Mishra, Dheerendra; Mukhopadhyay, Sourav; Kumari, Saru; Khan, Muhammad Khurram; Chaturvedi, Ankita

    2014-05-01

    Telecare medicine information systems (TMIS) present the platform to deliver clinical service door to door. The technological advances in mobile computing are enhancing the quality of healthcare and a user can access these services using its mobile device. However, user and Telecare system communicate via public channels in these online services which increase the security risk. Therefore, it is required to ensure that only authorized user is accessing the system and user is interacting with the correct system. The mutual authentication provides the way to achieve this. Although existing schemes are either vulnerable to attacks or they have higher computational cost while an scalable authentication scheme for mobile devices should be secure and efficient. Recently, Awasthi and Srivastava presented a biometric based authentication scheme for TMIS with nonce. Their scheme only requires the computation of the hash and XOR functions.pagebreak Thus, this scheme fits for TMIS. However, we observe that Awasthi and Srivastava's scheme does not achieve efficient password change phase. Moreover, their scheme does not resist off-line password guessing attack. Further, we propose an improvement of Awasthi and Srivastava's scheme with the aim to remove the drawbacks of their scheme.

  6. Mastering wireless penetration testing for highly secured environments

    CERN Document Server

    Johns, Aaron

    2015-01-01

    This book is intended for security professionals who want to enhance their wireless penetration testing skills and knowledge. Since this book covers advanced techniques, you will need some previous experience in computer security and networking.

  7. Financial stability of banking system in China

    OpenAIRE

    Jiang, B

    2014-01-01

    This thesis aims at investigating the financial stability of China's banking system. Since the banking system is one of the most important financial intermediaries in the financial systems, the financial soundness of banks could secure the stability of the whole financial system. Two of the factors that may significantly increase imbalance of the banking system, and hence affect financial stability of an economy is the accumulated non-performing loans of banks and the macro-economic turbulenc...

  8. Fast-Valving of Large Steam Turbine Units as a Means of Power System Security Enhancement

    Directory of Open Access Journals (Sweden)

    Bogdan Sobczak

    2014-03-01

    Full Text Available Fast-valving assists in maintaining system stability following a severe transmission system fault by reducing the turbine mechanical power. Fast-valving consists in rapid closing and opening of steam valves in an adequate manner to reduce the generator accelerating power following the recognition of a severe fault. FV can be an effective and economical method of meeting the performance requirements of a power system in the presence of an increase in wind and solar generation in the power system, newly connected large thermal units and delaying of building new transmission lines. The principle of fast-valving and advantages of applying this technique in large steam turbine units was presented in the paper. Effectiveness of fast-valving in enhancing the stability of the Polish Power Grid was analyzed. The feasibility study of fast-valving application in the 560 MW unit in Kozienice Power Station (EW SA was discussed.

  9. Enhancement of load frequency stabilization effect of superconducting magnetic energy storage by static synchronous series compensator based on H ∞ control

    International Nuclear Information System (INIS)

    Ngamroo, Issarachai; Taeratanachai, Chanin; Dechanupaprittha, Sanchai; Mitani, Yasunori

    2007-01-01

    It is well known that the load frequency stabilization effect of superconducting magnetic energy storage (SMES) in an interconnected power system is restricted to its located area. The SMES almost has no frequency stabilization effect in another interconnected area. To enhance the frequency stabilization effect of SMES, the static synchronous series compensator (SSSC) can be applied as an auxiliary device. The SSSC can be used as an energy transfer device of the SMES to stabilize the frequency in another interconnected area. The proposed technique not only introduces a sophisticated frequency stabilization in deregulated power systems but also offers a smart energy management control of SMES. In addition, to take the robust stability of the controlled power system against system uncertainties into account, the H ∞ control is used to design robust frequency stabilizers of the SMES and SSSC. Simulation results in a two area interconnected power system confirm the high robustness of the frequency stabilizers SMES and SSSC against load disturbances and system uncertainties

  10. Power system stabilizer control for wind power to enhance power system stability

    OpenAIRE

    Domínguez García, José Luís; Gomis Bellmunt, Oriol; Bianchi, Fernando Daniel; Sumper, Andreas

    2011-01-01

    The paper presents a small signal stability analysis for power systems with wind farm interaction. Power systems have damping oscillation modes that can be excited by disturbance or fault in the grid. The power converters of the wind farms can be used to reduce these oscillations and make the system more stable. These ideas are explored to design a power system stabilized (PSS) for a network with conventional generators and a wind farm in order to increase the damping of the oscillation...

  11. Increasing Distributed IT&C Application Security

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2013-01-01

    Full Text Available The development of distributed IT & C applications – DIA is presented alongside their main characteristics and the actors involved in activities through-out their lifecycle are identified in the before-mentioned scope. Aspects pertaining security risks, as well as methods of enhancing security, are detailed by DIA architectural features. The analysis includes risk elements, vulnerabilities, means of enhancing the behavior of the system, as well as a hierarchical feature dependency model based on a qualitative assessment of DIA security features, obtained through an inquiry in the common means of protection used by Romanian professionals, as well as their prioritization in the context of limited resources. A graph-based model of feature interactions is built. The last section deals with the ways of improving risk detection methods, as derived from the answers and features presented.

  12. Urease immobilized polymer hydrogel: Long-term stability and enhancement of enzymatic activity.

    Science.gov (United States)

    Kutcherlapati, S N Raju; Yeole, Niranjan; Jana, Tushar

    2016-02-01

    A method has been developed in which an enzyme namely urease was immobilized inside hydrogel matrix to study the stability and enzymatic activity in room temperature (∼27-30°C). This urease coupled hydrogel (UCG) was obtained by amine-acid coupling reaction and this procedure is such that it ensured the wider opening of mobile flap of enzyme active site. A systematic comparison of urea-urease assay and the detailed kinetic data clearly revealed that the urease shows activity for more than a month when stored at ∼27-30°C in case of UCG whereas it becomes inactive in case of free urease (enzyme in buffer solution). The aqueous microenvironment inside the hydrogel, unusual morphological features and thermal behaviour were believed to be the reasons for unexpected behaviour. UCG displayed enzyme activity at basic pH and up to 60°C. UCG showed significant enhancement in activity against thermal degradation compared to free urease. In summary, this method is a suitable process to stabilize the biomacromolecules in standard room temperature for many practical uses. Copyright © 2015 Elsevier Inc. All rights reserved.

  13. Determination of tensile forces to enhance the supply stability of reinforced fiber

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Kun Woo; Lee, Jae Wook; Jang, Jin Seok; Jeong, Myeong Sik; Oh, Joo Young; Kang, Hoon; Kang, Ji Heon [Daegyeong Regional Division, Korea Institute of Industrial Technology, Daegu (Korea, Republic of); Kim, Hyung Ryul [Agency for Defense Development, Changwon (Korea, Republic of); Yoo, Wan Suk [School of Mechanical Engineering, Pusan National University, Busan (Korea, Republic of)

    2016-12-15

    The manufacturing process of long fiber thermoplastic is initiated by supplying reinforced fiber wound in a spool dispenser. If problems such as tangling or kinking occur in the apparatus used for supplying the reinforced fiber in the long-fiber thermoplastic direct process, the productivity of the long-fiber thermoplastic decreases. Therefore, it is important to enhance the supply stability of reinforced fiber. In general, the increase in supply stability can be achieved by maintaining a steady balloon shape that is controlled by the unwinding velocity or tensile force of the reinforced fiber. In this research, the range of suitable tensile force was determined under the assumption that the unwinding velocity remained constant. The reinforced fiber was assumed to be inextensible, homogeneous, and isotropic and to have uniform density. The transient-state unwinding equation of motion to analyze the unwinding motion of reinforced fiber can be derived by using Hamilton’s principle for an open system in which mass can change within a control volume. In the process of solving the transient-state unwinding equation of motion, the exact two-point boundary conditions are adopted for each time step.

  14. The summarize of the technique about proactive network security protection

    International Nuclear Information System (INIS)

    Liu Baoxu; Li Xueying; Cao Aijuan; Yu Chuansong; Xu Rongsheng

    2003-01-01

    The proactive protection measures and the traditional passive security protection tools are complementarities each other. It also can supply the conventional network security protection system and enhance its capability of the security protection. Based upon sorts of existing network security technologies, this article analyses and summarizes the technologies, functions and the development directions of some key proactive network security protection tools. (authors)

  15. One-step polypyrrole coating of self-assembled silver nanoprisms for enhanced stability and Raman scattering

    Science.gov (United States)

    Jeong, Dong-Won; Jeong, Sugyeong; Jang, Du-Jeon

    2017-07-01

    Self-assemblies of silver nanoprisms (AgPRs) having enhanced structural stability and optical properties have been facilely coated with polypyrrole (PPy) via the in situ polymerization of pyrrole monomers that also act as an assembling agent. The assemblies of AgPRs, whose edge lengths and thicknesses are typically 78 and 4 nm, respectively, have been surrounded by a PPy coating of 6 nm. AgPRs are assembled in a side-to-side orientation, and the degree of assembly has been controlled by varying the concentration of trisodium citrate dihydrate, which attaches selectively to the {111} facets of AgPRs. The morphology deformation time of PPy-coated AgPRs in 0.6 mM H2O2(aq) is seven times longer than that of PPy-free AgPRs, suggesting that PPy coating prevents the sharp tips of AgPRs from being truncated by oxidizing agents. The SERS effect of highly self-assembled and PPy-coated AgPRs becomes as high as 6.3 due to numerous hot spots generated between nanoprisms. Overall, our fabricated AgPRs assemblies with PPy coating have not only improved structural stability but also enhanced optical properties, extending the practical use of noble-metal nanoprisms for various optical applications.

  16. Process Control Systems in the Chemical Industry: Safety vs. Security

    Energy Technology Data Exchange (ETDEWEB)

    Jeffrey Hahn; Thomas Anderson

    2005-04-01

    Traditionally, the primary focus of the chemical industry has been safety and productivity. However, recent threats to our nation’s critical infrastructure have prompted a tightening of security measures across many different industry sectors. Reducing vulnerabilities of control systems against physical and cyber attack is necessary to ensure the safety, security and effective functioning of these systems. The U.S. Department of Homeland Security has developed a strategy to secure these vulnerabilities. Crucial to this strategy is the Control Systems Security and Test Center (CSSTC) established to test and analyze control systems equipment. In addition, the CSSTC promotes a proactive, collaborative approach to increase industry's awareness of standards, products and processes that can enhance the security of control systems. This paper outlines measures that can be taken to enhance the cybersecurity of process control systems in the chemical sector.

  17. Security-enhanced phase encryption assisted by nonlinear optical correlation via sparse phase

    International Nuclear Information System (INIS)

    Chen, Wen; Chen, Xudong; Wang, Xiaogang

    2015-01-01

    We propose a method for security-enhanced phase encryption assisted by a nonlinear optical correlation via a sparse phase. Optical configurations are established based on a phase retrieval algorithm for embedding an input image and the secret data into phase-only masks. We found that when one or a few phase-only masks generated during data hiding are sparse, it is possible to integrate these sparse masks into those phase-only masks generated during the encoding of the input image. Synthesized phase-only masks are used for the recovery, and sparse distributions (i.e., binary maps) for generating the incomplete phase-only masks are considered as additional parameters for the recovery of secret data. It is difficult for unauthorized receivers to know that a useful phase has been sparsely distributed in the finally generated phase-only masks for secret-data recovery. Only when the secret data are correctly verified can the input image obtained with valid keys be claimed as targeted information. (paper)

  18. Enhanced ATM Security using Biometric Authentication and Wavelet Based AES

    Directory of Open Access Journals (Sweden)

    Sreedharan Ajish

    2016-01-01

    Full Text Available The traditional ATM terminal customer recognition systems rely only on bank cards, passwords and such identity verification methods are not perfect and functions are too single. Biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. This paper presents a highly secured ATM banking system using biometric authentication and wavelet based Advanced Encryption Standard (AES algorithm. Two levels of security are provided in this proposed design. Firstly we consider the security level at the client side by providing biometric authentication scheme along with a password of 4-digit long. Biometric authentication is achieved by considering the fingerprint image of the client. Secondly we ensure a secured communication link between the client machine to the bank server using an optimized energy efficient and wavelet based AES processor. The fingerprint image is the data for encryption process and 4-digit long password is the symmetric key for the encryption process. The performance of ATM machine depends on ultra-high-speed encryption, very low power consumption, and algorithmic integrity. To get a low power consuming and ultra-high speed encryption at the ATM machine, an optimized and wavelet based AES algorithm is proposed. In this system biometric and cryptography techniques are used together for personal identity authentication to improve the security level. The design of the wavelet based AES processor is simulated and the design of the energy efficient AES processor is simulated in Quartus-II software. Simulation results ensure its proper functionality. A comparison among other research works proves its superiority.

  19. Developing a secured social networking site using information security awareness techniques

    Directory of Open Access Journals (Sweden)

    Julius O. Okesola

    2014-11-01

    Full Text Available Background: Ever since social network sites (SNS became a global phenomenon in almost every industry, security has become a major concern to many SNS stakeholders. Several security techniques have been invented towards addressing SNS security, but information security awareness (ISA remains a critical point. Whilst very few users have used social circles and applications because of a lack of users’ awareness, the majority have found it difficult to determine the basis of categorising friends in a meaningful way for privacy and security policies settings. This has confirmed that technical control is just part of the security solutions and not necessarily a total solution. Changing human behaviour on SNSs is essential; hence the need for a privately enhanced ISA SNS. Objective: This article presented sOcialistOnline – a newly developed SNS, duly secured and platform independent with various ISA techniques fully implemented. Method: Following a detailed literature review of the related works, the SNS was developed on the basis of Object Oriented Programming (OOP approach, using PhP as the coding language with the MySQL database engine at the back end. Result: This study addressed the SNS requirements of privacy, security and services, and attributed them as the basis of architectural design for sOcialistOnline. SNS users are more aware of potential risk and the possible consequences of unsecured behaviours. Conclusion: ISA is focussed on the users who are often the greatest security risk on SNSs, regardless of technical securities implemented. Therefore SNSs are required to incorporate effective ISA into their platform and ensure users are motivated to embrace it.

  20. Enhancing Security and Privacy in Video Surveillance through Role-Oriented Access Control Mechanism

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim

    sensitive regions, e.g. faces, from the videos. However, very few research efforts have focused on addressing the security aspects of video surveillance data and on authorizing access to this data. Interestingly, while PETs help protect the privacy of individuals, they may also hinder the usefulness....... Pervasive usage of such systems gives substantial powers to those monitoring the videos and poses a threat to the privacy of anyone observed by the system. Aside from protecting privacy from the outside attackers, it is equally important to protect the privacy of individuals from the inside personnel...... involved in monitoring surveillance data to minimize the chances of misuse of the system, e.g. voyeurism. In this context, several techniques to protect the privacy of individuals, called privacy enhancing techniques (PET) have therefore been proposed in the literature which detect and mask the privacy...

  1. PMU-Aided Voltage Security Assessment for a Wind Power Plant: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Jiang, H.; Zhang, Y. C.; Zhang, J. J.; Muljadi, E.

    2015-04-08

    Because wind power penetration levels in electric power systems are continuously increasing, voltage stability is a critical issue for maintaining power system security and operation. The traditional methods to analyze voltage stability can be classified into two categories: dynamic and steady-state. Dynamic analysis relies on time-domain simulations of faults at different locations; however, this method needs to exhaust faults at all locations to find the security region for voltage at a single bus. With the widely located phasor measurement units (PMUs), the Thevenin equivalent matrix can be calculated by the voltage and current information collected by the PMUs. This paper proposes a method based on a Thevenin equivalent matrix to identify system locations that will have the greatest impact on the voltage at the wind power plant’s point of interconnection. The number of dynamic voltage stability analysis runs is greatly reduced by using the proposed method. The numerical results demonstrate the feasibility, effectiveness, and robustness of the proposed approach for voltage security assessment for a wind power plant.

  2. D-amino acid substitution enhances the stability of antimicrobial peptide polybia-CP.

    Science.gov (United States)

    Jia, Fengjing; Wang, Jiayi; Peng, Jinxiu; Zhao, Ping; Kong, Ziqing; Wang, Kairong; Yan, Wenjin; Wang, Rui

    2017-10-01

    With the increasing emergence of resistant microbes toward conventional antimicrobial agents, there is an urgent need for the development of antimicrobial agents with novel action mode. Antimicrobial peptides (AMPs) are believed to be one kind of ideal alternatives. However, AMPs can be easily degraded by protease, which limited their therapeutic use. In the present study, D-amino acid substitution strategy was employed to enhance the stability of polybia-CP. We investigated the stability of peptides against the degradation of trypsin and chymotrypsin by determining the antimicrobial activity or determining the HPLC profile of peptides after incubation with proteases. Our results showed that both the all D-amino acid derivative (D-CP) and partial D-lysine substitution derivative (D-lys-CP) have an improved stability against trypsin and chymotrypsin. Although D-CP takes left-hand α-helical conformation and D-lys-CP loses some α-helical content, both of the D-amino acid-substituted derivatives maintain their parental peptides' membrane active action mode. In addition, D-lys-CP showed a slight weaker antimicrobial activity than polybia-CP, but the hemolytic activity decreased greatly. These results suggest that D-CP and D-lys-CP can offer strategy to improve the property of AMPs and may be leading compounds for the development of novel antimicrobial agents. © The Author 2017. Published by Oxford University Press on behalf of the Institute of Biochemistry and Cell Biology, Shanghai Institutes for Biological Sciences, Chinese Academy of Sciences. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  3. The Extended Concept of Security and the Czech Security Practice

    Directory of Open Access Journals (Sweden)

    Libor Stejskal

    2008-12-01

    Full Text Available According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-governmental organisations, communities, and individual citizens. This has immediate bearing on the everyday security reality of the Czech Republic. In international context, the “security frontier” of the Czech Republic is expanding, e.g. through the country’s involvement in UN and NATO security missions in conflict-ridden regions of Europe and the world. The country also helps enhance the internal security of the European Union, whose strength depends on its Member States’ willingness to “harmonise” the pursuit of their respective national security interests. This approach is especially important with regard to the principal security threats Europe faces and will continue to face in the future: terrorism and organised crime. It is vital that the Czech Republic have a well-working security system capable of responding effectively to a broad range of threats. This requirement applies first and foremost to the Police, the Fire and Rescue Service, and intelligence services. Unfortunately, with the present effectiveness of the Czech security system, much remains wishful thinking and, due to the lack of a comprehensive framework, a comparatively low level of protection against emergencies exists. Fight against crime is hampered by inefficient operation of the Police and judiciary. A thorough analysis of the aforementioned problems could provide basis for a broader public debate over the priorities and goals of Czech security policy, which should

  4. Social security and firm performance

    DEFF Research Database (Denmark)

    Lee, Sangheon; Torm, Nina

    2017-01-01

    This article investigates how social security provision - a key determinant of formality - impacts on small and medium-sized firm performance in Viet Nam. Based on enterprise census data covering all registered firms from 2006 to 2011, the authors find that firms which increase their social...... security coverage by 10 per cent experience a revenue gain of 1.4-2.0 per cent per worker and a profit gain of up to 1.8 per cent, depending on the survival time of the firm. However, given the time lag between 'investment' (in social security contributions) and returns (enhanced firm performance...

  5. Development of bubble chambers with enhanced stability and sensitivity to low-energy nuclear recoils

    International Nuclear Information System (INIS)

    Bolte, W.J.; Collar, J.I.; Crisler, M.; Hall, J.; Holmgren, D.; Nakazawa, D.; Odom, B.; O'Sullivan, K.; Plunkett, R.; Ramberg, E.; Raskin, A.; Sonnenschein, A.; Vieira, J.D.

    2007-01-01

    The viability of using Bubble Chambers as dark matter particle detectors is considered. Techniques leading to the enhanced chamber stability needed for this new application are described in detail. Prototype trials show that sensitivity to the low-energy nuclear recoils induced by Weakly Interacting Massive Particles (WIMP) is possible in conditions of extreme insensitivity to minimum ionizing backgrounds. An understanding of detector response is demonstrated using existing theoretical models. We briefly comment on the prospects for detection of supersymmetric dark matter with large CF 3 I chambers

  6. The EU Capital Markets Union and Financial Stability

    Directory of Open Access Journals (Sweden)

    Kravchuk Igor S.

    2017-06-01

    Full Text Available The aim of the article is to study the processes of formation of the EU Capital Markets Union in the context of their influence on stability of the markets and the financial system as a whole. In the course of analyzing the project for the building of a single capital market with respect to financial stability, there determined its positive aspects as well as threats and challenges associated with simplification of information requirements to the prospectus of public offering of securities, low liquidity and higher volatility of the equity markets of small and medium-sized businesses, reduction of the regulatory requirements to investment firms (securities traders, correction of prudential norms for infrastructure investments of banking institutions and insurance companies, introduction of a simple, transparent and standard securitization, a secondary market for distressed banking assets, and a potential spread of financial instability at cross-border investments in securities.

  7. Amorphous Solid Dispersion of Epigallocatechin Gallate for Enhanced Physical Stability and Controlled Release

    Directory of Open Access Journals (Sweden)

    Yizheng Cao

    2017-11-01

    Full Text Available Epigallocatechin gallate (EGCG has been recognized as the most prominent green tea extract due to its healthy influences. The high instability and low bioavailability, however, strongly limit its utilization in food and drug industries. This work, for the first time, develops amorphous solid dispersion of EGCG to enhance its bioavailability and physical stability. Four commonly used polymeric excipients are found to be compatible with EGCG in water-dioxane mixtures via a stepwise mixing method aided by vigorous mechanical interference. The dispersions are successfully generated by lyophilization. The physical stability of the dispersions is significantly improved compared to pure amorphous EGCG in stress condition (elevated temperature and relative humidity and simulated gastrointestinal tract environment. From the drug release tests, one of the dispersions, EGCG-Soluplus® 50:50 (w/w shows a dissolution profile that only 50% EGCG is released in the first 20 min, and the remains are slowly released in 24 h. This sustained release profile may open up new possibilities to increase EGCG bioavailability via extending its elimination time in plasma.

  8. Amorphous Solid Dispersion of Epigallocatechin Gallate for Enhanced Physical Stability and Controlled Release.

    Science.gov (United States)

    Cao, Yizheng; Teng, Jing; Selbo, Jon

    2017-11-09

    Epigallocatechin gallate (EGCG) has been recognized as the most prominent green tea extract due to its healthy influences. The high instability and low bioavailability, however, strongly limit its utilization in food and drug industries. This work, for the first time, develops amorphous solid dispersion of EGCG to enhance its bioavailability and physical stability. Four commonly used polymeric excipients are found to be compatible with EGCG in water-dioxane mixtures via a stepwise mixing method aided by vigorous mechanical interference. The dispersions are successfully generated by lyophilization. The physical stability of the dispersions is significantly improved compared to pure amorphous EGCG in stress condition (elevated temperature and relative humidity) and simulated gastrointestinal tract environment. From the drug release tests, one of the dispersions, EGCG-Soluplus ® 50:50 ( w / w ) shows a dissolution profile that only 50% EGCG is released in the first 20 min, and the remains are slowly released in 24 h. This sustained release profile may open up new possibilities to increase EGCG bioavailability via extending its elimination time in plasma.

  9. Remote monitoring in safeguards: Security of information and enhanced cooperation

    International Nuclear Information System (INIS)

    Galdoz, Erwin; Calzetta, Osvaldo; Fernández Moreno, Sonia; Llacer, Carlos; Díaz, Gustavo; Vigile, Sebastián; Brunhuber, Christoph

    2011-01-01

    Unattended systems with remote transmission capabilities (RM) have the potential to improve safeguards efficiency. Moreover, the evolution of technology and the steady growing of nuclear materials subject to control, lead modern safeguards increasingly utilizing unattended equipment with the capability to store relevant data for long periods of time coupled with the option of being remotely accessed and checked. Remote inspection is still a concept under development, but it may end to be a powerful more efficient verification modality in medium term future. An important part of drawing meaningful safeguards conclusions rests on authenticity and reliability of the information on nuclear material and facilities acquired through the various verification activities and measures applied by IAEA and regional safeguards organizations, like ABACC. The increasing utilization of such technology to further optimize safeguards responds to a multifaceted environment where security of information for all relevant parties is of utmost importance. From the point of view of the IAEA and ABACC, the use of any technology for safeguards application, and specially the use of RM, requires to ensure the security of data collected to guarantee the validity and veracity of such information throughout the whole process (e.g., from collecting to reviewing). This is also valid to the SSAC involved in the process. Information security is also relevant for States and Operators. Assurance should be given that the information could not be withdrawn by non-authorized entities and that facility data is also fully secured. Another important aspect related to RM that may also fall in the security aspect of safeguards relevant information that merits further consideration, is the sharing of information between organizations like ABACC and the IAEA as well as the possibility to make this data available for States authorities purposes. This paper discusses three main themes related to RM: (i) the extent

  10. Economic foundation and importance of non-state security sector within the national security system

    Directory of Open Access Journals (Sweden)

    Anđelković Slobodan

    2016-01-01

    Full Text Available The main purpose of this paper was to present the causes (for, role (played by and the growing importance of the non-state actors within the national security sector, while analyzing the economic interest of individuals, organizations and the state itself that were favoring such a development. In the course of our research we established how, as the state narrowed its activities down to more vital and more dangerous fields of work, this opened up space for independent contractors to enter those fields which carried less systemic risk. Such change was made possible in the post-Cold War context, when many of the former service members were hired by private companies. The economic motive had a role to play as well, given the need for additional security going beyond what state offered to its citizens, as many doubted the ability (efficiency of state to provide it in the first place; and private sector's willingness to provide it for a price. In Serbia, position of non-state security sector is still very much limited by the traditional notion of security as well as the division of competences, both left-overs from socialist times. This goes against positive tendencies within the sector itself (improvement of types and specialization of the security as service; strengthening of legal regulation; flexibility of services being offered. By conducting its basic service and improving the security of its clients, representatives of non-state security sector are - indirectly - improving the security of society as a whole, ensuring economic stability, which presents one of key national interests.

  11. Data Security by Preprocessing the Text with Secret Hiding

    OpenAIRE

    Ajit Singh; Upasana Jauhari

    2012-01-01

    With the advent of the Internet, an open forum, the massive increase in the data travel across networkmake an issue for secure transmission. Cryptography is the term that involves many encryption method to make data secure. But the transmission of the secure data is an intricate task. Steganography here comes with effect of transmission without revealing the secure data. The research paper provide the mechanism which enhance the security of data by using a crypto+stegano combination to increa...

  12. A STUDY ON BIOMETRIC TEMPLATE SECURITY

    Directory of Open Access Journals (Sweden)

    N. Radha

    2010-07-01

    Full Text Available The increasing popularity of biometrics and cryptography is driven by the widespread stipulation on information security. Abundant efforts have been made in developing successful methods in these areas in order to accomplish an enhanced level of information security. There are two dominant issues in information security enhancement. One is to defend the user ownership and control the access to information by authenticating an individual’s identity. The other is to make sure the privacy and integrity of information and to secure communication. Cryptography is the science of writing in secret code. Secret-key cryptography and public-key cryptography are the two most important cryptographic architectures. The security of a cryptographic system is reliant on the secrecy of the cryptographic key. Biometric authentication or simply biometrics refers to establishing automatic personal recognition based on the physical and behavioral characteristics of an individual (e.g. face, voice, fingerprint, gait, hand geometry, iris, gene, etc.. Biometrics offers superior security and easier than traditional identity authentication systems (based on passwords and cryptographic keys.Since biometrics characteristics are naturally related with a particular individual, making them insusceptible to being stolen, forgotten, lost or attached. This paper presents a survey on various techniques proposed earlier in developing an authentication system for ensuring individual’s information security by combining biometric characteristics of that particular individual and the cryptographic techniques. In addition, it provides some fundamental idea for future research that may help in eliminating the problems associated with the present authentication systems.

  13. Post 9-11 Security Issues for Non-Power Reactor Facilities

    International Nuclear Information System (INIS)

    Zaffuts, P. J.

    2003-01-01

    This paper addresses the legal and practical issues arising out of the design and implementation of a security-enhancement program for non power reactor nuclear facilities. The security enhancements discussed are derived from the commercial nuclear power industry's approach to security. The nuclear power industry's long and successful experience with protecting highly sensitive assets provides a wealth of information and lessons that should be examined by other industries contemplating security improvements, including, but not limited to facilities using or disposing of nuclear materials. This paper describes the nuclear industry's approach to security, the advantages and disadvantages of its constituent elements, and the legal issues that facilities will need to address when adopting some or all of these elements in the absence of statutory or regulatory requirements to do so

  14. Post 9-11 Security Issues for Non-Power Reactor Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Zaffuts, P. J.

    2003-02-25

    This paper addresses the legal and practical issues arising out of the design and implementation of a security-enhancement program for non power reactor nuclear facilities. The security enhancements discussed are derived from the commercial nuclear power industry's approach to security. The nuclear power industry's long and successful experience with protecting highly sensitive assets provides a wealth of information and lessons that should be examined by other industries contemplating security improvements, including, but not limited to facilities using or disposing of nuclear materials. This paper describes the nuclear industry's approach to security, the advantages and disadvantages of its constituent elements, and the legal issues that facilities will need to address when adopting some or all of these elements in the absence of statutory or regulatory requirements to do so.

  15. A fuzzy genetic approach for network reconfiguration to enhance voltage stability in radial distribution systems

    Energy Technology Data Exchange (ETDEWEB)

    Sahoo, N.C. [Faculty of Engineering and Technology, Multimedia University, Jalan Ayer Keroh Lama, Bukit Beruang, 75450 Melaka (Malaysia); Prasad, K. [Faculty of Information Science and Technology, Multimedia University, Jalan Ayer Keroh Lama, Bukit Beruang, 75450 Melaka (Malaysia)

    2006-11-15

    This paper presents a fuzzy genetic approach for reconfiguration of radial distribution systems (RDS) so as to maximize the voltage stability of the network for a specific set of loads. The network reconfiguration involves a mechanism for selection of the best set of branches to be opened, one from each loop, such that the reconfigured RDS possesses desired performance characteristics. This discrete solution space is better handled by the proposed scheme, which maximizes a suitable optimizing function (computed using two different approaches). In the first approach, this function is chosen as the average of a voltage stability index of all the buses in the RDS, while in the second approach, the complete RDS is reduced to a two bus equivalent system and the optimizing function is the voltage stability index of this reduced two bus system. The fuzzy genetic algorithm uses a suitable coding and decoding scheme for maintaining the radial nature of the network at every stage of genetic evolution, and it also uses a fuzzy rule based mutation controller for efficient search of the solution space. This method, tested on 69 bus and 33 bus RDSs, shows promising results for the both approaches. It is also observed that the network losses are reduced when the voltage stability is enhanced by the network reconfiguration. (author)

  16. Raman Spectroscopy for Homeland Security Applications

    Directory of Open Access Journals (Sweden)

    Gregory Mogilevsky

    2012-01-01

    Full Text Available Raman spectroscopy is an analytical technique with vast applications in the homeland security and defense arenas. The Raman effect is defined by the inelastic interaction of the incident laser with the analyte molecule’s vibrational modes, which can be exploited to detect and identify chemicals in various environments and for the detection of hazards in the field, at checkpoints, or in a forensic laboratory with no contact with the substance. A major source of error that overwhelms the Raman signal is fluorescence caused by the background and the sample matrix. Novel methods are being developed to enhance the Raman signal’s sensitivity and to reduce the effects of fluorescence by altering how the hazard material interacts with its environment and the incident laser. Basic Raman techniques applicable to homeland security applications include conventional (off-resonance Raman spectroscopy, surface-enhanced Raman spectroscopy (SERS, resonance Raman spectroscopy, and spatially or temporally offset Raman spectroscopy (SORS and TORS. Additional emerging Raman techniques, including remote Raman detection, Raman imaging, and Heterodyne imaging, are being developed to further enhance the Raman signal, mitigate fluorescence effects, and monitor hazards at a distance for use in homeland security and defense applications.

  17. Selecting RMF Controls for National Security Systems

    Energy Technology Data Exchange (ETDEWEB)

    Witzke, Edward L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-08-01

    In 2014, the United States Department of Defense started tra nsitioning the way it performs risk management and accreditation of informatio n systems to a process entitled Risk Management Framework for DoD Information Technology or RMF for DoD IT. There are many more security and privacy contro ls (and control enhancements) from which to select in RMF, than there w ere in the previous Information Assurance process. This report is an attempt t o clarify the way security controls and enhancements are selected. After a brief overview and comparison of RMF for DoD I T with the previously used process, this report looks at the determination of systems as National Security Systems (NSS). Once deemed to be an NSS, this report addr esses the categorization of the information system with respect to impact level s of the various security objectives and the selection of an initial baseline o f controls. Next, the report describes tailoring the controls through the use of overl ays and scoping considerations. Finally, the report discusses organizatio n-defined values for tuning the security controls to the needs of the information system.

  18. Cyber Security and Resilient Systems

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  19. Cyber Security and Resilient Systems

    International Nuclear Information System (INIS)

    Anderson, Robert S.

    2009-01-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation's cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested - both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  20. Application of electrolyzer system to enhance frequency stabilization effect of microturbine in a microgrid system

    Energy Technology Data Exchange (ETDEWEB)

    Vachirasricirikul, Sitthidet [Department of Electrical Engineering, Faculty of Engineering, King Mongkut' s Institute of Technology Ladkrabang, Bangkok 10520 (Thailand); Ngamroo, Issarachai; Kaitwanidvilai, Somyot [Center of Excellence for Innovative Energy Systems, King Mongkut' s Institute of Technology Ladkrabang, Bangkok 10520 (Thailand)

    2009-09-15

    It is well known that the power output of microturbine can be controlled to compensate for load change and alleviate the system frequency fluctuations. Nevertheless, the microturbine may not adequately compensate rapid load change due to its slow dynamic response. Moreover, when the intermittent power generations from wind power and photovoltaic are integrated into the system, they may cause severe frequency fluctuation. In order to study the fast dynamic response, this paper applies electrolyzer system to absorb these power fluctuations and enhance the frequency control effect of microturbine in the microgrid system. The robust coordinated controller of electrolyzer and microturbine for frequency stabilization is designed based on a fixed-structure H{sub {infinity}} loop shaping control. Simulation results exhibit the robustness and stabilizing effects of the proposed coordinated electrolyzer and microturbine controllers against system parameters variation and various operating conditions. (author)

  1. Stability enhancement of an electrically tunable colloidal photonic crystal using modified electrodes with a large electrochemical potential window

    Energy Technology Data Exchange (ETDEWEB)

    Shim, HongShik [Samsung Advanced Institute of Technology, Yongin-Si, Gyeonggi-do (Korea, Republic of); Department of Chemistry, Seoul National University, Seoul (Korea, Republic of); Gyun Shin, Chang; Heo, Chul-Joon; Jeon, Seog-Jin; Jin, Haishun; Woo Kim, Jung; Jin, YongWan; Lee, SangYoon; Gyu Han, Moon, E-mail: moongyu.han@samsung.com, E-mail: jinklee@snu.ac.kr [Samsung Advanced Institute of Technology, Yongin-Si, Gyeonggi-do (Korea, Republic of); Lim, Joohyun; Lee, Jin-Kyu, E-mail: moongyu.han@samsung.com, E-mail: jinklee@snu.ac.kr [Department of Chemistry, Seoul National University, Seoul (Korea, Republic of)

    2014-02-03

    The color tuning behavior and switching stability of an electrically tunable colloidal photonic crystal system were studied with particular focus on the electrochemical aspects. Photonic color tuning of the colloidal arrays composed of monodisperse particles dispersed in water was achieved using external electric field through lattice constant manipulation. However, the number of effective color tuning cycle was limited due to generation of unwanted ions by electrolysis of the water medium during electrical switching. By introducing larger electrochemical potential window electrodes, such as conductive diamond-like carbon or boron-doped diamond, the switching stability was appreciably enhanced through reducing the number of ions generated.

  2. Cyber Security in Digital I and C Implementation

    Energy Technology Data Exchange (ETDEWEB)

    Chow, Ivan; Hsu, Allen; Kim, Jong Min; Luo, William [Doosan HF Controls, Texas (United States)

    2011-08-15

    During the Nuclear Regulatory Commission (NRC) audit process of Doosan HF Control HFC-6000 safety system 2009, cyber security assessment was a major audit process. The result of the assessment was favorably satisfied. As preventing digital I and C systems from being hijacked by malicious software a major goal for the NRC, audit process of actual digital I and C implementations such as the HFC-6000 safety system which provides already strong cyber security measures is mutually beneficial to both the NRC and the vendor: NRC can enhance their set of cyber security assessments and vendors such as Doosan HFC can also augment their cyber security measures. The NRC Safety Evaluation Report (SER) for the HFC-6000 system was released in April 2011 qualifying the system to be used as safety systems in US nuclear power plants. This paper provides the summary of the cyber security assessment of the complete software life cycle of HFC-6000 Safety System. Lessons learned in each life cycle phase are provided. In addition, alternate measures or recommendations for enhancing the cyber security in each life cycle phase are also described.

  3. Cyber Security in Digital I and C Implementation

    International Nuclear Information System (INIS)

    Chow, Ivan; Hsu, Allen; Kim, Jong Min; Luo, William

    2011-01-01

    During the Nuclear Regulatory Commission (NRC) audit process of Doosan HF Control HFC-6000 safety system 2009, cyber security assessment was a major audit process. The result of the assessment was favorably satisfied. As preventing digital I and C systems from being hijacked by malicious software a major goal for the NRC, audit process of actual digital I and C implementations such as the HFC-6000 safety system which provides already strong cyber security measures is mutually beneficial to both the NRC and the vendor: NRC can enhance their set of cyber security assessments and vendors such as Doosan HFC can also augment their cyber security measures. The NRC Safety Evaluation Report (SER) for the HFC-6000 system was released in April 2011 qualifying the system to be used as safety systems in US nuclear power plants. This paper provides the summary of the cyber security assessment of the complete software life cycle of HFC-6000 Safety System. Lessons learned in each life cycle phase are provided. In addition, alternate measures or recommendations for enhancing the cyber security in each life cycle phase are also described

  4. The economic security of power plants

    Directory of Open Access Journals (Sweden)

    Niedziółka Dorota

    2017-01-01

    Full Text Available Currently, power plants in Poland have to work in a very uncomfortable situation. Unstable market conditions and frequent changes in the law may have serious adverse consequences for their economic security. Power plants play a very important role in the economy. The effectiveness of their performance affects the activity of all other businesses. Therefore, it is very important to provide a definition of economic security for the power plants’ sector and the factors determining its level. Maintaining economic security will allow energy generation companies to grow in a sustainable way as well as limit operational risk. A precise definition can also be used to create analytical tools for economic security measurement and monitoring. Proper usage of such tools can help energy generation companies sustain their economic security and properly plan their capital expenditures. The article focuses on the definition of economic security in the “micro” context of a separate business unit (enterprise. We also present an analytical model that measures economic security of a company engaged in the production of energy - a company of strategic importance for the national economy. The model uses macroeconomic variables, variables describing prices of raw material and legal / political stability in the country, as well as selected financial indicators. The appliance of conclusions resulting from the model’s implementation will help provide economic security for companies generating energy.

  5. Observation of enhanced nuclear stability near the 162 neutron shell

    Energy Technology Data Exchange (ETDEWEB)

    Lougheed, R.W.; Moody, K.J.; Wild, J.F.; Hulet, E.K.; McQuaid, J.H. [Lawrence Livermore National Lab., CA (United States); Lazarev, Yu.A.; Lobanov, Yu.V.; Oganessian, Yu.Ts.; Utyonkov, V.K.; Abdullin, F.Sh.; Buklanov, G.V.; Gikal, B.N.; Iliev, S.; Mezentsev, A.N.; Polyakov, A.N.; Sedykh, I.M.; Shirokovsky, I.V.; Subbotin, V.G.; Sukhov, A.M.; Tsyganov, Yu.S.; Zhuchko, V.E. [Joint Inst. for Nuclear Research, Dubna (Russian Federation)

    1993-09-22

    In bombardments of {sup 248}Cm with {sup 22}Ne the authors discovered two new isotopes, {sup 265}106 and {sup 266}106, by establishing genetic links between {alpha} decays of the 106 nuclides and SF or {alpha} decays of the daughter (grand-daughter) nuclides. For {sup 266}106 they measured E{sub {alpha}}=8.62{+-}0.06 MeV followed by the SF decay of {sup 262}104 for which they measured a half-life value of 1.2{sup +1.0}{sub {minus}0.5} s. For {sup 265}106 they measured E{sub {alpha}}=8.82{+-}0.06 MeV. They estimated {alpha} half-lives of 10-30 s for {sup 266}106 and 2-30 s for {sup 265}106 with SF branches of {approximately}50% or less. The decay properties of {sup 266}106 indicate a large enhancement in the SF stability of this N=160 nuclide and confirm the existence of the predicted neutron-deformed shell N=162.

  6. Indicators of energy security in industrialised countries

    International Nuclear Information System (INIS)

    Loeschel, Andreas; Moslener, Ulf; Ruebbelke, Dirk T.G.

    2010-01-01

    Energy security has become a popular catch phrase, both in the scientific arena as well as in the political discussion. Yet, in general the applied concepts of energy security are rather vague. This paper sheds some light on concepts and indicators of energy security. First, we conceptually discuss the issue of energy supply security and explain why it is not to handle by one science alone and what economics may contribute in order to structure the topic. After providing a brief survey of existing attempts to define or measure energy security we suggest an additional dimension along which indicators of energy security may be classified: ex-post and ex-ante indicators. Finally, we illustrate our concept on the basis of several simplified indicators. While ex-post indicators are mostly based on price developments, ex-ante indicators are to a greater extent aimed at illustrating potential problems. Our illustration suggests that it is worthwhile to take into account the market structure along with the political stability of exporting countries. (author)

  7. Surface-stabilized gold nanocatalysts

    Science.gov (United States)

    Dai, Sheng [Knoxville, TN; Yan, Wenfu [Oak Ridge, TN

    2009-12-08

    A surface-stabilized gold nanocatalyst includes a solid support having stabilizing surfaces for supporting gold nanoparticles, and a plurality of gold nanoparticles having an average particle size of less than 8 nm disposed on the stabilizing surfaces. The surface-stabilized gold nanocatalyst provides enhanced stability, such as at high temperature under oxygen containing environments. In one embodiment, the solid support is a multi-layer support comprising at least a first layer having a second layer providing the stabilizing surfaces disposed thereon, the first and second layer being chemically distinct.

  8. Ternary system of dihydroartemisinin with hydroxypropyl-β-cyclodextrin and lecithin: simultaneous enhancement of drug solubility and stability in aqueous solutions.

    Science.gov (United States)

    Wang, Dan; Li, Haiyan; Gu, Jingkai; Guo, Tao; Yang, Shuo; Guo, Zhen; Zhang, Xueju; Zhu, Weifeng; Zhang, Jiwen

    2013-09-01

    The purpose of this study was to simultaneously improve the solubility and stability of dihydroartemisinin (DHA) in aqueous solutions by a ternary cyclodextrin system comprised of DHA, hydroxypropyl-β-cyclodextrin (HP-β-CD) and a third auxiliary substance. Solubility and phase solubility studies were carried out to evaluate the solubilizing efficiency of HP-β-CD in association with various auxiliary substances. Then, the solid binary (DHA-HP-β-CD or DHA-lecithin) and ternary systems were prepared and characterized by Fourier transform infrared (FT-IR), differential scanning calorimetry (DSC) and power X-ray diffraction (PXRD). The effect of the ternary system on the solubility, dissolution and stability of DHA in aqueous solutions was also investigated. As a result, the soybean lecithin was found to be the most promising third component in terms of solubility enhancement. For the solid characterization, the disappearance of the drug crystallinity indicated the formation of new solid phases, implicating the formation of the ternary system. The dissolution rate of the solid ternary system was much faster than that of the drug alone and binary systems. Importantly, compared with binary systems, the ternary system showed a significant improvement in the stability of DHA in Hank's balanced salt solutions (pH 7.4). The solubility and stability of DHA in aqueous solutions were simultaneously enhanced by the ternary system, which might be attributed to the possible formation of a ternary complex. For the ternary interactions, results of molecular docking studies further indicated that the lecithin covered the top of the wide rim of HP-β-CD and surrounded around the peroxide bridging of DHA, providing the possibility for the ternary complex formation. In summary, the ternary system prepared in our study, with simultaneous enhancement of DHA solubility and stability in aqueous solutions, might have an important pharmaceutical potential in the development of a better

  9. Safeguard management for operation security in nuclear power plants (NPPs)

    International Nuclear Information System (INIS)

    Woo, Tae-Ho; Lee, Un-Chul

    2011-01-01

    Safeguard modeling is conducted for the successful operations in the nuclear power plants (NPPs). The characteristics of the secure operation in NPPs are investigated using the network effect method which is quantified by the Monte-Carlo algorithm. Fundamentally, it is impossible to predict the exact time of a terror incident. So, the random sampling for the event frequency is a reasonable method, including the characteristics of network effect method such as the zero-sum quantification. The performance of operation with safeguard is the major concern of this study. There are three kinds of considerations as the neutronics, thermo-hydraulics, and safeguard properties which are organized as an aspect of safeguard considerations. The result, therefore, can give the stability of the operations when the power is decided. The maximum value of secure operation is 12.0 in the third month and the minimum value is 1.0 in the 18th and 54th months, in a 10 years period. Thus, the stability of the secure power operation increases 12 times higher than the lowest value according to this study. This means that the secure operation is changeable in the designed NPPs and the dynamical situation of the secure operation can be shown to the operator.

  10. Enhancing security of DICOM images during storage and ...

    Indian Academy of Sciences (India)

    Brain tumour Image is in DICOM standard (Rosslyn 1996) in which the patient informa- tion including name, birth date, gender, history are included in object classes. This information is sensitive to the patient and important for radiologist diagnosis. Data security becomes an important issue when brain tumour images are ...

  11. Work security in a global economy.

    Science.gov (United States)

    Rosskam, Ellen

    2003-01-01

    Work security is a fundamental right of all working people. After World War II, the welfare state became an intrinsic part of the "Golden Age" of capitalism, in which universal prosperity seemed attainable. Workers' organizations frequently played a crucial role in policy decisions that promoted full employment, income stability, and equitable treatment of workers. Today's world order is quite different. Globalization in its present form is a major obstacle to work security. Globalization is not simply a market-driven phenomenon. It is a political and ideological movement that grants authority to capital over governments and labor. This transfer of authority hinders national efforts to promote work security and may impact the well-being of communities worldwide. In the absence of domestic autonomy, international labor standards are needed to protect social welfare. They should be geared toward curbing unemployment, poverty, and social exclusion in the global economy. The article looks at three initiatives to promote global work security.

  12. AY 2007-2008 Achieving U.S. Energy Security: Energy Industry Sector Report Seminar 8

    National Research Council Canada - National Science Library

    2008-01-01

    ...; the ability to generate and exploit inexpensive energy underpins that strength. Therefore, the United States has a vital interest in ensuring the viability and stability of the global energy system and securing its energy security...

  13. Evaluation of enhanced thermostability and operational stability of carbonic anhydrase from Micrococcus species.

    Science.gov (United States)

    Bhattacharya, Abhishek; Shrivastava, Ankita; Sharma, Anjana

    2013-06-01

    Carbonic anhydrase (CA) was purified from Micrococcus lylae and Micrococcus luteus with 49.90 and 53.8 % yield, respectively, isolated from calcium carbonate kilns. CA from M. lylae retained 80 % stability in the pH and temperature range of 6.0-8.0 and 35-45 °C, respectively. However, CA from M. luteus was stable in the pH and temperature range of 7.5-10.0 and 35-55 °C, respectively. Cross-linked enzyme aggregates (CLEAs) raised the transition temperature of M. lylae and M. luteus CA up to 67.5 and 74.0 °C, while the operational stability (T(1/20) of CA at 55 °C was calculated to be 7.7 and 12.0 h, respectively. CA from both the strains was found to be monomeric in nature with subunit molecular weight and molecular mass of 29 kDa. Ethoxozolamide was identified as the most potent inhibitor based on both IC(50) values and inhibitory constant measurement (K(i)). The K(m) and V(max) for M. lylae CA (2.31 mM; 769.23 μmol/mg/min) and M. luteus CA (2.0 mM; 1,000 μmol/mg/min) were calculated from Lineweaver-Burk plots in terms of esterase activity. Enhanced thermostability of CLEAs alleviates its role in operational stability for application at an on-site scrubber. The characteristic profile of purified CA from Micrococcus spp. advocates its effective application in biomimetic CO(2) sequestration.

  14. Enhanced rearrangement technique for secure data transmission: case study credit card process

    Science.gov (United States)

    Vyavahare, Tushar; Tekade, Darshana; Nayak, Saurabh; kumar, N. Suresh; Blessy Trencia Lincy, S. S.

    2017-11-01

    Encryption of data is very important in order to keep the data secure and make secure transactions and transmission of data. Such as online shopping. whenever we give our card details there is possibility of data being hacked or intruded. So to secure that we need to encrypt the data and decryption strategy should be known only to that particular bank. Therefore to achieve this objective RSA algorithm can be used. Where only intended sender and receiver can know about the encryption and decryption of data. To make the RSA technique more secure in this paper we propose the technique we call it Modified RSA. for which a transposition module is designed which uses Row Transposition method to encrypt the data. Before giving the card details to RSA the input will be given to this transposition module which will scrambles the data and rearranges it. Output of transposition will be then provided to the modified RSA which produces the cipher text to send over the network. Use of RSA and the transposition module will provide the dual security to whole system.

  15. A Design Methodology for Computer Security Testing

    OpenAIRE

    Ramilli, Marco

    2013-01-01

    The field of "computer security" is often considered something in between Art and Science. This is partly due to the lack of widely agreed and standardized methodologies to evaluate the degree of the security of a system. This dissertation intends to contribute to this area by investigating the most common security testing strategies applied nowadays and by proposing an enhanced methodology that may be effectively applied to different threat scenarios with the same degree of effectiveness. ...

  16. Nanostructured polyurethane perylene bisimide ester assemblies with tuneable morphology and enhanced stability

    Science.gov (United States)

    Zhang, Xiaoxiao; Gong, Tingyuan; Chi, Hong; Li, Tianduo

    2018-03-01

    Size control has been successfully achieved in inorganic materials, but it remains a challenge in polymer nanomaterials due to their polydispersity. Here, we report a facile approach to tailor the diameters of polyurethane (PU) nanoparticles (490 nm, 820 nm and 2.1 µm) via perylene bisimide (PBI) assisted self-assembly. The formed morphologies such as spindle, spherical and core-shell structures depend on the ratio of PBI and polymer concentrations. It is shown that the formation of PU nanoparticles is directed by π-π stacking of PBI and the morphology transition is not only affected by the amount of PBI incorporated, but also influenced by solvent, which controls the initial evaporation balance. Furthermore, the prepared PUs exhibit retained optical stability and enhanced thermal stability. The PUs, designed to have conjugated PBI segments in backbones, were synthesized via ring-opening and condensation reactions. Compared with the neat PU, gel permeation chromatography shows narrower molecular weight distribution. Fluorescence spectra and ultraviolet-visible spectra indicate retained maximum emission wavelength of PBI at 574 nm and 5.2% quantum yields. Thermo-gravimetric analysis and differential scanning calorimetry reveal 79°C higher decomposition temperature and 22°C higher glass transition temperature. This study provides a new way to fabricate well-defined nanostructures of functionalized PUs.

  17. CENTER FOR CYBER SECURITY STUDIES

    Data.gov (United States)

    Federal Laboratory Consortium — The mission of the Center for Cyber Security Studies is to enhance the education of midshipmen in all areas of cyber warfare, to facilitate the sharing of expertise...

  18. Air Force Strategy: Sovereign Options for Securing Global Stability and Prosperity

    National Research Council Canada - National Science Library

    2008-01-01

    ... competition for resources and influence. This strategic context demands that we retain our position of international political and military leadership because security and economic health closely intertwine with international political...

  19. Enhancement of thermo-stability and product tolerance of Pseudomonas putida nitrile hydratase by fusing with self-assembling peptide.

    Science.gov (United States)

    Liu, Yi; Cui, Wenjing; Liu, Zhongmei; Cui, Youtian; Xia, Yuanyuan; Kobayashi, Michihiko; Zhou, Zhemin

    2014-09-01

    Self-assembling amphipathic peptides (SAPs) are the peptides that can spontaneously assemble into ordered nanostructures. It has been reported that the attachment of SAPs to the N- or C-terminus of an enzyme can benefit the thermo-stability of the enzyme. Here, we discovered that the thermo-stability and product tolerance of nitrile hydratase (NHase) were enhanced by fusing with two of the SAPs (EAK16 and ELK16). When the ELK16 was fused to the N-terminus of β-subunit, the resultant NHase (SAP-NHase-2) became an active inclusion body; EAK16 fused NHase in the N-terminus of β-subunit (SAP-NHase-1) and ELK16 fused NHase in the C-terminus of β-subunit (SAP-NHase-10) did not affect NHase solubility. Compared with the deactivation of the wild-type NHase after 30 min incubation at 50°C, SAP-NHase-1, SAP-NHase-2 and SAP-NHase-10 retained 45%, 30% and 50% activity; after treatment in the buffer containing 10% acrylamide, the wild-type retained 30% activity, while SAP-NHase-1, SAP-NHase-2 and SAP-NHase-10 retained 52%, 42% and 55% activity. These SAP-NHases with enhanced thermo-stability and product tolerance would be helpful for further industrial applications of the NHase. Copyright © 2014 The Society for Biotechnology, Japan. Published by Elsevier B.V. All rights reserved.

  20. Enhanced electrochemical stability of carbon-coated antimony nanoparticles with sodium alginate binder for sodium-ion batteries

    Directory of Open Access Journals (Sweden)

    Jianmin Feng

    2018-04-01

    Full Text Available The poor cycling stability of antimony during a repeated sodium ion insertion and desertion process is the key issue, which leads to an unsatisfactory application as an anode material in a sodium-ion battery. Addressed at this, we report a facile two-step method to coat antimony nanoparticles with an ultrathin carbon layer of few nanometers (denoted Sb@C NPs for sodium-ion battery anode application. This carbon layer could buffer the volume change of antimony in the charge-discharge process and improve the battery cycle performance. Meanwhile, this carbon coating could also enhance the interfacial stability by firmly connecting the sodium alginate binders through its oxygen-rich surface. Benefitted from these advantages, an improved initial discharge capacity (788.5 mA h g−1 and cycling stability capacity (553 mA h g−1 after 50 times cycle have been obtained in a battery using Sb@C NPs as anode materials at 50 mA g−1. Keywords: Sodium-ion battery, Antimony, Sodium alginate, Liquid-phase reduction, Carbon coating

  1. Radioactive source security: the cultural challenges

    International Nuclear Information System (INIS)

    Englefield, Chris

    2015-01-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. (authors)

  2. A Methodology to Integrate Security and Cost-effectiveness in ATM

    OpenAIRE

    Matarese, Francesca; Montefusco, Patrizia; Neves, José; Rocha, André

    2014-01-01

    The objective of this paper is the definition of a new methodology for carrying out security risk assessment in the air traffic management (ATM) domain so as to enhance security awareness and integrate secure and cost-effective design objectives. This process is carried out by modelling the system, identifying the assets, threats and vulnerabilities, prioritizing the threats and proposing cost-effective countermeasures for the weaknesses found. ATM security is concerned with securing ATM a...

  3. Extensions and Enhancements to “the Secure Remote Update Protocol”

    Directory of Open Access Journals (Sweden)

    Andrew John Poulter

    2017-09-01

    Full Text Available This paper builds on previous work introducing the Secure Remote Update Protocol (SRUP, a secure communications protocol for Command and Control applications in the Internet of Things, built on top of MQTT. This paper builds on the original protocol and introduces a number of additional message types: adding additional capabilities to the protocol. We also discuss the difficulty of proving that a physical device has an identity corresponding to a logical device on the network and propose a mechanism to overcome this within the protocol.

  4. Transient stability enhancement of wind farms connected to a multi-machine power system by using an adaptive ANN-controlled SMES

    International Nuclear Information System (INIS)

    Muyeen, S.M.; Hasanien, Hany M.; Al-Durra, Ahmed

    2014-01-01

    Highlights: • We present an ANN-controlled SMES in this paper. • The objective is to enhance transient stability of WF connected to power system. • The control strategy depends on a PWM VSC and DC–DC converter. • The effectiveness of proposed controller is compared with PI controller. • The validity of the proposed system is verified by simulation results. - Abstract: This paper presents a novel adaptive artificial neural network (ANN)-controlled superconducting magnetic energy storage (SMES) system to enhance the transient stability of wind farms connected to a multi-machine power system during network disturbances. The control strategy of SMES depends mainly on a sinusoidal pulse width modulation (PWM) voltage source converter (VSC) and an adaptive ANN-controlled DC–DC converter using insulated gate bipolar transistors (IGBTs). The effectiveness of the proposed adaptive ANN-controlled SMES is then compared with that of proportional-integral (PI)-controlled SMES optimized by response surface methodology and genetic algorithm (RSM–GA) considering both of symmetrical and unsymmetrical faults. For realistic responses, real wind speed data and two-mass drive train model of wind turbine generator system is considered in the analyses. The validity of the proposed system is verified by the simulation results which are performed using the laboratory standard dynamic power system simulator PSCAD/EMTDC. Notably, the proposed adaptive ANN-controlled SMES enhances the transient stability of wind farms connected to a multi-machine power system

  5. Enhancing probiotic stability in industrial processes

    Directory of Open Access Journals (Sweden)

    Miguel Gueimonde

    2012-06-01

    Full Text Available Background: Manufacture of probiotic products involves industrial processes that reduce the viability of the strains. This lost of viability constitutes an economic burden for manufacturers, compromising the efficacy of the product and preventing the inclusion of probiotics in many product categories. Different strategies have been used to improve probiotic stability during industrial processes. These include technological approaches, such as the modification of production parameters or the reformulation of products, as well as microbiological approaches focused on the strain intrinsic resistance. Among the later, both selection of natural strains with the desired properties and stress-adaptation of strains have been widely used. Conclusion: During recent years, the knowledge acquired on the molecular basis of stress-tolerance of probiotics has increased our understanding on their responses to industrial stresses. This knowledge on stress-response may nowadays be used for the selection of the best strains and industrial conditions in terms of probiotic stability in the final product.

  6. Making Stability Operations Less Complex While Improving Interoperability

    National Research Council Canada - National Science Library

    Chaum, Erik; Christman, Gerard

    2008-01-01

    Military support for stability, security, transition, and reconstruction as well as humanitarian assistance / disaster relief operations is as important and complex an endeavor as is major combat operations...

  7. National Security and National Development: A Critique

    African Journals Online (AJOL)

    DR Nneka

    There has been the tendency right from independence to view national ... the nation's economic underdevelopment, which has led to social injustice, ... For a nation, security connotes conditions of peace, stability, order ... They are very important for the ... According to Mathew (1989), Global development now suggests.

  8. Prospects for stability in a nuclear subcontinent

    International Nuclear Information System (INIS)

    Rajagopal, S; Chari, Sridhar K.

    2003-01-01

    This book explore the prospects for stability in a nuclear sub-continent. The nonproliferation regimes and nuclear threat reduction, nonproliferation regimes and south asia - is there a meeting point?; maintaining a threshold of strategic autonomy at least cost: continuity in the evolution of India's nuclear policies; role of nuclear doctrines and the state of the armed forces in South Asia; nuclear weapons, deterrence and stability in the international system: South Asian dynamics; assessing China's Asian role and security policies; Kargil war to current threat of war: prospects for stability; discussion; international terrorism and its impact on South Asian stability; a view from Bangladesh etc. are some of the topics covered

  9. Cross-linked aromatic cationic polymer electrolytes with enhanced stability for high temperature fuel cell applications

    DEFF Research Database (Denmark)

    Ma, Wenjia; Zhao, Chengji; Yang, Jingshuai

    2012-01-01

    Diamine-cross-linked membranes were prepared from cross-linkable poly(arylene ether ketone) containing pendant cationic quaternary ammonium group (QPAEK) solution by a facile and general thermal curing method using 4,4′-diaminodiphenylmethane with rigid framework and 1,6-diaminohexane with flexible...... anchoring of the molecule. Combining the excellent thermal stability, the addition of a small amount of diamines enhanced both the chemical and mechanical stability and the phosphoric acid doping (PA) ability of membranes. Fuel cell performance based on impregnated cross-linked membranes have been...... successfully operated at temperatures up to 120 °C and 180 °C with unhumidified hydrogen and air under ambient pressure, the maximum performance of diamine-cross-linked membrane is observed at 180 °C with a current density of 1.06 A cm−2 and the peak power density of 323 mW cm−2. The results also indicate...

  10. Adaptive and freeze-tolerant heteronetwork organohydrogels with enhanced mechanical stability over a wide temperature range

    Science.gov (United States)

    Gao, Hainan; Zhao, Ziguang; Cai, Yudong; Zhou, Jiajia; Hua, Wenda; Chen, Lie; Wang, Li; Zhang, Jianqi; Han, Dong; Liu, Mingjie; Jiang, Lei

    2017-06-01

    Many biological organisms with exceptional freezing tolerance can resist the damages to cells from extra-/intracellular ice crystals and thus maintain their mechanical stability at subzero temperatures. Inspired by the freezing tolerance mechanisms found in nature, here we report a strategy of combining hydrophilic/oleophilic heteronetworks to produce self-adaptive, freeze-tolerant and mechanically stable organohydrogels. The organohydrogels can simultaneously use water and oil as a dispersion medium, and quickly switch between hydrogel- and organogel-like behaviours in response to the nature of the surrounding phase. Accordingly, their surfaces display unusual adaptive dual superlyophobic in oil/water system (that is, they are superhydrophobic under oil and superoleophobic under water). Moreover, the organogel component can inhibit the ice crystallization of the hydrogel component, thus enhancing the mechanical stability of organohydrogel over a wide temperature range (-78 to 80 °C). The organohydrogels may have promising applications in complex and harsh environments.

  11. Promoting Agriculture Development for Social Stability in Myanmar

    Science.gov (United States)

    2014-10-30

    employment, and enhanced food security, not all areas of Myanmar will reap these benefits unless the GOUM pursues balanced policies designed to mitigate...greater agricultural output, employment, and enhanced food security, not all areas of Myanmar will reap these benefits unless the GOUM pursues balanced...hilly land with less productive soil and moderate to heavy rainfall. Crops in these two climatic regions are a mix of chilies , vegetables, orchards

  12. Achieving the four dimensions of food security for resettled refugees in Australia: A systematic review.

    Science.gov (United States)

    Lawlis, Tanya; Islam, Wasima; Upton, Penney

    2018-04-01

    Food security is defined by four dimensions: food availability, access, utilisation and stability. Resettled refugees face unique struggles securing these dimensions and, thus, food security when moving to a new country. This systematic review aimed to identify the challenges Australian refugees experience in achieving the four dimensions of food security. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines were followed; the SPIDER tool was used to determine eligibility criteria. Three databases were searched using terms relating to food in/security and refugees from 2000 to 20 May 2017. Seven articles were retained for analysis. Studies were categorised against the four dimensions, with four studies identifying challenges against all dimensions. Challenges contributing to high levels of food insecurity in each dimension included: availability and cost of traditional foods, difficulty in accessing preferred food outlets, limited food knowledge and preparation skills and food stability due to low income and social support. Food insecurity adversely impacts refugee health and integration. Methodical research framed by the four dimensions of food security is imperative to address challenges to securing food security in refugee groups and assisting in the development of sustainable interventions. © 2017 Dietitians Association of Australia.

  13. Biometric Enhancement of Home and Office Security to Reduce ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    Biometrics security technology uses the physiological and ... verification and authentication methodology to verify how facial screening explores the different ... mouth, nose etc and stores the bio-information extracted from the face of every ...

  14. Security, privacy and trust in cloud systems

    CERN Document Server

    Nepal, Surya

    2013-01-01

    The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Service requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes - Cloud security fundamentals and related technologies to-date, with a comprehensive coverage of evolution, current landscape, and future roadmap. - A smooth organization with introductory, advanced and specialist content

  15. IAEA Completes Nuclear Security Advisory Mission in Ecuador

    International Nuclear Information System (INIS)

    2018-01-01

    An International Atomic Energy Agency (IAEA) team of experts today completed a nuclear security advisory mission in Ecuador. The mission was carried out at the request of the Government of Ecuador. The scope of the two-week International Physical Protection Advisory Service (IPPAS) mission included the legislative and regulatory framework for the security of radioactive material, regulatory licensing, inspection and enforcement as well as coordination among authorities and other stakeholders involved in nuclear security. In September 2017, Ecuador ratified the 2005 Amendment to the Convention on the Physical Protection of Nuclear Material (CPPNM) and its incorporation into the nuclear security regime was also included in the scope of the mission. The IPPAS team carried out a number of visits, including to a steel company that uses gamma radiography, two hospitals, the National Polytechnic University and a company that transports radioactive material. In addition, the team visited a temporary storage facility for disused radioactive sources in Alóag, a town about 50 km south of the capital, Quito. The team observed that Ecuador is making efforts towards enhancing its national nuclear security regime. The team provided recommendations and suggestions to support Ecuador in enhancing and sustaining nuclear security. Good practices were identified that can serve as examples to other IAEA Member States to help strengthen their nuclear security activities.

  16. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  17. Enhanced protective properties and UV stability of epoxy/graphene nanocomposite coating on stainless steel

    Directory of Open Access Journals (Sweden)

    H. Alhumade

    2016-12-01

    Full Text Available Epoxy-Graphene (E/G nanocomposites with different loading of graphene were prepared via in situ prepolymerization and evaluated as protective coating for Stainless Steel 304 (SS304. The prepolymer composites were spin coated on SS304 substrates and thermally cured. Transmission Electron Microscopy (TEM and Scanning Electron Microscopy (SEM were utilized to examine the dispersion of graphene in the epoxy matrix. Epoxy and E/G nanocomposites were characterized using X-ray diffraction (XRD and Fourier Transform Infrared (FTIR techniques and the thermal behavior of the prepared coatings is analyzed using Thermogravimetric analysis (TGA and Differential scanning calorimetry (DSC. The corrosion protection properties of the prepared coatings were evaluated using Electrochemical Impedance Spectroscopy (EIS and Cyclic Voltammetry (CV measurements. In addition to corrosion mitigation properties, the long-term adhesion performance of the coatings was evaluated by measuring the adhesion of the coatings to the SS304 substrate after 60 days of exposure to 3.5 wt% NaCl medium. The effects of graphene loading on the impact resistance, flexibility, and UV stability of the coating are analyzed and discussed. SEM was utilized to evaluate post adhesion and UV stability results. The results indicate that very low graphene loading up to 0.5 wt % significantly enhances the corrosion protection, UV stability, and impact resistance of epoxy coatings.

  18. The role of optics in secure credentials

    Science.gov (United States)

    Lichtenstein, Terri L.

    2006-02-01

    The global need for secure ID credentials has grown rapidly over the last few years. This is evident both in government and commercial sectors. Governmental programs include national ID card programs, permanent resident cards for noncitizens, biometric visas or border crossing cards, foreign worker ID programs and secure vehicle registration programs. The commercial need for secure credentials includes secure banking and financial services, security and access control systems and digital healthcare record cards. All of these programs necessitate the use of multiple tamper and counterfeit resistant features for credential authentication and cardholder verification. It is generally accepted that a secure credential should include a combination of overt, covert and forensic security features. The LaserCard optical memory card is a proven example of a secure credential that uses a variety of optical features to enhance its counterfeit resistance and reliability. This paper will review those features and how they interact to create a better credential.

  19. The Relationship between Media Consumption and Feeling of Social Security

    OpenAIRE

    Bijan khajeNoori; Mehdi Kaveh

    2013-01-01

    IntroductionThe concept of social security and a Feeling of security and the citizens, as a key element in achieving the projected, is important Sociologists and criminologist shave always paid special attention has been sought. Study of the factors influencing the feeling of security, can increase the feeling of security is work. Also enhance citizens' feeling of security and welfare of the citizens and to accept responsibility and commitment will do. The widespread use of social media in re...

  20. Security cooperation with China: Analysis and a proposal. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Wilborn, T.L.

    1994-11-25

    The author examines U.S.-China security cooperation before Tiananmen Square; the strategic context in which it took place; and the strategic environment of U.S.-China relations at the present time. As a member of the U.N. Security Council and one of the five acknowledged nuclear powers, China`s actions can influence a wide range of U.S. global interests. Continued U.S.-China security cooperation will contribute to stability in an important region of the world and help achieve U.S. global objectives. He concludes that, although the reasons which justified the program of security cooperation with China during the cold war are irrelevant today, security cooperation and military-to-military relations are highly desirable in the current strategic environment.

  1. Systematic elicitation of cyber-security controls for NPP I and C system

    Energy Technology Data Exchange (ETDEWEB)

    Lee, M. S.; Kim, T. H. [Formal Works Inc., Seoul (Korea, Republic of); Park, S. P. [AhnLab Inc., Seongnam (Korea, Republic of); Kim, Y. M. [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2015-05-15

    Cyber-security implementation starts with a development of a cyber security plan considering characteristics of I and C system. In this paper, we describe a method that develops a cyber security plan for NPP I and C system. Especially, we propose a method for systematic elicitation of technical security controls that should be applied to I and C system. We expect that this study can provide a basis to develop a cyber-security plan for I and C system. Also, the study can contribute enhancing security to NPP I and C system. The rest of the paper is organized as follows: Section 2 introduces activities to develop a cyber-security plan and presents the result of each activity of the security plan. Section 3 concludes the paper. We proposed a method for systematic elicitation of security controls and described the method through examples. Development companies that want to implement cyber-security in I and C system can develop a cyber-security plan and apply the cyber-security program to their system according to our method. We expect that this study can provide a basis to develop a cyber-security plan for I and C system. Also, the study can contribute enhancing security to NPP I and C system.

  2. Systematic elicitation of cyber-security controls for NPP I and C system

    International Nuclear Information System (INIS)

    Lee, M. S.; Kim, T. H.; Park, S. P.; Kim, Y. M.

    2015-01-01

    Cyber-security implementation starts with a development of a cyber security plan considering characteristics of I and C system. In this paper, we describe a method that develops a cyber security plan for NPP I and C system. Especially, we propose a method for systematic elicitation of technical security controls that should be applied to I and C system. We expect that this study can provide a basis to develop a cyber-security plan for I and C system. Also, the study can contribute enhancing security to NPP I and C system. The rest of the paper is organized as follows: Section 2 introduces activities to develop a cyber-security plan and presents the result of each activity of the security plan. Section 3 concludes the paper. We proposed a method for systematic elicitation of security controls and described the method through examples. Development companies that want to implement cyber-security in I and C system can develop a cyber-security plan and apply the cyber-security program to their system according to our method. We expect that this study can provide a basis to develop a cyber-security plan for I and C system. Also, the study can contribute enhancing security to NPP I and C system

  3. Assessment of energy security in China based on ecological network analysis: A perspective from the security of crude oil supply

    International Nuclear Information System (INIS)

    Lu, Weiwei; Su, Meirong; Zhang, Yan; Yang, Zhifeng; Chen, Bin; Liu, Gengyuan

    2014-01-01

    Energy security usually considers both the stability of energy supply and security of energy use and it is receiving increasing attention globally. Considering the strategic importance and sensitivity to international change of the crude oil supply, we decided to examine China’s energy security. An original network model was established based on ecological network analysis to holistically evaluate the security of the crude oil supply in China. Using this model, we found that the security of the crude oil supply in China generally increased from 2001 to 2010. The contribution of different compartments in the network to the overall energy security resembled a pyramid structure, with supply sources at the bottom, the consumption sector at the top, and the refining and transfer sectors in the middle. North and South America made the largest contribution to the security of the crude oil supply in China. We provide suggestions to improve the security of the crude oil supply in China based on our results and further scenario analysis. The original network model provides a new perspective for energy security assessment, which can be used as a baseline to develop other models and policy. - Highlights: • Ecological network analysis (ENA) is introduced into energy security assessment. • A model of crude oil supply network in China is established based on ENA. • A pyramid structure of the contributions of different compartments to energy security was found. • Suggestions for forming a stable network are given to improve energy security

  4. Enhanced way of securing automated teller machine to track the misusers using secure monitor tracking analysis

    Science.gov (United States)

    Sadhasivam, Jayakumar; Alamelu, M.; Radhika, R.; Ramya, S.; Dharani, K.; Jayavel, Senthil

    2017-11-01

    Now a days the people's attraction towards Automated Teller Machine(ATM) has been increasing even in rural areas. As of now the security provided by all the bank is ATM pin number. Hackers know the way to easily identify the pin number and withdraw money if they haven stolen the ATM card. Also, the Automated Teller Machine is broken and the money is stolen. To overcome these disadvantages, we propose an approach “Automated Secure Tracking System” to secure and tracking the changes in ATM. In this approach, while creating the bank account, the bank should scan the iris known (a part or movement of our eye) and fingerprint of the customer. The scanning can be done with the position of the eye movements and fingerprints identified with the shortest measurements. When the card is swiped then ATM should request the pin, scan the iris and recognize the fingerprint and then allow the customer to withdraw money. If somebody tries to break the ATM an alert message is given to the nearby police station and the ATM shutter is automatically closed. This helps in avoiding the hackers who withdraw money by stealing the ATM card and also helps the government in identifying the criminals easily.

  5. A security scheme of SMS system

    Science.gov (United States)

    Zhang, Fangzhou; Yang, Hong-Wei; Song, Chuck

    2005-02-01

    With the prosperous development and the use of SMS, more and more important information need to be transferred through the wireless and mobile networks by the users. But in the GSM/GPRS network, the SMS messages are transferred in text mode through the signaling channel and there is no integrality for SMS messages. Because of the speciality of the mobile communications, the security of signaling channel is very weak. So we need to improve and enhance the security and integrality of SMS. At present, developed investigation based on SMS security is still incomplete. The key distribution and management is not perfect to meet the usability in a wide area. This paper introduces a high-level security method to solve this problem. We design the Secure SMS of GSM/GPRS in order to improve the security of the important information that need to be transferred by the mobile networks. Using this method, we can improve the usability of E-payment and other mobile electronic commerce.

  6. Radioactive source security: the cultural challenges.

    Science.gov (United States)

    Englefield, Chris

    2015-04-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  7. Strengthening Local Safety Nets as a Key to Enhancing the Food Security of Pastoralists in East Africa: A Case Study of the Rendille of Northern Kenya

    OpenAIRE

    SUN, Xiaogang

    2017-01-01

    The increase in climate-change-related natural disasters presents a major threat to the food security of pastoralists in East Africa. This paper explores ways of reducing the dependence on food aid and enhancing the food security of pastoralists through a case study of the Rendille in Northern Kenya. Current Rendille food systems have resulted from adapted livestock herding strategies and loss of nomadic lifestyles, as well as dependence on food aid. Although food aid is included in the livel...

  8. A New Role for Local Police in Radiological Security

    National Research Council Canada - National Science Library

    Lee, Thomas

    2007-01-01

    .... Local police agencies have previously not had a formal role in radiological security. This thesis explores policy initiatives, based on community policing principles conducted at the local police level, which will enhance security at locations where radiological materials are kept.

  9. Latvian Security and Defense Policy within the Twenty-First Century Security Environment

    Directory of Open Access Journals (Sweden)

    Rublovskis Raimonds

    2014-12-01

    Full Text Available The aim of this paper is to analyze fundamental factors which form and profoundly shape security and defense policy of the Republic of Latvia. One can argue that historical background, geographical location, common institutional history within the former Soviet Union, the Russia factor, the relative smallness of the territory of state and the population, the ethnic composition of the population, the low density of the population and rather limited financial and manpower resources available for the defense of the Republic of Latvia are the key factors of influence on the state security and defense policy. The core principles of the security and defense policy of Latvia are the membership in powerful global military alliance of NATO and bilateral strategic partnership with the United States. However, security and defense cooperation among the three Baltic States as well as enhanced cooperation within the Baltic-Nordic framework is seen as an important supplementary factor for the increased security of the Republic of Latvia. Latvia has developed a sustainable legal and institutional framework in order to contribute to state security and defense; however, security challenges and significant changes within the global security environment of the twenty-first century will further challenge the ability of the Republic of Latvia to sustain its current legal framework, and more importantly, current institutional structure of Latvian security and defense architecture. Significant internal and external challenges will impact the fundamental pillars of Latvian security and defense policy, such as American strategic shift to the Pacific, and lack of political will to increase defense budgets in European part of NATO. It has to be clear that very independence, security and defense of the Republic of Latvia depend on the ability of NATO to remain an effective organization with timely and efficient decision-making, and the ability of the United States to remain

  10. Understanding the security management practices of humanitarian organizations.

    Science.gov (United States)

    Bollettino, Vincenzo

    2008-06-01

    Humanitarian organisations operate in increasingly hostile environments. Although authoritative statistics are scarce, anecdotal evidence suggests that aid workers face life-threatening risks that are exacerbated by the growing number of humanitarian organisations operating in the field, the diversity of their mandates, the lack of common professional security standards, and limited success in inter-agency security coordination. Despite broad acceptance of the need for better security management and coordination, many humanitarian organisations remain ambivalent about devoting increased resources to security management and security coordination. A critical lack of basic empirical knowledge of the field security environment hampers efforts to enhance security management practices. The absence of a systematic means of sharing incident data undermines the capacity of the humanitarian community to address proactively security threats. In discussions about humanitarian staff safety and security, the least common denominator remains cumulative anecdotal evidence provided by the many security personnel working for humanitarian organisations in the feld.

  11. security co-operation in the southern african development

    African Journals Online (AJOL)

    Arianne

    security and stability) are driven by national interest rather than regional interest – as realists argue ... For a long time, institutions were at the heart of political science and ..... insecurity and political instability” (Ndlovu, 2006:7). The thrust of his ...

  12. Heterogeneous Expectations and Speculative Behavior in Insurance-Linked Securities

    Directory of Open Access Journals (Sweden)

    Min Zheng

    2015-01-01

    Full Text Available Within the framework of heterogeneous agent models, this paper analyzes the impact factors on the issuance of an insurance-linked security (ILS, and gives an ILS pricing formula and the conditions of existence and stability of the issue price. We consider two cases: fixed supply and flexible supply. We find that, in the fixed volume case, to assure the successful issuance of an ILS, an appropriate volume of the ILS is necessary, and to attract investors, the ILS should pay a positive premium which can help investors to enhance the efficient frontier of their portfolio. In the flexible supply case, we show that the issue price of an ILS is given by the weighted average of different beliefs about the discounted ILS return, and the stability of the issue price depends on the numbers of investors and sponsors and the extrapolation rate to the ILS of investors. In addition, whether an ILS has the hedging ability to sponsors depends on their own understanding about the ILS coupon and the relationship between the recovery from the ILS and their liability, but how much the risk of sponsors can be hedged relies on the ILS coupon expected by investors.

  13. Protein Engineering by Random Mutagenesis and Structure-Guided Consensus of Geobacillus stearothermophilus Lipase T6 for Enhanced Stability in Methanol

    Science.gov (United States)

    Dror, Adi; Shemesh, Einav; Dayan, Natali

    2014-01-01

    The abilities of enzymes to catalyze reactions in nonnatural environments of organic solvents have opened new opportunities for enzyme-based industrial processes. However, the main drawback of such processes is that most enzymes have a limited stability in polar organic solvents. In this study, we employed protein engineering methods to generate a lipase for enhanced stability in methanol, which is important for biodiesel production. Two protein engineering approaches, random mutagenesis (error-prone PCR) and structure-guided consensus, were applied in parallel on an unexplored lipase gene from Geobacillus stearothermophilus T6. A high-throughput colorimetric screening assay was used to evaluate lipase activity after an incubation period in high methanol concentrations. Both protein engineering approaches were successful in producing variants with elevated half-life values in 70% methanol. The best variant of the random mutagenesis library, Q185L, exhibited 23-fold-improved stability, yet its methanolysis activity was decreased by one-half compared to the wild type. The best variant from the consensus library, H86Y/A269T, exhibited 66-fold-improved stability in methanol along with elevated thermostability (+4.3°C) and a 2-fold-higher fatty acid methyl ester yield from soybean oil. Based on in silico modeling, we suggest that the Q185L substitution facilitates a closed lid conformation that limits access for both the methanol and substrate excess into the active site. The enhanced stability of H86Y/A269T was a result of formation of new hydrogen bonds. These improved characteristics make this variant a potential biocatalyst for biodiesel production. PMID:24362426

  14. Information security requirements in patient-centred healthcare support systems.

    Science.gov (United States)

    Alsalamah, Shada; Gray, W Alex; Hilton, Jeremy; Alsalamah, Hessah

    2013-01-01

    Enabling Patient-Centred (PC) care in modern healthcare requires the flow of medical information with the patient between different healthcare providers as they follow the patient's treatment plan. However, PC care threatens the stability of the balance of information security in the support systems since legacy systems fall short of attaining a security balance when sharing their information due to compromises made between its availability, integrity, and confidentiality. Results show that the main reason for this is that information security implementation in discrete legacy systems focused mainly on information confidentiality and integrity leaving availability a challenge in collaboration. Through an empirical study using domain analysis, observations, and interviews, this paper identifies a need for six information security requirements in legacy systems to cope with this situation in order to attain the security balance in systems supporting PC care implementation in modern healthcare.

  15. Application of contact stabilization activated sludge for enhancing biological phosphorus removal (EBPR in domestic wastewater

    Directory of Open Access Journals (Sweden)

    Ehab M. Rashed

    2014-04-01

    Full Text Available The experiment has been performed in order to investigate the effect of using contact stabilization activated sludge as an application of enhancing biological phosphorous removal (EBPR by using contact tank as a phosphorus uptake zone and using thickening tank as a phosphorus release zone. The study involved the construction of a pilot plant which was setup in Quhafa waste water treatment plant (WWTP that included contact, final sedimentation, stabilization and thickening tanks, respectively with two returns sludge in this system one of them to contact tank and another to stabilization tank. Then observation of the uptake and release of total phosphorus by achievement through two batch test using sludge samples from thickener and final sedimentations. Results showed the removal efficiencies of COD, BOD and TP for this pilot plant with the range of 94%, 85.44% and 80.54%, respectively. On the other hand the results of batch tests showed that the reason of high ability of phosphorus removal for this pilot plant related to the high performance of microorganisms for phosphorus accumulating. Finally the mechanism of this pilot plant depends on the removal of the phosphorus from the domestic waste water as a concentrated TP solution from the supernatant above the thickening zone not through waste sludge like traditional systems.

  16. Addressing the Challenges of Collective Security in West Africa: In View of Recent Conflicts

    Science.gov (United States)

    2017-06-09

    security, and stability in Africa, and the Regional Economic Communities/Regional Mechanisms for conflict prevention, management and resolution (REC/RM...internal threats. Absence of conflict does not guarantee a peaceful and secure environment. Other non-military sources of instability in the economic ...Distribution is Unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT Understanding that achieving peace and security is a primary condition for an economic

  17. The Threat of Security: Hindering Technology Integration in the Classroom

    Science.gov (United States)

    Robinson, LeAnne K.; Brown, Abbie; Green, Tim

    2007-01-01

    For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…

  18. Array-level stability enhancement of 50 nm AlxOy ReRAM

    Science.gov (United States)

    Iwasaki, Tomoko Ogura; Ning, Sheyang; Yamazawa, Hiroki; Takeuchi, Ken

    2015-12-01

    ReRAM's low voltage and low current programmability are attractive features to solve the scaling issues of conventional floating gate Flash. However, read instability in ReRAM is a critical issue, due to random telegraph noise (RTN), sensitivity to disturb and retention. In this work, the array-level characteristics of read stability in 50 nm AlxOy ReRAM are investigated and a circuit technique to improve stability is proposed and evaluated. First, in order to quantitatively assess memory cell stability, a method of stability characterization is defined. Next, based on this methodology, a proposal to improve read stability, called ;stability check loop; is evaluated. The stability check loop is a stability verification procedure, by which, instability improvement of 7×, and read error rate improvement of 40% are obtained.

  19. Password Hardened Biometric: A Complete Solution of Online Security

    OpenAIRE

    Ajay Sharma; Deo Brat Ojha

    2013-01-01

    In present epoch, secure online access to enterprises resources is very important for any organization. To protect valuable data become one of the big challenge for today's business as enterprise customers or clients involved in business-to-customer (B2C) and business-to-business (B2B) e-commerce need to feel that their transactions are secured from system hackers. Biometric technology provides a solution to this problem in enterprise network security. In this article we enhance the security ...

  20. Privacy-Enhancing Security Protocol in LTE Initial Attack

    Directory of Open Access Journals (Sweden)

    Uijin Jang

    2014-12-01

    Full Text Available Long-Term Evolution (LTE is a fourth-generation mobile communication technology implemented throughout the world. It is the communication means of smartphones that send and receive all of the private date of individuals. M2M, IOT, etc., are the base technologies of mobile communication that will be used in the future cyber world. However, identification parameters, such as International Mobile Subscriber Identity (IMSI, Radio Network Temporary Identities (RNTI, etc., in the initial attach section for accessing the LTE network are presented with the vulnerability of being exposed as clear text. Such vulnerability does not end in a mere identification parameter, but can lead to a secondary attack using the identification parameter, such as replication of the smartphone, illegal use of the mobile communication network, etc. This paper proposes a security protocol to safely transmit identification parameters in different cases of the initial attach. The proposed security protocol solves the exposed vulnerability by encrypting the parameters in transmission. Using an OPNET simulator, it is shown that the average rate of delay and processing ratio are efficient in comparison to the existing process.

  1. IQGAP1 interacts with Aurora-A and enhances its stability and its role in cancer

    International Nuclear Information System (INIS)

    Yin, Ning; Shi, Ji; Wang, Dapeng; Tong, Tong; Wang, Mingrong; Fan, Feiyue; Zhan, Qimin

    2012-01-01

    Highlights: ► IQGAP1 interacts with Aurora-A through its RGCt domain. ► Overexpression of IQGAP1 prevents ubiquitination of Aurora-A. ► Overexpression of IQGAP1 enhances the protein stability of Aurora-A. ► Overexpression of IQGAP1 promotes the kinase activity of Aurora-A. -- Abstract: IQGAP1, a ubiquitously expressed scaffold protein, has been identified in a wide range of organisms. It participates in multiple aspects of cellular events by binding to and regulating numerous interacting proteins. In our present study, we identified a new IQGAP1 binding protein named Aurora-A which is an oncogenic protein and overexpressed in various types of human tumors. In vitro analysis with GST-Aurora-A fusion proteins showed a physical interaction between Aurora-A and IQGAP1. Moreover, the binding also occurred in HeLa cells as endogenous Aurora-A co-immunoprecipitated with IQGAP1 from the cell lysates. Overexpression of IQGAP1 resulted in an elevation of both expression and activity of Aurora-A kinase. Endogenous IQGAP1 knockdown by siRNA promoted Aurora-A degradation whereas IQGAP1 overexpression enhanced the stability of Aurora-A. Additionally, we documented that the IQGAP1-induced cell proliferation was suppressed by knocking down Aurora-A expression. Taken together, our results showed an unidentified relationship between Aurora-A and IQGAP1, and provided a new insight into the molecular mechanism by which IQGAP1 played a regulatory role in cancer.

  2. Increased stability of thylakoid components in Vigna sinensis seedlings grown under ultraviolet-B enhanced radiation

    International Nuclear Information System (INIS)

    Nedunchezhian, N.; Kulandaivelu, G.

    1994-01-01

    Chloroplasts isolated from Vigna sinensis L. seedlings grown under cool fluorescent (control chloroplasts) and ultraviolet-B (UV-B)-enhanced fluorescent (UV chloroplasts) radiation, when incubated at 10, 20, 30 and 40-degrees-C, showed large variations in the photosynthetic electron transport reactions. The overall electron transport activity in both control and UV chloroplasts incubated at 40-degrees-C decreased rapidly. In contrast to this, at 30-degrees-C the control chloroplasts got inactivated very rapidly during the 30 min of incubation while the UV chloroplasts showed high stability. A similar trend was also noticed at 20-degrees-C. At 10-degrees-C, although the rate of inactivation was slow, UV chloroplasts were more stable than control chloroplasts. A similar trend was noticed in photosystem (PS) 2 activity. In contrast to overall electron transport and PS2 reactions, PS1 activity showedonly marginal changes at all temperatures. The polypeptide profiles of chloroplasts exposed to UV-B irradiation for 60 min at different temperatures revealed marked decreases in the level of the 23 and 33 kDa polypeptides in control chloroplasts while in UV chloroplasts these polypeptides were highly stable. In addition, UV chloroplasts contained several new polypeptides of both high and low molecular masses. The polypeptide pattern indicated that higher photochemical activity of UV chloroplasts over the control chloroplasts could be due to stabilization of PS2 core complexes by the new polypeptides induced under UV-B enhanced radiation

  3. Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks

    Science.gov (United States)

    Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun

    2017-10-01

    With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

  4. Facile formation of dendrimer-stabilized gold nanoparticles modified with diatrizoic acid for enhanced computed tomography imaging applications.

    Science.gov (United States)

    Peng, Chen; Li, Kangan; Cao, Xueyan; Xiao, Tingting; Hou, Wenxiu; Zheng, Linfeng; Guo, Rui; Shen, Mingwu; Zhang, Guixiang; Shi, Xiangyang

    2012-11-07

    We report a facile approach to forming dendrimer-stabilized gold nanoparticles (Au DSNPs) through the use of amine-terminated fifth-generation poly(amidoamine) (PAMAM) dendrimers modified by diatrizoic acid (G5.NH(2)-DTA) as stabilizers for enhanced computed tomography (CT) imaging applications. In this study, by simply mixing G5.NH(2)-DTA dendrimers with gold salt in aqueous solution at room temperature, dendrimer-entrapped gold nanoparticles (Au DENPs) with a mean core size of 2.5 nm were able to be spontaneously formed. Followed by an acetylation reaction to neutralize the dendrimer remaining terminal amines, Au DSNPs with a mean size of 6 nm were formed. The formed DTA-containing [(Au(0))(50)-G5.NHAc-DTA] DSNPs were characterized via different techniques. We show that the Au DSNPs are colloid stable in aqueous solution under different pH and temperature conditions. In vitro hemolytic assay, cytotoxicity assay, flow cytometry analysis, and cell morphology observation reveal that the formed Au DSNPs have good hemocompatibility and are non-cytotoxic at a concentration up to 3.0 μM. X-ray absorption coefficient measurements show that the DTA-containing Au DSNPs have enhanced attenuation intensity, much higher than that of [(Au(0))(50)-G5.NHAc] DENPs without DTA or Omnipaque at the same molar concentration of the active element (Au or iodine). The formed DTA-containing Au DSNPs can be used for CT imaging of cancer cells in vitro as well as for blood pool CT imaging of mice in vivo with significantly improved signal enhancement. With the two radiodense elements of Au and iodine incorporated within one particle, the formed DTA-containing Au DSNPs may be applicable for CT imaging of various biological systems with enhanced X-ray attenuation property and detection sensitivity.

  5. India-Pakistan: nuclear stability and diplomacy

    International Nuclear Information System (INIS)

    Mishra, Rajesh Kumar

    2005-01-01

    The conceptual discourse, contributed to in the main by Western scholars, on the security and strategic stability of new nuclear weapon states like India and Pakistan seems alarmist. In reality, however, India and Pakistan have been mutually deliberating on various aspects of nuclear confidence-building measures (CBMs). This article is an effort to identify the issues of nuclear security concerns in two spheres - academic and policy formulations. The emphasis is more on the nuclear thinking of the two countries and the diplomatic challenges ahead particularly on the nuclear CBMs. (author)

  6. Chaos-based CAZAC scheme for secure transmission in OFDM-PON

    Science.gov (United States)

    Fu, Xiaosong; Bi, Meihua; Zhou, Xuefang; Yang, Guowei; Lu, Yang; Hu, Miao

    2018-01-01

    To effectively resist malicious eavesdropping and performance deterioration, a novel chaos-based secure transmission scheme is proposed to enhance the physical layer security and reduce peak-to-average power ratio (PAPR) in orthogonal frequency division multiplexing passive optical network (OFDM-PON). By the randomly extracting operation of common CAZAC values, the specially-designed constant amplitude zero autocorrelation (CAZAC) is created for system encryption and PAPR reduction enhancing the transmission security. This method is verified in {10-Gb/s encrypted OFDM-PON with 20-km fiber transmission. Results show that, compared to common OFDM-PON, our scheme achieves {3-dB PAPR reduction and {1-dB receiver sensitivity improvement.

  7. Analytical Methods for Energy Diversity and Security. Portfolio Optimization in the Energy Sector: A Tribute to the work of Dr. Shimon Awerbuch. Chapter 7. The role of wind generation in enhancing Scotland's energy diversity and security

    International Nuclear Information System (INIS)

    Jansen, J.C.; Beurskens, L.W.M.

    2008-11-01

    This volume aims at professionals in academia, industry and government interested in the rapidly evolving area at the nexus between energy and climate change policy. The cutting-edge international contributions allow for a wide coverage of the topic. Energy Diversity and Security focuses on the consideration of financial risk in the energy sector. It describes how tools borrowed from financial economic theory, in particular mean-variance portfolio theory, can provide insights on the costs and benefits of diversity, and thus inform investment decision making in conditions of uncertainty. It gives the reader an in-depth understanding of how to manage risk at a time when the world's focus is on this area. The book provides insights from leading authorities in the area of energy security. It gives readers abundant, rigorous analysis and guidance at a critical time in facing the twin challenges of energy security and climate change. The book also highlights the role of clean energy technology in moving towards future diverse and intelligent electricity systems. In this chapter attention is paid to the role of wind generation in enhancing Scotland's energy diversity and security

  8. Nanostructured polyurethane perylene bisimide ester assemblies with tuneable morphology and enhanced stability.

    Science.gov (United States)

    Zhang, Xiaoxiao; Gong, Tingyuan; Chi, Hong; Li, Tianduo

    2018-03-01

    Size control has been successfully achieved in inorganic materials, but it remains a challenge in polymer nanomaterials due to their polydispersity. Here, we report a facile approach to tailor the diameters of polyurethane (PU) nanoparticles (490 nm, 820 nm and 2.1 µm) via perylene bisimide (PBI) assisted self-assembly. The formed morphologies such as spindle, spherical and core-shell structures depend on the ratio of PBI and polymer concentrations. It is shown that the formation of PU nanoparticles is directed by π-π stacking of PBI and the morphology transition is not only affected by the amount of PBI incorporated, but also influenced by solvent, which controls the initial evaporation balance. Furthermore, the prepared PUs exhibit retained optical stability and enhanced thermal stability. The PUs, designed to have conjugated PBI segments in backbones, were synthesized via ring-opening and condensation reactions. Compared with the neat PU, gel permeation chromatography shows narrower molecular weight distribution. Fluorescence spectra and ultraviolet-visible spectra indicate retained maximum emission wavelength of PBI at 574 nm and 5.2% quantum yields. Thermo-gravimetric analysis and differential scanning calorimetry reveal 79°C higher decomposition temperature and 22°C higher glass transition temperature. This study provides a new way to fabricate well-defined nanostructures of functionalized PUs.

  9. The ASEAN Political-Security Community: Enhancing Defense Cooperation

    Science.gov (United States)

    2015-12-01

    Yoong Lee, ASEAN Matters: Reflecting on the Association of Southeast Asian Nations (Singapore; Hackensack, NJ: World Scientific., 2011), i, http...from becoming overpopulated —by moving Javanese to low-density islands: Kalimantan, Sumatera, Papua, and Sulawesi. 58 Collins, Security and Southeast...In the mid-2000s, the increasing number of piracy and armed robbery activities in the Malacca Straits attracted world attention and attributed to the

  10. IoT Privacy and Security Challenges for Smart Home Environments

    Directory of Open Access Journals (Sweden)

    Huichen Lin

    2016-07-01

    Full Text Available Often the Internet of Things (IoT is considered as a single problem domain, with proposed solutions intended to be applied across a wide range of applications. However, the privacy and security needs of critical engineering infrastructure or sensitive commercial operations are very different to the needs of a domestic Smart Home environment. Additionally, the financial and human resources available to implement security and privacy vary greatly between application domains. In domestic environments, human issues may be as important as technical issues. After surveying existing solutions for enhancing IoT security, the paper identifies key future requirements for trusted Smart Home systems. A gateway architecture is selected as the most appropriate for resource-constrained devices, and for high system availability. Two key technologies to assist system auto-management are identified. Firstly, support for system auto-configuration will enhance system security. Secondly, the automatic update of system software and firmware is needed to maintain ongoing secure system operation.

  11. The Interagency and Counterinsurgency Warfare: Stability, Security, Transition, and Reconstruction Roles

    Science.gov (United States)

    2007-12-01

    simultaneously, rather than sequentially , as Francis Fukuyama has recommended. This methodology led to several notable complications. COMPLICATIONS...Declaration of Independence’s lineup of the purposes for which government is instituted.” Once security has been provided, in Etzioni’s view, political

  12. Consequence and impact of electric utility industry restructuring on transient stability and small-signal stability analysis

    International Nuclear Information System (INIS)

    Vittal, V.

    2000-01-01

    The electric utility industry is undergoing unprecedented changes in its structure worldwide. With the advent of an open market environment and competition in the industry, and restructuring of the industry into separate generation, transmission, and distribution entities, new issues in power system operation and planning are inevitable. One of the major consequences of this new electric utility environment is the greater emphasis on reliability and secure operation of the power system. This paper examines the impact of restructuring on power system dynamic analysis. It specifically addresses issues related to transient stability analysis and small-signal stability analysis. Four major topics to examine the effect on the nature of studies conducted are considered. These topics are (1) system adequacy and security, (2) system modeling data requirements, (3) system protection and control, and (4) system restoration. The consequences and impact of each of these topics on the nature of the studies conducted are examined and discussed. The emphasis on greater reliability has led to a clearer enunciation of standards, measurements, and guides in some countries. These requirements will result in: (1) more measurements on existing systems, (2) rigorous analysis of transient stability and small-signal stability to determine operating limits and plan systems, (3) greater emphasis on studies to verify coordination and proper performance of protection and controls, and (4) development of a detailed plan for system restoration in the case of wide-spread outages

  13. The research of computer network security and protection strategy

    Science.gov (United States)

    He, Jian

    2017-05-01

    With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.

  14. Transient Stability Assessment of Power System with Large Amount of Wind Power Penetration

    DEFF Research Database (Denmark)

    Liu, Leo; Chen, Zhe; Bak, Claus Leth

    2012-01-01

    Recently, the security and stability of power system with large amount of wind power are the concerned issues, especially the transient stability. In Denmark, the onshore and offshore wind farms are connected to distribution system and transmission system respectively. The control and protection...... methodologies of onshore and offshore wind farms definitely affect the transient stability of power system. In this paper, the onshore and offshore wind farms are modeled in detail in order to assess the transient stability of western Danish power system. Further, the computation of critical clearing time (CCT...... plants, load consumption level and high voltage direct current (HVDC) transmission links are taken into account. The results presented in this paper are able to provide an early awareness of power system security condition of the western Danish power system....

  15. Enhanced stability and dissolution of CuO nanoparticles by extracellular polymeric substances in aqueous environment

    International Nuclear Information System (INIS)

    Miao, Lingzhan; Wang, Chao; Hou, Jun; Wang, Peifang; Ao, Yanhui; Li, Yi; Lv, Bowen; Yang, Yangyang; You, Guoxiang; Xu, Yi

    2015-01-01

    Stability of engineered nanoparticles in aquatic environment is an essential parameter to evaluate their fate, bioavailability, and potential toxic effects toward living organisms. As CuO NPs enter the wastewater systems, they will encounter extracellular polymeric substances (EPS) from microbial community before directly interacting with bacterial cells. EPS may play an important role in affecting the stability and the toxicity of CuO NPs in aquatic environment. In this study, the influences of flocculent sludge-derived EPS, as well as model protein (BSA) and natural polysaccharides (alginate) on the dissolution kinetics and colloidal stability of CuO NPs were investigated. Results showed that the presence of NOMs strongly suppressed CuO NPs aggregation, confirmed by DLS, zeta potentials, and TEM analysis. The enhanced stability of CuO NPs in the presence of EPS and alginate were attributed to the electrostatic combined with steric repulsion, while the steric-hindrance effect may be the predominant mechanism retarding nano-CuO aggregation for BSA. Higher degrees of copper release were achieved with the increasing concentrations of NOMs. EPS are more effective than alginate and BSA in releasing copper, probably due to the abundant functional groups and the excellent metal-binding capacity. The ratio of free-Cu 2+ /total dissolved Cu significantly decreased in the presence of EPS, indicating that EPS may affect the speciation and Cu bioavailability in aqueous environment. These results may be important for assessing the fate and transport behaviors of CuO NPs in the environment as well as for setting up usage regulation and treatment strategy.

  16. Enhanced stability and dissolution of CuO nanoparticles by extracellular polymeric substances in aqueous environment

    Energy Technology Data Exchange (ETDEWEB)

    Miao, Lingzhan; Wang, Chao; Hou, Jun, E-mail: hhuhjyhj@126.com; Wang, Peifang; Ao, Yanhui; Li, Yi; Lv, Bowen; Yang, Yangyang; You, Guoxiang; Xu, Yi [Hohai University, Key Laboratory of Integrated Regulation and Resources Development on Shallow Lakes, Ministry of Education (China)

    2015-10-15

    Stability of engineered nanoparticles in aquatic environment is an essential parameter to evaluate their fate, bioavailability, and potential toxic effects toward living organisms. As CuO NPs enter the wastewater systems, they will encounter extracellular polymeric substances (EPS) from microbial community before directly interacting with bacterial cells. EPS may play an important role in affecting the stability and the toxicity of CuO NPs in aquatic environment. In this study, the influences of flocculent sludge-derived EPS, as well as model protein (BSA) and natural polysaccharides (alginate) on the dissolution kinetics and colloidal stability of CuO NPs were investigated. Results showed that the presence of NOMs strongly suppressed CuO NPs aggregation, confirmed by DLS, zeta potentials, and TEM analysis. The enhanced stability of CuO NPs in the presence of EPS and alginate were attributed to the electrostatic combined with steric repulsion, while the steric-hindrance effect may be the predominant mechanism retarding nano-CuO aggregation for BSA. Higher degrees of copper release were achieved with the increasing concentrations of NOMs. EPS are more effective than alginate and BSA in releasing copper, probably due to the abundant functional groups and the excellent metal-binding capacity. The ratio of free-Cu{sup 2+}/total dissolved Cu significantly decreased in the presence of EPS, indicating that EPS may affect the speciation and Cu bioavailability in aqueous environment. These results may be important for assessing the fate and transport behaviors of CuO NPs in the environment as well as for setting up usage regulation and treatment strategy.

  17. Nuclear security: strategies and techniques

    International Nuclear Information System (INIS)

    Khan, I.K.

    2010-05-01

    The modern society, whether in developed or in developing countries, depend on the availability of nuclear energy and on the day-to-day use of radioactive materials in medicine, agriculture, industry and for research. Before 9/11, these activities were mainly covered by safety rules regarding health and environment. Since 9/ 11, it is clear, that these activities also require adequate security. For the continued and expanded use of nuclear energy or radioactive materials, nuclear security is indispensable and an important prerequisite for successful and sustainable development. Many of our nuclear security services, expert assistance and training events, we have assisted Member States in their efforts to improve their preparedness and response capabilities and acquired a much better understanding of Member States prob and the need for further support. The end of the Cold War was marked by a shift from a bi-polar structure of global security into a more complex and unpredictable configuration of world affairs. It also brought about new security challenges, i.e. an increased probability for low-density regional, national or sub-national conflicts with new and more dispersed threats emanating from a larger number of actors, including non-state actors; terrorists or criminals. The audio-visual impact of modern media has enhanced the socio-psychological impact on a global scale of such conflicts. The number of cases of illicit trafficking in nuclear materials that were recorded since the 90's raised concern about the international physical protection regime and triggered an effort to enhance our capabilities for prevention, detection and responses regarding terrorist acts, as well as to strengthen the Convention on the Physical Protection of Nuclear Material

  18. The International Legal Framework for Nuclear Security

    International Nuclear Information System (INIS)

    2011-01-01

    The term 'nuclear security' is generally accepted to mean 'the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material, other radioactive substances or their associated facilities.' While the ultimate responsibility for nuclear security within a State rests entirely with that State, the need for regional and international cooperation has become increasingly evident with the growing recognition that the ability to prevent, detect and respond to the threats to nuclear security within one State is affected by the adequacy and effectiveness of nuclear security measures taken by other States, particularly when nuclear material is transported across national frontiers. Since the early 1970s, the IAEA has been called upon to play an ever increasing role in assisting States, upon request, to strengthen their national legal infrastructures and physical protection systems, as well as to facilitate regional and international efforts to enhance nuclear security, including measures to protect against nuclear terrorism. This publication brings together the legally binding primary international instruments and the internationally accepted non-binding instruments that constitute the international legal framework for nuclear security. It does not discuss the safety and safeguards related instruments, which also form a part of the broader legal framework for nuclear security. By setting out the legislative bases for the mandate of the IAEA in the area of nuclear security, it is hoped that this publication will increase awareness of the IAEA's role in facilitating national, regional and international efforts to enhance nuclear security , including measures to protect against nuclear terrorism. It is also intended to serve as a guide in carrying out the IAEA's nuclear security mandate and functions assigned to it under these instruments, including in the elaboration of nuclear security

  19. Study on the concentration of energy security

    International Nuclear Information System (INIS)

    Irie, Kazutomo

    2002-01-01

    'Energy Security' concept has played the central role in Japan's energy policy. However, the definition of the concept is not clear. If energy security will remain a principal policy target, its concept should be clearly defined as a precondition. This dissertation analyzes historical changes in energy security concept and considers their relationship with the development of national security concept in international relations studies. Following an introduction in the first chapter, the second chapter reveals that energy security concept has changed in accord with energy situation and policymakers' concern of the times. As a result, several different definitions of the concept now coexist. The third chapter deals with the relationship between energy security concept and national security concepts in international relations. Three major definitions of energy security concepts correspond to definitions of security concepts by three schools in security theory - realism, liberalism, and globalism. In the fourth chapter, energy security is conceptualized and its policy measures are systematized by addressing the issues appeared in its historical changes and referring to security theory in international relations studies. The fifth chapter discusses the contribution by nuclear energy to Japan's energy security, applying a theoretical framework presented in previous chapters. Characteristics of nuclear energy which enhance energy security are identified, and policy measures for improving those characteristics are proposed. (author)

  20. Entrapment of curcumin into monoolein-based liquid crystalline nanoparticle dispersion for enhancement of stability and anticancer activity

    Science.gov (United States)

    Baskaran, Rengarajan; Madheswaran, Thiagarajan; Sundaramoorthy, Pasupathi; Kim, Hwan Mook; Yoo, Bong Kyu

    2014-01-01

    Despite the promising anticancer potential of curcumin, its therapeutic application has been limited, owing to its poor solubility, bioavailability, and chemical fragility. Therefore, various formulation approaches have been attempted to address these problems. In this study, we entrapped curcumin into monoolein (MO)-based liquid crystalline nanoparticles (LCNs) and evaluated the physicochemical properties and anticancer activity of the LCN dispersion. The results revealed that particles in the curcumin-loaded LCN dispersion were discrete and monodispersed, and that the entrapment efficiency was almost 100%. The stability of curcumin in the dispersion was surprisingly enhanced (about 75% of the curcumin survived after 45 days of storage at 40°C), and the in vitro release of curcumin was sustained (10% or less over 15 days). Fluorescence-activated cell sorting (FACS) analysis using a human colon cancer cell line (HCT116) exhibited 99.1% fluorescence gating for 5 μM curcumin-loaded LCN dispersion compared to 1.36% for the same concentration of the drug in dimethyl sulfoxide (DMSO), indicating markedly enhanced cellular uptake. Consistent with the enhanced cellular uptake of curcumin-loaded LCNs, anticancer activity and cell cycle studies demonstrated apoptosis induction when the cells were treated with the LCN dispersion; however, there was neither noticeable cell death nor significant changes in the cell cycle for the same concentration of the drug in DMSO. In conclusion, entrapping curcumin into MO-based LCNs may provide, in the future, a strategy for overcoming the hurdles associated with both the stability and cellular uptake issues of the drug in the treatment of various cancers. PMID:25061290