WorldWideScience

Sample records for vessel security program

  1. 78 FR 13691 - Guidance Regarding Inspection and Certification of Vessels Under the Maritime Security Program

    Science.gov (United States)

    2013-02-28

    ... SECURITY Coast Guard Guidance Regarding Inspection and Certification of Vessels Under the Maritime Security... availability of Navigation and Vessel Inspection Circular (NVIC) 01-13, ``Inspection and Certification of Vessels Under the Maritime Security Program (MSP).'' The MSP serves as a means for establishing a fleet of...

  2. Report of the DHS Small Vessel Security Institute

    Science.gov (United States)

    2007-10-19

    approach implemented by the Aircraft Owners and Pilots Association 54 National Small Vessel Security Summit ( AOPA ). This program encourages...implemented by the Aircraft Owners and Pilots Association ( AOPA ). • Security zone: provide much more information to the boating public so that...One stakeholder recommended that the AWW adapt the “Lock Up. Look Out” program implemented by the Aircraft Owners and Pilots Association ( AOPA ). This

  3. Analisa Greenwater Akibat Gerakan Offshore Security Vessel

    Directory of Open Access Journals (Sweden)

    Maulidya Octaviani Bustamin

    2012-09-01

    Full Text Available Analisa  Tugas  Akhir  ini,  terdiri  atas  beberapa  tahapan.  Yang pertama yaitu perancangan struktur Offshore Security Vessel (OSV dengan bantuan software MAXSURF guna mendapatkan Lines Plan. Offset data yang diperoleh digunakan dalam pemodelan menggunakan MOSES,  kemudian  dilakukan  analisa  gerak  OSV  dalam  gelombang  regular  dan dinyatakan dalam grafik RAO. Analisa gerak relatif vertikal  haluan dihitung dari RAO gerakan, dan kemudian melakukan evaluasi perilaku di gelombang acak dengan analisis spektra gelombang. Dari analisa spektra didapatkan parameter greenwater sehingga dapat dihitung peluang, intensitas dan tekanan greenwater. Dari hasil analisa diperoleh RAO gerak vertikal Offshore Security Vessel (OSV pada  gelombang  reguler yang dipengaruhi  oleh  kecepatan,  kondisi  muatan  dan arah gelombang. Peluang terjadinya greenwater terbesar terjadi pada sudut datang gelombang following sea (0o dimana harga terbesar terjadi pada ω = 0.2 rad/sec dengan periode 29 detik mencapai 0.477. Intensitas greenwater terbesar terjadi pada saat sudut datang gelombang following sea (0o adalah sebanyak 59.265 per jam dan 0.378 per detik. Tekanan greenwater terbesar terjadi pada saat sudut datang gelombang head sea (180o sebesar 1678x10-6 MPa. Dengan nilai tersebut, deck mampu menahan beban akibat tekanan greenwater.

  4. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  5. Computer Security Assistance Program

    Science.gov (United States)

    1997-09-01

    Information COMPUTER SECURITY ASSISTANCE PROGRAM OPR: HQ AFCA/SYS (CMSgt Hogan) Certified by: HQ USAF/SCXX (Lt Col Francis X. McGovern) Pages: 5...Distribution: F This instruction implements Air Force Policy Directive (AFPD) 33-2, Information Protection, establishes the Air Force Computer Security Assistance...Force single point of contact for reporting and handling computer security incidents and vulnerabilities including AFCERT advisories and Defense

  6. 33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.

    Science.gov (United States)

    2010-07-01

    ... baggage; and (vi) Vessel stores; (2) Threat assessments, including the purpose and methodology of the... availability of security communications, information, and equipment. (c) Analysis and recommendations. In... may, if damaged or used illicitly, pose a risk to people, property, or operations on board the vessel...

  7. 33 CFR 104.215 - Vessel Security Officer (VSO).

    Science.gov (United States)

    2010-07-01

    ... board and in port. (iv) Protection of the marine environment: (A) Understanding of vessel personnel's responsibility to preserve the marine environment; and (B) Basic working knowledge of pollution prevention... security plan; (ii) Assessing security risk, threat and vulnerability; (iii) Undertaking regular...

  8. Secure Dynamic Program Repartitioning

    DEFF Research Database (Denmark)

    Hansen, Rene Rydhoff; Probst, Christian

    2005-01-01

    Secure program partitioning has been introduced as a language-based technique to allow the distribution of data and computation across mutualy untrusted hosts, while at the same time guaranteeing the protection of confidential data. Programs that have been annotated with security types...... are automaticaly partitioned by the compiler. The main drawback in this setting is that both the trust hierarchy and the set of hosts are fixed once the program has been partitioned. This paper suggests an enhanced version of the partitioning framework, where the trust relation stil remains fixed...

  9. Report of the DHS National Small Vessel Security Summit

    Science.gov (United States)

    2007-10-19

    Summit ( AOPA ). This program encourages private pilots to secure their aircraft to prevent possible thefts, which could help impede terrorists. He...adopt the “Lock Up. Look Out.” approach implemented by the Aircraft Owners and Pilots Association ( AOPA ). • Security zone: provide much more...Owners and Pilots Association ( AOPA ). This program encourages private pilots to secure their aircraft, get to know their fellow hangar tenants

  10. 33 CFR 104.280 - Security measures for delivery of vessel stores and bunkers.

    Science.gov (United States)

    2010-07-01

    ... vessel stores and bunkers. 104.280 Section 104.280 Navigation and Navigable Waters COAST GUARD... § 104.280 Security measures for delivery of vessel stores and bunkers. (a) General. The vessel owner or operator must ensure that security measures relating to the delivery of vessel stores and bunkers are...

  11. 33 CFR 106.135 - Alternative Security Program.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Alternative Security Program. 106.135 Section 106.135 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... facility; (b) The OCS facility does not serve vessels on international voyages; and (c) The Alternative...

  12. 33 CFR 105.270 - Security measures for delivery of vessel stores and bunkers.

    Science.gov (United States)

    2010-07-01

    ... vessel stores and bunkers. 105.270 Section 105.270 Navigation and Navigable Waters COAST GUARD... Requirements § 105.270 Security measures for delivery of vessel stores and bunkers. (a) General. The facility owner or operator must ensure that security measures relating to the delivery of vessel stores and...

  13. Implementing an Information Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.; O' Neil, Lori Ross; Leitch, Rosalyn; Johnson, Christopher; Lewis, John G.; Rodger, Robert M.

    2017-11-01

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to cover information security best practices, planning for an information security management system, and implementing security controls for information security.

  14. Lemnos Interoperable Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Stewart, John [Tennessee Valley Authority, Knoxville, TN (United States); Halbgewachs, Ron [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Chavez, Adrian [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Smith, Rhett [Schweitzer Engineering Laboratories, Chattanooga, TN (United States); Teumim, David [Teumim Technical, Allentown, PA (United States)

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  15. 12 CFR 568.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Security program. 568.3 Section 568.3 Banks and... program. (a) Contents of security program. The security program shall: (1) Establish procedures for... officers and employees in their responsibilities under the security program and in proper employee conduct...

  16. 12 CFR 748.0 - Security program.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Security program. 748.0 Section 748.0 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS SECURITY PROGRAM, REPORT....0 Security program. (a) Each federally insured credit union will develop a written security program...

  17. Global Security Program Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Bretzke, John C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-25

    The Global Security Directorate mission is to protect against proliferant and unconventional nuclear threats –regardless of origin - and emerging new threats. This mission is accomplished as the Los Alamos National Laboratory staff completes projects for our numerous sponsors. The purpose of this Program Management Plan is to establish and clearly describe the GS program management requirements including instructions that are essential for the successful management of projects in accordance with our sponsor requirements. The detailed information provided in this document applies to all LANL staff and their subcontractors that are performing GS portfolio work. GS management is committed to a culture that ensures effective planning, execution, and achievement of measurable results in accordance with the GS mission. Outcomes of such a culture result in better communication, delegated authority, accountability, and increased emphasis on safely and securely achieving GS objectives.

  18. 33 CFR 104.225 - Security training for all other vessel personnel.

    Science.gov (United States)

    2010-07-01

    ..., whether part-time, full-time, temporary, or permanent, must have knowledge of, through training or equivalent job experience in the following, as appropriate: (a) Relevant provisions of the Vessel Security...

  19. 76 FR 63547 - Security Zone; Columbia and Willamette Rivers, Dredge Vessels Patriot and Liberty

    Science.gov (United States)

    2011-10-13

    ... Patriot and Liberty AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Coast Guard is establishing a temporary security zone within 200 yards of the Dredge Vessels Patriot and Liberty while the... due to insufficient time in which to publish an NPRM since the Dredge Vessels Patriot and Liberty...

  20. 75 FR 45055 - Security Zone; 2010 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, WA

    Science.gov (United States)

    2010-08-02

    ... Vessels, Puget Sound, WA AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The U.S. Coast... vessels while underway in the Puget Sound Captain of the Port (COTP) Area of Responsibility (AOR). These... remaining in the security zones unless authorized by the COTP, Puget Sound or Designated Representative...

  1. Building an intelligence-led security program

    CERN Document Server

    Liska, Allan

    2014-01-01

    As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented inte

  2. Requirements of a Better Secure Program Coding

    Directory of Open Access Journals (Sweden)

    Marius POPA

    2012-01-01

    Full Text Available Secure program coding refers to how manage the risks determined by the security breaches because of the program source code. The papers reviews the best practices must be doing during the software development life cycle for secure software assurance, the methods and techniques used for a secure coding assurance, the most known and common vulnerabilities determined by a bad coding process and how the security risks are managed and mitigated. As a tool of the better secure program coding, the code review process is presented, together with objective measures for code review assurance and estimation of the effort for the code improvement.

  3. 77 FR 50926 - Security Zones; Certain Dangerous Cargo Vessels, Tampa, FL

    Science.gov (United States)

    2012-08-23

    ... anhydrous ammonia, liquefied propane gas (LPG), and ammonium nitrate. The security zones will start at buoys... CDC vessel is one carrying anhydrous ammonia, liquefied propane gas, and ammonium nitrate. The.... 14. Environment We have analyzed this rule under Department of Homeland Security Management Directive...

  4. 77 FR 2019 - Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/Departure, Kaunakakai Harbor, Molokai, HI

    Science.gov (United States)

    2012-01-13

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA87 Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/ Departure, Kaunakakai Harbor, Molokai, HI AGENCY: Coast Guard, DHS. ACTION: Temporary interim rule with...

  5. 77 FR 24381 - Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/Departure, Kaunakakai Harbor, Molokai, HI

    Science.gov (United States)

    2012-04-24

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA87 Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/ Departure, Kaunakakai Harbor, Molokai, HI AGENCY: Coast Guard, DHS. ACTION: Temporary interim rule...

  6. 76 FR 10262 - Information Security Program

    Science.gov (United States)

    2011-02-24

    ... 46 CFR Part 503 RIN 3072-AC40 Information Security Program AGENCY: Federal Maritime Commission... relating to its Information Security Program to reflect the changes implemented by Executive Order 13526--Classified National Security Information--that took effect January 5, 2010, and which prescribes a uniform...

  7. Joint High Speed Vessel (JHSV) Program

    Science.gov (United States)

    2007-05-23

    OPERATIONALY throughout the world • EUCOM – Norway to Africa • CENTCOM • PACOM • SOUTHCOM • CONUS • Leased vessels have undergone significant sea trials and... Austral ia to the Persian Gul f to support C E N T C O M t a s k i n g s JOINT VENTURE SWIFT 22 UNCLASSIFIED UNCLASSIFIED Acquisition Constraints

  8. Massachusetts Institute of Technology Security Studies Program

    Science.gov (United States)

    2006-01-01

    incoming SSP Directors. Among other notables who have called Belmont home are Vannevar Bush, Winslow Homer, Talcott Parsons , the John Birch Society...Researchers 15 Affiliates 26 Seminar Series 33 Special Events 34 Field Trip 36 Publications 41 SSP Teaching 42 Courses 48 Professional Education 50 SSP...STUDIES PROGRAM MIT SECURITY STUDIES PROGRAM SECURITY STUDIES PROGRAM 1 he Security Studies Program (SSP) is a graduate level research and educational

  9. Vessel-sourced pollution: a security threat in Malaysian waters ...

    African Journals Online (AJOL)

    Vessel-sourced pollution is one of the major sources of marine pollution and it encompasses accidental discharge of oil, intentional discharge of oil (like discharge from ballast tanks), chemicals, dumping, etc. The United Nations Convention on the Law of the Sea (UNCLOS), 1982 and some other conventions make ...

  10. Studies on in-vessel debris coolability in ALPHA program

    Energy Technology Data Exchange (ETDEWEB)

    Maruyama, Yu; Yamano, Norihiro; Moriyama, Kiyofumi [Japan Atomic Energy Research Institute, Ibaraki-ken (Japan)] [and others

    1997-02-01

    In-vessel debris coolability experiments have been performed in ALPHA Program at JAERI. Aluminum oxide (Al{sub 2}O{sub 3}) produced by a thermite reaction was applied as a debris simulant. Two scoping experiments using approximately 30 kg or 50 kg of Al{sub 2}O{sub 3} were conducted. In addition to post-test observations, temperature histories of the debris simulant and the lower head experimental vessel were evaluated. Rapid temperature reduction observed on the outer surface of the experimental vessel may imply that water penetration into a gap between the solidified debris and the experimental vessel occurred resulting in an effective cooling of once heated vessel wall. Preliminary measurement of a gap width was made with an ultrasonic device. Signals to show the existence of gaps, ranging from 0.7 mm to 1.4 mm, were detected at several locations.

  11. VESSEL-SOURCED POLLUTION: A SECURITY THREAT IN ...

    African Journals Online (AJOL)

    more than 80 per cent and 90 per cent of China's and Japan's oil respectively pass through this route.44 The presence of heavy ships traversing the Straits. 44 Stommy-Annika M, and Grob F, 'Piracy and World Trade: The Economic Cost' in Mair .S, (ed), Piracy and Maritime Security, (Germany Institute for International and ...

  12. IT security governance guidebook with security program metrics

    CERN Document Server

    Cohen, Fred

    2006-01-01

    The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection programs. Including graphics to support the information in the text, this book includes both an overview of material as well as detailed explanations of specific issues. The accompanying CD-ROM offers a collection of metrics, formed from repeatable and comparable measurement, that are designed to correspond to the enterprise security governance model provid

  13. 49 CFR 1542.113 - Airport tenant security programs.

    Science.gov (United States)

    2010-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.113 Airport tenant security programs. (a) TSA may approve an airport tenant... 49 Transportation 9 2010-10-01 2010-10-01 false Airport tenant security programs. 1542.113 Section...

  14. Interactive Programming Support for Secure Software Development

    Science.gov (United States)

    Xie, Jing

    2012-01-01

    Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have not been adequately trained in writing secure programs that are resistant from attacks violating program confidentiality, integrity, and availability, a style of programming…

  15. 78 FR 261 - Moving Security Zone Around Escorted Vessels on the Lower Mississippi River

    Science.gov (United States)

    2013-01-03

    ... been deemed by the COTP New Orleans to require escort protection during transit between mile marker 88... the Port of New Orleans (COTP New Orleans) is establishing a Moving Security Zone on the Mississippi river, mile marker 88.0 through mile marker 106.0, extending 300 yards on all sides of vessels being...

  16. 33 CFR 165.1405 - Regulated Navigation Areas and Security Zones; Designated Escorted Vessels-Philippine Sea and...

    Science.gov (United States)

    2010-07-01

    ... Security Zones; Designated Escorted Vessels-Philippine Sea and Apra Harbor, Guam (including Cabras Island... Areas and Security Zones; Designated Escorted Vessels-Philippine Sea and Apra Harbor, Guam (including... point of origin. (2) Apra Harbor, Guam—All waters from surface to bottom of Apra Harbor, Guam, shoreward...

  17. 33 CFR 165.1411 - Security zone; waters surrounding U.S. Forces vessel SBX-1, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. 165.1411 Section 165.1411 Navigation and Navigable Waters COAST GUARD... § 165.1411 Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. (a) Location. The following...

  18. Aspects with Program Analysis for Security Policies

    DEFF Research Database (Denmark)

    Yang, Fan

    with static program analysis techniques. The former technique can separate security concerns out of the main logic, and thus improves system modularity. The latter can analyze the system behavior, and thus helps detect software bugs or potential malicious code. We present AspectKE, an aspect......-oriented extensions based on KLAIM, followed by a discussion of open joinpoints that commonly exist in coordination languages such as KLAIM. Based on the idea of AspectKE, we design and implement a proof-of-concept programming language AspectKE*, which enables programmers to easily specify analysis-based security......Enforcing security policies to IT systems, especially for a mobile distributed system, is challenging. As society becomes more IT-savvy, our expectations about security and privacy evolve. This is usually followed by changes in regulation in the form of standards and legislation. In many cases...

  19. 6 CFR 27.235 - Alternative security program.

    Science.gov (United States)

    2010-01-01

    ....235 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.235 Alternative security program. (a) Covered... Tier 3 facilities may not submit an ASP in lieu of a Security Vulnerability Assessment. (b) The...

  20. Department of Defense: Observations on the National Industrial Security Program

    National Research Council Canada - National Science Library

    Barr, Ann C; Denomme, Thomas J; Booth, Brandon; Krump, John; Sloan, Karen; Slodkowski, Lillian; Sterling, Suzanne

    2008-01-01

    .... In terms of facility oversight, DSS maintained files on contractor facilities security programs and their security violations, but it did not analyze this information to determine, for example...

  1. 76 FR 70366 - Ammonium Nitrate Security Program

    Science.gov (United States)

    2011-11-14

    ... benefits of enabling AN Agents to provide AN Purchasers' identity verification information directly to... FURTHER INFORMATION CONTACT: Ammonium Nitrate Security Program Manager, U.S. Department of Homeland... additional information on public meeting facilities, information on access to those facilities for...

  2. Research Award: Agriculture and Food Security Program

    International Development Research Centre (IDRC) Digital Library (Canada)

    Office 2004 Test Drive User

    2015-08-06

    Research Award: Agriculture and Food Security. Program. Deadline: August 6, 2015. Please note that all applications must be submitted online. IDRC is one of the world's leaders in generating new knowledge to meet global challenges. We offer a number of research awards providing a unique opportunity to enhance ...

  3. Research Award: Agriculture and Food Security Program

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC CRDI

    2014-08-06

    Research Award: Agriculture and Food Security. Program. Deadline: August 6, 2014. Please note that all applications must be submitted online. IDRC is one of the world's leaders in generating new knowledge to meet global challenges. We offer a number of research awards providing a unique opportunity to enhance ...

  4. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy... submitted to the Information Security Oversight Office (ISOO) no later than Wednesday, March 17, 2010. ISOO... regulation 41 CFR 101-6, announcement is made for a meeting of the National Industrial Security Program...

  5. 49 CFR 1552.23 - Security awareness training programs.

    Science.gov (United States)

    2010-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  6. Cost-Benefit Analysis Methodology: Install Commercially Compliant Engines on National Security Exempted Vessels?

    Science.gov (United States)

    2015-11-05

    Carderock Division (NAVSSES), Machinery Research and Engineering Dept., Philadelphia, PA, USA. 2. Life Cycle Engineering, Federal Solutions Group , Energy...Federal Solutions Group , Energy Programs, Pittsburgh, PA, USA. 3. Alion Science and Technology, Industrial Engineering Division, Analysis Department...designation of Emission Control Area ( ECA ) now applies to all U.S. coasts. Within ECAs , all vessels, regardless of flag, are required to meet the

  7. Cooperative global security programs modeling & simulation.

    Energy Technology Data Exchange (ETDEWEB)

    Briand, Daniel

    2010-05-01

    The national laboratories global security programs implement sustainable technical solutions for cooperative nonproliferation, arms control, and physical security systems worldwide. To help in the development and execution of these programs, a wide range of analytical tools are used to model, for example, synthetic tactical environments for assessing infrastructure protection initiatives and tactics, systematic approaches for prioritizing nuclear and biological threat reduction opportunities worldwide, and nuclear fuel cycle enrichment and spent fuel management for nuclear power countries. This presentation will describe how these models are used in analyses to support the Obama Administration's agenda and bilateral/multinational treaties, and ultimately, to reduce weapons of mass destruction and terrorism threats through international technical cooperation.

  8. 76 FR 5729 - Department of Defense Personnel Security Program (PSP)

    Science.gov (United States)

    2011-02-02

    ... of the Secretary 32 CFR Part 156 Department of Defense Personnel Security Program (PSP) AGENCY... for the Department of Defense (DoD) Personnel Security Program (PSP) in accordance with the provisions... Department of Defense Directive (DoDD) 5200.2, Personnel Security Program (PSP), codified at 32 CFR 156, was...

  9. 15 CFR 2008.16 - Security education program.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Security education program. 2008.16... REPRESENTATIVE Safeguards § 2008.16 Security education program. (a) The Office of the Special Representative for... charged with the implementation of this security education program and shall issue detailed procedures for...

  10. Space Shuttle security policies and programs

    Science.gov (United States)

    Keith, E. L.

    1985-01-01

    The Space Shuttle vehicle consists of the orbiter, external tank, and two solid rocket boosters. In dealing with security two major protective categories are considered, taking into account resource protection and information protection. A review is provided of four basic programs which have to be satisfied. Aspects of science and technology transfer are discussed. The restrictions for the transfer of science and technology information are covered under various NASA Management Instructions (NMI's). There were two major events which influenced the protection of sensitive and private information on the Space Shuttle program. The first event was a manned space flight accident, while the second was the enactment of a congressional bill to establish the rights of privacy. Attention is also given to national resource protection and national defense classified operations.

  11. Nevada National Security Site Radiation Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2013-04-30

    Title 10 Code of Federal Regulations (CFR) Part 835, “Occupational Radiation Protection,” establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada National Security Site (NNSS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) operations, and environmental restoration off-site projects. This RPP section consists of general statements that are applicable to the NNSS as a whole. The RPP also includes a series of appendices which provide supporting detail for the associated NNSS Tennant Organizations (TOs). Appendix H, “Compliance Demonstration Table,” contains a cross-walk for the implementation of 10 CFR 835 requirements. This RPP does not contain any exemptions from the established 10 CFR 835 requirements. The RSPC and TOs are fully compliant with 10 CFR 835 and no additional funding is required in order to meet RPP commitments. No new programs or activities are needed to meet 10 CFR 835 requirements and there are no anticipated impacts to programs or activities that are not included in the RPP. There are no known constraints to implementing the RPP. No guides or technical standards are adopted in this RPP as a means to meet the requirements of 10 CFR 835.

  12. 78 FR 51192 - Secure Supply Chain Pilot Program

    Science.gov (United States)

    2013-08-20

    ... HUMAN SERVICES Food and Drug Administration Secure Supply Chain Pilot Program AGENCY: Food and Drug... the start of the Secure Supply Chain Pilot Program (SSCPP). The SSCPP is intended to assist FDA in its... Supply Chain Pilot Program Requirements To be selected to participate in the SSCPP, an applicant must...

  13. The Peculiarities of Teaching Secure Programming in High er School

    Directory of Open Access Journals (Sweden)

    Dmitriy Valerevich Gurov

    2015-03-01

    Full Text Available The ways of vulnerabilities occurrence in programs are considered. The classification of low level vulnerabilities is included. The methods of protection from such vulnerabilities are analyzed. The education methods for secure programming and the structure of electronic lesson to learn the basics of secure programming are presented.

  14. Firefighter's compressed air breathing system pressure vessel development program

    Science.gov (United States)

    Beck, E. J.

    1974-01-01

    The research to design, fabricate, test, and deliver a pressure vessel for the main component in an improved high-performance firefighter's breathing system is reported. The principal physical and performance characteristics of the vessel which were required are: (1) maximum weight of 9.0 lb; (2) maximum operating pressure of 4500 psig (charge pressure of 4000 psig); (3) minimum contained volume of 280 in. 3; (4) proof pressure of 6750 psig; (5) minimum burst pressure of 9000 psig following operational and service life; and (6) a minimum service life of 15 years. The vessel developed to fulfill the requirements described was completely sucessful, i.e., every category of performence was satisfied. The average weight of the vessel was found to be about 8.3 lb, well below the 9.0 lb specification requirement.

  15. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  16. Control Systems Security Test Center - FY 2004 Program Summary

    Energy Technology Data Exchange (ETDEWEB)

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  17. 78 FR 59706 - Secure Supply Chain Pilot Program; Correction

    Science.gov (United States)

    2013-09-27

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HEALTH AND HUMAN SERVICES Food and Drug Administration Secure Supply Chain Pilot Program; Correction AGENCY: Food...). The document announced the start of the Secure Supply Chain Pilot Program (SSCPP). The document was...

  18. 75 FR 18872 - Ginnie Mae Multiclass Securities Program Documents

    Science.gov (United States)

    2010-04-13

    ... URBAN DEVELOPMENT Ginnie Mae Multiclass Securities Program Documents AGENCY: Office of the Chief.... Copies of available documents submitted to OMB may be obtained from Mr. McKinney. SUPPLEMENTARY...: Ginnie Mae Multiclass Securities Program Documents. OMB Approval Number: 2503-0030. Form Numbers: None...

  19. DoD Industrial Security Program

    Science.gov (United States)

    1985-12-01

    case, the protective marking to be used wll be: Classification determination pending. Protect as though classified (CONFIDENTIAL. SCRET , or TOP SECRET...Communications Security CONUS Continental United States COR Central Office of Record COSMIC- TOP SECRET Property of NATO and Subject to Special Security...SlOP Single Integrated Operational Plan SFF Standard Practice Procedure(s) SSS Signature Security Service TO Transportation Officer (TS) TOP SECRET

  20. Nuclear Security Education Program at the Pennsylvania State University

    Energy Technology Data Exchange (ETDEWEB)

    Uenlue, Kenan [The Pennsylvania State University, Radiation Science and Engineering Center, University Park, PA 16802-2304 (United States); The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States); Jovanovic, Igor [The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States)

    2015-07-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  1. A primer: Social Security Act programs to assist the disabled.

    Science.gov (United States)

    This summary is designed for those who are unfamiliar with the many current features of federally sponsored disability and health programs under the Social Security Act, including the Social Security Disability Insurance (DI) program, the Supplemental Security Income (SSI) program, Medicare, and Medicaid. It provides an overview of the provisions and operations of the programs. Several SSA resources were consulted in compiling the material: Social Security Handbook (available at http://www.socialsecurity.gov/ OP_Home/handbook/handbook.html); Annual Statistical Supplement to the Social Security Bulletin, 2005 (available at http://www.socialsecurity.gov/policy/docs/statcomps/supplement/2005); Trends in the Social Security and Supplemental Security Income Disability Programs, by John Kearney and L. Scott Muller (available at http://www.socialsecurity.gov/policy/docs/chartbooks/disability trends); and Disability program sections of the Social Security Online Web pages (available at http://www.socialsecurity.gov/disability). This summary is intended to assist in understanding the features of these federal disability and health programs. The descriptions are intended for explanatory purposes and do not provide guidance in administrative or claimant actions.

  2. A DOCTORAL PROGRAM WITH SPECIALIZATION IN INFORMATION SECURITY A High Assurance Constructive Security Approach

    OpenAIRE

    Irvine, Cynthia E.; Levin, Timothy E.

    2003-01-01

    A doctoral program in computer science with a specialization in information security is described. The focus of the program is constructive security. Key elements of the program are the strong computer science core upon which it builds, coursework on the theory and principles of information assurance, and a unifying research project. The doctoral candidate is a member of the project team, whose research contributes to the goals of the project and to fundamental advancements in high assurance ...

  3. Designing of a Fleet-Leader Program for Carbon Composite Overwrapped Pressure Vessels

    Science.gov (United States)

    Murthy, Pappu L.N.; Phoenix, S. Leigh

    2009-01-01

    Composite Overwrapped Pressure Vessels (COPVs) are often used for storing pressurant gases on board spacecraft when mass saving is a prime requirement. Substantial weight savings can be achieved compared to all metallic pressure vessels. For example, on the space shuttle, replacement of all metallic pressure vessels with Kevlar COPVs resulted in a weight savings of about 30 percent. Mass critical space applications such as the Ares and Orion vehicles are currently being planned to use as many COPVs as possible in place of all-metallic pressure vessels to minimize the overall mass of the vehicle. Due to the fact that overwraps are subjected to sustained loads during long periods of a mission, stress rupture failure is a major concern. It is, therefore, important to ascertain the reliability of these vessels by analysis, since it is practically impossible to show by experimental testing the reliability of flight quality vessels. Also, it is a common practice to set aside flight quality vessels as "fleet leaders" in a test program where these vessels are subjected to slightly accelerated operating conditions so that they lead the actual flight vessels both in time and load. The intention of fleet leaders is to provide advanced warning if there is a serious design flaw in the vessels so that a major disaster in the flight vessels can be averted with advance warning. On the other hand, the accelerating conditions must be not so severe as to be prone to false alarms. The primary focus of the present paper is to provide an analytical basis for designing a viable fleet leader program for carbon COPVs. The analysis is based on a stress rupture behavior model incorporating Weibull statistics and power-law sensitivity of life to fiber stress level.

  4. 49 CFR 1546.105 - Acceptance of and amendments to the security program.

    Science.gov (United States)

    2010-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Security Program § 1546.105 Acceptance of and amendments to the security program. (a... 49 Transportation 9 2010-10-01 2010-10-01 false Acceptance of and amendments to the security...

  5. 49 CFR 1546.103 - Form, content, and availability of security program.

    Science.gov (United States)

    2010-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER SECURITY Security Program § 1546.103 Form, content, and availability of security program. (a... 49 Transportation 9 2010-10-01 2010-10-01 false Form, content, and availability of security...

  6. National Security Education Program: Background and Issues

    National Research Council Canada - National Science Library

    Kuenzi, Jeffrey J; Riddle, Wayne C

    2005-01-01

    ... knowledgeable about the languages and cultures of foreign nations, especially those which are of national security concern and have not traditionally been the focus of American interest and study...

  7. NNSA Program Develops the Next Generation of Nuclear Security Experts

    Energy Technology Data Exchange (ETDEWEB)

    Brim, Cornelia P.; Disney, Maren V.

    2015-09-02

    NNSA is fostering the next generation of nuclear security experts is through its successful NNSA Graduate Fellowship Program (NGFP). NGFP offers its Fellows an exceptional career development opportunity through hands-on experience supporting NNSA mission areas across policy and technology disciplines. The one-year assignments give tomorrow’s leaders in global nuclear security and nonproliferation unparalleled exposure through assignments to Program Offices across NNSA.

  8. Wireless Sensor Buoys for Perimeter Security of Military Vessels and Seabases

    Science.gov (United States)

    2015-12-01

    RELATED TECHNOLOGICAL APPLICATIONS ..................................14 1. Wireless Sensor Networks...methods to protect property and assets. Some critical facilities such as military bases, nuclear power plants , and borders have begun to...base, nuclear power plant , border, or other secured area” [1]. The concept of maintaining a secure perimeter is highly relevant in modern times

  9. 33 CFR 104.220 - Company or vessel personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... measures; (e) Crowd management and control techniques; (f) Security related communications; (g) Knowledge... duties must maintain a TWIC, and must have knowledge, through training or equivalent job experience, in the following, as appropriate: (a) Knowledge of current security threats and patterns; (b) Recognition...

  10. Leveraging Safety Programs to Improve and Support Security Programs

    Energy Technology Data Exchange (ETDEWEB)

    Leach, Janice [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Snell, Mark K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Pratt, R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sandoval, S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-10-01

    There has been a long history of considering Safety, Security, and Safeguards (3S) as three functions of nuclear security design and operations that need to be properly and collectively integrated with operations. This paper specifically considers how safety programmes can be extended directly to benefit security as part of an integrated facility management programme. The discussion will draw on experiences implementing such a programme at Sandia National Laboratories’ Annular Research Reactor Facility. While the paper focuses on nuclear facilities, similar ideas could be used to support security programmes at other types of high-consequence facilities and transportation activities.

  11. 76 FR 17782 - Security Zone: Passenger Vessels, Sector Southeastern New England Captain of the Port Zone

    Science.gov (United States)

    2011-03-31

    ... evaluate its effects on them and participate in the rulemaking process. If you think your small business or... will not restrict any waterway for a long period of time. The vast majority of passenger vessel... would have a significant economic impact on a substantial number of small entities. The term ``small...

  12. 76 FR 47996 - Security Zone; 2011 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, WA; Correction

    Science.gov (United States)

    2011-08-08

    ... (NCSM 702), CCGS SIYAY, and the USCGC ALERT (WMEC 630) which include all waters within 500 yards from... (NCSM 702), CCGS SIYAY, and the USCGC ALERT (WMEC 630) while these vessels are participating in the... within 500 yards of the HMCS WHITEHORSE (NCSM 705), HMCS NANAIMO (NCSM 702), CCGS SIYAY, and the USCGC...

  13. 77 FR 44475 - Security Zones; Seattle's Seafair Fleet Week Moving Vessels, Puget Sound, WA

    Science.gov (United States)

    2012-07-30

    ... Vessels, Puget Sound, WA AGENCY: Coast Guard, DHS. ACTION: Notice of enforcement of regulation. SUMMARY... Anthony P. LaBoy, Sector Puget Sound, Waterways Management Division, U.S. Coast Guard; telephone 206-217-6323, email SectorPugetSound[email protected] . If you have questions on viewing the docket, call Renee V...

  14. Hardware-Assisted System for Program Execution Security of SOC

    Directory of Open Access Journals (Sweden)

    Wang Xiang

    2016-01-01

    Full Text Available With the rapid development of embedded systems, the systems’ security has become more and more important. Most embedded systems are at the risk of series of software attacks, such as buffer overflow attack, Trojan virus. In addition, with the rapid growth in the number of embedded systems and wide application, followed embedded hardware attacks are also increasing. This paper presents a new hardware assisted security mechanism to protect the program’s code and data, monitoring its normal execution. The mechanism mainly monitors three types of information: the start/end address of the program of basic blocks; the lightweight hash value in basic blocks and address of the next basic block. These parameters are extracted through additional tools running on PC. The information will be stored in the security module. During normal program execution, the security module is designed to compare the real-time state of program with the information in the security module. If abnormal, it will trigger the appropriate security response, suspend the program and jump to the specified location. The module has been tested and validated on the SOPC with OR1200 processor. The experimental analysis shows that the proposed mechanism can defence a wide range of common software and physical attacks with low performance penalties and minimal overheads.

  15. Ensuring Secure Non-interference of Programs by Game Semantics

    DEFF Research Database (Denmark)

    Dimovski, Aleksandar

    Non-interference is a security property which states that improper information leakages due to direct and indirect flows have not occurred through executing programs. In this paper we investigate a game semantics based formulation of non-interference that allows to perform a security analysis...... of closed and open procedural programs. We show that such formulation is amenable to automated verification techniques. The practicality of this method is illustrated by several examples, which also emphasize its advantage compared to known operational methods for reasoning about open programs....

  16. Managing Food Security Action Programs in Botswana

    OpenAIRE

    Asefa, Sisay

    1989-01-01

    In its 1986 study of poverty and hunger, the World Bank defined food security as “assess by all people at all times to enough food for active and healthy life.” Based on this definition, about a quarter of Africa’s population or more than 100 million people are food insecure, i.e., do not consume enough food to allow for an active and healthy working life. In seven countries, Ethiopia, Zaire, Uganda, Mozambique, Zambia, and Somalia, about 40% of the population are food insecure, constituting ...

  17. 75 FR 26171 - Cyber Security Certification Program

    Science.gov (United States)

    2010-05-11

    ... technologies or other Internet mechanisms, thereby undermining the integrity of the Internet. There are also... Institute of Standards and Technology (NIST) has reached out to, and is using, private sector expertise to..., advantages, disadvantages and costs of this program. For example, in proposing this program, the Commission...

  18. A Quantitative Study on the Relationship of Information Security Policy Awareness, Enforcement, and Maintenance to Information Security Program Effectiveness

    Science.gov (United States)

    Francois, Michael T.

    2016-01-01

    Today's organizations rely heavily on information technology to conduct their daily activities. Therefore, their information security systems are an area of heightened security concern. As a result, organizations implement information security programs to address and mitigate that concern. However, even with the emphasis on information security,…

  19. AProSec: an Aspect for Programming Secure Web Applications

    OpenAIRE

    Hermosillo, Gabriel; Gomez, Roberto; Seinturier, Lionel; Duchien, Laurence

    2007-01-01

    International audience; Adding security functions in existing Web application servers is now vital for the IS of companies and organizations. Writing crosscutting functions in complex software should take advantage of the modularity offered by new software development approaches. With Aspect-Oriented Programming (AOP), separating concerns when designing an application fosters reuse, parameterization and maintenance. In this paper, we design a security aspect called AProSec for detecting SQL i...

  20. Creation of security engineering programs by the Southwest Surety Institute

    Science.gov (United States)

    Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn

    1998-12-01

    The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.

  1. A flexible framework for secure and efficient program obfuscation.

    Energy Technology Data Exchange (ETDEWEB)

    Solis, John Hector

    2013-03-01

    In this paper, we present a modular framework for constructing a secure and efficient program obfuscation scheme. Our approach, inspired by the obfuscation with respect to oracle machines model of [4], retains an interactive online protocol with an oracle, but relaxes the original computational and storage restrictions. We argue this is reasonable given the computational resources of modern personal devices. Furthermore, we relax the information-theoretic security requirement for computational security to utilize established cryptographic primitives. With this additional flexibility we are free to explore different cryptographic buildingblocks. Our approach combines authenticated encryption with private information retrieval to construct a secure program obfuscation framework. We give a formal specification of our framework, based on desired functionality and security properties, and provide an example instantiation. In particular, we implement AES in Galois/Counter Mode for authenticated encryption and the Gentry-Ramzan [13]constant communication-rate private information retrieval scheme. We present our implementation results and show that non-trivial sized programs can be realized, but scalability is quickly limited by computational overhead. Finally, we include a discussion on security considerations when instantiating specific modules.

  2. HASP - The High Assurance Security Program

    OpenAIRE

    Naval Postgraduate School (U.S.); Center for Information Systems Studies Security and Research (CISR)

    2011-01-01

    This program provides a unifying conceptual framework and management structure for long range planning and coordination of focused Information Assurance research projects. The primary program goal is to support the strengthening of assurance provided by the National Information Infrastructure. Our approach includes the research and development of high assurance networks, systems, components and tools, and the open dissemination of outputs from those efforts, such as code and documentation.

  3. 77 FR 30400 - Moving Security Zone Around Escorted Vessels on the Lower Mississippi River

    Science.gov (United States)

    2012-05-23

    ... deemed by the COTP New Orleans to require escort protection during transit between mile marker 90.0 to... the Port of New Orleans (COTP New Orleans) is re-establishing and extending the effective period for the moving security zone on the Mississippi river, mile marker 90 through mile marker 110, extending...

  4. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Science.gov (United States)

    2010-10-01

    ... responsible for the information security program. 8.3 Section 8.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL NATIONAL SECURITY INFORMATION § 8.3 Senior FEMA official responsible for the information security program. The Director of the Security...

  5. Employment of individuals in the Social Security disability programs.

    Science.gov (United States)

    O'Leary, Paul; Livermore, Gina A; Stapleton, David C

    2011-01-01

    The articles in this special issue present findings from research on the employment and work-related activities of individuals receiving benefits through the Social Security Disability Insurance and Supplemental Security Income programs, and on the factors that hinder their efforts to work at levels that lead to exiting the disability rolls. This article introduces the other articles, highlights their important findings, and discusses the implications for ongoing efforts to increase the earnings and self-sufficiency of these beneficiaries, such as the Ticket to Work program and the Benefit Offset National Demonstration.

  6. Building effective cybersecurity programs a security manager's handbook

    CERN Document Server

    Schreider, Tari

    2017-01-01

    You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager's Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program.

  7. An Undergraduate Information Security Program: More than a Curriculum

    Science.gov (United States)

    Woodward, Belle; Imboden, Thomas; Martin, Nancy L.

    2013-01-01

    This paper describes the implementation of an information security program at a large Midwestern university. The initial work is briefly summarized and improvements that have occurred over time are described. Current activities and future plans are discussed. This paper offers insight and lessons learned for organizations that have or are…

  8. Supporting secure programming in web applications through interactive static analysis.

    Science.gov (United States)

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2014-07-01

    Many security incidents are caused by software developers' failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.

  9. Supporting secure programming in web applications through interactive static analysis

    Directory of Open Access Journals (Sweden)

    Jun Zhu

    2014-07-01

    Full Text Available Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.

  10. A Domain-Specific Programming Language for Secure Multiparty Computation

    DEFF Research Database (Denmark)

    Nielsen, Janus Dam; Schwartzbach, Michael Ignatieff

    2007-01-01

    We present a domain-specific programming language for Secure Multiparty Computation (SMC). Information is a resource of vital importance and considerable economic value to individuals, public administration, and private companies. This means that the confidentiality of information is crucial, but...... application development. The language is implemented in a prototype compiler that generates Java code exploiting a distributed cryptographic runtime....

  11. Research Awards: Agriculture and Food Security program Deadline ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Jean-Claude Dumais

    Research Awards: Agriculture and Food Security program. Deadline: 12 September 2012. Please note that all applications must be sent electronically. IDRC's Research Awards are a unique opportunity for master's and doctoral-level students, as well as recent graduates to enhance their research skills and gain a fresh ...

  12. Cyber Security Testing and Training Programs for Industrial Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  13. Supplemental nutrition assistance program participation and child food security.

    Science.gov (United States)

    Mabli, James; Worthington, Julie

    2014-04-01

    This article investigates the association between Supplemental Nutrition Assistance Program (SNAP) participation and child food security by using data from the largest national survey of the food security of SNAP participants to date. The analysis used a survey of nearly 3000 households with children and a quasi-experimental research design that consisted of 2 sets of comparisons. Using a cross-sectional sample, we compared information collected from SNAP households within days of program entry with information collected from a contemporaneous sample of SNAP households that had participated for ∼6 months. Next, by using a longitudinal sample, we compared baseline information collected from new-entrant SNAP households with information from those same households 6 months later. Multivariate logistic regression analysis was used to estimate associations between SNAP and child food security. SNAP participation was associated with an approximately one-third decrease in the odds of children being food insecure in both samples. In the cross-sectional analysis only, SNAP was also associated with a decrease in the odds of children experiencing severe food insecurity (designated very low food security). Findings were qualitatively robust to different empirical specifications. After controlling for other possible confounders, we found children in households that had participated in SNAP for 6 months experienced improvements in food security. On the basis of these findings, we conclude SNAP serves a vital role in improving the health and well-being of low-income children by increasing food security. Future research is needed to determine whether specific groups of children experience differential improvements in food security.

  14. 75 FR 82037 - National Protection and Programs Directorate; President's National Security Telecommunications...

    Science.gov (United States)

    2010-12-29

    ... Doc No: 2010-32709] DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0050] National Protection and Programs Directorate; President's National Security Telecommunications Advisory Committee AGENCY: National... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC...

  15. A Constraint Programming model for fast optimal stowage of container vessel bays

    DEFF Research Database (Denmark)

    Delgado, Alberto; Jensen, Rune Møller; Janstrup, Kira

    2012-01-01

    planning phase that distributes the containers to bay sections and a slot planning phase that assigns containers of each bay section to slots. In this paper, we focus on the slot planning phase of this approach and present a Constraint Programming and Integer Programming model for stowing a set......Container vessel stowage planning is a hard combinatorial optimization problem with both high economic and environmental impact. We have developed an approach that often is able to generate near-optimal plans for large container vessels within a few minutes. It decomposes the problem into a master...... of containers in a single bay section. This so-called slot planning problem is NP-hard and often involves stowing several hundred containers. Using state-of-the-art constraint solvers and modeling techniques, however, we were able to solve 90% of 236 real instances from our industrial collaborator to optimality...

  16. Developing Autonomic and Secure Virtual Organisations with Chemical Programming

    Science.gov (United States)

    Arenas, Alvaro E.; Banâtre, Jean-Pierre; Priol, Thierry

    This paper studies the development of autonomic and secure Virtual Organisations (VOs) when following the chemical-programming paradigm. We have selected the Higher-Order Chemical Language (HOCL) as the representative of the chemical paradigm, due mainly to its generality, its implicit autonomic property, and its potential application to emerging computing paragidms such as Grid computing and service computing. We have advocated the use of aspect-oriented techniques, where autonomicity and security can be seen as cross-cutting concerns impacting the whole system. We show how HOCL can be used to model VOs, exemplified by a VO system for the generation of digital products. We develop patterns for HOCL, including patterns for traditional security properties such as authorisation and secure logs, as well as autonomic properties such as self-protection and self-healing. The patterns are applied to HOCL programs following an aspect-oriented approach, where aspects are modelled as transformation functions that add to a program a cross-cutting concern.

  17. 76 FR 9041 - Intent To Request Approval From OMB of One New Public Collection of Information: Security Program...

    Science.gov (United States)

    2011-02-16

    ... SECURITY Transportation Security Administration Intent To Request Approval From OMB of One New Public Collection of Information: Security Program for Hazardous Materials Motor Carriers & Shippers AGENCY: Transportation Security Administration, DHS. ACTION: 60 Day Notice. SUMMARY: The Transportation Security...

  18. 49 CFR 1540.301 - Withdrawal of approval of a security program.

    Science.gov (United States)

    2010-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION... withdrawal. If TSA finds that there is an emergency with respect to aviation security requiring immediate... 49 Transportation 9 2010-10-01 2010-10-01 false Withdrawal of approval of a security program. 1540...

  19. 20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.

    Science.gov (United States)

    2010-04-01

    ... Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the related forms prescribed by the Social Security Administration for use by the public in applying for...

  20. Employment among Social Security disability program beneficiaries, 1996-2007.

    Science.gov (United States)

    Mamun, Arif; O'Leary, Paul; Wittenburg, David C; Gregory, Jesse

    2011-01-01

    We use linked administrative data from program and earnings records to summarize the 2007 employment rates of Social Security disability program beneficiaries at the national and state levels, as well as changes in employment since 1996. The findings provide new information on the employment activities of beneficiaries that should be useful in assessing current agency policies and providing benchmarks for ongoing demonstration projects and future return-to-work initiatives. The overall employment rate--which we define as annual earnings over $1,000--was 12 percent in 2007. Substantial variation exists within the population. Disability Insurance beneficiaries and those younger than age 40 were much more likely to work relative to other Social Security beneficiaries. Additionally, substantial regional variation exists across states; employment rates ranged from 7 percent (West Virginia) to 23 percent (North Dakota). Moreover, we find that the employment rates among beneficiaries were sensitive to the business cycle and persistent over time.

  1. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  2. 76 FR 30954 - Notification of the Imposition of Conditions of Entry for Certain Vessels Arriving to the United...

    Science.gov (United States)

    2011-05-27

    ... each access point to the ship is guarded by armed, private security guards and that they have total... SECURITY Coast Guard Notification of the Imposition of Conditions of Entry for Certain Vessels Arriving to... Security tab; International Port Security Program (ISPS Code); Port Security Advisory link. FOR FURTHER...

  3. 77 FR 53901 - Notification of the Imposition of Conditions of Entry for Certain Vessels Arriving to the United...

    Science.gov (United States)

    2012-09-04

    ... armed, private security guards and that they have total visibility of the exterior (both landside and... SECURITY Coast Guard Notification of the Imposition of Conditions of Entry for Certain Vessels Arriving to....mil under the Maritime Security tab; International Port Security Program (ISPS Code); Port Security...

  4. Carboy Security Testing and Training Programs for Industrial Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Noyes, Daniel [Idaho National Laboratory, Idaho (United States)

    2012-03-15

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These training vary from web-based cyber security training for control systems engineers to more advanced hands-on training that culminates with a Red Team/Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  5. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    Science.gov (United States)

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  6. Evaluation of a Secure Laptop-Based Testing Program in an Undergraduate Nursing Program: Students' Perspective.

    Science.gov (United States)

    Tao, Jinyuan; Gunter, Glenda; Tsai, Ming-Hsiu; Lim, Dan

    2016-01-01

    Recently, the many robust learning management systems, and the availability of affordable laptops, have made secure laptop-based testing a reality on many campuses. The undergraduate nursing program at the authors' university began to implement a secure laptop-based testing program in 2009, which allowed students to use their newly purchased laptops to take quizzes and tests securely in classrooms. After nearly 5 years' secure laptop-based testing program implementation, a formative evaluation, using a mixed method that has both descriptive and correlational data elements, was conducted to seek constructive feedback from students to improve the program. Evaluation data show that, overall, students (n = 166) believed the secure laptop-based testing program helps them get hands-on experience of taking examinations on the computer and gets them prepared for their computerized NCLEX-RN. Students, however, had a lot of concerns about laptop glitches and campus wireless network glitches they experienced during testing. At the same time, NCLEX-RN first-time passing rate data were analyzed using the χ2 test, and revealed no significant association between the two testing methods (paper-and-pencil testing and the secure laptop-based testing) and students' first-time NCLEX-RN passing rate. Based on the odds ratio, however, the odds of students passing NCLEX-RN the first time was 1.37 times higher if they were taught with the secure laptop-based testing method than if taught with the traditional paper-and-pencil testing method in nursing school. It was recommended to the institution that better quality of laptops needs to be provided to future students, measures needed to be taken to further stabilize the campus wireless Internet network, and there was a need to reevaluate the Laptop Initiative Program.

  7. Report: Fiscal Year 2015 Federal Information Security Modernization Act Report: Status of CSB’s Information Security Program

    Science.gov (United States)

    Report #16-P-0086, January 27, 2016. The effectiveness of the CSB’s information security program is challenged by its lack of personal identity verification cards for logical access, complete system inventory.

  8. Report: Fiscal Year 2006 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #2006-S-00008, September 25, 2006. Although the Agency has made substantial progress to improve its security program, the OIG identified weaknesses in the Agency’s incident reporting practices.

  9. 46 CFR 71.50-15 - Description of the Alternative Hull Examination (AHE) Program for certain passenger vessels.

    Science.gov (United States)

    2010-10-01

    ... hull examination. If the vessel is already participating in the program or if a remotely operated vehicle (ROV) is used during the program, the preliminary exam step may be omitted. Once you complete... underwater survey portion of the examination process, you may receive credit for a period of time such that...

  10. 46 CFR 115.620 - Description of the Alternative Hull Examination (AHE) Program for certain passenger vessels.

    Science.gov (United States)

    2010-10-01

    ... hull examination. If the vessel is already participating in the program or if a remotely operated vehicle (ROV) is used during the program, the preliminary exam step may be omitted. Once you complete... underwater survey portion of the examination process, you may receive credit for a period of time such that...

  11. Report: EPA’s National Security Information Program Could Be Improved

    Science.gov (United States)

    Report #12-P-0543, June 18, 2012. Under its classified NSI program, EPA has assigned responsibilities and provided guidance, training, and oversight. EPA program offices provide secure equipment and space, following NSI program specifications.

  12. Augmenting Space Technology Program Management with Secure Cloud & Mobile Services

    Science.gov (United States)

    Hodson, Robert F.; Munk, Christopher; Helble, Adelle; Press, Martin T.; George, Cory; Johnson, David

    2017-01-01

    The National Aeronautics and Space Administration (NASA) Game Changing Development (GCD) program manages technology projects across all NASA centers and reports to NASA headquarters regularly on progress. Program stakeholders expect an up-to-date, accurate status and often have questions about the program's portfolio that requires a timely response. Historically, reporting, data collection, and analysis were done with manual processes that were inefficient and prone to error. To address these issues, GCD set out to develop a new business automation solution. In doing this, the program wanted to leverage the latest information technology platforms and decided to utilize traditional systems along with new cloud-based web services and gaming technology for a novel and interactive user environment. The team also set out to develop a mobile solution for anytime information access. This paper discusses a solution to these challenging goals and how the GCD team succeeded in developing and deploying such a system. The architecture and approach taken has proven to be effective and robust and can serve as a model for others looking to develop secure interactive mobile business solutions for government or enterprise business automation.

  13. 45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject only...

  14. Case Study: Creation of a Degree Program in Computer Security. White Paper.

    Science.gov (United States)

    Belon, Barbara; Wright, Marie

    This paper reports on research into the field of computer security, and undergraduate degrees offered in that field. Research described in the paper reveals only one computer security program at the associate's degree level in the entire country. That program, at Texas State Technical College in Waco, is a 71-credit-hour program leading to an…

  15. DATA Act File B Object Class and Program Activity - Social Security

    Data.gov (United States)

    Social Security Administration — The DATA Act Information Model Schema Reporting Submission Specification File B. File B includes the agency object class and program activity detail obligation and...

  16. 5 CFR 930.301 - Information systems security awareness training program.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems § 930.301 Information systems security awareness training program. Each Executive Agency must develop a...

  17. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-12-18

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM))--Match Number 1307 AGENCY: Social Security Administration. ACTION...

  18. Social Security Programs Throughout the World: Africa, 2015

    Data.gov (United States)

    Social Security Administration — This report, which is part of a four-volume series, provides a cross-national comparison of the social security systems in 48 countries in Africa. It summarizes the...

  19. 75 FR 69693 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2010-11-15

    ...-0086] Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...-2182), Privacy Officer, National Protection and Programs Directorate, Department of Homeland Security... Privacy Act protections to all individuals where systems of records maintain information on U.S. citizens...

  20. 76 FR 28315 - Security Zone; Vessels Carrying Hazardous Cargo, Sector Columbia River Captain of the Port Zone

    Science.gov (United States)

    2011-05-17

    ... cargoes include, but are not limited to, liquefied petroleum gas, ammonium nitrate and associated mixtures... Department of Homeland Security Management Directive 023-01 and Commandant Instruction M16475.lD, which guide...

  1. 75 FR 76328 - Security Zone; Vessels Carrying Hazardous Cargo, Sector Columbia River Captain of the Port Zone

    Science.gov (United States)

    2010-12-08

    ... to, liquefied petroleum gas, ammonium nitrate and associated mixtures, anhydrous ammonia, and... of Homeland Security Management Directive 023-01 and Commandant Instruction M16475.1D, which guide...

  2. 50 CFR 648.82 - Effort-control program for NE multispecies limited access vessels.

    Science.gov (United States)

    2010-10-01

    ... end according to the DAS rules specified in § 648.10(e)(5)(iv). (f) Good Samaritan credit. See § 648... replacement rules, the vessel owner could choose to adopt the larger baseline of the two vessels, which would... restrictive differential DAS counting factor derived from paragraph (n)(1)(ii) of this section for the sub...

  3. A Constraint Programming Model for Fast Optimal Stowage of Container Vessel Bays

    DEFF Research Database (Denmark)

    Delgado-Ortegon, Alberto; Jensen, Rune Møller; Janstrup, Kira

    2012-01-01

    Container vessel stowage planning is a hard combinatorial optimization problem with both high economic and environmental impact. We have developed an approach that often is able to generate near-optimal plans for large container vessels within a few minutes. It decomposes the problem into a maste...

  4. Handbook of space security policies, applications and programs

    CERN Document Server

    Hays, Peter; Robinson, Jana; Moura, Denis; Giannopapa, Christina

    2015-01-01

    Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the maintenance of space (in particular the earth orbits) as safe and secure areas for conducting peaceful activities. The two aspects can be summarized as "space for security on earth" and “the safeguarding of space for peaceful endeavors.” The Handbook will provide a sophisticated, cutting-edge resource on the space security policy portfolio and the associated assets, assisting fellow members of the global space community and other interested policy-making and academic audiences in keeping abreast of the current and future directions of this vital dimension of international space policy. The debate on coordinated space security measures, including relevant 'Transparency and Confidence-Building Measures,' remains at a relatively early stage of development. The book offers a comprehensive description of the variou...

  5. Scaling Concolic Execution of Binary Programs for Security Applications

    Science.gov (United States)

    2013-08-01

    execution. We also study unexplored applications of concolic execution in security-related problems such as malware genealogy and protocol model inference...tions of concolic execution. We also study unexplored applications of con- colic execution in security-related problems such as malware genealogy and...discovery and signature generation. We then study further unexplored uses of concolic execution in security-related problems such as malware genealogy

  6. 49 CFR 1548.7 - Approval, amendment, annual renewal, and withdrawal of approval of the security program.

    Science.gov (United States)

    2010-10-01

    ... SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.7 Approval, amendment, annual renewal... an emergency requiring immediate action, with respect to aviation security that makes procedures in... withdrawal of approval of the security program. 1548.7 Section 1548.7 Transportation Other Regulations...

  7. INFORMATION SECURITY RISKS OPTIMIZATION IN CLOUDY SERVICES ON THE BASIS OF LINEAR PROGRAMMING

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2013-01-01

    Full Text Available The paper discusses theoretical aspects of secure cloud services creation for information processing of various confidentiality degrees. A new approach to the reasoning of information security composition in distributed computing structures is suggested, presenting the problem of risk assessment as an extreme problem of decisionmaking. Linear programming method application is proved to minimize the risk of information security for given performance security in compliance with the economic balance for the maintenance of security facilities and cost of services. An example is given to illustrate the obtained theoretical results.

  8. 77 FR 2741 - Draft Guidance Regarding Inspection and Certification of Vessels Under the Maritime Security Program

    Science.gov (United States)

    2012-01-19

    ..., which will then become highlighted in blue. In the ``Document Type'' drop down menu, select ``Notices... unbound format, no larger than 8\\1/2\\ by 11 inches, suitable for copying and electronic filing. If you... can search the electronic form of comments received into any of our dockets by the name of the...

  9. Report: EPA’s Information Security Program Is Established, but Improvements Are Needed to Strengthen Its Processes

    Science.gov (United States)

    Report #18-P-0031, October 30, 2017. Although the EPA has an effective information security program, management emphasis is needed to achieve a higher level of maturity for the agency’s information security program.

  10. Human and organizational factors in implementing a security program for dams and powerhouses

    Energy Technology Data Exchange (ETDEWEB)

    Cattanach, D.; Stanley, P. [BC Hydro, Burnaby, BC (Canada)

    2009-07-01

    This paper discussed issues related to the implementation of a security program for dams and powerhouses owned by BC Hydro. The program was developed as a result of increased threats and acts of theft and vandalism involving the utility's assets. A system-wide security risk assessment was conducted before the development of a multi-year program designed to reduce security risk. The security program included policy and guideline development, implementation, monitoring, and response components. A security perimeter was defined for dam facilities in order to control access, detect, and assess unauthorized entries. Emergency response plans were also reviewed. The study demonstrated that organizational, human, and technical factors play a significant role in security breaches at generation sites. The program included a homes for gnomes program, in which a garden gnome was left at a critical asset as an indicator that the site had been successfully penetrated by personnel unknown to the site. The program is intended to ensure that generation facilities will benefit from safer and more secure working environments. 6 figs.

  11. How to implement security controls for an information security program at CBRN facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lenaeus, Joseph D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); O' Neil, Lori Ross [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Leitch, Rosalyn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Glantz, Clifford S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Landine, Guy P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bryant, Janet L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, John [National Nuclear Lab., Workington (United Kingdom); Mathers, Gemma [National Nuclear Lab., Workington (United Kingdom); Rodger, Robert [National Nuclear Lab., Workington (United Kingdom); Johnson, Christopher [National Nuclear Lab., Workington (United Kingdom)

    2015-12-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  12. Unimak Pass vessel analysis. Social and economic studies program technical report number 108. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Gibson, K.; Cook, P.; Pederson, J.; Hennigh, G.

    1984-09-01

    The report identifies present and future marine traffic and related characteristics of vessels using Unimak Pass. Present and future vessel traffic estimates through the year 2000 are developed for four categories: fishing; natural resources; commercial shipping; and Outer Continental Shelf (OCS) activities. Total annual vessel traffic for the year 2000 is estimated to increase approximately 100% over the base year from approximately 2290 trips to 4600 trips in 2000. The report assesses the impact, i.e., increase in collisions, of additional vessel traffic using Unimak Pass as a result of future OCS activities in northern and western Alaska. The OCS traffic almost doubles the likelihood of a collision in the pass by the year 2000. The collision rate in the Pass without OCS activity is estimated at one collision every 57 years, while the collision rate with OCS activity is estimated at one collision every 33 years in the year 2000.

  13. 77 FR 6013 - Moving Security Zone Around Escorted Vessels On the Lower Mississippi River Between Mile Marker...

    Science.gov (United States)

    2012-02-07

    ... Lower Mississippi River Between Mile Marker 90.0 Above Head of Passes to Mile Marker 110.0 Above Head of Passes AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Captain of the Port of New Orleans (COTP New Orleans) has established moving security zones on the Mississippi River, from mile...

  14. An Enterprise Security Program and Architecture to Support Business Drivers

    Directory of Open Access Journals (Sweden)

    Brian Ritchot

    2013-08-01

    Full Text Available This article presents a business-focused approach to developing and delivering enterprise security architecture that is focused on enabling business objectives while providing a sensible and balanced approach to risk management. A balanced approach to enterprise security architecture can create the important linkages between the goals and objectives of a business, and it provides appropriate measures to protect the most critical assets within an organization while accepting risk where appropriate. Through a discussion of information assurance, this article makes a case for leveraging enterprise security architectures to meet an organizations' need for information assurance. The approach is derived from the Sherwood Applied Business Security Architecture (SABSA methodology, as put into practice by Seccuris Inc., an information assurance integrator. An understanding of Seccuris’ approach will illustrate the importance of aligning security activities with high-level business objectives while creating increased awareness of the duality of risk. This business-driven approach to enterprise security architecture can help organizations change the perception of IT security, positioning it as a tool to enable and assure business success, rather than be perceived as an obstacle to be avoided.

  15. Zero based programming: a viable security budgeting approach.

    Science.gov (United States)

    Roll, Frederick G

    2003-01-01

    To get additional dollars or avoid budget cuts or personnel reductions, healthcare security directors should consider a budget approach that best justifies the needs of the department or organization.

  16. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Crawford,C.; de Boer,G.; De Castro, K; Landers, Ph.D., J; Rogers, E

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." This paper will describe some of the key elements of a comprehensive, sustainable nuclear security culture enhancement program and how implementation can mitigate the insider threat.

  17. An Enterprise Security Program and Architecture to Support Business Drivers

    OpenAIRE

    Brian Ritchot

    2013-01-01

    This article presents a business-focused approach to developing and delivering enterprise security architecture that is focused on enabling business objectives while providing a sensible and balanced approach to risk management. A balanced approach to enterprise security architecture can create the important linkages between the goals and objectives of a business, and it provides appropriate measures to protect the most critical assets within an organization while accepting risk where appropr...

  18. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    Energy Technology Data Exchange (ETDEWEB)

    Madden, Michael S.

    2010-05-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  19. U.S.-Brazil Security Cooperation and the State Partnership Program

    Science.gov (United States)

    2015-06-01

    AU/ACSC/MIKAELSEN, D/AY15 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY U.S.- BRAZIL SECURITY COOPERATION AND THE STATE PARTNERSHIP...8 C. Security Cooperation with Brazil ...began as a question of basically why Brazil does not have a State Partnership Program with the National Guard and that being the case, how could it

  20. 76 FR 55693 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2011-09-08

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security National Protection... contact: Emily Andrew (703-235-2182), Privacy Officer, National Protection and Programs Directorate... policy, DHS extends administrative Privacy Act protections to all individuals where systems of records...

  1. 75 FR 4911 - Food Stamp Program: Eligibility and Certification Provisions of the Farm Security and Rural...

    Science.gov (United States)

    2010-01-29

    ... and Certification Provisions of the Farm Security and Rural Investment Act of 2002 AGENCY: Food and... Agriculture Food and Nutrition Service 7 CFR Parts 272 and 273 Food Stamp Program: Eligibility and Certification Provisions of the Farm Security and Rural Investment Act of 2002; Final Rule #0;#0;Federal...

  2. 46 CFR 8.545 - Scope of inspection for enrolled vessels.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Scope of inspection for enrolled vessels. 8.545 Section 8.545 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC VESSEL INSPECTION ALTERNATIVES Streamlined Inspection Program § 8.545 Scope of inspection for enrolled...

  3. Building a National Security Program at a Small School: Identifying Opportunities and Overcoming Challenges

    Science.gov (United States)

    Grossman, Michael; Schortgen, Francis

    2016-01-01

    This article offers insights into the overall program development process and--institutional obstacles and constraints notwithstanding--successful introduction of a new national security program at a small liberal arts university at a time of growing institutional prioritization of science, technology, engineering, and mathematics (STEM) programs.…

  4. Security, Dignity, Caring Relationships, and Meaningful Work: Needs Motivating Participation in a Job-Training Program

    Science.gov (United States)

    Ayers, David F.; Miller-Dyce, Cherrel; Carlone, David

    2008-01-01

    Researchers asked 17 participants in a job-training program to describe their personal struggles following an economic restructuring. Examined through a critical theoretical lens, findings indicate that the learners enrolled in the program to reclaim security, dignity, meaningful work, and caring relationships. Program planners at community…

  5. Report: EPA Improved Its National Security Information Program, but Some Improvements Still Needed

    Science.gov (United States)

    Report #16-P-0196, June 2, 2016. The EPA will continue to improve its national security information program by completing information classification guides that can be used uniformly and consistently throughout the agency.

  6. 49 CFR 1549.5 - Adoption and implementation of the security program.

    Science.gov (United States)

    2010-10-01

    ... transportation against acts of criminal violence and air piracy and against the introduction into the aircraft of... instructions, at its facility. An electronic version is adequate. (3) Make a copy of the security program...

  7. Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols

    NARCIS (Netherlands)

    Pettorossi, Alberto; Delzanno, Giorgio; Etalle, Sandro

    We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder

  8. 75 FR 17305 - National Industrial Security Program Directive No. 1

    Science.gov (United States)

    2010-04-06

    ... U.S.C. 2011, et seq.), or the authority of the Director of National Intelligence under the National Security Act of 1947, as amended, E.O. 12333, December 8, 1981, and the Intelligence Reform and Terrorism... amendments to the rule, but all three also submitted suggested language changes to address perceived clarity...

  9. A Constraint Programming Model for Fast Optimal Stowage of Container Vessel Bays

    DEFF Research Database (Denmark)

    Delgado-Ortegon, Alberto; Jensen, Rune Møller; Janstrup, Kira

    Container vessel stowage is a combinatorial optimization problem with both high economic and environmental impact. The most successful approaches to tackle this problem use hierarchical decompositions in which the sub-problems of these decompositions assign containers to slots in individual vesse...

  10. 10 CFR Appendix H to Part 50 - Reactor Vessel Material Surveillance Program Requirements

    Science.gov (United States)

    2010-01-01

    ... vessel. These data will be used as described in section IV of appendix G to part 50. ASTM E 185-73, “Standard Recommended Practice for Surveillance Tests for Nuclear Reactor Vessels”; ASTM E 185-79, “Standard Practice for Conducting Surveillance Tests for Light-Water Cooled Nuclear Power Reactor Vessels”; and ASTM...

  11. Vessel Operating Units (Vessels)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains data for vessels that are greater than five net tons and have a current US Coast Guard documentation number. Beginning in1979, the NMFS...

  12. Seasonal Difference in National School Lunch Program Participation and Its Impacts on Household Food Security.

    Science.gov (United States)

    Huang, Jin; Kim, Youngmi; Barnidge, Ellen

    2016-11-20

    The National School Lunch Program (NSLP) is one of the most important food assistance programs in the United States to ensure children's food security and healthy development. Previous studies have offered mixed results and challenges in estimating the effects of program participation. This study assesses NSLP's effect on household food security using data from the Survey of Income and Program Participation (SIPP). SIPP collects information on food security that covers four reference months, including both summer (June, July, August) and nonsummer months. The number of summer months in these four reference months varies by SIPP rotation group. These unique features allow this study to address the potential selection bias in the research of NSLP and food security by examining a seasonal difference in program participation. The analysis found that one more summer month in the reference period increases the difference in low food security rates by about 1.5 percentage points between recipients and nonrecipients eligible for free or reduced-price lunch. Findings have important social work and health policy implications for increasing food security among low-income households with children. © 2016 National Association of Social Workers.

  13. Quantitative Security Analysis for Multi-threaded Programs

    Directory of Open Access Journals (Sweden)

    Tri Minh Ngo

    2013-06-01

    Full Text Available Quantitative theories of information flow give us an approach to relax the absolute confidentiality properties that are difficult to satisfy for many practical programs. The classical information-theoretic approaches for sequential programs, where the program is modeled as a communication channel with only input and output, and the measure of leakage is based on the notions of initial uncertainty and remaining uncertainty after observing the final outcomes, are not suitable to multi-threaded programs. Besides, the information-theoretic approaches have been also shown to conflict with each other when comparing programs. Reasoning about the exposed information flow of multi-threaded programs is more complicated, since the outcomes of such programs depend on the scheduler policy, and the leakages in intermediate states also contribute to the overall leakage of the program. This paper proposes a novel model of quantitative analysis for multi-threaded programs that also takes into account the effect of observables in intermediate states along the trace. We define a notion of the leakage of a program trace. Given the fact that the execution of a multi-threaded program is typically described by a set of traces, the leakage of a program under a specific scheduler is computed as the expected value of the leakages of all possible traces. Examples are given to compare our approach with the existing approaches.

  14. Quantitative Security Analysis for Multi-threaded Programs

    NARCIS (Netherlands)

    Ngo, Minh Tri; Huisman, Marieke

    Quantitative theories of information flow give us an approach to relax the absolute confidentiality properties that are difficult to satisfy for many practical programs. The classical information-theoretic approaches for sequential programs, where the program is modeled as a communication channel

  15. Rural income transfer programs and rural household food security in Ethiopia.

    Science.gov (United States)

    Uraguchi, Zenebe B

    2012-01-01

    Based on household food security surveys conducted in Ethiopia, this study seeks to understand the roles and limitations of income transfer projects as determinants of households’ food security. By covering the Food-For-Work Programs (FFWPs) and the Productive Safety Net Programs (PSNPs), the study shows that these programs served as temporary safety nets for food availability, but they were limited in boosting the dietary diversity of households and their coping strategies. Households which participated in the programs increased their supply of food as a temporary buffer to seasonal asset depletion. However, participation in the programs was marred by inclusion error (food-secure households were included) and exclusion error (food-insecure households were excluded). Income transfer projects alone were not robust determinants of household food security. Rather, socio-demographic variables of education and family size as well as agricultural input of land size were found to be significant in accounting for changes in households’ food security. The programs in the research sites were funded through foreign aid, and the findings of the study imply the need to reexamine the approaches adopted by bilateral donors in allocating aid to Ethiopia. At the same time the study underscores the need to improve domestic policy framework in terms of engendering rural local institutional participation in project management.

  16. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  17. Safeguards and security research and development: Program status report, February-July 1981

    Energy Technology Data Exchange (ETDEWEB)

    Henry, C.N.; Walton, R.B. (comps.)

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards.

  18. National Nuclear Security Administration International Safeguards Education & Training Program(s)

    Energy Technology Data Exchange (ETDEWEB)

    Frazar, Sarah L.; McClelland-Kerr, John

    2009-10-06

    The introduction of nuclear power is a challenging, time-consuming and complex endeavor. After lengthy deliberations and research, some discover they are not prepared to take on the responsibilities or make the necessary investments to pursue nuclear power at this time. In particular, as countries begin to study their education systems with a critical eye, they discover they are unlikely to produce the requisite people to support the new plant they had hoped to introduce in the next ten to fifteen years. Without experienced personnel who can manage, operate, regulate and inspect the new plant, there is no point to building a plant in the first place. This paper will begin with an overview of various challenges associated with establishing and implementing a safe, secure and sustainable nuclear program and describe the some of the key issues that need to be addressed while planning to introduce nuclear power into an energy portfolio. Subsequent sections will describe how the United States is assisting countries in this planning process and in developing an effective workforce capable of supporting the nuclear program. Next, the paper will look at the key documents countries need to prepare in order to develop an effective workforce. The final section will offer some potential measures for success to ensure the long-term viability of the education system.

  19. Secure Programming Cookbook for C and C++ Recipes for Cryptography, Authentication, Input Validation & More

    CERN Document Server

    Viega, John

    2009-01-01

    Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix® (including Linux®) and Windows® environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.

  20. Security for Distributed Web-Applications via Aspect-Oriented Programming

    OpenAIRE

    Kuntze, N.; Rauch, T.; Schmidt, A.U.

    2005-01-01

    Identity Management is becoming more and more important in business systems as they are opened for third parties including trading partners, consumers and suppliers. This paper presents an approach securing a system without any knowledge of the system source code. The security module adds to the existing system authentication and authorisation based on aspect oriented programming and the liberty alliance framework, an upcoming industrie standard providing single sign on. In an initial trainin...

  1. Implementing secure laptop-based testing in an undergraduate nursing program: a case study.

    Science.gov (United States)

    Tao, Jinyuan; Lorentz, B Chris; Hawes, Stacey; Rugless, Fely; Preston, Janice

    2012-07-01

    This article presents the implementation of secure laptop-based testing in an undergraduate nursing program. Details on how to design, develop, implement, and secure tests are discussed. Laptop-based testing mode is also compared with the computer-laboratory-based testing model. Five elements of the laptop-based testing model are illustrated: (1) it simulates the national board examination, (2) security is achievable, (3) it is convenient for both instructors and students, (4) it provides students hands-on practice, (5) continuous technical support is the key.

  2. Seluge++: a secure over-the-air programming scheme in wireless sensor networks.

    Science.gov (United States)

    Doroodgar, Farzan; Abdur Razzaque, Mohammad; Isnin, Ismail Fauzi

    2014-03-11

    Over-the-air dissemination of code updates in wireless sensor networks have been researchers' point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strength, having their concentration on the constrained nature of wireless sensor network (WSN) nodes. For authentication purposes, most of them have used a Merkle hash tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be at a standard level. Therefore, they have not investigated the tree structure for mission-critical situations in which security has to be at the maximum possible level (e.g., military applications, healthcare). Considering this, we investigate existing security models used in over-the-air dissemination of code updates for possible vulnerabilities, and then, we provide a set of countermeasures, correspondingly named Security Model Requirements. Based on the investigation, we concentrate on Seluge, one of the existing over-the-air programming schemes, and we propose an improved version of it, named Seluge++, which complies with the Security Model Requirements and replaces the use of the inefficient Merkle tree with a novel method. Analytical and simulation results show the improvements in Seluge++ compared to Seluge.

  3. Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farzan Doroodgar

    2014-03-01

    Full Text Available Over-the-air dissemination of code updates in wireless sensor networks have been researchers’ point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strength, having their concentration on the constrained nature of wireless sensor network (WSN nodes. For authentication purposes, most of them have used a Merkle hash tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be at a standard level. Therefore, they have not investigated the tree structure for mission-critical situations in which security has to be at the maximum possible level (e.g., military applications, healthcare. Considering this, we investigate existing security models used in over-the-air dissemination of code updates for possible vulnerabilities, and then, we provide a set of countermeasures, correspondingly named Security Model Requirements. Based on the investigation, we concentrate on Seluge, one of the existing over-the-air programming schemes, and we propose an improved version of it, named Seluge++, which complies with the Security Model Requirements and replaces the use of the inefficient Merkle tree with a novel method. Analytical and simulation results show the improvements in Seluge++ compared to Seluge.

  4. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  5. Los Alamos National Laboratory Facilities, Security and Safeguards Division, Safeguards and Security Program Office, Protective Force Oversight Program

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-11-30

    The purpose of this document is to identify and describe the duties and responsibilities of Facility Security and Safeguards (FSS) Safeguards and Security (SS) organizations (groups/offices) with oversight functions over the Protection Force (PF) subcontractor. Responsible organizations will continue their present PF oversight functions under the Cost Plus Award Fee (CPAF) assessment, but now will be required to also coordinate, integrate, and interface with other FSS S and S organizations and with the PF subcontractor to measure performance, assess Department of Energy (DOE) compliance, reduce costs, and minimize duplication of effort. The role of the PF subcontractor is to provide the Laboratory with effective and efficient protective force services. PF services include providing protection for the special nuclear material, government property and classified or sensitive information developed and/or consigned to the Laboratory, as well as protection for personnel who work or participate in laboratory activities. FSS S and S oversight of both performance and compliance standards/metrics is essential for these PF objectives to be met.

  6. Food Security and Weight Status in Children: Interactions With Food Assistance Programs.

    Science.gov (United States)

    Nguyen, Binh T; Ford, Christopher N; Yaroch, Amy L; Shuval, Kerem; Drope, Jeffrey

    2017-02-01

    It is unclear whether Supplemental Nutrition Assistance Program (SNAP) or National School Lunch Program (NSLP) participation modifies the relationship between food insecurity and obesity in children. Data were included for 4,719 children aged 9-17 years who participated in the National Health and Nutrition Survey between 2003-2004 and 2011-2012. Linear regression was used to examine the relationship between household food security (full, marginal, low, and very low) and BMI percentile. Adjusted models were also stratified by SNAP and NSLP participation. There was no significant overall relationship between household food security and BMI percentile. In SNAP non-participants, there was no apparent overall relationship between BMI percentile and household food security. However, BMI percentile in children from households with low food security was significantly higher than that of children from fully food-secure households (risk difference [RD]=5.95, 95% CI=1.11, 10.80). Among SNAP participants, there was no significant relationship between household food security and BMI percentile. By NSLP participation category, there was a non-significant trend toward increasing BMI percentile with decreasing household food security in those reporting two or fewer (RD=1.75, 95% CI= -0.79, 4.29) and two to three (RD=1.07; 95% CI= -1.74, 3.89) lunches/week. There was no apparent relationship between household food security and BMI percentile in those reporting four or more lunches/week. Although the overall relationship between household food security and weight status in school-aged children was not statistically significant, there was some evidence that the relationship may differ by SNAP or NSLP participation, suggesting the need for more research. Copyright © 2016 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.

  7. Data Science at the Defense Personnel and Security Research Center. Mission: Improve the Effectiveness, Efficiency, and Fairness of DoD Personnel Security and Suitability Programs

    Science.gov (United States)

    2015-05-14

    Mission: Improve the Effectiveness, Efficiency, and Fairness of DoD Personnel Security and Suitability Programs Report Documentation Page Form... fairness of personnel security in the DoD In the wake of events like 9-11, Ft. Hood, and the Washington Navy Yard shootings, we expanded our

  8. TRANSPETRO gas security of supply program; Programa de confiabilidade de suprimento de gas natural da TRANSPETRO

    Energy Technology Data Exchange (ETDEWEB)

    Faertes, Denise [PETROBRAS Transporte S.A. (TRANSPETRO), Rio de Janeiro, RJ (Brazil)

    2005-07-01

    The purpose of this paper is to present the Gas Security of Supply Program that is being implemented at TRANSPETRO since 2002. It includes the application of the state of the art techniques and models related to reliability engineering. The main objective of the program is to evaluate and optimize overall gas network performance and to provide gas to different consumers (industrial, residential, thermo-plants and vehicles) in compliance with stated reliability levels. Heavy fines will be applied to PETROBRAS in case of occurrence of shortfalls. We hope that this paper can contribute to a wider discussion about this subject of performance indicators involving security of supply, safety and environment preservation. (author)

  9. Vulnerabilities of Software for Mobile Phones and Secure Programming Techniques

    Directory of Open Access Journals (Sweden)

    T. R. Khabibullin

    2012-09-01

    Full Text Available The article reviews the most common mistakes made by developers when writing software for mobile platforms which lead to appearing vulnerabilities that allow attackers to perform various types of attacks. The basic principles of defensive programming are presented.

  10. Research on Secure Systems and Automatic Programming. Volume I

    Science.gov (United States)

    1977-10-14

    6I This *prescription" is now given to P who binds its third pattern to the ticket of some account .. This may be a general purpose accont , such as...Bankamericard, or, it may be the patient’s prescription-program accont . The resulting activator is now given to some pharmacy. There, finally, SELL’ is

  11. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Science.gov (United States)

    2012-06-01

    ... From the Federal Register Online via the Government Publishing Office ] SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Homeland Security (DHS))--Match Number 1010 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of...

  12. A Needs Assessment Study and Curriculum Development for a Public and Private Security Program at Alvin Community College.

    Science.gov (United States)

    Bethscheider, John

    A needs assessment for a community college curriculum in public and private security was conducted by surveying 50 high schools, four-year colleges, and private security agencies in the Alvin Community College area; 36 institutions responded. Findings revealed: most have a designated director of their security program; most would rather hire the…

  13. Changing a culture: a brief program analysis of a social learning program on a maximum-security forensic unit.

    Science.gov (United States)

    Goodness, Kelly R; Renfro, Nancy S

    2002-01-01

    This report presents outcome data collected for a three-year period from a maximum-security forensic psychiatric program. Admission and discharge variables, restraint/seclusion, and client abuse/neglect data are presented from a one-year period that preceded the advent of the Behavior Management Treatment Program's (BMTP's) Social Learning Diagnostic Program to two years after implementing the Social Learning Diagnostic Program. Significant overall progress and improvement was observed in all variables analyzed after instituting a social learning program paradigm. This report provides a brief summary of the BMTP's Social Learning Diagnostic Program along with a discussion of the role played by Dangerousness Management Plans in the treatment of patients within the social learning milieu. Additionally the patient population served, and the rationale for implementation of a program based in social learning theory, are discussed. Copyright 2002 John Wiley & Sons, Ltd.

  14. Impact of Security Awareness Programs on End-User Security Behavior: A Quantitative Study of Federal Workers

    Science.gov (United States)

    Smith, Gwendolynn T.

    2012-01-01

    The increasing dependence on technology presented more vulnerability to security breaches of information and the need to assess security awareness levels in federal organizations, as well as other organizations. Increased headlines of security breaches of federal employees' security actions prompted this study. The research study reviewed the…

  15. 75 FR 23565 - Food Stamp Program: Eligibility and Certification Provisions of the Farm Security and Rural...

    Science.gov (United States)

    2010-05-04

    ... / Tuesday, May 4, 2010 / Rules and Regulations#0;#0; ] DEPARTMENT OF AGRICULTURE Food and Nutrition Service 7 CFR Parts 272 and 273 RIN 0584-AD30 Food Stamp Program: Eligibility and Certification Provisions of the Farm Security and Rural Investment Act of 2002; Approval of Information Collection Request...

  16. Subsequent program participation of former social security disability insurance beneficiaries and supplemental security income recipients whose eligibility ceased because of medical improvement.

    Science.gov (United States)

    Hemmeter, Jeffrey; Stegman, Michelle

    2013-01-01

    The Social Security Administration (SSA) periodically reviews the disabilities of Supplemental Security Income (SSI) recipients and Social Security Disability Insurance (DI) beneficiaries to determine if their impairments still meet the requirements for program eligibility. For individuals whose eligibility was ceased after a full medical review from 2003 to 2008, we track subsequent program participation for up to 8 years. We use survival analyses to estimate the time untilfirst return to SSI and DI and explore the differences in returns by various personal and programmatic characteristics such as age, disability type, time on program, and SSA expectations regarding medical improvement. Overall, we estimate that about 30 percent ofSSI-only recipients whose eligibility ceases because of medical improvement return to the SSI program within 8 years. For DI-only worker beneficiaries whose eligibility ceases, we estimate that 20 percent will return to the DI program within 8 years.

  17. 75 FR 12245 - Program Comment for the Department of the Navy for the Disposition of Historic Vessels

    Science.gov (United States)

    2010-03-15

    ... public and various historic preservation stakeholders opportunities to provide input regarding a vessel's..., qualified Navy historians with knowledge about Navy vessels will review each vessel in active service to... already been determined eligible for listing in the NRHP will be evaluated by qualified Navy historians...

  18. NNSA Laboratory Directed Research and Development Program 2008 Symposium--Focus on Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Kotta, P R; Sketchley, J A

    2008-08-20

    The Laboratory Directed Research and Development (LDRD) Program was authorized by Congress in 1991 to fund leading-edge research and development central to the national laboratories core missions. LDRD anticipates and engages in projects on the forefront of science and engineering at the Department of Energy (DOE) national laboratories, and has a long history of addressing pressing national security needs at the National Nuclear Security Administration (NNSA) laboratories. LDRD has been a scientific success story, where projects continue to win national recognition for excellence through prestigious awards, papers published and cited in peer-reviewed journals, mainstream media coverage, and patents granted. The LDRD Program is also a powerful means to attract and retain top researchers from around the world, to foster collaborations with other prominent scientific and technological institutions, and to leverage some of the world's most technologically advanced assets. This enables the LDRD Program to invest in high-risk and potentially high-payoff research that creates innovative technical solutions for some of our nation's most difficult challenges. Worldwide energy demand is growing at an alarming rate, as developing nations continue to expand their industrial and economic base on the back of limited global resources. The resulting international conflicts and environmental consequences pose serious challenges not only to this nation, but to the international community as well. The NNSA and its national security laboratories have been increasingly called upon to devote their scientific and technological capabilities to help address issues that are not limited solely to the historic nuclear weapons core mission, but are more expansive and encompass a spectrum of national security missions, including energy security. This year's symposium highlights some of the exciting areas of research in alternative fuels and technology, nuclear power, carbon

  19. 75 FR 75486 - Maritime Security Directive 104-6 (Rev. 4); Guidelines for U.S. Vessels Operating in High Risk...

    Science.gov (United States)

    2010-12-03

    ... Manager, Docket Operations, telephone 202-366-9826. SUPPLEMENTARY INFORMATION: Somali pirates operate... thwarting pirate attacks and incorporates lessons-learned since the issuance of Revision 2. MARSEC Directive... underway, the vessels are subjected to the same type of threats from attacking pirates. Vessels berthed in...

  20. Human Factors in Coast Guard Computer Security - An Analysis of Current Awareness and Potential Techniques to Improve Security Program Viability

    National Research Council Canada - National Science Library

    Whalen, Timothy

    2001-01-01

    .... As such, our ability to ensure the security of those systems is also increasing in import. Traditional information security measures tend to be system-oriented and often fail to address the human element that is critical to system success...

  1. AspectKE*:Security Aspects with Program Analysis for Distributed Systems

    DEFF Research Database (Denmark)

    2010-01-01

    AspectKE* is the first distributed AOP language based on a tuple space system. It is designed to enforce security policies to applications containing untrusted processes. One of the key features is the high-level predicates that extract results of static program analysis. These predicates provide...... users an easy way to define aspects by providing information about future behavior of processes, which are shown to be useful to implement security policies such as secrecy and integrity. The users of AspectKE* do not need to write low-level analysis by themselves. In the demonstration, we show basic...... features of AspectKE* and a case study of building a secure distributed chat application that contains a malicious process....

  2. Roadmap for Nondestructive Evaluation of Reactor Pressure Vessel Research and Development by the Light Water Reactor Sustainability Program

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Cyrus M [ORNL; Nanstad, Randy K [ORNL; Clayton, Dwight A [ORNL; Matlack, Katie [Georgia Institute of Technology; Ramuhalli, Pradeep [Pacific Northwest National Laboratory (PNNL); Light, Glenn [Southwest Research Institute, San Antonio

    2012-09-01

    The Department of Energy s (DOE) Light Water Reactor Sustainability (LWRS) Program is a five year effort which works to develop the fundamental scientific basis to understand, predict, and measure changes in materials and systems, structure, and components as they age in environments associated with continued long-term operations of existing commercial nuclear power reactors. This year, the Materials Aging and Degradation (MAaD) Pathway of this program has placed emphasis on emerging Non-Destructive Evaluation (NDE) methods which support these objectives. DOE funded Research and Development (R&D) on emerging NDE techniques to support commercial nuclear reactor sustainability is expected to begin next year. This summer, the MAaD Pathway invited subject matter experts to participate in a series of workshops which developed the basis for the research plan of these DOE R&D NDE activities. This document presents the results of one of these workshops which are the DOE LWRS NDE R&D Roadmap for Reactor Pressure Vessels (RPV). These workshops made a substantial effort to coordinate the DOE NDE R&D with that already underway or planned by the Electric Power Research Institute (EPRI) and the Nuclear Regulatory Commission (NRC) through their representation at these workshops.

  3. Shipshape: sanitation inspections on cruise ships, 1990-2005, Vessel Sanitation Program, Centers for Disease Control and Prevention.

    Science.gov (United States)

    Cramer, Elaine H; Blanton, Curtis J; Otto, Charles

    2008-03-01

    In the course of a successful collaboration between the Centers for Disease Control and Prevention (CDC) and the cruise ship industry on reducing common-source outbreaks, CDC's Vessel Sanitation Program (VSP) has expanded its training, education, and cruise ship inspection programs. The study reported here evaluated 15 years of ship sanitation inspection data from the National Center for Environmental Health and assessed performance in specific sanitation categories from 1996 to 2005. During the period 1990-2005, scores from cruise ship environmental sanitation inspections steadily improved. The percentage of inspections with violations decreased among five of nine categories. Those five categories were Washing Facilities, Contact Surfaces, Facility Maintenance, Food Handling, and Communicable Disease Practices. Inspection violations increased proportionally in the categories of Swimming Pools and Water System Protection/Chart Recording. Overall continued good performance in most sanitation categories is likely attributable to on-site training during inspections, improvements in ship construction, and a switch from hot-holding temperatures to time limits as a public health control for foods on display.

  4. The first 50 years: A review of the Department of Energy domestic safeguards and security program

    Energy Technology Data Exchange (ETDEWEB)

    Desmond, W.J.; Zack, N.R.; Tape, J.W.

    1997-12-01

    World War II not only brought the United States rapidly into the nuclear age, but it also brought a new term, {open_quotes}safeguards.{close_quotes} By that time, physical security was an already established activity that dealt with the protection of possessions such as property, vehicles, and other valuables. A secret nuclear project under a stadium at the University of Chicago would add a new dimension to physical security. Similarly, a community known only by its post office box at a location 27 miles from Santa Fe, New Mexico (PO Box 1663) would initiate new programs to protect information and technology while their programs changed the science and warfare around the world. The Manhattan Project and what was to become the Los Alamos Scientific Laboratory (now Los Alamos National Laboratory) would extend the applications of physical security and, soon to be implemented, safeguards to produce important technical advances for the protection, accounting, control, and nonproliferation of fissile nuclear materials. Security for nuclear materials and weapons information began as a foremost consideration with the start of the nuclear programs in the early 1940s. In the 1960s, the Atoms for Peace Program promoted the peaceful use of nuclear energy and made the US a supplier of nuclear materials and peaceful-use nuclear technology to other states. This program also changed the focus on nuclear materials from that of worldwide control to inspection by an independent agency, the proposed International Atomic Energy Agency. At this same time the nuclear weapons states increased from three to five. Other nations worked to obtain a nuclear weapons capability, resulting in increasing concerns about nuclear proliferation.

  5. Software Quality and Security in Teachers' and Students' Codes When Learning a New Programming Language

    Directory of Open Access Journals (Sweden)

    Arnon Hershkovitz

    2015-09-01

    Full Text Available In recent years, schools (as well as universities have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to explore differences in both populations’ learning, we compared measures of software quality and security between high-school teachers and students. We collected 109 source files, written in Python by 18 teachers and 31 students, and engineered 32 features, based on common standards for software quality (PEP 8 and security (derived from CERT Secure Coding Standards. We use a multi-view, data-driven approach, by (a using hierarchical clustering to bottom-up partition the population into groups based on their code-related features and (b building a decision tree model that predicts whether a student or a teacher wrote a given code (resulting with a LOOCV kappa of 0.751. Overall, our findings suggest that the teachers’ codes have a better quality than the students’ – with a sub-group of the teachers, mostly males, demonstrate better coding than their peers and the students – and that the students’ codes are slightly better secured than the teachers’ codes (although both populations show very low security levels. The findings imply that teachers might benefit from their prior knowledge and experience, but also emphasize the lack of continuous involvement of some of the teachers with code-writing. Therefore, findings shed light on computer science teachers as lifelong learners. Findings also highlight the difference between quality and security in today’s programming paradigms. Implications for these findings are discussed.

  6. Final report for the 'Melt-Vessel Interactions' Project. European Union R and TD Program 4th Framework. MVI project final research report

    Energy Technology Data Exchange (ETDEWEB)

    Sehgal, B.R.; Dinh, T.N.; Nourgaliev, R.R.; Bui, V.A.; Green, J.; Kolb, G.; Karbojian, A.; Theerthan, S.A.; Gubaidulline, A. [Royal Inst. of Tech., Stockholm (Sweden). Div. of Nuclear Power Safety; Helle, M.; Kymaelaeinen, O.; Tuomisto, H. [IVO Power Engineering Ltd., Vantaa (Finland); Bonnet, J.M.; Rouge, S.; Narcoux, M.; Liegeois, A. [CEA - Grenoble (France); Turland, B.D.; Dobson, G.P. [AEA Technology plc, Dorchester (United Kingdom); Siccama, A. [ECN Nuclear Research, Petten (Netherlands); Ikonen, K. [VTT Energy, Helsinki (Finland); Parozzi, F. [ENEL - SRI/PAM/GRA, Segrate, MI (Italy); Kolev, N. [Siemens AG, Erlangen (Germany); Caira, M. [Univ. of Roma (Italy)

    1999-04-01

    The Melt Vessel Interaction (MVI) project is concerned with the consequences of the interactions that a core melt, generated during a postulated severe accident in a light water reactor, may have with the pressure vessel. In particular, the issues concerned with the failure of the vessel bottom head are the focus of the research. The specific objectives of the project are to obtain data and develop validated models, which could be applied to prototypic plants, and accident conditions, for resolution of issues related to the melt vessel interactions. The project work has been performed by nine partners having varied responsibility. The work included a large number of experiments, with simulant materials, whose observations and results are employed, respectively, to understand the physical mechanisms and to develop validated models. Applications to the prototypic geometry and conditions have also been performed. This report is volume 1 of the Final Report for the Project, in which a summary of the progress achieved in the experimental program is provided. We have, however, included some aspects of the modeling activities. Volume 2 of the Final report describes the progress achieved in the modeling program. The progress achieved in the experimental and modeling parts of the Project has led to the resolution of some of the issues of melt vessel interaction. Considerable progress was also achieved towards resolution of the remaining issues.

  7. Lessons learned from the scaling-up of a weekly multimicronutrient supplementation program in the integrated food security program (PISA).

    Science.gov (United States)

    Lechtig, Aarón; Gross, Rainer; Vivanco, Oscar Aquino; Gross, Ursula; López de Romaña, Daniel

    2006-01-01

    Weekly multimicronutrient supplementation was initiated as an appropriate intervention to protect poor urban populations from anemia. To identify the lessons learned from the Integrated Food Security Program (Programa Integrado de Seguridad Alimentaria [PISA]) weekly multimicronutrient supplementation program implemented in poor urban populations of Chiclayo, Peru. Data were collected from a 12-week program in which multimicronutrient supplements were provided weekly to women and adolescent girls 12 through 44 years of age and children under 5 years of age. A baseline survey was first conducted. Within the weekly multimicronutrient supplementation program, information was collected on supplement distribution, compliance, biological effectiveness, and cost. Supplementation, fortification, and dietary strategies can be integrated synergistically within a micronutrient intervention program. To ensure high cost-effectiveness of a weekly multimicronutrient supplementation program, the following conditions need to be met: the program should be implemented twice a year for 4 months; the program should be simultaneously implemented at the household (micro), community (meso), and national (macro) levels; there should be governmental participation from health and other sectors; and there should be community and private sector participation. Weekly multimicronutrient supplementation programs are cost effective options in urban areas with populations at low risk of energy deficiency and high risk of micronutrient deficiencies.

  8. Evaluation Report on "The Department's Unclassified Cyber Security Program"

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-10-01

    Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network

  9. Extracting classification rules from an informatic security incidents repository by genetic programming

    Directory of Open Access Journals (Sweden)

    Carlos Javier Carvajal Montealegre

    2015-04-01

    Full Text Available This paper describes the data mining process to obtain classification rules over an information security incident data collection, explaining in detail the use of genetic programming as a mean to model the incidents behavior and representing such rules as decision trees. The described mining process includes several tasks, such as the GP (Genetic Programming approach evaluation, the individual's representation and the algorithm parameters tuning to upgrade the performance. The paper concludes with the result analysis and the description of the rules obtained, suggesting measures to avoid the occurrence of new informatics attacks. This paper is a part of the thesis work degree: Information Security Incident Analytics by Data Mining for Behavioral Modeling and Pattern Recognition (Carvajal, 2012.

  10. The Oil Security Metrics Model: A Tool for Evaluating the Prospective Oil Security Benefits of DOE's Energy Efficiency and Renewable Energy R&D Programs

    Energy Technology Data Exchange (ETDEWEB)

    Greene, David L [ORNL; Leiby, Paul Newsome [ORNL

    2006-05-01

    Energy technology R&D is a cornerstone of U.S. energy policy. Understanding the potential for energy technology R&D to solve the nation's energy problems is critical to formulating a successful R&D program. In light of this, the U.S. Congress requested the National Research Council (NRC) to undertake both retrospective and prospective assessments of the Department of Energy's (DOE's) Energy Efficiency and Fossil Energy Research programs (NRC, 2001; NRC, 2005). ("The Congress continued to express its interest in R&D benefits assessment by providing funds for the NRC to build on the retrospective methodology to develop a methodology for assessing prospective benefits." NRC, 2005, p. ES-2) In 2004, the NRC Committee on Prospective Benefits of DOE's Energy Efficiency and Fossil Energy R&D Programs published a report recommending a new framework and principles for prospective benefits assessment. The Committee explicitly deferred the issue of estimating security benefits to future work. Recognizing the need for a rigorous framework for assessing the energy security benefits of its R&D programs, the DOE's Office of Energy Efficiency and Renewable Energy (EERE) developed a framework and approach for defining energy security metrics for R&D programs to use in gauging the energy security benefits of their programs (Lee, 2005). This report describes methods for estimating the prospective oil security benefits of EERE's R&D programs that are consistent with the methodologies of the NRC (2005) Committee and that build on Lee's (2005) framework. Its objective is to define and implement a method that makes use of the NRC's typology of prospective benefits and methodological framework, satisfies the NRC's criteria for prospective benefits evaluation, and permits measurement of that portion of the prospective energy security benefits of EERE's R&D portfolio related to oil. While the Oil Security Metrics (OSM) methodology described

  11. National Nuclear Security Administration Nonproliferation Graduate Fellowship Program Annual Report in Brief: October 2007 - May 2008

    Energy Technology Data Exchange (ETDEWEB)

    Berkman, Clarissa O.; Fankhauser, Jana G.; Sandusky, Jessica A.

    2009-05-01

    This abbreviated Annual Report covers program activities of the National Nuclear Security Administration (NNSA) Nonproliferation Graduate Fellowship Program (NGFP) from October 2007 through May 2008--the timeframe between the last Annual Report (which covered activities through September 2007) and the next report (which will begin with June 2008 activities). In that timeframe, the NGFP continued building a solid foundation as the program began reaping the benefits of recently implemented changes. This report is organized by Fellowship class and the pertinent program activities for each, including: October 2007 Recruiting events and final applications (Class of 2008) Winter 2007 Selection and hiring (Class of 2008) Spring 2008 Career development roundtables (Class of 2007) Orientation planning (Class of 2008) Recruitment planning and university outreach (Class of 2009) May 2008 Closing ceremony (Class of 2007)

  12. Building and implementing a security certification and accreditation program official (ISC)2 guide to the CAPCM CBK

    CERN Document Server

    Howard, Patrick D

    2004-01-01

    Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAP CBK demonstrates the practicality and effectiveness of certification and accreditation (C&A) as a risk management methodology for IT systems in both public and private organizations. It provides security professionals with an overview of C&A components, enabling them to document the status of the security controls of their IT systems, and learn how to secure systems via standard, repeatable processes.  This book consists of four main sections. It begins with a description of what it

  13. A global perspective on statutory Social Security programs for the sick.

    Science.gov (United States)

    Dixon, J

    2001-01-01

    Statutory sickness benefit programs have been adopted in 129 countries. Most have an employment-based strategy, social insurance, that restricts coverage to those in paid formal employment. The cash entitlements provided are predominantly earnings-related. Funding comes overwhelmingly from employer and employee contributions, with only a minority of countries providing government subsidies. A comparative-evaluative assessment methodology is used to assess national statutory intentions with respect to statutory social security provision for the sick. The best-designed statutory program is found in Sweden followed closely by France and then Australia, Austria and Germany. Algeria clearly leads the African rankings, as does Peru in Latin America, Iraq in the Middle East, and Nauru in the Pacific Islands. Turkmenistan has the best-designed statutory program in Asia, by a very small margin. In North America, Canada is well ahead of the United States.

  14. Cost of the Cervical Cancer Screening Program at the Mexican Social Security Institute

    Directory of Open Access Journals (Sweden)

    Víctor Granados-García

    2014-09-01

    Full Text Available Objective. To estimate the annual cost of the National Cervical Cancer Screening Program (CCSP of the Mexican Institute of Social Security (IMSS. Materials and methods. This cost analysis examined regional coverage rates reported by IMSS. We estimated the number of cytology, colposcopy, biopsy and pathology evaluations, as well as the diagnostic test and treatment costs for cervical intraepithelial neoplasia grade II and III (CIN 2/3 and cervical cancer. Diagnostic test costs were estimated using a micro-costing technique. Sensitivity analyses were performed. Results. The cost to perform 2.7 million cytology tests was nearly 38 million dollars, which represents 26.1% of the total program cost (145.4 million. False negatives account for nearly 43% of the program costs. Conclusion. The low sensitivity of the cytology test generates high rates of false negatives, which results in high institutional costs from the treatment of undetected cervical cancer cases.

  15. 75 FR 3746 - Draft Program Comment for the Department of the Navy for the Disposition of Historic Vessels

    Science.gov (United States)

    2010-01-22

    ... to compiling histories of these eligible vessels when preparing entries in the Dictionary of American... sixty-day period. All written comments should be mailed to the Naval History and Heritage Command (NHHC...

  16. 76 FR 2402 - Maritime Security Directive 104-6 (Rev 5); Guidelines for U.S. Vessels Operating in High Risk Waters

    Science.gov (United States)

    2011-01-13

    ... pirates operate along a 2,300 mile coast and in 2.5 million square miles of ocean. Given the size and... management practices that have proven to be successful in thwarting pirate attacks and incorporates lessons... subjected to the same type of threats from attacking pirates. Vessels berthed in high risk waters should...

  17. The School Breakfast Program strengthens household food security among low-income households with elementary school children.

    Science.gov (United States)

    Bartfeld, Judith S; Ahn, Hong-Min

    2011-03-01

    The School Breakfast Program is an important component of the nutritional safety net and has been linked to positive changes in meal patterns and nutritional outcomes. By offering a breakfast, which for low-income children is available either at no cost or reduced price, the program also has the potential to increase household food security. This study examined the relationship between availability of the School Breakfast Program and household food security among low-income third-grade students by using data from the Early Childhood Longitudinal Survey-Kindergarten Cohort. The primary sample included 3010 students. Availability of school breakfast was assessed by surveys of school administrators. Food security was assessed by parents' reports by using the standard 18-item food security scale and considering 2 different food security thresholds. A probit model was estimated to measure the relationship between school breakfast availability and household food security while controlling for a range of other characteristics. Access to school breakfast reduced the risk of marginal food insecurity but not the risk of food insecurity at the standard threshold. That is, the program appeared beneficial in offsetting food-related concerns among at-risk families, although not necessarily in alleviating food insecurity once hardships had crossed the food insecurity threshold. Increasing the availability of school breakfast may be an effective strategy to maintain food security among low-income households with elementary school children.

  18. Report: Fiscal Year 2011 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #12-P-0062, November 9, 2011. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2011 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  19. Coast guard : better logistics planning needed to aid operational decisions related to the deployment of the national security cutter and its support assets.

    Science.gov (United States)

    2009-07-01

    As part of its more than $$24 billion Deepwater program to replace aging vessels and aircraft with new or upgraded assets, the Coast Guard is preparing the National Security Cutter (NSC) for service. GAO previously reported on Deepwater assets' deplo...

  20. Novel methods for Solving Economic Dispatch of Security-Constrained Unit Commitment Based on Linear Programming

    Science.gov (United States)

    Guo, Sangang

    2017-09-01

    There are two stages in solving security-constrained unit commitment problems (SCUC) within Lagrangian framework: one is to obtain feasible units’ states (UC), the other is power economic dispatch (ED) for each unit. The accurate solution of ED is more important for enhancing the efficiency of the solution to SCUC for the fixed feasible units’ statues. Two novel methods named after Convex Combinatorial Coefficient Method and Power Increment Method respectively based on linear programming problem for solving ED are proposed by the piecewise linear approximation to the nonlinear convex fuel cost functions. Numerical testing results show that the methods are effective and efficient.

  1. Research vessels

    Digital Repository Service at National Institute of Oceanography (India)

    Rao, P.S.

    by the research vessels RV Gaveshani and ORV Sagar Kanya are reported. The work carried out by the three charted ships is also recorded. A short note on cruise plans for the study of ferromanganese nodules is added...

  2. Grassroots Engagement: Securing Support for Science Communication Training Programs Created by Graduate Students for Graduate Students

    Science.gov (United States)

    Rohde, J. A.

    2016-12-01

    The need for science communication and outreach is widely recognized throughout the scientific community. Yet, at present, graduate students and early career scientists have, at best, widely variable access to opportunities to train in science communication techniques and to hone their outreach skills. In 2010, a small group of graduate students at the University of Washington led a grassroots effort to increase their own access to communication and outreach training by creating "The Engage Program." They developed a novel, interdisciplinary curriculum focused on storytelling, public speaking and improvisation, design, and the distillation of complex topics to clear and accessible forms. These entrepreneurial students faced (real or perceived) barriers to building this program, including the pressure to hide or dampen their enthusiasm from advisors and mentors, ignorance of university structures, and lack of institutional support. They overcame these barriers and secured institutional champions and funding, partnered with Town Hall Seattle to create a science speaker series, and developed a student leadership structure to ensure long-term sustainability of the program. Additionally, they crowdfunded an evaluation of the program's effectiveness in order demonstrate the benefits of such training to the scientific careers of the students. Here we present our key strategies for overcoming barriers to support, and compare them with several similar grassroots graduate-student led public communication programs from other institutions.

  3. DoD Personnel: Weaknesses in Security Investigation Program Are Being Addressed

    National Research Council Canada - National Science Library

    2000-01-01

    .... The first phase is the personnel security investigation, in which Defense Security Service investigators corroborate information provided by the applicant, interview character references, and review...

  4. USCG Vessel

    Data.gov (United States)

    Department of Homeland Security — The Marine Casualty and Pollution Data files provide details about marine casualty and pollution incidents investigated by Coast Guard Offices throughout the United...

  5. Analisis Remaining Life dan Penjadwalan Program Inspeksi pada Pressure Vessel dengan Menggunakan Metode Risk Based Inspection (RBI

    Directory of Open Access Journals (Sweden)

    Dyah Arina Wahyu Lillah

    2017-01-01

    Full Text Available Seiring perkembangan eksplorasi minyak dan gas bumi di dunia, perusahaan minyak dan gas di Indonesia juga turut berlomba-lomba untuk mendapatkan ladang minyak dan gas bumi sebanyak-banyaknya. Perkembangan ini turut dipengaruhi oleh aturan-aturan pemerintah mengenai keselamatan dan pencegahan bahaya baik pada unit yang dikelola maupun tenaga kerja pengelola. Untuk itu semua perlatan-peralatan (unit kerja harus dijamin kehandalaannya agar tidak menimbulkan bahaya baik bagi pekerja maupun lingkungan. Subjek penelitian dalam tugas akhir ini ialah pada pressure vessel yang dimiliki oleh Terminal LPG Semarang. Kemungkinan bahaya yang dapat menyebabkan kerusakan pada pressure vessel perlu dianalisis agar dapat meminimalkan resiko yang akan terjadi. Metode Risk Based Inspection (RBI diharapkan dapat meminimalkan resiko yang ada pada pressure vessel. Penilaian resiko dalam tugas akhir ini mengacu pada standar API RP 581. Untuk mengetahui besarnya resiko yang ada pada plant, maka terlebih dahulu harus dihitung besarnya probabilitas kegagalan dan konsekuensi apabila terjadi kegagalan. Langkah selanjutnya ialah membandingkan besarnya resiko yang didapat dengan target resiko yang dimiliki oleh perusahaan. Dari hasil perbandingan ini dapat diketahui tingkat resiko pressure vessel, sehingga dapat ditentukan jadwal inspeksi dan metode inspeksi yang tepat.

  6. The vessel fluence; Fluence cuve

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This book presents the proceedings of the technical meeting on the reactors vessels fluence. They are grouped in eight sessions: the industrial context and the stakes of the vessels control; the organization and the methodology for the fluence computation; the concerned physical properties; the reference computation methods; the fluence monitoring in an industrial context; vessels monitoring under irradiation; others methods in the world; the research and development programs. (A.L.B.)

  7. LANL Robotic Vessel Scanning

    Energy Technology Data Exchange (ETDEWEB)

    Webber, Nels W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-11-25

    Los Alamos National Laboratory in J-1 DARHT Operations Group uses 6ft spherical vessels to contain hazardous materials produced in a hydrodynamic experiment. These contaminated vessels must be analyzed by means of a worker entering the vessel to locate, measure, and document every penetration mark on the vessel. If the worker can be replaced by a highly automated robotic system with a high precision scanner, it will eliminate the risks to the worker and provide management with an accurate 3D model of the vessel presenting the existing damage with the flexibility to manipulate the model for better and more in-depth assessment.The project was successful in meeting the primary goal of installing an automated system which scanned a 6ft vessel with an elapsed time of 45 minutes. This robotic system reduces the total time for the original scope of work by 75 minutes and results in excellent data accumulation and transmission to the 3D model imaging program.

  8. Maritime Training Serbian Autonomous Vessel Protection Detachment

    Directory of Open Access Journals (Sweden)

    Šoškić Svetislav D.

    2014-06-01

    Full Text Available The crisis in Somalia has caused appearance of piracy at sea in the Gulf of Aden and the Western Indian Ocean. Somali pirates have become a threat to economic security of the world because almost 30 percent of world oil and 20 percent of global trade passes through the Gulf of Aden. Solving the problem of piracy in this part of the world have included international organizations, institutions, military alliances and the states, acting in accordance with international law and UN Security Council resolutions. The European Union will demonstrate the application of a comprehensive approach to solving the problem of piracy at sea and the crisis in Somalia conducting naval operation — EU NAVFOR Atalanta and operation EUTM under the Common Security and Defense Policy. The paper discusses approaches to solving the problem of piracy in the Gulf of Aden and the crisis in Somalia. Also, the paper points to the complexity of the crisis in Somalia and dilemmas correctness principles that are applied to solve the problem piracy at sea. One of goals is protections of vessels of the World Food Programme (WFP delivering food aid to displaced persons in Somalia. Republic of Serbia joined in this mission and trained and sent one a autonomous team in this military operation for protection WFP. This paper consist the problem of modern piracy, particularly in the area of the Horn of Africa became a real threat for the safety of maritime ships and educational process of Serbian Autonomous vessel protection detachment. Serbian Military Academy adopted and developed educational a training program against piracy applying all the provisions and recommendations of the IMO conventions and IMO model courses for Serbian Autonomous vessel protection detachment.

  9. Supplemental Nutrition Assistance Program participation is associated with an increase in household food security in a national evaluation.

    Science.gov (United States)

    Mabli, James; Ohls, Jim

    2015-02-01

    The Supplemental Nutrition Assistance Program (SNAP) provides nutrition assistance benefits to low-income families in an effort to reduce hunger and improve health and well-being. Because 1 in 7 Americans participate in the program each month, policymakers need to know whether the program is meeting these objectives effectively. The objective of this study was to estimate the association between SNAP participation and household food security using recent data from the largest national survey of the food security of SNAP participants to date. The analysis used a survey of nearly 6500 households and a quasi-experimental research design that consisted of 2 sets of comparisons. Using a cross-sectional sample, we compared information collected from SNAP households within days of program entry with information collected from a contemporaneous sample of SNAP households that had participated for ∼6 mo. Next, using a longitudinal sample, we compared baseline information collected from new-entrant SNAP households with information from those same households 6 mo later. Multivariate logistic regression analysis was used to estimate associations between SNAP and household food security. SNAP participation decreased the percentage of SNAP households that were food insecure in both samples by 6-17%. SNAP participation also decreased the percentage of households experiencing severe food insecurity--designated very low food security--by 12-19%. Findings were qualitatively robust to different empirical specifications. SNAP serves a vital role in improving the health and well-being of households by increasing food security. Given recent legislation to reduce program size and limit program eligibility, this study underscores SNAP's continued importance in affecting households' well-being. Future research is needed to determine whether specific groups of households experience differential improvements in food security. © 2015 American Society for Nutrition.

  10. Oregon's Gun Relief Program for Adjudicated Mentally Ill Persons: The Psychiatric Security Review Board.

    Science.gov (United States)

    Britton, Juliet; Bloom, Joseph D

    2015-06-01

    This article describes the State of Oregon's implementation of two programs designed to comply with federal gun laws regarding reporting individuals who have received mental health adjudications in criminal and civil courts. One mandate requires that states submit names of adjudicated individuals to the National Instant Criminal Background Check System (NICS) while the second requires that the state establish a qualifying gun restoration program for those disqualified from gun ownership. In 2009, Oregon's Legislature developed an administrative approach to gun restoration and assigned the responsibility for conducting these hearing to the Oregon Psychiatric Security Review Board (PSRB). The PSRB is a state administrative board that has existed since 1977 and has been primarily focused on the supervision and treatment of adult and juvenile insanity acquittees. The gun restoration program began in 2010, but to date has only received three completed petitions requesting restoration of firearm rights. The article concludes with a discussion that surmises why very few of the Oregonians who are listed in NICS have submitted petitions for relief. Copyright © 2015 John Wiley & Sons, Ltd.

  11. Safeguards and Security FY 1996 Program Plan: WBS 6.6

    Energy Technology Data Exchange (ETDEWEB)

    Lee, F.D.

    1995-08-01

    The Safeguards and Security (SAS) Program is based upon integrity, competence and innovation in the protection of the public and Hanford resources through: (1) outstanding assistance, oversight, education, and counsel to their customers to ensure the protection of the public, site personnel, assets, and information; (2) value-added and cost-effective solutions to Hanford issues; and (3) risk management techniques to ensure effective asset protection, site accessibility, and the flexibility to adapt to changing customer needs. This plan is divided into two parts: overview and SAS WBS (work breakdown structure) dictionary sheets. The overview is divided into vision and mission, goals and objectives, assumptions and priorities, milestones, and a summary. The SAS WBS dictionary sheets are divided into department overhead, general and administrative, sitewide support, Hanford patrol, traffic safety, and locksmith services.

  12. A two-factor, stochastic programming model of Danish mortgage-backed securities

    DEFF Research Database (Denmark)

    Nielsen, Søren S.; Poulsen, Rolf

    2004-01-01

    Danish mortgage loans have several features that make them interesting: Short-term revolving adjustable-rate mortgages are available, as well as fixed-rate, 10-, 20- or 30-year annuities that contain embedded options (call and delivery options). The decisions faced by a mortgagor are therefore non......-trivial, both in terms of deciding on an initial mortgage, and in terms of managing (rebalancing) it optimally.We propose a two-factor, arbitrage-free interest-rate model, calibrated to observable security prices, and implement on top of it a multi-stage, stochastic optimization program with the purpose...... of optimally composing and managing a typical mortgage loan. We model accurately both fixed and proportional transaction costs as well as tax effects. Risk attitudes are addressed through utility functions and through worst-case (min-max) optimization. The model is solved in up to 9 stages, having 19...

  13. Coalition Warfare Program (CWP): secure policy controlled information query and dissemination over a Bices network

    Science.gov (United States)

    Toth, Andrew; Pham, Tien; Karr, Todd; Bent, Graham; Harries, Dominic; Knox, Alan

    2013-05-01

    In 2006, the US Army Research Laboratory (ARL) and the UK Ministry of Defence (MoD) established a collaborative research alliance with academia and industry, called the International Technology Alliance (ITA) to address fundamental issues concerning Network and Information Sciences. Under the ITA research program, a US-UK transition project on "ITA Policy Controlled Information Query and Dissemination" was funded in 2011 by OSD's Coalition Warfare Program (CWP). The goal of this CWP project is to develop an extensible capability of performing distributed federated query and information dissemination across a coalition network of distributed disparate data/information sources with access­ controlled policies. The CWP project is lead by US Army Research Laboratory (ARL) and UK Defence Science Technology Laboratory (Dstl) with software development by IBM UK and IBM US. The CWP project exploits two key technology components developed within the ITA, namely the Gaian Database and integrated Access Policy Decision and Enforcement mechanisms. The Gaian Database (GaianDB) is a Dynamic Distributed Federated Database (DDFD) that addresses a need to share information among coalition members by providing a means for policy-controlled access to data across a network of heterogeneous data sources. GaianDB implements a SQL-compliant Store-Locally-Query-Anywhere (SLQA) approach providing software applications with global access to data from any node in the database network via standard SQL queries. Security policy is stored locally and enforced at the database node level, reducing potential for unauthorized data access and waste of network bandwidth. A key metric of success for a CWP project is the transition of coalition-related technology from TRL-3 or 4 to TRL-6 or higher. Thus, the end goal of this CWP project was to demonstrate the GaianDB and policy technology within an operational environment at the NATO Intelligence Fusion Centre (NIFC) at Molesworth RAF. An initial

  14. Impact of the national food supplementary program for children on household food security and maternal weight status in Iran

    Directory of Open Access Journals (Sweden)

    Delaram Ghodsi

    2016-01-01

    Full Text Available Background: Food aid programs are strategies that aim to improve nutritional status and to tackle food insecurity. This study aimed to evaluate the effect of a National Food Supplementary Program for Children on households′ food security. Methods: The study sample included 359 mothers of children aged 6-72 months under the coverage of the program in two provinces of Iran. Demographic and socioeconomic characteristics of the households and percentage of supplementary food items consumed by target child were assessed by a questionnaire and checklist. Data on household food security were collected by locally adapted Household Food Insecurity Access Scale at the baseline of the study and 6 months thereafter. Results: At the baseline, only 4.7% of families were food secure, while 43.5% were severely food insecure, and these proportions were changed to 7.9% and 38%, respectively (P 0.05. Conclusions: Findings show that the food supplementary program for children can also improve the household food security status. Further research is needed to assess other factors that affect the effectiveness of this kind of programs.

  15. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  16. Transition-ready technologies and expertise from the Chemical and Biological National Security Program at LLNL

    Energy Technology Data Exchange (ETDEWEB)

    Folta, P A; McBride, M T

    2006-02-22

    HSARPA has initiated a new Bioinformatics and Assay Development solicitation, BIAD2 (BAA 06-01), to address a number of technology gaps and requirements for biodetection (www.hsarpabaa.com). This solicitation will leverage the vast research and development capabilities of the private sector and academia in order to meet the needs of HSARPA and Homeland Security. In order to meet these requirements, this solicitation will: (1) Develop and validate actionable assays for the public and private sector; (2) Develop and validate new assays and novel assay methodologies to enhance existing detection systems and enable future detection platforms; (3) Develop next generation assays which are robust against novel, emerging and engineered threats; (4) Develop novel assays that detect low levels of ribonucleic acid (RNA)-based viral threats in complex backgrounds; (5) Develop novel assays to characterize the viability, degree of virulence or toxicity, and countermeasure resistance of a biological agent; and (6) Develop new bioinformatics tools to support assay development and assay validation The Lawrence Livermore National Laboratory (LLNL) Bioassays and Signature Program (BSP) develops nationally-validated detection and identification assays to cover the full range of biological threat agents, starting from human, animal, and plant pathogens on the Select Agent list. The assays that have been co-developed by the CDC and the BSP are used internationally and represent the gold standard for molecular detection of select agent pathogens for the public health community. They are also used in the DHS environmental monitoring operations such as BioWatch and DHS National Security Special Events support. These reagents have been used to process and analyze more than 5 million samples and have delivered exceptional performance for the end users, with zero false positives since their deployment. Currently, highly-multiplexed nucleic acid assays that represent the &apos

  17. Energy Security and Restoration Exercise Program/Best Practices and Information Sharing

    Energy Technology Data Exchange (ETDEWEB)

    Barbara McCabe; John Kovach

    2009-03-30

    The first year of this cooperative agreement focused on the following elements: curriculum development and presentation, curriculum maintenance, enhancements, and effectiveness, and smart card initiative. During the second year of this grant, with redirection from DOE, the IUOE modified its mission statement under the cooperative agreement. It states: 'The mission of the IUOE is to provide expertise to provide best practices, information sharing, and develop scenarios and conduct exercises ranging in size and complexity from table top to national level to prepare all stakeholders to protect and restore energy infrastructure should an event, terrorist or natural, occur'. The Program developed a number of products under this Cooperative Agreement. These products include: FOSTER (Facility Operations Safety Training Event Response) Curriculum and Training Models, Alternative Energy Supply - Generators Training Module, Liquefied Natural Gas Training Module, Education Program - Distributed Generations, Compendium of Resources and References, Energy Security and Restoration Training Manual, Manual of Situations and Scenarios Developed for Emergency Exercises, Manual of Best Practices/Lessons Learned for Energy Load Management, Training Plan, Strategic Information and Exercise Plan, National Certification Plan Report, and a Smart Card Project Report.

  18. What can Iran gain by having a nuclear weapons program that threatens to destabilize security in the Middle East?

    DEFF Research Database (Denmark)

    Nielsen, Thomas Galasz

    In this paper, Iran’s nuclear aspiration to destabilise power in the Middle East is analysed. Iran is attempting to develop a nuclear energy program, and perhaps even a nuclear weapons program, despite assurances of the opposite. An Iranian nuclear weapon would be a game changer in the region......, and domestic challenges, caused in part by United Nations’ sanctions, lack of development and internal political power struggles. Iran balances cleverly on the edge of either further international isolation or becoming a significant local power. It uses the threat of developing nuclear weapons, in com...... and a lot of neigh- bouring countries fear such a development for security reasons. But why is Iran following a nuclear path that may further destabilise the fragile security situation in the Middle East? It is to do with Iran’s own perception of security risks, its desire for greatness in the region...

  19. 78 FR 31955 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2013-05-28

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security National Protection... extends administrative Privacy Act protections to all individuals when systems of records maintain...: Department of Homeland Security, Privacy Office. ACTION: Notice of Privacy Act System of Records. SUMMARY: In...

  20. No Nation Is Home Alone: Understanding The International Dimension Of Homeland Security Through Global Transportation Security Programs

    Science.gov (United States)

    2016-03-01

    foreign assistance objectives.49 The authors explore multiple U.S. programs in Turkey, Pakistan, and Colombia , and conclude that even when aid programs...address health crises and concerns, and otherwise improve the overall “ quality of life” for citizens around the world. In its most complex description...participation of CBP, and a border water patrol project without the participation of USCG.198 These are only two limited examples. The need to

  1. Security Transition Program Office (STPO), technology transfer of the STPO process, tools, and techniques

    Energy Technology Data Exchange (ETDEWEB)

    Hauth, J.T.; Forslund, C.R.J.; Underwood, J.A.

    1994-09-01

    In 1990, with the transition from a defense mission to environmental restoration, the U.S. Department of Energy`s (DOE`s) Hanford Site began a significant effort to diagnose, redesign, and implement new safeguards and security (SAS) processes. In 1992 the Security Transition Program Office (STPO) was formed to address the sweeping changes that were being identified. Comprised of SAS and other contractor staff with extensive experience and supported by staff experienced in organizational analysis and work process redesign, STPO undertook a series of tasks designed to make fundamental changes to SAS processes throughout the Hanford Site. The goal of STPO is to align the SAS work and organization with the new Site mission. This report describes the key strategy, tools, methods, and techniques used by STPO to change SAS processes at Hanford. A particular focus of this review is transferring STPO`s experience to other DOE sites and federal agency efforts: that is, to extract, analyze, and provide a critical review of the approach, tools, and techniques used by STPO that will be useful to other DOE sites and national laboratories in transitioning from a defense production mode to environmental restoration and other missions. In particular, what lessons does STPO provide as a pilot study or model for implementing change in other transition activities throughout the DOE complex? More broadly, what theoretical and practical contributions do DOE transition efforts, such as STPO, provide to federal agency streamlining efforts and attempts to {open_quotes}reinvent{close_quotes} government enterprises in the public sector? The approach used by STPO should provide valuable information to those examining their own processes in light of new mission requirements.

  2. Research review of nongovernmental organizations' security policies for humanitarian programs in war, conflict, and postconflict environments.

    Science.gov (United States)

    Rowley, Elizabeth; Burns, Lauren; Burnham, Gilbert

    2013-06-01

    To identify the most and least commonly cited security management messages that nongovernmental organizations (NGOs) are communicating to their field staff, to determine the types of documentation that NGOs most often use to communicate key security messages, and to distinguish the points of commonality and divergence across organizations in the content of key security messages. The authors undertook a systematic review of available security policies, manuals, and training materials from 20 international humanitarian NGOs using the InterAction Minimum Operating Security Standards as the basis for a review framework. The most commonly cited standards include analytical security issues such as threat and risk assessment processes and guidance on acceptance, protection, and deterrence approaches. Among the least commonly cited standards were considering security threats to national staff during staffing decision processes, incorporating security awareness into job descriptions, and ensuring that national staff security issues are addressed in trainings. NGO staff receive security-related messages through multiple document types, but only 12 of the 20 organizations have a distinct security policy document. Points of convergence across organizations in the content of commonly cited standards were found in many areas, but differences in security risk and threat assessment guidance may undermine communication between aid workers about changes in local security environments. Although the humanitarian community has experienced significant progress in the development of practical staff security guidance during the past 10 years, gaps remain that can hinder efforts to garner needed resources, clarify security responsibilities, and ensure that the distinct needs of national staff are recognized and addressed.

  3. Blood flow reprograms lymphatic vessels to blood vessels.

    Science.gov (United States)

    Chen, Chiu-Yu; Bertozzi, Cara; Zou, Zhiying; Yuan, Lijun; Lee, John S; Lu, MinMin; Stachelek, Stan J; Srinivasan, Sathish; Guo, Lili; Vicente, Andres; Vincente, Andres; Mericko, Patricia; Levy, Robert J; Makinen, Taija; Oliver, Guillermo; Kahn, Mark L

    2012-06-01

    Human vascular malformations cause disease as a result of changes in blood flow and vascular hemodynamic forces. Although the genetic mutations that underlie the formation of many human vascular malformations are known, the extent to which abnormal blood flow can subsequently influence the vascular genetic program and natural history is not. Loss of the SH2 domain-containing leukocyte protein of 76 kDa (SLP76) resulted in a vascular malformation that directed blood flow through mesenteric lymphatic vessels after birth in mice. Mesenteric vessels in the position of the congenital lymphatic in mature Slp76-null mice lacked lymphatic identity and expressed a marker of blood vessel identity. Genetic lineage tracing demonstrated that this change in vessel identity was the result of lymphatic endothelial cell reprogramming rather than replacement by blood endothelial cells. Exposure of lymphatic vessels to blood in the absence of significant flow did not alter vessel identity in vivo, but lymphatic endothelial cells exposed to similar levels of shear stress ex vivo rapidly lost expression of PROX1, a lymphatic fate-specifying transcription factor. These findings reveal that blood flow can convert lymphatic vessels to blood vessels, demonstrating that hemodynamic forces may reprogram endothelial and vessel identity in cardiovascular diseases associated with abnormal flow.

  4. Impact of the National Food Supplementary Program for Children on Household Food Security and Maternal Weight Status in Iran.

    Science.gov (United States)

    Ghodsi, Delaram; Omidvar, Nasrin; Eini-Zinab, Hassan; Rashidian, Arash; Raghfar, Hossein

    2016-01-01

    Food aid programs are strategies that aim to improve nutritional status and to tackle food insecurity. This study aimed to evaluate the effect of a National Food Supplementary Program for Children on households' food security. The study sample included 359 mothers of children aged 6-72 months under the coverage of the program in two provinces of Iran. Demographic and socioeconomic characteristics of the households and percentage of supplementary food items consumed by target child were assessed by a questionnaire and checklist. Data on household food security were collected by locally adapted Household Food Insecurity Access Scale at the baseline of the study and 6 months thereafter. At the baseline, only 4.7% of families were food secure, while 43.5% were severely food insecure, and these proportions were changed to 7.9% and 38%, respectively ( P food insecurity in households with medium and high wealth index was 65% and 87% lower than those with low wealth index, respectively (odds ratio [OR] = 0.35, 95% confidence interval [CI]: 0.2-0.61, and OR = 0.23, 95% CI: 0.12-0.43). Food sharing was common among more than 95% of the studied households. Mean maternal body mass index (BMI) increased significantly after 6 months ( P food security in the baseline and at the end of the study ( P > 0.05). Findings show that the food supplementary program for children can also improve the household food security status. Further research is needed to assess other factors that affect the effectiveness of this kind of programs.

  5. Graduate Research Assistant Program for Professional Development at Oak Ridge National Laboratory (ORNL) Global Nuclear Security Technology Division (GNSTD)

    Energy Technology Data Exchange (ETDEWEB)

    Eipeldauer, Mary D [ORNL; Shelander Jr, Bruce R [ORNL

    2012-01-01

    The southeast is a highly suitable environment for establishing a series of nuclear safety, security and safeguards 'professional development' courses. Oak Ridge National Laboratory (ORNL) provides expertise in the research component of these subjects while the Y-12 Nuclear Security Complex handles safeguards/security and safety applications. Several universities (i.e., University of Tennessee, Knoxville (UTK), North Carolina State University, University of Michigan, and Georgia Technology Institute) in the region, which offer nuclear engineering and public policy administration programs, and the Howard Baker Center for Public Policy make this an ideal environment for learning. More recently, the Institute for Nuclear Security (INS) was established between ORNL, Y-12, UTK and Oak Ridge Associate Universities (ORAU), with a focus on five principal areas. These areas include policy, law, and diplomacy; education and training; science and technology; operational and intelligence capability building; and real-world missions and applications. This is a new approach that includes professional development within the graduate research assistant program addressing global needs in nuclear security, safety and safeguards.

  6. Transforming Homeland Security [video

    OpenAIRE

    McIntyre, David; Center for Homeland Defense and Security Naval Postgraduate School

    2011-01-01

    A pioneer in homeland security, and homeland security education, David McIntyre discusses the complexities in transforming homeland security from a national program in its inception, to also include state and local agencies and other public and private parties.

  7. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Rogers,E.; deBoer,G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  8. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  9. The information systems security officer's guide establishing and managing an information protection program

    CERN Document Server

    Kovacich, Gerald L

    2003-01-01

    Information systems security continues to grow and change based on new technology and Internet usage trends. In order to protect your organization's confidential information, you need information on the latest trends and practical advice from an authority you can trust. The new ISSO Guide is just what you need. Information Systems Security Officer's Guide, Second Edition, from Gerald Kovacich has been updated with the latest information and guidance for information security officers. It includes more information on global changes and threats, managing an international information secur

  10. 46 CFR 176.620 - Description of the Alternative Hull Examination (AHE) Program for certain passenger vessels.

    Science.gov (United States)

    2010-10-01

    ... program, or if a remotely operated vehicle (ROV) is used during the program, the preliminary exam step may... condition. If only divers are used for the underwater survey portion of the examination process, you may... every five years, with no more than three years between any two AHEs. The OCMI may waive an underwater...

  11. Food security status of older adult home-delivered meals program participants and components of its measurement.

    Science.gov (United States)

    Duerr, Lynn

    2006-01-01

    Food security status was assessed for 143 West Central Indiana community-dwelling older adults participating in a home-delivered meals program, using the national CPS-FSSM survey, based on economics, and augmented items, including such factors as ability to prepare and/or shop for food. Results showed that 74.8% were food secure, much lower than the national rate for households with elderly (94.0%). Gender and age were found to be statistically significant predictors of food security status (national items). Scores based on national versus augmented items were significantly correlated, but scores for augmented items showed more food insecurity, indicating these items identified more food insecure older adults than the national items alone.

  12. Evaluation of the awareness and effectiveness of IT security programs in a large publicly funded health care system.

    Science.gov (United States)

    Hepp, Shelanne L; Tarraf, Rima C; Birney, Arden; Arain, Mubashir Aslam

    2017-01-01

    Electronic health records are becoming increasingly common in the health care industry. Although information technology (IT) poses many benefits to improving health care and ease of access to information, there are also security and privacy risks. Educating health care providers is necessary to ensure proper use of health information systems and IT and reduce undesirable outcomes. This study evaluated employees' awareness and perceptions of the effectiveness of two IT educational training modules within a large publicly funded health care system in Canada. Semi-structured interviews and focus groups included a variety of professional roles within the organisation. Participants also completed a brief demographic data sheet. With the consent of participants, all interviews and focus groups were audio recorded. Thematic analysis and descriptive statistics were used to evaluate the effectiveness of the IT security training modules. Five main themes emerged: (i) awareness of the IT training modules, (ii) the content of modules, (iii) staff perceptions about differences between IT security and privacy issues, (iv) common breaches of IT security and privacy, and (v) challenges and barriers to completing the training program. Overall, nonclinical staff were more likely to be aware of the training modules than were clinical staff. We found e-learning was a feasible way to educate a large number of employees. However, health care providers required a module on IT security and privacy that was relatable and applicable to their specific roles. Strategies to improve staff education and mitigate against IT security and privacy risks are discussed. Future research should focus on integrating health IT competencies into the educational programs for health care professionals.

  13. From DDR to Security Promotion: Connecting national programs to community initiatives

    NARCIS (Netherlands)

    Verkoren, W.; Willems, R.C.|info:eu-repo/dai/nl/322376971; Kleingeld, J.; Rouw, H.

    2010-01-01

    Disarmament, demobilization and reintegration (DDR) is a set of activities that forms part of strategies for peacebuilding after civil war. DDR has become the standard way of addressing security threats in immediate post-conflict situations. However, DDR is designed to promote national security,

  14. 75 FR 51609 - Classified National Security Information Program for State, Local, Tribal, and Private Sector...

    Science.gov (United States)

    2010-08-23

    ... security information shared by the Federal Government with State, local, tribal, and private sector (SLTPS... entity'' as defined in section 2 of the Homeland Security Act of 2002 (6 U.S.C. 101(11)). (g) ``Private... President [[Page 51609

  15. 46 CFR 25.26-5 - Commercial fishing industry vessels.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Commercial fishing industry vessels. 25.26-5 Section 25.26-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY UNINSPECTED VESSELS REQUIREMENTS Emergency Position Indicating Radio Beacons (EPIRB) § 25.26-5 Commercial fishing industry vessels. (a) The owner of a...

  16. The relationship between neuroleptic drug dose and the performance of psychiatric patients in a maximum security token economy program.

    Science.gov (United States)

    Harris, G T

    1989-03-01

    This study examined the relationship between neuroleptic medication dose and performance in a token economy program on two maximum security psychiatric wards. Patients receiving higher than average doses exhibited poorer than average program performance but there was a small but statistically significant positive relationship between neuroleptic drug dose (measured in CPZ units/kg) and program performance. However, this positive relationship existed only for the first few weeks of patients' hospital stays, and there was a delay (approximately 2 weeks) between the administration of the drug and the maximal positive effect on program performance. Only a very small minority of medication changes were ever followed by improvements in program performance. The results are discussed in terms of what is a rational strategy for the provision of psychiatric medication and other forms of treatment in institutional settings.

  17. 33 CFR 104.270 - Security measures for restricted areas.

    Science.gov (United States)

    2010-07-01

    ... restricted areas in order to: (1) Prevent or deter unauthorized access; (2) Protect persons authorized to be on board; (3) Protect the vessel; (4) Protect sensitive security areas within the vessel; (5) Protect... within the area constitutes a breach of security. (d) Maritime Security (MARSEC) Level 1. The vessel...

  18. Canine Supply for Physical Security: An Analysis of the Royal Australian Air Force Military Working Dog Program

    Science.gov (United States)

    2016-03-01

    performance in military working dogs : Reliability and predictive validity of behavioral tests. Applied Animal Behaviour Science, 127(1–2), 51–65. doi...Weiss, A. (2007). Traits and genotypes may predict the successful training of drug detection dogs . Applied Animal Behaviour Science, 107(3–4), 287...PHYSICAL SECURITY: AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM by Mark W. Powell March 2016 Thesis

  19. Ontario Securities Commission has authority to investigate viatical settlement purchase program.

    Science.gov (United States)

    Cruess, Gord

    2004-04-01

    On 27 October 2003, the Ontario Superior Court of Justice held that the Ontario Securities Commission (the Commission) has the authority to compel testimony and the production of written documents from parties that are not registered under the Ontario Securities Act (OSA). The finding in Universal Settlements International, Inc v Ontario (Securities Commission) is important because it affirms the authority of the Commission to investigate businesses that might be engaging in the sale of illegal viatical settlements, an unregulated industry with potential negative impacts for people living with HIV/AIDS.

  20. Report: FY 2007 FISMA Report: Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #2007-S-00003, September 25, 2007. This is the Office of Inspector General’s Fiscal Year 2007 Federal Information Security Management Act Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  1. Report: FISMA - Fiscal Year 2004 Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #2004-S-00007, September 30, 2004. This report synopsizes the results of information technology security work the U.S. Environmental Protection Agency’s Office of Inspector General (OIG) performed during Fiscal Year (FY) 2004.

  2. Y-12 National Security Complex Biological Monitoring And Abatement Program 2008 Calendar Year Report

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, M. J.; Greeley Jr., M. S.; Mathews, T. J.; Morris, G. W.; Roy, W. K.; Ryon, M. G.; Smith, J. G.; Southworth, G. R.

    2009-07-01

    The National Pollutant Discharge Elimination System (NPDES) permit issued for the Oak Ridge Y-12 National Security Complex (Y-12 Complex) which became effective May 1, 2006, continued a requirement for a Biological Monitoring and Abatement Program (BMAP). The BMAP was originally developed in 1985 to demonstrate that the effluent limitations established for the Y-12 Complex protected the classified uses of the receiving stream (East Fork Poplar Creek: EFPC), in particular, the growth and propagation of aquatic life (Loar et al. 1989). The objectives of the current BMAP are similar, specifically to assess stream ecological conditions relative to regulatory limits and criteria, to assess ecological impacts as well as recovery in response to Y-12 operations, and to investigate the causes of continuing impacts. The BMAP consists of three tasks that reflect complementary approaches to evaluating the effects of the Y-12 Complex discharges on the biotic integrity of EFPC. These tasks include: (1) bioaccumulation monitoring, (2) benthic macroinvertebrate community monitoring, and (3) fish community monitoring. As required by the NPDES permit, the BMAP benthic macroinvertebrate community monitoring task includes studies to annually evaluate the receiving stream's biological integrity in comparison to TN Water Quality Criteria. BMAP monitoring is currently being conducted at five primary EFPC sites, although sites may be excluded or added depending upon the specific objectives of the various tasks. Criteria used in selecting the sites include: (1) location of sampling sites used in other studies, (2) known or suspected sources of downstream impacts, (3) proximity to U.S. Department of Energy (DOE) Oak Ridge Reservation (ORR) boundaries, (4) appropriate habitat distribution, and (5) access. The primary sampling sites include upper EFPC at kilometers (EFKs) 24.4 and 23.4 [upstream and downstream of Lake Reality (LR) respectively]; EFK 18.7 (also EFK 18.2 and 19), located off

  3. Y-12 Groundwater Protection Program CY 2009 Triennial Report Of The Monitoring Well Inspection And Maintenance Program, Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-06-01

    This document is the triennial report for the Well Inspection and Maintenance Program of the Y- 12 Groundwater Protection Program (GWPP), at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12). This report formally documents well inspection events conducted on active and inactive wells at Y-12 during calendar years (CY) 2007 through 2009; it documents well maintenance and plugging and abandonment activities completed since the last triennial inspection event (CY 2006); and provides summary tables of well inspection events, well maintenance events, and well plugging and abandonment events during the reference time period.

  4. In Harm’s Way: Family Separation, Immigration Enforcement Programs and Security on the US-Mexico Border

    Directory of Open Access Journals (Sweden)

    Jeremy Slack

    2015-03-01

    Full Text Available The Consequence Delivery System (CDS is a suite of border and immigration enforcement programs designed to increase the penalties associated with unauthorized migration in order to convince people not to return (Rosenblum 2013. Despite its inauguration in 2011, many aspects of the CDS are not new. CDS does however, mark a shift from the deterrent strategy that, in the 1990s that relied heavily on the dangers of the natural terrain to dissuade unauthorized border crossers, to one that actively punishes, incarcerates, and criminalizes them. This article presents findings from the Migrant Border Crossing Study, a random sample survey of 1,100 recently deported migrants in six cities in Mexico conducted between 2009 and 2012. It examines the demographics and family ties of deportees, their experiences with immigration enforcement practices and programs under the CDS, and how these programs have reshaped contemporary migration and deportation along the US-Mexico border. The article covers programs such as criminal prosecutions of illegal entries under Operation Streamline, and the Alien Transfer and Exit Program (ATEP or lateral repatriation program which returns immigrants to different locations from where they illegally entered. In relationship to these programs, it considers issues of due process and treatment of deportees in US custody. It also examines interior enforcement under Secure Communities, which, during the study period, comprised part of the overarching border security plan, and screened virtually everybody arrested in the United States against immigration databases.The article concludes that these programs do not have a strong deterrent effect. Instead, immigration enforcement has led to a “caging effect” over the past two decades which has disrupted seasonal migration flows, increased familial and social ties to the United States, and decreased the probability of returning to Mexico once in the United States. The development of

  5. 20 CFR 664.210 - How is the “requires additional assistance to complete an educational program, or to secure and...

    Science.gov (United States)

    2010-04-01

    ... secure and hold employment” criterion in § 664.200(c)(6) defined and documented? Definitions and... and documented? 664.210 Section 664.210 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION... educational program, or to secure and hold employment” criterion of § 664.200(c)(6) may be established at the...

  6. Nevada National Security Site 2014 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    Energy Technology Data Exchange (ETDEWEB)

    Hudson, David [National Security Technologies, LLC. (NSTec), Las Vegas, NV (United States)

    2015-02-01

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada National Security Site, Nye County, Nevada. Groundwater samples from the aquifer immediately below the Area 5 RWMS have been collected and analyzed and static water levels have been measured in this aquifer since 1993. This report updates these data to include the 2014 results. Analysis results for leachate contaminants collected from the mixed-waste cell at the Area 5 RWMS (Cell 18) are also included. During 2014, groundwater samples were collected and static water levels were measured at three wells surrounding the Area 5 RWMS. Groundwater samples were collected at wells UE5PW-1, UE5PW-2, and UE5PW-3 on March 11 and August 12, 2014, and static water levels were measured at each of these wells on March 10, June 2, August 11, and October 14, 2014. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. General water chemistry (cations and anions) was also measured. Results from samples collected in 2014 are within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. The data from the shallow aquifer indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS, and there were no significant changes in measured groundwater parameters compared to previous years. Leachate from above the primary liner of Cell 18 drains into a sump and is collected in a tank at the ground surface. Cell 18 began receiving waste in January 2011. Samples were collected from the tank when the leachate volume approached the 3,000-gallon tank capacity. Leachate samples have been collected 16 times since January 2011. During 2014, samples were collected on February 25, March 5, May 20, August 12, September 16, November 11, and December 16. Each leachate sample was

  7. Vessel Operator System

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Operator cards are required for any operator of a charter/party boat and or a commercial vessel (including carrier and processor vessels) issued a vessel permit from...

  8. Y-12 National Security Complex Biological Monitoring and Abatement Program 2007 Calendar Yeare Report

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, M.J.; Greeley, M. S. Jr.; Morris, G. W.; Roy, W. K.; Ryan, M. G.; Smith, J. G.; Southworth, G. R.

    2008-07-01

    The National Pollutant Discharge Elimination System (NPDES) permit issued for the Oak Ridge Y-12 National Security Complex (Y-12 Complex) which became effective May 1, 2006, continued a requirement for a Biological Monitoring and Abatement Program (BMAP). The BMAP was originally developed in 1985 to demonstrate that the effluent limitations established for the Y-12 Complex protected the classified uses of the receiving stream (East Fork Poplar Creek: EFPC), in particular, the growth and propagation of aquatic life (Loar et al. 1989). The objectives of the current BMAP are similar, specifically to assess stream ecological conditions relative to regulatory limits and criteria, to assess ecological impacts as well as recovery in response to Y-12 operations, and to investigate the causes of continuing impacts. The BMAP consists of three tasks that reflect complementary approaches to evaluating the effects of the Y-12 Complex discharges on the biotic integrity of EFPC. These tasks include: (1) bioaccumulation monitoring, (2) benthic macroinvertebrate community monitoring, and (3) fish community monitoring. As required by the NPDES permit, the BMAP benthic macroinvertebrate community monitoring task includes studies to annually evaluate the receiving stream's biological integrity in comparison to TN Water Quality Criteria. BMAP monitoring is currently being conducted at five primary EFPC sites, although sites may be excluded or added depending upon the specific objectives of the various tasks. Criteria used in selecting the sites include: (1) location of sampling sites used in other studies, (2) known or suspected sources of downstream impacts, (3) proximity to U.S. Department of Energy (DOE) Oak Ridge Reservation (ORR) boundaries, (4) appropriate habitat distribution, and (5) access. The primary sampling sites include upper EFPC at kilometers (EFKs) 24.4 and 23.4 [upstream and downstream of Lake Reality (LR) respectively]; EFK 18.7 (also EFK 18.2 and 19), located

  9. Fuzzy Chance-constrained Programming Based Security Information Optimization for Low Probability of Identification Enhancement in Radar Network Systems

    Directory of Open Access Journals (Sweden)

    C. G. Shi

    2015-04-01

    Full Text Available In this paper, the problem of low probability of identification (LPID improvement for radar network systems is investigated. Firstly, the security information is derived to evaluate the LPID performance for radar network. Then, without any prior knowledge of hostile intercept receiver, a novel fuzzy chance-constrained programming (FCCP based security information optimization scheme is presented to achieve enhanced LPID performance in radar network systems, which focuses on minimizing the achievable mutual information (MI at interceptor, while the attainable MI outage probability at radar network is enforced to be greater than a specified confidence level. Regarding to the complexity and uncertainty of electromagnetic environment in the modern battlefield, the trapezoidal fuzzy number is used to describe the threshold of achievable MI at radar network based on the credibility theory. Finally, the FCCP model is transformed to a crisp equivalent form with the property of trapezoidal fuzzy number. Numerical simulation results demonstrating the performance of the proposed strategy are provided.

  10. Integrated Food and Nutrition Security Programming to Address Undernutrition : The Plan Approach

    NARCIS (Netherlands)

    Boer, de F.A.; Verdonk, I.

    2012-01-01

    From a technical point of view, it is widely recognised that an integrated approach to food and nutrition security is an effective way to promote child nutritional well-being. In this desk review, based on project documents of the countries which took part in the PLAN NL supported Food and Nutrition

  11. Management of U.S. Coast Guard Information Security Program Using Management by Objectives.

    Science.gov (United States)

    1979-09-01

    conducted. These men described their jobs and the attendant problems with obvious complete frankness and in the most lucid way. Thirdly, the security...scenario is not an unrealistic dream but a statement of the conditions that would exist if the organization arrived at some future state successfully

  12. Software Quality and Security in Teachers' and Students' Codes When Learning a New Programming Language

    Science.gov (United States)

    Boutnaru, Shlomi; Hershkovitz, Arnon

    2015-01-01

    In recent years, schools (as well as universities) have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to…

  13. 76 FR 72433 - Revision of Agency Information Collection Activity Under OMB Review: Secure Flight Program

    Science.gov (United States)

    2011-11-23

    ... establishments beyond the screening checkpoint which airport operators will submit to Secure Flight, and a survey... weight of over 12,500 pounds. The collection will also cover certain identifying information for non-traveling individuals who airport operators seek to authorize to proceed through the screening checkpoint to...

  14. Do European Banks with a Covered Bond Program still issue Asset-Backed Securities for funding?

    NARCIS (Netherlands)

    Boesel, Nils; Kool, C.J.M.; Lugo, S.

    The decline in the issuance of Asset-Backed Securities (ABS) since the financial crisis and the comparative advantage of Covered Bonds (CBs) as a funding alternative to ABS raise the question whether banks still issue ABS as a mean to receive funding. Employing double-hurdle regression models on a

  15. A novel food pantry program: food security, self-sufficiency, and diet-quality outcomes.

    Science.gov (United States)

    Martin, Katie S; Wu, Rong; Wolff, Michele; Colantonio, Angela G; Grady, James

    2013-11-01

    The number of food pantries in the U.S. has grown dramatically over 3 decades, yet food insecurity remains a persistent public health problem. The goal of the study was to examine the impact of a food pantry intervention called Freshplace, designed to promote food security. Randomized parallel-group study with equal randomization. Data were collected from June 2010 to June 2012; a total of 228 adults were recruited over 1 year from traditional food pantries and randomized to the Freshplace intervention (n=113) or control group (n=115), with quarterly follow-ups for 12 months. The Freshplace intervention included a client-choice pantry, monthly meetings with a project manager to receive motivational interviewing, and targeted referrals to community services. Control group participants went to traditional food pantries where they received bags of food. Data analyses were conducted from July 2012 to January 2013. Outcomes were food security, self-sufficiency, and fruit and vegetable consumption. Multivariate regression models were used to predict the three outcomes, controlling for gender, age, household size, income, and presence of children in the household. At baseline, half of the sample experienced very low food security. Over 1 year, Freshplace members were less than half as likely to experience very low food security, increased self-sufficiency by 4.1 points, and increased fruits and vegetables by one serving per day compared to the control group, all outcomes p<0.01. Freshplace may serve as a model for other food pantries to promote food security rather than short-term assistance by addressing the underlying causes of poverty. © 2013 American Journal of Preventive Medicine.

  16. Y-12 Groundwater Protection Program CY2012 Triennial Report Of The Monitoring Well Inspection And Maintenance Program Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-09-01

    This document is the triennial report for the Well Inspection and Maintenance Program of the Y- 12 Groundwater Protection Program (GWPP), at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12). This report formally documents well inspections completed by the GWPP on active and inactive wells at Y-12 during calendar years (CY) 2010 through 2012. In addition, this report also documents well inspections performed under the Y-12 Water Resources Restoration Program, which is administered by URS|CH2M Oak Ridge (UCOR). This report documents well maintenance activities completed since the last triennial inspection event (CY 2009); and provides summary tables of well inspections and well maintenance activities during the reference time period.

  17. Food security of older adults requesting Older Americans Act Nutrition Program in Georgia can be validly measured using a short form of the U.S. Household Food Security Survey Module.

    Science.gov (United States)

    Lee, Jung Sun; Johnson, Mary Ann; Brown, Arvine; Nord, Mark

    2011-07-01

    Food security is a newly recommended outcome measure for the Older Americans Act Nutrition Program (OAANP); however, it is unknown how best to evaluate the need for this program and assess its impact on a large scale. Therefore, we measured food security in all new OAANP participants and waitlisted applicants in Georgia between July and early November, 2008 (n = 4731) with the self-administered mail survey method used in the ongoing Georgia Performance Outcomes Measures project. We used a modified 6-item U.S. Household Food Security Survey Module (HFSSM) with a 30-d reference period and 2 reminder postcards. Approximately 33% of those identified completed the survey (n = 1594, mean age 74.6 ± 9.5 y, 68.6% female, 30.6% black). Most of the respondents (91%) completed all 6 food security questions, whereas 26 did not respond to any question. Infit and outfit statistics for each of the 6 questions were within an acceptable range. Psychometric properties observed in our food security data were generally similar to those in the nationally representative survey conducted by the Census Bureau and suggest that our food security statistics may be meaningfully compared with national food security statistics published by the USDA. Our findings suggest that food security can be reasonably measured by a short form of HFSSM in older adults requesting OAANP. Such methodology also can be used to estimate the extent of food insecurity and help guide program and policy decisions to meet the nutrition assistance needs of vulnerable older adults.

  18. 46 CFR 50.05-15 - Vessels subject to regulations in this subchapter.

    Science.gov (United States)

    2010-10-01

    ...-15 Section 50.05-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING GENERAL PROVISIONS Application § 50.05-15 Vessels subject to regulations in this subchapter. (a) Passenger vessels, tank vessels, cargo and miscellaneous vessels, nautical schoolships, mobile offshore...

  19. DoD Theater Nuclear Forces Survivability and Security (TNFSS): Compendium of Assessments Related to TNFSSCCC Program. Volume I.

    Science.gov (United States)

    1979-12-31

    intergration with the existing TNF S2 Compendium. 1.2 ORGANIZATION OF THE COMPENDIUM Each assessment and document which has been identified and included in this...of TNF S2 C3 Program concern: (1) Threat to C3 CODE NUMBER: 1 (2) Security of C3 facilities * 2 (3) Survivability of C3 facilities 3 (4) C3...to the general C3 area and in particular to 10 I the modeling and simulation of C3 systems or networks . Similarly, a B.3.4 entry would indicate a

  20. Building Economic Security Today: making the health-wealth connection in Contra Costa county's maternal and child health programs.

    Science.gov (United States)

    Parthasarathy, Padmini; Dailey, Dawn E; Young, Maria-Elena D; Lam, Carrie; Pies, Cheri

    2014-02-01

    In recent years, maternal and child health professionals have been seeking approaches to integrating the Life Course Perspective and social determinants of health into their work. In this article, we describe how community input, staff feedback, and evidence from the field that the connection between wealth and health should be addressed compelled the Contra Costa Family, Maternal and Child Health (FMCH) Programs Life Course Initiative to launch Building Economic Security Today (BEST). BEST utilizes innovative strategies to reduce inequities in health outcomes for low-income Contra Costa families by improving their financial security and stability. FMCH Programs' Women, Infants, and Children Program (WIC) conducted BEST financial education classes, and its Medically Vulnerable Infant Program (MVIP) instituted BEST financial assessments during public health nurse home visits. Educational and referral resources were also developed and distributed to all clients. The classes at WIC increased clients' awareness of financial issues and confidence that they could improve their financial situations. WIC clients and staff also gained knowledge about financial resources in the community. MVIP's financial assessments offered clients a new and needed perspective on their financial situations, as well as support around the financial and psychological stresses of caring for a child with special health care needs. BEST offered FMCH Programs staff opportunities to engage in non-traditional, cross-sector partnerships, and gain new knowledge and skills to address a pressing social determinant of health. We learned the value of flexible timelines, maintaining a long view for creating change, and challenging the traditional paradigm of maternal and child health.

  1. Non-proliferation, safeguards, and security for the fissile materials disposition program immobilization alternatives

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, R.A.; Jaeger, C.D.; Tolk, K.M. [Sandia National Labs., Albuquerque, NM (United States); Moore, L.R. [Lawrence Livermore National Lab., CA (United States)

    1996-05-01

    The Department of Energy is analyzing long-term storage and disposition alternatives for surplus weapons-usable fissile materials. A number of different disposition alternatives are being considered. These include facilities for storage, conversion and stabilization of fissile materials, immobilization in glass or ceramic material, fabrication of fissile material into mixed oxide (MOX) fuel for reactors, use of reactor based technologies to convert material into spent fuel, and disposal of fissile material using geologic alternatives. This paper will focus on how the objectives of reducing security and proliferation risks are being considered, and the possible facility impacts. Some of the areas discussed in this paper include: (1) domestic and international safeguards requirements, (2) non-proliferation criteria and measures, (3) the threats, and (4) potential proliferation, safeguards, and security issues and impacts on the facilities. Issues applicable to all of the possible disposition alternatives will be discussed in this paper. However, particular attention is given to the plutonium immobilization alternatives.

  2. DoD Information Security Program and Protection of Sensitive Compartmented Information (SCI)

    Science.gov (United States)

    2016-04-21

    classified, safeguarded, and declassified in accordance with References (c), (d), and DoD Manual 5200.01 (Reference (i)). CUI will be identified...Information will not be classified, continue to be maintained as classified, or fail to be declassified , or be designated CUI under any circumstances in...compliance with established SCI security policies and procedures. (a) Issues reports detailing any deficiencies noted and corrective action required

  3. Measuring Preparedness: Assessing the Impact of the Homeland Security Grant Program

    Science.gov (United States)

    2009-03-01

    component of the research process, homeland security professionals were surveyed through the on-line tool, Survey Monkey . Participants were...funding have been non existent for local governments. All the funding has gone to the boys and their toys . Private Sector • We are a hospital, and...capabilities at the local level. • We appreciate the funds, but has it improved our level of preparedness, not really, we have a few more toys to play

  4. A Policy and Program for Invigorating Science and Technology for National Security

    Science.gov (United States)

    2014-04-01

    security S&T, and facilitate commercialisation of research outcomes for national benefit. The policy will be delivered through a coherent and...our economy and higher living and education standards1,2. Questions for discussion: Q2.1 Are there other imperatives or drivers that justify the...organisations can drive the uptake of new technology and knowledge. Second, private sector organisations are essential to the commercialisation of

  5. Safeguarding critical e-documents implementing a program for securing confidential information assets

    CERN Document Server

    Smallwood, Robert F

    2012-01-01

    Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications.Provides practical, step-by-step guidance o

  6. Nevada National Security Site 2013 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    Energy Technology Data Exchange (ETDEWEB)

    Hudson, David B. [National Security Technologies, LLC, Las Vegas, NV (United States)

    2014-02-01

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada National Security Site, Nye County, Nevada. Groundwater samples from the aquifer immediately below the Area 5 RWMS have been collected and analyzed and static water levels have been measured in this aquifer since 1993. This report updates these data to include the 2013 results. Beginning with this report, analysis results for leachate collected from the mixed-waste cell at the Area 5 RWMS (Cell 18) are also included.

  7. CG Vessel Traffic Service Program.

    Science.gov (United States)

    1980-06-01

    Navigation (RATAN) in New York Harbor. The system used a shore-based radar to scan the harbor approaches and television to broadcast real -time radar...11ILCTION (,0 f~ce Is ;%oys (o) wsry (V AIR TIPERATulct 2-wie esat ____Y_______22 23 ""SACPIIfOS sl"t (iLA -AT.N TIMP (G)JIGU’T OF SEA ’i) SINEC1ION

  8. 77 FR 43639 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-07-25

    ...)/Department of Veterans Affairs (VA), Veterans Benefits Administration (VBA))--Match Number 1008 AGENCY: SSA... of an existing computer matching program that we are currently conducting with VA/VBA. DATES: We will... Benefits Administration (VBA) A. Participating Agencies SSA and VA/VBA. B. Purpose of the Matching Program...

  9. 77 FR 54943 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-09-06

    ...)/Department of Veterans Affairs (VA), Veterans Benefits Administration (VBA))--Match Number 1309 AGENCY: SSA... of an existing computer matching program that we are currently conducting with VA/VBA. DATES: We will... Benefits Administration (VBA). A. Participating Agencies SSA and VA/VBA. B. Purpose of the Matching Program...

  10. BIOASSAY VESSEL FAILURE ANALYSIS

    Energy Technology Data Exchange (ETDEWEB)

    Vormelker, P

    2008-09-22

    Two high-pressure bioassay vessels failed at the Savannah River Site during a microwave heating process for biosample testing. Improper installation of the thermal shield in the first failure caused the vessel to burst during microwave heating. The second vessel failure is attributed to overpressurization during a test run. Vessel failure appeared to initiate in the mold parting line, the thinnest cross-section of the octagonal vessel. No material flaws were found in the vessel that would impair its structural performance. Content weight should be minimized to reduce operating temperature and pressure. Outer vessel life is dependent on actual temperature exposure. Since thermal aging of the vessels can be detrimental to their performance, it was recommended that the vessels be used for a limited number of cycles to be determined by additional testing.

  11. Temperature profile data from XBT casts from cooperating vessels in support of the NOAA volunteer observing program, 2000-08 to 2001-07 (NODC Accession 0000528)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Temperature profiles were collected from XBT casts from NOAA Ship MILLER FREEMAN and other vessels from a world-wide distribution from 6 August 2000 to 21 July 2001....

  12. Temperature profile data from XBT casts by participating vessels in NOAA's Volunteer Observing Ships Program, August - December 2001 (NODC Accession 0000635)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Temperature profiles were collected from XBT casts from the ENTERPRISE and other vessels from a world-wide distribution from 01 August 2001 to 03 December 2001. Data...

  13. Oceanographic and meteorological data collected on expeditions of vessels in the academic fleet since 1994, submitted by the Rolling Deck to Repository (R2R) program

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This collection includes oceanographic and meteorological data collected during expeditions of vessels in the academic fleet. The data have been managed using the...

  14. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  15. Connected vehicle pilot deployment program phase I : security management operational concept, Tampa Hillsborough Expressway Authority (THEA).

    Science.gov (United States)

    2016-05-01

    The Tampa Hillsborough Expressway Authority (THEA) Connected Vehicle (CV) Pilot Deployment Program is intended to develop a suite of applications that utilize vehicle to infrastructure (V2I) and vehicle to vehicle (V2V) communication technology to re...

  16. Connected vehicle pilot deployment program phase 1, security management operational concept : ICF/Wyoming.

    Science.gov (United States)

    2016-03-14

    The Wyoming Department of Transportations (WYDOT) Connected Vehicle (CV) Pilot Deployment Program is intended to develop a suite of applications that utilize vehicle to infrastructure (V2I) and vehicle to vehicle (V2V) communication technology to ...

  17. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  18. 78 FR 63235 - Tank Vessel Oil Transfers

    Science.gov (United States)

    2013-10-23

    ... engaged in oil transfer operations? 12. Are there conflicts or areas of improvement with regard to... SECURITY Coast Guard Tank Vessel Oil Transfers AGENCY: Coast Guard, DHS. ACTION: Notice and request for comments. SUMMARY: The Coast Guard announces that it is considering new measures to reduce the risks of oil...

  19. Guam Abandoned Vessel Inventory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Guam. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  20. Florida Abandoned Vessel Inventory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Florida. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  1. Vessel Arrival Info - Legacy

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Vessel Arrival Info is a spreadsheet that gets filled out during the initial stage of the debriefing process by the debriefer. It contains vessel name, trip...

  2. 46 CFR 188.10-53 - Oceanographic research vessel.

    Science.gov (United States)

    2010-10-01

    ... research, including those studies about the sea such as seismic, gravity meter, and magnetic exploration... 46 Shipping 7 2010-10-01 2010-10-01 false Oceanographic research vessel. 188.10-53 Section 188.10-53 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS...

  3. ALICE HMPID Radiator Vessel

    CERN Multimedia

    2003-01-01

    View of the radiator vessels of the ALICE/HMPID mounted on the support frame. Each HMPID module is equipped with 3 indipendent radiator vessels made out of neoceram and fused silica (quartz) windows glued together. The spacers inside the vessel are needed to stand the hydrostatic pressure. http://alice-hmpid.web.cern.ch/alice-hmpid

  4. Development and evaluation of a survey-based type of benefit classification for the Social Security program.

    Science.gov (United States)

    Vaughan, D R

    1989-01-01

    This attempt to classify Social Security beneficiaries by type of benefit using the new Survey of Income and Program Participation (SIPP) has yielded promising results. Evaluations of the classification algorithm based on comparison of the estimated number of beneficiaries in each of the several categories to independent estimates of the number of beneficiaries indicate that in most instances a high percentage of each category has been identified. For the most part, age and monthly benefit amount size distributions seem reasonable. Furthermore, very few persons in the sample who were identified as Social Security beneficiaries could not be assigned to one or another of the benefit groups. The classification procedure also represents a marked improvement over earlier efforts to classify type of beneficiary that relied on data from the March Supplement to the Current Population Survey (CPS). Most importantly, the benefit classification scheme based on SIPP data appears to provide reasonably reliable distinctions between retired-worker and widow benefits for widowed women and permits the identification of retired-worker benefits for those women dually entitled to retired-worker and spouse benefits. In addition, the distinction between disabled- and retired-worker benefits for recipients aged 62-64 appears to be reasonably reliable, and for women under age 65, the classification procedure distinguishes between disabled-worker benefits on the one hand and widow and widowed mother benefits on the other. Finally, SIPP procedures for identifying minor child beneficiaries yield markedly better estimates than those available from the Current Population Survey. These improvements in the SIPP context are due entirely to the presence of information not collected in the CPS. The enhancement of the SIPP data set in turn resulted directly from an assessment of earlier work carried out by Projector and Bretz in the CPS context and on extensive research into the nature of Social

  5. Computer Security Products Technology Overview

    Science.gov (United States)

    1988-10-01

    This paper provides an overview of currently available computer security techniques and was written in support of the Security Products Program...Need (SON) 10-82. The SecurityPro program is an attempt to identify and address SAC’s specific computer security needs.

  6. Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.

    Science.gov (United States)

    1987-12-31

    hours of negotiations, and no one was injured. The secor- incident involved the hijacking and subsequent theft of a nine-seat general aviation...Eldorado International Airport at Bogota , Colcmbia. The results of the survey have provided a foundation for a multiyear improvement program for Colombia

  7. Potential Cost Savings and Cost Avoidances Associated With Security Cooperation Training Programs

    Science.gov (United States)

    2015-12-01

    Joint Combined Exchange Trainings MBA Masters of Business Administration MERHC Medicare-eligible retiree health care MODA Ministry of Defense...Related Construction (ERC) Title 10 Ministry of Defense Advisors ( MODA ) Program Title 10 Coalition Support Funds (CSF), including Coalition Readiness

  8. Cyber Forensics and Security as an ABET-CAC Accreditable Program

    Science.gov (United States)

    Wood, David F.; Kohun, Frederick G.; Ali, Azad; Paullet, Karen; Davis, Gary A.

    2010-01-01

    This paper frames the recent ABET accreditation model with respect to the balance between IS programs and innovation. With the current relaxation of the content of the information systems requirement by ABET, it is possible to include innovation into the accreditation umbrella. To this extent this paper provides a curricular model that provides…

  9. HTGR Base Technology Program. Task 2: concrete properties in nuclear environment. A review of concrete material systems for application to prestressed concrete pressure vessels

    Energy Technology Data Exchange (ETDEWEB)

    Naus, D.J.

    1981-05-01

    Prestressed concrete pressure vessels (PCPVs) are designed to serve as primary pressure containment structures. The safety of these structures depends on a correct assessment of the loadings and proper design of the vessels to accept these loadings. Proper vessel design requires a knowledge of the component (material) properties. Because concrete is one of the primary constituents of PCPVs, knowledge of its behavior is required to produce optimum PCPV designs. Concrete material systems are reviewed with respect to constituents, mix design, placing, curing, and strength evaluations, and typical concrete property data are presented. Effects of extreme loadings (elevated temperature, multiaxial, irradiation) on concrete behavior are described. Finally, specialty concrete material systems (high strength, fibrous, polymer, lightweight, refractory) are reviewed. 235 references.

  10. COMPUTER SECURITY AND SECURITY TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    Lazar Stošić

    2013-01-01

    Full Text Available With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information. A set of tools, procedures, policies and solutions to defend against attacks are collectively referred to as computer network security. It is necessary above all to define and learn about the concepts of attack, risk, threat, vulnerability and asset value. During the design and implementation of information systems should primarily take into account a set of measures to increase security and maintenance at an acceptable level of risk. In any case, there is a need to know the risks in the information system. Sources of potential security problems are challenges and attacks, while the risk relates to the probable outcome and its associated costs due to occurrence of certain events. There are numerous techniques help protect your computer: cryptography, authentication, checked the software, licenses and certificates, valid authorization... This paper explains some of the procedures and potential threats to break into the network and computers as well as potential programs that are used. Guidance and explanation of these programs is not to cause a break-in at someone else's computer, but to highlight the vulnerability of the computer's capabilities.

  11. SNAP-Ed (Supplemental Nutrition Assistance Program-Education) Increases Long-Term Food Security among Indiana Households with Children in a Randomized Controlled Study.

    Science.gov (United States)

    Rivera, Rebecca L; Maulding, Melissa K; Abbott, Angela R; Craig, Bruce A; Eicher-Miller, Heather A

    2016-11-01

    Food insecurity is negatively associated with US children's dietary intake and health. The Supplemental Nutrition Assistance Program-Education (SNAP-Ed) aims to alleviate food insecurity by offering nutrition, budgeting, and healthy lifestyle education to low-income individuals and families. The objective of this study was to evaluate the long-term impact of the Indiana SNAP-Ed on food security among households with children. A randomized, controlled, parallel study design with SNAP-Ed as an intervention was carried out during a 4- to 10-wk intervention period. Intervention group participants received the first 4 Indiana SNAP-Ed curriculum lessons. Study participants (n = 575) were adults aged ≥18 y from low-income Indiana households with ≥1 child living in the household. Both treatment groups completed an assessment before and after the intervention period and 1 y after recruitment. The 18-item US Household Food Security Survey Module was used to classify the primary outcomes of food security for the household and adults and children in the household. A linear mixed model was used to compare intervention with control group effects over time on food security. Mean ± SEM changes in household food security score and food security score among household adults from baseline to 1-y follow-up were 1.2 ± 0.4 and 0.9 ± 0.3 units lower, respectively, in the intervention group than in the control group (P food security score from baseline to 1-y follow-up among household children was not significantly different in the intervention group compared with the control group. SNAP-Ed improved food security over a longitudinal time frame among low-income Indiana households with children in this study. SNAP-Ed may be a successful intervention to improve food security. © 2016 American Society for Nutrition.

  12. Exploring Effects of Organizational Culture upon Implementation of Information Security Awareness and Training Programs within the Defense Industry Located in the Tennessee Valley Region

    Science.gov (United States)

    Grant, Robert Luther

    2017-01-01

    Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…

  13. Needs Assessment for the Establishment of a Masters of Arts Program in International Studies with a Concentration in International Security and a Specialization in International Terrorism

    Science.gov (United States)

    Gray, David H.

    2008-01-01

    Since the attacks of September 11, national and international security has been driven to the center stage of our present-day society, thus becoming a primary concern and focus in the United States. The purpose of this study was to conduct an instructional needs assessment for the establishment of a Masters of Arts program in International Studies…

  14. Execution of a participatory supportive return to work program within the Dutch social security sector: a qualitative evaluation of stakeholders’ perceptions

    Directory of Open Access Journals (Sweden)

    Lieke Lammerts

    2016-04-01

    Full Text Available Abstract Background A process evaluation of a participatory supportive return to work program, aimed at workers without a (permanent employment contract who are sick-listed due to a common mental disorder, revealed that this program was executed less successfully than similar programs evaluated in earlier studies. The program consisted of a participatory approach, integrated care and direct placement in competitive employment. Aim of this study was to get a better understanding of the execution of the program by evaluating stakeholders’ perceptions. In the absence of an employer, the program was applied by the Dutch Social Security Agency, in collaboration with vocational rehabilitation agencies. Together with the sick-listed workers, these were the main stakeholders. Our research questions involved stakeholders’ perceptions of the function(s of the program, and their perceptions of barriers and facilitators for a successful execution of the program within the Dutch social security sector. Methods Semi-structured interviews were held with five sick-listed workers, eight professionals of the Social Security Agency, and two case managers of vocational rehabilitation agencies. Interview topics were related to experiences with different components of the program. Selection of respondents was based on purposive sampling and continued until data saturation was reached. Content analysis was applied to identify patterns in the data. Two researchers developed a coding system, based on predefined topics and themes emerging from the data. Results Although perceived functions of some components of the program were as intended, all stakeholders stressed that the program often had not resulted in return to work. Perceived barriers for a successful execution were related to a poor collaboration between the Dutch Social Security Agency, vocational rehabilitation agencies and healthcare providers, the type of experienced (health problems, time constraints

  15. Pressure vessel design manual

    CERN Document Server

    Moss, Dennis R

    2013-01-01

    Pressure vessels are closed containers designed to hold gases or liquids at a pressure substantially different from the ambient pressure. They have a variety of applications in industry, including in oil refineries, nuclear reactors, vehicle airbrake reservoirs, and more. The pressure differential with such vessels is dangerous, and due to the risk of accident and fatality around their use, the design, manufacture, operation and inspection of pressure vessels is regulated by engineering authorities and guided by legal codes and standards. Pressure Vessel Design Manual is a solutions-focused guide to the many problems and technical challenges involved in the design of pressure vessels to match stringent standards and codes. It brings together otherwise scattered information and explanations into one easy-to-use resource to minimize research and take readers from problem to solution in the most direct manner possible. * Covers almost all problems that a working pressure vessel designer can expect to face, with ...

  16. Few changes in food security and dietary intake from short-term participation in the Supplemental Nutrition Assistance Program among low-income Massachusetts adults

    Science.gov (United States)

    Leung, Cindy W.; Cluggish, Sarah; Villamor, Eduardo; Catalano, Paul J.; Willett, Walter C.; Rimm, Eric B.

    2013-01-01

    Objective To examine if short-term participation in the Supplemental Nutrition Assistance Program (SNAP) affects food security and dietary quality among low-income adults recruited from a Massachusetts-wide emergency food hotline. Methods A three-month, longitudinal study was conducted among 107 adults recruited at the time of SNAP application assistance. Outcomes included household food security (10-item USDA Food Security Survey Module), dietary intake (e.g. grains, fruits) and diet quality (modified Alternate Healthy Eating Index). Data were analyzed using paired t-tests and multivariable linear regression. Results SNAP participation was not associated with improved household food security over three months (P=0.25). Compared to nonparticipants, SNAP participants increased refined grain intake by 1.1 serving/day (P=0.02), from baseline to follow-up. No associations were observed with other foods, nutrients, or dietary quality. Conclusion and Implications Policies that simultaneously improve household food security and dietary quality should be implemented to support the health of low-income Americans participating in this crucial program. PMID:24238909

  17. Nevada National Security Site 2010 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Management

    2011-01-01

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS). The data have been collected since 1993 and include calendar year 2010 results. During 2010, groundwater samples were collected and static water levels were measured at the three pilot wells surrounding the Area 5 RWMS. Samples were collected at UE5PW-1 on March 10 and August 10, 2010; at UE5PW-2 on March 10, August 10, and August 25, 2010; and at UE5PW-3 on March 31, August 10, and August 25, 2010. Static water levels were measured at each of the three pilot wells on March 1, April 26, August 9, and November 9, 2010. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. Indicators of general water chemistry (cations and anions) were also measured. Results from all samples collected in 2010 were within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. These data indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS. There were no significant changes in measured groundwater parameters compared to previous years. The report contains an updated cumulative chronology for the Area 5 RWMS Groundwater Monitoring Program and a brief description of the site hydrogeology.

  18. Nevada National Security Site 2012 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Management

    2013-02-11

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS). The data have been collected since 1993 and include calendar year 2012 results. During 2012, groundwater samples were collected and static water levels were measured at the three pilot wells surrounding the Area 5 RWMS. Groundwater samples were collected at UE5PW-1, UE5PW-2, and UE5PW-3 on March 21, August 7, August 21, and September 11, 2012, and static water levels were measured at each of the three pilot wells on March 19, June 6, August 2, and October 15, 2012. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. Indicators of general water chemistry (cations and anions) were also measured. Final results from samples collected in 2012 were within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. These data indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS. There were no significant changes in measured groundwater parameters compared to previous years. The report contains an updated cumulative chronology for the Area 5 RWMS Groundwater Monitoring Program and a brief description of the site hydrogeology.

  19. Maury Journals - German Vessels

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — German vessels observations, after the 1853 Brussels Conference that set International Maritime Standards, modeled after Maury Marine Standard Observations.

  20. 75 FR 2152 - Certificate of Alternative Compliance for the Anchor Handling Tug Supply Vessel HOLIDAY

    Science.gov (United States)

    2010-01-14

    ... SECURITY Coast Guard Certificate of Alternative Compliance for the Anchor Handling Tug Supply Vessel... Alternative Compliance was issued for the anchor handling tug supply vessel HOLIDAY as required by 33 U.S.C.... SUPPLEMENTARY INFORMATION: Background and Purpose The anchor handling tug supply vessel HOLIDAY will be used for...

  1. 75 FR 17755 - Certificate of Alternative Compliance for the Offshore Supply Vessel C-ATLAS

    Science.gov (United States)

    2010-04-07

    ... SECURITY Coast Guard Certificate of Alternative Compliance for the Offshore Supply Vessel C-ATLAS AGENCY... Compliance was issued for the offshore supply vessel C-ATLAS as required by 33 U.S.C. 1605(c) and 33 CFR 81... Regulations, Parts 81 and 89, has been issued for the offshore supply vessel C-ATLAS. Full compliance with 72...

  2. 46 CFR 2.01-10 - Inspection requirements-domestic vessels.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Inspection requirements-domestic vessels. 2.01-10 Section 2.01-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC VESSEL INSPECTIONS Inspecting and Certificating of Vessels § 2.01-10 Inspection requirements—domestic...

  3. 75 FR 17755 - Certificate of Alternative Compliance for the Offshore Supply Vessel GULF TIGER

    Science.gov (United States)

    2010-04-07

    ... SECURITY Coast Guard Certificate of Alternative Compliance for the Offshore Supply Vessel GULF TIGER AGENCY... Compliance was issued for the offshore supply vessel GULF TIGER as required by 33 U.S.C. 1605(c) and 33 CFR... TIGER. Full compliance with 72 COLREGS and the Inland Rules Act would hinder the vessel's ability to...

  4. Nevada National Security Site 2011 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Management

    2012-02-27

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS). The data have been collected since 1993 and include calendar year 2011 results. During 2011, groundwater samples were collected and static water levels were measured at the three pilot wells surrounding the Area 5 RWMS. Samples were collected at UE5PW-1 on March 8, August 2, August 24, and October 19, 2011; at UE5PW-2 on March 8, August 2, August 23, and October 19, 2011; and at UE5PW-3 on March 8, August 2, August 23, and October 19, 2011. Static water levels were measured at each of the three pilot wells on March 1, June 7, August 1, and October 17, 2011. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. Indicators of general water chemistry (cations and anions) were also measured. Initial total organic carbon and total organic halides results for samples collected in August 2011 were above previous measurements and, in some cases, above the established investigation limits. However, after field sample pumps and tubing were disinfected with Clorox solution, the results returned to normal levels. Final results from samples collected in 2011 were within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. These data indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS. There were no significant changes in measured groundwater parameters compared to previous years. The report contains an updated cumulative chronology for the Area 5 RWMS Groundwater Monitoring Program and a brief description of the site hydrogeology.

  5. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  6. Food for Work Program and its Implications on Food Security: A Critical Review with a Practical Example from the Amhara Region, Ethiopia

    Directory of Open Access Journals (Sweden)

    Ashenafi Gedamu

    2006-10-01

    Full Text Available A systematic evaluation of food-for-work (FFW programs in Ethiopia is seriously lacking. Most of the few available reports indicate that these programs have reached very few achievements in terms of food security and reduction of poverty at large. As expressed by Holden et al. (2005, FFW programs are commonly aimed to produce or maintain potentially valuable public goods necessary to stimulate productivity and thus income growth. Natural resources management, like rural road construction, erosion control and afforestation of degraded lands can be mentioned as valuable measures which could stimulate productivity and agricultural growth. The poverty reduction and food security impact of food or cash for work activities are larger if they offer not only seasonal job opportunities to the rural community but also long term employment possibilities. This is more likely if the projects are regionally dispersed and combined with basic education. In the Ethiopian context, it was always questionable if the continuous boom in food aid (regardless of cash or food for work purposes was the solution for the long standing food insecurity and poverty crises in the country. The study discusses the efficiency of FFW programs that aimed to reduce rural poverty and ensure food security on the one hand, and the impact of the food aid on resource and time allocation of the participating households for own food production on the other. The study is based on a field research conducted at a FFW program project, in the Amhara region, Ethiopia run by the German Agency for Technical Cooperation (GTZ with the view of improving food security in the Amhara region, Ethiopia. A household theoretical model is used to analyze the sample data, whether FFW program may indeed reduce household food insecurity and/or has some crowding-out effects on labour allocation of participating households for own field production.

  7. PRESSURE-RESISTANT VESSEL

    NARCIS (Netherlands)

    Beukers, A.; De Jong, T.

    1997-01-01

    Abstract of WO 9717570 (A1) The invention is directed to a wheel-shaped pressure-resistant vessel for gaseous, liquid or liquefied material having a substantially rigid shape, said vessel comprising a substantially continuous shell of a fiber-reinforced resin having a central opening, an inner

  8. Containment vessel drain system

    Energy Technology Data Exchange (ETDEWEB)

    Harris, Scott G.

    2018-01-30

    A system for draining a containment vessel may include a drain inlet located in a lower portion of the containment vessel. The containment vessel may be at least partially filled with a liquid, and the drain inlet may be located below a surface of the liquid. The system may further comprise an inlet located in an upper portion of the containment vessel. The inlet may be configured to insert pressurized gas into the containment vessel to form a pressurized region above the surface of the liquid, and the pressurized region may operate to apply a surface pressure that forces the liquid into the drain inlet. Additionally, a fluid separation device may be operatively connected to the drain inlet. The fluid separation device may be configured to separate the liquid from the pressurized gas that enters the drain inlet after the surface of the liquid falls below the drain inlet.

  9. 76 FR 34732 - Privacy Act of 1974; Department of Homeland Security/National Protection and Programs Directorate...

    Science.gov (United States)

    2011-06-14

    ... and Programs Directorate--002 Chemical Facility Anti- Terrorism Standards Personnel Surety Program... Programs Directorate--002 Chemical Facility Anti-Terrorism Standards Personnel Surety Program System of...--002 Chemical Facility Anti-Terrorism Standards Personnel Surety Program System of Records.'' On...

  10. 49 CFR 1542.107 - Changed conditions affecting security.

    Science.gov (United States)

    2010-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.107 Changed conditions affecting security. (a) After approval of the security... 49 Transportation 9 2010-10-01 2010-10-01 false Changed conditions affecting security. 1542.107...

  11. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  12. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  13. 78 FR 68784 - Cargo Securing Manuals

    Science.gov (United States)

    2013-11-15

    ... Stowage and Securing (CSS Code),'' any container vessel, subject to SOLAS, whose keel is laid on or after.... In order to test this, we developed an estimate of lost or jettisoned cargo incidents that are...

  14. Collapsible Cryogenic Storage Vessel Project

    Science.gov (United States)

    Fleming, David C.

    2002-01-01

    Collapsible cryogenic storage vessels may be useful for future space exploration missions by providing long-term storage capability using a lightweight system that can be compactly packaged for launch. Previous development efforts have identified an 'inflatable' concept as most promising. In the inflatable tank concept, the cryogen is contained within a flexible pressure wall comprised of a flexible bladder to contain the cryogen and a fabric reinforcement layer for structural strength. A flexible, high-performance insulation jacket surrounds the vessel. The weight of the tank and the cryogen is supported by rigid support structures. This design concept is developed through physical testing of a scaled pressure wall, and through development of tests for a flexible Layered Composite Insulation (LCI) insulation jacket. A demonstration pressure wall is fabricated using Spectra fabric for reinforcement, and burst tested under noncryogenic conditions. An insulation test specimens is prepared to demonstrate the effectiveness of the insulation when subject to folding effects, and to examine the effect of compression of the insulation under compressive loading to simulate the pressure effect in a nonrigid insulation blanket under the action atmospheric pressure, such as would be seen in application on the surface of Mars. Although pressure testing did not meet the design goals, the concept shows promise for the design. The testing program provides direction for future development of the collapsible cryogenic vessel concept.

  15. Barriers and Potential Improvements for Needle and Syringe Exchange Programs (NSPs) in China: A Qualitative Study from Perspectives of Both Health and Public Security Sectors.

    Science.gov (United States)

    Koo, Fung Kuen; Chen, Xi; Chow, Eric P F; Jing, Jun; Zheng, Jun; Zhao, Junshi; Zhang, Lei

    2015-01-01

    This study explores the acceptability, the barriers to the implementation of needle and syringe exchange programs (NSPs) and the potential improvement strategies in China from the perspectives of governmental health and public security officials. Purposive sampling was used for recruitment of participants who had been involved in NSPs implementation. Semi-Structured individual interviews were conducted in Mandarin to address three aspects of NSPs: (1) participants' attitudes towards NSPs, (2) participants' opinions on the effectiveness and barriers of NSPs, and (3) suggestions for improving the program. Content analysis was used to analyse the translated interview data. A total of 68 participants from 12 Hunan counties were interviewed (34 from each of the Bureau of Health and the Narcotic Division). Both groups recognised the importance and effectiveness of NSPs in HIV prevention, but public security officials regarded NSPs as a temporary intervention in place of punitive measures. Most health officials (32/34) regarded the main barriers to its implementation as administrative and structural, whereas participants from Narcotics Division (n=24) questioned the legitimacy of NSPs and concerned about the poor management of drug users' risk behaviours. Close cooperation between the health and public security sectors, engagement of the drug user community and an enabling policy environment were reportedly to be critical for potential improvements of NSPs in China. Misconceptions about NSPs encourage drug users' addictive behaviour, and an unclear leadership and insufficient support de-motivate the participants from the Bureau of Health and the Narcotics Division to actively support the program implementation.

  16. 2013 Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  17. 2011 Passenger Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  18. 2011 Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  19. 2013 Passenger Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  20. 2013 Tanker Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  1. 2013 Cargo Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  2. High Performance Marine Vessels

    CERN Document Server

    Yun, Liang

    2012-01-01

    High Performance Marine Vessels (HPMVs) range from the Fast Ferries to the latest high speed Navy Craft, including competition power boats and hydroplanes, hydrofoils, hovercraft, catamarans and other multi-hull craft. High Performance Marine Vessels covers the main concepts of HPMVs and discusses historical background, design features, services that have been successful and not so successful, and some sample data of the range of HPMVs to date. Included is a comparison of all HPMVs craft and the differences between them and descriptions of performance (hydrodynamics and aerodynamics). Readers will find a comprehensive overview of the design, development and building of HPMVs. In summary, this book: Focuses on technology at the aero-marine interface Covers the full range of high performance marine vessel concepts Explains the historical development of various HPMVs Discusses ferries, racing and pleasure craft, as well as utility and military missions High Performance Marine Vessels is an ideal book for student...

  3. Cheboygan Vessel Base

    Data.gov (United States)

    Federal Laboratory Consortium — Cheboygan Vessel Base (CVB), located in Cheboygan, Michigan, is a field station of the USGS Great Lakes Science Center (GLSC). CVB was established by congressional...

  4. Maury Journals - US Vessels

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — U.S. vessels observations, after the 1853 Brussels Conference that set International Maritime Standards, modeled after Maury Marine Standard Observations.

  5. 2011 Cargo Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  6. 2011 Tanker Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  7. 2013 Fishing Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  8. Coastal Logbook Survey (Vessels)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains catch (landed catch) and effort for fishing trips made by vessels that have been issued a Federal permit for the Gulf of Mexico reef fish,...

  9. National Strategy to Secure Cyberspace

    National Research Council Canada - National Science Library

    Schwalm, Keith T

    2006-01-01

    ... of a national strategy for securing cyberspace. The approach explored the development of cyber technology strategies and programs related to the mission and roles of Homeland Security Advanced Research Projects Agency...

  10. BY FRUSTUM CONFINING VESSEL

    Directory of Open Access Journals (Sweden)

    Javad Khazaei

    2016-09-01

    Full Text Available Helical piles are environmentally friendly and economical deep foundations that, due to environmental considerations, are excellent additions to a variety of deep foundation alternatives available to the practitioner. Helical piles performance depends on soil properties, the pile geometry and soil-pile interaction. Helical piles can be a proper alternative in sensitive environmental sites if their bearing capacity is sufficient to support applied loads. The failure capacity of helical piles in this study was measured via an experimental research program that was carried out by Frustum Confining Vessel (FCV. FCV is a frustum chamber by approximately linear increase in vertical and lateral stresses along depth from top to bottom. Due to special geometry and applied bottom pressure, this apparatus is a proper choice to test small model piles which can simulate field stress conditions. Small scale helical piles are made with either single helix or more helixes and installed in fine grained sand with three various densities. Axial loading tests including compression and tension tests were performed to achieve pile ultimate capacity. The results indicate the helical piles behavior depends essentially on pile geometric characteristics, i.e. helix configuration and soil properties. According to the achievements, axial uplift capacity of helical model piles is about equal to usual steel model piles that have the helixes diameter. Helical pile compression bearing capacity is too sufficient to act as a medium pile, thus it can be substituted other piles in special geoenvironmental conditions. The bearing capacity also depends on spacing ratio, S/D, and helixes diameter.

  11. The Impact of a Home-Delivered Meal Program on Nutritional Risk, Dietary Intake, Food Security, Loneliness, and Social Well-Being.

    Science.gov (United States)

    Wright, Lauri; Vance, Lauren; Sudduth, Christina; Epps, James B

    2015-01-01

    Maintaining independence and continuing to live at home is one solution to manage the rising health care costs of aging populations in the United States; furthermore, seniors are at risk of malnutrition and food insecurity. Home-delivered meal programs are a tool to address food, nutrition, and well-being concerns of this population. Few studies have identified outcomes from these programs; this pilot study reviews the nutritional status, dietary intake, well-being, loneliness, and food security levels of seniors participating in a Meals on Wheels delivery service. Clients, new to the meal program, participated in pre- and postphone interviews, and 51 seniors completed the study. The survey was composed of five scales or questionnaires, and statistical analyses were conducted using SPSS. Improvements across all five measures were statistically significant after participating two months in the home-delivered meal program. Implications for further research, practice, and the Older Americans Act are discussed.

  12. 21st Century Security Manager

    Directory of Open Access Journals (Sweden)

    Stelian ARION

    2010-11-01

    Full Text Available We live in world of uncertainty that generates major paradigms changing that affect security risk management. Modern organization’s security risks management can’t be done without a profound knowlegde and daily practice for security governance, security risk management and resilience. 21st Century security manager need to deal with several areas of konwledge in order to succesfully manage security risks. The document presents the advantages, disadvantages and challenges for security managers thah have government backgroud, or IT security backgroud, or are promoted from organization’s inside leaders. There are six different areas of knowledge that successful security programs of the future must incorporate, either in the knowledge base of their leaders or in the collective knowledge of the leading staff. They are government elements, security organization, emerging issue awareness, IT security, business elements and executive leadership.

  13. USCG Vessel Events

    Data.gov (United States)

    Department of Homeland Security — The Marine Casualty and Pollution Data files provide details about marine casualty and pollution incidents investigated by Coast Guard Offices throughout the United...

  14. USCG Vessel Pollution

    Data.gov (United States)

    Department of Homeland Security — The Marine Casualty and Pollution Data files provide details about marine casualty and pollution incidents investigated by Coast Guard Offices throughout the United...

  15. Network Security Is Manageable

    Science.gov (United States)

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  16. Systems Security Engineering

    Science.gov (United States)

    2010-08-22

    thereby reducing the number of bits required for transmissions . Further assume that the system designers would like even greater security regarding...scenarios. A common systemic security analogy for cognition lies within the context of a command and control structure’s observe, orient, decide... telephony , satellite communications and networks). Critical Program Information (CPI): ICT that is a critical component is defined as Critical

  17. 32 CFR 154.61 - Security education.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...

  18. 46 CFR 115.650 - Alternative Hull Examination (AHE) Program options: Divers or underwater ROV.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Alternative Hull Examination (AHE) Program options: Divers or underwater ROV. 115.650 Section 115.650 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS CARRYING MORE THAN 150 PASSENGERS OR WITH OVERNIGHT ACCOMMODATIONS FOR MORE THAN 49 PASSENGERS INSPECTION AND...

  19. 46 CFR 176.650 - Alternative Hull Examination Program options: Divers or underwater ROV.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Alternative Hull Examination Program options: Divers or underwater ROV. 176.650 Section 176.650 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER 100 GROSS TONS) INSPECTION AND CERTIFICATION Hull and Tailshaft Examinations § 176.650 Alternative Hull...

  20. PROGRAM TECHNICAL SYSTEM OF PROVIDING OF SECURITY OF THE INFORMATIVE RESOURCES FOR ON THE CIRCLES OF ELECTRIC POWER SUPPLY

    Directory of Open Access Journals (Sweden)

    V.M. Bakiko

    2010-08-01

    Full Text Available The model of anti-interference protective filter with due account taken of stray parameters of elements is developed. The algorithm of functioning of anti-interference protective filter with integrated system management, which forms the new class of intellectual devices of security of informative resources on the circles of power supply, is offered. The analysis of possibilities of dynamic magnetic biasing of direct current of pericardium of throttle with the use of latitudinal impulsive modulation is experimentally conducted. The efficiency of hardware-software complex of security of informative resources is explored.

  1. Enhancing supply vessel safety

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    A supply-vessel bridge installation consists of a navigating bridge and a control position aft, from which operators control the ship when close to rigs or platforms, and operate winches and other loading equipment. The international Convention for Safety of I Ale at Sea (SOLAS) does not regulate the layout, so design varies to a large degree, often causing an imperfect working environment. As for other types of ships, more than half the offshore service vessel accidents at sea are caused by bridge system failures. A majority can be traced back to technical design, and operational errors. The research and development project NAUT-OSV is a response to the offshore industry's safety concerns. Analysis of 24 incidents involving contact or collision between supply vessels and offshore installations owned or operated by Norwegian companies indicated that failures in the bridge system were often the cause.

  2. Security Expertise

    DEFF Research Database (Denmark)

    and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks......, the collaboration between science, anthropology and the military, transnational terrorism, and the ethical consequences of security expertise. Together they challenge our understanding of how expertise works and what consequences it has for security politics and international relations. This book...... will be of particular interest to students of critical security studies, sociology, science and technology studies, and IR/security studies in general....

  3. Nuclear reactor pressure vessel support system

    Science.gov (United States)

    Sepelak, George R.

    1978-01-01

    A support system for nuclear reactor pressure vessels which can withstand all possible combinations of stresses caused by a postulated core disrupting accident during reactor operation. The nuclear reactor pressure vessel is provided with a flange around the upper periphery thereof, and the flange includes an annular vertical extension formed integral therewith. A support ring is positioned atop of the support ledge and the flange vertical extension, and is bolted to both members. The plug riser is secured to the flange vertical extension and to the top of a radially outwardly extension of the rotatable plug. This system eliminates one joint through which fluids contained in the vessel could escape by making the fluid flow path through the joint between the flange and the support ring follow the same path through which fluid could escape through the plug risers. In this manner, the sealing means to prohibit the escape of contained fluids through the plug risers can also prohibit the escape of contained fluid through the securing joint.

  4. 78 FR 63232 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-10-23

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC... Infrastructure Resilience Division, National Protection and Programs Directorate, Department of Homeland Security...

  5. 76 FR 17424 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2011-03-29

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC... Communications System, National Protection and Programs Directorate, Department of Homeland Security, 245 Murray...

  6. 77 FR 6813 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2012-02-09

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee..., National Protection and Programs Directorate, Department of Homeland Security, 245 Murray Lane, Mail Stop...

  7. 46 CFR 2.01-50 - Persons other than crew on towing, oyster, or fishing steam vessels.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Persons other than crew on towing, oyster, or fishing steam vessels. 2.01-50 Section 2.01-50 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES... than crew on towing, oyster, or fishing steam vessels. (a) A steam vessel engaged in towing, oyster...

  8. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  9. Research methods to develop Measures of Effectiveness of the United States Coast Guard`s Vessel Inspection and Boarding Program. Volume 2, Main report

    Energy Technology Data Exchange (ETDEWEB)

    Wheeler, T.; Cox, R. [Sandia National Labs., Albuquerque, NM (United States); Gawande, K. [New Mexico Univ., Albuquerque, NM (United States). Dept. of Economics; Stone, R.; Waisel, L.; Wallace, W.A. [Rensselaer Polytechnic Inst., Troy, New York (United States). Dept. of Decision Sciences and Engineering Systems

    1995-04-01

    The primary objective of this study is to provide Measures of Effectiveness (MOEs) of the US Coast Guard Marine Inspection and Boarding Program based on objective scientific methods. A secondary objective of the study is to provide USCG management with a methodologically and theoretically sound aid to effective policy decision-making. The MOEs constructed in this study are specific to the Marine Inspection and Boarding Program, but the methodology of the study is based on sound theoretical principles that are probably applicable to a range of USCG activities. Hence the methodology applied equally to other important USCG programs and can be similarly used to measure their effectiveness and as an aid to decision-making.

  10. Critical Success Factors for an Effective Security Risk Management Program in an Organization: An Exploratory Case Study

    Science.gov (United States)

    Zafar, Humayun

    2010-01-01

    This study investigates differences in perception between layers of management (executive, middle, and lower) and staff with regard to the influence of critical success factors (CSFs) on security risk management (SRM) effectiveness. This is an in-depth case study conducted at a Fortune 500 company. Rockart's (1979) CSF method is modified through…

  11. Protecting America's economy, environment, health, and security against invasive species requires a strong federal program in systematic biology

    Science.gov (United States)

    Hilda Diaz-Soltero; Amy Y. Rossman

    2011-01-01

    Systematics is the science that identifies and groups organisms by understanding their origins, relationships, and distributions. It is fundamental to understanding life on earth, our crops, wildlife, and diseases, and it provides the scientific foundation to recognize and manage invasive species. Protecting America's economy, environment, health, and security...

  12. 21 CFR 1301.72 - Physical security controls for non-practitioners; narcotic treatment programs and compounders for...

    Science.gov (United States)

    2010-04-01

    ... of No. 10 gauge steel fabric on a metal door frame in a metal door flange, and in all other respects... secured areas: (1) Where small quantities permit, a safe or steel cabinet; (i) Which safe or steel cabinet... radiological techniques; (ii) Which safe or steel cabinet, if it weighs less than 750 pounds, is bolted or...

  13. Delivering Summer Electronic Benefit Transfers for Children through the Supplemental Nutrition Assistance Program or the Special Supplemental Nutrition Program for Women, Infants, and Children: Benefit Use and Impacts on Food Security and Foods Consumed.

    Science.gov (United States)

    Gordon, Anne R; Briefel, Ronette R; Collins, Ann M; Rowe, Gretchen M; Klerman, Jacob A

    2017-03-01

    The Summer Electronic Benefit Transfers for Children (SEBTC) demonstration piloted summer food assistance through electronic benefit transfers (EBTs), providing benefits either through the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) or the Supplemental Nutrition Assistance Program (SNAP) EBT. To inform food assistance policy and describe how demonstrations using WIC and SNAP models differed in benefit take-up and impacts on food security and children's food consumption. Sites chose to deliver SEBTC using the SNAP or WIC EBT system. Within each site, in 2012, households were randomly assigned to a benefit group or a no-benefit control group. Grantees (eight states and two Indian Tribal Organizations) selected school districts serving many low-income children. Schoolchildren were eligible in cases where they had been certified for free or reduced-price meals during the school year. Before the demonstration, households in the demonstration sample had lower incomes and lower food security, on average, than households with eligible children nationally. Grantees provided selected households with benefits worth $60 per child per summer month using SNAP or WIC EBT systems. SNAP-model benefits covered most foods. WIC-model benefits could only be used for a specific package of foods. Key outcomes were children's food security (assessed using the US Department of Agriculture food security scale) and food consumption (assessed using food frequency questions). Differences in mean outcomes between the benefit and control groups measured impact, after adjusting for household characteristics. In WIC sites, benefit-group households redeemed a lower percentage of SEBTC benefits than in SNAP sites. Nonetheless, the benefit groups in both sets of sites had similar large reductions in very low food security among children, relative to no-benefit controls. Children receiving benefits consumed more healthful foods, and these impacts were larger in WIC

  14. GOLD PRESSURE VESSEL SEAL

    Science.gov (United States)

    Smith, A.E.

    1963-11-26

    An improved seal between the piston and die member of a piston-cylinder type pressure vessel is presented. A layer of gold, of sufficient thickness to provide an interference fit between the piston and die member, is plated on the contacting surface of at least one of the members. (AEC)

  15. Network of endocardial vessels.

    Science.gov (United States)

    Lee, Byung-Cheon; Kim, Hong Bae; Sung, Baeckkyoung; Kim, Ki Woo; Sohn, Jamin; Son, Boram; Chang, Byung-Joon; Soh, Kwang-Sup

    2011-01-01

    Although there have been reports on threadlike structures inside the heart, they have received little attention. We aimed to develop a method for observing such structures and to reveal their ultrastructures. An in situ staining method, which uses a series of procedures of 0.2-0.4% trypan blue spraying and washing, was applied to observe threadlike structures on the surfaces of endocardia. The threadlike structures were isolated and observed by using confocal laser scanning microscopy (CLSM) and transmission electron microscopy (TEM). Networks of endocardial vessels (20 μm in thickness) with expansions (40-100 μm in diameter) were visualized; they were movable on the endocardium of the bovine atrium and ventricle. CLSM showed that (1) rod-shaped nuclei were aligned along the longitudinal direction of the endocardial vessel and (2) there were many cells inside the expansion. TEM on the endocardial vessel revealed that (1) there existed multiple lumens (1-7 μm in diameter) and (2) the extracellular matrices mostly consisted of collagen fibers, which were aligned along the longitudinal direction of the endocardial vessel or were locally organized in reticular structures. We investigated the endocardial circulatory system in bovine cardiac chambers and its ultrastructures, such as nucleic distributions, microlumens, and collagenous extracellular matrices. Copyright © 2011 S. Karger AG, Basel.

  16. Pressurized Vessel Slurry Pumping

    Energy Technology Data Exchange (ETDEWEB)

    Pound, C.R.

    2001-09-17

    This report summarizes testing of an alternate ''pressurized vessel slurry pumping'' apparatus. The principle is similar to rural domestic water systems and ''acid eggs'' used in chemical laboratories in that material is extruded by displacement with compressed air.

  17. U.S. Department of Energy Office of Health, Safety and Security Illness and Injury Surveillance Program Worker Health at a Glance, 2000-2009

    Energy Technology Data Exchange (ETDEWEB)

    Strader, Cliff [US Dept. of Energy, Washington, DC (United States); Richter, Bonnie [US Dept. of Energy, Washington, DC (United States)

    2013-01-23

    The Worker Health at a Glance, 2000 – 2009 provides an overview of selected illness and injury patterns among the current DOE contractor workforce that have emerged over the 10-years covered by this report. This report is a roll-up of data from 16 individual DOE sites, assigned to one of three program offices (Office of Environmental Management, Office of Science and the National Nuclear Security Administration). In this report, an absences is defined as 40 or more consecutive work hours (5+ calendar days) off the job. Shorter absences were not included.

  18. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  19. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  20. Teaching Introductory Computer Security at a Department of Defense University.

    Science.gov (United States)

    1997-04-02

    program in computer security . Its objective is to insure that students not only understand practical aspects of computer security associated with current...can be achieved. Introduction to Computer Security , the cornerstone course for our program is described here.

  1. LTE security

    CERN Document Server

    Forsberg, Dan; Moeller, Wolf-Dietrich

    2010-01-01

    Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms em

  2. The CREATE Program Software Applications for the Design and Analysis of Air Vehicles, Naval Vessels, Radio Frequency Antennas, and Ground Vehicles

    Science.gov (United States)

    2015-07-10

    can handle arbitrary rotor configurations (e.g., conventional main rotor/ tail -fan; co-axial 6 main rotor/pusher propeller; tandem main rotors...contractor proposals. The Army Rotorcraft Program (AMRDEC/AED) is using Helios to assess the H-60 tail rotor effectiveness for providing directional...designed and tested for all the standard Linux and Unix operating systems. Each release is extensively tested both during the development process

  3. Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program, July 1-December 31, 1982.

    Science.gov (United States)

    1983-04-07

    Federal Aviation Act of 1958. ’ ~ 16. Abstract ~The report includes an analysis of the current threat against civil aviation along with information...Effectiveness 10. Airline Passenger Screening Results 11. Weapon Detection Devices 12. X-ray Baggage Inspection Systems 13. Basic Policies 14...PF40GW OPERATION. 2. U.S. SECURITY REQUJIR4ENMTS DVER OVER 250 U.S. AND FORIGN AIRLINES OPERATING OVER 14,600 FLIGITS DAILY FR OVER 675 U.S. AND FCREIGN

  4. 75 FR 68370 - Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...

    Science.gov (United States)

    2010-11-05

    ... Infrastructure Protection; Chemical Security Awareness Training Program AGENCY: National Protection and Programs... currently approved information collection request (ICR) for the Chemical Security Awareness Training Program... Management Office. ] Title: Chemical Security Awareness Training Program. OMB Number: 1670-0009. CSATP...

  5. 19 CFR 123.34 - Certain vehicle and vessel shipments.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Certain vehicle and vessel shipments. 123.34 Section 123.34 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS RELATIONS WITH CANADA AND MEXICO Shipments in Transit Through the United...

  6. 77 FR 54808 - Vessels in Foreign and Domestic Trades

    Science.gov (United States)

    2012-09-06

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Customs and Border Protection 19 CFR Part 4 Vessels in Foreign and Domestic Trades CFR Correction In Title 19 of the Code of Federal Regulations, Parts 1 to 99, revised as of April 1, 2012, on page...

  7. (In)security factor atomic bomb. An analysis of the crisis with the Iranian nuclear program; (Un-)Sicherheitsfaktor Atombombe. Eine Analyse der Krise um das iranische Nuklearprogramm

    Energy Technology Data Exchange (ETDEWEB)

    Bock, Andreas [Augsburg Univ. (Germany). Lehrstuhl fuer Friedens- und Konfliktforschung

    2012-04-15

    Iran is a rational actor in the international politics that decides on the basis of the perception of threat. Iran's security situation is comparable with that of Israel with the rational consequence to rely on the atomic program with respect to deterrence and self-defense. The solution of the Iran crisis is basically dependent on a change of the perception of threat. A military act against the Iranian nuclear facilities would be counterproductive, would only slowing down the program but not prevent further activities. In fact a military act would enhance the perception of threat. For the analysis of the Iran crises the author used the Cuba crisis as blueprint, were mislead perceptions were responsible for the escalation.

  8. Hawaii Abandoned Vessel Inventory, Kauai

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Kauai. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  9. CNMI Abandoned Vessel Inventory, Tinian

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Tinian. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  10. Puerto Rico Abandoned Vessel Inventory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Puerto Rico. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  11. American Samoa Abandoned Vessel Inventory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for American Samoa. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  12. Hawaii Abandoned Vessel Inventory, Oahu

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Oahu, Hawaii. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  13. Hawaii Abandoned Vessel Inventory, Molokai

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Molokai, Hawaii. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  14. CNMI Abandoned Vessel Inventory, Rota

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Rota. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  15. Hawaii Abandoned Vessel Inventory, Lanai

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Lanai. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  16. For-Hire Vessel Directory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Vessel Directory is maintained as the sample frame for the For-Hire Survey. I contains data on for-hire vessels on the Atlantic and Gulf coasts. Data include...

  17. CNMI Abandoned Vessel Inventory, Saipan

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Saipan. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  18. Hawaii Abandoned Vessel Inventory, Maui

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Maui. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  19. Vessels in Transit - Web Tool

    Data.gov (United States)

    Department of Transportation — A web tool that provides real-time information on vessels transiting the Saint Lawrence Seaway. Visitors may sort by order of turn, vessel name, or last location in...

  20. Web security a whitehat perspective

    CERN Document Server

    Wu, Hanqing

    2015-01-01

    MY VIEW OF THE SECURITY WORLDView of the IT Security WorldBrief History of Web SecurityBrief History of Chinese HackersDevelopment Process of Hacking TechniquesRise of Web SecurityBlack Hat, White HatBack to Nature: The Essence of Secret SecuritySuperstition: There Is No Silver BulletSecurity Is an Ongoing ProcessSecurity ElementsHow to Implement Safety AssessmentAsset ClassificationThreat AnalysisRisk AnalysisDesign of Security ProgramsArt of War of White HatPrinciples of Secure by DefaultBlacklist, WhitelistPrinciple of Least PrivilegePrinciple of Defense in DepthPrinciples of Data and Code

  1. Pressure vessel design manual

    Energy Technology Data Exchange (ETDEWEB)

    Moss, D.R.

    1987-01-01

    The first section of the book covers types of loadings, failures, and stress theories, and how they apply to pressure vessels. The book delineates the procedures for designing typical components as well as those for designing large openings in cylindrical shells, ring girders, davits, platforms, bins and elevated tanks. The techniques for designing conical transitions, cone-cylinder intersections, intermediate heads, flat heads, and spherically dished covers are also described. The book covers the design of vessel supports subject to wind and seismic loads and one section is devoted to the five major ways of analyzing loads on shells and heads. Each procedure is detailed enough to size all welds, bolts, and plate thicknesses and to determine actual stresses.

  2. New research vessels

    Science.gov (United States)

    1984-04-01

    Two “new” ocean-going research vessels operated by the Scripps Institution of Oceanography and the National Science Foundation (NSF) will soon begin full-time scientific duties off the coast of California and in the Antarctic, respectively. The 37.5-m Scripps vessel, named Robert Gordon Sprout in honor of the ex-president of the University of California, replaces the smaller ship Ellen B. Scripps, which had served the institution since 1965. The new ship is a slightly modified Gulf Coast workboat. Under the name of Midnight Alaskan, it had been used for high-resolution geophysical surveys in American and Latin American waters by such firms as Arco Oil & Gas, Exxon, Pennzoil, and Racal-Decca before its purchase by Scripps from a Lousiana chartering firm last summer.

  3. Computer Analysis of Eye Blood-Vessel Images

    Science.gov (United States)

    Wall, R. J.; White, B. S.

    1984-01-01

    Technique rapidly diagnoses diabetes mellitus. Photographs of "whites" of patients' eyes scanned by computerized image analyzer programmed to quantify density of small blood vessels in conjuctiva. Comparison with data base of known normal and diabetic patients facilitates rapid diagnosis.

  4. Human Reliability Program Overview

    Energy Technology Data Exchange (ETDEWEB)

    Bodin, Michael

    2012-09-25

    This presentation covers the high points of the Human Reliability Program, including certification/decertification, critical positions, due process, organizational structure, program components, personnel security, an overview of the US DOE reliability program, retirees and academia, and security program integration.

  5. Large vessel vasculitides

    OpenAIRE

    Morović-Vergles, Jadranka; Pukšić, Silva; Gudelj Gračanin, Ana

    2013-01-01

    Large vessel vasculitis includes Giant cell arteritis and Takayasu arteritis. Giant cell arteritis is the most common form of vasculitis affect patients aged 50 years or over. The diagnosis should be considered in older patients who present with new onset of headache, visual disturbance, polymyalgia rheumatica and/or fever unknown cause. Glucocorticoides remain the cornerstone of therapy. Takayasu arteritis is a chronic panarteritis of the aorta ant its major branches presenting commonly in y...

  6. Very Versatile Vessel

    Science.gov (United States)

    2009-09-01

    data. This source provides information on aluminum hydrofoil vessels without the added weight of foil structures. The composite armor around the...seating compartment. The sides should also limit wave splash on the deck. The freeboard should contribute reserve buoyancy , increasing large-angle and...Resistance, Powering, and Propulsion Savitsky’s Method Since model testing data or other reliable performance data was unavailable for the proposed

  7. Sailing Vessel Routing Considering Safety Zone and Penalty Time for Altering Course

    Directory of Open Access Journals (Sweden)

    Marcin Zyczkowski

    2017-06-01

    Full Text Available In this paper we introduce new model for simulation sea vessel routing. Besides a vessel types (polar diagram and weather forecast, travel security and the number of maneuvers are considered. Based on these data both the minimal travelling costs and the minimal processing time are found for different vessels and different routes. To test our model the applications SailingAssistance wad improved. The obtained results shows that we can obtain quite acceptable results.

  8. 75 FR 3245 - Agency Information Collection Activities: Aircraft/Vessel Report (Form I-92)

    Science.gov (United States)

    2010-01-20

    ... Report (Form I-92) AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION... approval in accordance with the Paperwork Reduction Act: Aircraft/ Vessel Report (Form I-92). This is a... forms of information. Title: Aircraft/Vessel Report. OMB Number: 1651-0102. Form Number: I-92. Abstract...

  9. 46 CFR 11.462 - Endorsements for master or mate of uninspected fishing industry vessels.

    Science.gov (United States)

    2010-10-01

    ... industry vessels. 11.462 Section 11.462 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT... Officers § 11.462 Endorsements for master or mate of uninspected fishing industry vessels. (a) This section..., which are documented to engage in the fishing industry, with the exception of: (1) Wooden ships of...

  10. 46 CFR 170.095 - Data submittal for a vessel equipped to lift.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Data submittal for a vessel equipped to lift. 170.095 Section 170.095 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND... vessel equipped to lift. The following data must be submitted with the plans required by § 170.075 if the...

  11. 75 FR 20371 - Certificate of Alternative Compliance for the Offshore Supply Vessel LEBOUEF TIDE

    Science.gov (United States)

    2010-04-19

    ... SECURITY Coast Guard Certificate of Alternative Compliance for the Offshore Supply Vessel LEBOUEF TIDE... Alternative Compliance was issued for the offshore supply vessel LEBOUEF TIDE as required by 33 U.S.C. 1605(c... LEBOUEF TIDE. The horizontal distance between the forward and aft masthead lights may be 25 -9 . Placing...

  12. 75 FR 39955 - Certificate of Alternative Compliance for the Offshore Supply Vessel MONICA W CALLAIS

    Science.gov (United States)

    2010-07-13

    ... SECURITY Coast Guard Certificate of Alternative Compliance for the Offshore Supply Vessel MONICA W CALLAIS... Alternative Compliance was issued for the offshore supply vessel MONICA W CALLAIS as required by 33 U.S.C... MONICA W CALLAIS, O.N. 1226851. The horizontal distance between the forward and aft masthead lights may...

  13. 76 FR 33161 - Installation and Use of Engine Cut-off Switches on Recreational Vessels

    Science.gov (United States)

    2011-06-08

    ... Security FR Federal Register NBSAC National Boating Safety Advisory Council NMMA National Marine... caused by persons being struck by a recreational vessel or a propeller. Under 46 U.S.C. Chapter 43... appropriate course of action to address the recreational vessel and propeller strike-related casualty issue...

  14. 78 FR 6732 - Changes to Standard Numbering System, Vessel Identification System, and Boating Accident Report...

    Science.gov (United States)

    2013-01-31

    ... SECURITY Coast Guard 33 CFR Parts 173, 174, 181, and 187 RIN 1625-AB45 Changes to Standard Numbering System, Vessel Identification System, and Boating Accident Report Database AGENCY: Coast Guard, DHS. ACTION: Rule... Numbering System, Vessel Identification System, and Boating Accident Report Database rule became effective...

  15. 78 FR 61223 - Regulated Navigation Area; Southern Oahu Tsunami Vessel Evacuation, Honolulu, HI

    Science.gov (United States)

    2013-10-03

    ... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA00 Regulated Navigation Area; Southern Oahu Tsunami Vessel... evacuation of Southern Oahu ports. DATES: Comments and related material must be received by the Coast Guard... Southern Oahu Tsunami Vessel Evacuation regulated navigation area. All recommendations received careful...

  16. Y-12 Groundwater Protection Program Extent Of The Primary Groundwater Contaminants At The Y-12 National Security Complex

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2013-12-01

    This report presents data summary tables and maps used to define and illustrate the approximate lateral extent of groundwater contamination at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee. The data tables and maps address the primary (i.e., most widespread and mobile) organic, inorganic, and radiological contaminants in the groundwater. The sampling locations, calculated contaminant concentrations, plume boundary values, and paired map format used to define, quantify, delineate, and illustrate the approximate extent of the primary organic, inorganic, and radiological contaminants in groundwater at Y-12 are described.

  17. Afghan National Security Forces: Despite Reported Successes, Concerns Remain about Literacy Program Results, Contract Oversight, Transition, and Sustainment

    Science.gov (United States)

    2014-01-01

    Special Inspector General for Afghanistan Reconstruction (SIGAR), 1550 Crystal Drive, Suite 900 (Attn: Ms. Gabriele Tonsil ), Arlington, VA 22202...ACKNOWLEDGMENTS Gabriele Tonsil , Senior Audit Manager Clifton Spruill, Analyst-in-Charge Vicki McClure, Senior Program Analyst Donnalee Scharschmidt, Program

  18. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  19. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  20. Node security

    CERN Document Server

    Barnes, Dominic

    2013-01-01

    A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using Node Security in production, or are considering using it for your next project, then this book will enable you to ensure security of your applications. An understanding of JavaScript is a prerequisite, and some experience with Node is recommended, though not required.

  1. 6 CFR 27.225 - Site security plans.

    Science.gov (United States)

    2010-01-01

    ... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.225 Site security plans. (a) The Site Security Plan must meet the following standards: (1) Address each vulnerability identified in the facility's Security...

  2. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  3. Biological and Chemical Security

    Energy Technology Data Exchange (ETDEWEB)

    Fitch, P J

    2002-12-19

    The LLNL Chemical & Biological National Security Program (CBNP) provides science, technology and integrated systems for chemical and biological security. Our approach is to develop and field advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical or biological weapons. Recent events show the importance of civilian defense against terrorism. The 1995 nerve gas attack in Tokyo's subway served to catalyze and focus the early LLNL program on civilian counter terrorism. In the same year, LLNL began CBNP using Laboratory-Directed R&D investments and a focus on biodetection. The Nunn-Lugar-Domenici Defense Against Weapons of Mass Destruction Act, passed in 1996, initiated a number of U.S. nonproliferation and counter-terrorism programs including the DOE (now NNSA) Chemical and Biological Nonproliferation Program (also known as CBNP). In 2002, the Department of Homeland Security was formed. The NNSA CBNP and many of the LLNL CBNP activities are being transferred as the new Department becomes operational. LLNL has a long history in national security including nonproliferation of weapons of mass destruction. In biology, LLNL had a key role in starting and implementing the Human Genome Project and, more recently, the Microbial Genome Program. LLNL has over 1,000 scientists and engineers with relevant expertise in biology, chemistry, decontamination, instrumentation, microtechnologies, atmospheric modeling, and field experimentation. Over 150 LLNL scientists and engineers work full time on chemical and biological national security projects.

  4. Software Safety and Security

    CERN Document Server

    Nipkow, T; Hauptmann, B

    2012-01-01

    Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol descriptions. There has also been something of a breakthrough in the area of operating system verification. This book presents the lectures from the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security; a summer school held at Bayrischzell, Germany, in 2011. This Advanced Study Institute was

  5. Vessel Traffic Services.

    Science.gov (United States)

    1982-12-01

    Yorker" articles titled Silent Spring by Rachel Carson in 1963 produced a unifying effect, "the sort of rallying point of the movement to protect the...6232, 92d Cong., 1st. sess., 1971, p. 2. 15. Carson , Rachel L. , The Sea Around Us, New York: Oxford Univesity Press, 195-, p. IV. 16. U.S., Congress...Government Printing Office, 1974. 63. Buhler, L. and Geiger, J., Vessel Traffic Data Extraction MethodoloqX, Silver Spring , Maryland, O6erFae-tns

  6. Vanishing corneal vessels

    Science.gov (United States)

    Nicholson, Luke; Chana, Rupinder

    2013-01-01

    We wish to highlight the importance of acknowledging the accompanying effects of topical phenylephrine drops on the eye other than its intended mydriasis. We reported a case of a 92-year-old woman with a corneal graft who was noted to have superficial corneal vascularisation which was not documented previously. After the instillation of topical tropicamide 1% and phenylephrine 2.5%, for funduscopy, the corneal vascularisation was not visible. When reassessed on another visit, tropicamide had no effect on the vessels and only phenylephrine did. We wish to highlight that when reviewing patients in cornea clinics, instilling phenylephrine prior to being seen may mask important corneal vascularisation. PMID:24121816

  7. Comparison of the effects of conditional food and cash transfers of the Ethiopian Productive Safety Net Program on household food security and dietary diversity in the face of rising food prices: ways forward for a more nutrition-sensitive program.

    Science.gov (United States)

    Baye, Kaleab; Retta, Negussie; Abuye, Cherinet

    2014-09-01

    In light of the continuing rise in food prices during and after the 2008 world food crisis, whether food and cash transfers are equally effective in improving food security and diet quality is debatable. To compare the effects of conditional food and cash transfers of the Ethiopian Productive Safety Net Program (PSNP) on household food security and dietary diversity. Data on household dietary diversity, child anthropometry, food security, and preference of transfer modalities (food, cash, or mixed) were generated from a cross-sectional survey of 195 PSNP beneficiary households (67 receiving food and 128 receiving cash) in Hawella Tulla District, Sidama, southern Ethiopia. Most beneficiaries (96%) reported food shortages, and 47% reported food shortages that exceeded 3 months. Households receiving cash had better household dietary diversity scores (p = .02) and higher consumption of oils and fats (p = .003) and vitamin A-rich foods (p = .002). Compared with households receiving food, households receiving cash were more affected by increases in food prices that forced them to reduce their number of daily meals (p food (82%) preferred to continue receiving food, households receiving cash (56%) preferred a mix of food and cash. Households receiving cash had better household dietary diversity than households receiving food, a result suggesting that cash transfers may be more effective. However, the continuing rise infood prices may offset these benefits unless cash transfers are index-linked to food price fluctuations.

  8. 14 CFR 129.28 - Flightdeck security.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Flightdeck security. 129.28 Section 129.28... Flightdeck security. (a) After August 20, 2002, except for a newly manufactured airplane on a non-revenue...; or the operator must implement a security program approved by the Transportation Security...

  9. Final Report of the 2nd Ex-Vessel Neutron Dosimetry Installation And Evaluations for Kori Unit 1 Reactor Pressure Vessel

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Byoung Chul; Yoo, Choon Sung; Lee, Sam Lai; Chang, Kee Ok; Gong, Un Sik; Choi, Kwon Jae; Chang, Jong Hwa; Kim, Kwan Hyun; Hong, Joon Wha

    2007-02-15

    This report describes a neutron fluence assessment performed for the Kori Unit 1 pressure vessel beltline region based on the guidance specified in Regulatory Guide 1.190. In this assessment, maximum fast neutron exposures expressed in terms of fast neutron fluence (E>1 MeV) and iron atom displacements (dpa) were established for the beltline region of the pressure vessel. After Cycle 22 of reactor operation, 2nd Ex-Vessel Neutron Dosimetry Program was instituted at Kori Unit 1 to provide continuous monitoring of the beltline region of the reactor vessel. The use of the Ex-Vessel Neutron Dosimetry Program coupled with available surveillance capsule measurements provides a plant specific data base that enables the evaluation of the vessel exposure and the uncertainty associated with that exposure over the service life of the unit. Ex-Vessel Neutron Dosimetry has been evaluated at the conclusion of Cycle 23.

  10. Final report for the 2nd Ex-Vessel Neutron Dosimetry Installations and Evaluations for Yonggwang Unit 2 Reactor Pressure Vessel

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Byoung Chul; Yoo, Choon Sung; Lee, Sam Lai; Gong, Un Sik; Choi, Kwon Jae; Chung, Kyoung Ki; Kim, Kwan Hyun; Chang, Jong Hwa; Ha, Jea Ju

    2008-01-15

    This report describes a neutron fluence assessment performed for the Yonggwang Unit 2 pressure vessel beltline region based on the guidance specified in Regulatory Guide 1.190. In this assessment, maximum fast neutron exposures expressed in terms of fast neutron fluence (E>1 MeV) and iron atom displacements (dpa) were established for the beltline region of the pressure vessel. During Cycle 16 of reactor operation, an Ex-Vessel Neutron Dosimetry Program was instituted at Yonggwang Unit 2 to provide continuous monitoring of the beltline region of the reactor vessel. The use of the Ex-Vessel Neutron Dosimetry Program coupled with available surveillance capsule measurements provides a plant specific data base that enables the evaluation of the vessel exposure and the uncertainty associated with that exposure over the service life of the unit. Ex-Vessel Neutron Dosimetry has been evaluated at the conclusion of Cycle 16.

  11. Final report for the 3rd Ex-Vessel Neutron Dosimetry Installations and Evaluations for Kori Unit 1 Reactor Pressure Vessel

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Byoung Chul; Yoo, Choon Sung; Lee, Sam Lai (and others)

    2008-03-15

    This report describes a neutron fluence assessment performed for the Kori Unit 1 pressure vessel belt line region based on the guidance specified in Regulatory Guide 1.190. In this assessment, maximum fast neutron exposures expressed in terms of fast neutron fluence (E>1 MeV) and iron atom displacements (dpa) were established for the belt line region of the pressure vessel. After Cycle 23 of reactor operation, 3rd Ex-Vessel Neutron Dosimetry Program was instituted at Kori Unit 1 to provide continuous monitoring of the belt line region of the reactor vessel. The use of the Ex-Vessel Neutron Dosimetry Program coupled with available surveillance capsule measurements provides a plant specific data base that enables the evaluation of the vessel exposure and the uncertainty associated with that exposure over the service life of the unit. Ex-Vessel Neutron Dosimetry has been evaluated at the conclusion of Cycle 24.

  12. Final report for the 1st ex-vessel neutron dosimetry installations and evaluations for Kori unit 2 reactor pressure vessel

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Byoung Chul; Yoo, Choon Sung; Lee, Sam Lai; Chang, Kee Ok; Gong, Un Sik; Choi, Kwon Jae; Chang, Jong Hwa; Lim, Nam Jin; Hong, Joon Wha; Cheon, Byeong Jin

    2006-11-15

    This report describes a neutron fluence assessment performed for the Kori unit 2 pressure vessel belt line region based on the guidance specified in regulatory guide 1.190. In this assessment, maximum fast neutron exposures expressed in terms of fast neutron fluence (E>1 MeV) and iron atom displacements (dpa) were established for the belt line region of the pressure vessel. During cycle 20 of reactor operation, an ex-vessel neutron dosimetry program was instituted at Kori unit 2 to provide continuous monitoring of the belt line region of the reactor vessel. The use of the ex-vessel neutron dosimetry program coupled with available surveillance capsule measurements provides a plant specific data base that enables the evaluation of the vessel exposure and the uncertainty associated with that exposure over the service life of the unit. Ex-vessel neutron dosimetry has been evaluated at the conclusion of cycle 20.

  13. Final Report of the 2nd Ex-Vessel Neutron Dosimetry Installation And Evaluations for Yonggwang Unit 1 Reactor Pressure Vessel

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Byoung Chul; Yoo, Choon Sung; Lee, Sam Lai; Gong, Un Sik; Choi, Kwon Jae; Chung, Kyoung Ki; Kim, Kwan Hyun; Chang, Jong Hwa; Ha, Jea Ju

    2008-01-15

    This report describes a neutron fluence assessment performed for the Kori Unit 2 pressure vessel belt line region based on the guidance specified in Regulatory Guide 1.190. In this assessment, maximum fast neutron exposures expressed in terms of fast neutron fluence (E>1 MeV) and iron atom displacements (dpa) were established for the belt line region of the pressure vessel. During Cycle 21 of reactor operation, an Ex-Vessel Neutron Dosimetry Program was instituted at Kori Unit 2 to provide continuous monitoring of the belt line region of the reactor vessel. The use of the Ex-Vessel Neutron Dosimetry Program coupled with available surveillance capsule measurements provides a plant specific data base that enables the evaluation of the vessel exposure and the uncertainty associated with that exposure over the service life of the unit. Ex-Vessel Neutron Dosimetry has been evaluated at the conclusion of Cycle 21.

  14. [Evaluation of food security and anti-hunger public policies in Brazil, 1995-2002: 4--National School Nutrition Program].

    Science.gov (United States)

    Santos, Leonor Maria Pacheco; Santos, Sandra Maria Chaves dos; Santana, Luciana Alaíde Alves; Henrique, Flavia Conceição Santos; Mazza, Roseanne Porto Dantas; Santos, Ligia Amparo da Silva; Santos, Lílian Silva dos

    2007-11-01

    This study evaluated the Brazilian National School Nutrition Program from a structure-process-results perspective. The methodology involved document research and a case study in 45 counties and 73 schools in the State of Bahia, including program manager interviews and household questionnaires involving 3,367 children (7-14 years of age). Relating to program structure, the study analyzed the evolution of normative instruments and some infrastructure aspects. Managers reported problems with the installations for preparing and distributing meals in 28% of the counties. Decentralization to the county (municipal) level was present in 93% of cases and to the school level in about 20%; however, nearly 70% of the schools received the food supplies directly. Although Social Control Councils were created, members were not always chosen democratically. Acceptability of the meals was good, as expected considering the widespread poverty in the target population. Overall program coverage was high (95%), but 77% of schoolchildren in the interior and 39% in the capital city did not receive meals every day. So far, irregular school meal distribution has frustrated the program's aspirations to become a universal social policy and ensure a basic right for children.

  15. Food assistance is associated with improved body mass index, food security and attendance at clinic in an HIV program in central Haiti: a prospective observational cohort study

    Directory of Open Access Journals (Sweden)

    Ivers Louise C

    2010-08-01

    Full Text Available Abstract Background Few data are available to guide programmatic solutions to the overlapping problems of undernutrition and HIV infection. We evaluated the impact of food assistance on patient outcomes in a comprehensive HIV program in central Haiti in a prospective observational cohort study. Methods Adults with HIV infection were eligible for monthly food rations if they had any one of: tuberculosis, body mass index (BMI 2, CD4 cell count 3 (in the prior 3 months or severe socio-economic conditions. A total of 600 individuals (300 eligible and 300 ineligible for food assistance were interviewed before rations were distributed, at 6 months and at 12 months. Data collected included demographics, BMI and food insecurity score (range 0 - 20. Results At 6- and 12-month time-points, 488 and 340 subjects were eligible for analysis. Multivariable analysis demonstrated that at 6 months, food security significantly improved in those who received food assistance versus who did not (-3.55 vs -0.16; P Conclusions Food assistance was associated with improved food security, increased BMI, and improved adherence to clinic visits at 6 and 12 months among people living with HIV in Haiti and should be part of routine care where HIV and food insecurity overlap.

  16. Internal validity of a household food security scale is consistent among diverse populations participating in a food supplement program in Colombia

    Directory of Open Access Journals (Sweden)

    Melgar-Quinonez Hugo

    2008-05-01

    Full Text Available Abstract Objective We assessed the validity of a locally adapted Colombian Household Food Security Scale (CHFSS used as a part of the 2006 evaluation of the food supplement component of the Plan for Improving Food and Nutrition in Antioquia, Colombia (MANA – Plan Departamental de Seguridad Alimentaria y Nutricional de Antioquia. Methods Subjects included low-income families with pre-school age children in MANA that responded affirmatively to at least one CHFSS item (n = 1,319. Rasch Modeling was used to evaluate the psychometric characteristics of the items through measure and INFIT values. Differences in CHFSS performance were assessed by area of residency, socioeconomic status and number of children enrolled in MANA. Unidimensionality of a scale by group was further assessed using Differential Item Functioning (DIF. Results Most CHFSS items presented good fitness with most INFIT values within the adequate range of 0.8 to 1.2. Consistency in item measure values between groups was found for all but two items in the comparison by area of residency. Only two adult items exhibited DIF between urban and rural households. Conclusion The results indicate that the adapted CHFSS is a valid tool to assess the household food security of participants in food assistance programs like MANA.

  17. Internal validity of a household food security scale is consistent among diverse populations participating in a food supplement program in Colombia.

    Science.gov (United States)

    Hackett, Michelle; Melgar-Quinonez, Hugo; Uribe, Martha C Alvarez

    2008-05-23

    We assessed the validity of a locally adapted Colombian Household Food Security Scale (CHFSS) used as a part of the 2006 evaluation of the food supplement component of the Plan for Improving Food and Nutrition in Antioquia, Colombia (MANA - Plan Departamental de Seguridad Alimentaria y Nutricional de Antioquia). Subjects included low-income families with pre-school age children in MANA that responded affirmatively to at least one CHFSS item (n = 1,319). Rasch Modeling was used to evaluate the psychometric characteristics of the items through measure and INFIT values. Differences in CHFSS performance were assessed by area of residency, socioeconomic status and number of children enrolled in MANA. Unidimensionality of a scale by group was further assessed using Differential Item Functioning (DIF). Most CHFSS items presented good fitness with most INFIT values within the adequate range of 0.8 to 1.2. Consistency in item measure values between groups was found for all but two items in the comparison by area of residency. Only two adult items exhibited DIF between urban and rural households. The results indicate that the adapted CHFSS is a valid tool to assess the household food security of participants in food assistance programs like MANA.

  18. Studies and development of essential systems in the surveillance program, life extension potential of the vessel and master curve in nuclear power plants; Estudios y desarrollo de sistemas necesarios en el programa de vigilancia, potencial extension de vida de la vasija y curva maestra en nucleoelectricas

    Energy Technology Data Exchange (ETDEWEB)

    Romero C, J.; Hernandez C, R.; Rocamontes A, M.; Perez R, N., E-mail: jesus.romero@inin.gob.m [ININ, Departamento de Automatizacion e Instrumentacion, Carretera Mexico-Toluca s/n, 52750 Ocoyoacac, Estado de Mexico (Mexico)

    2010-07-01

    The nuclear power plants owners should demonstrate that the effects of the embrittlement by neutronic radiation do not commit the structural integrity of the pressure vessel of the nuclear reactors, so much under conditions of routine operation as below an accident postulate. In consequence, in Mexico surveillance programs of the vessels of the nuclear power plant of Laguna Verde exist, in which three surveillance capsules are have by reactor. A surveillance capsule is composed by a support and between six and eight containers for test tubes and dosemeters. The containers for test tubes are of two types: rectangular container for Charpy V test tubes and cylindrical container for tension test tubes. These test tubes are subject to a same or bigger neutronic flow that of the vessel, being representative witness of the mechanical conditions of the vessel. The objective of to assay the test tubes to impact is to evaluate the embrittlement grade of the vessel beforehand during its useful life of operation, as well as to determinate the running of the ductile-fragile transition temperature in function of the time. (Author)

  19. 46 CFR 289.2 - Vessels included.

    Science.gov (United States)

    2010-10-01

    ... CONSTRUCTION-DIFFERENTIAL SUBSIDY VESSELS, OPERATING-DIFFERENTIAL SUBSIDY VESSELS AND OF VESSELS SOLD OR ADJUSTED UNDER THE MERCHANT SHIP SALES ACT 1946 § 289.2 Vessels included. Vessels subject to the provisions of this part are: (a) All vessels which may in the future be constructed or sold with construction...

  20. Metrics for smart security awareness

    CSIR Research Space (South Africa)

    Labuschagne, William A

    2017-06-01

    Full Text Available . Wilson and Hash (2003) define security awareness as “Efforts designed to change behavior or reinforce good security practices”. In other words, the effectiveness of a security awareness program can be measured by the change in behavior related... measuring effectiveness. Behavior is a key indicator of effectiveness as it was also noted by Wilson and Hash (2003). Success of security awareness programs have been reported by Eminağaoğlua, Uçarb and Erenc (2009) who conducted a 12 month study on a...

  1. 10 CFR 605.18 - National security.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  2. Professional Development Award: Agriculture and Food Security ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2017-08-28

    Aug 28, 2017 ... Call for. Applications. Program(s). Canadian International Food Security Research Fund ... The general objective of this PDA will be to work with IDRC's Agriculture and Food Security (AFS) team to carry out and complete synthesis research that will consolidate the Canadian International Food Security ...

  3. Efficient Vessel Tracking  with Accuracy Guarantees

    DEFF Research Database (Denmark)

    Redoutey, Martin; Scotti, Eric; Jensen, Christian Søndergaard

    2008-01-01

    Safety and security are top concerns in maritime navigation, particularly as maritime traffic continues to grow and as crew sizes are reduced. The Automatic Identification System (AIS) plays a key role in regard to these concerns. This system, whose objective is in part to identify and locate ves...... accuracies at lower communication costs. The techniques employ movement predictions that are shared between vessels and the VTS. Empirical studies with a prototype implementation and real vessel data demonstrate that the techniques are capable of significantly improving the AIS....

  4. [Large vessel vasculitides].

    Science.gov (United States)

    Morović-Vergles, Jadranka; Puksić, Silva; Gracanin, Ana Gudelj

    2013-01-01

    Large vessel vasculitis includes Giant cell arteritis and Takayasu arteritis. Giant cell arteritis is the most common form of vasculitis affect patients aged 50 years or over. The diagnosis should be considered in older patients who present with new onset of headache, visual disturbance, polymyalgia rheumatica and/or fever unknown cause. Glucocorticoides remain the cornerstone of therapy. Takayasu arteritis is a chronic panarteritis of the aorta ant its major branches presenting commonly in young ages. Although all large arteries can be affected, the aorta, subclavian and carotid arteries are most commonly involved. The most common symptoms included upper extremity claudication, hypertension, pain over the carotid arteries (carotidynia), dizziness and visual disturbances. Early diagnosis and treatment has improved the outcome in patients with TA.

  5. Vessel segmentation in screening mammograms

    Science.gov (United States)

    Mordang, J. J.; Karssemeijer, N.

    2015-03-01

    Blood vessels are a major cause of false positives in computer aided detection systems for the detection of breast cancer. Therefore, the purpose of this study is to construct a framework for the segmentation of blood vessels in screening mammograms. The proposed framework is based on supervised learning using a cascade classifier. This cascade classifier consists of several stages where in each stage a GentleBoost classifier is trained on Haar-like features. A total of 30 cases were included in this study. In each image, vessel pixels were annotated by selecting pixels on the centerline of the vessel, control samples were taken by annotating a region without any visible vascular structures. This resulted in a total of 31,000 pixels marked as vascular and over 4 million control pixels. After training, the classifier assigns a vesselness likelihood to the pixels. The proposed framework was compared to three other vessel enhancing methods, i) a vesselness filter, ii) a gaussian derivative filter, and iii) a tubeness filter. The methods were compared in terms of area under the receiver operating characteristics curves, the Az values. The Az value of the cascade approach is 0:85. This is superior to the vesselness, Gaussian, and tubeness methods, with Az values of 0:77, 0:81, and 0:78, respectively. From these results, it can be concluded that our proposed framework is a promising method for the detection of vessels in screening mammograms.

  6. Americium behaviour in plastic vessels

    Energy Technology Data Exchange (ETDEWEB)

    Legarda, F.; Herranz, M. [Departamento de Ingenieria Nuclear y Mecanica de Fluidos, Escuela Tecnica Superior de Ingenieria de Bilbao, Universidad del Pais Vasco (UPV/EHU), Alameda de Urquijo s/n, 48013 Bilbao (Spain); Idoeta, R., E-mail: raquel.idoeta@ehu.e [Departamento de Ingenieria Nuclear y Mecanica de Fluidos, Escuela Tecnica Superior de Ingenieria de Bilbao, Universidad del Pais Vasco (UPV/EHU), Alameda de Urquijo s/n, 48013 Bilbao (Spain); Abelairas, A. [Departamento de Ingenieria Nuclear y Mecanica de Fluidos, Escuela Tecnica Superior de Ingenieria de Bilbao, Universidad del Pais Vasco (UPV/EHU), Alameda de Urquijo s/n, 48013 Bilbao (Spain)

    2010-07-15

    The adsorption of {sup 241}Am dissolved in water in different plastic storage vessels was determined. Three different plastics were investigated with natural and distilled waters and the retention of {sup 241}Am by these plastics was studied. The same was done by varying vessel agitation time, vessel agitation speed, surface/volume ratio of water in the vessels and water pH. Adsorptions were measured to be between 0% and 70%. The adsorption of {sup 241}Am is minimized with no water agitation, with PET or PVC plastics, and by water acidification.

  7. Continued Development of the AF/SGR Tricorder Program for Homeland Security, Military, Public Health, and Medical Operations

    Science.gov (United States)

    2012-05-15

    battery power with solar power back-up capability; 64-gig memory to hold and run the XML and fourth-generation programs required by the Air Force; dual...or node to pass encrypted data; e. Communication satellites would be available; and f. The transmitter and sensors would require solar power...climates and terrains. The Football BGAN Global Internet Suitcase is an automatic interfacing satellite transmitter. The auto-aligning unit

  8. ATIP Report: Cyber Security Research in China

    Science.gov (United States)

    2015-06-05

    National Security Agency’s (NSA’s) PRISM program. China established the Central Leading Group for Internet Security and Informatization in February 2014 as...Edward Snowden leaked aspects of the US NSA’s PRISM program. In February 2014, China established the Central Leading Group for Internet Security and...Jianping Wu, Prof. Haixin DUAN, 2009-2011. • Key Projects in the National Science & Technology Pillar Program Sub-Program: Trusted Internet

  9. Marine animal sighting and census data from various small vessels as part of the Outer Continental Shelf Environmental Assessment Program (OCSEAP) from 26 July 1982 to 24 August 1982 (NODC Accession 8300139)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Marine animal sighting and census data were collected from various small vessels from 26 July 1982 to 24 August 1982. Data were collected by the University of Alaska...

  10. Marine bird specimen and other data from various small vessels as part of the Outer Continental Shelf Environmental Assessment Program (OCSEAP) from 24 June 1976 to 11 August 1980 (NODC Accession 8200073)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Marine bird specimen and other data were collected from various small vessels from 24 June 1976 to 11 August 1980. Data were collected by the University of Alaska -...

  11. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  12. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  13. KSOS System Security Plan. Revision 2. Kernelized Secure Operating System.

    Science.gov (United States)

    1980-01-01

    1972) j. (Hoare 73b] Hoare, C. A. R., "Proof of a Structured Program: the Sieve of Eratosthenes ", Computer Journal, 15 pp 321-325, (November 1972). k...desire for improved system security permeates every design and implementation decision. 4 Rev 2 KSOS System Security Plan The model of security which...Modula encourages modularization and information hiding, two features which improve the robustness and maintainability of the system. The testing

  14. 46 CFR 287.9 - Valuation of securities in fund.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 8 2010-10-01 2010-10-01 false Valuation of securities in fund. 287.9 Section 287.9 Shipping MARITIME ADMINISTRATION, DEPARTMENT OF TRANSPORTATION REGULATIONS AFFECTING SUBSIDIZED VESSELS AND... finance the construction or acquisition of new vessels which are deposited in the construction reserve...

  15. Convergence of Corporate and Information Security

    OpenAIRE

    Syed (Shawon) M. Rahman; Shannon E. Donahue,

    2010-01-01

    As physical and information security boundaries have become increasingly blurry many organizations are experiencing challenges with how to effectively and efficiently manage security within the corporate. There is no current standard or best practice offered by the security community regarding convergence; however many organizations such as the Alliance for Enterprise Security Risk Management (AESRM) offer some excellent suggestions for integrating a converged security program. This paper rep...

  16. Integral experiments on in-vessel coolability and vessel creep: results and analysis of the FOREVER-C1 test

    Energy Technology Data Exchange (ETDEWEB)

    Sehgal, B.R.; Nourgaliev, R.R.; Dinh, T.N.; Karbojian, A. [Division of Nuclear Power Safety, Royal Institute of Technology, Drottning Kristinas Vaeg., Stockholm (Sweden)

    1999-07-01

    This paper describes the FOREVER (Failure Of REactor VEssel Retention) experimental program, which is currently underway at the Division of Nuclear Power Safety, Royal Institute of Technology (RIT/NPS). The objectives of the FOREVER experiments are to obtain data and develop validated models (i) on the melt coolability process inside the vessel, in the presence of water (in particular, on the efficacy of the postulated gap cooling to preclude vessel failure); and (ii) on the lower head failure due to the creep process in the absence of water inside and/or outside the lower head. The paper presents the experimental results and analysis of the first FOREVER-C1 test. During this experiment, the 1/10th scale pressure vessel, heated to about 900degC and pressurized to 26 bars, was subjected to creep deformation in a non-stop 24-hours test. The vessel wall displacement data clearly shows different stages of the vessel deformation due to thermal expansion, elastic, plastic and creep processes. The maximum displacement was observed at the lowermost region of the vessel lower plenum. Information on the FOREVER-C1 measured thermal characteristics and analysis of the observed thermal and structural behavior is presented. The coupled nature of thermal and mechanical processes, as well as the effect of other system conditions (such as depressurization) on the melt pool and vessel temperature responses are analyzed. (author)

  17. 77 FR 26023 - President's National Security Telecommunications Advisory Committee; Correction

    Science.gov (United States)

    2012-05-02

    ... Doc No: 2012-10510] DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0016] President's National Security Telecommunications Advisory Committee; Correction AGENCY: National Protection and Programs... Federal Register of April 25, 2012, concerning the President's National Security Telecommunications...

  18. 76 FR 72427 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2011-11-23

    ... Doc No: 2011-30298] DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0106] President's National Security Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS... President's National Security Telecommunications Advisory Committee (NSTAC) will meet on Thursday, December...

  19. Genetic Algorithm For Tightening Security

    OpenAIRE

    Buji, Adam Bakr Mohammed

    2017-01-01

    Protection against many cyber security threats can be implemented by existing software on the system, with no need for security software. Some operating systems or program parameters can increase the security level and close any vulnerabilities if they are set properly. This project shows a way to prevent potential attacks with relatively low cost, but this method needs immediate attention. Reconfiguring a machine regularly is a moving target defense which is done by modifying the configurati...

  20. The impact of a food assistance program on nutritional status, disease progression, and food security among people living with HIV in Uganda.

    Science.gov (United States)

    Rawat, Rahul; Faust, Elizabeth; Maluccio, John A; Kadiyala, Suneetha

    2014-05-01

    Although the last decade has seen increased access to antiretroviral therapy across the developing world, widespread food insecurity and undernutrition continue to compromise an effective response to the AIDS epidemic. Limited evidence exists on the potential benefit of food security and nutrition interventions to people living with HIV (PLHIV). We capitalized on an existing intervention to PLHIV in Uganda and conducted a prospective quasi-experimental study evaluating the impact of a monthly household food basket, provided to food insecure antiretroviral therapy-naive PLHIVs for 12 months. The outcomes of interest measured at baseline and follow-up were nutritional status [body mass index; mid-upper arm circumference and hemoglobin (Hb) concentrations], disease severity (CD4 count), and 2 measures of food security: diet quality (Individual Dietary Diversity Score) and food access (Household Food Insecurity Access Scale). We used difference-in-difference propensity score matching to examine the impact of food assistance. Over 12 months, food assistance significantly increased body mass index by 0.6 kg/m (P < 0.01) and mid-upper arm circumference by 6.7 mm (P < 0.05). We found no impact on CD4 count, Hb concentrations, or Individual Dietary Diversity Score. Restricting the analysis to individuals with CD4 counts of greater than 350 cells per microliter, there were significant impacts on Hb concentrations (1.0 g/dL; P < 0.05). At the household level, food assistance increased the Household Food Insecurity Access Scale, by 2.1 points (P < 0.01). This study demonstrates the potential for food assistance programming to be part of the standard of care for PLHIV in areas of widespread food insecurity.

  1. Secure Java For Web Application Development

    CERN Document Server

    Bhargav, Abhay

    2010-01-01

    As the Internet has evolved, so have the various vulnerabilities, which largely stem from the fact that developers are unaware of the importance of a robust application security program. This book aims to educate readers on application security and building secure web applications using the new Java Platform. The text details a secure web application development process from the risk assessment phase to the proof of concept phase. The authors detail such concepts as application risk assessment, secure SDLC, security compliance requirements, web application vulnerabilities and threats, security

  2. Role of environmental geology in US Department of Energy's advanced research and development programs to promote energy security in the United States

    Science.gov (United States)

    Brown, C. E.

    1995-12-01

    The purpose of this report is to describe the research programs and program activities of the US Department of Energy (DOE) that most directly relate to topics in the field of environmental geology. In this light, the mission of the DOE and the definition of environmental geology will be discussed. In a broad sense, environmental geology is that branch of earth science that emphasizes the entire spectrum of human interactions with the physical environment that include environmental health, mineral exploration and exploitation, waste management, energy use and conservation, global change, environmental law, natural and man-made hazard assessment, and land-use planning. A large number of research, development, and demonstration programs are under DOE's administration and guidance that directly or indirectly relate to topics in environmental geology. The primary mission of the DOE is to contribute to the welfare of the nation by providing the scientific foundation, technology, policy, and institutional leadership necessary to achieve efficiency in energy use, diversity in energy sources, a more productive and competitive economy, improved environmental quality, and a secure national defense. The research and development funding effort has most recently been redirected toward greater utilization of clean fossil fuels, especially natural gas, weatherization, renewable energy, energy efficiency, fusion energy, and high-energy physics. This paper will summarize the role that environmental geology has played and will continue to play in the execution of DOE's mission and the energy options that DOE has investigated closely. The specific options are those that center around energy choices, such as alternative-fueled transportation, building technologies, energy-efficient lighting, and clean energy.

  3. Pro PHP Security From Application Security Principles to the Implementation of XSS Defenses

    CERN Document Server

    Snyder, Chris; Southwell, Michael

    2010-01-01

    PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also dive into recent developments like mobile security, the impact of Javascript, and the advantages of recent PHP hardening efforts. Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a l

  4. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  5. Company's Data Security - Case Study

    Science.gov (United States)

    Stera, Piotr

    This paper describes a computer network and data security problems in an existing company. Two main issues were pointed out: data loss protection and uncontrolled data copying. Security system was designed and implemented. The system consists of many dedicated programs. This system protect from data loss and detected unauthorized file copying from company's server by a dishonest employee.

  6. 50 CFR 648.8 - Vessel identification.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Vessel identification. 648.8 Section 648.8... identification. (a) Vessel name and official number. Each fishing vessel subject to this part and over 25 ft (7.6... or ocean quahog vessels licensed under New Jersey law may use the appropriate vessel identification...

  7. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  8. Computers, business, and security the new role for security

    CERN Document Server

    Schweitzer, James A

    1987-01-01

    Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the total security programs.Organized into three parts encompassing 10 chapters, this book begins with an overview of how the developing information age is affecting business management, operations, and organization. This text then examines a number of vulnerabilities that arise in the process of using business computing and communicat

  9. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  10. 76 FR 43696 - Nationwide Cyber Security Review (NCSR) Assessment

    Science.gov (United States)

    2011-07-21

    ... SECURITY Nationwide Cyber Security Review (NCSR) Assessment AGENCY: National Protection and Programs... of Cybersecurity and Communications (CS&C), National Cyber Security Division (NCSD), Cyber Security... (Pub. L. 104-13, 44 U.S.C. Chapter 35): New Information Collection Request, Nationwide Cyber Security...

  11. 2D Fast Vessel Visualization Using a Vessel Wall Mask Guiding Fine Vessel Detection

    Directory of Open Access Journals (Sweden)

    Sotirios Raptis

    2010-01-01

    and then try to approach the ridges and branches of the vasculature's using fine detection. Fine vessel screening looks into local structural inconsistencies in vessels properties, into noise, or into not expected intensity variations observed inside pre-known vessel-body areas. The vessels are first modelled sufficiently but not precisely by their walls with a tubular model-structure that is the result of an initial segmentation. This provides a chart of likely Vessel Wall Pixels (VWPs yielding a form of a likelihood vessel map mainly based on gradient filter's intensity and spatial arrangement parameters (e.g., linear consistency. Specific vessel parameters (centerline, width, location, fall-away rate, main orientation are post-computed by convolving the image with a set of pre-tuned spatial filters called Matched Filters (MFs. These are easily computed as Gaussian-like 2D forms that use a limited range sub-optimal parameters adjusted to the dominant vessel characteristics obtained by Spatial Grey Level Difference statistics limiting the range of search into vessel widths of 16, 32, and 64 pixels. Sparse pixels are effectively eliminated by applying a limited range Hough Transform (HT or region growing. Major benefits are limiting the range of parameters, reducing the search-space for post-convolution to only masked regions, representing almost 2% of the 2D volume, good speed versus accuracy/time trade-off. Results show the potentials of our approach in terms of time for detection ROC analysis and accuracy of vessel pixel (VP detection.

  12. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  13. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  14. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  15. Southeast Region Headboat Survey-Vessel list/Vessel Directory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This is a database of vessels that have been on the SRHS through time, their owners/operators, marinas/docks and their contact information. This assists in...

  16. 33 CFR 155.1052 - Response plan development and evaluation criteria for vessels carrying group V petroleum oil as a...

    Science.gov (United States)

    2010-07-01

    ... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) POLLUTION OIL OR HAZARDOUS MATERIAL POLLUTION PREVENTION REGULATIONS FOR VESSELS Tank Vessel Response Plans for Oil § 155... equipment, including— (1) Sonar, sampling equipment, or other methods for locating the oil on the bottom or...

  17. 8 CFR 252.3 - Great Lakes vessels and tugboats arriving in the United States from Canada; special procedures.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Great Lakes vessels and tugboats arriving... DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS LANDING OF ALIEN CREWMEN § 252.3 Great Lakes vessels... and tugboats. An immigration examination shall not be required of any crewman aboard a Great Lakes...

  18. 46 CFR 171.124 - Watertight integrity above the margin line in a vessel less than 100 gross tons.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Watertight integrity above the margin line in a vessel less than 100 gross tons. 171.124 Section 171.124 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... Integrity Above the Margin Line § 171.124 Watertight integrity above the margin line in a vessel less than...

  19. China’s Security Perspective

    Science.gov (United States)

    2011-06-01

    Harold A. Trinkunas, PhD Chair , Department of National Security Affairs iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT The current...67–103. 14 Dennis Blair, John Handley, “From Wheels to Webs: Reconstruction Asia-Pacific Security Arrangements” The Washington Quarterly (2001), 7...professional basketball player during a game, China’s military acquisition program is only part of its overall modernization program and poses little threat

  20. Y-12 Groundwater Protection Program Monitoring Optimization Plan for Groundwater Monitoring Wells at the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2017-04-01

    This document is the monitoring optimization plan for groundwater monitoring wells associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee. The plan describes the technical approach that is implemented under the Y-12 Groundwater Protection Program (GWPP) to focus available resources on the monitoring wells at Y-12 that provide the most useful hydrologic and groundwater quality monitoring data. The technical approach is based on the GWPP status designation for each well. Under this approach, wells granted “active” status are used by the GWPP for hydrologic monitoring and/or groundwater quality sampling, whereas wells granted “inactive” status are not used for either purpose. The status designation also defines the frequency at which the GWPP will inspect applicable wells, the scope of these well inspections, and extent of any maintenance actions initiated by the GWPP. Details regarding the ancillary activities associated with implementation of this plan (e.g., well inspection) are deferred to the referenced GWPP plans.

  1. Secure portal.

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing

  2. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  3. Security Studies

    OpenAIRE

    ,

    2005-01-01

    Security Studies has firmly established itself as a leading journal on international security issues. The journal publishes theoretical, historical and policy-oriented articles on the causes and consequences of war, and the sources and conditions of peace. The journal has published articles on balancing vs. bandwagoning, deterrence in enduring rivalries, the Domino theory, nuclear weapons proliferation, civil-military relations, political reforms in China, strategic culture in Asia and the P...

  4. Secure Directories

    OpenAIRE

    Chadwick, David W.

    2000-01-01

    This paper describes the mechanisms that are needed in order to provide a secure directory service based on the X.500 data model. A brief introduction to the X.500 data model is given followed by an overview of the Lightweight Directory Access Protocol. Security can be provided by three functions: an application level firewall, an authentication mechanism, and an access control scheme. A description of the X.500 and LDAP access control models is presented followed by the authentication method...

  5. 46 CFR 287.8 - Investment of funds in securities.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 8 2010-10-01 2010-10-01 false Investment of funds in securities. 287.8 Section 287.8 Shipping MARITIME ADMINISTRATION, DEPARTMENT OF TRANSPORTATION REGULATIONS AFFECTING SUBSIDIZED VESSELS AND... may be substituted for securities or commitment to finance in the fund, subject to the provisions of...

  6. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  7. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  8. ITER Vacuum Vessel design and construction

    Energy Technology Data Exchange (ETDEWEB)

    Ioki, K., E-mail: Kimihiro.Ioki@iter.org [ITER Organization, Route de Vinon sur Verdon, 13115 Saint Paul Lez Durance (France); Choi, C.H.; Daly, E.; Dani, S.; Davis, J.; Giraud, B.; Gribov, Y.; Hamlyn-Harris, C. [ITER Organization, Route de Vinon sur Verdon, 13115 Saint Paul Lez Durance (France); Jones, L. [F4E, c/Josep Pla, n.2, Torres Diagonal Litoral, Edificio B3, E-08019 Barcelona (Spain); Jun, C. [ITER Organization, Route de Vinon sur Verdon, 13115 Saint Paul Lez Durance (France); Kim, B.C. [NFRI, 52 Yeoeundong Yuseonggu, Daejeon 305-333 (Korea, Republic of); Kuzmin, E. [NTC ' Sintez' , Efremov Inst., 189631 Metallostroy, St. Petersburg (Russian Federation); Le Barbier, R.; Martinez, J.-M. [ITER Organization, Route de Vinon sur Verdon, 13115 Saint Paul Lez Durance (France); Pathak, H. [ITER-India, A-29, GIDC Electronic Estate, Sector -25, Gandhinagar 382025 (India); Preble, J.; Reich, J. [ITER Organization, Route de Vinon sur Verdon, 13115 Saint Paul Lez Durance (France); Sa, J.W. [NFRI, 52 Yeoeundong Yuseonggu, Daejeon 305-333 (Korea, Republic of); Terasawa, A.; Utin, Yu. [ITER Organization, Route de Vinon sur Verdon, 13115 Saint Paul Lez Durance (France); and others

    2012-08-15

    After implementing a few design modifications (referred to as the 'Modified Reference Design') in 2009, the Vacuum Vessel (VV) design had been stabilized. The VV design is being finalized, including interface components such as support rails and feedthroughs for the in-vessel coils. It is necessary to make adjustments to the locations of the blanket supports and manifolds to accommodate design modifications to the in-vessel coils. The VV support design is also being finalized considering a structural simplification. Design of the in-wall shielding (IWS) has progressed, considering the assembly methods and the required tolerances. The detailed layout of ferritic steel plates and borated steel plates was optimized based on the toroidal field ripple analysis. A dynamic test on the inter-modular key to support the blanket modules was performed to measure the dynamic amplification factor (DAF). An R and D program has started to select and qualify the welding and cutting processes for the port flange lip seal. The ITER VV material 316 L(N) IG was already qualified and the Modified Reference Design was approved by the Agreed Notified Body (ANB) in accordance with the Nuclear Pressure Equipment Order procedure.

  9. Composite Vessels for Containment of Extreme Blast Loadings

    Energy Technology Data Exchange (ETDEWEB)

    Pastrnak, J; Henning, C; Grundler, W; Switzer, V; Hollaway, R; Morrison, J; Hagler, L; Kokko, E; Deteresa, S; Hathcoat, B; Dalder, E

    2004-07-15

    A worldwide trend for explosives testing has been to replace open-air detonations with containment vessels, especially when any hazardous materials are involved. As part of the National Nuclear Security Administration's (NNSA) effort to ensure the safety and reliability of the nation's nuclear stockpile, researchers at Lawrence Livermore National Laboratory have been developing a high performance filament wound composite firing vessel that is nearly radiographically transparent. It was intended to contain a limited number of detonations of metal cased explosive assemblies in radiographic facilities such as the Advanced Hydrodynamic Facility (AHF) being studied by Los Alamos National Laboratory. A 2-meter diameter pressure vessel was designed to contain up to 35 kg (80 lb) of TNT equivalent explosive without leakage. Over the past 5 years a total of three half-scale (1 meter diameter) vessels have been constructed, and two of them were tested to 150% load with 8.2 kg (18-pound) spheres of C4 explosive. The low density and high specific strength advantages used in this composite vessel design may have other additional applications such as transporting sensitive explosives that could otherwise be moved only in very small quantities. Also, it could be used for highly portable, explosive containment systems for law enforcement.

  10. 2013 East Coast Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  11. SC/OQ Vessel Database

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Data tables holding information for the Surf Clam/Ocean Quahog vessel and dealer/processor logbooks (negative and positive), as well as individual tag information...

  12. 2011 Great Lakes Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  13. 2011 West Coast Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  14. 2013 Great Lakes Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  15. 2011 East Coast Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  16. Integrin binding: Sticking around vessels

    Science.gov (United States)

    Blatchley, Michael R.; Gerecht, Sharon

    2017-09-01

    A study demonstrates that controlled integrin binding on a biomaterial was capable of promoting vascular cell sprouting and formation of a non-leaky blood vessel network in a healthy and diseased state.

  17. Transposition of the great vessels

    Science.gov (United States)

    ... vessel called the ductus arteriosus open, allowing some mixing of the 2 blood circulations. A procedure using ... they are not already immune. Eating well, avoiding alcohol, and controlling diabetes both before and during pregnancy ...

  18. 2013 West Coast Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  19. Vessel Permit System Data Set

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — GARFO issues federal fishing permits annually to owners of fishing vessels who fish in the Greater Atlantic region, as required by federal regulation. These permits...

  20. 2011 Tug Towing Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  1. Caribbean PR Logbook Survey (Vessels)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains catch (landed catch) and effort for fishing trips made by vessels fishing in Puerto Rico. The catch and effort data for the entire trip are...

  2. Coastal Discard Logbook Survey (Vessels)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains data on the type and amount of marine resources that are discarded or interacted with by vessels that are selected to report to the Southeast...

  3. FAA computer security : recommendations to address continuing weaknesses

    Science.gov (United States)

    2000-12-01

    In September, testimony before the Committee on Science, House of Representatives, focused on the Federal Aviation Administration's (FAA) computer security program. In brief, we reported that FAA's agency-wide computer security program has serious, p...

  4. Prosopomorphic vessels from Moesia Superior

    Directory of Open Access Journals (Sweden)

    Nikolić Snežana

    2008-01-01

    Full Text Available The prosopomorphic vessels from Moesia Superior had the form of beakers varying in outline but similar in size. They were wheel-thrown, mould-made or manufactured by using a combination of wheel-throwing and mould-made appliqués. Given that face vessels are considerably scarcer than other kinds of pottery, more than fifty finds from Moesia Superior make an enviable collection. In this and other provinces face vessels have been recovered from military camps, civilian settlements and necropolises, which suggests that they served more than one purpose. It is generally accepted that the faces-masks gave a protective role to the vessels, be it to protect the deceased or the family, their house and possessions. More than forty of all known finds from Moesia Superior come from Viminacium, a half of that number from necropolises. Although tangible evidence is lacking, there must have been several local workshops producing face vessels. The number and technological characteristics of the discovered vessels suggest that one of the workshops is likely to have been at Viminacium, an important pottery-making centre in the second and third centuries.

  5. 10 CFR 602.16 - National security.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...

  6. 7 CFR 3575.48 - Security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Security. 3575.48 Section 3575.48 Agriculture... GENERAL Community Programs Guaranteed Loans § 3575.48 Security. (a) Lender responsibility. The lender is responsible for obtaining and maintaining proper and adequate security to protect the interest of the lender...

  7. Research Award: Agriculture and Food Security

    International Development Research Centre (IDRC) Digital Library (Canada)

    Corey Piccioni

    2013-08-07

    Aug 7, 2013 ... The Agriculture and Food Security (AFS) program supports research that generates new opons for equitable and producve agriculture to improve food and income security for poor women and men in developing countries. Research has shown that appropriate food security intervenons have the potenal to ...

  8. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  9. Automated method for identification and artery-venous classification of vessel trees in retinal vessel networks.

    Directory of Open Access Journals (Sweden)

    Vinayak S Joshi

    Full Text Available The separation of the retinal vessel network into distinct arterial and venous vessel trees is of high interest. We propose an automated method for identification and separation of retinal vessel trees in a retinal color image by converting a vessel segmentation image into a vessel segment map and identifying the individual vessel trees by graph search. Orientation, width, and intensity of each vessel segment are utilized to find the optimal graph of vessel segments. The separated vessel trees are labeled as primary vessel or branches. We utilize the separated vessel trees for arterial-venous (AV classification, based on the color properties of the vessels in each tree graph. We applied our approach to a dataset of 50 fundus images from 50 subjects. The proposed method resulted in an accuracy of 91.44% correctly classified vessel pixels as either artery or vein. The accuracy of correctly classified major vessel segments was 96.42%.

  10. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe......, but while creation of defensive alliances appears unrealistic, new defence laws appearing 1909 show strong resolve to defend Denmark’s status as a neutral power. The Great War proves that these laws provided an adequate tool to be wielded by the politicians actually in office during that conflict. Following...... World War I it is not surprising that a salient feature of the defence debate is aversion against armed conflict. The Wilsonian agenda of a new system of collective security featuring prominently in the peace talks as well as in European debate generally does indeed have ramifications in Danish...

  11. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  12. 50 CFR 697.8 - Vessel identification.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Vessel identification. 697.8 Section 697.8 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION....8 Vessel identification. (a) Vessel name and official number. Each fishing vessel issued a limited...

  13. Mechanosensing in developing lymphatic vessels.

    Science.gov (United States)

    Planas-Paz, Lara; Lammert, Eckhard

    2014-01-01

    The lymphatic vasculature is responsible for fluid homeostasis, transport of immune cells, inflammatory molecules, and dietary lipids. It is composed of a network of lymphatic capillaries that drain into collecting lymphatic vessels and ultimately bring fluid back to the blood circulation. Lymphatic endothelial cells (LECs) that line lymphatic capillaries present loose overlapping intercellular junctions and anchoring filaments that support fluid drainage. When interstitial fluid accumulates within tissues, the extracellular matrix (ECM) swells and pulls the anchoring filaments. This results in opening of the LEC junctions and permits interstitial fluid uptake. The absorbed fluid is then transported within collecting lymphatic vessels, which exhibit intraluminal valves that prevent lymph backflow and smooth muscle cells that sequentially contract to propel lymph.Mechanotransduction involves translation of mechanical stimuli into biological responses. LECs have been shown to sense and respond to changes in ECM stiffness, fluid pressure-induced cell stretch, and fluid flow-induced shear stress. How these signals influence LEC function and lymphatic vessel growth can be investigated by using different mechanotransduction assays in vitro and to some extent in vivo.In this chapter, we will focus on the mechanical forces that regulate lymphatic vessel expansion during embryonic development and possibly secondary lymphedema. In mouse embryos, it has been recently shown that the amount of interstitial fluid determines the extent of lymphatic vessel expansion via a mechanosensory complex formed by β1 integrin and vascular endothelial growth factor receptor-3 (VEGFR3). This model might as well apply to secondary lymphedema.

  14. 77 FR 10960 - Security Zone, East River and Bronx Kill; Randalls and Wards Islands, NY

    Science.gov (United States)

    2012-02-24

    ... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA87 Security Zone, East River and Bronx Kill; Randalls and... establishing a temporary security zone on the waters of the East River and Bronx Kill, in the vicinity of... is intended to restrict vessels from a portion of the East River and Bronx Kill when public officials...

  15. Groundwater Protection Program Management Plan For The U.S. Department Of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental, LLC

    2009-09-01

    This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with the multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of Babcock & Wilcox Technical Services Y-12 LLC (hereafter referenced as B&W Y-12), the Y-12 management and operations (M&O) contractor for DOE. B&W Y-12 is a new corporate name, assumed in January 2007, for the company formerly known as BWXT Y-12, L.L.C., hereafter referenced as BWXT. This GWPP management plan addresses the requirements of DOE Order 450.1A Environmental Protection Program (hereafter referenced as DOE O 450.1A), which emphasize a site-wide approach for groundwater protection at each DOE facility through implementation of groundwater surveillance monitoring. Additionally, this plan addresses the relevant and applicable GWPP elements and goals described in the DOE O 450.1A technical guidance documents issued in June 2004 (DOE 2004) and May 2005 (DOE 2005). This GWPP management plan is a 'living' document that is reviewed annually, revised and reissued every three years, and is formatted to provide for updating individual sections independent of the rest of the document. Section 2 includes a short description of the groundwater system at Y-12, the history of groundwater monitoring at Y-12 and the corresponding evolution of the GWPP

  16. Secure Ties

    NARCIS (Netherlands)

    Joep de Hart; Frans Knol; Cora Maas - de Waal; Theo Roes

    2002-01-01

    Original title: Zekere banden. Discussions about the Netherlands of today often throw up terms such as 'social cohesion', 'social integration', 'liveability' and 'security'. The Netherlands Institute for Social Research/SCP has carried out a study of this phenomenon and presents the results in

  17. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  18. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  19. Grounding Damage to Conventional Vessels

    DEFF Research Database (Denmark)

    Lützen, Marie; Simonsen, Bo Cerup

    2003-01-01

    regulations for design of bottom compartment layout with regard to grounding damages are largely based on statistical damage data. New and updated damage statistics holding 930 grounding accident records has been investigated. The bottom damage statistics is compared to current regulations for the bottom......The present paper is concerned with rational design of conventional vessels with regard to bottom damage generated in grounding accidents. The aim of the work described here is to improve the design basis, primarily through analysis of new statistical data for grounding damage. The current...... for the relation between the amount of deformed structure and the energy absorption. Finally, the paper shows how damage statistics for existing, conventional vessels can be used together with theoretical prediction methods for determining grounding damage distributions for new vessel types not included...

  20. 19 CFR 4.5 - Government vessels.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Government vessels. 4.5 Section 4.5 Customs Duties... VESSELS IN FOREIGN AND DOMESTIC TRADES Arrival and Entry of Vessels § 4.5 Government vessels. (a) No... that is the property of, the U.S. Department of Defense (DoD) will be treated as a Government vessel...