WorldWideScience

Sample records for vessel security plan

  1. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  2. 33 CFR 104.215 - Vessel Security Officer (VSO).

    Science.gov (United States)

    2010-07-01

    ... board and in port. (iv) Protection of the marine environment: (A) Understanding of vessel personnel's responsibility to preserve the marine environment; and (B) Basic working knowledge of pollution prevention... security plan; (ii) Assessing security risk, threat and vulnerability; (iii) Undertaking regular...

  3. Analisa Greenwater Akibat Gerakan Offshore Security Vessel

    Directory of Open Access Journals (Sweden)

    Maulidya Octaviani Bustamin

    2012-09-01

    Full Text Available Analisa  Tugas  Akhir  ini,  terdiri  atas  beberapa  tahapan.  Yang pertama yaitu perancangan struktur Offshore Security Vessel (OSV dengan bantuan software MAXSURF guna mendapatkan Lines Plan. Offset data yang diperoleh digunakan dalam pemodelan menggunakan MOSES,  kemudian  dilakukan  analisa  gerak  OSV  dalam  gelombang  regular  dan dinyatakan dalam grafik RAO. Analisa gerak relatif vertikal  haluan dihitung dari RAO gerakan, dan kemudian melakukan evaluasi perilaku di gelombang acak dengan analisis spektra gelombang. Dari analisa spektra didapatkan parameter greenwater sehingga dapat dihitung peluang, intensitas dan tekanan greenwater. Dari hasil analisa diperoleh RAO gerak vertikal Offshore Security Vessel (OSV pada  gelombang  reguler yang dipengaruhi  oleh  kecepatan,  kondisi  muatan  dan arah gelombang. Peluang terjadinya greenwater terbesar terjadi pada sudut datang gelombang following sea (0o dimana harga terbesar terjadi pada ω = 0.2 rad/sec dengan periode 29 detik mencapai 0.477. Intensitas greenwater terbesar terjadi pada saat sudut datang gelombang following sea (0o adalah sebanyak 59.265 per jam dan 0.378 per detik. Tekanan greenwater terbesar terjadi pada saat sudut datang gelombang head sea (180o sebesar 1678x10-6 MPa. Dengan nilai tersebut, deck mampu menahan beban akibat tekanan greenwater.

  4. Security planning an applied approach

    CERN Document Server

    Lincke, Susan

    2015-01-01

    This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now. It also serves to educate the reader of a broader set of concepts related to the security environment through the Introductory Concepts and Advanced sections. The book serv

  5. 46 CFR 169.307 - Plans for sister vessels.

    Science.gov (United States)

    2010-10-01

    ... Construction and Arrangement Plans § 169.307 Plans for sister vessels. Plans are not required for any vessel which is a sister ship to a vessel, provided that— (a) The approved plans for the original vessels are... new construction; (c) The regulations have not changed since the original plan approval; and (d) There...

  6. 33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.

    Science.gov (United States)

    2010-07-01

    ... baggage; and (vi) Vessel stores; (2) Threat assessments, including the purpose and methodology of the... availability of security communications, information, and equipment. (c) Analysis and recommendations. In... may, if damaged or used illicitly, pose a risk to people, property, or operations on board the vessel...

  7. Report of the DHS Small Vessel Security Institute

    Science.gov (United States)

    2007-10-19

    approach implemented by the Aircraft Owners and Pilots Association 54 National Small Vessel Security Summit ( AOPA ). This program encourages...implemented by the Aircraft Owners and Pilots Association ( AOPA ). • Security zone: provide much more information to the boating public so that...One stakeholder recommended that the AWW adapt the “Lock Up. Look Out” program implemented by the Aircraft Owners and Pilots Association ( AOPA ). This

  8. Global Security Program Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Bretzke, John C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-25

    The Global Security Directorate mission is to protect against proliferant and unconventional nuclear threats –regardless of origin - and emerging new threats. This mission is accomplished as the Los Alamos National Laboratory staff completes projects for our numerous sponsors. The purpose of this Program Management Plan is to establish and clearly describe the GS program management requirements including instructions that are essential for the successful management of projects in accordance with our sponsor requirements. The detailed information provided in this document applies to all LANL staff and their subcontractors that are performing GS portfolio work. GS management is committed to a culture that ensures effective planning, execution, and achievement of measurable results in accordance with the GS mission. Outcomes of such a culture result in better communication, delegated authority, accountability, and increased emphasis on safely and securely achieving GS objectives.

  9. 33 CFR 104.280 - Security measures for delivery of vessel stores and bunkers.

    Science.gov (United States)

    2010-07-01

    ... vessel stores and bunkers. 104.280 Section 104.280 Navigation and Navigable Waters COAST GUARD... § 104.280 Security measures for delivery of vessel stores and bunkers. (a) General. The vessel owner or operator must ensure that security measures relating to the delivery of vessel stores and bunkers are...

  10. 78 FR 13691 - Guidance Regarding Inspection and Certification of Vessels Under the Maritime Security Program

    Science.gov (United States)

    2013-02-28

    ... SECURITY Coast Guard Guidance Regarding Inspection and Certification of Vessels Under the Maritime Security... availability of Navigation and Vessel Inspection Circular (NVIC) 01-13, ``Inspection and Certification of Vessels Under the Maritime Security Program (MSP).'' The MSP serves as a means for establishing a fleet of...

  11. Infrastructure Plan for Home Security System

    OpenAIRE

    Tong, Yao

    2011-01-01

    Tong, Yao. 2011. Infrastructure Plan for Home Security System. Bachelor’s Thesis. Kemi-Tornio University of Applied Sciences. Business and Culture. Pages 53. Appendix 1. The aims of this research were to design an infrastructure plan for home security system, analyze the most mature and emerging technologies, connect the security services through different types of interfaces, and assign different security levels for home security system based on the user requirements. The whole infrastru...

  12. 33 CFR 155.1052 - Response plan development and evaluation criteria for vessels carrying group V petroleum oil as a...

    Science.gov (United States)

    2010-07-01

    ... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) POLLUTION OIL OR HAZARDOUS MATERIAL POLLUTION PREVENTION REGULATIONS FOR VESSELS Tank Vessel Response Plans for Oil § 155... equipment, including— (1) Sonar, sampling equipment, or other methods for locating the oil on the bottom or...

  13. 33 CFR 105.270 - Security measures for delivery of vessel stores and bunkers.

    Science.gov (United States)

    2010-07-01

    ... vessel stores and bunkers. 105.270 Section 105.270 Navigation and Navigable Waters COAST GUARD... Requirements § 105.270 Security measures for delivery of vessel stores and bunkers. (a) General. The facility owner or operator must ensure that security measures relating to the delivery of vessel stores and...

  14. Security modeling technique: Visualizing information of security plans

    OpenAIRE

    Ley, D.; Dalinger, E.

    2011-01-01

    Since the terrorist attacks of 11th September 2001 efforts are made to enhance the security standards in maritime shipping. The joint research project VESPER (improving the security of passengers on ferries) funded by the German Federal Ministry of Education and Research (BMBF) addresses among others the investigation of sea- and landside measures and processes. One of the results of the ongoing analysis phase is that the current representation of information in security plans can hardly be u...

  15. KSOS System Security Plan. Revision 2. Kernelized Secure Operating System.

    Science.gov (United States)

    1980-01-01

    1972) j. (Hoare 73b] Hoare, C. A. R., "Proof of a Structured Program: the Sieve of Eratosthenes ", Computer Journal, 15 pp 321-325, (November 1972). k...desire for improved system security permeates every design and implementation decision. 4 Rev 2 KSOS System Security Plan The model of security which...Modula encourages modularization and information hiding, two features which improve the robustness and maintainability of the system. The testing

  16. Security planning for public health emergencies.

    Science.gov (United States)

    Warren, Bryan

    2015-01-01

    In this article the author identifies the security sensitive areas of a hospital during a public health emergency event, and the need to have processes and plans in place to mitigate the security and traffic related problems that accompany such events. He describes a number of specialized security and safety guidelines and tools that have been designed by and provided to healthcare security professionals free of charge.

  17. Fast Generation of Container Vessel Stowage Plans

    DEFF Research Database (Denmark)

    Pacino, Dario

    to be used by stowage coordinators, and it advocates that the quality of the stowage plans and the time in which they can be generated is of the outmost importance for practical usage. We introduce a detailed description of a representative problem of the computational complexity of stowage planning that has...

  18. National Security Technology Incubation Project Continuation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  19. Vessels Route Planning Problem with Uncertain Data

    Directory of Open Access Journals (Sweden)

    Tomasz Neumann

    2016-09-01

    Full Text Available The purpose of this paper is to find a solution for route planning in a transport networks, where the costs of tracks, factor of safety and travel time are ambiguous. This approach is based on the Dempster-Shafer theory and well known Dijkstra's algorithm. In this approach important are the influencing factors of the mentioned coefficients using uncertain possibilities presented by probability intervals. Based on these intervals the quality intervals of each route can be determined. Applied decision rules can be described by the end user.

  20. National Security Technology Incubator Operations Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the operations plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The operation plan includes detailed descriptions of the structure and organization, policies and procedures, scope, tactics, and logistics involved in sustainable functioning of the NSTI program. Additionally, the operations plan will provide detailed descriptions of continuous quality assurance measures based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Forms that assist in operations of NSTI have been drafted and can be found as an attachment to the document.

  1. National Security Technology Incubator Action Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2008-02-28

    This report documents the action plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). This action plan serves as a tool in measuring progress in the development process and delivery of services for the NSTI program. Continuous review and evaluation of the action plan is necessary in the development process of the NSTI. The action plan includes detailed steps in developing the NSTI program based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Included are tasks required to implement the NSTI, developed within a work breakdown structure. In addition, a timeline is identified for each task.

  2. 6 CFR 27.225 - Site security plans.

    Science.gov (United States)

    2010-01-01

    ... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.225 Site security plans. (a) The Site Security Plan must meet the following standards: (1) Address each vulnerability identified in the facility's Security...

  3. Corporate strategic plan for safeguards and security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-06-01

    Department of Energy (DOE) safeguards and security (S and S) is a team effort, consisting of Field, National Laboratories, Program Office, and Headquarters units cooperating to support the Department`s diverse security needs. As an integral part of the nation`s security structure, the DOE S and S Program regularly supports and works in cooperation with other US Government agencies and private industry to improve the national security posture. Thus, inter- and intra-agency partnerships play an invaluable role in the continuing efforts to integrate and implement improved ways of doing business. Their Corporate Strategic Plan provides a road map to guide, track, and provide feedback for the incorporation and implementation of S and S activities within DOE. Part 1 Planning Framework, describes those overarching factors which influence the planning endeavors. Part 2, Strategic Perspective, outlines where the S and S Program has been and how they will move to the future through core competencies, changing cultural thinking, and implementing their strategies. Part 3, Strategic and Operational Integration, details critical focus areas, strategies, and success indicators designed to enhance inter-agency S and S integration and promote cooperation with external agencies. This Plan will be reviewed annually to ensure it remains supportive and fully-engaged with the nation`s and international security environments.

  4. National Security Technology Incubator Business Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  5. 33 CFR 104.225 - Security training for all other vessel personnel.

    Science.gov (United States)

    2010-07-01

    ..., whether part-time, full-time, temporary, or permanent, must have knowledge of, through training or equivalent job experience in the following, as appropriate: (a) Relevant provisions of the Vessel Security...

  6. 76 FR 63547 - Security Zone; Columbia and Willamette Rivers, Dredge Vessels Patriot and Liberty

    Science.gov (United States)

    2011-10-13

    ... Patriot and Liberty AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Coast Guard is establishing a temporary security zone within 200 yards of the Dredge Vessels Patriot and Liberty while the... due to insufficient time in which to publish an NPRM since the Dredge Vessels Patriot and Liberty...

  7. 75 FR 45055 - Security Zone; 2010 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, WA

    Science.gov (United States)

    2010-08-02

    ... Vessels, Puget Sound, WA AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The U.S. Coast... vessels while underway in the Puget Sound Captain of the Port (COTP) Area of Responsibility (AOR). These... remaining in the security zones unless authorized by the COTP, Puget Sound or Designated Representative...

  8. Plan Colombia or development as security

    Directory of Open Access Journals (Sweden)

    Juan Pablo Guevara Latorre

    2015-01-01

    the most relevant policy for the construction of the State in 21st-century Colombia from a critical standpoint. The document makes it possible to show that Plan Colombia is a privatized form of development, interpreted in terms of security based on an incomplete understanding of the Colombian conflict that prevails into our present

  9. 6 CFR 37.41 - Security plan.

    Science.gov (United States)

    2010-01-01

    ... necessary. (6) Emergency/incident response plan; (7) Internal audit controls; (8) An affirmation that the... protections: (i) Reasonable administrative, technical, and physical safeguards to protect the security... use of biometrics, and the technical standard utilized, if any; (4) Access control, including the...

  10. Report of the DHS National Small Vessel Security Summit

    Science.gov (United States)

    2007-10-19

    Summit ( AOPA ). This program encourages private pilots to secure their aircraft to prevent possible thefts, which could help impede terrorists. He...adopt the “Lock Up. Look Out.” approach implemented by the Aircraft Owners and Pilots Association ( AOPA ). • Security zone: provide much more...Owners and Pilots Association ( AOPA ). This program encourages private pilots to secure their aircraft, get to know their fellow hangar tenants

  11. 77 FR 50926 - Security Zones; Certain Dangerous Cargo Vessels, Tampa, FL

    Science.gov (United States)

    2012-08-23

    ... anhydrous ammonia, liquefied propane gas (LPG), and ammonium nitrate. The security zones will start at buoys... CDC vessel is one carrying anhydrous ammonia, liquefied propane gas, and ammonium nitrate. The.... 14. Environment We have analyzed this rule under Department of Homeland Security Management Directive...

  12. 77 FR 2019 - Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/Departure, Kaunakakai Harbor, Molokai, HI

    Science.gov (United States)

    2012-01-13

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA87 Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/ Departure, Kaunakakai Harbor, Molokai, HI AGENCY: Coast Guard, DHS. ACTION: Temporary interim rule with...

  13. 77 FR 24381 - Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/Departure, Kaunakakai Harbor, Molokai, HI

    Science.gov (United States)

    2012-04-24

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA87 Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/ Departure, Kaunakakai Harbor, Molokai, HI AGENCY: Coast Guard, DHS. ACTION: Temporary interim rule...

  14. Vessel-sourced pollution: a security threat in Malaysian waters ...

    African Journals Online (AJOL)

    Vessel-sourced pollution is one of the major sources of marine pollution and it encompasses accidental discharge of oil, intentional discharge of oil (like discharge from ballast tanks), chemicals, dumping, etc. The United Nations Convention on the Law of the Sea (UNCLOS), 1982 and some other conventions make ...

  15. VESSEL-SOURCED POLLUTION: A SECURITY THREAT IN ...

    African Journals Online (AJOL)

    more than 80 per cent and 90 per cent of China's and Japan's oil respectively pass through this route.44 The presence of heavy ships traversing the Straits. 44 Stommy-Annika M, and Grob F, 'Piracy and World Trade: The Economic Cost' in Mair .S, (ed), Piracy and Maritime Security, (Germany Institute for International and ...

  16. 78 FR 60099 - Nontank Vessel Response Plans and Other Response Plan Requirements

    Science.gov (United States)

    2013-09-30

    ... vrp@uscg.mil . If you have questions on viewing the docket, call Ms. Renee V. Wright, Program Manager...(g)(1) 15. MARPOL VRP requirements--Sec. 155.5030(h) 16. Protection and Indemnity (P&I) Club--Sec...), Fourth Edition, 2005 U.S.C. United States Code VRP Vessel response plan WCD Worst case discharge II...

  17. 78 FR 261 - Moving Security Zone Around Escorted Vessels on the Lower Mississippi River

    Science.gov (United States)

    2013-01-03

    ... been deemed by the COTP New Orleans to require escort protection during transit between mile marker 88... the Port of New Orleans (COTP New Orleans) is establishing a Moving Security Zone on the Mississippi river, mile marker 88.0 through mile marker 106.0, extending 300 yards on all sides of vessels being...

  18. 33 CFR 165.1405 - Regulated Navigation Areas and Security Zones; Designated Escorted Vessels-Philippine Sea and...

    Science.gov (United States)

    2010-07-01

    ... Security Zones; Designated Escorted Vessels-Philippine Sea and Apra Harbor, Guam (including Cabras Island... Areas and Security Zones; Designated Escorted Vessels-Philippine Sea and Apra Harbor, Guam (including... point of origin. (2) Apra Harbor, Guam—All waters from surface to bottom of Apra Harbor, Guam, shoreward...

  19. 33 CFR 165.1411 - Security zone; waters surrounding U.S. Forces vessel SBX-1, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. 165.1411 Section 165.1411 Navigation and Navigable Waters COAST GUARD... § 165.1411 Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. (a) Location. The following...

  20. Security administration plan for HANDI 2000 business management system

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, D.

    1998-09-29

    This document encompasses and standardizes the integrated approach for security within the PP and Ps applications, It also identifies the security tools and methods to be used. The Security Administration Plan becomes effective as of this document`s acceptance and will provide guidance through implementation efforts and, as a ``living document`` will support the operations and maintenance of the system.

  1. Information security management system planning for CBRN facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lenaeu, Joseph D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); O' Neil, Lori Ross [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Leitch, Rosalyn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Glantz, Clifford S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Landine, Guy P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bryant, Janet L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, John [National Nuclear Lab., Workington (United Kingdom); Mathers, Gemma [National Nuclear Lab., Workington (United Kingdom); Rodger, Robert [National Nuclear Lab., Workington (United Kingdom); Johnson, Christopher [National Nuclear Lab., Workington (United Kingdom)

    2015-12-01

    The focus of this document is to provide guidance for the development of information security management system planning documents at chemical, biological, radiological, or nuclear (CBRN) facilities. It describes a risk-based approach for planning information security programs based on the sensitivity of the data developed, processed, communicated, and stored on facility information systems.

  2. Microeconomics, Private Security, and the Significance to Operational Planning

    Science.gov (United States)

    2013-05-23

    MICROECONOMICS , PRIVATE SECURITY, AND THE SIGNIFICANCE TO OPERATIONAL PLANNING A Monograph by MAJ Kevin S. Clarke United... MICROECONOMICS , PRIVATE SECURITY, AND THE SIGNIFICANCE TO OPERATIONAL PLANNING 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...of microeconomic principles of supply-demand theory by looking at specific conceptual variables to determine the relationship and influence on the

  3. KSOS Secure Unix Implementation Plan (Kernelized Secure Operating System).

    Science.gov (United States)

    1980-12-01

    these tools discover design flaws, - 13 - WDL-TR7799 KSOS Implementacion Plan the design will be changed to eliminate them. The master copy of the...files such as READHE files they should also be included. Documentation Guidelines - D-3 - WDL-TR7 799 KSOS Implementacion Plan 2.7. Manual Pages We

  4. 78 FR 51754 - Request To Modify License by Replacing Security Plan With New Radiation Safety Plan; U.S...

    Science.gov (United States)

    2013-08-21

    ... COMMISSION Request To Modify License by Replacing Security Plan With New Radiation Safety Plan; U.S..., requesting to replace its security plan with a new radiation safety plan. DATES: Submit comments by September... radiation plan, which would supersede the 2003 security plan, the access control for JPG would be managed by...

  5. Coordinated planning of inland vessels for large seaports

    NARCIS (Netherlands)

    Li, S.

    2016-01-01

    Seaports are crucial nodes in international trade and transport. Some of the cargoes arriving at seaports are transshipped to other ports, while others are transported to inland destinations. Every time an inland container vessel enters the port, it calls at many different terminals spread over the

  6. The public transportation system security and emergency preparedness planning guide

    Science.gov (United States)

    2003-01-01

    Recent events have focused renewed attention on the vulnerability of the nation's critical infrastructure to major events, including terrorism. The Public Transportation System Security and Emergency Preparedness Planning Guide has been prepared to s...

  7. Planning for nuclear security: Design Basis Threats and physical ...

    African Journals Online (AJOL)

    A competent authority for nuclear security then gives approval for the implementation of the physical protection plan. The DBT assessment methodology is an International Atomic Energy Agency (IAEA) recommended method for designing security measures corresponding to the categories of radioactive sources. The higher ...

  8. Security Technology Demonstration and Validation Sustainability Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2008-08-31

    This report describes the process of creating continuity and sustainability for demonstration and validation (DEMVAL) assets at the National Security Technology Incubator (NSTI). The DEMVAL asset program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The mission of the NSTI program is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. Part of this support is envisioned to be research and development of companies’ technology initiatives, at the same time providing robust test and evaluation of actual development activities. This program assists companies in developing technologies under the NSTI program through demonstration and validation of technologies applicable to national security created by incubators and other sources. The NSPP also will support the creation of an integrated demonstration and validation environment. Development of the commercial potential for national security technologies is a significant NSTI focus. As part of the process of commercialization, a comprehensive DEMVAL program has been recognized as an essential part of the overall incubator mission. A number of resources have been integrated into the NSTI program to support such a DEMVAL program.

  9. Arctic Planning Scenarios: Scenario #2 - Safety and Security Scenario

    Science.gov (United States)

    2011-07-01

    existing fisheries DRDC CORA CR 2011-098 7 cooperation agreements; but replaces an interim ’grey zone’ agreement of 1978. There are also...threat groups of Somalis, Chechens, Tamils, and Nigerians and the recent upsurge in mass illegal migration; Many vessels used for illegal smuggling... Fisheries and Oceans DHS Department of Homeland Security DND Department of National Defence DoD Department of Defense DRDC Defence Research & Development

  10. Generating Optimal Stowage Plans for Container Vessel Bays

    DEFF Research Database (Denmark)

    Delgado-Ortegon, Alberto; Jensen, Rune Møller; Schulte, Christian

    2009-01-01

    collaboration to date with a liner shipping company on automated stowage planning. We then show how to solve this model ef- ficiently in - to our knowledge - the first application of CP to stowage planning using state-of-the-art techniques such as extensive use of global constraints, viewpoints, static...

  11. Evaluation Plan on In-vessel Source Term in PGSFR

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Seung Won; Ha, Kwi-Seok; Ahn, Sang June; Lee, Kwi Lim; Jeong, Taekyeong [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    This strategy requires nuclear plants to have features that prevent radionuclide release and multiple barriers to the escape from the plants of any radionuclides that are released despite preventive measures. Considerations of the ability to prevent and mitigate release of radionuclides arise at numerous places in the safety regulations of nuclear plants. The effectiveness of mitigative capabilities in nuclear plants is subject to quantitative analysis. The radionuclide input to these quantitative analyses of effectiveness is the Source Term (ST). All features of the composition, magnitude, timing, chemical form and physical form of accidental radionuclide release constitute the ST. Also, ST is defined as the release of radionuclides from the fuel and coolant into the containment, and subsequently to the environment. The in-vessel STs of PGSFR will be estimated using the methodology of ANL-ART-38 report in additional to 4S methodology. The in-vessel STs are calculated through several phases: The inventory of each radionuclide is calculated by ORIGEN-2 code using the realistic burnup conditions. ST in the release from the core to primary sodium is calculated by using the assumption of ANL methodology. Lastly, ST in the release from the primary sodium to cover gas space is calculated by using equation and experimental materials.

  12. Transmission Network Expansion Planning Considering Desired Generation Security

    Directory of Open Access Journals (Sweden)

    Samaneh GOLESTANI

    2014-02-01

    Full Text Available Transmission Network Expansion Planning (TNEP is an important part of power system planning in both conventional and new structured power market. Its goal is to minimize the network construction and operational cost while satisfying the demand increase, considering technical and economic conditions. Planning algorithm in this paper consisted of two stages. The former specifies highly uncertain lines and probability of congestion, considering desired generation security level (e.g. N-2 generation security level. The latter determines the optimal expansion capacity of existing lines. Splitting required capacity for reinforcement of weak lines due to desired generation security level simplifies the TNEP problem. In addition, it monitors the impact of generation uncertainty on transmission lines. Simulation results of the proposed idea are presented for IEEE-RTS-24bus network.

  13. TECHNIQUE OF OPTIMAL AUDIT PLANNING FOR INFORMATION SECURITY MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    F. N. Shago

    2014-03-01

    Full Text Available Complication of information security management systems leads to the necessity of improving the scientific and methodological apparatus for these systems auditing. Planning is an important and determining part of information security management systems auditing. Efficiency of audit will be defined by the relation of the reached quality indicators to the spent resources. Thus, there is an important and urgent task of developing methods and techniques for optimization of the audit planning, making it possible to increase its effectiveness. The proposed technique gives the possibility to implement optimal distribution for planning time and material resources on audit stages on the basis of dynamics model for the ISMS quality. Special feature of the proposed approach is the usage of a priori data as well as a posteriori data for the initial audit planning, and also the plan adjustment after each audit event. This gives the possibility to optimize the usage of audit resources in accordance with the selected criteria. Application examples of the technique are given while planning audit information security management system of the organization. The result of computational experiment based on the proposed technique showed that the time (cost audit costs can be reduced by 10-15% and, consequently, quality assessments obtained through audit resources allocation can be improved with respect to well-known methods of audit planning.

  14. PLANNING INTELLIGENCE ACTIVITIES IN A DYNAMIC SECURITY ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Anca Pavel

    2016-10-01

    Full Text Available The hypothesis introduced by this article is that, in order to perform intelligence missions and to obtain valuable intelligence for the consumers it is necessary to implement processes and tools to support planning activities. Today's challenges consist rather in the ability of intelligence organizations to identify and initiate new connections, processes and communication flows with other partners operating in the security environment than to plan in their own name secret operations. From this point of view, planning activities should focus on new procedures, at a much more extensive level in order to align institutional efforts beyond the boundaries of their own organization and the national community of information. Also, in order to coordinate intelligence activities, strategic planning must be anchored into a complex analysis of the potential impact of existing and possible future global phenomena that shape the security environment and thus identify better ways of improving results.

  15. The EU Methodology of Security and Defense Planning

    Directory of Open Access Journals (Sweden)

    Mikhail V. Alexandrov

    2015-01-01

    Full Text Available Abstract: The article examines the methodology used within the European Union when planning the security and defence policy. The author analyses the key EU documents in this field, the structure of the respective EU bodies and the corresponding decision-making process. In particular, the article looks at the security and defence planning responsibilities of the European Council, the Military Committee and the Military Staff as well as the European Defence Agency. The author conducts a comparative analysis of the EU security and defence planning methodology with that of the US and NATO. He shows that the methodology is very similar. This concerns in particular the structural composition and the logics of the planning, its geographical scope and considerable propaganda component of respective public documents. Similarly to the US and NATO, the EU defence planning relies very little on the strategic forecasting. Instead the EU makes the principle of “strategic uncertainty” the corner stone of its policies. At the same time the EU widely uses elements of “dynamic forecasting” in its planning process, especially for short term forecasting periods. Moreover, the EU moved even further than the US and NATO along this road by applying the techniques that can be described as “dynamic planning”. At the same time the methodology of the EU security and defence planning has some significant specific features. This is explained by the fact, that the EU is mostly a civilian entity and military issues play only a small, though an important role in its work. Thus priority in its planning is given to civilian methods of promoting security, and the use of military force is regarded as the last resort. That is why the main accent in the EU security and defence policy is made on such instruments as crises management, political stabilization, peacekeeping operations and engagement of other states in all sorts of security and defence partnerships. This

  16. 33 CFR 157.102 - Plans for foreign tank vessels: Submission.

    Science.gov (United States)

    2010-07-01

    ... CARRYING OIL IN BULK Crude Oil Washing (COW) System on Tank Vessels General § 157.102 Plans for foreign...) The design of each COW machine; (c) The arrangement, location, and installation of the COW machines... nozzles of the COW machines on the surfaces of each tank, showing the surface areas not reached by direct...

  17. Nevada National Security Site Integrated Groundwater Sampling Plan, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Marutzky, Sam; Farnham, Irene

    2014-10-01

    The purpose of the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan) is to provide a comprehensive, integrated approach for collecting and analyzing groundwater samples to meet the needs and objectives of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity. Implementation of this Plan will provide high-quality data required by the UGTA Activity for ensuring public protection in an efficient and cost-effective manner. The Plan is designed to ensure compliance with the UGTA Quality Assurance Plan (QAP). The Plan’s scope comprises sample collection and analysis requirements relevant to assessing the extent of groundwater contamination from underground nuclear testing. This Plan identifies locations to be sampled by corrective action unit (CAU) and location type, sampling frequencies, sample collection methodologies, and the constituents to be analyzed. In addition, the Plan defines data collection criteria such as well-purging requirements, detection levels, and accuracy requirements; identifies reporting and data management requirements; and provides a process to ensure coordination between NNSS groundwater sampling programs for sampling of interest to UGTA. This Plan does not address compliance with requirements for wells that supply the NNSS public water system or wells involved in a permitted activity.

  18. Homeland Security Strategic Research Action Plan 2012 - 2016

    Science.gov (United States)

    EPA’s Homeland Security research plan outline and how it will address science and technological gaps and improve the Agency’s ability to carry out its responsibilities associated with preparing for and responding to, terrorist attacks, and other disasters.

  19. Marketing Plan for the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  20. Social Security Administration Data for Extra Help with Medicare Prescription Drug Plan Cost

    Data.gov (United States)

    Social Security Administration — This file contains information about Social Security determinations of eligibility for Extra Help with Medicare Prescription Drug Plan Costs. Specific data elements...

  1. Design and implementation of motion planning of inspection and maintenance robot for ITER-like vessel

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Hesheng; Lai, Yinping [Department of Automation, Shanghai Jiao Tong University, Shanghai 200240 (China); Key Laboratory of System Control and Information Processing, Ministry of Education of China (China); Chen, Weidong, E-mail: wdchen@sjtu.edu.cn [Department of Automation, Shanghai Jiao Tong University, Shanghai 200240 (China); Key Laboratory of System Control and Information Processing, Ministry of Education of China (China); Cao, Qixin [Institute of Robotics, Shanghai Jiao Tong University, Shanghai 200240 (China)

    2015-12-15

    Robot motion planning is a fundamental problem to ensure the robot executing the task without clashes, fast and accurately in a special environment. In this paper, a motion planning of a 12 DOFs remote handling robot used for inspecting the working state of the ITER-like vessel and maintaining key device components is proposed and implemented. Firstly, the forward and inverse kinematics are given by analytic method. The work space and posture space of this manipulator are both considered. Then the motion planning is divided into three stages: coming out of the cassette mover, moving along the in-vessel center line, and inspecting the D-shape section. Lastly, the result of experiments verified the performance of the motion design method. In addition, the task of unscrewing/screwing the screw demonstrated the feasibility of system in function.

  2. ITER vacuum vessel fabrication plan and cost study (D 68) for the international thermonuclear experimental reactor

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-01-01

    ITER Task No. 8, Vacuum Vessel Fabrication Plan and Cost Study (D68), was initiated to assess ITER vacuum vessel fabrication, assembly, and cost. The industrial team of Raytheon Engineers & Constructors and Chicago Bridge & Iron (Raytheon/CB&I) reviewed the current vessel basis and prepared a manufacturing plan, assembly plan, and cost estimate commensurate with the present design. The guidance for the Raytheon/CB&I assessment activities was prepared by the ITER Garching Work Site. This guidance provided in the form of work descriptions, sketches, drawings, and costing guidelines for each of the presently identified vacuum vessel Work Breakdown Structure (WBS) elements was compiled in ITER Garching Joint Work Site Memo (Draft No. 9 - G 15 MD 01 94-17-05 W 1). A copy of this document is provided as Appendix 1 to this report. Additional information and clarifications required for the Raytheon/CB&I assessments were coordinated through the US Home Team (USHT) and its technical representative. Design details considered essential to the Task 8 assessments but not available from the ITER Joint Central Team (JCT) were generated by Raytheon/CB&I and documented accordingly.

  3. Fast Generation of Near-Optimal Plans for Eco-Efficient Stowage of Large Container Vessels

    DEFF Research Database (Denmark)

    Pacino, Dario; Jensen, Rune Møller; Delgado-Ortegon, Alberto

    2011-01-01

    Eco-Efficient stowage plans that are both competitive and sustainable have become a priority for the shipping industry. Stowage planning is NP-hard and is a challenging optimization problem in practice. We propose a new 2-phase approach that generates near-optimal stowage plans and fulfills...... industrial time and quality requirements. Our approach combines an integer programming model for assigning groups of containers to storage areas of the vessel over multiple ports, and a constraint programming and local search procedure for stowing individual containers....

  4. SPAN: a decision support system for security plan analysis.

    OpenAIRE

    Ramsey, Stephen H.

    1991-01-01

    Approved for public release; distribution is unlimited Computer-based information systems provide countless opportunities to improve an organization's functioning and enhance its products or services. They also expose organizations to significant risks as they become increasingly dependent on information resources. To minimize the risks to an organization's information systems, an Information System (IS) security plan must be formulated. A Decision Support System (DSS) can p...

  5. 6 CFR 27.245 - Review and approval of site security plans.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...

  6. Safe electrode trajectory planning in SEEG via MIP-based vessel segmentation

    Science.gov (United States)

    Scorza, Davide; Moccia, Sara; De Luca, Giuseppe; Plaino, Lisa; Cardinale, Francesco; Mattos, Leonardo S.; Kabongo, Luis; De Momi, Elena

    2017-03-01

    Stereo-ElectroEncephaloGraphy (SEEG) is a surgical procedure that allows brain exploration of patients affected by focal epilepsy by placing intra-cerebral multi-lead electrodes. The electrode trajectory planning is challenging and time consuming. Various constraints have to be taken into account simultaneously, such as absence of vessels at the electrode Entry Point (EP), where bleeding is more likely to occur. In this paper, we propose a novel framework to help clinicians in defining a safe trajectory and focus our attention on EP. For each electrode, a Maximum Intensity Projection (MIP) image was obtained from Computer Tomography Angiography (CTA) slices of the brain first centimeter measured along the electrode trajectory. A Gaussian Mixture Model (GMM), modified to include neighborhood prior through Markov Random Fields (GMM-MRF), is used to robustly segment vessels and deal with the noisy nature of MIP images. Results are compared with simple GMM and manual global Thresholding (Th) by computing sensitivity, specificity, accuracy and Dice similarity index against manual segmentation performed under the supervision of an expert surgeon. In this work we present a novel framework which can be easily integrated into manual and automatic planner to help surgeon during the planning phase. GMM-MRF qualitatively showed better performance over GMM in reproducing the connected nature of brain vessels also in presence of noise and image intensity drops typical of MIP images. With respect Th, it is a completely automatic method and it is not influenced by inter-subject variability.

  7. Guidelines for developing NASA (National Aeronautics and Space Administration) ADP security risk management plans

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    This report presents guidance to NASA Computer security officials for developing ADP security risk management plans. The six components of the risk management process are identified and discussed. Guidance is presented on how to manage security risks that have been identified during a risk analysis performed at a data processing facility or during the security evaluation of an application system.

  8. 33 CFR 105.405 - Format and content of the Facility Security Plan (FSP).

    Science.gov (United States)

    2010-07-01

    ... and security plan amendments; (17) Facility Security Assessment (FSA) report; and (18) Facility Vulnerability and Security Measures Summary (Form CG-6025) in appendix A to part 105-Facility Vulnerability and... resubmission of the FSP. (c) The Facility Vulnerability and Security Measures Summary (Form CG-6025) must be...

  9. Food security issues--a potential comprehensive plan.

    Science.gov (United States)

    Norton, R A

    2003-06-01

    The need for a comprehensive plan to protect the food production system has emerged as a critical issue over the last several years. To address this need, a comprehensive food security plan has been developed at Auburn University. The proposed program, entitled the Consolidated American Network for Agriculture Resource Intelligence (CANARI) system is one of several systems being proposed to deal with potential agricultural bioterrorism or agroterrorism events. Unlike other systems, which hastily emerged in many agencies after the tragedy of September 11, 2001, the system has been planned over the last 5 yr with the input of the agricultural industries, is comprehensive in its conception, and is designed to coordinate all components (existing and planned) necessary to prevent, detect, and respond to potential agroterrorism events. The plan uses the principle that the first line of defense must be within the states and agricultural companies for the detection of agroterrorism incidents to be rapid and the response effective, organized, and timely. CANARI is designed to integrate the previously disparate elements by fostering a cooperative network of local, state, and federal agencies as well as commodity entities and interested non-governmental organizations. Using a market-driven approach, the system encourages commodity membership and cooperation through positive incentives rather than regulatory duress. A centralized command structure is envisioned, which would be provided through the creation of a National Agroterrorism Defense Center. The responsibility of this Center would be to coordinate all of the activities presently available in components at the local, state, and federal levels and develop and manage new and emerging activities provided by the stakeholders. CANARI offers a new paradigm by which all of its constituent members act collectively and cooperatively to lessen the risk of an attack and better ensure the continued availability of a safe, abundant

  10. Wireless Sensor Buoys for Perimeter Security of Military Vessels and Seabases

    Science.gov (United States)

    2015-12-01

    RELATED TECHNOLOGICAL APPLICATIONS ..................................14 1. Wireless Sensor Networks...methods to protect property and assets. Some critical facilities such as military bases, nuclear power plants , and borders have begun to...base, nuclear power plant , border, or other secured area” [1]. The concept of maintaining a secure perimeter is highly relevant in modern times

  11. 33 CFR 104.220 - Company or vessel personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... measures; (e) Crowd management and control techniques; (f) Security related communications; (g) Knowledge... duties must maintain a TWIC, and must have knowledge, through training or equivalent job experience, in the following, as appropriate: (a) Knowledge of current security threats and patterns; (b) Recognition...

  12. 76 FR 17782 - Security Zone: Passenger Vessels, Sector Southeastern New England Captain of the Port Zone

    Science.gov (United States)

    2011-03-31

    ... evaluate its effects on them and participate in the rulemaking process. If you think your small business or... will not restrict any waterway for a long period of time. The vast majority of passenger vessel... would have a significant economic impact on a substantial number of small entities. The term ``small...

  13. 76 FR 47996 - Security Zone; 2011 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, WA; Correction

    Science.gov (United States)

    2011-08-08

    ... (NCSM 702), CCGS SIYAY, and the USCGC ALERT (WMEC 630) which include all waters within 500 yards from... (NCSM 702), CCGS SIYAY, and the USCGC ALERT (WMEC 630) while these vessels are participating in the... within 500 yards of the HMCS WHITEHORSE (NCSM 705), HMCS NANAIMO (NCSM 702), CCGS SIYAY, and the USCGC...

  14. 77 FR 44475 - Security Zones; Seattle's Seafair Fleet Week Moving Vessels, Puget Sound, WA

    Science.gov (United States)

    2012-07-30

    ... Vessels, Puget Sound, WA AGENCY: Coast Guard, DHS. ACTION: Notice of enforcement of regulation. SUMMARY... Anthony P. LaBoy, Sector Puget Sound, Waterways Management Division, U.S. Coast Guard; telephone 206-217-6323, email SectorPugetSound[email protected] . If you have questions on viewing the docket, call Renee V...

  15. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    This thesis proposes to overhaul the state and urban area homeland security strategy program by improving the strategic planning process guidance and assistance and strategy review in collaboration...

  16. Cost-Benefit Analysis Methodology: Install Commercially Compliant Engines on National Security Exempted Vessels?

    Science.gov (United States)

    2015-11-05

    Carderock Division (NAVSSES), Machinery Research and Engineering Dept., Philadelphia, PA, USA. 2. Life Cycle Engineering, Federal Solutions Group , Energy...Federal Solutions Group , Energy Programs, Pittsburgh, PA, USA. 3. Alion Science and Technology, Industrial Engineering Division, Analysis Department...designation of Emission Control Area ( ECA ) now applies to all U.S. coasts. Within ECAs , all vessels, regardless of flag, are required to meet the

  17. Next Generation Nuclear Plant Reactor Pressure Vessel Materials Research and Development Plan (PLN-2803)

    Energy Technology Data Exchange (ETDEWEB)

    J. K. Wright; R. N. Wright

    2010-07-01

    The U.S. Department of Energy (DOE) has selected the High-Temperature Gas-cooled Reactor (HTGR) design for the Next Generation Nuclear Plant (NGNP) Project. The NGNP will demonstrate the use of nuclear power for electricity and hydrogen production, with an outlet gas temperature in the range of 750°C, and a design service life of 60 years. The reactor design will be a graphite-moderated, helium-cooled, prismatic, or pebble bed reactor and use low-enriched uranium, Tri-Isotopic (TRISO)-coated fuel. The plant size, reactor thermal power, and core configuration will ensure passive decay heat removal without fuel damage or radioactive material releases during accidents. Selection of the technology and design configuration for the NGNP must consider both the cost and risk profiles to ensure that the demonstration plant establishes a sound foundation for future commercial deployments. The NGNP challenge is to achieve a significant advancement in nuclear technology while setting the stage for an economically viable deployment of the new technology in the commercial sector soon after 2020. This technology development plan details the additional research and development (R&D) required to design and license the NGNP RPV, assuming that A 508/A 533 is the material of construction. The majority of additional information that is required is related to long-term aging behavior at NGNP vessel temperatures, which are somewhat above those commonly encountered in the existing database from LWR experience. Additional data are also required for the anticipated NGNP environment. An assessment of required R&D for a Grade 91 vessel has been retained from the first revision of the R&D plan in Appendix B in somewhat less detail. Considerably more development is required for this steel compared to A 508/A 533 including additional irradiation testing for expected NGNP operating temperatures, high-temperature mechanical properties, and extensive studies of long-term microstructural stability.

  18. 48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...

  19. 48 CFR 1252.239-71 - Information technology security plan and accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...

  20. 77 FR 30400 - Moving Security Zone Around Escorted Vessels on the Lower Mississippi River

    Science.gov (United States)

    2012-05-23

    ... deemed by the COTP New Orleans to require escort protection during transit between mile marker 90.0 to... the Port of New Orleans (COTP New Orleans) is re-establishing and extending the effective period for the moving security zone on the Mississippi river, mile marker 90 through mile marker 110, extending...

  1. 33 CFR 155.1030 - General response plan requirements.

    Science.gov (United States)

    2010-07-01

    ... SECURITY (CONTINUED) POLLUTION OIL OR HAZARDOUS MATERIAL POLLUTION PREVENTION REGULATIONS FOR VESSELS Tank Vessel Response Plans for Oil § 155.1030 General response plan requirements. (a) The plan must cover all geographic areas of the United States in which the vessel intends to handle, store, or transport oil...

  2. State and urban area homeland security strategy v3.0 : evolving strategic planning

    OpenAIRE

    Chen, Darren

    2006-01-01

    CHDS State/Local This thesis proposes to overhaul the state and urban area homeland security strategy program by improving the strategic planning process, guidance and assistance, and strategy review in collaboration with state and local stakeholders. Federal, state, and local reviewers regard the current state and urban homeland security strategies as generally inadequate and indicative of limited strategic planning processes. Comprehensive, enterprise-wide homeland security strategie...

  3. Chinese Energy Security: The Myth of the Plan’s Frontline Status

    Science.gov (United States)

    2010-08-01

    Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17...peacekeeping operations in Somalia), the security of the Sudanese oil crescent, the latest Eritrean terror connection, and, most importantly, America’s...would have to be launched 69 from Chinese soil or from naval vessels/aircraft based in China. These missiles would have to travel great distances

  4. Considerations to Enhance the Florida Domestic Security Strategic Plan

    Science.gov (United States)

    2011-03-01

    State Homeland Security Strategy (Nebraska Emergency Mangement Agency, 2009) • Vermont Homeland Security Strategy (Vermont Department of Public... Mangement Agency. (2009). Nebraska 2009 state homeland security strategy. Retrieved August 19, 2010, from http://www.nema.ne.gov/content/home_news/2009

  5. Analysis of the security during power system expansion planning

    Directory of Open Access Journals (Sweden)

    Osak Alexey

    2017-01-01

    Full Text Available Increasing the intelligent level of the EPS control systems, caused by the implementation of Smart technologies, changes the structure and the properties of EPS and increases the importance of system reliability analysis. System reliability analysis includes two components – for the balance and for the regime. On the one hand, there is a large number of studies to assess the reliability of the power system, which examines various aspects and methods of solving this problem. On the other hand, in Russia there is no generally accepted methodology with clear criteria that could be used for feasibility studies of various technical solutions taking into consideration system reliability aspects. In practice, the security analysis is limited by the calculations of power flows, static and dynamic stability for a number of forecast periods for the normal and repair circuits considering the most severe disturbances. The existing approach allows defining the requirements and adjusting emergency control systems, but does not allow evaluating and comparing solutions for power grid constructions. The authors propose a new method for power system reliability evaluation, which is suitable for planning development and operation of power systems. The method includes a general description of the algorithm which allows to compare various development scenarios, as well as to assess the reliability level of their implementation. In particular, the method allows to determine where it is needed only the relay protection and emergency control system development, and where it is necessary grid, protection and control development and reconstruction.

  6. Damage Control Plan for International Space Station Recharge Tank Assembly Composite Overwrapped Pressure Vessel

    Science.gov (United States)

    Cook, Anthony J.

    2011-01-01

    As NASA has retired the Space Shuttle Program, a new method of transporting compressed gaseous nitrogen and oxygen needed to be created for delivery of these crucial life support resources to the International Space Station (ISS). One of the methods selected by NASA includes the use of highly pressurized, unprotected Recharge Tank Assemblies (RTAs) utilizing Composite Overwrapped Pressure Vessels (COPVs). A COPV consists of a thin liner wrapped with a fiber composite and resin or epoxy. It is typically lighter weight than an all metal pressure vessel of similar volume and therefore provides a higher-efficiency means for gas storage. However COPVs are known to be susceptible to damage resulting from handling, tool drop impacts, or impacts from other objects. As a result, a comprehensive Damage Control Plan has been established to mitigate damage to the RTA COPV throughout its life cycle. The DCP is intended to evaluate and mitigate defined threats during manufacturing, shipping and handling, test, assembly level integration, shipment while pressurized, launch vehicle integration and mission operations by defining credible threats and methods for preventing potential damage while still maintaining the primary goal of resupplying ISS gas resources. A comprehensive threat assessment is performed to identify all threats posed to the COPV during the different phases of its lifecycle. The threat assessment is then used as the basis for creating a series of general inspection, surveillance and reporting requirements which apply across all phases of the COPV's life, targeted requirements only applicable to specific work phases and a series of training courses for both ground personnel and crew aboard the ISS. A particularly important area of emphasis deals with creating DCP requirements for a highly pressurized, large and unprotected RTA COPV for use during Inter Vehicular Activities (IVA) operations in the micro gravity environment while supplying pressurized gas to the

  7. [Compliance with guidelines by state plans for food and nutritional security in Brazil].

    Science.gov (United States)

    Machado, Mick Lennon; Gabriel, Cristine Garcia; Soar, Claudia; Mamed, Gisele Rockenbach; Machado, Patrícia Maria de Oliveira; Lacerda, Josimari Telino de; Martins, Milena Corrêa; Marcon, Maria Cristina

    2018-02-05

    A descriptive and documental study was performed from August to October 2016 to analyze compliance by state plans for food and nutritional security (PlanSAN) with the guidelines set by the Brazilian National Policy for Food and Nutritional Security (PNSAN). The state plans were accessed via the websites of the Inter-Ministerial Chamber for Food and Nutritional Security (CAISAN) or the state governments, plus complementary data collection at the state level. All the states of Brazil joined the National System for Food and Nutritional Security (SISAN), while fewer than half (13 states, 48%) had drafted their plans. Of these, 5 (38%) of the PlanSAN had schedules that coincided with the same state's pluriannual plan, 5 (38%) of the PlanSAN specified the budget requirements for meeting the proposed targets, 7 (54%) specified mechanisms for monitoring the plan, and only 2 (15%) defined methodologies for monitoring food and nutritional security. The recent existence of (and adherence to) the CAISAN appear to be related to the lack of state plans in half the states. Although most of the states that did have plans met some of the guidelines laid out by the PNSAN, these mechanisms become weak and impractical when they lack earmarked budget funds to meet their targets. Since the PNSAN is structurally inter-sectorial, the development of plans requires collective work by various government departments. Importantly, the items analyzed here are all guidelines, which implies the need for mechanisms to monitor their actual implementation.

  8. 33 CFR 103.505 - Elements of the Area Maritime Security (AMS) Plan.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Elements of the Area Maritime...) Plan § 103.505 Elements of the Area Maritime Security (AMS) Plan. The AMS Plan should address the following elements, as applicable: (a) Details of both operational and physical measures that are in place...

  9. Research vessels

    Digital Repository Service at National Institute of Oceanography (India)

    Rao, P.S.

    by the research vessels RV Gaveshani and ORV Sagar Kanya are reported. The work carried out by the three charted ships is also recorded. A short note on cruise plans for the study of ferromanganese nodules is added...

  10. Security plan for the Automated Transportation Management System

    Energy Technology Data Exchange (ETDEWEB)

    1994-04-01

    The Automated Transportation Management System (ATMS) is an unclassified non-sensitive system consisting of hardware and software designed to facilitate the shipment of goods for the US Department of Energy (DOE). The system is secured against waste, fraud, abuse, misuse, and programming errors through a series of security measures that are discussed in detail in this document.

  11. Strategic Sustainability Performance Plan. Discovering Sustainable Solutions to Power and Secure America’s Future

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2010-09-01

    Sustainability is fundamental to the Department of Energy’s research mission and operations as reflected in the Department’s Strategic Plan. Our overarching mission is to discover the solutions to power and secure America’s future.

  12. Segmentation of hepatic vessels from MRI images for planning of electroporation-based treatments in the liver.

    Science.gov (United States)

    Marcan, Marija; Pavliha, Denis; Music, Maja Marolt; Fuckan, Igor; Magjarevic, Ratko; Miklavcic, Damijan

    2014-09-01

    Electroporation-based treatments rely on increasing the permeability of the cell membrane by high voltage electric pulses delivered to tissue via electrodes. To ensure that the whole tumor is covered by the sufficiently high electric field, accurate numerical models are built based on individual patient geometry. For the purpose of reconstruction of hepatic vessels from MRI images we searched for an optimal segmentation method that would meet the following initial criteria: identify major hepatic vessels, be robust and work with minimal user input. We tested the approaches based on vessel enhancement filtering, thresholding, and their combination in local thresholding. The methods were evaluated on a phantom and clinical data. Results show that thresholding based on variance minimization provides less error than the one based on entropy maximization. Best results were achieved by performing local thresholding of the original de-biased image in the regions of interest which were determined through previous vessel-enhancement filtering. In evaluation on clinical cases the proposed method scored in average sensitivity of 93.68%, average symmetric surface distance of 0.89 mm and Hausdorff distance of 4.04 mm. The proposed method to segment hepatic vessels from MRI images based on local thresholding meets all the initial criteria set at the beginning of the study and necessary to be used in treatment planning of electroporation-based treatments: it identifies the major vessels, provides results with consistent accuracy and works completely automatically. Whether the achieved accuracy is acceptable or not for treatment planning models remains to be verified through numerical modeling of effects of the segmentation error on the distribution of the electric field.

  13. United States Plan for Sustaining the Afghan National Security Forces

    Science.gov (United States)

    2009-04-01

    approximately 900 soldiers, the CNIK had the specified mission to provide security for the MoI’s Poppy Eradication Forces ( PEF ). The CNIK and PEF ...conducted poppy eradication operations in RC South from January to April 2009. The security provided by the CNIK enabled the PEF to eradicate 2,644...hectares of poppy during the 2009 season, compared to 1,174 hectares during 2008. CNIK and PEF operations encountered resistance from insurgents and

  14. 76 FR 76981 - Request for Public Comments Concerning U.S.-Canada Action Plan for Perimeter Security and...

    Science.gov (United States)

    2011-12-09

    ... SECURITY Request for Public Comments Concerning U.S.-Canada Action Plan for Perimeter Security and Economic... of Homeland Security (DHS), on behalf of the Administration, is seeking public input on the Beyond..., U.S. Department of Homeland Security, Mailstop 0455, Washington, DC 20016. The public is strongly...

  15. Background Information for the Nevada National Security Site Integrated Sampling Plan, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene; Marutzky, Sam

    2014-12-01

    This document describes the process followed to develop the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan). It provides the Plan’s purpose and objectives, and briefly describes the Underground Test Area (UGTA) Activity, including the conceptual model and regulatory requirements as they pertain to groundwater sampling. Background information on other NNSS groundwater monitoring programs—the Routine Radiological Environmental Monitoring Plan (RREMP) and Community Environmental Monitoring Program (CEMP)—and their integration with the Plan are presented. Descriptions of the evaluations, comments, and responses of two Sampling Plan topical committees are also included.

  16. Plan Nacional de Desarrollo y Seguridad 1971-1975 (National Plan for Development and Security, 1971-1975).

    Science.gov (United States)

    Boletin del Centro Nacional de Documentacion e Informacion Educativa, 1971

    1971-01-01

    This article discusses the education provisions established in the Argentine Plan for Development and Security (1971-1975). The statements on educational development call for a diagnostic study of the current cultural and educational situation, the establishment of objectives and strategies, goals for each level of education, steps for the…

  17. Contraceptive security, information flow, and local adaptations: family planning Morocco.

    Science.gov (United States)

    Chandani, Y; Breton, G

    2001-12-01

    Many developing countries increasingly recognize and acknowledge family planning as a critical part of socio-economic development. However, with few health dollars to go around, countries tend to provide essential drugs for curative care, rather than for family planning products. Donors have historically provided free contraceptives for family planning services. Whether products are donated or purchased by the country, a successful family planning program depends on an uninterrupted supply of products, beginning with the manufacturer and ending with the customer. Any break in the supply chain may cause a family planning program to fail. A well-functioning logistics system can manage the supply chain and ensure that the customers have the products they need, when they need them. Morocco was selected for the case study. The researchers had ready access to key informants and information about the Logistics Management Information System. Because the study had time and resource constraints, research included desktop reviews and interview, rather than data collection in the field. The case study showed that even in a challenging environment an LMIS can be successfully deployed and fully supported by the users. It is critical to customize the system to a country-specific situation to ensure buy-in for the implementation. Significant external support funding and technical expertise are critical components to ensure the initial success of the system. Nonetheless, evidence from the case study shows that, after a system has been implemented, the benefits may not ensure its institutionalization. Other support, including local funding and technical expertise, is required.

  18. 33 CFR 155.1065 - Procedures for plan submission, approval, requests for acceptance of alternative planning...

    Science.gov (United States)

    2010-07-01

    ... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) POLLUTION OIL OR HAZARDOUS MATERIAL POLLUTION PREVENTION REGULATIONS FOR VESSELS Tank Vessel Response Plans for Oil § 155... days before the vessel intends to handle, store, transport, transfer, or lighter oil in areas subject...

  19. Homeland Security is Hometown Security: Comparison and Case Studies of Vertically Synchronized Catastrophe Response Plans

    Science.gov (United States)

    2015-09-01

    strengthening of transnational criminal organizations.27 Other major weather events, such as hurricanes and tornados , are also prominently...foundation for the 15 national planning scenarios and five overarching mission areas.79 The mission areas were sub- categorized into a 578 page Target...injured casualties.269 This is further broken down into sub- categorizes of the triage classification of those patients. The plan even includes an

  20. Fast Generation of Near-Optimal Plans for Eco-Efficient Stowage of Large Container Vessels

    DEFF Research Database (Denmark)

    Pacino, Dario; Delgado, Alberto; Jensen, Rune Møller

    2011-01-01

    Eco-efficient stowage plans that are both competitive and sustainable have become a priority for the shipping industry. Stowage planning is NP-hard and is a challenging optimization problem in practice. We propose a new 2-phase approach that generates near-optimal stowage plans and fulfills...

  1. Underground Test Area Activity Communication/Interface Plan, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro, Las Vegas, NV (United States); Rehfeldt, Kenneth [Navarro, Las Vegas, NV (United States)

    2016-10-01

    The purpose of this plan is to provide guidelines for effective communication and interfacing between Underground Test Area (UGTA) Activity participants, including the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) and its contractors. This plan specifically establishes the following: • UGTA mission, vision, and core values • Roles and responsibilities for key personnel • Communication with stakeholders • Guidance in key interface areas • Communication matrix

  2. Information security in academic libraries: the role of the librarian in planning and introducing institutional policies

    Directory of Open Access Journals (Sweden)

    Juliana Soares Lima

    2017-04-01

    Full Text Available This study presents a short discussion about the role of the librarian as a mediator at planning, developing and implementing an Information Security Policy in Academic Libraries, by working together with professionals in the field of Information Technology. It also discusses the main virtual threats and some risks that are prone to infect computers in libraries. Based on the current legislation and on some normative documents about information security, it is confirmed the importance of the librarian take part in the main decision-making related to information security, such as planning a consistent Information Security Policy which be able to see the specific needs of Academic Libraries as institutions prone to cyberattacks. The main topics and guidelines to carry out an Information Security Policy are presented based on the results that were obtained through an action research, by visiting libraries to fill in application forms and to compose reports whose content was analyzed. Finally, the study concludes that Information Security Policy must be validated by managers of sectors or departments which the Academic Library is hierarchically subordinate to.

  3. Integrated Food and Nutrition Security Programming to Address Undernutrition : The Plan Approach

    NARCIS (Netherlands)

    Boer, de F.A.; Verdonk, I.

    2012-01-01

    From a technical point of view, it is widely recognised that an integrated approach to food and nutrition security is an effective way to promote child nutritional well-being. In this desk review, based on project documents of the countries which took part in the PLAN NL supported Food and Nutrition

  4. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  5. PROPOSAL FOR THE CREATION OF SECURITY PLANS FOR THE ROAD TRANSPORTATION OF HIGH CONSEQUENCE DANGEROUS GOODS

    Directory of Open Access Journals (Sweden)

    Karolina KOŁDYS

    2016-12-01

    Full Text Available In the list of dangerous goods, there are materials and articles, which, due to particular criteria stated in the European Agreement Concerning the International Carriage of Goods by Road (ADR, are treated as high consequence goods. High consequence dangerous goods are those whose misuse may lead to a terrorist event and therefore pose a serious threat of mass casualties, destruction or socio-economic disruption. All personnel responsible for the carriage of high consequence dangerous goods should comply with ADR requirements, as appropriate. Basic ADR requirements, which should lead to the elimination of potential safety violations hazards, is to acknowledge, implement and respect security plans. The ADR reflects overall security plan regulations, describing the elements of which such plans should be created. The ADR itself does not prescribe methods for preparing documentation, nor implementation details. This article is to elaborate on these aspects.

  6. Exclusión y seguridad social en el plan de desarrollo Exclusion and social security in the Development Plan

    Directory of Open Access Journals (Sweden)

    Rodríguez Salazar Oscar

    1999-06-01

    Full Text Available Este articulo analiza la forma en que el Plan de Desarrollo "Cambio para contruir la Paz" trata el sistema de seguridad social y su interpretacion sobre las causas de la exclusion social. El plan carece de una vision de conjunto del sistema por cuanto no aborda los aspectos reisgos profesionles y pensiones; articula el concepto de solidaridad a las relaciones interpersonales y, asi, subestima el papel del Estado en el logro de esa meta. Por otra parte, las politicas laborales esbozadas en el Plan conducen en forma inexorable a una mayor exclusion social. En cuanto al sistema de seguridad social en salud, dado que la cobertura se ha extendido mediante el regimen subsidiado, la ausencia de una politica que promueva el control social puede acentuar la clientelizacion que Estado manifiesta querer combatir.This article analyzes the way that the Development Plan "Changeto Build Peace" treats the social security system and its interpretation of the causes of social exclusion. The Plan lacks a vision of the system as a whole as it does not address the aspects of professional risks and pensions; it articula tes the concept of solidarity to interpersonal relations and thus underestimates the role of the State in achieving that goal. Moreover, the labor policies outlined in the Plan lead inexorably to greater social exclusion. As far as the social security system for health, given that coverage has been extended by meansof the subsidized regime, the absence of a policy that promotes social control may accentuate the clientelization of the State which the Plan claims to want to combato.

  7. 46 CFR 170.095 - Data submittal for a vessel equipped to lift.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Data submittal for a vessel equipped to lift. 170.095 Section 170.095 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND... vessel equipped to lift. The following data must be submitted with the plans required by § 170.075 if the...

  8. CS651 Computer Systems Security Foundations 3d Imagination Cyber Security Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Nielsen, Roy S. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-03-02

    3d Imagination is a new company that bases its business on selling and improving 3d open source related hardware. The devices that they sell include 3d imagers, 3d printers, pick and place machines and laser etchers. They have a fast company intranet for ease in sharing, storing and printing large, complex 3d designs. They have an employee set that requires a variety of operating systems including Windows, Mac and a variety of Linux both for running business services as well as design and test machines. There are a wide variety of private networks for testing transfer rates to and from the 3d devices, without interference with other network tra c. They do video conferencing conferencing with customers and other designers. One of their machines is based on the project found at delta.firepick.org(Krassenstein, 2014; Biggs, 2014), which in future, will perform most of those functions. Their devices all include embedded systems, that may have full blown operating systems. Most of their systems are designed to have swappable parts, so when a new technology is born, it can be quickly adopted by people with 3d Imagination hardware. This company is producing a fair number of systems and components, however to get the funding they need to mass produce quality parts, so they are preparing for an IPO to raise the funds they need. They would like to have a cyber-security audit performed so they can give their investors con dence that they are protecting their data, customers information and printers in a proactive manner.

  9. 76 FR 28315 - Security Zone; Vessels Carrying Hazardous Cargo, Sector Columbia River Captain of the Port Zone

    Science.gov (United States)

    2011-05-17

    ... cargoes include, but are not limited to, liquefied petroleum gas, ammonium nitrate and associated mixtures... Department of Homeland Security Management Directive 023-01 and Commandant Instruction M16475.lD, which guide...

  10. 75 FR 76328 - Security Zone; Vessels Carrying Hazardous Cargo, Sector Columbia River Captain of the Port Zone

    Science.gov (United States)

    2010-12-08

    ... to, liquefied petroleum gas, ammonium nitrate and associated mixtures, anhydrous ammonia, and... of Homeland Security Management Directive 023-01 and Commandant Instruction M16475.1D, which guide...

  11. Next Generation Nuclear Plant Reactor Pressure Vessel Materials Research and Development Plan (PLN-2803)

    Energy Technology Data Exchange (ETDEWEB)

    J. K. Wright; R. N. Wright

    2008-04-01

    The U.S. Department of Energy has selected the High Temperature Gas-cooled Reactor design for the Next Generation Nuclear Plant (NGNP) Project. The NGNP will demonstrate the use of nuclear power for electricity and hydrogen production. It will have an outlet gas temperature in the range of 900°C and a plant design service life of 60 years. The reactor design will be a graphite moderated, helium-cooled, prismatic, or pebble-bed reactor and use low-enriched uranium, Tri-Isotopic-coated fuel. The plant size, reactor thermal power, and core configuration will ensure passive decay heat removal without fuel damage or radioactive material releases during accidents. The NGNP Materials Research and Development Program is responsible for performing research and development on likely NGNP materials in support of the NGNP design, licensing, and construction activities. Selection of the technology and design configuration for the NGNP must consider both the cost and risk profiles to ensure that the demonstration plant establishes a sound foundation for future commercial deployments. The NGNP challenge is to achieve a significant advancement in nuclear technology while setting the stage for an economically viable deployment of the new technology in the commercial sector soon after 2020. Studies of potential Reactor Pressure Vessel (RPV) steels have been carried out as part of the pre-conceptual design studies. These design studies generally focus on American Society of Mechanical Engineers (ASME) Code status of the steels, temperature limits, and allowable stresses. Three realistic candidate materials have been identified by this process: conventional light water reactor RPV steels A508/533, 2¼Cr-1Mo in the annealed condition, and modified 9Cr 1Mo ferritic martenistic steel. Based on superior strength and higher temperature limits, the modified 9Cr-1Mo steel has been identified by the majority of design engineers as the preferred choice for the RPV. All of the vendors have

  12. Collaborative Adaptation Planning for Water Security: Preliminary Lessons, Challenges, and the Way Forward for Maipo Basin Adaptation Plan, Chile

    Science.gov (United States)

    Vicuna, S.; Scott, C. A.; Bonelli, S.; Bustos, E.; Meza, F. J.

    2014-12-01

    The Maipo basin holds 40% of Chile's total population and almost half of the country's Gross Domestic Product. The basin is located in the semiarid central region of the country and, aside from the typical pressures of growth in developing country basins, the Maipo river faces climate change impacts associated with a reduction in total runoff and changes in its seasonality. Surface water is the main water source for human settlements and economic activities including agriculture. In 2012 we started a research project to create a climate variability and climate change adaptation plan for the basin. The pillars of the plan are co-produced by researchers and a Scenario Building Team (SBT) with membership of relevant water and land use stakeholders (including from civil society, public and private sectors) in the basin. Following similar experiences in other regions in the world that have faced the challenges of dealing with long term planning under uncertainty, the project has divided the task of developing the plan into a series of interconnected elements. A critical first component is to work on the desired vision(s) of the basin for the future. In this regards, the "water security" concept has been chosen as a framework that accommodates all objectives of the SBT members. Understanding and quantifying the uncertainties that could affect the future water security of the basin is another critical aspect of the plan. Near and long term climate scenarios are one dimension of these uncertainties that are combined with base development uncertainties such as urban growth scenarios. A third component constructs the models/tools that allows the assessment of impacts on water security that could arise under these scenarios. The final critical component relates to the development of the adaptation measures that could avoid the negative impacts and/or capture the potential opportunities. After two years in the development of the adaptation plan a series of results has been

  13. Planning of vessel grafts for reconstructive surgery in congenital heart diseases

    Science.gov (United States)

    Rietdorf, U.; Riesenkampff, E.; Schwarz, T.; Kuehne, T.; Meinzer, H.-P.; Wolf, I.

    2010-02-01

    The Fontan operation is a surgical treatment for patients with severe congenital heart diseases, where a biventricular correction of the heart can't be achieved. In these cases, a uni-ventricular system is established. During the last step of surgery a tunnel segment is placed to connect the inferior caval vein directly with the pulmonary artery, bypassing the right atrium and ventricle. Thus, the existing ventricle works for the body circulation, while the venous blood is passively directed to the pulmonary arteries. Fontan tunnels can be placed intra- and extracardially. The location, length and shape of the tunnel must be planned accurately. Furthermore, if the tunnel is placed extracardially, it must be positioned between other anatomical structures without constraining them. We developed a software system to support planning of the tunnel location, shape, and size, making pre-operative preparation of the tunnel material possible. The system allows for interactive placement and adjustment of the tunnel, affords a three-dimensional visualization of the virtual Fontan tunnel inside the thorax, and provides a quantification of the length, circumferences and diameters of the tunnel segments. The visualization and quantification can be used to plan and prepare the tunnel material for surgery in order to reduce the intra-operative time and to improve the fit of the tunnel patch.

  14. Bio-inspired motion planning algorithms for autonomous robots facilitating greater plasticity for security applications

    Science.gov (United States)

    Guo, Yi; Hohil, Myron; Desai, Sachi V.

    2007-10-01

    Proposed are techniques toward using collaborative robots for infrastructure security applications by utilizing them for mobile sensor suites. A vast number of critical facilities/technologies must be protected against unauthorized intruders. Employing a team of mobile robots working cooperatively can alleviate valuable human resources. Addressed are the technical challenges for multi-robot teams in security applications and the implementation of multi-robot motion planning algorithm based on the patrolling and threat response scenario. A neural network based methodology is exploited to plan a patrolling path with complete coverage. Also described is a proof-of-principle experimental setup with a group of Pioneer 3-AT and Centibot robots. A block diagram of the system integration of sensing and planning will illustrate the robot to robot interaction to operate as a collaborative unit. The proposed approach singular goal is to overcome the limits of previous approaches of robots in security applications and enabling systems to be deployed for autonomous operation in an unaltered environment providing access to an all encompassing sensor suite.

  15. 46 CFR 169.853 - Display of plans.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Display of plans. 169.853 Section 169.853 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Operations Tests, Drills, and Inspections § 169.853 Display of plans. (a) Each vessel of 100 gross tons and over...

  16. 46 CFR 131.945 - Display of plans.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Display of plans. 131.945 Section 131.945 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OFFSHORE SUPPLY VESSELS OPERATIONS Miscellaneous § 131.945 Display of plans. Each vessel must have a permanently exhibited, for the guidance of the...

  17. 77 FR 6013 - Moving Security Zone Around Escorted Vessels On the Lower Mississippi River Between Mile Marker...

    Science.gov (United States)

    2012-02-07

    ... Lower Mississippi River Between Mile Marker 90.0 Above Head of Passes to Mile Marker 110.0 Above Head of Passes AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Captain of the Port of New Orleans (COTP New Orleans) has established moving security zones on the Mississippi River, from mile...

  18. Underground Test Area Quality Assurance Project Plan Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Irene Farnham

    2011-05-01

    This Quality Assurance Project Plan (QAPP) provides the overall quality assurance (QA) program requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) Sub-Project (hereafter the Sub-Project) activities. The requirements in this QAPP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). The QAPP Revision 0 supersedes DOE--341, Underground Test Area Quality Assurance Project Plan, Nevada Test Site, Nevada, Revision 4.

  19. Coast guard : better logistics planning needed to aid operational decisions related to the deployment of the national security cutter and its support assets.

    Science.gov (United States)

    2009-07-01

    As part of its more than $$24 billion Deepwater program to replace aging vessels and aircraft with new or upgraded assets, the Coast Guard is preparing the National Security Cutter (NSC) for service. GAO previously reported on Deepwater assets' deplo...

  20. Soil Management Plan for the Oak Ridge Y-12 National Security Complex Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2005-03-02

    This Soil Management Plan applies to all activities conducted under the auspices of the National Nuclear Security Administration (NNSA) Oak Ridge Y-12 National Security Complex (Y-12) that involve soil disturbance and potential management of waste soil. The plan was prepared under the direction of the Y-12 Environmental Compliance Department of the Environment, Safety, and Health Division. Soil disturbances related to maintenance activities, utility and building construction projects, or demolition projects fall within the purview of the plan. This Soil Management Plan represents an integrated, visually oriented, planning and information resource tool for decision making involving excavation or disturbance of soil at Y-12. This Soil Management Plan addresses three primary elements. (1) Regulatory and programmatic requirements for management of soil based on the location of a soil disturbance project and/or the regulatory classification of any contaminants that may be present (Chap. 2). Five general regulatory or programmatic classifications of soil are recognized to be potentially present at Y-12; soil may fall under one or more these classifications: (a) Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) pursuant to the Oak Ridge Reservation (ORR) Federal Facilities Agreement; (b) Resource Conservation and Recovery Act (RCRA); (c) RCRA 3004(u) solid waste managements units pursuant to the RCRA Hazardous and Solid Waste Amendments Act of 1984 permit for the ORR; (d) Toxic Substances and Control Act-regulated soil containing polychlorinated biphenyls; and (e) Radiologically contaminated soil regulated under the Atomic Energy Act review process. (2) Information for project planners on current and future planned remedial actions (RAs), as prescribed by CERCLA decision documents (including the scope of the actions and remedial goals), land use controls implemented to support or maintain RAs, RCRA post-closure regulatory requirements for

  1. Vessel Operating Units (Vessels)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains data for vessels that are greater than five net tons and have a current US Coast Guard documentation number. Beginning in1979, the NMFS...

  2. 29 CFR 2509.75-3 - Interpretive bulletin relating to investments by employee benefit plans in securities of...

    Science.gov (United States)

    2010-07-01

    ... because the plan has invested in the investment company's shares. This principle applies, for example, to... 29 Labor 9 2010-07-01 2010-07-01 false Interpretive bulletin relating to investments by employee benefit plans in securities of registered investment companies. 2509.75-3 Section 2509.75-3 Labor...

  3. Y-12 National Security Complex National Historic Preservation Act Historic Preservation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-09-30

    The Historic Preservation Plan (HPP) recognizes that the Y-12 National Security Complex is a vital and long-term component of DOE and NNSA. In addition to NNSA missions, the Office of Science and Energy, the Office of Nuclear Energy, and the Office of Environmental Management have properties located at Y-12 that must be taken into consideration. The HPP also recognizes that the challenge for cultural resource management is incorporating the requirements of NNSA, SC, NE, and EM missions while preserving and protecting its historic resources. The HPP seeks to find an effective way to meet the obligations at Y-12 for historic and archeological protection while at the same time facilitating effective completion of ongoing site mission activities, including removal of obsolete or contaminated facilities, adaptive reuse of existing facilities whenever feasible, and construction of new facilities in order to meet site mission needs. The Y-12 Historic Preservation Plan (HPP) defines the preservation strategy for the Y-12 National Security Complex and will direct efficient compliance with the NHPA and federal archaeological protection legislation at Y-12 as DOE and NNSA continues mission activities of the site.

  4. Development of a strategic plan for food security and safety in the Inuvialuit Settlement Region, Canada.

    Science.gov (United States)

    Fillion, Myriam; Laird, Brian; Douglas, Vasiliki; Van Pelt, Linda; Archie, Diane; Chan, Hing Man

    2014-01-01

    Current social and environmental changes in the Arctic challenge the health and well-being of its residents. Developing evidence-informed adaptive measures in response to these changes is a priority for communities, governments and researchers. To develop strategic planning to promote food security and food safety in the Inuvialuit Settlement Region (ISR), Northwest Territories (NWT), Canada. A qualitative study using group discussions during a workshop. A regional workshop gathered Inuit organizations and community representatives, university-based researchers from the Inuit Health Survey (IHS) and NWT governmental organizations. Discussions were structured around the findings from the IHS. For each key area, programs and activities were identified and prioritized by group discussion and voting. The working group developed a vision for future research and intervention, which is to empower communities to promote health, well-being and environmental sustainability in the ISR. The group elaborated missions for the region that address the following issues: (a) capacity building within communities; (b) promotion of the use of traditional foods to address food security; (c) research to better understand the linkages between diseases and contaminants in traditional foods, market foods and lifestyle choices; (d) and promotion of affordable housing. Five programs to address each key area were developed as follows: harvest support and traditional food sharing; education and promotion; governance and policy; research; and housing. Concrete activities were identified to guide future research and intervention projects. The results of the planning workshop provide a blueprint for future research and intervention projects.

  5. PennDOT transportation security strategy : volume 2 : effective practices of state departments of transportation security planning

    Science.gov (United States)

    2004-08-01

    Since September 11, 2001, state departments of transportation (DOTs) have been assuming a more proactive role in security and emergency management. The purpose of this Effective Practices Report is to document key lessons learned by state DOTs as the...

  6. Safeguards and Security FY 1996 Program Plan: WBS 6.6

    Energy Technology Data Exchange (ETDEWEB)

    Lee, F.D.

    1995-08-01

    The Safeguards and Security (SAS) Program is based upon integrity, competence and innovation in the protection of the public and Hanford resources through: (1) outstanding assistance, oversight, education, and counsel to their customers to ensure the protection of the public, site personnel, assets, and information; (2) value-added and cost-effective solutions to Hanford issues; and (3) risk management techniques to ensure effective asset protection, site accessibility, and the flexibility to adapt to changing customer needs. This plan is divided into two parts: overview and SAS WBS (work breakdown structure) dictionary sheets. The overview is divided into vision and mission, goals and objectives, assumptions and priorities, milestones, and a summary. The SAS WBS dictionary sheets are divided into department overhead, general and administrative, sitewide support, Hanford patrol, traffic safety, and locksmith services.

  7. Development of a strategic plan for food security and safety in the Inuvialuit Settlement Region, Canada

    Directory of Open Access Journals (Sweden)

    Myriam Fillion

    2014-08-01

    Full Text Available Background: Current social and environmental changes in the Arctic challenge the health and well-being of its residents. Developing evidence-informed adaptive measures in response to these changes is a priority for communities, governments and researchers. Objectives: To develop strategic planning to promote food security and food safety in the Inuvialuit Settlement Region (ISR, Northwest Territories (NWT, Canada. Design: A qualitative study using group discussions during a workshop. Methods: A regional workshop gathered Inuit organizations and community representatives, university-based researchers from the Inuit Health Survey (IHS and NWT governmental organizations. Discussions were structured around the findings from the IHS. For each key area, programs and activities were identified and prioritized by group discussion and voting. Results: The working group developed a vision for future research and intervention, which is to empower communities to promote health, well-being and environmental sustainability in the ISR. The group elaborated missions for the region that address the following issues: (a capacity building within communities; (b promotion of the use of traditional foods to address food security; (c research to better understand the linkages between diseases and contaminants in traditional foods, market foods and lifestyle choices; (d and promotion of affordable housing. Five programs to address each key area were developed as follows: harvest support and traditional food sharing; education and promotion; governance and policy; research; and housing. Concrete activities were identified to guide future research and intervention projects. Conclusions: The results of the planning workshop provide a blueprint for future research and intervention projects.

  8. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2012-10-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). NNSA/NSO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  9. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 2

    Energy Technology Data Exchange (ETDEWEB)

    Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2015-06-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1D, Change 1, Quality Assurance (DOE, 2013a); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). If a participant’s requirement document differs from this QAP, the stricter requirement will take precedence. NNSA/NFO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  10. 33 CFR 155.1035 - Response plan requirements for manned vessels carrying oil as a primary cargo.

    Science.gov (United States)

    2010-07-01

    ... notification, as much as possible of the information essential for the protection of the marine environment as... discharge or substantial threat of a discharge of oil. If the notifications vary due to vessel location, the... estimate of oil discharged or threat of discharge; (J) Weather and sea conditions on scene; (K) Ship size...

  11. 33 CFR Appendix B to Part 155 - Determining and Evaluating Required Response Resources for Vessel Response Plans

    Science.gov (United States)

    2010-07-01

    ... significant wave heights listed for the applicable operating environment. The Coast Guard may require...,360 Since the requirements for Tier 1 for inland and nearshore exceed the caps, the vessel owner would... Operating Environment Significant Wave Height 1 (feet) Sea State Rivers & Canals ≤1 1 Inland ≤3 2 Great...

  12. Computer Security: Governmentwide Planning Process Had Limited Impact. Report to the Chairman, Committee on Science, Space, and Technology, House of Representatives.

    Science.gov (United States)

    General Accounting Office, Washington, DC. Information Management and Technology Div.

    As required by the Computer Security Act of 1987, federal agencies have to identify systems that contain sensitive information and develop plans to safeguard them. The planning process was assessed in 10 civilian agencies as well as the extent to which they had implemented planning controls described in 22 selected plans. The National Institute of…

  13. Quantitative measurement of out-of-plan deformation generated at the around defect of pressure vessel using shearography

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Kyoung Suk; Beak, Sang Kyu; Lee, Gun Jung; Chang, Ho Seob [Chosun University, Kwangju (Korea, Republic of); Kang, Myoung Goo [Chosun University RRC, Kwangju (Korea, Republic of); Kim, Sung Sik [Mokpo Science College, Mokpo(Korea, Republic of)

    2006-05-15

    Shearography, one of NDT methods without contact, is able to inspect defects of pipelines and pressure vessels that are used in the industrial machine and nuclear power plants and is used to determine safety, maintenance, and mending. Electronic Speckle Pattern Interferometry(ESPI) is a common method for measuring out-of-plane deformation and in-plane deformation and applied for vibration analysis and strain/stress analysis. However, ESPI is sensitive to environmental disturbance, which provide the limitation of industrial application. On the other hand, Shearography based on shearing interferometer which is insensitive to vibration disturbance can directly measure the first derivative of out-of-plane deformation. In this paper a technique that extract out-of-plane deformation from results of shearography by numerical processing is proposed and measurement results of ESPI and Shearoraphy are compared quantitative to inspect defects of pipelines and pressure vessels.

  14. 75 FR 75486 - Maritime Security Directive 104-6 (Rev. 4); Guidelines for U.S. Vessels Operating in High Risk...

    Science.gov (United States)

    2010-12-03

    ... Manager, Docket Operations, telephone 202-366-9826. SUPPLEMENTARY INFORMATION: Somali pirates operate... thwarting pirate attacks and incorporates lessons-learned since the issuance of Revision 2. MARSEC Directive... underway, the vessels are subjected to the same type of threats from attacking pirates. Vessels berthed in...

  15. Computer and Network Security in Small Libraries: A Guide for Planning.

    Science.gov (United States)

    Williams, Robert L.

    This manual is intended to provide a free resource on essential network security concepts for non-technical managers of small libraries. Managers of other small nonprofit or community organizations will also benefit from it. An introduction defines network security; outlines three goals of network security; discusses why a library should be…

  16. Understand the Big Picture So You Can Plan for Network Security

    Science.gov (United States)

    Cervone, Frank

    2005-01-01

    This article discusses network security for libraries. It indicates that there were only six exploit (security exposure) problems, worldwide, reported to the CERT Coordination Center back in 1988. In that year, the CERT had just been established to provide a clearinghouse for exchanging information about network security problems. By 2003, the…

  17. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Science.gov (United States)

    2010-07-26

    ... HUMAN SERVICES Office of the Secretary Seeking Public Comment on Draft National Health Security Strategy.... ACTION: Notice. Authority: Public Health Service Act, 42 U.S.C. 300hh-1. SUMMARY: To help the Nation achieve national health security and to implement the first quadrennial National Health Security Strategy...

  18. 78 FR 28170 - Regulated Navigation Area; Southern Oahu Tsunami Vessel Evacuation; Honolulu, HI

    Science.gov (United States)

    2013-05-14

    ... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA11 Regulated Navigation Area; Southern Oahu Tsunami Vessel... Southern Oahu ports. DATES: Comments and related material must be received by the Coast Guard on or before... and organized evacuation plan, in order to protect the infrastructure of the southern coast of Oahu...

  19. Transportation Secure Data Center: Real-world Data for Planning, Modeling, and Analysis (Fact Sheet)

    Energy Technology Data Exchange (ETDEWEB)

    2015-01-01

    The Transportation Secure Data Center (TSDC) at www.nrel.gov/tsdc provides free, web-based access to detailed transportation data from a variety of travel surveys conducted across the nation. While preserving the privacy of survey participants, this online repository makes vital transportation data broadly available to users from the comfort of their own desks via a secure online connection.

  20. 75 FR 10973 - Hazardous Materials: Risk-Based Adjustment of Transportation Security Plan Requirements

    Science.gov (United States)

    2010-03-09

    ... dangerous goods for which enhanced security measures are recommended in the United Nations Model Regulations on the Transport of Dangerous Goods (UN Recommendations). The recommended security measures include... Recommendations define high consequence dangerous goods as materials with the ``potential for mis-use in a...

  1. Absent Authority: Failure to Plan Funding and Command Authorities in USAF Security Assistance Units

    Science.gov (United States)

    2013-03-01

    2011). 32 Jeffery Marshall, Skin in the Game: Partnership in Establishing and Maintaining Global Security and Stability (Los Gatos , CA...Marshall, Jeffery. Skin in the Game: Partnership in Establishing and Maintaining Global Security and Stability. Los Gatos , CA: Smashbooks, 2011. Maolda

  2. Homeland Security Strategic Plan for the Non-Major Local Law Enforcement Agency

    Science.gov (United States)

    2011-09-01

    who vandalize the area with graffiti . Disorder issues plague many communities and are a nuisance to citizens, businesses, and the police. Disorder...degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from the NAVAL POSTGRADUATE SCHOOL September 2011...leaders should consider if their leadership ability will adequately meet the necessary skills in meeting these expectations. The threat of street level

  3. Estudio preoperatorio de vasos receptores en reconstrucción mamaria con colgajo DIEP Preoperative planning of receiver vessels in breast reconstruction with DIEP flap

    Directory of Open Access Journals (Sweden)

    C. Tejerina Botella

    2011-09-01

    Full Text Available El estudio preoperatorio vascular de cualquier colgajo microquirúrgico es esencial para el buen desarrollo del mismo. En el colgajo DIEP (colgajo de perforante de arteria epigástrica inferior profunda aplicado a la reconstrucción mamaria, se han establecido durante los últimos años diferentes técnicas para la planificación preoperatoria de la anatomía de los vasos perforantes de la arteria epigástrica inferior. Sin embargo, pensamos, que también es muy importante la planificación anatómica preoperatoria de los vasos receptores, que en la mayoría de los casos son la arteria y vena mamarias internas. Estos vasos sufren en ocasiones variaciones anatómicas, llegando incluso a no existir en algunos pacientes. El conocimiento exacto de la localización, permeabilidad y calibre de estos vasos receptores hará que la intervención sea mas rápida y sencilla.An accurate preoperative vascular evaluation of microsurgical flaps is essential for a good procedure. In DIEP (deep inferior epigastric perforator flap, in breast reconstruction, have been described different preoperative techniques to study the anatomy of the deep inferior epigastric perforators. We think that preoperative planning of the receiver vessels, (internal mammary artery and vein, in most of cases is very important too. These vessels have anatomic changes in some patients. To know the exact location, permeability, and calibre of these vessels will help us to have a more easy and quick operation.

  4. 33 CFR 155.1050 - Response plan development and evaluation criteria for vessels carrying groups I through IV...

    Science.gov (United States)

    2010-07-01

    ... Hazardous Substances Pollution Contingency Plan Product Schedule (contained in 40 CFR part 300, and available online from the U.S. Government Printing Office). (ii) Dispersant-application platforms capable of... technology demonstrates a need to evaluate or change mechanical recovery capacities, a review of cap...

  5. A Water Security Handbook: Planning for and Responding to Drinking Water Contamination Threats and Incidents

    National Research Council Canada - National Science Library

    2006-01-01

    .... This Water Security Handbook was developed by the U.S. EPA to help you, the water utility official, protect your water system and respond effectively to threats and contamination incidents involving your water system...

  6. 10 CFR 72.186 - Change to physical security and safeguards contingency plans.

    Science.gov (United States)

    2010-01-01

    ... plans. 72.186 Section 72.186 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSING REQUIREMENTS FOR... (Background, Generic Planning Base, Licensee Planning Base, and Responsibility Matrix) contained in the... Material Safety and Safeguards, U.S. Nuclear Regulatory Commission, in accordance with § 72.4, containing a...

  7. Guidelines for contingency planning NASA (National Aeronautics and Space Administration) ADP security risk reduction decision studies

    Science.gov (United States)

    Tompkins, F. G.

    1984-01-01

    Guidance is presented to NASA Computer Security Officials for determining the acceptability or unacceptability of ADP security risks based on the technical, operational and economic feasibility of potential safeguards. The risk management process is reviewed as a specialized application of the systems approach to problem solving and information systems analysis and design. Reporting the results of the risk reduction analysis to management is considered. Report formats for the risk reduction study are provided.

  8. 76 FR 2402 - Maritime Security Directive 104-6 (Rev 5); Guidelines for U.S. Vessels Operating in High Risk Waters

    Science.gov (United States)

    2011-01-13

    ... pirates operate along a 2,300 mile coast and in 2.5 million square miles of ocean. Given the size and... management practices that have proven to be successful in thwarting pirate attacks and incorporates lessons... subjected to the same type of threats from attacking pirates. Vessels berthed in high risk waters should...

  9. Corrective Action Investigation Plan for Corrective Action Unit 573: Alpha Contaminated Sites, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick

    2014-05-01

    Corrective Action Unit (CAU) 573 is located in Area 5 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 573 is a grouping of sites where there has been a suspected release of contamination associated with non-nuclear experiments and nuclear testing. This document describes the planned investigation of CAU 573, which comprises the following corrective action sites (CASs): • 05-23-02, GMX Alpha Contaminated Area • 05-45-01, Atmospheric Test Site - Hamilton These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives.

  10. Global Strategy Choices (GSC) : Prognosis and Strategic Planning for European Foreign and Security Policy

    NARCIS (Netherlands)

    Zwitter, Andrej; Kettle, Lawrence

    2015-01-01

    The European Security Strategy (ESS) is currently being reformulated. This working paper puts forward a new methodological approach in the construction of global strategies for stakeholders in the international system. It makes the case that contemporary strategy formulation (including the ESS)

  11. Higher Education as a Matter of National Security: Can a Democracy Plan Ahead?

    Science.gov (United States)

    Skaggs, David

    2014-01-01

    What is often viewed as the fairly arcane business of determining and administering higher education policy is a matter of great national interest and, actually, a matter of national security. It thus makes a difference for American society in ways you may not have considered. The ability of the United States to protect itself and its interests…

  12. Development of a consortium for water security and safety: Planning for an early warning system

    Science.gov (United States)

    Clark, R.M.; Adam, N.R.; Atluri, V.; Halem, M.; Vowinkel, E.F.; ,

    2004-01-01

    The events of September 11, 2001 have raised concerns over the safety and security of the Nation's critical infrastructure including water and waste water systems. In June 2002, the U.S. EPA's Region II Office (New York City), in response to concerns over water security, in collaboration with Rutgers University agreed to establish a Regional Drinking Water Security and Safety Consortium (RDWSSC). Members of the consortium include: Rutgers University's Center for Information Management, Integration and Connectivity (CIMIC), American Water (AW), the Passaic Valley Water Commission (PVWC), the North Jersey District Water Supply Commission (NJDWSC), the N.J. Department of Environmental Protection, the U.S. Geological Survey (USGS), and the U.S. Environmental Protection Agencies, Region II Office. In December of 2002 the consortium members signed a memorandum of understanding (MOU) to pursue activities to enhance regional water security. Development of an early warning system for source and distributed water was identified as being of primary importance by the consortium. In this context, an early warning system (EWS) is an integrated system of monitoring stations located at strategic points in a water utilities source waters or in its distribution system, designed to warn against contaminants that might threaten the health and welfare of drinking water consumers. This paper will discuss the consortium's progress in achieving these important objectives.

  13. USCG Vessel

    Data.gov (United States)

    Department of Homeland Security — The Marine Casualty and Pollution Data files provide details about marine casualty and pollution incidents investigated by Coast Guard Offices throughout the United...

  14. The Relationship of Social Security Benefits and the Military Survivors Benefit Plan.

    Science.gov (United States)

    1980-07-09

    The fdct that she is .jtIj cL, to benefits’based on her husband’s earnings iikes the reduction Illanid’iury. There is, however, no reduction in the...nondisabled) and thus would be conservative for a woman . 19 ,g {. PIA - .9(194) + .32 (424.05- 194) (See Appendix C for bend points.) = 174.60 + 73.62...those for a military member (nondisabled) and thus would be conservative for a woman . 12 Some differences in social security benefits attributable to

  15. Design of an Officer Assignment and Career Planning Decision Support System for Electronic Security Command

    Science.gov (United States)

    1988-12-01

    vii Abstract .............................. viii I. Introduction ......................... 1 Air Force Assignment Guidelines ............. 1 Air Force...PLANNING DECISION SUPPORT SYSTEM FOR ELECTRONIC SEORITY COMMAND I. Introduction Air Force Assionment Guidelines The primary objective of the officer...to multiple-criteria decision making (MC)M): 1) Multi-attribute decision analysis (MADA), which "is the descriptive version of MCDM " and 2) rulti

  16. Transportation Secure Data Center: Real-World Data for Planning, Modeling, and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    2018-01-19

    The Transportation Secure Data Center (TSDC) at www.nrel.gov/tsdc provides free, web-based access to detailed transportation data from a variety of travel surveys conducted across the nation. While preserving the privacy of survey participants, this online repository makes vital transportation data broadly available to users from the comfort of their own desks via a secure online connection. Data Available through the TSDC: Maintained by the U.S. Department of Energy's National Renewable Energy Laboratory (NREL) in partnership with the U.S. Department of Transportation (DOT), the TSDC houses data from travel surveys and studies conducted using global positioning system (GPS) devices. It features millions of data points - second-by-second GPS readings, vehicle characteristics (if applicable), and demographics - for all modes of travel. NREL screens the initial data for quality control, translates each data set into a consistent format, and interprets the data for spatial analysis. NREL's processing routines add information on vehicle fuel economy and road grades and join data points to the road network.

  17. Validation of planning-free vessel-encoded pseudo-continuous arterial spin labeling MR imaging as territorial-ASL strategy by comparison to super-selective p-CASL MRI.

    Science.gov (United States)

    Hartkamp, Nolan S; Helle, Michael; Chappell, Michael A; Okell, Thomas W; Hendrikse, Jeroen; Bokkers, Reinoud P H; van Osch, Matthias J P

    2014-06-01

    Vessel-encoded (VE) pseudo-continuous arterial spin labeling (p-CASL) is a territorial ASL (T-ASL) technique to identify the perfusion territories of cerebral arteries. The aim of this study was to validate the output of three Vessel-encoded p-CASL image processing methods, k-means clustering with and without subsequent linear analysis and a Bayesian framework, by comparison with the perfusion maps acquired with super-selective p-CASL. The comparison was done quantitatively using the Hausdorff distance and Dice similarity coefficient in the territories of the right and left internal carotid arteries, the basilar artery, and the right and left vertebral arteries. A qualitative comparison was done in the areas of the anterior and posterior circulation, and the deep gray matter. The overall agreement between the Vessel-encoded p-CASL image processing methods and super-selective p-CASL was good; with the difference that the linear analysis and the Bayesian framework were able to detect mixed perfusion. Planning-free Vessel-encoded p-CASL with k-means clustering appears suitable as a general purpose T-ASL strategy, but to determine mixed perfusion a combination with linear analysis, or the Bayesian framework is preferable, which are superior in this regard. To accurately determine the perfusion territory of a single vessel, super-selective p-CASL is still recommended. Copyright © 2013 Wiley Periodicals, Inc.

  18. Transportation Secure Data Center: Real-World Data for Planning, Modeling, and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    2017-01-01

    The Transportation Secure Data Center (TSDC) provides free, web-based access to detailed transportation data from a variety of travel surveys conducted across the nation. Maintained by the National Renewable Energy Laboratory (NREL) in partnership with the U.S. Department of Transportation (DOT), the TSDC houses data from travel surveys and studies conducted using GPS devices. It features millions of data points -- second-by-second GPS readings, vehicle characteristics (if applicable), and demographics -- for all modes of travel. NREL screens the initial data for quality control, translates each data set into a consistent format, and interprets the data for spatial analysis. NREL's processing routines add information on vehicle fuel economy and road grades and join data points to the road network.

  19. Streamlined Approach for Environmental Restoration Plan for Corrective Action Unit 574: Neptune, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Restoration

    2011-08-31

    This Streamlined Approach for Environmental Restoration (SAFER) Plan identifies the activities required for closure of Corrective Action Unit (CAU) 574, Neptune. CAU 574 is included in the Federal Facility Agreement and Consent Order (FFACO) (1996 [as amended March 2010]) and consists of the following two Corrective Action Sites (CASs) located in Area 12 of the Nevada National Security Site: (1) CAS 12-23-10, U12c.03 Crater (Neptune); (2) CAS 12-45-01, U12e.05 Crater (Blanca). This plan provides the methodology for the field activities that will be performed to gather the necessary information for closure of the two CASs. There is sufficient information and process knowledge regarding the expected nature and extent of potential contaminants to recommend closure of CAU 574 using the SAFER process. Based on historical documentation, personnel interviews, site process knowledge, site visits, photographs, field screening, analytical results, the results of the data quality objective (DQO) process (Section 3.0), and an evaluation of corrective action alternatives (Appendix B), closure in place with administrative controls is the expected closure strategy for CAU 574. Additional information will be obtained by conducting a field investigation to verify and support the expected closure strategy and provide a defensible recommendation that no further corrective action is necessary. This will be presented in a Closure Report that will be prepared and submitted to the Nevada Division of Environmental Protection (NDEP) for review and approval.

  20. One Team, One Mission, Securing Our Homeland: U.S. U.S. Department of Homeland Security Strategic Plan, Fiscal Years 2008 - 2013

    National Research Council Canada - National Science Library

    Chertoff, Michael

    2008-01-01

    .... While the Department was created to secure our country against those who seek to disrupt the American way of life, our charter also includes preparation for and response to all hazards and disasters...

  1. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  2. 46 CFR 25.26-5 - Commercial fishing industry vessels.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Commercial fishing industry vessels. 25.26-5 Section 25.26-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY UNINSPECTED VESSELS REQUIREMENTS Emergency Position Indicating Radio Beacons (EPIRB) § 25.26-5 Commercial fishing industry vessels. (a) The owner of a...

  3. Evaluation of planning and performance of health centres of social security organization in relation to occupational diseases

    Directory of Open Access Journals (Sweden)

    Javadzadeh Ahmadi A

    1998-09-01

    Full Text Available The chief aim of this research is intended to study the planning and performance of the health and treatment units of the Social Security Organization about the illnesses that may occur in connection with occupations. We believe, however, that healthy skilled work force are the nmost important factors for the development and progress of a country. Therefore, illnesses and disabilities from chemical, physical, biological, psychological and ergonomic can be drasticly eliminated in order to ensure the safety standards of the work force. Five occupational medicine centers in Tehran, have undergone 35199 tests for pre-employment medical examinations. The results were fit, conditionally fit, and unfit that were introduced to employers, during August 1996 and July 1997. Periodical examinations, visits of workshops and factories, presentation of health care in 200 dispensaries has helped recognizing professional diseases. The results work of committee of medical assistant, showed 56 cases of disabilities due to occupation. Professional causes, 16.07% of the above disabilities are from mechanical and, 16.07% from transportation. Hands amputation 50%, injuries of waist 19.65%, feet 10.71% and head 7.14% had responsibility for invalidity due to occupations. Other results of this research like time distribution, causes of invalidity have been presented.

  4. Progress and Future Plans for Mercury Remediation at the Y-12 National Security Complex, Oak Ridge, Tennessee - 13059

    Energy Technology Data Exchange (ETDEWEB)

    Wilkerson, Laura O. [DOE Oak Ridge, P.O. Box 2001, Oak Ridge, TN 37831 (United States); DePaoli, Susan M. [Pro2Serve, 1100 Bethel Valley Rd., Oak Ridge, TN 37830 (United States); Turner, Ralph [P.O. Box 421, Squamish, BC V8B 0A4 (United States)

    2013-07-01

    The U.S. Department of Energy (DOE), along with the Tennessee Department of Environment and Conservation (TDEC) and the U.S. Environmental Protection Agency (EPA), has identified mercury contamination at the Y-12 National Security Complex (Y-12) as the highest priority cleanup risk on the Oak Ridge Reservation (ORR). The historic loss of mercury to the environment dwarfs any other contaminant release on the ORR. Efforts over the last 20 years to reduce mercury levels leaving the site in the surface waters of Upper East Fork Poplar Creek (UEFPC) have not resulted in a corresponding decrease in mercury concentrations in fish. Further reductions in mercury surface water concentrations are needed. Recent stimulus funding through the American Recovery and Reinvestment Act of 2009 (ARRA) has supported several major efforts involving mercury cleanup at Y-12. Near-term implementation activities are being pursued with remaining funds and include design of a centrally located mercury treatment facility for waterborne mercury, treatability studies on mercury-contaminated soils, and free mercury removal from storm drains. Out-year source removal will entail demolition/disposal of several massive uranium processing facilities along with removal and disposal of underlying contaminated soil. As a National Priorities List (NPL) site, cleanup is implemented under the Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and directed by the Federal Facility Agreement (FFA) between DOE, EPA, and TDEC. The CERCLA process is followed to plan, reach approval, implement, and monitor the cleanup. (authors)

  5. 33 CFR 104.270 - Security measures for restricted areas.

    Science.gov (United States)

    2010-07-01

    ... restricted areas in order to: (1) Prevent or deter unauthorized access; (2) Protect persons authorized to be on board; (3) Protect the vessel; (4) Protect sensitive security areas within the vessel; (5) Protect... within the area constitutes a breach of security. (d) Maritime Security (MARSEC) Level 1. The vessel...

  6. Vessel Operator System

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Operator cards are required for any operator of a charter/party boat and or a commercial vessel (including carrier and processor vessels) issued a vessel permit from...

  7. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  8. Corrective Action Investigation Plan for Corrective Action Unit 550: Smoky Contamination Area Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Grant Evenson

    2012-05-01

    Corrective Action Unit (CAU) 550 is located in Areas 7, 8, and 10 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 550, Smoky Contamination Area, comprises 19 corrective action sites (CASs). Based on process knowledge of the releases associated with the nuclear tests and radiological survey information about the location and shape of the resulting contamination plumes, it was determined that some of the CAS releases are co-located and will be investigated as study groups. This document describes the planned investigation of the following CASs (by study group): (1) Study Group 1, Atmospheric Test - CAS 08-23-04, Atmospheric Test Site T-2C; (2) Study Group 2, Safety Experiments - CAS 08-23-03, Atmospheric Test Site T-8B - CAS 08-23-06, Atmospheric Test Site T-8A - CAS 08-23-07, Atmospheric Test Site T-8C; (3) Study Group 3, Washes - Potential stormwater migration of contaminants from CASs; (4) Study Group 4, Debris - CAS 08-01-01, Storage Tank - CAS 08-22-05, Drum - CAS 08-22-07, Drum - CAS 08-22-08, Drums (3) - CAS 08-22-09, Drum - CAS 08-24-03, Battery - CAS 08-24-04, Battery - CAS 08-24-07, Batteries (3) - CAS 08-24-08, Batteries (3) - CAS 08-26-01, Lead Bricks (200) - CAS 10-22-17, Buckets (3) - CAS 10-22-18, Gas Block/Drum - CAS 10-22-19, Drum; Stains - CAS 10-22-20, Drum - CAS 10-24-10, Battery. These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each study group. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed

  9. 46 CFR 50.05-15 - Vessels subject to regulations in this subchapter.

    Science.gov (United States)

    2010-10-01

    ...-15 Section 50.05-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING GENERAL PROVISIONS Application § 50.05-15 Vessels subject to regulations in this subchapter. (a) Passenger vessels, tank vessels, cargo and miscellaneous vessels, nautical schoolships, mobile offshore...

  10. Incorporating palaeoclimate data into water security planning and decision making - a case study from southeast Queensland, Australia

    Science.gov (United States)

    Kiem, Anthony; Vance, Tessa; Tozer, Carly; Roberts, Jason

    2017-04-01

    Regional Stochastic Model (SEQRSM) of catchment hydrology to (a) demonstrate the utility of a palaeoclimate proxy approach in producing more robust estimates of hydroclimatic risk under climate variability and change; (b) gain improved insights into the characteristics (e.g. location, duration, frequency, magnitude, spatial extent, sequencing) of hydroclimate extremes for water security planning and (c) deliver optimised solutions for hydroclimatic risk adaptation strategies to water managers (e.g. optimal and sustainable supply of water to meet current and future urban requirements and also to nearby catchments to support irrigation for dairy, vegetable and forage crops).

  11. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  12. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  13. Hydrogen storage in insulated pressure vessels

    Energy Technology Data Exchange (ETDEWEB)

    Aceves, S.M.; Garcia-Villazana, O. [Lawrence Livermore National Lab., CA (United States)

    1998-08-01

    Insulated pressure vessels are cryogenic-capable pressure vessels that can be fueled with liquid hydrogen (LH{sub 2}) or ambient-temperature compressed hydrogen (CH{sub 2}). Insulated pressure vessels offer the advantages of liquid hydrogen tanks (low weight and volume), with reduced disadvantages (lower energy requirement for hydrogen liquefaction and reduced evaporative losses). This paper shows an evaluation of the applicability of the insulated pressure vessels for light-duty vehicles. The paper shows an evaluation of evaporative losses and insulation requirements and a description of the current analysis and experimental plans for testing insulated pressure vessels. The results show significant advantages to the use of insulated pressure vessels for light-duty vehicles.

  14. 17 CFR 230.701 - Exemption for offers and sales of securities pursuant to certain compensatory benefit plans and...

    Science.gov (United States)

    2010-04-01

    ... transactions are not exempt from the antifraud, civil liability, or other provisions of the federal securities... defined in Rule 405 must provide a reconciliation to generally accepted accounting principles in the...

  15. Gender Perspectives and Military Effectiveness: Implementing UNSCR 1325 and the National Action Plan on Women, Peace, and Security

    Science.gov (United States)

    2016-03-01

    feminist activists and researchers, and recognized in a number of UN Security Council Resolutions (UNSCRs) on women, peace, and security. Indeed, UNSCR 1325...highlight general tac- tical choices, organizational hurdles, and pol- icy implications for an international audience.2 To achieve these ends, a new...world, but also increased effectiveness of mili- tary organizations employing force, or the threat of such force, to achieve political objec- tives

  16. Natural Disaster Scenarios in the Food Security Early Warning Contingency Planning Process: The Role of Remotely Sensed Vegetation and Rainfall Data

    Science.gov (United States)

    Brown, M. E.; Funk, C. C.; Choularton, R.

    2006-12-01

    In this talk, we will explore how scenarios are used in early warning systems in Africa as they respond to the food security consequences of droughts and floods, and determine ways EWS could use remote sensing products more effectively. Early warning of an incipient agricultural drought triggers the contingency planning process at the national governmental level, supported by international organizations such as USAID's Famine Early Warning Network or FEWS NET. Contingency planning focuses on updating relevant national contingency plans. These scenarios are usually described as `Worst Case', `Mid-Case', and `Best Case', and focus on providing guidance for humanitarian organizations' assistance planning process. There is an increasingly apparent need to provide appropriate, nuanced, and constructive assistance. Remote sensing can support this objective by providing earlier early warning, giving aid organizations the time necessary to coordinate effective aid packages and policies. In this talk we will explore how recently developed projections of vegetation data one to four months into the future could be used to guide the scenarios both spatially and temporally, and provide probabilities for which case is most likely to occur. A case study of Ethiopia and its contingency planning process for the past few years will be presented.

  17. BIOASSAY VESSEL FAILURE ANALYSIS

    Energy Technology Data Exchange (ETDEWEB)

    Vormelker, P

    2008-09-22

    Two high-pressure bioassay vessels failed at the Savannah River Site during a microwave heating process for biosample testing. Improper installation of the thermal shield in the first failure caused the vessel to burst during microwave heating. The second vessel failure is attributed to overpressurization during a test run. Vessel failure appeared to initiate in the mold parting line, the thinnest cross-section of the octagonal vessel. No material flaws were found in the vessel that would impair its structural performance. Content weight should be minimized to reduce operating temperature and pressure. Outer vessel life is dependent on actual temperature exposure. Since thermal aging of the vessels can be detrimental to their performance, it was recommended that the vessels be used for a limited number of cycles to be determined by additional testing.

  18. Workshop 2b (synthesis): linking drainage basin management to local action plans and national security--theory and practice in eastern European countries.

    Science.gov (United States)

    Söderbaum, P; Tropp, H

    2004-01-01

    Efforts to link and balance national water policies, local water action and national security issues are discussed. There needs to be greater clarity of water roles, rights and responsibilities among national stakeholders as well as between states. In some cases, insufficient attention has been paid to local concerns and, in balancing national and local actions, it is necessary to address decentralization in the context of a transboundary state. There is a strong need for enhanced stakeholder participation in the formulation and implementation of national and local water management plans.

  19. Corrective Action Plan for Corrective Action Unit 366: Area 11 Plutonium Valley Dispersion Sites, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-04-30

    This Corrective Action Plan has been prepared for Corrective Action Unit (CAU) 366, Area 11 Plutonium Valley Dispersion Sites, in accordance with the Federal Facility Agreement and Consent Order (FFACO, 1996 as amended). CAU 366 consists of the following six Corrective Action Sites (CASs) located in Area 11 of the Nevada National Security Site: · CAS 11-08-01, Contaminated Waste Dump #1 · CAS 11-08-02, Contaminated Waste Dump #2 · CAS 11-23-01, Radioactively Contaminated Area A · CAS 11-23-02, Radioactively Contaminated Area B · CAS 11-23-03, Radioactively Contaminated Area C · CAS 11-23-04, Radioactively Contaminated Area D Site characterization activities were performed in 2011 and 2012, and the results are presented in Appendix A of the Corrective Action Decision Document (CADD) for CAU 366 (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2012a). The following closure alternatives were recommended in the CADD: · No further action for CAS 11-23-01 · Closure in place for CASs 11-08-01, 11-08-02, 11-23-02, 11-23-03, and 11-23-04 The scope of work required to implement the recommended closure alternatives includes the following: · Non-engineered soil covers approximately 3 feet thick will be constructed at CAS 11-08-01 over contaminated waste dump (CWD) #1 and at CAS 11-08-02 over CWD #2. · FFACO use restrictions (URs) will be implemented for the areas where the total effective dose (TED) exceeds the final action level (FAL) of 25 millirems per Occasional Use Area year (mrem/OU-yr). The FAL is based on an assumption that the future use of the site includes occasional work activities and that workers will not be assigned to the area on a regular basis. A site worker under this scenario is assumed to be on site for a maximum of 80 hours per year for 5 years. The FFACO UR boundaries will encompass the areas where a worker would be exposed to 25 millirems of radioactivity per year if they are present for 80

  20. Embracing the Devil: An Analysis of the Formal Adoption of Red Teaming in the Security Planning for Major Events

    Science.gov (United States)

    2017-03-01

    Inaugural Ceremonies JFCOM Joint Forces Command MC Millennium Challenge MERT Major Event Red Team NFL National Football League NORAD North...political conventions, State of the Union events, world leader summits, such as the annual United Nations General Assembly, and the National Football ...and explosives successfully past Transportation Security Administration screeners in 67 out 70 separate attempts.60 Similarly, in the cyber-world

  1. 78 FR 63235 - Tank Vessel Oil Transfers

    Science.gov (United States)

    2013-10-23

    ... engaged in oil transfer operations? 12. Are there conflicts or areas of improvement with regard to... SECURITY Coast Guard Tank Vessel Oil Transfers AGENCY: Coast Guard, DHS. ACTION: Notice and request for comments. SUMMARY: The Coast Guard announces that it is considering new measures to reduce the risks of oil...

  2. Guam Abandoned Vessel Inventory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Guam. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  3. Florida Abandoned Vessel Inventory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Florida. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  4. Vessel Arrival Info - Legacy

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Vessel Arrival Info is a spreadsheet that gets filled out during the initial stage of the debriefing process by the debriefer. It contains vessel name, trip...

  5. Y-12 Groundwater Protection Program Monitoring Optimization Plan for Groundwater Monitoring Wells at the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2017-04-01

    This document is the monitoring optimization plan for groundwater monitoring wells associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee. The plan describes the technical approach that is implemented under the Y-12 Groundwater Protection Program (GWPP) to focus available resources on the monitoring wells at Y-12 that provide the most useful hydrologic and groundwater quality monitoring data. The technical approach is based on the GWPP status designation for each well. Under this approach, wells granted “active” status are used by the GWPP for hydrologic monitoring and/or groundwater quality sampling, whereas wells granted “inactive” status are not used for either purpose. The status designation also defines the frequency at which the GWPP will inspect applicable wells, the scope of these well inspections, and extent of any maintenance actions initiated by the GWPP. Details regarding the ancillary activities associated with implementation of this plan (e.g., well inspection) are deferred to the referenced GWPP plans.

  6. 46 CFR 188.10-53 - Oceanographic research vessel.

    Science.gov (United States)

    2010-10-01

    ... research, including those studies about the sea such as seismic, gravity meter, and magnetic exploration... 46 Shipping 7 2010-10-01 2010-10-01 false Oceanographic research vessel. 188.10-53 Section 188.10-53 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS...

  7. Analyzing the Feasibility of Using Secure Application Integration Methodology (SAIM) for Integrating DON Enterprise Resource Planning (ERP) Applications

    National Research Council Canada - National Science Library

    Marin, Ramon

    2004-01-01

    ...) would provide useful information about a beneficial methodology. SAIM is analyzed, by accessing its step by step directions, for suitability in the integration of the Enterprise Resource Planning (ERP...

  8. ALICE HMPID Radiator Vessel

    CERN Multimedia

    2003-01-01

    View of the radiator vessels of the ALICE/HMPID mounted on the support frame. Each HMPID module is equipped with 3 indipendent radiator vessels made out of neoceram and fused silica (quartz) windows glued together. The spacers inside the vessel are needed to stand the hydrostatic pressure. http://alice-hmpid.web.cern.ch/alice-hmpid

  9. Liver vessel segmentation based on extreme learning machine.

    Science.gov (United States)

    Zeng, Ye Zhan; Zhao, Yu Qian; Liao, Miao; Zou, Bei Ji; Wang, Xiao Fang; Wang, Wei

    2016-05-01

    Liver-vessel segmentation plays an important role in vessel structure analysis for liver surgical planning. This paper presents a liver-vessel segmentation method based on extreme learning machine (ELM). Firstly, an anisotropic filter is used to remove noise while preserving vessel boundaries from the original computer tomography (CT) images. Then, based on the knowledge of prior shapes and geometrical structures, three classical vessel filters including Sato, Frangi and offset medialness filters together with the strain energy filter are used to extract vessel structure features. Finally, the ELM is applied to segment liver vessels from background voxels. Experimental results show that the proposed method can effectively segment liver vessels from abdominal CT images, and achieves good accuracy, sensitivity and specificity. Copyright © 2016 Associazione Italiana di Fisica Medica. Published by Elsevier Ltd. All rights reserved.

  10. 2006 U.S. Department of Energy Strategic Plan: Discovering the Solutions to Power and Secure America’s Future

    Energy Technology Data Exchange (ETDEWEB)

    None,

    2006-10-11

    The Department of Energy Organization Act, which created DOE, was enacted in 1977 and DOE officially came into existence in October of that year. That law brought together for the first time, not only most of the government’s energy programs, but also science and technology programs and defense responsibilities that included the design, construction, and testing of nuclear weapons. Over its history, DOE has shifted its emphasis and focus as the energy and security needs of the Nation have changed. Today, DOE stands at the forefront of helping the Nation meet our energy, scientific, environmental, and national security goals. These include developing and deploying new energy technologies, reducing our dependence on foreign energy sources, protecting our nuclear weapons stockpile, and ensuring that America remains competitive in the global marketplace. To help achieve these goals, President Bush has launched two key initiatives: the American Competitiveness Initiative (ACI) and the Advanced Energy Initiative (AEI). The President launched these initiatives recognizing that science, technology, and engineering hold the answers to many of the critical challenges our world faces. These new initiatives to spur scientific innovation and technology development expand DOE’s continuing support for the competitive energy markets, both domestically and internationally, and of policies that facilitate continued private investment in the energy sector. In addition, DOE supports the demonstration and deployment of energy technologies through collaborative efforts with the private sector and public sector entities.

  11. Resilient planning for sporting mega-events: designing and managing safe and secure urban places for London 2012 and beyond Planejamento resiliente para megaeventos esportivos: planejando e gerindo lugares seguros para Londres 2012 e além

    Directory of Open Access Journals (Sweden)

    Pete Fussey

    2011-12-01

    Full Text Available Since the 1960s both regeneration and security have been prominent themes in Olympic planning. However, this paper argues that the prominence given to post event “legacies” in London’s bid to host the 2012 Summer Games has fomented a merger of these hitherto distinct ambitions oriented around notions of “resilience”. In addition to identifying this merger, based on analysis of planning for the 2012 Games the paper sets out its component features and considers a range of key implications. These include the accommodation of Olympic security amid shifting national security arrangements and, at a local level, the impact and importance of the 2011 London riots on Olympic safety and security processes. Organised over four areas of discussion – the first three comprising of the coupling of spatial strategies of resilient planning and design with concerns for security; the temporal framework of such approaches; analysis of the altered physical and institutional landscape of London ahead of the 2012 Olympic Games – the paper concludes by identifying and discussing the ways in which urban rejuvenation and securitisation which are increasingly being combined into resilient designs and master plans in the Olympic context and, crucially, standardised, exported and transferred to new urban hosts of similar events.

  12. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  13. Homeland security planning: what victory gardens and Fidel Castro can teach us in preparing for food crises in the United States.

    Science.gov (United States)

    Endres, A Bryan; Endres, Jody M

    2009-01-01

    Two historical examples provide important insight into how federal government policies can integrate regional and local food systems to achieve food security during a time of acute crisis. During World War II, American home gardeners, through the federal government's Victory Garden program, supplied 40 percent of the nation's fresh produce, while simultaneously maintaining pre-war commodity production policies favoring large agricultural interests. The recent food crisis in Cuba, precipitated by the collapse of Soviet-bloc trade in the early 1990s, is another historical example that could inform U.S. policymakers on how to achieve food self-sufficiency through reemphasis on small farmers using sustainable practices supplemented with urban gardening. This article aims to ignite government action to strengthen and integrate regional and local food systems into federal food security planning so that citizens can be best prepared for a food emergency. The article first examines laws, regulations and policies put in place during World War II that employed regional and local food networks to satisfy a significant amount of civilian food supply needs. The article also looks at more recent Cuban efforts to achieve forced food self-reliance when, after the end of the Cold War, Soviet subsidies and preferential trading of energy and food supplies ceased almost overnight.

  14. Pressure vessel design manual

    CERN Document Server

    Moss, Dennis R

    2013-01-01

    Pressure vessels are closed containers designed to hold gases or liquids at a pressure substantially different from the ambient pressure. They have a variety of applications in industry, including in oil refineries, nuclear reactors, vehicle airbrake reservoirs, and more. The pressure differential with such vessels is dangerous, and due to the risk of accident and fatality around their use, the design, manufacture, operation and inspection of pressure vessels is regulated by engineering authorities and guided by legal codes and standards. Pressure Vessel Design Manual is a solutions-focused guide to the many problems and technical challenges involved in the design of pressure vessels to match stringent standards and codes. It brings together otherwise scattered information and explanations into one easy-to-use resource to minimize research and take readers from problem to solution in the most direct manner possible. * Covers almost all problems that a working pressure vessel designer can expect to face, with ...

  15. Maury Journals - German Vessels

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — German vessels observations, after the 1853 Brussels Conference that set International Maritime Standards, modeled after Maury Marine Standard Observations.

  16. 75 FR 2152 - Certificate of Alternative Compliance for the Anchor Handling Tug Supply Vessel HOLIDAY

    Science.gov (United States)

    2010-01-14

    ... SECURITY Coast Guard Certificate of Alternative Compliance for the Anchor Handling Tug Supply Vessel... Alternative Compliance was issued for the anchor handling tug supply vessel HOLIDAY as required by 33 U.S.C.... SUPPLEMENTARY INFORMATION: Background and Purpose The anchor handling tug supply vessel HOLIDAY will be used for...

  17. 75 FR 17755 - Certificate of Alternative Compliance for the Offshore Supply Vessel C-ATLAS

    Science.gov (United States)

    2010-04-07

    ... SECURITY Coast Guard Certificate of Alternative Compliance for the Offshore Supply Vessel C-ATLAS AGENCY... Compliance was issued for the offshore supply vessel C-ATLAS as required by 33 U.S.C. 1605(c) and 33 CFR 81... Regulations, Parts 81 and 89, has been issued for the offshore supply vessel C-ATLAS. Full compliance with 72...

  18. 46 CFR 2.01-10 - Inspection requirements-domestic vessels.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Inspection requirements-domestic vessels. 2.01-10 Section 2.01-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC VESSEL INSPECTIONS Inspecting and Certificating of Vessels § 2.01-10 Inspection requirements—domestic...

  19. 75 FR 17755 - Certificate of Alternative Compliance for the Offshore Supply Vessel GULF TIGER

    Science.gov (United States)

    2010-04-07

    ... SECURITY Coast Guard Certificate of Alternative Compliance for the Offshore Supply Vessel GULF TIGER AGENCY... Compliance was issued for the offshore supply vessel GULF TIGER as required by 33 U.S.C. 1605(c) and 33 CFR... TIGER. Full compliance with 72 COLREGS and the Inland Rules Act would hinder the vessel's ability to...

  20. 76 FR 30954 - Notification of the Imposition of Conditions of Entry for Certain Vessels Arriving to the United...

    Science.gov (United States)

    2011-05-27

    ... each access point to the ship is guarded by armed, private security guards and that they have total... SECURITY Coast Guard Notification of the Imposition of Conditions of Entry for Certain Vessels Arriving to... Security tab; International Port Security Program (ISPS Code); Port Security Advisory link. FOR FURTHER...

  1. 77 FR 53901 - Notification of the Imposition of Conditions of Entry for Certain Vessels Arriving to the United...

    Science.gov (United States)

    2012-09-04

    ... armed, private security guards and that they have total visibility of the exterior (both landside and... SECURITY Coast Guard Notification of the Imposition of Conditions of Entry for Certain Vessels Arriving to....mil under the Maritime Security tab; International Port Security Program (ISPS Code); Port Security...

  2. Groundwater Protection Program Management Plan For The U.S. Department Of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental, LLC

    2009-09-01

    This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with the multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of Babcock & Wilcox Technical Services Y-12 LLC (hereafter referenced as B&W Y-12), the Y-12 management and operations (M&O) contractor for DOE. B&W Y-12 is a new corporate name, assumed in January 2007, for the company formerly known as BWXT Y-12, L.L.C., hereafter referenced as BWXT. This GWPP management plan addresses the requirements of DOE Order 450.1A Environmental Protection Program (hereafter referenced as DOE O 450.1A), which emphasize a site-wide approach for groundwater protection at each DOE facility through implementation of groundwater surveillance monitoring. Additionally, this plan addresses the relevant and applicable GWPP elements and goals described in the DOE O 450.1A technical guidance documents issued in June 2004 (DOE 2004) and May 2005 (DOE 2005). This GWPP management plan is a 'living' document that is reviewed annually, revised and reissued every three years, and is formatted to provide for updating individual sections independent of the rest of the document. Section 2 includes a short description of the groundwater system at Y-12, the history of groundwater monitoring at Y-12 and the corresponding evolution of the GWPP

  3. Recent Advancements in Retinal Vessel Segmentation.

    Science.gov (United States)

    L Srinidhi, Chetan; Aparna, P; Rajan, Jeny

    2017-04-01

    Retinal vessel segmentation is a key step towards the accurate visualization, diagnosis, early treatment and surgery planning of ocular diseases. For the last two decades, a tremendous amount of research has been dedicated in developing automated methods for segmentation of blood vessels from retinal fundus images. Despite the fact, segmentation of retinal vessels still remains a challenging task due to the presence of abnormalities, varying size and shape of the vessels, non-uniform illumination and anatomical variability between subjects. In this paper, we carry out a systematic review of the most recent advancements in retinal vessel segmentation methods published in last five years. The objectives of this study are as follows: first, we discuss the most crucial preprocessing steps that are involved in accurate segmentation of vessels. Second, we review most recent state-of-the-art retinal vessel segmentation techniques which are classified into different categories based on their main principle. Third, we quantitatively analyse these methods in terms of its sensitivity, specificity, accuracy, area under the curve and discuss newly introduced performance metrics in current literature. Fourth, we discuss the advantages and limitations of the existing segmentation techniques. Finally, we provide an insight into active problems and possible future directions towards building successful computer-aided diagnostic system.

  4. Streamlined Approach for Environmental Restoration (SAFER) Plan for Corrective Action Unit 575: Area 15 Miscellaneous Sites, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2014-12-01

    This Streamlined Approach for Environmental Restoration (SAFER) Plan addresses the actions needed to achieve closure for Corrective Action Unit (CAU) 575, Area 15 Miscellaneous Sites, identified in the Federal Facility Agreement and Consent Order (FFACO). CAU 575 comprises the following four corrective action sites (CASs) located in Area 15 of the Nevada National Security Site: 15-19-02, Waste Burial Pit, 15-30-01, Surface Features at Borehole Sites, 15-64-01, Decontamination Area, 15-99-03, Aggregate Plant This plan provides the methodology for field activities needed to gather the necessary information for closing each CAS. There is sufficient information and process knowledge from historical documentation and investigations of similar sites regarding the expected nature and extent of potential contaminants to recommend closure of CAU 575 using the SAFER process. Additional information will be obtained by conducting a field investigation to document and verify the adequacy of existing information, to affirm the predicted corrective action decisions, and to provide sufficient data to implement the corrective actions. This will be presented in a closure report that will be prepared and submitted to the Nevada Division of Environmental Protection (NDEP) for review and approval.

  5. Remedial Investigation Work Plan for Chestnut Ridge Operable Unit 1 (Chestnut Ridge Security Pits) at the Oak Ridge Y-12 Plant, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    1993-09-01

    This Remedial Investigation (RI) Work Plan specifically addresses Chestnut Ridge Operable Unit 1, (OU1) which consists of the Chestnut Ridge Security Pits (CRSP). The CRSP are located {approximately}800 ft southeast of the central portion of the Y-12 Plant atop Chestnut Ridge, which is bounded to the northwest by Bear Creek Valley and to the southeast by Bethel Valley. Operated from 1973 to 1988, the CRSP consisted of a series of trenches used for the disposal of classified hazardous and nonhazardous waste materials. Disposal of hazardous waste materials was discontinued in December 1984, while nonhazardous waste disposal ended on November 8, 1988. An RI is being conducted at this site in response to CERCLA regulations. The overall objectives of the RI are to collect data necessary to evaluate the nature and extent of contaminants of concern (COC), support an ecological risk assessment (ERA) and a human health risk assessment (HHRA), support the evaluation of remedial alternatives, and ultimately develop a Record of Decision for the site. The purpose of this Work Plan is to outline RI activities necessary to define the nature and extent of suspected contaminants at Chestnut Ridge OU1. Potential migration pathways also will be investigated. Data collected during the RI will be used to evaluate the overall risk posed to human health and the environment by OU1.

  6. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  7. Passenger rail security, planning, and resilience: application of network, plume, and economic simulation models as decision support tools.

    Science.gov (United States)

    Greenberg, Michael; Lioy, Paul; Ozbas, Birnur; Mantell, Nancy; Isukapalli, Sastry; Lahr, Michael; Altiok, Tayfur; Bober, Joseph; Lacy, Clifton; Lowrie, Karen; Mayer, Henry; Rovito, Jennifer

    2013-11-01

    We built three simulation models that can assist rail transit planners and operators to evaluate high and low probability rail-centered hazard events that could lead to serious consequences for rail-centered networks and their surrounding regions. Our key objective is to provide these models to users who, through planning with these models, can prevent events or more effectively react to them. The first of the three models is an industrial systems simulation tool that closely replicates rail passenger traffic flows between New York Penn Station and Trenton, New Jersey. Second, we built and used a line source plume model to trace chemical plumes released by a slow-moving freight train that could impact rail passengers, as well as people in surrounding areas. Third, we crafted an economic simulation model that estimates the regional economic consequences of a variety of rail-related hazard events through the year 2020. Each model can work independently of the others. However, used together they help provide a coherent story about what could happen and set the stage for planning that should make rail-centered transport systems more resistant and resilient to hazard events. We highlight the limitations and opportunities presented by using these models individually or in sequence. © 2013 Society for Risk Analysis.

  8. Corrective Action Investigation Plan for Corrective Action Unit 541: Small Boy Nevada National Security Site and Nevada Test and Training Range, Nevada with ROTC 1

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2014-09-01

    Corrective Action Unit (CAU) 541 is co-located on the boundary of Area 5 of the Nevada National Security Site and Range 65C of the Nevada Test and Training Range, approximately 65 miles northwest of Las Vegas, Nevada. CAU 541 is a grouping of sites where there has been a suspected release of contamination associated with nuclear testing. This document describes the planned investigation of CAU 541, which comprises the following corrective action sites (CASs): 05-23-04, Atmospheric Tests (6) - BFa Site; 05-45-03, Atmospheric Test Site - Small Boy. These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the investigation report. The sites will be investigated based on the data quality objectives (DQOs) developed on April 1, 2014, by representatives of the Nevada Division of Environmental Protection; U.S. Air Force; and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 541. The site investigation process also will be conducted in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices to be applied to this activity. The potential contamination sources associated with CASs 05-23-04 and 05-45-03 are from nuclear testing activities conducted at the Atmospheric Tests (6) - BFa Site and Atmospheric Test Site - Small Boy sites. The presence and nature of

  9. Corrective Action Investigation Plan for Corrective Action Unit 105: Area 2 Yucca Flat Atmospheric Test Sites Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2012-09-01

    Corrective Action Unit (CAU) 105 is located in Area 2 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 105 is a geographical grouping of sites where there has been a suspected release of contamination associated with atmospheric nuclear testing. This document describes the planned investigation of CAU 105, which comprises the following corrective action sites (CASs): • 02-23-04, Atmospheric Test Site - Whitney • 02-23-05, Atmospheric Test Site T-2A • 02-23-06, Atmospheric Test Site T-2B • 02-23-08, Atmospheric Test Site T-2 • 02-23-09, Atmospheric Test Site - Turk These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed on April 30, 2012, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 105. The site investigation process will also be conducted in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices to be applied to this activity. The potential contamination sources associated with all CAU 105 CASs are from atmospheric nuclear testing activities. The presence and nature of contamination at CAU

  10. PRESSURE-RESISTANT VESSEL

    NARCIS (Netherlands)

    Beukers, A.; De Jong, T.

    1997-01-01

    Abstract of WO 9717570 (A1) The invention is directed to a wheel-shaped pressure-resistant vessel for gaseous, liquid or liquefied material having a substantially rigid shape, said vessel comprising a substantially continuous shell of a fiber-reinforced resin having a central opening, an inner

  11. Corrective Action Decision Document/Corrective Action Plan for Corrective Action Unit 97: Yucca Flat/Climax Mine Nevada National Security Site, Nevada, Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro, Las Vegas, NV (United States)

    2017-08-01

    This corrective action decision document (CADD)/corrective action plan (CAP) has been prepared for Corrective Action Unit (CAU) 97, Yucca Flat/Climax Mine, Nevada National Security Site (NNSS), Nevada. The Yucca Flat/Climax Mine CAU is located in the northeastern portion of the NNSS and comprises 720 corrective action sites. A total of 747 underground nuclear detonations took place within this CAU between 1957 and 1992 and resulted in the release of radionuclides (RNs) in the subsurface in the vicinity of the test cavities. The CADD portion describes the Yucca Flat/Climax Mine CAU data-collection and modeling activities completed during the corrective action investigation (CAI) stage, presents the corrective action objectives, and describes the actions recommended to meet the objectives. The CAP portion describes the corrective action implementation plan. The CAP presents CAU regulatory boundary objectives and initial use-restriction boundaries identified and negotiated by DOE and the Nevada Division of Environmental Protection (NDEP). The CAP also presents the model evaluation process designed to build confidence that the groundwater flow and contaminant transport modeling results can be used for the regulatory decisions required for CAU closure. The UGTA strategy assumes that active remediation of subsurface RN contamination is not feasible with current technology. As a result, the corrective action is based on a combination of characterization and modeling studies, monitoring, and institutional controls. The strategy is implemented through a four-stage approach that comprises the following: (1) corrective action investigation plan (CAIP), (2) CAI, (3) CADD/CAP, and (4) closure report (CR) stages.

  12. Containment vessel drain system

    Energy Technology Data Exchange (ETDEWEB)

    Harris, Scott G.

    2018-01-30

    A system for draining a containment vessel may include a drain inlet located in a lower portion of the containment vessel. The containment vessel may be at least partially filled with a liquid, and the drain inlet may be located below a surface of the liquid. The system may further comprise an inlet located in an upper portion of the containment vessel. The inlet may be configured to insert pressurized gas into the containment vessel to form a pressurized region above the surface of the liquid, and the pressurized region may operate to apply a surface pressure that forces the liquid into the drain inlet. Additionally, a fluid separation device may be operatively connected to the drain inlet. The fluid separation device may be configured to separate the liquid from the pressurized gas that enters the drain inlet after the surface of the liquid falls below the drain inlet.

  13. Corrective Action Investigation Plan for Corrective Action Unit 365: Baneberry Contamination Area, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2010-12-01

    Corrective Action Unit 365 comprises one corrective action site (CAS), CAS 08-23-02, U-8d Contamination Area. This site is being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for the CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The site will be investigated based on the data quality objectives (DQOs) developed on July 6, 2010, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for the Baneberry site. The primary release associated with Corrective Action Unit 365 was radiological contamination from the Baneberry nuclear test. Baneberry was an underground weapons-related test that vented significant quantities of radioactive gases from a fissure located in close proximity to ground zero. A crater formed shortly after detonation, which stemmed part of the flow from the fissure. The scope of this investigation includes surface and shallow subsurface (less than 15 feet below ground surface) soils. Radionuclides from the Baneberry test with the potential to impact groundwater are included within the Underground Test Area Subproject. Investigations and corrective actions associated with the Underground Test Area Subproject include the radiological inventory resulting from the Baneberry test.

  14. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  15. Integrating Multiple Autonomous Underwater Vessels, Surface Vessels and Aircraft into Oceanographic Research Vessel Operations

    Science.gov (United States)

    McGillivary, P. A.; Borges de Sousa, J.; Martins, R.; Rajan, K.

    2012-12-01

    Autonomous platforms are increasingly used as components of Integrated Ocean Observing Systems and oceanographic research cruises. Systems deployed can include gliders or propeller-driven autonomous underwater vessels (AUVs), autonomous surface vessels (ASVs), and unmanned aircraft systems (UAS). Prior field campaigns have demonstrated successful communication, sensor data fusion and visualization for studies using gliders and AUVs. However, additional requirements exist for incorporating ASVs and UASs into ship operations. For these systems to be optimally integrated into research vessel data management and operational planning systems involves addressing three key issues: real-time field data availability, platform coordination, and data archiving for later analysis. A fleet of AUVs, ASVs and UAS deployed from a research vessel is best operated as a system integrated with the ship, provided communications among them can be sustained. For this purpose, Disruptive Tolerant Networking (DTN) software protocols for operation in communication-challenged environments help ensure reliable high-bandwidth communications. Additionally, system components need to have considerable onboard autonomy, namely adaptive sampling capabilities using their own onboard sensor data stream analysis. We discuss Oceanographic Decision Support System (ODSS) software currently used for situational awareness and planning onshore, and in the near future event detection and response will be coordinated among multiple vehicles. Results from recent field studies from oceanographic research vessels using AUVs, ASVs and UAS, including the Rapid Environmental Picture (REP-12) cruise, are presented describing methods and results for use of multi-vehicle communication and deliberative control networks, adaptive sampling with single and multiple platforms, issues relating to data management and archiving, and finally challenges that remain in addressing these technological issues. Significantly, the

  16. 78 FR 68784 - Cargo Securing Manuals

    Science.gov (United States)

    2013-11-15

    ... Stowage and Securing (CSS Code),'' any container vessel, subject to SOLAS, whose keel is laid on or after.... In order to test this, we developed an estimate of lost or jettisoned cargo incidents that are...

  17. 2013 Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  18. 2011 Passenger Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  19. 2011 Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  20. 2013 Passenger Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  1. 2013 Tanker Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  2. 2013 Cargo Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  3. High Performance Marine Vessels

    CERN Document Server

    Yun, Liang

    2012-01-01

    High Performance Marine Vessels (HPMVs) range from the Fast Ferries to the latest high speed Navy Craft, including competition power boats and hydroplanes, hydrofoils, hovercraft, catamarans and other multi-hull craft. High Performance Marine Vessels covers the main concepts of HPMVs and discusses historical background, design features, services that have been successful and not so successful, and some sample data of the range of HPMVs to date. Included is a comparison of all HPMVs craft and the differences between them and descriptions of performance (hydrodynamics and aerodynamics). Readers will find a comprehensive overview of the design, development and building of HPMVs. In summary, this book: Focuses on technology at the aero-marine interface Covers the full range of high performance marine vessel concepts Explains the historical development of various HPMVs Discusses ferries, racing and pleasure craft, as well as utility and military missions High Performance Marine Vessels is an ideal book for student...

  4. Cheboygan Vessel Base

    Data.gov (United States)

    Federal Laboratory Consortium — Cheboygan Vessel Base (CVB), located in Cheboygan, Michigan, is a field station of the USGS Great Lakes Science Center (GLSC). CVB was established by congressional...

  5. Maury Journals - US Vessels

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — U.S. vessels observations, after the 1853 Brussels Conference that set International Maritime Standards, modeled after Maury Marine Standard Observations.

  6. 2011 Cargo Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  7. 2011 Tanker Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  8. 2013 Fishing Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  9. Coastal Logbook Survey (Vessels)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains catch (landed catch) and effort for fishing trips made by vessels that have been issued a Federal permit for the Gulf of Mexico reef fish,...

  10. LANL Robotic Vessel Scanning

    Energy Technology Data Exchange (ETDEWEB)

    Webber, Nels W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-11-25

    Los Alamos National Laboratory in J-1 DARHT Operations Group uses 6ft spherical vessels to contain hazardous materials produced in a hydrodynamic experiment. These contaminated vessels must be analyzed by means of a worker entering the vessel to locate, measure, and document every penetration mark on the vessel. If the worker can be replaced by a highly automated robotic system with a high precision scanner, it will eliminate the risks to the worker and provide management with an accurate 3D model of the vessel presenting the existing damage with the flexibility to manipulate the model for better and more in-depth assessment.The project was successful in meeting the primary goal of installing an automated system which scanned a 6ft vessel with an elapsed time of 45 minutes. This robotic system reduces the total time for the original scope of work by 75 minutes and results in excellent data accumulation and transmission to the 3D model imaging program.

  11. 26 CFR 1.401(a)-15 - Requirement that plan benefits are not decreased on account of certain Social Security increases.

    Science.gov (United States)

    2010-04-01

    ... on account of certain Social Security increases. 1.401(a)-15 Section 1.401(a)-15 Internal Revenue... decreased on account of certain Social Security increases. (a) In general. Under section 401(a)(15), a trust...-separation social security benefit increase effective after the later of— (i) September 2, 1974, or (ii) The...

  12. Corrective Action Investigation Plan for Corrective Action Unit 576: Miscellaneous Radiological Sites and Debris Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick [Navarro, Las Vegas, NV (United States)

    2016-12-01

    Corrective Action Unit (CAU) 576 is located in Areas 2, 3, 5, 8, and 9 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 576 is a grouping of sites where there has been a suspected release of contamination associated with nuclear testing. This document describes the planned investigation of CAU 576, which comprises the following corrective action sites (CASs): 00-99-01, Potential Source Material; 02-99-12, U-2af (Kennebec) Surface Rad-Chem Piping; 03-99-20, Area 3 Subsurface Rad-Chem Piping; 05-19-04, Frenchman Flat Rad Waste Dump ; 09-99-08, U-9x (Allegheny) Subsurface Rad-Chem Piping; 09-99-09, U-9its u24 (Avens-Alkermes) Surface Contaminated Flex Line These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document (CADD).

  13. Corrective Action Investigation Plan for Corrective Action Unit 571: Area 9 Yucca Flat Plutonium Dispersion Sites, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, Bernadine; Matthews, Patrick

    2013-07-01

    CAU 571 is a grouping of sites where there has been a suspected release of contamination associated with nuclear testing. This document describes the planned investigation of CAU 571, which comprises the following corrective action sites (CASs): • 09-23-03, Atmospheric Test Site S-9F • 09-23-04, Atmospheric Test Site T9-C • 09-23-12, Atmospheric Test Site S-9E • 09-23-13, Atmospheric Test Site T-9D • 09-45-01, Windrows Crater These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the investigation report. The sites will be investigated based on the data quality objectives (DQOs) developed on March 6, 2013, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (now the Nevada Field Office). The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 571. The site investigation process will also be conducted in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices to be applied to this activity. The potential contamination sources associated with CAU 571 CASs are from nuclear testing activities. The DQO process resulted in an assumption that total effective dose (TED) within a default contamination boundary exceeds the final action level (FAL) and requires corrective action. The presence and nature of contamination outside the default

  14. Corrective Action Investigation Plan for Corrective Action Unit 567: Miscellaneous Soil Sites, Nevada National Security Site, Nevada, with ROTC 1 Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick K.

    2013-07-01

    Corrective Action Unit (CAU) 567 is located in Areas 1, 3, 5, 20, and 25 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 567 is a grouping of sites where there has been a suspected release of contamination associated with nuclear testing. This document describes the planned investigation of CAU 567, which comprises the following corrective action sites (CASs): • 01-23-03, Atmospheric Test Site T-1 • 03-23-25, Seaweed E Contamination Area • 05-23-07, A5b RMA • 20-23-08, Colby Mud Spill • 25-23-23, J-11 Soil RMA These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the investigation report. The sites will be investigated based on the data quality objectives (DQOs) developed on May 6, 2013, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 567. The site investigation process will also be conducted in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices to be applied to this activity. The potential contamination sources associated with CAU 567 releases are nuclear test operations and other NNSS operations. The DQO process resulted in an assumption that total effective dose (TED) within a default contamination boundary

  15. USCG Vessel Events

    Data.gov (United States)

    Department of Homeland Security — The Marine Casualty and Pollution Data files provide details about marine casualty and pollution incidents investigated by Coast Guard Offices throughout the United...

  16. USCG Vessel Pollution

    Data.gov (United States)

    Department of Homeland Security — The Marine Casualty and Pollution Data files provide details about marine casualty and pollution incidents investigated by Coast Guard Offices throughout the United...

  17. Trilateral Strategic Defense Capability Planning Symposium

    National Research Council Canada - National Science Library

    Butts, Kent

    2004-01-01

    .... This strategic planning initiative has developed the Emerging Security Environment to 2022 document, a National Military Strategy, a National Internal Security Plan, and a Multi-Year Defense Capability Planning System (MYDCaPS...

  18. Progress of ITER vacuum vessel

    Energy Technology Data Exchange (ETDEWEB)

    Ioki, K., E-mail: Kimihiro.Ioki@iter.org [ITER Organization, Route de Vinon sur Verdon, 13115 St Paul-lez-Durance (France); Bayon, A. [F4E, c/ Josep Pla, No. 2, Torres Diagonal Litoral, Edificio B3, E-08019 Barcelona (Spain); Choi, C.H.; Daly, E.; Dani, S.; Davis, J.; Giraud, B.; Gribov, Y.; Hamlyn-Harris, C.; Jun, C.; Levesy, B. [ITER Organization, Route de Vinon sur Verdon, 13115 St Paul-lez-Durance (France); Kim, B.C. [NFRI, 52 Yeoeundong Yuseonggu, Daejeon 305-333 (Korea, Republic of); Kuzmin, E. [NTC “Sintez”, Efremov Inst., 189631 Metallostroy, St. Petersburg (Russian Federation); Le Barbier, R.; Martinez, J.-M. [ITER Organization, Route de Vinon sur Verdon, 13115 St Paul-lez-Durance (France); Pathak, H. [ITER-India, A-29, GIDC Electronic Estate, Sector 25, Gandhinagar 382025 (India); Preble, J. [ITER Organization, Route de Vinon sur Verdon, 13115 St Paul-lez-Durance (France); Sa, J.W. [NFRI, 52 Yeoeundong Yuseonggu, Daejeon 305-333 (Korea, Republic of); Terasawa, A.; Utin, Yu. [ITER Organization, Route de Vinon sur Verdon, 13115 St Paul-lez-Durance (France); and others

    2013-10-15

    Highlights: ► This covers the overall status and progress of the ITER vacuum vessel activities. ► It includes design, R and D, manufacturing and approval process of the regulators. ► The baseline design was completed and now manufacturing designs are on-going. ► R and D includes ISI, dynamic test of keys and lip-seal welding/cutting technology. ► The VV suppliers produced full-scale mock-ups and started VV manufacturing. -- Abstract: Design modifications were implemented in the vacuum vessel (VV) baseline design in 2011–2012 for finalization. The modifications are mostly due to interface components, such as support rails and feedthroughs for the in-vessel coils (IVC). Manufacturing designs are being developed at the domestic agencies (DAs) based on the baseline design. The VV support design was also finalized and tests on scale mock-ups are under preparation. Design of the in-wall shielding (IWS) has progressed, considering the assembly methods and the required tolerances. Further modifications are required to be consistent with the DAs’ manufacturing designs. Dynamic tests on the inter-modular and stub keys to support the blanket modules are being performed to measure the dynamic amplification factor (DAF). An in-service inspection (ISI) plan has been developed and R and D was launched for ISI. Conceptual design of the VV instrumentation has been developed. The VV baseline design was approved by the agreed notified body (ANB) in accordance with the French Nuclear Pressure Equipment Order procedure.

  19. Models and Algorithms for Container Vessel Stowage Optimization

    DEFF Research Database (Denmark)

    Delgado-Ortegon, Alberto

    planning that includes features of stowage planning that have not been considered in previous work. For slot planning, a fast and accurate representative model to optimally stow vessel sections is introduced. The second SP approach serves as the optimization component of a commercial decision support tool...... used for interactive planning of container vessels. Expert's know-how formulated as user preferences is integrated into the heuristic optimization component and used to tackle complex constraints and optimize combinatorial objectives. According to our experimental evaluation, stowage plans computed...... by our heuristic are competitive enough with respect to those made by experts under the same conditions. The CCP evaluates how the stowage characteristics of containers with different features affect important performance measures used in liner shipping companies, e.g., vessel intake and cargo revenue...

  20. Enhancing supply vessel safety

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    A supply-vessel bridge installation consists of a navigating bridge and a control position aft, from which operators control the ship when close to rigs or platforms, and operate winches and other loading equipment. The international Convention for Safety of I Ale at Sea (SOLAS) does not regulate the layout, so design varies to a large degree, often causing an imperfect working environment. As for other types of ships, more than half the offshore service vessel accidents at sea are caused by bridge system failures. A majority can be traced back to technical design, and operational errors. The research and development project NAUT-OSV is a response to the offshore industry's safety concerns. Analysis of 24 incidents involving contact or collision between supply vessels and offshore installations owned or operated by Norwegian companies indicated that failures in the bridge system were often the cause.

  1. Security Expertise

    DEFF Research Database (Denmark)

    and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks......, the collaboration between science, anthropology and the military, transnational terrorism, and the ethical consequences of security expertise. Together they challenge our understanding of how expertise works and what consequences it has for security politics and international relations. This book...... will be of particular interest to students of critical security studies, sociology, science and technology studies, and IR/security studies in general....

  2. 46 CFR 199.630 - Alternatives for passenger vessels in a specified service.

    Science.gov (United States)

    2010-10-01

    ...; and (iv) Environmental factors. (2) A comprehensive shipboard safety management and contingency plan that is tailored to the particular vessel, is easy to use, is understood by vessel management personnel... communications on board the vessel and with shoreside contacts; and (vi) Guidance on theoretical, practical, and...

  3. Nuclear reactor pressure vessel support system

    Science.gov (United States)

    Sepelak, George R.

    1978-01-01

    A support system for nuclear reactor pressure vessels which can withstand all possible combinations of stresses caused by a postulated core disrupting accident during reactor operation. The nuclear reactor pressure vessel is provided with a flange around the upper periphery thereof, and the flange includes an annular vertical extension formed integral therewith. A support ring is positioned atop of the support ledge and the flange vertical extension, and is bolted to both members. The plug riser is secured to the flange vertical extension and to the top of a radially outwardly extension of the rotatable plug. This system eliminates one joint through which fluids contained in the vessel could escape by making the fluid flow path through the joint between the flange and the support ring follow the same path through which fluid could escape through the plug risers. In this manner, the sealing means to prohibit the escape of contained fluids through the plug risers can also prohibit the escape of contained fluid through the securing joint.

  4. Turkish Republic of Northern Cyprus Vessel Traffic Services (TRNCVTS

    Directory of Open Access Journals (Sweden)

    Serdar KUM

    2016-06-01

    Full Text Available The first Vessel Traffic Service (VTS started in 1949 in the Liverpool Port (UK and it continued in Netherlands in 1956. In Turkey, planning and management of the marine traffic using the waterways and ports in Turkey started with Turkish Straits VTS which came into service in 2003 due to the increase in traffic density enhance its effectiveness and necessity every year. Feasibility studies in five new areas have been initiated for the establishment of the VTS system by force of the strategic decision taken by the maritime authority in 2008. These areas are; İzmit Bay, Izmir Bay and Aliağa Region, Gulf of İskenderun and Mersin. Monitoring the marine traffic has an important place as the Turkish Republic of Northern Cyprus (TRNC is an important transition point in the Eastern Mediterranean region. For this reason, in this study the impact assessment and necessity of the establishment of a VTS to be located in the TRNC were evaluated by using Environmental (PEST: Political, Economic, Social, Technological and SWOT (Strengths, Weakness, Opportunities, Threats Analyses. In addition, the suitability of the possible locations of Traffic Monitoring Stations (TMS has been examined by the field study. Evaluation of TRNC VTS in geographical and strategic terms will benefit from the opportunities and facilities that both the Republic of Turkey and the TRNC will have as a part of the effect of VTS against the embargo imposed on the TRNC in the world. Three appropriate VTS TMSs have been chosen as a result of the field study carried out for 10 determined TMSs; Cape Kormakitis, Cape Apostolos Andreas and Famagusta. It is also concluded that it would be appropriate to plan the Famagusta Station as VTS Centre. It is assumed to monitor and track the vessels in the zones out of the coverage area of these stations by Automatic Identification System (AIS. Safety and security in the shipping, protection of navigation, life, property and the marine environment of

  5. 46 CFR 2.01-50 - Persons other than crew on towing, oyster, or fishing steam vessels.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Persons other than crew on towing, oyster, or fishing steam vessels. 2.01-50 Section 2.01-50 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES... than crew on towing, oyster, or fishing steam vessels. (a) A steam vessel engaged in towing, oyster...

  6. Streamlined Approach for Environmental Restoration (SAFER) Plan for Corrective Action Unit 465: Hydronuclear Nevada National Security Site, Nevada, with ROTC 1, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2011-11-01

    This Streamlined Approach for Environmental Restoration (SAFER) Plan addresses the actions needed to achieve closure for Corrective Action Unit (CAU) 465, Hydronuclear, identified in the Federal Facility Agreement and Consent Order (FFACO). Corrective Action Unit 465 comprises the following four corrective action sites (CASs) located in Areas 6 and 27 of the Nevada National Security Site: (1) 00-23-01, Hydronuclear Experiment; (2) 00-23-02, Hydronuclear Experiment; (3) 00-23-03, Hydronuclear Experiment; (4) 06-99-01, Hydronuclear. The sites will be investigated based on the data quality objectives (DQOs) developed on July 6, 2011, by representatives of the Nevada Division of Environmental Protection (NDEP) and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to determine and implement appropriate corrective actions for each CAS in CAU 465. For CAU 465, two potential release components have been identified. The subsurface release component includes potential releases of radiological and nonradiological contaminants from the subsurface hydronuclear experiments and disposal boreholes. The surface release component consists of other potential releases of radiological and nonradiological contaminants to surface soils that may have occurred during the pre- and post-test activities. This plan provides the methodology for collection of the necessary information for closing each CAS component. There is sufficient information and process knowledge from historical documentation, contaminant characteristics, existing regional and site groundwater models, and investigations of similar sites regarding the expected nature and extent of potential contaminants to recommend closure of CAU 465 using the SAFER process. For potential subsurface releases, flow and transport models will be developed to integrate existing data into a conservative

  7. Corrective Action Investigation Plan for Corrective Action Unit 570: Area 9 Yucca Flat Atmospheric Test Sites Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2012-08-01

    CAU 570 comprises the following six corrective action sites (CASs): • 02-23-07, Atmospheric Test Site - Tesla • 09-23-10, Atmospheric Test Site T-9 • 09-23-11, Atmospheric Test Site S-9G • 09-23-14, Atmospheric Test Site - Rushmore • 09-23-15, Eagle Contamination Area • 09-99-01, Atmospheric Test Site B-9A These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed on April 30, 2012, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 570. The site investigation process will also be conducted in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices to be applied to this activity. The presence and nature of contamination at CAU 570 will be evaluated based on information collected from a field investigation. Radiological contamination will be evaluated based on a comparison of the total effective dose at sample locations to the dose-based final action level. The total effective dose will be calculated as the total of separate estimates of internal and external dose. Results from the analysis of soil samples will be used to calculate internal radiological

  8. A Security Checklist for ERP Implementations

    Science.gov (United States)

    Hughes, Joy R.; Beer, Robert

    2007-01-01

    The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…

  9. Planning U.S. Security,

    Science.gov (United States)

    1981-01-01

    and all the other children who rely on planners, warriors, practitioners of statecraft, scholars, and other superheroes to provide a safe and decent...the constitutional constraints. As America’s Vietnam involvement accrued more and more costs, popular and congres- sional reaction turned negative. (The...prerogatives in the face of a "populist" foreign policy, that is, one "less confined to elitist prescriptions, but more subject to popular whims; less

  10. Deaths Related to Vessel Injuries in Extremities

    Directory of Open Access Journals (Sweden)

    Nursel Türkmen

    2003-12-01

    Full Text Available Lethal or non-lethal extremity injuries are often seen in medico-legal practice. In this study, we planned to investigate medico-legal properties of deaths related to vessel injuries in extremities. In forensic autopsies performed in Bursa, we examined total 4242 autopsy reports between 1996-2003 in included 40 (0,94% cases of deaths caused by vessel injuries in extremities. 90% of cases were male with median age 35.87 (17-66. Stabbing device account for 60% of injuries. Most frequent injuries were in femoral artery and branches. In 82.5% of cases, homicide was the origin of death. In 30% of cases, mean 159.33 mg/dl alcohol blood concentration was detected. In the scene investigation reports, 47.5% of documented incidents were outdoor and 47.5% of the cases died in the scene. As a conclusion, it is observed that alcoholic males of middle age are the risk group for vascular injuries in extremities. In the deaths related to isolated vessel injuries in extremities, the detection of injured vessel, localisation and number of total and lethal wounds would offer a solution for the evil intent; and as in the other violent death cases autopsy is required in the deaths due to vessel injuries in extremities. Key words: Vascular injuries, Extremity, Forensic autopsy.

  11. GOLD PRESSURE VESSEL SEAL

    Science.gov (United States)

    Smith, A.E.

    1963-11-26

    An improved seal between the piston and die member of a piston-cylinder type pressure vessel is presented. A layer of gold, of sufficient thickness to provide an interference fit between the piston and die member, is plated on the contacting surface of at least one of the members. (AEC)

  12. Network of endocardial vessels.

    Science.gov (United States)

    Lee, Byung-Cheon; Kim, Hong Bae; Sung, Baeckkyoung; Kim, Ki Woo; Sohn, Jamin; Son, Boram; Chang, Byung-Joon; Soh, Kwang-Sup

    2011-01-01

    Although there have been reports on threadlike structures inside the heart, they have received little attention. We aimed to develop a method for observing such structures and to reveal their ultrastructures. An in situ staining method, which uses a series of procedures of 0.2-0.4% trypan blue spraying and washing, was applied to observe threadlike structures on the surfaces of endocardia. The threadlike structures were isolated and observed by using confocal laser scanning microscopy (CLSM) and transmission electron microscopy (TEM). Networks of endocardial vessels (20 μm in thickness) with expansions (40-100 μm in diameter) were visualized; they were movable on the endocardium of the bovine atrium and ventricle. CLSM showed that (1) rod-shaped nuclei were aligned along the longitudinal direction of the endocardial vessel and (2) there were many cells inside the expansion. TEM on the endocardial vessel revealed that (1) there existed multiple lumens (1-7 μm in diameter) and (2) the extracellular matrices mostly consisted of collagen fibers, which were aligned along the longitudinal direction of the endocardial vessel or were locally organized in reticular structures. We investigated the endocardial circulatory system in bovine cardiac chambers and its ultrastructures, such as nucleic distributions, microlumens, and collagenous extracellular matrices. Copyright © 2011 S. Karger AG, Basel.

  13. Pressurized Vessel Slurry Pumping

    Energy Technology Data Exchange (ETDEWEB)

    Pound, C.R.

    2001-09-17

    This report summarizes testing of an alternate ''pressurized vessel slurry pumping'' apparatus. The principle is similar to rural domestic water systems and ''acid eggs'' used in chemical laboratories in that material is extruded by displacement with compressed air.

  14. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  15. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  16. LTE security

    CERN Document Server

    Forsberg, Dan; Moeller, Wolf-Dietrich

    2010-01-01

    Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms em

  17. Staying Secure for School Safety

    Science.gov (United States)

    Youngkin, Minu

    2012-01-01

    Proper planning and preventive maintenance can increase school security and return on investment. Preventive maintenance begins with planning. Through careful planning, education institutions can determine what is working and if any equipment, hardware or software needs to be replaced or upgraded. When reviewing a school's safety and security…

  18. Maritime Training Serbian Autonomous Vessel Protection Detachment

    Directory of Open Access Journals (Sweden)

    Šoškić Svetislav D.

    2014-06-01

    Full Text Available The crisis in Somalia has caused appearance of piracy at sea in the Gulf of Aden and the Western Indian Ocean. Somali pirates have become a threat to economic security of the world because almost 30 percent of world oil and 20 percent of global trade passes through the Gulf of Aden. Solving the problem of piracy in this part of the world have included international organizations, institutions, military alliances and the states, acting in accordance with international law and UN Security Council resolutions. The European Union will demonstrate the application of a comprehensive approach to solving the problem of piracy at sea and the crisis in Somalia conducting naval operation — EU NAVFOR Atalanta and operation EUTM under the Common Security and Defense Policy. The paper discusses approaches to solving the problem of piracy in the Gulf of Aden and the crisis in Somalia. Also, the paper points to the complexity of the crisis in Somalia and dilemmas correctness principles that are applied to solve the problem piracy at sea. One of goals is protections of vessels of the World Food Programme (WFP delivering food aid to displaced persons in Somalia. Republic of Serbia joined in this mission and trained and sent one a autonomous team in this military operation for protection WFP. This paper consist the problem of modern piracy, particularly in the area of the Horn of Africa became a real threat for the safety of maritime ships and educational process of Serbian Autonomous vessel protection detachment. Serbian Military Academy adopted and developed educational a training program against piracy applying all the provisions and recommendations of the IMO conventions and IMO model courses for Serbian Autonomous vessel protection detachment.

  19. Project Management with IT Security Focus

    OpenAIRE

    Felician Alecu; Paul Pocatilu; Sergiu Capisizu

    2011-01-01

    The paper focus on the main key points related to the IT security project management. The most important lifecycle stages are identified: IT security project proposal definition, project organization, project planning, quality planning, project team organization, IT security project activities management and project closing. The most important success factors for IT security projects are the support of top-management, customer satisfaction, prevention over remediation and continuous progress....

  20. Corrective Action Decision Document/Corrective Action Plan for Corrective Action Unit 547: Miscellaneous Contaminated Waste Sites, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Mark Krauss

    2011-09-01

    The purpose of this CADD/CAP is to present the corrective action alternatives (CAAs) evaluated for CAU 547, provide justification for selection of the recommended alternative, and describe the plan for implementing the selected alternative. Corrective Action Unit 547 consists of the following three corrective action sites (CASs): (1) CAS 02-37-02, Gas Sampling Assembly; (2) CAS 03-99-19, Gas Sampling Assembly; and(3) CAS 09-99-06, Gas Sampling Assembly. The gas sampling assemblies consist of inactive process piping, equipment, and instrumentation that were left in place after completion of underground safety experiments. The purpose of these safety experiments was to confirm that a nuclear explosion would not occur in the case of an accidental detonation of the high-explosive component of the device. The gas sampling assemblies allowed for the direct sampling of the gases and particulates produced by the safety experiments. Corrective Action Site 02-37-02 is located in Area 2 of the Nevada National Security Site (NNSS) and is associated with the Mullet safety experiment conducted in emplacement borehole U2ag on October 17, 1963. Corrective Action Site 03-99-19 is located in Area 3 of the NNSS and is associated with the Tejon safety experiment conducted in emplacement borehole U3cg on May 17, 1963. Corrective Action Site 09-99-06 is located in Area 9 of the NNSS and is associated with the Player safety experiment conducted in emplacement borehole U9cc on August 27, 1964. The CAU 547 CASs were investigated in accordance with the data quality objectives (DQOs) developed by representatives of the Nevada Division of Environmental Protection (NDEP) and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to determine and implement appropriate corrective actions for CAU 547. Existing radiological survey data and historical knowledge of

  1. The cost of IT security.

    Science.gov (United States)

    McMillan, Mac

    2015-04-01

    Breaches in data security have become commonplace in health care, making IT security a necessary cost for healthcare organizations. Organizations that do not invest proactively in IT security face a significant risk of incurring much greater costs from incidents involving compromised data security. Direct costs of security breaches include the costs of discovery, response, investigation, and notification and also can include state or federal penalties and costs of compliance with corrective action plans and resolution agreements. Hidden costs can include damage to brand, loss of consumer confidence, reduced HCAHPS scores, and--by extension--reduced value-based purchasing payments.

  2. 19 CFR 123.34 - Certain vehicle and vessel shipments.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Certain vehicle and vessel shipments. 123.34 Section 123.34 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS RELATIONS WITH CANADA AND MEXICO Shipments in Transit Through the United...

  3. 77 FR 54808 - Vessels in Foreign and Domestic Trades

    Science.gov (United States)

    2012-09-06

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Customs and Border Protection 19 CFR Part 4 Vessels in Foreign and Domestic Trades CFR Correction In Title 19 of the Code of Federal Regulations, Parts 1 to 99, revised as of April 1, 2012, on page...

  4. Hawaii Abandoned Vessel Inventory, Kauai

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Kauai. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  5. CNMI Abandoned Vessel Inventory, Tinian

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Tinian. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  6. Puerto Rico Abandoned Vessel Inventory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Puerto Rico. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  7. American Samoa Abandoned Vessel Inventory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for American Samoa. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  8. Hawaii Abandoned Vessel Inventory, Oahu

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Oahu, Hawaii. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  9. Hawaii Abandoned Vessel Inventory, Molokai

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Molokai, Hawaii. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  10. CNMI Abandoned Vessel Inventory, Rota

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Rota. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  11. Hawaii Abandoned Vessel Inventory, Lanai

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Lanai. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  12. For-Hire Vessel Directory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Vessel Directory is maintained as the sample frame for the For-Hire Survey. I contains data on for-hire vessels on the Atlantic and Gulf coasts. Data include...

  13. CNMI Abandoned Vessel Inventory, Saipan

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Saipan. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  14. Hawaii Abandoned Vessel Inventory, Maui

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Maui. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  15. Vessels in Transit - Web Tool

    Data.gov (United States)

    Department of Transportation — A web tool that provides real-time information on vessels transiting the Saint Lawrence Seaway. Visitors may sort by order of turn, vessel name, or last location in...

  16. A Constraint Programming Model for Fast Optimal Stowage of Container Vessel Bays

    DEFF Research Database (Denmark)

    Delgado-Ortegon, Alberto; Jensen, Rune Møller; Janstrup, Kira

    2012-01-01

    Container vessel stowage planning is a hard combinatorial optimization problem with both high economic and environmental impact. We have developed an approach that often is able to generate near-optimal plans for large container vessels within a few minutes. It decomposes the problem into a maste...

  17. Pressure vessel design manual

    Energy Technology Data Exchange (ETDEWEB)

    Moss, D.R.

    1987-01-01

    The first section of the book covers types of loadings, failures, and stress theories, and how they apply to pressure vessels. The book delineates the procedures for designing typical components as well as those for designing large openings in cylindrical shells, ring girders, davits, platforms, bins and elevated tanks. The techniques for designing conical transitions, cone-cylinder intersections, intermediate heads, flat heads, and spherically dished covers are also described. The book covers the design of vessel supports subject to wind and seismic loads and one section is devoted to the five major ways of analyzing loads on shells and heads. Each procedure is detailed enough to size all welds, bolts, and plate thicknesses and to determine actual stresses.

  18. New research vessels

    Science.gov (United States)

    1984-04-01

    Two “new” ocean-going research vessels operated by the Scripps Institution of Oceanography and the National Science Foundation (NSF) will soon begin full-time scientific duties off the coast of California and in the Antarctic, respectively. The 37.5-m Scripps vessel, named Robert Gordon Sprout in honor of the ex-president of the University of California, replaces the smaller ship Ellen B. Scripps, which had served the institution since 1965. The new ship is a slightly modified Gulf Coast workboat. Under the name of Midnight Alaskan, it had been used for high-resolution geophysical surveys in American and Latin American waters by such firms as Arco Oil & Gas, Exxon, Pennzoil, and Racal-Decca before its purchase by Scripps from a Lousiana chartering firm last summer.

  19. Large vessel vasculitides

    OpenAIRE

    Morović-Vergles, Jadranka; Pukšić, Silva; Gudelj Gračanin, Ana

    2013-01-01

    Large vessel vasculitis includes Giant cell arteritis and Takayasu arteritis. Giant cell arteritis is the most common form of vasculitis affect patients aged 50 years or over. The diagnosis should be considered in older patients who present with new onset of headache, visual disturbance, polymyalgia rheumatica and/or fever unknown cause. Glucocorticoides remain the cornerstone of therapy. Takayasu arteritis is a chronic panarteritis of the aorta ant its major branches presenting commonly in y...

  20. Very Versatile Vessel

    Science.gov (United States)

    2009-09-01

    data. This source provides information on aluminum hydrofoil vessels without the added weight of foil structures. The composite armor around the...seating compartment. The sides should also limit wave splash on the deck. The freeboard should contribute reserve buoyancy , increasing large-angle and...Resistance, Powering, and Propulsion Savitsky’s Method Since model testing data or other reliable performance data was unavailable for the proposed

  1. Sailing Vessel Routing Considering Safety Zone and Penalty Time for Altering Course

    Directory of Open Access Journals (Sweden)

    Marcin Zyczkowski

    2017-06-01

    Full Text Available In this paper we introduce new model for simulation sea vessel routing. Besides a vessel types (polar diagram and weather forecast, travel security and the number of maneuvers are considered. Based on these data both the minimal travelling costs and the minimal processing time are found for different vessels and different routes. To test our model the applications SailingAssistance wad improved. The obtained results shows that we can obtain quite acceptable results.

  2. 75 FR 3245 - Agency Information Collection Activities: Aircraft/Vessel Report (Form I-92)

    Science.gov (United States)

    2010-01-20

    ... Report (Form I-92) AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION... approval in accordance with the Paperwork Reduction Act: Aircraft/ Vessel Report (Form I-92). This is a... forms of information. Title: Aircraft/Vessel Report. OMB Number: 1651-0102. Form Number: I-92. Abstract...

  3. 46 CFR 11.462 - Endorsements for master or mate of uninspected fishing industry vessels.

    Science.gov (United States)

    2010-10-01

    ... industry vessels. 11.462 Section 11.462 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT... Officers § 11.462 Endorsements for master or mate of uninspected fishing industry vessels. (a) This section..., which are documented to engage in the fishing industry, with the exception of: (1) Wooden ships of...

  4. 75 FR 20371 - Certificate of Alternative Compliance for the Offshore Supply Vessel LEBOUEF TIDE

    Science.gov (United States)

    2010-04-19

    ... SECURITY Coast Guard Certificate of Alternative Compliance for the Offshore Supply Vessel LEBOUEF TIDE... Alternative Compliance was issued for the offshore supply vessel LEBOUEF TIDE as required by 33 U.S.C. 1605(c... LEBOUEF TIDE. The horizontal distance between the forward and aft masthead lights may be 25 -9 . Placing...

  5. 75 FR 39955 - Certificate of Alternative Compliance for the Offshore Supply Vessel MONICA W CALLAIS

    Science.gov (United States)

    2010-07-13

    ... SECURITY Coast Guard Certificate of Alternative Compliance for the Offshore Supply Vessel MONICA W CALLAIS... Alternative Compliance was issued for the offshore supply vessel MONICA W CALLAIS as required by 33 U.S.C... MONICA W CALLAIS, O.N. 1226851. The horizontal distance between the forward and aft masthead lights may...

  6. 76 FR 33161 - Installation and Use of Engine Cut-off Switches on Recreational Vessels

    Science.gov (United States)

    2011-06-08

    ... Security FR Federal Register NBSAC National Boating Safety Advisory Council NMMA National Marine... caused by persons being struck by a recreational vessel or a propeller. Under 46 U.S.C. Chapter 43... appropriate course of action to address the recreational vessel and propeller strike-related casualty issue...

  7. 46 CFR 8.545 - Scope of inspection for enrolled vessels.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Scope of inspection for enrolled vessels. 8.545 Section 8.545 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC VESSEL INSPECTION ALTERNATIVES Streamlined Inspection Program § 8.545 Scope of inspection for enrolled...

  8. 78 FR 6732 - Changes to Standard Numbering System, Vessel Identification System, and Boating Accident Report...

    Science.gov (United States)

    2013-01-31

    ... SECURITY Coast Guard 33 CFR Parts 173, 174, 181, and 187 RIN 1625-AB45 Changes to Standard Numbering System, Vessel Identification System, and Boating Accident Report Database AGENCY: Coast Guard, DHS. ACTION: Rule... Numbering System, Vessel Identification System, and Boating Accident Report Database rule became effective...

  9. 78 FR 61223 - Regulated Navigation Area; Southern Oahu Tsunami Vessel Evacuation, Honolulu, HI

    Science.gov (United States)

    2013-10-03

    ... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA00 Regulated Navigation Area; Southern Oahu Tsunami Vessel... evacuation of Southern Oahu ports. DATES: Comments and related material must be received by the Coast Guard... Southern Oahu Tsunami Vessel Evacuation regulated navigation area. All recommendations received careful...

  10. Proceedings of the ARO Planning Workshop on Embedded Systems and Network Security Held in Raleigh, North Carolina on February 22-23, 2007

    Science.gov (United States)

    2007-10-28

    attacks of probabilistic nature may be resource and computationally efficient than active attacks in WSN/ RFID .” • Designing security protocols that leak...protect these intellectual property on embedded devices and to restrict their usage have be- come a new design challenge. The recent incident of hacking ...Andrew Huang. Hacking the Xbox: An Introduction to Reverse Engineering. No Starch Press, 2003. [2] Philip Koopman. Embedded System Security. IEEE

  11. Segmentation of vessels: the corkscrew algorithm

    Science.gov (United States)

    Wesarg, Stefan; Firle, Evelyn A.

    2004-05-01

    Medical imaging is nowadays much more than only providing data for diagnosis. It also links 'classical' diagnosis to modern forms of treatment such as image guided surgery. Those systems require the identification of organs, anatomical regions of the human body etc., i. e. the segmentation of structures from medical data sets. The algorithms used for these segmentation tasks strongly depend on the object to be segmented. One structure which plays an important role in surgery planning are vessels that are found everywhere in the human body. Several approaches for their extraction already exist. However, there is no general one which is suitable for all types of data or all sorts of vascular structures. This work presents a new algorithm for the segmentation of vessels. It can be classified as a skeleton-based approach working on 3D data sets, and has been designed for a reliable segmentation of coronary arteries. The algorithm is a semi-automatic extraction technique requiring the definition of the start and end the point of the (centerline) path to be found. A first estimation of the vessel's centerline is calculated and then corrected iteratively by detecting the vessel's border perpendicular to the centerline. We used contrast enhanced CT data sets of the thorax for testing our approach. Coronary arteries have been extracted from the data sets using the 'corkscrew algorithm' presented in this work. The segmentation turned out to be robust even if moderate breathing artifacts were present in the data sets.

  12. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  13. Node security

    CERN Document Server

    Barnes, Dominic

    2013-01-01

    A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using Node Security in production, or are considering using it for your next project, then this book will enable you to ensure security of your applications. An understanding of JavaScript is a prerequisite, and some experience with Node is recommended, though not required.

  14. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  15. Vessel Traffic Services.

    Science.gov (United States)

    1982-12-01

    Yorker" articles titled Silent Spring by Rachel Carson in 1963 produced a unifying effect, "the sort of rallying point of the movement to protect the...6232, 92d Cong., 1st. sess., 1971, p. 2. 15. Carson , Rachel L. , The Sea Around Us, New York: Oxford Univesity Press, 195-, p. IV. 16. U.S., Congress...Government Printing Office, 1974. 63. Buhler, L. and Geiger, J., Vessel Traffic Data Extraction MethodoloqX, Silver Spring , Maryland, O6erFae-tns

  16. Vanishing corneal vessels

    Science.gov (United States)

    Nicholson, Luke; Chana, Rupinder

    2013-01-01

    We wish to highlight the importance of acknowledging the accompanying effects of topical phenylephrine drops on the eye other than its intended mydriasis. We reported a case of a 92-year-old woman with a corneal graft who was noted to have superficial corneal vascularisation which was not documented previously. After the instillation of topical tropicamide 1% and phenylephrine 2.5%, for funduscopy, the corneal vascularisation was not visible. When reassessed on another visit, tropicamide had no effect on the vessels and only phenylephrine did. We wish to highlight that when reviewing patients in cornea clinics, instilling phenylephrine prior to being seen may mask important corneal vascularisation. PMID:24121816

  17. Implementing an Information Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.; O' Neil, Lori Ross; Leitch, Rosalyn; Johnson, Christopher; Lewis, John G.; Rodger, Robert M.

    2017-11-01

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to cover information security best practices, planning for an information security management system, and implementing security controls for information security.

  18. Social security for seafarers globally

    DEFF Research Database (Denmark)

    Jensen, Olaf; Canals, Luisa; Haarløv, Erik

    2013-01-01

    Social security for seafarers globally Background: Social security protection is one of the essential elements of decent work. The issue is complex and no previous epidemiological studies of the coverage among seafarers have yet been performed. Objectives: The aim was to overcome the gap...... of knowledge to promote the discussion and planning of the implementation of social security for all seafarers. Methods: The seafarers completed a short questionnaire concerning their knowledge about their social security status. Results: Significant disparities of coverage of social security were pointed out...... comes from poorer countries without substantial social security systems. The solutions suggested are to implement the minimum requirements as recommended by the ILO 2006 Convention, to survey the implementation and in the long term to struggle for global social equality. Key words: Social security...

  19. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  20. Immersive volume rendering of blood vessels

    Science.gov (United States)

    Long, Gregory; Kim, Han Suk; Marsden, Alison; Bazilevs, Yuri; Schulze, Jürgen P.

    2012-03-01

    In this paper, we present a novel method of visualizing flow in blood vessels. Our approach reads unstructured tetrahedral data, resamples it, and uses slice based 3D texture volume rendering. Due to the sparse structure of blood vessels, we utilize an octree to efficiently store the resampled data by discarding empty regions of the volume. We use animation to convey time series data, wireframe surface to give structure, and utilize the StarCAVE, a 3D virtual reality environment, to add a fully immersive element to the visualization. Our tool has great value in interdisciplinary work, helping scientists collaborate with clinicians, by improving the understanding of blood flow simulations. Full immersion in the flow field allows for a more intuitive understanding of the flow phenomena, and can be a great help to medical experts for treatment planning.

  1. TMI-2 reactor vessel head removal

    Energy Technology Data Exchange (ETDEWEB)

    Bengel, P.R.; Smith, M.D.; Estabrook, G.A.

    1985-09-01

    This report describes the safe removal and storage of the Three Mile Island Unit 2 (TMI-2) reactor vessel head. The head was removed in July 1984 to permit the removal of the plenum and the reactor core, which were damaged during the 1979 accident. From July 1982, plans and preparations were made using a standard head removal procedure modified by the necessary precautions and changes to account for conditions caused by the accident. After data acquisition, equipment and structure modifications, and training, the head was safely removed and stored; and the internals indexing fixture and a work platform were installed on top of the vessel. Dose rates during and after the operation were lower than expected; lessons were learned from the operation which will be applied to the continuing fuel removal operations activities.

  2. TMI-2 reactor vessel head removal

    Energy Technology Data Exchange (ETDEWEB)

    Bengel, P.R.; Smith, M.D.; Estabrook, G.A.

    1984-12-01

    This report describes the safe removal and storage of the Three Mile Island Unit 2 reactor vessel head. The head was removed in July 1984 to permit the removal of the plenum and the reactor core, which were damaged during the 1979 accident. From July 1982, plans and preparations were made using a standard head removal procedure modified by the necessary precautions and changes to account for conditions caused by the accident. After data acquisition, equipment and structure modifications, and training the head was safely removed and stored and the internals indexing fixture and a work platform were installed on top of the vessel. Dose rates during and after the operation were lower than expected; lessons were learned from the operation which will be applied to the continuing fuel removal operations activities.

  3. 46 CFR 289.2 - Vessels included.

    Science.gov (United States)

    2010-10-01

    ... CONSTRUCTION-DIFFERENTIAL SUBSIDY VESSELS, OPERATING-DIFFERENTIAL SUBSIDY VESSELS AND OF VESSELS SOLD OR ADJUSTED UNDER THE MERCHANT SHIP SALES ACT 1946 § 289.2 Vessels included. Vessels subject to the provisions of this part are: (a) All vessels which may in the future be constructed or sold with construction...

  4. FY 2015 - Stockpile Stewardship and Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2014-04-01

    This Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) Fiscal Year Stockpile Stewardship and Management Plan (SSMP) is a key planning document for the nuclear security enterprise.

  5. FY 2016 - Stockpile Stewardship and Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2015-03-01

    This Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) Fiscal Year Stockpile Stewardship and Management Plan (SSMP) is a key planning document for the nuclear security enterprise.

  6. Blood flow reprograms lymphatic vessels to blood vessels.

    Science.gov (United States)

    Chen, Chiu-Yu; Bertozzi, Cara; Zou, Zhiying; Yuan, Lijun; Lee, John S; Lu, MinMin; Stachelek, Stan J; Srinivasan, Sathish; Guo, Lili; Vicente, Andres; Vincente, Andres; Mericko, Patricia; Levy, Robert J; Makinen, Taija; Oliver, Guillermo; Kahn, Mark L

    2012-06-01

    Human vascular malformations cause disease as a result of changes in blood flow and vascular hemodynamic forces. Although the genetic mutations that underlie the formation of many human vascular malformations are known, the extent to which abnormal blood flow can subsequently influence the vascular genetic program and natural history is not. Loss of the SH2 domain-containing leukocyte protein of 76 kDa (SLP76) resulted in a vascular malformation that directed blood flow through mesenteric lymphatic vessels after birth in mice. Mesenteric vessels in the position of the congenital lymphatic in mature Slp76-null mice lacked lymphatic identity and expressed a marker of blood vessel identity. Genetic lineage tracing demonstrated that this change in vessel identity was the result of lymphatic endothelial cell reprogramming rather than replacement by blood endothelial cells. Exposure of lymphatic vessels to blood in the absence of significant flow did not alter vessel identity in vivo, but lymphatic endothelial cells exposed to similar levels of shear stress ex vivo rapidly lost expression of PROX1, a lymphatic fate-specifying transcription factor. These findings reveal that blood flow can convert lymphatic vessels to blood vessels, demonstrating that hemodynamic forces may reprogram endothelial and vessel identity in cardiovascular diseases associated with abnormal flow.

  7. Efficient Vessel Tracking  with Accuracy Guarantees

    DEFF Research Database (Denmark)

    Redoutey, Martin; Scotti, Eric; Jensen, Christian Søndergaard

    2008-01-01

    Safety and security are top concerns in maritime navigation, particularly as maritime traffic continues to grow and as crew sizes are reduced. The Automatic Identification System (AIS) plays a key role in regard to these concerns. This system, whose objective is in part to identify and locate ves...... accuracies at lower communication costs. The techniques employ movement predictions that are shared between vessels and the VTS. Empirical studies with a prototype implementation and real vessel data demonstrate that the techniques are capable of significantly improving the AIS....

  8. The vessel fluence; Fluence cuve

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This book presents the proceedings of the technical meeting on the reactors vessels fluence. They are grouped in eight sessions: the industrial context and the stakes of the vessels control; the organization and the methodology for the fluence computation; the concerned physical properties; the reference computation methods; the fluence monitoring in an industrial context; vessels monitoring under irradiation; others methods in the world; the research and development programs. (A.L.B.)

  9. 49 CFR 193.2715 - Training: security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Training: security. 193.2715 Section 193.2715...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2715 Training: security. (a) Personnel responsible for security at an LNG plant must be trained in accordance with a written plan of...

  10. [Large vessel vasculitides].

    Science.gov (United States)

    Morović-Vergles, Jadranka; Puksić, Silva; Gracanin, Ana Gudelj

    2013-01-01

    Large vessel vasculitis includes Giant cell arteritis and Takayasu arteritis. Giant cell arteritis is the most common form of vasculitis affect patients aged 50 years or over. The diagnosis should be considered in older patients who present with new onset of headache, visual disturbance, polymyalgia rheumatica and/or fever unknown cause. Glucocorticoides remain the cornerstone of therapy. Takayasu arteritis is a chronic panarteritis of the aorta ant its major branches presenting commonly in young ages. Although all large arteries can be affected, the aorta, subclavian and carotid arteries are most commonly involved. The most common symptoms included upper extremity claudication, hypertension, pain over the carotid arteries (carotidynia), dizziness and visual disturbances. Early diagnosis and treatment has improved the outcome in patients with TA.

  11. Vessel segmentation in screening mammograms

    Science.gov (United States)

    Mordang, J. J.; Karssemeijer, N.

    2015-03-01

    Blood vessels are a major cause of false positives in computer aided detection systems for the detection of breast cancer. Therefore, the purpose of this study is to construct a framework for the segmentation of blood vessels in screening mammograms. The proposed framework is based on supervised learning using a cascade classifier. This cascade classifier consists of several stages where in each stage a GentleBoost classifier is trained on Haar-like features. A total of 30 cases were included in this study. In each image, vessel pixels were annotated by selecting pixels on the centerline of the vessel, control samples were taken by annotating a region without any visible vascular structures. This resulted in a total of 31,000 pixels marked as vascular and over 4 million control pixels. After training, the classifier assigns a vesselness likelihood to the pixels. The proposed framework was compared to three other vessel enhancing methods, i) a vesselness filter, ii) a gaussian derivative filter, and iii) a tubeness filter. The methods were compared in terms of area under the receiver operating characteristics curves, the Az values. The Az value of the cascade approach is 0:85. This is superior to the vesselness, Gaussian, and tubeness methods, with Az values of 0:77, 0:81, and 0:78, respectively. From these results, it can be concluded that our proposed framework is a promising method for the detection of vessels in screening mammograms.

  12. Americium behaviour in plastic vessels

    Energy Technology Data Exchange (ETDEWEB)

    Legarda, F.; Herranz, M. [Departamento de Ingenieria Nuclear y Mecanica de Fluidos, Escuela Tecnica Superior de Ingenieria de Bilbao, Universidad del Pais Vasco (UPV/EHU), Alameda de Urquijo s/n, 48013 Bilbao (Spain); Idoeta, R., E-mail: raquel.idoeta@ehu.e [Departamento de Ingenieria Nuclear y Mecanica de Fluidos, Escuela Tecnica Superior de Ingenieria de Bilbao, Universidad del Pais Vasco (UPV/EHU), Alameda de Urquijo s/n, 48013 Bilbao (Spain); Abelairas, A. [Departamento de Ingenieria Nuclear y Mecanica de Fluidos, Escuela Tecnica Superior de Ingenieria de Bilbao, Universidad del Pais Vasco (UPV/EHU), Alameda de Urquijo s/n, 48013 Bilbao (Spain)

    2010-07-15

    The adsorption of {sup 241}Am dissolved in water in different plastic storage vessels was determined. Three different plastics were investigated with natural and distilled waters and the retention of {sup 241}Am by these plastics was studied. The same was done by varying vessel agitation time, vessel agitation speed, surface/volume ratio of water in the vessels and water pH. Adsorptions were measured to be between 0% and 70%. The adsorption of {sup 241}Am is minimized with no water agitation, with PET or PVC plastics, and by water acidification.

  13. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  14. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  15. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  16. 46 CFR 287.9 - Valuation of securities in fund.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 8 2010-10-01 2010-10-01 false Valuation of securities in fund. 287.9 Section 287.9 Shipping MARITIME ADMINISTRATION, DEPARTMENT OF TRANSPORTATION REGULATIONS AFFECTING SUBSIDIZED VESSELS AND... finance the construction or acquisition of new vessels which are deposited in the construction reserve...

  17. Transportation planning for planned special events

    Science.gov (United States)

    2011-05-01

    Unique among planned special event activities are those events that carry the National Special Security Event (NSSE) designation. NSSEs occur with some frequency, with 35 of these events held between September 1998 and February 2010. These events inc...

  18. Strategic Planning for Comprehensive Security in the European Union’s Military Operations: EUFOR RD Congo, EUFOR Tchad/RCA, and EUNAVFOR Somalia

    Science.gov (United States)

    2010-06-01

    administration. In this regard, private suppliers and the market cannot substitute for the state. The GPG are essentially comprised of physical...European Security and Defence Policy: An Implementation Perspective,” Journal of Common Market Studies 46, no. 4 (2008), 900; Gunther Hauser and...Chad Conflict, United Nations (MINURCAT) and the European Union (EUFOR) (Madrid: Real Instituto Elcano de Estudios Internacionales y Estrategicos, 2008

  19. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  20. 50 CFR 648.8 - Vessel identification.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Vessel identification. 648.8 Section 648.8... identification. (a) Vessel name and official number. Each fishing vessel subject to this part and over 25 ft (7.6... or ocean quahog vessels licensed under New Jersey law may use the appropriate vessel identification...

  1. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  2. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  3. 2D Fast Vessel Visualization Using a Vessel Wall Mask Guiding Fine Vessel Detection

    Directory of Open Access Journals (Sweden)

    Sotirios Raptis

    2010-01-01

    and then try to approach the ridges and branches of the vasculature's using fine detection. Fine vessel screening looks into local structural inconsistencies in vessels properties, into noise, or into not expected intensity variations observed inside pre-known vessel-body areas. The vessels are first modelled sufficiently but not precisely by their walls with a tubular model-structure that is the result of an initial segmentation. This provides a chart of likely Vessel Wall Pixels (VWPs yielding a form of a likelihood vessel map mainly based on gradient filter's intensity and spatial arrangement parameters (e.g., linear consistency. Specific vessel parameters (centerline, width, location, fall-away rate, main orientation are post-computed by convolving the image with a set of pre-tuned spatial filters called Matched Filters (MFs. These are easily computed as Gaussian-like 2D forms that use a limited range sub-optimal parameters adjusted to the dominant vessel characteristics obtained by Spatial Grey Level Difference statistics limiting the range of search into vessel widths of 16, 32, and 64 pixels. Sparse pixels are effectively eliminated by applying a limited range Hough Transform (HT or region growing. Major benefits are limiting the range of parameters, reducing the search-space for post-convolution to only masked regions, representing almost 2% of the 2D volume, good speed versus accuracy/time trade-off. Results show the potentials of our approach in terms of time for detection ROC analysis and accuracy of vessel pixel (VP detection.

  4. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  5. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  6. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  7. 46 CFR 176.665 - Notice and plans required.

    Science.gov (United States)

    2010-10-01

    ... limited to, changing a propeller, painting, or cleaning the hull, no report need be made to the cognizant... plans showing the vessel's scantlings available to the Coast Guard marine inspector whenever the vessel...

  8. 46 CFR 115.665 - Notice and plans required.

    Science.gov (United States)

    2010-10-01

    ... limited to, changing a propeller, painting, or cleaning the hull, no report need be made to the cognizant... plans showing the vessel's scantlings available to the Coast Guard marine inspector whenever the vessel...

  9. BY FRUSTUM CONFINING VESSEL

    Directory of Open Access Journals (Sweden)

    Javad Khazaei

    2016-09-01

    Full Text Available Helical piles are environmentally friendly and economical deep foundations that, due to environmental considerations, are excellent additions to a variety of deep foundation alternatives available to the practitioner. Helical piles performance depends on soil properties, the pile geometry and soil-pile interaction. Helical piles can be a proper alternative in sensitive environmental sites if their bearing capacity is sufficient to support applied loads. The failure capacity of helical piles in this study was measured via an experimental research program that was carried out by Frustum Confining Vessel (FCV. FCV is a frustum chamber by approximately linear increase in vertical and lateral stresses along depth from top to bottom. Due to special geometry and applied bottom pressure, this apparatus is a proper choice to test small model piles which can simulate field stress conditions. Small scale helical piles are made with either single helix or more helixes and installed in fine grained sand with three various densities. Axial loading tests including compression and tension tests were performed to achieve pile ultimate capacity. The results indicate the helical piles behavior depends essentially on pile geometric characteristics, i.e. helix configuration and soil properties. According to the achievements, axial uplift capacity of helical model piles is about equal to usual steel model piles that have the helixes diameter. Helical pile compression bearing capacity is too sufficient to act as a medium pile, thus it can be substituted other piles in special geoenvironmental conditions. The bearing capacity also depends on spacing ratio, S/D, and helixes diameter.

  10. Southeast Region Headboat Survey-Vessel list/Vessel Directory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This is a database of vessels that have been on the SRHS through time, their owners/operators, marinas/docks and their contact information. This assists in...

  11. Xingu Project - Integrating Land Use Planning and Water Governance in Amazonia: Towards Improved Freshwater Security in the Agricultural Frontier of Mato Grosso.

    Science.gov (United States)

    Krusche, A. V.; Ballester, M. V.; Neill, C.; Elsenbeer, H.; Johnson, M. S.; Coe, M. T.; Garavello, M.; Molina, S. G.; Empinotti, V.; Reichardt, F.; Deegan, L.; Harris, L.

    2014-12-01

    The main goal of this project is to identify how impacts from land conversion, cropland expansion and intensification of both crop and animal production interact to affect regional evapotranspiration, rainfall generation, river flooding, and water quality and stream habitats, allowing us to identify thresholds of change that will endanger agricultural production, livelihoods of non-agricultural settlers and the region's new urban population and infrastructure. We will survey the effects of this on (1) soybean farmers, (2) cattle ranchers, (3) small-scale farm families, (4) rural non-agriculturists, including fishers, and (5) urban residents and map their roles as stakeholders. We will also conduct current water use surveys among the different stakeholder groups, accompanied by questions on desired aspects for future freshwater security to identify targets for desirable outcomes of water governance strategies. These targets, together with the information on land use drivers, water quantity and quality and predicted scenarios for global changes will be incorporated into a fully integrated and interactive geospatially oriented socio-ecological model that can serve as framework for future water governance that enhances Freshwater Security in such systems. This is an international cooperation initiative lead by Brazil and with the participation of Canada, Germany and United States of America.

  12. 78 FR 40436 - Proposed Information Collection; Comment Request; Mandatory Shrimp Vessel and Gear...

    Science.gov (United States)

    2013-07-05

    ... Shrimp Vessel and Gear Characterization Survey AGENCY: National Oceanic and Atmospheric Administration... Shrimp Fishery Management Plan (FMP). The regulations for the Gulf Shrimp Vessel and Gear... Gear Characterization Form. The form will be provided by NMFS at the time of permit application and...

  13. 8 CFR 252.3 - Great Lakes vessels and tugboats arriving in the United States from Canada; special procedures.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Great Lakes vessels and tugboats arriving... DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS LANDING OF ALIEN CREWMEN § 252.3 Great Lakes vessels... and tugboats. An immigration examination shall not be required of any crewman aboard a Great Lakes...

  14. 46 CFR 171.124 - Watertight integrity above the margin line in a vessel less than 100 gross tons.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Watertight integrity above the margin line in a vessel less than 100 gross tons. 171.124 Section 171.124 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... Integrity Above the Margin Line § 171.124 Watertight integrity above the margin line in a vessel less than...

  15. Energy and national security.

    Energy Technology Data Exchange (ETDEWEB)

    Karas, Thomas H.

    2003-09-01

    On May 19 and 20, 2003, thirty-some members of Sandia staff and management met to discuss the long-term connections between energy and national security. Three broad security topics were explored: I. Global and U.S. economic dependence on oil (and gas); II. Potential security implications of global climate change; and III. Vulnerabilities of the U.S. domestic energy infrastructure. This report, rather than being a transcript of the workshop, represents a synthesis of background information used in the workshop, ideas that emerged in the discussions, and ex post facto analysis of the discussions. Each of the three subjects discussed at this workshop has significant U.S. national security implications. Each has substantial technology components. Each appears a legitimate area of concern for a national security laboratory with relevant technology capabilities. For the laboratory to play a meaningful role in contributing to solutions to national problems such as these, it needs to understand the political, economic, and social environments in which it expects its work to be accepted and used. In addition, it should be noted that the problems of oil dependency and climate change are not amenable to solution by the policies of any one nation--even the one that is currently the largest single energy consumer. Therefore, views, concerns, policies, and plans of other countries will do much to determine which solutions might work and which might not.

  16. Secure portal.

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing

  17. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  18. Security Studies

    OpenAIRE

    ,

    2005-01-01

    Security Studies has firmly established itself as a leading journal on international security issues. The journal publishes theoretical, historical and policy-oriented articles on the causes and consequences of war, and the sources and conditions of peace. The journal has published articles on balancing vs. bandwagoning, deterrence in enduring rivalries, the Domino theory, nuclear weapons proliferation, civil-military relations, political reforms in China, strategic culture in Asia and the P...

  19. Secure Directories

    OpenAIRE

    Chadwick, David W.

    2000-01-01

    This paper describes the mechanisms that are needed in order to provide a secure directory service based on the X.500 data model. A brief introduction to the X.500 data model is given followed by an overview of the Lightweight Directory Access Protocol. Security can be provided by three functions: an application level firewall, an authentication mechanism, and an access control scheme. A description of the X.500 and LDAP access control models is presented followed by the authentication method...

  20. 46 CFR 287.8 - Investment of funds in securities.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 8 2010-10-01 2010-10-01 false Investment of funds in securities. 287.8 Section 287.8 Shipping MARITIME ADMINISTRATION, DEPARTMENT OF TRANSPORTATION REGULATIONS AFFECTING SUBSIDIZED VESSELS AND... may be substituted for securities or commitment to finance in the fund, subject to the provisions of...

  1. 33 CFR 106.135 - Alternative Security Program.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Alternative Security Program. 106.135 Section 106.135 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... facility; (b) The OCS facility does not serve vessels on international voyages; and (c) The Alternative...

  2. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  3. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  4. Composite Vessels for Containment of Extreme Blast Loadings

    Energy Technology Data Exchange (ETDEWEB)

    Pastrnak, J; Henning, C; Grundler, W; Switzer, V; Hollaway, R; Morrison, J; Hagler, L; Kokko, E; Deteresa, S; Hathcoat, B; Dalder, E

    2004-07-15

    A worldwide trend for explosives testing has been to replace open-air detonations with containment vessels, especially when any hazardous materials are involved. As part of the National Nuclear Security Administration's (NNSA) effort to ensure the safety and reliability of the nation's nuclear stockpile, researchers at Lawrence Livermore National Laboratory have been developing a high performance filament wound composite firing vessel that is nearly radiographically transparent. It was intended to contain a limited number of detonations of metal cased explosive assemblies in radiographic facilities such as the Advanced Hydrodynamic Facility (AHF) being studied by Los Alamos National Laboratory. A 2-meter diameter pressure vessel was designed to contain up to 35 kg (80 lb) of TNT equivalent explosive without leakage. Over the past 5 years a total of three half-scale (1 meter diameter) vessels have been constructed, and two of them were tested to 150% load with 8.2 kg (18-pound) spheres of C4 explosive. The low density and high specific strength advantages used in this composite vessel design may have other additional applications such as transporting sensitive explosives that could otherwise be moved only in very small quantities. Also, it could be used for highly portable, explosive containment systems for law enforcement.

  5. Securing Retirement at a Young Age. Exploring the Intention to Buy Longevity Annuities through an Extended Version of the Theory of Planned Behavior

    OpenAIRE

    Costanza Nosi; Antonella D’Agostino; Margherita Pagliuca; Carlo Alberto Pratesi

    2017-01-01

    Since the early 90s, Italy has undergone radical changes in the regulations of the public pension system aimed at mending its main drawbacks and improving sustainability in the long run. The reforms were intended to recover the national economy through a significant reduction of benefits by increasing, particularly for younger people, individual responsibility for the accumulation of retirement wealth. Adopting an enhanced version of the Theory of Planned Behavior (TPB), which includes affect...

  6. 2013 East Coast Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  7. SC/OQ Vessel Database

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Data tables holding information for the Surf Clam/Ocean Quahog vessel and dealer/processor logbooks (negative and positive), as well as individual tag information...

  8. 2011 Great Lakes Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  9. 2011 West Coast Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  10. 2013 Great Lakes Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  11. 2011 East Coast Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  12. Integrin binding: Sticking around vessels

    Science.gov (United States)

    Blatchley, Michael R.; Gerecht, Sharon

    2017-09-01

    A study demonstrates that controlled integrin binding on a biomaterial was capable of promoting vascular cell sprouting and formation of a non-leaky blood vessel network in a healthy and diseased state.

  13. Transposition of the great vessels

    Science.gov (United States)

    ... vessel called the ductus arteriosus open, allowing some mixing of the 2 blood circulations. A procedure using ... they are not already immune. Eating well, avoiding alcohol, and controlling diabetes both before and during pregnancy ...

  14. 2013 West Coast Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  15. Vessel Permit System Data Set

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — GARFO issues federal fishing permits annually to owners of fishing vessels who fish in the Greater Atlantic region, as required by federal regulation. These permits...

  16. 2011 Tug Towing Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  17. Caribbean PR Logbook Survey (Vessels)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains catch (landed catch) and effort for fishing trips made by vessels fishing in Puerto Rico. The catch and effort data for the entire trip are...

  18. Coastal Discard Logbook Survey (Vessels)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains data on the type and amount of marine resources that are discarded or interacted with by vessels that are selected to report to the Southeast...

  19. Prosopomorphic vessels from Moesia Superior

    Directory of Open Access Journals (Sweden)

    Nikolić Snežana

    2008-01-01

    Full Text Available The prosopomorphic vessels from Moesia Superior had the form of beakers varying in outline but similar in size. They were wheel-thrown, mould-made or manufactured by using a combination of wheel-throwing and mould-made appliqués. Given that face vessels are considerably scarcer than other kinds of pottery, more than fifty finds from Moesia Superior make an enviable collection. In this and other provinces face vessels have been recovered from military camps, civilian settlements and necropolises, which suggests that they served more than one purpose. It is generally accepted that the faces-masks gave a protective role to the vessels, be it to protect the deceased or the family, their house and possessions. More than forty of all known finds from Moesia Superior come from Viminacium, a half of that number from necropolises. Although tangible evidence is lacking, there must have been several local workshops producing face vessels. The number and technological characteristics of the discovered vessels suggest that one of the workshops is likely to have been at Viminacium, an important pottery-making centre in the second and third centuries.

  20. Corrective Action Decision Document/Corrective Action Plan for the 92-Acre Area and Corrective Action Unit 111: Area 5 WMD Retired Mixed Waste Pits, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Restoration

    2010-11-22

    This Corrective Action Decision Document/Corrective Action Plan (CADD/CAP) has been prepared for the 92-Acre Area, the southeast quadrant of the Radioactive Waste Management Site, located in Area 5 of the Nevada National Security Site (NNSS). The 92-Acre Area includes Corrective Action Unit (CAU) 111, 'Area 5 WMD Retired Mixed Waste Pits.' Data Quality Objectives (DQOs) were developed for the 92-Acre Area, which includes CAU 111. The result of the DQO process was that the 92-Acre Area is sufficiently characterized to provide the input data necessary to evaluate corrective action alternatives (CAAs) without the collection of additional data. The DQOs are included as Appendix A of this document. This CADD/CAP identifies and provides the rationale for the recommended CAA for the 92-Acre Area, provides the plan for implementing the CAA, and details the post-closure plan. When approved, this CADD/CAP will supersede the existing Pit 3 (P03) Closure Plan, which was developed in accordance with Title 40 Code of Federal Regulations (CFR) Part 265, 'Interim Status Standards for Owners and Operators of Hazardous Waste Treatment, Storage, and Disposal Facilities.' This document will also serve as the Closure Plan and the Post-Closure Plan, which are required by 40 CFR 265, for the 92-Acre Area. After closure activities are complete, a request for the modification of the Resource Conservation and Recovery Act Permit that governs waste management activities at the NNSS will be submitted to the Nevada Division of Environmental Protection to incorporate the requirements for post-closure monitoring. Four CAAs, ranging from No Further Action to Clean Closure, were evaluated for the 92-Acre Area. The CAAs were evaluated on technical merit focusing on performance, reliability, feasibility, safety, and cost. Based on the evaluation of the data used to develop the conceptual site model; a review of past, current, and future operations at the site; and the detailed

  1. Energy audit and energy security

    Directory of Open Access Journals (Sweden)

    Beata Agnieszka Kulessa

    2013-07-01

    Full Text Available In article, we present the issue of energy security. This article to answer the questions concerning the future of energy in Poland. These activities are directly related to energy security and the reduction of CO2 emissions. One element of this plan is the introduction in the EU energy certification of buildings. The energy certificates in Poland launched on 01.01.2009 and implements the objectives adopted by the European Union and contribute to energy security, increasing energy efficiency in construction and environmental protection.

  2. Optimization of reactor pressure vessel internals segmentation in Korea

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Byung-Sik [Dankook Univ., Chungnam (Korea, Republic of). Dept. of Nuclear Engineering

    2017-11-15

    One of the most challenging tasks during plant decommissioning is the removal of highly radioactive internal components from the reactor pressure vessel (RPV). For RPV internals dismantling, it is essential that all activities are thoroughly planned and discussed in the early stage of the decommissioning project. One of the key activities in the detailed planning is to prepare the segmentation and packaging plan that describes the sequential steps required to segment, separate, and package each individual component of RPV, based on an activation analysis and component characterization study.

  3. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  4. Automated method for identification and artery-venous classification of vessel trees in retinal vessel networks.

    Directory of Open Access Journals (Sweden)

    Vinayak S Joshi

    Full Text Available The separation of the retinal vessel network into distinct arterial and venous vessel trees is of high interest. We propose an automated method for identification and separation of retinal vessel trees in a retinal color image by converting a vessel segmentation image into a vessel segment map and identifying the individual vessel trees by graph search. Orientation, width, and intensity of each vessel segment are utilized to find the optimal graph of vessel segments. The separated vessel trees are labeled as primary vessel or branches. We utilize the separated vessel trees for arterial-venous (AV classification, based on the color properties of the vessels in each tree graph. We applied our approach to a dataset of 50 fundus images from 50 subjects. The proposed method resulted in an accuracy of 91.44% correctly classified vessel pixels as either artery or vein. The accuracy of correctly classified major vessel segments was 96.42%.

  5. Securing Retirement at a Young Age. Exploring the Intention to Buy Longevity Annuities through an Extended Version of the Theory of Planned Behavior

    Directory of Open Access Journals (Sweden)

    Costanza Nosi

    2017-06-01

    Full Text Available Since the early 90s, Italy has undergone radical changes in the regulations of the public pension system aimed at mending its main drawbacks and improving sustainability in the long run. The reforms were intended to recover the national economy through a significant reduction of benefits by increasing, particularly for younger people, individual responsibility for the accumulation of retirement wealth. Adopting an enhanced version of the Theory of Planned Behavior (TPB, which includes affective reactions, the present paper aims to understand the factors influencing the intention to enroll in a private pension plan through the purchase of longevity annuity coverage on the part of young adults. A purposive sample of 7480 Italian people aged 25–35 participated in the survey. Collected data were analyzed adopting an ordinal logistic regression (OLR model. The findings confirm the predictive power of the TPB in the financial field of longevity annuity buying, show that anticipated affective reactions increase the predictive power of the TPB model, and reveal that the influence of the investigated constructs varies alongside people’s willingness to purchase. The outcomes provide useful recommendations to the policy maker and private companies to favor the adoption of wide-spread desired behaviors among citizenships.

  6. Remedial Investigation Work Plan for Chestnut Ridge Operable Unit 1 (Chestnut Ridge Security Pits) at the Oak Ridge Y-12 Plant, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    1994-03-01

    This document outlines the activities necessary to conduct a Remedial Investigation (RI) of the Chestnut Ridge Security Pits (CRSP) at the Oak Ridge Y-12 Plant. The CRSP, also designated Chestnut Ridge Operable Unit (OU) 1, is one of four OUs along Chestnut Ridge on the Oak Ridge Reservation (ORR). The purpose of the RI is to collect data to (1) evaluate the nature and extent of known and suspected contaminants, (2) support an Ecological Risk Assessment (ERA) and a Human Health Risk Assessment (HHRA), (3) support the feasibility study in the development and analysis of remedial alternatives, and (4) ultimately, develop a Record of Decision (ROD) for the site. This chapter summarizes the regulatory background of environmental investigation on the ORR and the approach currently being followed and provides an overview of the RI to be conducted at the CRSP. Subsequent chapters provide details on site history, sampling activities, procedures and methods, quality assurance (QA), health and safety, and waste management related to the RI.

  7. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe......, but while creation of defensive alliances appears unrealistic, new defence laws appearing 1909 show strong resolve to defend Denmark’s status as a neutral power. The Great War proves that these laws provided an adequate tool to be wielded by the politicians actually in office during that conflict. Following...... World War I it is not surprising that a salient feature of the defence debate is aversion against armed conflict. The Wilsonian agenda of a new system of collective security featuring prominently in the peace talks as well as in European debate generally does indeed have ramifications in Danish...

  8. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  9. 17 CFR 200.552 - NEPA planning.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false NEPA planning. 200.552 Section 200.552 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT... § 200.552 NEPA planning. Where it is reasonably foreseeable by the Commission that it may be required to...

  10. 50 CFR 697.8 - Vessel identification.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Vessel identification. 697.8 Section 697.8 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION....8 Vessel identification. (a) Vessel name and official number. Each fishing vessel issued a limited...

  11. Mechanosensing in developing lymphatic vessels.

    Science.gov (United States)

    Planas-Paz, Lara; Lammert, Eckhard

    2014-01-01

    The lymphatic vasculature is responsible for fluid homeostasis, transport of immune cells, inflammatory molecules, and dietary lipids. It is composed of a network of lymphatic capillaries that drain into collecting lymphatic vessels and ultimately bring fluid back to the blood circulation. Lymphatic endothelial cells (LECs) that line lymphatic capillaries present loose overlapping intercellular junctions and anchoring filaments that support fluid drainage. When interstitial fluid accumulates within tissues, the extracellular matrix (ECM) swells and pulls the anchoring filaments. This results in opening of the LEC junctions and permits interstitial fluid uptake. The absorbed fluid is then transported within collecting lymphatic vessels, which exhibit intraluminal valves that prevent lymph backflow and smooth muscle cells that sequentially contract to propel lymph.Mechanotransduction involves translation of mechanical stimuli into biological responses. LECs have been shown to sense and respond to changes in ECM stiffness, fluid pressure-induced cell stretch, and fluid flow-induced shear stress. How these signals influence LEC function and lymphatic vessel growth can be investigated by using different mechanotransduction assays in vitro and to some extent in vivo.In this chapter, we will focus on the mechanical forces that regulate lymphatic vessel expansion during embryonic development and possibly secondary lymphedema. In mouse embryos, it has been recently shown that the amount of interstitial fluid determines the extent of lymphatic vessel expansion via a mechanosensory complex formed by β1 integrin and vascular endothelial growth factor receptor-3 (VEGFR3). This model might as well apply to secondary lymphedema.

  12. Corrective Action Investigation Plan for Corrective Action Unit 568: Area 3 Plutonium Dispersion Sites Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick

    2014-01-01

    CAU 568 is a grouping of sites where there has been a suspected release of contamination associated with nuclear testing. This document describes the planned investigation of CAU 568, which comprises the following corrective action sites (CASs): • 03-23-17, S-3I Contamination Area • 03-23-19, T-3U Contamination Area • 03-23-20, Otero Contamination Area • 03-23-22, Platypus Contamination Area • 03-23-23, San Juan Contamination Area • 03-23-26, Shrew/Wolverine Contamination Area These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the investigation report.

  13. COMPUTER SECURITY AND SECURITY TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    Lazar Stošić

    2013-01-01

    Full Text Available With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information. A set of tools, procedures, policies and solutions to defend against attacks are collectively referred to as computer network security. It is necessary above all to define and learn about the concepts of attack, risk, threat, vulnerability and asset value. During the design and implementation of information systems should primarily take into account a set of measures to increase security and maintenance at an acceptable level of risk. In any case, there is a need to know the risks in the information system. Sources of potential security problems are challenges and attacks, while the risk relates to the probable outcome and its associated costs due to occurrence of certain events. There are numerous techniques help protect your computer: cryptography, authentication, checked the software, licenses and certificates, valid authorization... This paper explains some of the procedures and potential threats to break into the network and computers as well as potential programs that are used. Guidance and explanation of these programs is not to cause a break-in at someone else's computer, but to highlight the vulnerability of the computer's capabilities.

  14. 77 FR 10960 - Security Zone, East River and Bronx Kill; Randalls and Wards Islands, NY

    Science.gov (United States)

    2012-02-24

    ... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA87 Security Zone, East River and Bronx Kill; Randalls and... establishing a temporary security zone on the waters of the East River and Bronx Kill, in the vicinity of... is intended to restrict vessels from a portion of the East River and Bronx Kill when public officials...

  15. [Aspirations of medical students: "planning for a secure career" - results of an online-survey among students at five medical schools in Germany].

    Science.gov (United States)

    Götz, K; Miksch, A; Hermann, K; Loh, A; Kiolbassa, K; Joos, S; Steinhäuser, J

    2011-02-01

    In times of shortage of doctors, expectations and interests of the future generation of doctors towards their career aspiration is of major importance. The aim of this study was to analyze expectations of medical students at the five medical schools in the State of Baden-Wuerttemberg (Germany) concerning their career choice and factors influencing it. Between January and February 2010, 1299 medical students (out of 12 062 medical students at the five medical schools) participated in an online-survey. In addition to sociodemographic items, career choice and aspects of planning reliability were raised. Three quarters of the students assign a medical profession for their future occupation. There is a dominance of internal medicine (n = 152), gynaecology (n = 127), paediatrics (n = 125), surgery (n = 115), anaesthesiology (n = 101), and family medicine (n = 88). The time point of decision varies between the different undergraduate years of medical school and specialty. Students at the beginning of their studies seem to be interested mostly in surgery. During medical school the interests towards internal medicine grows. Regarding planning dependability important aspects for medical students were to work in a job that has a future (61.2 % fully agree), to have a safe job (57.7 %), and to have a safe income (57.1 %). Less important seems to be to have good opportunity to earn money (29.6 %). Interest in a certain specialty changes markedly at during medical school. Factors such as economical guarantee, good future prospects and also the studies itself have an essential impact for students on choosing a specific career. Strategies to face physicians' shortage in different specialties need to be close to the needs and expectations of future physicians. This is not only valid for the undergraduate time period but also for the work circumstances of their future. © Georg Thieme Verlag KG Stuttgart · New York.

  16. Corrective Action Decision Document/Corrective Action Plan for Corrective Action Unit 573: Alpha Contaminated Sites Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick [Nevada Site Office, Las Vegas, NV (United States)

    2016-02-01

    CAU 573 comprises the following corrective action sites (CASs): • 05-23-02, GMX Alpha Contaminated Area • 05-45-01, Atmospheric Test Site - Hamilton These two CASs include the release at the Hamilton weapons-related tower test and a series of 29 atmospheric experiments conducted at GMX. The two CASs are located in two distinctly separate areas within Area 5. To facilitate site investigation and data quality objective (DQO) decisions, all identified releases (i.e., CAS components) were organized into study groups. The reporting of investigation results and the evaluation of DQO decisions are at the release level. The corrective action alternatives (CAAs) were evaluated at the FFACO CAS level. The purpose of this CADD/CAP is to evaluate potential CAAs, provide the rationale for the selection of recommended CAAs, and provide the plan for implementation of the recommended CAA for CAU 573. Corrective action investigation (CAI) activities were performed from January 2015 through November 2015, as set forth in the CAU 573 Corrective Action Investigation Plan (CAIP). Analytes detected during the CAI were evaluated against appropriate final action levels (FALs) to identify the contaminants of concern. Assessment of the data generated from investigation activities conducted at CAU 573 revealed the following: • Radiological contamination within CAU 573 does not exceed the FALs (based on the Occasional Use Area exposure scenario). • Chemical contamination within CAU 573 does not exceed the FALs. • Potential source material—including lead plates, lead bricks, and lead-shielded cables—was removed during the investigation and requires no additional corrective action.

  17. Corrective Action Decision Document/Corrective Action Plan for Corrective Action Unit 104: Area 7 Yucca Flat Atmospheric Test Sites Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2012-10-01

    CAU 104 comprises the following corrective action sites (CASs): • 07-23-03, Atmospheric Test Site T-7C • 07-23-04, Atmospheric Test Site T7-1 • 07-23-05, Atmospheric Test Site • 07-23-06, Atmospheric Test Site T7-5a • 07-23-07, Atmospheric Test Site - Dog (T-S) • 07-23-08, Atmospheric Test Site - Baker (T-S) • 07-23-09, Atmospheric Test Site - Charlie (T-S) • 07-23-10, Atmospheric Test Site - Dixie • 07-23-11, Atmospheric Test Site - Dixie • 07-23-12, Atmospheric Test Site - Charlie (Bus) • 07-23-13, Atmospheric Test Site - Baker (Buster) • 07-23-14, Atmospheric Test Site - Ruth • 07-23-15, Atmospheric Test Site T7-4 • 07-23-16, Atmospheric Test Site B7-b • 07-23-17, Atmospheric Test Site - Climax These 15 CASs include releases from 30 atmospheric tests conducted in the approximately 1 square mile of CAU 104. Because releases associated with the CASs included in this CAU overlap and are not separate and distinguishable, these CASs are addressed jointly at the CAU level. The purpose of this CADD/CAP is to evaluate potential corrective action alternatives (CAAs), provide the rationale for the selection of recommended CAAs, and provide the plan for implementation of the recommended CAA for CAU 104. Corrective action investigation (CAI) activities were performed from October 4, 2011, through May 3, 2012, as set forth in the CAU 104 Corrective Action Investigation Plan.

  18. Corrective Action Investigation Plan for Corrective Action Unit 569: Area 3 Yucca Flat Atmospheric Test Sites Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews; Christy Sloop

    2012-02-01

    Corrective Action Unit (CAU) 569 is located in Area 3 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. Corrective Action Unit 569 comprises the nine numbered corrective action sites (CASs) and one newly identified site listed below: (1) 03-23-09, T-3 Contamination Area (hereafter referred to as Annie, Franklin, George, and Moth); (2) 03-23-10, T-3A Contamination Area (hereafter referred to as Harry and Hornet); (3) 03-23-11, T-3B Contamination Area (hereafter referred to as Fizeau); (4) 03-23-12, T-3S Contamination Area (hereafter referred to as Rio Arriba); (5) 03-23-13, T-3T Contamination Area (hereafter referred to as Catron); (6) 03-23-14, T-3V Contamination Area (hereafter referred to as Humboldt); (7) 03-23-15, S-3G Contamination Area (hereafter referred to as Coulomb-B); (8) 03-23-16, S-3H Contamination Area (hereafter referred to as Coulomb-A); (9) 03-23-21, Pike Contamination Area (hereafter referred to as Pike); and (10) Waste Consolidation Site 3A. Because CAU 569 is a complicated site containing many types of releases, it was agreed during the data quality objectives (DQO) process that these sites will be grouped. These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each study group. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the DQOs developed on September 26, 2011, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO

  19. Secure Ties

    NARCIS (Netherlands)

    Joep de Hart; Frans Knol; Cora Maas - de Waal; Theo Roes

    2002-01-01

    Original title: Zekere banden. Discussions about the Netherlands of today often throw up terms such as 'social cohesion', 'social integration', 'liveability' and 'security'. The Netherlands Institute for Social Research/SCP has carried out a study of this phenomenon and presents the results in

  20. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  1. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  2. Grounding Damage to Conventional Vessels

    DEFF Research Database (Denmark)

    Lützen, Marie; Simonsen, Bo Cerup

    2003-01-01

    regulations for design of bottom compartment layout with regard to grounding damages are largely based on statistical damage data. New and updated damage statistics holding 930 grounding accident records has been investigated. The bottom damage statistics is compared to current regulations for the bottom......The present paper is concerned with rational design of conventional vessels with regard to bottom damage generated in grounding accidents. The aim of the work described here is to improve the design basis, primarily through analysis of new statistical data for grounding damage. The current...... for the relation between the amount of deformed structure and the energy absorption. Finally, the paper shows how damage statistics for existing, conventional vessels can be used together with theoretical prediction methods for determining grounding damage distributions for new vessel types not included...

  3. 19 CFR 4.5 - Government vessels.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Government vessels. 4.5 Section 4.5 Customs Duties... VESSELS IN FOREIGN AND DOMESTIC TRADES Arrival and Entry of Vessels § 4.5 Government vessels. (a) No... that is the property of, the U.S. Department of Defense (DoD) will be treated as a Government vessel...

  4. FY 2014 - Stockpile and Stewardship and Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-06-01

    This Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) Fiscal Year Stockpile Stewardship and Management Plan (SSMP) is a key planning document for the nuclear security enterprise.

  5. [Pulmonary blood vessels in goats].

    Science.gov (United States)

    Roos, H; Hegner, K; Vollmerhaus, B

    1999-05-01

    The blood vessels in the lung of the goat, which until now have received little attention, are described in detail for the first time. With regard to the segments of the lung, blood vessels are bronchovascular units in the lobi craniales, lobus medius and lobus accessorius, but bronchoartery units in the lobi caudales. We investigated the types of branches of the Aa. pulmonales dextra et sinistra, the inter- and intraspecific principles of the outlet of the pulmonary veins and the importance of bronchopulmonary segmentation of the lungs.

  6. Year 2000 Conversion Within the Defense Security Service

    National Research Council Canada - National Science Library

    1999-01-01

    .... Our objective was to determine whether the Defense Security Service effectively planned, executed, and coordinated year 2000 management strategies to ensure that year 2000 related issues would...

  7. Biosecurity Plan for Palmyra Atoll

    Science.gov (United States)

    Hathaway, Stacie A.; Fisher, Robert N.

    2010-01-01

    extent and impacts of these and other non-native and (or) invasive species are not fully understood, they are clearly a threat to the native species and overall ecosystem integrity of Palmyra Atoll. In fact, non-native invasive species have been considered the most important threat to ecosystems in Hawai`i and the second most important threat to biodiversity world-wide. Palmyra Atoll is somewhat protected because of its remote location, but there are still potential pathways for the introduction of non-native and possibly invasive species. With the continued influx of aircraft and ocean vessels and their contents to and around Palmyra Atoll, we anticipate many more concerns related to the import and spread of non-native invasive species in the future. In terms of ecosystem security, prevention is the most effective and efficient tool for managing invasive species. There are various potential pathways for introduction and spread of non-native species within Palmyra Atoll's terrestrial and marine ecosystems. Identification of these pathways provides a first step in preventing introductions. We also recommend establishing, enhancing, and enforcing quarantine protocols to prevent future non-native species invasions. Other critical steps to minimize the impacts and spread of invasive species include early detection through inventory and monitoring, as well as containment, control, and management of non-native species already established at Palmyra Atoll. These efforts in combination with research and education will serve to inform management decisions related to ecosystem integrity. Along with reinstating ecosystem security, this Biosecurity Plan aims to evaluate new risk factors related to non-native and potentially invasive species. To that end, an adaptive management process of audit and review is highly recommended to ensure the implementation and efficacy of the management practices outlined above. In addition, it will be important to identify high r

  8. Corrective Action Investigation Plan for Corrective Action Unit 106: Areas 5, 11 Frenchman Flat Atmospheric Sites, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2011-07-01

    Corrective Action Unit 106 comprises the four corrective action sites (CASs) listed below: • 05-20-02, Evaporation Pond • 05-23-05, Atmospheric Test Site - Able • 05-45-04, 306 GZ Rad Contaminated Area • 05-45-05, 307 GZ Rad Contaminated Area These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed on January 19, 2010, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 106. The presence and nature of contamination at CAU 106 will be evaluated based on information collected from a field investigation. The CAU includes land areas impacted by the release of radionuclides from groundwater pumping during the Radionuclide Migration study program (CAS 05-20-02), a weapons-related airdrop test (CAS 05-23-05), and unknown support activities at two sites (CAS 05-45-04 and CAS 05-45-05). The presence and nature of contamination from surface-deposited radiological contamination from CAS 05-23-05, Atmospheric Test Site - Able, and other types of releases (such as migration and excavation as well as any potential releases discovered during the investigation) from the remaining three CASs will be evaluated using soil samples collected from the locations

  9. Opinions about Component Energetic Security

    OpenAIRE

    Elena GOLUMBEANU (GEORGESCU)

    2012-01-01

    Collective security (international) represent the morphological expression of individual security components. According to the Report presented at the United Nations Development Programme, collective security (international) as well as national security, is the expression of seven synergistic dimensions as follows: economic security, food security, environmental security, personal security, community security, political security and individual security. As part of economic security, energy an...

  10. Securing Blue Wealth: The Need for a Special Sustainable Development Goal for the Ocean and Coasts and for Future Ocean Spatial Planning

    Science.gov (United States)

    Rickels, W.; Visbeck, M.; Kronfeld-Goharani, U.; Neumann, B.; Schmidt, J.; van Doorn, E.; Matz-Lück, N.; Ott, K.; Quaas, M.

    2013-12-01

    The ocean regulates the global climate, provides humans with natural resources such as food, materials, important substances, and energy, and is essential for international trade and recreational and cultural activities. Together with human development and economic growth, free access to, and availability of, ocean resources and services have exerted strong pressure on marine systems, ranging from overfishing, increasing resource extraction, and alteration of coastal zones to various types of thoughtless pollution. International cooperation and effective governance are required to protect the marine environment and promote the sustainable use of marine resources in such a way that due account can be taken of the environmental values of current generations and the needs of future generations. For this purpose, developing and agreeing on to devote one of the Sustainable Development Goal (SDG) specifically to the Ocean and Coasts could prove to be an essential element. The new SDGs will build upon the Millennium Development Goals (MDGs) and replace them by 2015. Ensuring environmental sustainability in a general sense is one of the eight MDGs, but the ocean is not explicitly addressed. Furthermore, the creation of a comprehensive underlying set of ocean sustainability targets and effective indicators would help in assessing the current status of marine systems, diagnosing ongoing trends, and providing information for inclusive, forward-looking, and sustainable ocean governance. To achieve this, we propose to establish a global Future Ocean Spatial Planning (FOSP) process.

  11. Strategy to Enhance International Supply Chain Security

    National Research Council Canada - National Science Library

    2007-01-01

    .... at 1901, 1903, October 13, 2006) which require the development of a strategic plan to enhance the security of the international supply chain, including protocols for the expeditious resumption of the flow of trade following...

  12. 7 CFR 331.11 - Security.

    Science.gov (United States)

    2010-01-01

    ... access, theft, loss, or release. (b) The security plan must be designed according to a site-specific risk... approved individual; (3) Provide for the control of select agents and toxins by requiring freezers...

  13. 75 FR 26270 - Environmental Planning and Historic Preservation Compliance Costs Policy; Environmental Planning...

    Science.gov (United States)

    2010-05-11

    ... SECURITY Federal Emergency Management Agency Environmental Planning and Historic Preservation Compliance Costs Policy; Environmental Planning and Historic Preservation Mitigation Policy AGENCY: Federal... Emergency Management Agency (FEMA) is accepting comments on a draft Environmental Planning and Historic...

  14. DoD Industrial Security Program

    Science.gov (United States)

    1985-12-01

    case, the protective marking to be used wll be: Classification determination pending. Protect as though classified (CONFIDENTIAL. SCRET , or TOP SECRET...Communications Security CONUS Continental United States COR Central Office of Record COSMIC- TOP SECRET Property of NATO and Subject to Special Security...SlOP Single Integrated Operational Plan SFF Standard Practice Procedure(s) SSS Signature Security Service TO Transportation Officer (TS) TOP SECRET

  15. Empowering women through food security

    International Development Research Centre (IDRC) Digital Library (Canada)

    Prabha Sethuraman

    30 avr. 2015 ... implementation of public policies in South Asia. Patel remarked that it is time to plan public policy with the vision that extends beyond cooperation in trade and investment to that of regional security, anti-terrorism, capacity building, and people-to-people linkages through films, sports, and the cultural industry ...

  16. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  17. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  18. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  19. 7 CFR 764.355 - Security requirements.

    Science.gov (United States)

    2010-01-01

    ... through the use of marketing contracts, hedging, options, or other revenue protection mechanisms, and includes a marketing plan or similar risk management practice; (3) The applicant has had positive net cash... applicant has pledged as security for the loan all available personal and business security, except as...

  20. Corrective Action Decision Document/Corrective Action Plan for Corrective Action Unit 98: Frenchman Flat, Nevada National Security Site, Nevada, Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Irene Farnham and Sam Marutzky

    2011-07-01

    This CADD/CAP follows the Corrective Action Investigation (CAI) stage, which results in development of a set of contaminant boundary forecasts produced from groundwater flow and contaminant transport modeling of the Frenchman Flat CAU. The Frenchman Flat CAU is located in the southeastern portion of the NNSS and comprises 10 underground nuclear tests. The tests were conducted between 1965 and 1971 and resulted in the release of radionuclides in the subsurface in the vicinity of the test cavities. Two important aspects of the corrective action process are presented within this CADD/CAP. The CADD portion describes the results of the Frenchman Flat CAU data-collection and modeling activities completed during the CAI stage. The corrective action objectives and the actions recommended to meet the objectives are also described. The CAP portion describes the corrective action implementation plan. The CAP begins with the presentation of CAU regulatory boundary objectives and initial use restriction boundaries that are identified and negotiated by NNSA/NSO and the Nevada Division of Environmental Protection (NDEP). The CAP also presents the model evaluation process designed to build confidence that the flow and contaminant transport modeling results can be used for the regulatory decisions required for CAU closure. The first two stages of the strategy have been completed for the Frenchman Flat CAU. A value of information analysis and a CAIP were developed during the CAIP stage. During the CAI stage, a CAIP addendum was developed, and the activities proposed in the CAIP and addendum were completed. These activities included hydrogeologic investigation of the underground testing areas, aquifer testing, isotopic and geochemistry-based investigations, and integrated geophysical investigations. After these investigations, a groundwater flow and contaminant transport model was developed to forecast contaminant boundaries that enclose areas potentially exceeding the Safe Drinking

  1. Corrective Action Plan for Corrective Action Unit 568: Area 3 Plutonium Dispersion Sites Nevada National Security Site, Nevada, Revision 0 with ROTC 1

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick [Navarro Nevada Environmental Services, NV (United States); Burmeister, Mark [Navarro Nevada Environmental Services, NV (United States)

    2016-05-01

    The purpose of this CAP is to provide the plan for implementation of the recommended corrective action alternatives (CAAs) for CAU 568. Site characterization activities were performed in 2014, and the results are presented in Appendix A of the CAU 568 CADD. The CAAs were recommended in the CADD. The scope of work required to implement the recommended CAAs of closure in place and clean closure at 11 of the 14 CASs includes the following: The installation of physical barriers over the nine safety experiment ground zeroes to cover contamination at CASs 03-23-20 (Otero), 03-23-23 (San Juan and Pascal-C), 03-23-31 (Pascal-B, Luna, Colfax), 03-23-32 (Pascal-A), 03-23-33 (Valencia), and 03-23-34 (Chipmunk); the characterization and removal of three soil and debris piles at CAS 03-08-04, and one HCA soil pile at CAS 03-23-30; the removal of three steel well head covers (PSM) from CASs 03-23-20 (Otero), 03-23-31 (Luna), and 03-23-33 (Valencia); the removal of soil and lead PSM from two locations at CAS 03-26-04; Implementation of FFACO use restrictions at nine safety experiment ground zeroes at CASs 03-23-20, 03-23-23, 03-23-31, 03-23-32, 03-23-33, and 03-23-34; the steel well head cover at CAS 03-23-23; the areas meeting HCA conditions at CASs 03-23-19 and 03-23-31; and the Boomer crater area at CAS 03-45-01. The FFACO use restriction boundaries will be presented in the CAU 568 closure report.

  2. Corrective Action Investigation Plan for Corrective Action Unit 366: Area 11 Plutonium Valley Dispersion Sites, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2011-09-01

    Corrective Action Unit 366 comprises the six corrective action sites (CASs) listed below: (1) 11-08-01, Contaminated Waste Dump No.1; (2) 11-08-02, Contaminated Waste Dump No.2; (3) 11-23-01, Radioactively Contaminated Area A; (4) 11-23-02, Radioactively Contaminated Area B; (5) 11-23-03, Radioactively Contaminated Area C; and (6) 11-23-04, Radioactively Contaminated Area D. These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed July 6, 2011, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 366. The presence and nature of contamination at CAU 366 will be evaluated based on information collected from a field investigation. Radiological contamination will be evaluated based on a comparison of the total effective dose (TED) at sample locations to the dose-based final action level (FAL). The TED will be calculated by summing the estimates of internal and external dose. Results from the analysis of soil samples collected from sample plots will be used to calculate internal radiological dose. Thermoluminescent dosimeters placed at each sample location will be used to measure external radiological dose. Based on historical documentation of the releases

  3. Corrective Action Investigation Plan for Corrective Action Unit 104: Area 7 Yucca Flat Atmospheric Test Sites, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2011-08-01

    CAU 104 comprises the 15 CASs listed below: (1) 07-23-03, Atmospheric Test Site T-7C; (2) 07-23-04, Atmospheric Test Site T7-1; (3) 07-23-05, Atmospheric Test Site; (4) 07-23-06, Atmospheric Test Site T7-5a; (5) 07-23-07, Atmospheric Test Site - Dog (T-S); (6) 07-23-08, Atmospheric Test Site - Baker (T-S); (7) 07-23-09, Atmospheric Test Site - Charlie (T-S); (8) 07-23-10, Atmospheric Test Site - Dixie; (9) 07-23-11, Atmospheric Test Site - Dixie; (10) 07-23-12, Atmospheric Test Site - Charlie (Bus); (11) 07-23-13, Atmospheric Test Site - Baker (Buster); (12) 07-23-14, Atmospheric Test Site - Ruth; (13) 07-23-15, Atmospheric Test Site T7-4; (14) 07-23-16, Atmospheric Test Site B7-b; (15) 07-23-17, Atmospheric Test Site - Climax These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed on April 28, 2011, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 104. The releases at CAU 104 consist of surface-deposited radionuclides from 30 atmospheric nuclear tests. The presence and nature of contamination at CAU 104 will be evaluated based on information collected from a field investigation. Radiological contamination will be evaluated based on a comparison

  4. Commercial Passenger Fishing Vessel Fishery

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains the logbook data from U.S.A. Commercial Passenger Fishing Vessels (CPFV) fishing in the U.S.A. EEZ and in waters off of Baja California, from...

  5. Pressure vessel and method therefor

    Energy Technology Data Exchange (ETDEWEB)

    Saunders, Timothy

    2017-09-05

    A pressure vessel includes a pump having a passage that extends between an inlet and an outlet. A duct at the pump outlet includes at least one dimension that is adjustable to facilitate forming a dynamic seal that limits backflow of gas through the passage.

  6. BPC 157 and blood vessels.

    Science.gov (United States)

    Seiwerth, Sven; Brcic, Luka; Vuletic, Lovorka Batelja; Kolenc, Danijela; Aralica, Gorana; Misic, Marija; Zenko, Anita; Drmic, Domagoj; Rucman, Rudolf; Sikiric, Predrag

    2014-01-01

    This review focuses on the described effects of BPC 157 on blood vessels after different types of damage, and elucidate by investigating different aspects of vascular response to injury (endothelium damage, clotting, thrombosis, vasoconstriction, vasodilatation, vasculoneogenesis and edema formation) especially in connection to the healing processes. In this respect, BPC 157 was concluded to be the most potent angiomodulatory agent, acting through different vasoactive pathways and systems (e.g. NO, VEGF, FAK) and leading to optimization of the vascular response followed, as it has to be expected, by optimization of the healing process. Formation of new blood vessels involves two main, partly overlapping mechanisms, angiogenesis and vasculogenesis. The additional mechanism of arteriogenesis is involved in the formation of collaterals. In conjunction with blood vessel function, we at least have to consider leakage of fluid/proteins/plasma, resulting in edema/exudate formation as well as thrombogenesis. Blood vessels are also strongly involved in tumor biology. In this aspect, we have neoangiogenesis resulting in pathological vascularization, vascular invasion resulting in release of metastatic cells and the phenomenon of homing resulting in formation of secondary tumors--metastases.

  7. The determinants of fishing vessel accident severity.

    Science.gov (United States)

    Jin, Di

    2014-05-01

    The study examines the determinants of fishing vessel accident severity in the Northeastern United States using vessel accident data from the U.S. Coast Guard for 2001-2008. Vessel damage and crew injury severity equations were estimated separately utilizing the ordered probit model. The results suggest that fishing vessel accident severity is significantly affected by several types of accidents. Vessel damage severity is positively associated with loss of stability, sinking, daytime wind speed, vessel age, and distance to shore. Vessel damage severity is negatively associated with vessel size and daytime sea level pressure. Crew injury severity is also positively related to the loss of vessel stability and sinking. Copyright © 2014 Elsevier Ltd. All rights reserved.

  8. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  9. Reactor vessel lower head integrity

    Energy Technology Data Exchange (ETDEWEB)

    Rubin, A.M.

    1997-02-01

    On March 28, 1979, the Three Mile Island Unit 2 (TMI-2) nuclear power plant underwent a prolonged small break loss-of-coolant accident that resulted in severe damage to the reactor core. Post-accident examinations of the TMI-2 reactor core and lower plenum found that approximately 19,000 kg (19 metric tons) of molten material had relocated onto the lower head of the reactor vessel. Results of the OECD TMI-2 Vessel Investigation Project concluded that a localized hot spot of approximately 1 meter diameter had existed on the lower head. The maximum temperature on the inner surface of the reactor pressure vessel (RPV) in this region reached 1100{degrees}C and remained at that temperature for approximately 30 minutes before cooling occurred. Even under the combined loads of high temperature and high primary system pressure, the TMI-2 RPV did not fail. (i.e. The pressure varied from about 8.5 to 15 MPa during the four-hour period following the relocation of melt to the lower plenum.) Analyses of RPV failure under these conditions, using state-of-the-art computer codes, predicted that the RPV should have failed via local or global creep rupture. However, the vessel did not fail; and it has been hypothesized that rapid cooling of the debris and the vessel wall by water that was present in the lower plenum played an important role in maintaining RPV integrity during the accident. Although the exact mechanism(s) of how such cooling occurs is not known, it has been speculated that cooling in a small gap between the RPV wall and the crust, and/or in cracks within the debris itself, could result in sufficient cooling to maintain RPV integrity. Experimental data are needed to provide the basis to better understand these phenomena and improve models of RPV failure in severe accident codes.

  10. Security for small computer systems a practical guide for users

    CERN Document Server

    Saddington, Tricia

    1988-01-01

    Security for Small Computer Systems: A Practical Guide for Users is a guidebook for security concerns for small computers. The book provides security advice for the end-users of small computers in different aspects of computing security. Chapter 1 discusses the security and threats, and Chapter 2 covers the physical aspect of computer security. The text also talks about the protection of data, and then deals with the defenses against fraud. Survival planning and risk assessment are also encompassed. The last chapter tackles security management from an organizational perspective. The bo

  11. 46 CFR 42.05-63 - Ship(s) and vessel(s).

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 2 2010-10-01 2010-10-01 false Ship(s) and vessel(s). 42.05-63 Section 42.05-63... BY SEA Definition of Terms Used in This Subchapter § 42.05-63 Ship(s) and vessel(s). The terms ship(s) and vessel(s) are interchangeable or synonymous words, and include every description of watercraft...

  12. Vessel tree extraction using locally optimal paths

    DEFF Research Database (Denmark)

    Lo, Pechin Chien Pau; van Ginneken, Bram; de Bruijne, Marleen

    2010-01-01

    This paper proposes a method to extract vessel trees by continually extending detected branches with locally optimal paths. Our approach uses a cost function from a multi scale vessel enhancement filter. Optimal paths are selected based on rules that take into account the geometric characteristics...... of the vessel tree. Experiments were performed on 10 low dose chest CT scans for which the pulmonary vessel trees were extracted. The proposed method is shown to extract a better connected vessel tree and extract more of the small peripheral vessels in comparison to applying a threshold on the output...

  13. Electrically conductive containment vessel for molten aluminum

    Science.gov (United States)

    Holcombe, C.E.; Scott, D.G.

    1984-06-25

    The present invention is directed to a containment vessel which is particularly useful in melting aluminum. The vessel of the present invention is a multilayered vessel characterized by being electrically conductive, essentially nonwettable by and nonreactive with molten aluminum. The vessel is formed by coating a tantalum substrate of a suitable configuration with a mixture of yttria and particulate metal 10 borides. The yttria in the coating inhibits the wetting of the coating while the boride particulate material provides the electrical conductivity through the vessel. The vessel of the present invention is particularly suitable for use in melting aluminum by ion bombardment.

  14. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  15. 33 CFR 187.101 - What information must be collected to identify a vessel owner?

    Science.gov (United States)

    2010-07-01

    ... not an individual, but a business or other type of organization: (1) Names of all businesses or organizations that own the vessel. (2) Principal address of one business or organization. (3) Mailing address... this section. (4) One of the following unique identifiers for each owner: (i) Social Security Number...

  16. 77 FR 15261 - Safety Zone; Non-Compliant Vessel Pursuit Training Course, Wando River, Charleston, SC

    Science.gov (United States)

    2012-03-15

    ... Pursuit Training Course in Charleston, South Carolina from Monday, March 19, 2012 through Friday, March 23... enforcement tactics and high speed maneuvers during the training course. Discussion of Rule From Monday, March... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA00 Safety Zone; Non-Compliant Vessel Pursuit Training...

  17. Reactor pressure vessel head vents and methods of using the same

    Science.gov (United States)

    Gels, John L; Keck, David J; Deaver, Gerald A

    2014-10-28

    Internal head vents are usable in nuclear reactors and include piping inside of the reactor pressure vessel with a vent in the reactor upper head. Piping extends downward from the upper head and passes outside of the reactor to permit the gas to escape or be forcibly vented outside of the reactor without external piping on the upper head. The piping may include upper and lowers section that removably mate where the upper head joins to the reactor pressure vessel. The removable mating may include a compressible bellows and corresponding funnel. The piping is fabricated of nuclear-reactor-safe materials, including carbon steel, stainless steel, and/or a Ni--Cr--Fe alloy. Methods install an internal head vent in a nuclear reactor by securing piping to an internal surface of an upper head of the nuclear reactor and/or securing piping to an internal surface of a reactor pressure vessel.

  18. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  19. Arctic Security

    DEFF Research Database (Denmark)

    Wang, Nils

    2013-01-01

    The inclusion of China, India, Japan, Singapore and Italy as permanent observers in the Arctic Council has increased the international status of this forum significantly. This chapter aims to explain the background for the increased international interest in the Arctic region through an analysis...... of the general security situation and to identify both the explicit and the implicit agendas of the primary state actors. The region contains all the ingredients for confrontation and conflict but the economical potential for all the parties concerned creates a general interest in dialogue and cooperation...

  20. AFSC/FMA/Vessel Assessment Logging

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Vessels fishing trawl gear, vessels fishing hook-and-line and pot gear that are also greater than 57.5 feet overall, and shoreside and floating processing facilities...

  1. Hawaii Abandoned Vessel Inventory, Hawaii Island

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Hawaii Island. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  2. US Virgin Islands Abandoned Vessel Inventory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for US Virgin Islands. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of...

  3. Hawaii Abandoned Vessel Inventory, Midway Island, NWHI

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Midway Island, NWHI. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of...

  4. Hawaii Abandoned Vessel Inventory, Kure, NWHI

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Kure, NWHI. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  5. Actemra Approved for Certain Blood Vessel Inflammation

    Science.gov (United States)

    ... 165836.html Actemra Approved for Certain Blood Vessel Inflammation Drug will treat adults with a condition called ... to treat adults with giant cell arteritis, an inflammation of the blood vessels (vasculitis). In a media ...

  6. Hawaii Abandoned Vessel Inventory, Maro Reef, NWHI

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Maro Reef, NWHI. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  7. PCs and networking for oceanographic research vessels

    Digital Repository Service at National Institute of Oceanography (India)

    Desai, R.G.P.; Desa, E.; Vithayathil, G.

    This paper, first describes briefly the evolution of data acquisition techniques and different system implementation, on board research vessels. A data acquisition system being developed for a coastal research vessel is then described which is based...

  8. Hawaii Abandoned Vessel Inventory, Lisianski Island, NWHI

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Lisianski Island, NWHI. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction...

  9. Perimeter security for Minnesota correctional facilities

    Energy Technology Data Exchange (ETDEWEB)

    Crist, D. [Minnesota Department of Corrections, St. Paul, MN (United States); Spencer, D.D. [Sandia National Labs., Albuquerque, NM (United States)

    1996-12-31

    For the past few years, the Minnesota Department of Corrections, assisted by Sandia National Laboratories, has developed a set of standards for perimeter security at medium, close, and maximum custody correctional facilities in the state. During this process, the threat to perimeter security was examined and concepts about correctional perimeter security were developed. This presentation and paper will review the outcomes of this effort, some of the lessons learned, and the concepts developed during this process and in the course of working with architects, engineers and construction firms as the state upgraded perimeter security at some facilities and planned new construction at other facilities.

  10. 33 CFR 103.410 - Persons involved in the Area Maritime Security (AMS) Assessment.

    Science.gov (United States)

    2010-07-01

    ...; (k) Radio and telecommunications systems, including computer systems and networks; (l) Transportation and civil engineering; (m) Vessel and port operations; and (n) Knowledge of the impact, including cost impacts of implementing security measures on port operations. ...

  11. Security-by-design handbook.

    Energy Technology Data Exchange (ETDEWEB)

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

    2013-01-01

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  12. Purification of Mouse Brain Vessels.

    Science.gov (United States)

    Boulay, Anne-Cécile; Saubaméa, Bruno; Declèves, Xavier; Cohen-Salmon, Martine

    2015-11-10

    In the brain, most of the vascular system consists of a selective barrier, the blood-brain barrier (BBB) that regulates the exchange of molecules and immune cells between the brain and the blood. Moreover, the huge neuronal metabolic demand requires a moment-to-moment regulation of blood flow. Notably, abnormalities of these regulations are etiological hallmarks of most brain pathologies; including glioblastoma, stroke, edema, epilepsy, degenerative diseases (ex: Parkinson's disease, Alzheimer's disease), brain tumors, as well as inflammatory conditions such as multiple sclerosis, meningitis and sepsis-induced brain dysfunctions. Thus, understanding the signaling events modulating the cerebrovascular physiology is a major challenge. Much insight into the cellular and molecular properties of the various cell types that compose the cerebrovascular system can be gained from primary culture or cell sorting from freshly dissociated brain tissue. However, properties such as cell polarity, morphology and intercellular relationships are not maintained in such preparations. The protocol that we describe here is designed to purify brain vessel fragments, whilst maintaining structural integrity. We show that isolated vessels consist of endothelial cells sealed by tight junctions that are surrounded by a continuous basal lamina. Pericytes, smooth muscle cells as well as the perivascular astrocyte endfeet membranes remain attached to the endothelial layer. Finally, we describe how to perform immunostaining experiments on purified brain vessels.

  13. Collapsible Cryogenic Storage Vessel Project

    Science.gov (United States)

    Fleming, David C.

    2002-01-01

    Collapsible cryogenic storage vessels may be useful for future space exploration missions by providing long-term storage capability using a lightweight system that can be compactly packaged for launch. Previous development efforts have identified an 'inflatable' concept as most promising. In the inflatable tank concept, the cryogen is contained within a flexible pressure wall comprised of a flexible bladder to contain the cryogen and a fabric reinforcement layer for structural strength. A flexible, high-performance insulation jacket surrounds the vessel. The weight of the tank and the cryogen is supported by rigid support structures. This design concept is developed through physical testing of a scaled pressure wall, and through development of tests for a flexible Layered Composite Insulation (LCI) insulation jacket. A demonstration pressure wall is fabricated using Spectra fabric for reinforcement, and burst tested under noncryogenic conditions. An insulation test specimens is prepared to demonstrate the effectiveness of the insulation when subject to folding effects, and to examine the effect of compression of the insulation under compressive loading to simulate the pressure effect in a nonrigid insulation blanket under the action atmospheric pressure, such as would be seen in application on the surface of Mars. Although pressure testing did not meet the design goals, the concept shows promise for the design. The testing program provides direction for future development of the collapsible cryogenic vessel concept.

  14. 46 CFR 32.50-20 - Cargo piping for tank vessels constructed between November 10, 1936, and July 1, 1951-TB/ALL.

    Science.gov (United States)

    2010-10-01

    ... HOMELAND SECURITY TANK VESSELS SPECIAL EQUIPMENT, MACHINERY, AND HULL REQUIREMENTS Pumps, Piping, and Hose... July 1, 1951—TB/ALL. (a) On tank vessels, the construction or conversion of which is started on or... may be omitted where the pipe is extra heavy, all joints are welded, and bends are installed to...

  15. 46 CFR 32.55-5 - Ventilation of tank vessels constructed between November 10, 1936, and July 1, 1951-TB/ALL.

    Science.gov (United States)

    2010-10-01

    ... actuated gas ejectors or blowers or ventilators fitted with heads for natural ventilation, will be approved... 46 Shipping 1 2010-10-01 2010-10-01 false Ventilation of tank vessels constructed between November... HOMELAND SECURITY TANK VESSELS SPECIAL EQUIPMENT, MACHINERY, AND HULL REQUIREMENTS Ventilation and Venting...

  16. 48 CFR 606.302-6 - National security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information, regardless...

  17. 45 CFR 205.52 - Furnishing of social security numbers.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false Furnishing of social security numbers. 205.52... GENERAL ADMINISTRATION-PUBLIC ASSISTANCE PROGRAMS § 205.52 Furnishing of social security numbers. The State plan under title I, IV-A, X, XIV, or CVI (AABD) of the Social Security Act must provide that: (a...

  18. 17 CFR 242.600 - NMS security designation and definitions.

    Science.gov (United States)

    2010-04-01

    ... with: (i) The planning, development, operation or regulation of a national market system (or a... security; and (ii) Consolidated last sale information for a security. (14) Consolidated last sale... sale data, or quotations with respect to a particular security; and (ii) Displays the most recent...

  19. 50 CFR 660.305 - Vessel identification.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Vessel identification. 660.305 Section 660.305 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC... Fisheries § 660.305 Vessel identification. (a) Display. The operator of a vessel that is over 25 ft (7.6 m...

  20. 50 CFR 660.704 - Vessel identification.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Vessel identification. 660.704 Section 660.704 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC... § 660.704 Vessel identification. (a) General. This section only applies to commercial fishing vessels...

  1. 50 CFR 660.504 - Vessel identification.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Vessel identification. 660.504 Section 660.504 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC... § 660.504 Vessel identification. (a) Official number. Each fishing vessel subject to this subpart must...

  2. 50 CFR 665.16 - Vessel identification.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Vessel identification. 665.16 Section 665... identification. (a) Applicability. Each fishing vessel subject to this part, except those identified in paragraph (e) of this section, must be marked for identification purposes, as follows: (1) A vessel that is...

  3. Social Security Reform in the United States

    OpenAIRE

    Andrew A. Samwick

    1999-01-01

    The Two Percent Plan (TTP) is a plan to save Social Security based on personal retirement accounts financed initially out of the budget surplus; this article discusses issues regarding problems the TTP can address and a way the TTP can be efficiently implemented.

  4. A Constraint Programming model for fast optimal stowage of container vessel bays

    DEFF Research Database (Denmark)

    Delgado, Alberto; Jensen, Rune Møller; Janstrup, Kira

    2012-01-01

    planning phase that distributes the containers to bay sections and a slot planning phase that assigns containers of each bay section to slots. In this paper, we focus on the slot planning phase of this approach and present a Constraint Programming and Integer Programming model for stowing a set......Container vessel stowage planning is a hard combinatorial optimization problem with both high economic and environmental impact. We have developed an approach that often is able to generate near-optimal plans for large container vessels within a few minutes. It decomposes the problem into a master...... of containers in a single bay section. This so-called slot planning problem is NP-hard and often involves stowing several hundred containers. Using state-of-the-art constraint solvers and modeling techniques, however, we were able to solve 90% of 236 real instances from our industrial collaborator to optimality...

  5. Internet plan and planning

    Directory of Open Access Journals (Sweden)

    Kahriman Emina

    2008-01-01

    Full Text Available Paper discuss specific features of internet plan as well as planning as management process in general in the contemporary environment. No need to stress out that marketing plan and marketing planning is core activity in approaching to market. At the same time, there are a lot specific c request in preparing marketing plan comparing to business planning due to marketing plan is an essential part. The importance of internet plan and planning rely on specific features of the internet network but as a part of general corporate as well as marketing strategy.

  6. Motorola Secure Software Development Model

    Directory of Open Access Journals (Sweden)

    Francis Mahendran

    2008-08-01

    Full Text Available In today's world, the key to meeting the demand for improved security is to implement repeatable processes that reliably deliver measurably improved security. While many organizations have announced efforts to institutionalize a secure software development process, there is little or no industry acceptance for a common process improvement framework for secure software development. Motorola has taken the initiative to develop such a framework, and plans to share this with the Software Engineering Institute for possible inclusion into its Capability Maturity Model Integration (CMMI®. This paper will go into the details of how Motorola is addressing this issue. The model that is being developed is designed as an extension of the existing CMMI structure. The assumption is that the audience will have a basic understanding of the SEI CMM® / CMMI® process framework. The paper will not describe implementation details of a security process model or improvement framework, but will address WHAT security practices are required for a company with many organizations operating at different maturity levels. It is left to the implementing organization to answer the HOW, WHEN, WHO and WHERE aspects. The paper will discuss how the model is being implemented in the Motorola Software Group.

  7. Soil Security Assessment of Tasmania

    Science.gov (United States)

    Field, Damien; Kidd, Darren; McBratney, Alex

    2017-04-01

    The concept of soil security aligns well with the aspirational and marketing policies of the Tasmanian Government, where increased agricultural expansion through new irrigation schemes and multiple-use State managed production forests co-exists beside pristine World Heritage conservation land, a major drawcard of the economically important tourism industry . Regarding the Sustainable Development Gaols (SDG's) this could be seen as a exemplar of the emerging tool for quantification of spatial soil security to effectively protect our soil resource in terms of food (SDG 2.4, 3.9) and water security (SDG 6.4, 6.6), biodiversity maintenance and safeguarding fragile ecosystems (SDG 15.3, 15.9). The recent development and application of Digital Soil Mapping and Assessment capacities in Tasmania to stimulate agricultural production and better target appropriate soil resources has formed the foundational systems that can enable the first efforts in quantifying and mapping Tasmanian Soil Security, in particular the five Soil Security dimensions (Capability, Condition, Capital, Codification and Connectivity). However, to provide a measure of overall soil security, it was necessary to separately assess the State's three major soil uses; Agriculture, Conservation and Forestry. These products will provide an indication of where different activities are sustainable or at risk, where more soil data is needed, and provide a tool to better plan for a State requiring optimal food and fibre production, without depleting its natural soil resources and impacting on the fragile ecosystems supporting environmental benefits and the tourism industry.

  8. Extra Help with Medicare Prescription Drug Plan Cost (FY 2010-2015)

    Data.gov (United States)

    Social Security Administration — This file contains information about Social Security determinations of eligibility for Extra Help with Medicare Prescription Drug Plan Costs. Specific data elements...

  9. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  10. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  11. Large-Scale Dynamic Observation Planning for Unmanned Surface Vessels

    Science.gov (United States)

    2007-06-01

    distribute publicly paper and electronic copies of this thesis document in whole or in part. Signature of Author...food for the United States and the world. Algae form the base of the marine life food chain . Under certain conditions, millions of algae...thousand species of phytoplankton ( cyanobacteria ) only a few species are known to be harmful. “Certain species of phytoplankton (e.g. Alexandrium

  12. Homeland Security Strategic Planning: Mission Area Analysis

    Science.gov (United States)

    2007-03-28

    material requiring further inspection—to include coordination with foreign governments (e.g., analyze passenger manifests, bills of lading , etc.)—for...reporting and notification system that provides rapid and accurate receipt of reports of disease outbreaks and other acute health events. Provide...monitoring and reviewing procedures for receipt , inventories, deployment, and disposal of donations. Provide community services. Offer legal and

  13. Planning Combat Outposts to Maximize Population Security

    Science.gov (United States)

    2010-06-01

    Uplander Volvo Wrangler Xterra Yugo Zephyr Acura BMW 15,0001 0.29 1 26 0( 5,000 0.0 27 0( 10,000 0,2 26 15,000 0 L5,000 0 15,000 0.41 0 100,000 0 1...2,000 22 Volvo 7 61.19 20100 25 Yugo 8 68.51 24 ,0 26 Zephyr 73 610.24 34 015 5,00 Table 4-3: Krasnovia - Nodes with Patrolling The nodes with...35 30 15 50 14 Nova 35 9 15 50 35 12 15 50 21 22 26 Uplander 35 6 15 50 Volvo Zephyr 85 12 0 85 Total I Table 4-10: Commander’s Risk - Nodes with COPs

  14. Homeland Security Planning for Urban Area Schools

    Science.gov (United States)

    2008-03-01

    attack and conducted in depth (albeit anonymous) interviews of several Russian Special Forces, or Spetsnaz , forces that stormed the school and...lacking. The 62-hour ordeal began at 8:45 A.M. and the Russian Special Forces, or Spetsnaz , were activated at 10:00 A.M., arriving in waves between 1...in that they are not specifically located within the army or navy, but throughout the country’s force ministries. The Spetsnaz can also perform

  15. Plan Colombia, Consequences for Venezuelan Natonal Security

    National Research Council Canada - National Science Library

    Arroyo, Alfredo

    2002-01-01

    ...% reduction in cocaine production), and narcotics trafficking groups move into Venezuela, the government will have to commit its Armed Forces but, under unequal military and technological conditions when compared to Colombia...

  16. Experimental study of in-and-ex-vessel melt cooling during a severe accident

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Sang Baik; Yoo, K. J.; Park, C. K.; Seok, S. D.; Park, R. J.; Yi, S. J.; Kang, K. H.; Ham, Y. S.; Cho, Y. R.; Kim, J. H.; Jeong, J. H.; Shin, K. Y.; Cho, J. S.; Kim, D. H.

    1997-07-01

    After code damage during a severe accident in a nuclear reactor, the degraded core has to be cooled down and the decay heat should be removed in order to cease the accident progression and maintain a stable state. The cooling of core melt is divided into in-vessel and ex-vessel cooling depending on the location of molten core which is dependent on the timing of vessel failure. Since the cooling mechanism varies with the conditions of molten core and surroundings and related phenomena, it contains many phenomenological uncertainties so far. In this study, an experimental study for verification of in-vessel corium cooling and several separate effect experiments for ex-vessel cooling are carried out to verify in- and ex-vessel cooling phenomena and finally to develop the accident management strategy and improve engineered reactor design for the severe accidents. SONATA-IV (Simulation of Naturally Arrested Thermal Attack in Vessel) program is set up for in-vessel cooling and a progression of the verification experiment has been done, and an integral verification experiment of the containment integrity for ex-vessel cooling is planned to be carried out based on the separate effect experiments performed in the first phase. First phase study of SONATA-IV is proof of principle experiment and it is composed of LALA (Lower-plenum Arrested Vessel Attack) experiment to find the gap between melt and the lower plenum during melt relocation and to certify melt quenching and CHFG (Critical Heat Flux in Gap) experiment to certify heat transfer mechanism in an artificial gap. As separate effect experiments for ex-vessel cooling, high pressure melt ejection experiment related to the initial condition for debris layer formation in the reactor cavity, crust formation and heat transfer experiment in the molten pool and molten core concrete interaction experiment are performed. (author). 150 refs., 24 tabs., 127 figs.

  17. Designing of a Fleet-Leader Program for Carbon Composite Overwrapped Pressure Vessels

    Science.gov (United States)

    Murthy, Pappu L.N.; Phoenix, S. Leigh

    2009-01-01

    Composite Overwrapped Pressure Vessels (COPVs) are often used for storing pressurant gases on board spacecraft when mass saving is a prime requirement. Substantial weight savings can be achieved compared to all metallic pressure vessels. For example, on the space shuttle, replacement of all metallic pressure vessels with Kevlar COPVs resulted in a weight savings of about 30 percent. Mass critical space applications such as the Ares and Orion vehicles are currently being planned to use as many COPVs as possible in place of all-metallic pressure vessels to minimize the overall mass of the vehicle. Due to the fact that overwraps are subjected to sustained loads during long periods of a mission, stress rupture failure is a major concern. It is, therefore, important to ascertain the reliability of these vessels by analysis, since it is practically impossible to show by experimental testing the reliability of flight quality vessels. Also, it is a common practice to set aside flight quality vessels as "fleet leaders" in a test program where these vessels are subjected to slightly accelerated operating conditions so that they lead the actual flight vessels both in time and load. The intention of fleet leaders is to provide advanced warning if there is a serious design flaw in the vessels so that a major disaster in the flight vessels can be averted with advance warning. On the other hand, the accelerating conditions must be not so severe as to be prone to false alarms. The primary focus of the present paper is to provide an analytical basis for designing a viable fleet leader program for carbon COPVs. The analysis is based on a stress rupture behavior model incorporating Weibull statistics and power-law sensitivity of life to fiber stress level.

  18. Securing the energy industry : perspectives in security risk management

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, G.L. [Anadarko Canada Corp., Calgary, AB (Canada)

    2003-07-01

    This presentation offered some perspectives in security risk management as it relates to the energy sector. Since the events of September 11, 2001 much attention has been given to terrorism and the business is reviewing protection strategies. The paper made reference to each of the following vulnerabilities in the energy sector: information technology, globalization, business restructuring, interdependencies, political/regulatory change, and physical/human factors. The vulnerability of information technology is that it can be subject to cyber and virus attacks. Dangers of globalization lie in privacy and information security, forced nationalization, organized crime, and anti-globalization efforts. It was noted that the Y2K phenomenon provided valuable lessons regarding interdependencies and the effects of power outages, water availability, transportation disruption, common utility corridor accidents, and compounding incidents. The paper also noted the conflict between the government's desire to have a resilient infrastructure that can withstand and recover from attacks versus a company's ability to afford this capability. The physical/human factors that need to be considered in risk management include crime, domestic terrorism, and disasters such as natural disasters, industrial disasters and crisis. The energy industry has geographically dispersed vulnerable systems. It has done a fair job of physical security and has good emergency management practices, but it was noted that the industry cannot protect against all threats. A strategy of vigilance and awareness is needed to deal with threats. Other strategies include contingency planning, physical security, employee communication, and emergency response plans. tabs., figs.

  19. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  20. Information Systems Security Audit

    Directory of Open Access Journals (Sweden)

    Gheorghe Popescu

    2007-12-01

    Full Text Available The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  1. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  2. 49 CFR 1542.201 - Security of the secured area.

    Science.gov (United States)

    2010-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... 49 Transportation 9 2010-10-01 2010-10-01 false Security of the secured area. 1542.201 Section...

  3. FINANCIAL STABILITY AS A FACTOR ECONOMIC SECURITY

    Directory of Open Access Journals (Sweden)

    A. V. Endovitskaya

    2015-01-01

    Full Text Available Summary. The article examines the linkages between financial stability and the level of its economic security. Considered the content of financial stability, represented by its own definition, we studied the basic conditions to achieve it. The logic diagram showing the location of financial stability and financial security to ensure the economic security of the business entity. A system of internal and external factors affecting the financial stability and endanger financial stability and financial security company. It has been established that it is the internal factors such as the availability of financial resources and financial position, capital structure, the company's ability to generate profits determine the level of economic security and its ability to withstand the negative impact of external and internal threats. The necessity of improving the financial sustainability in order to improve the economic security of the enterprise. On the basis of the research proposed matrix of risks affecting the financial stability and economic security, which allows to determine the probability of their occurrence and impact. It presents the economic, social, human, financial, organizational, economic, innovative and productive tools to increase the stability and financial security of an economic entity. List considered standard measures will make a plan of action to minimize the adverse impacts and enhance financial stability and security. Therefore, a prerequisite for the economic security of the enterprise is the attainment of financial stability.

  4. Business Plans For Dummies

    CERN Document Server

    Tiffany, Paul; Barrow, Colin

    2011-01-01

    A full updated and extended second edition of an established UK bestseller Business Plans For Dummies 2nd Edition features new and updated information on formulating a solid business plan to build a secure business - even in an economic downturn. Complete with a brand new business plan template to get you started this expert guide offers fresh advice on reading the competitive marketplace and assessing your business in the current economic climate. It walks you step-by-step through every aspect of planning achievable business goals and diversification strategies, identifying trends, exploring

  5. Conceptual design of the handling and storage system of the spent target vessel for neutron scattering facility 2

    Energy Technology Data Exchange (ETDEWEB)

    Adachi, Junichi; Kaminaga, Masanori; Sasaki, Shinobu; Haga, Katsuhiro; Aso, Tomokazu; Kinoshita, Hidetaka; Hino, Ryutaro [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment

    2002-01-01

    In designing the neutron scattering facility, a spent target vessel should be replaced with remote handling devices in order to protect radioactive exposure, since it would be highly activated through the high energy neutron irradiation caused by the spallation reaction between mercury of the target material and the MW-class proton beam. In the storage of the spent target vessel, it is necessary to consider decay heat of the target vessel and mercury contamination caused by vaporization of the residual mercury in the vessel. A conceptual design has been carried out to establish basic concept and to clarify its specification of main equipments on handling and storage systems for the spent target vessel. This report presents the basic concept and a system plot plan based on latest design works of remote handling devices such as a spent target vessel storage cask and a target vessel exchange trolley, which aim at reasonability and simplification. In addition, storage systems for the spent moderator vessel, the spent proton beam window and the spent reflector vessel are also investigated based on the plot plan. (author)

  6. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  7. How Secure is Open Source?

    Science.gov (United States)

    Panettieri, Joseph C.

    2007-01-01

    Imagine showing cops and robbers the blueprints to the campus. Then, letting them keep the detailed blueprints to review--over and over again--at their leisure. The robbers would memorize every nuance of the campus layout, and at some point, they'd likely plan a break-in. But on the flip side, the cops would identify security weaknesses--and help…

  8. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  9. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  10. Transforming Homeland Security [video

    OpenAIRE

    McIntyre, David; Center for Homeland Defense and Security Naval Postgraduate School

    2011-01-01

    A pioneer in homeland security, and homeland security education, David McIntyre discusses the complexities in transforming homeland security from a national program in its inception, to also include state and local agencies and other public and private parties.

  11. General Aviation Land Use Planning

    OpenAIRE

    Isenberg, Nick; Payne, Brian; Muia, Maria

    2017-01-01

    In this session we discuss the value of land use planning sessions in determining airside and landside short-, mid-, and long-term needs of the airport. Land use plans have been used to secure funding and increase commercial landside and military airside growth. Currently a plan is being used to develop the first general aviation aerotropolis concept. Join us to learn how a land use plan can increase the marketability and revenue generation of your airport.

  12. Radiation effects on reactor pressure vessel supports

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, R.E. [Nuclear Regulatory Commission, Washington, DC (United States). Div. of Engineering Technology; Lipinski, R.E. [Idaho National Engineering Lab., Rockville, MD (United States)

    1996-05-01

    The purpose of this report is to present the findings from the work done in accordance with the Task Action Plan developed to resolve the Nuclear Regulatory Commission (NRC) Generic Safety Issue No. 15, (GSI-15). GSI-15 was established to evaluate the potential for low-temperature, low-flux-level neutron irradiation to embrittle reactor pressure vessel (RPV) supports to the point of compromising plant safety. An evaluation of surveillance samples from the High Flux Isotope Reactor (HFIR) at the Oak Ridge National Laboratory (ORNL) had suggested that some materials used for RPV supports in pressurized-water reactors could exhibit higher than expected embrittlement rates. However, further tests designed to evaluate the applicability of the HFIR data to reactor RPV supports under operating conditions led to the conclusion that RPV supports could be evaluated using traditional method. It was found that the unique HFIR radiation environment allowed the gamma radiation to contribute significantly to the embrittlement. The shielding provided by the thick steel RPV shell ensures that degradation of RPV supports from gamma irradiation is improbable or minimal. The findings reported herein were used, in part, as the basis for technical resolution of the issue.

  13. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  14. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  15. Security classification of information

    Energy Technology Data Exchange (ETDEWEB)

    Quist, A.S.

    1993-04-01

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  16. Practical unix & internet security

    National Research Council Canada - National Science Library

    Garfinkel, Simson; Spafford, Gene; Schwartz, Alan

    2003-01-01

    ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii Part I. Computer Security Basics 1. Introduction: Some Fundamental Questions What Is Computer Security? What Is an Operating System? What Is a...

  17. Practical unix & internet security

    National Research Council Canada - National Science Library

    Garfinkel, Simson; Spafford, Gene; Schwartz, Alan

    2003-01-01

    ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii Part I. Computer Security Basics 1. Introduction: Some Fundamental Questions What Is Computer Security? What Is an Operating System? What Is a Deployment...

  18. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  19. Social security for seafarers globally.

    Science.gov (United States)

    Jensen, Olaf C; Lucero-Prisno, Don Eliseo; Haarløv, Erik; Sucre, Rimsky; Flores, Agnes; Canals, M Luisa

    2013-01-01

    The social security protection is one of the essential elements of decent work. The issue is complexand no previous epidemiological studies of the coverage among the seafarers have yet been performed. The aim was to overcome the gap of knowledge to promote the further discussion and plan the implementationof the social security for all the seafarers. The seafarers completed a short questionnaire concerning their knowledge abouttheir social security status. The significant disparities in the social security coverage were pointed out among the nationalities.Especially it is worth mentioning that more than half of the respondents believe they are economicallyuncovered for disability from an injury on board and from a work-related disease. The results confirm the ILO (Convention No. 143) statements that the significant part of theseafarers comes from the poorer countries without the substantial social security systems. The solutionssuggested are to implement the minimum requirements as recommended by the ILO 2006 Convention, tosurvey the implementation and - in the long term - to struggle for a global social equality.

  20. Exponential Stabilization of an Underactuated Surface Vessel

    Directory of Open Access Journals (Sweden)

    Kristin Y. Pettersen

    1997-07-01

    Full Text Available The paper shows that a large class of underactuated vehicles cannot be asymptotically stabilized by either continuous or discontinuous state feedback. Furthermore, stabilization of an underactuated surface vessel is considered. Controllability properties of the surface vessels is presented, and a continuous periodic time-varying feedback law is proposed. It is shown that this feedback law exponentially stabilizes the surface vessel to the origin, and this is illustrated by simulations.

  1. 6 CFR 17.230 - Transition plans.

    Science.gov (United States)

    2010-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF SEX IN EDUCATION PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Coverage § 17.230 Transition plans... one administratively separate unit may submit either a single transition plan applicable to all such...

  2. 33 CFR 105.260 - Security measures for restricted areas.

    Science.gov (United States)

    2010-07-01

    ...) Using security personnel, automatic intrusion detection devices, surveillance equipment, or surveillance... surrounding restricted areas, by the use of patrols or automatic intrusion detection devices; (3) Reducing the... systems; and (7) Protect cargo and vessel stores from tampering. (b) Designation of Restricted Areas. The...

  3. 33 CFR 104.285 - Security measures for monitoring.

    Science.gov (United States)

    2010-07-01

    ..., security guards, deck watches, waterborne patrols, automatic intrusion-detection devices, or surveillance... areas; (2) Be able to conduct emergency searches of the vessel; (3) Ensure that equipment or system failures or malfunctions are identified and corrected; (4) Ensure that any automatic intrusion detection...

  4. 33 CFR 105.305 - Facility Security Assessment (FSA) requirements.

    Science.gov (United States)

    2010-07-01

    ... dangerous goods and hazardous substances; (v) Delivery of vessel stores; (vi) Any facility security... use including the presence of stowaways; (v) Smuggling dangerous substances and devices to the... disruption, including disruption to transportation systems, of an attack on or at the facility; and (7...

  5. Protein security and food security in China

    Directory of Open Access Journals (Sweden)

    Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

    2015-06-01

    Full Text Available Food security, the need to meet nutritional requirements, and four main problems for food protein security in China are analyzed. From the perspective of residentsrsquo; nutritional requirements and balanced dietary patterns, the conclusion is that food security in China is in essence dependent on protein production and security of supply and that fat and carbohydrates supply in China can reach self-sufficiency. Considering the situation of food protein production and consumption in China, policy suggestions are made, which could ensure a balanced supply and demand for food protein and food security in China.

  6. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  7. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  8. From Secure Memories to Smart Card Security

    Science.gov (United States)

    Handschuh, Helena; Trichina, Elena

    Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.

  9. Security breaches: tips for assessing and limiting your risks.

    Science.gov (United States)

    Coons, Leeanne R

    2011-01-01

    As part of their compliance planning, medical practices should undergo a risk assessment to determine any vulnerability within the practice relative to security breaches. Practices should also implement safeguards to limit their risks. Such safeguards include facility access controls, information and electronic media management, use of business associate agreements, and education and enforcement. Implementation of specific policies and procedures to address security incidents is another critical step that medical practices should take as part of their security incident prevention plan. Medical practices should not only develop policies and procedures to prevent, detect, contain, and correct security violations, but should make sure that such policies and procedures are actually implemented in their everyday operations.

  10. Chapter 3: Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  11. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  12. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  13. Unix Security Cookbook

    Science.gov (United States)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  14. Vessel classification method based on vessel behavior in the port of Rotterdam

    NARCIS (Netherlands)

    Zhou, Y.; Daamen, W.; Vellinga, T.; Hoogendoorn, S.P.

    2015-01-01

    AIS (Automatic Identification System) data have proven to be a valuable source to investigate vessel behavior. The analysis of AIS data provides a possibility to recognize vessel behavior patterns in a waterway area. Furthermore, AIS data can be used to classify vessel behavior into several

  15. A computational algorithm addressing how vessel length might depend on vessel diameter

    Science.gov (United States)

    Jing Cai; Shuoxin Zhang; Melvin T. Tyree

    2010-01-01

    The objective of this method paper was to examine a computational algorithm that may reveal how vessel length might depend on vessel diameter within any given stem or species. The computational method requires the assumption that vessels remain approximately constant in diameter over their entire length. When this method is applied to three species or hybrids in the...

  16. 76 FR 59660 - Proposed Information Collection; Comment Request; Permitting, Vessel Identification, and Vessel...

    Science.gov (United States)

    2011-09-27

    ...; Permitting, Vessel Identification, and Vessel Monitoring System Requirements for the Commercial Bottomfish... compliance with federal identification requirements and carry and maintain a satellite- based vessel monitoring system (VMS). This collection of information is needed for permit issuance, to identify actual or...

  17. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  18. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...

  19. Land ecological security evaluation of Guangzhou, China.

    Science.gov (United States)

    Xu, Linyu; Yin, Hao; Li, Zhaoxue; Li, Shun

    2014-10-15

    As the land ecosystem provides the necessary basic material resources for human development, land ecological security (LES) plays an increasingly important role in sustainable development. Given the degradation of land ecological security under rapid urbanization and the urgent LES requirements of urban populations, a comprehensive evaluation method, named Double Land Ecological Security (DLES), has been introduced with the city of Guangzhou, China, as a case study, which evaluates the LES in regional and unit scales for reasonable and specific urban planning. In the evaluation process with this method, we have combined the material security with the spiritual security that is inevitably associated with LES. Some new coefficients of land-security supply/demand distribution and technology contribution for LES evaluation have also been introduced for different spatial scales, including the regional and the unit scales. The results for Guangzhou indicated that, temporally, the LES supply indices were 0.77, 0.84 and 0.77 in 2000, 2006 and 2009 respectively, while LES demand indices for the city increased in 2000, 2006 and 2009 from 0.57 to 0.95, which made the LES level decreased slowly in this period. Spatially, at the regional scale, the urban land ecological security (ULES) level decreased from 0.2 (marginal security) to -0.18 (marginal insecurity) as a whole; in unit scale, areas in the north and in parts of the east were relatively secure and the security area was shrinking with time, but the central and southern areas turned to be marginal insecurity, especially in 2006 and 2009. This study proposes that DLES evaluation should be conducted for targeted and efficient urban planning and management, which can reflect the LES level of study area in general and in detail.

  20. Land Ecological Security Evaluation of Guangzhou, China

    Directory of Open Access Journals (Sweden)

    Linyu Xu

    2014-10-01

    Full Text Available As the land ecosystem provides the necessary basic material resources for human development, land ecological security (LES plays an increasingly important role in sustainable development. Given the degradation of land ecological security under rapid urbanization and the urgent LES requirements of urban populations, a comprehensive evaluation method, named Double Land Ecological Security (DLES, has been introduced with the city of Guangzhou, China, as a case study, which evaluates the LES in regional and unit scales for reasonable and specific urban planning. In the evaluation process with this method, we have combined the material security with the spiritual security that is inevitably associated with LES. Some new coefficients of land-security supply/demand distribution and technology contribution for LES evaluation have also been introduced for different spatial scales, including the regional and the unit scales. The results for Guangzhou indicated that, temporally, the LES supply indices were 0.77, 0.84 and 0.77 in 2000, 2006 and 2009 respectively, while LES demand indices for the city increased in 2000, 2006 and 2009 from 0.57 to 0.95, which made the LES level decreased slowly in this period. Spatially, at the regional scale, the urban land ecological security (ULES level decreased from 0.2 (marginal security to −0.18 (marginal insecurity as a whole; in unit scale, areas in the north and in parts of the east were relatively secure and the security area was shrinking with time, but the central and southern areas turned to be marginal insecurity, especially in 2006 and 2009. This study proposes that DLES evaluation should be conducted for targeted and efficient urban planning and management, which can reflect the LES level of study area in general and in detail.