WorldWideScience

Sample records for wide-area secure collaborative

  1. TeleMed: Wide-area, secure, collaborative object computing with Java and CORBA for healthcare

    Energy Technology Data Exchange (ETDEWEB)

    Forslund, D.W.; George, J.E.; Gavrilov, E.M.

    1998-12-31

    Distributed computing is becoming commonplace in a variety of industries with healthcare being a particularly important one for society. The authors describe the development and deployment of TeleMed in a few healthcare domains. TeleMed is a 100% Java distributed application build on CORBA and OMG standards enabling the collaboration on the treatment of chronically ill patients in a secure manner over the Internet. These standards enable other systems to work interoperably with TeleMed and provide transparent access to high performance distributed computing to the healthcare domain. The goal of wide scale integration of electronic medical records is a grand-challenge scale problem of global proportions with far-reaching social benefits.

  2. Security Analysis of a Software Defined Wide Area Network Solution

    OpenAIRE

    Rajendran, Ashok

    2016-01-01

    Enterprise wide area network (WAN) is a private network that connects the computers and other devices across an organisation's branch locations and the data centers. It forms the backbone of enterprise communication. Currently, multiprotocol label switching (MPLS) is commonly used to provide this service. As a recent alternative to MPLS, software-dened wide area networking (SD-WAN) solutions are being introduced as an IP based cloud-networking service for enterprises. SD-WAN virtualizes the n...

  3. Secure wide area network access to CMS analysis data using the Lustre filesystem

    International Nuclear Information System (INIS)

    Bourilkov, D; Avery, P; Cheng, M; Fu, Y; Kim, B; Palencia, J; Budden, R; Benninger, K; Rodriquez, J L; Dilascio, J; Dykstra, D; Seenu, N

    2012-01-01

    This paper reports the design and implementation of a secure, wide area network (WAN), distributed filesystem by the ExTENCI project (Extending Science Through Enhanced National CyberInfrastructure), based on the Lustre filesystem. The system is used for remote access to analysis data from the Compact Muon Solenoid (CMS) experiment at the Large Hadron Collider (LHC), and from the Lattice Quantum ChromoDynamics (LQCD) project. Security is provided by Kerberos authentication and authorization with additional fine grained control based on Lustre ACLs (Access Control List) and quotas. We investigate the impact of using various Kerberos security flavors on the I/O rates of CMS applications on client nodes reading and writing data to the Lustre filesystem, and on LQCD benchmarks. The clients can be real or virtual nodes. We are investigating additional options for user authentication based on user certificates.

  4. Secure wide area network access to CMS analysis data using the Lustre filesystem

    Science.gov (United States)

    Bourilkov, D.; Avery, P.; Cheng, M.; Fu, Y.; Kim, B.; Palencia, J.; Budden, R.; Benninger, K.; Rodriquez, J. L.; Dilascio, J.; Dykstra, D.; Seenu, N.

    2012-12-01

    This paper reports the design and implementation of a secure, wide area network (WAN), distributed filesystem by the ExTENCI project (Extending Science Through Enhanced National CyberInfrastructure), based on the Lustre filesystem. The system is used for remote access to analysis data from the Compact Muon Solenoid (CMS) experiment at the Large Hadron Collider (LHC), and from the Lattice Quantum ChromoDynamics (LQCD) project. Security is provided by Kerberos authentication and authorization with additional fine grained control based on Lustre ACLs (Access Control List) and quotas. We investigate the impact of using various Kerberos security flavors on the I/O rates of CMS applications on client nodes reading and writing data to the Lustre filesystem, and on LQCD benchmarks. The clients can be real or virtual nodes. We are investigating additional options for user authentication based on user certificates.

  5. Wide Area Measurement Based Security Assessment & Monitoring of Modern Power System: A Danish Power System Case Study

    DEFF Research Database (Denmark)

    Rather, Zakir Hussain; Chen, Zhe; Thøgersen, Paul

    2013-01-01

    Power System security has become a major concern across the global power system community. This paper presents wide area measurement system (WAMS) based security assessment and monitoring of modern power system. A new three dimensional security index (TDSI) has been proposed for online security...... monitoring of modern power system with large scale renewable energy penetration. Phasor measurement unit (PMU) based WAMS has been implemented in western Danish Power System to realize online security monitoring and assessment in power system control center. The proposed security monitoring system has been...

  6. Implementing Virtual Private Networking for Enabling Lower Cost, More Secure Wide Area Communications at Sandia National Laboratories; TOPICAL

    International Nuclear Information System (INIS)

    MILLER, MARC M.; YONEK JR., GEORGE A.

    2001-01-01

    Virtual Private Networking is a new communications technology that promises lower cost, more secure wide area communications by leveraging public networks such as the Internet. Sandia National Laboratories has embraced the technology for interconnecting remote sites to Sandia's corporate network, and for enabling remote access users for both dial-up and broadband access

  7. Collaborative 3D Target Tracking in Distributed Smart Camera Networks for Wide-Area Surveillance

    Directory of Open Access Journals (Sweden)

    Xenofon Koutsoukos

    2013-05-01

    Full Text Available With the evolution and fusion of wireless sensor network and embedded camera technologies, distributed smart camera networks have emerged as a new class of systems for wide-area surveillance applications. Wireless networks, however, introduce a number of constraints to the system that need to be considered, notably the communication bandwidth constraints. Existing approaches for target tracking using a camera network typically utilize target handover mechanisms between cameras, or combine results from 2D trackers in each camera into 3D target estimation. Such approaches suffer from scale selection, target rotation, and occlusion, drawbacks typically associated with 2D tracking. In this paper, we present an approach for tracking multiple targets directly in 3D space using a network of smart cameras. The approach employs multi-view histograms to characterize targets in 3D space using color and texture as the visual features. The visual features from each camera along with the target models are used in a probabilistic tracker to estimate the target state. We introduce four variations of our base tracker that incur different computational and communication costs on each node and result in different tracking accuracy. We demonstrate the effectiveness of our proposed trackers by comparing their performance to a 3D tracker that fuses the results of independent 2D trackers. We also present performance analysis of the base tracker along Quality-of-Service (QoS and Quality-of-Information (QoI metrics, and study QoS vs. QoI trade-offs between the proposed tracker variations. Finally, we demonstrate our tracker in a real-life scenario using a camera network deployed in a building.

  8. E-Center: A Collaborative Platform for Wide Area Network Users

    Science.gov (United States)

    Grigoriev, M.; DeMar, P.; Tierney, B.; Lake, A.; Metzger, J.; Frey, M.; Calyam, P.

    2012-12-01

    The E-Center is a social collaborative web-based platform for assisting network users in understanding network conditions across network paths of interest to them. It is designed to give a user the necessary tools to isolate, identify, and resolve network performance-related problems. E-Center provides network path information on a link-by-link level, as well as from an end-to-end perspective. In addition to providing current and recent network path data, E-Center is intended to provide a social media environment for them to share issues, ideas, concerns, and problems. The product has a modular design that accommodates integration of other network services that make use of the same network path and performance data.

  9. E-center: A collaborative platform for wide area network users

    Energy Technology Data Exchange (ETDEWEB)

    Grigoriev, M. [Fermilab; DeMar, P. [Fermilab; Tierney, B. [LBL, Berkeley; Lake, A. [LBL, Berkeley; Metzger, J. [LBL, Berkeley; Frey, M. [Bucknell U.; Calyam, P. [Ohio State U.

    2012-01-01

    The E-Center is a social collaborative web-based platform for assisting network users in understanding network conditions across network paths of interest to them. It is designed to give a user the necessary tools to isolate, identify, and resolve network performance-related problems. E-Center provides network path information on a link-by-link level, as well as from an end-to-end perspective. In addition to providing current and recent network path data, E-Center is intended to provide a social media environment for them to share issues, ideas, concerns, and problems. The product has a modular design that accommodates integration of other network services that make use of the same network path and performance data.

  10. E-Center: A Collaborative Platform for Wide Area Network Users

    International Nuclear Information System (INIS)

    Grigoriev, M; DeMar, P; Tierney, B; Lake, A; Metzger, J; Frey, M; Calyam, P

    2012-01-01

    The E-Center is a social collaborative web-based platform for assisting network users in understanding network conditions across network paths of interest to them. It is designed to give a user the necessary tools to isolate, identify, and resolve network performance-related problems. E-Center provides network path information on a link-by-link level, as well as from an end-to-end perspective. In addition to providing current and recent network path data, E-Center is intended to provide a social media environment for them to share issues, ideas, concerns, and problems. The product has a modular design that accommodates integration of other network services that make use of the same network path and performance data.

  11. Securing collaborative environments

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jackson, Keith [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  12. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.

    Science.gov (United States)

    Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran

    2014-07-01

    Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation's electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments.

  13. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment

    Science.gov (United States)

    Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran

    2013-01-01

    Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation’s electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments. PMID:25685516

  14. Security for ICT collaboration tools

    NARCIS (Netherlands)

    Broenink, E.G.; Kleinhuis, G.; Fransen, F.

    2010-01-01

    In order for collaboration tools to be productive in an operational setting, an information base that is shared across the collaborating parties is needed. Therefore, a lot of research is done for tooling to create such a common information base in a collaboration tool. However, security is often

  15. Security for ICT collaboration tools

    NARCIS (Netherlands)

    Broenink, E.G.; Kleinhuis, G.; Fransen, F.

    2011-01-01

    In order for collaboration tools to be productive in an operational setting, an information base that is shared across the collaborating parties is needed. Therefore, a lot of research is done for tooling to create such a common information base in a collaboration tool. However, security is often

  16. Wide area monitoring study

    International Nuclear Information System (INIS)

    Wogman, N.A.; Holdren, G.R. Jr.

    1999-01-01

    Environmental sampling can be used to complement the safeguarding of nuclear material, especially in the detection of undeclared nuclear activities. Routine monitoring of nuclear installations has provided valuable information about the fate of key signature materials within different environmental settings. The approach collates information regarding the generation of individual radiochemical signatures within different nuclear processes, the potential for release of these signatures to the environment and, the chemical form and mobility of the signatures in environmental media along which the material could migrate. Meteorological, geological and hydrological information is used to determine where to sample, what to sample, and how often to sample to provide the greatest likelihood for detection. Multiple strategies can be used to implement wide area monitoring for safeguards purposes. The most complex, and expensive of these, involves establishing extensive networks of fixed location sampling sites. The sites would be operated continuously, and would be instrumented with automated sampling, analysis, and communication equipment to relay information regarding potential anomalies to control centers in near-real time. Alternative strategies can be used to supplement fixed location monitoring equipment, especially in regions that cannot support (financially or logistically) the fixed stations. Through combinations of these various strategies, using a variety of environmental media to monitor a region, we believe that a competent network, one with a quantifiable probability for detecting undeclared nuclear activities, can be designed. While this approach cannot and should not replace other inspection and monitoring activities, it can potentially contribute valuable information to an international safeguards system. (author)

  17. Collaboration using roles. [in computer network security

    Science.gov (United States)

    Bishop, Matt

    1990-01-01

    Segregation of roles into alternative accounts is a model which provides not only the ability to collaborate but also enables accurate accounting of resources consumed by collaborative projects, protects the resources and objects of such a project, and does not introduce new security vulnerabilities. The implementation presented here does not require users to remember additional passwords and provides a very simple consistent interface.

  18. Operating a wide-area high-availability collaborative remote observing system for classically-scheduled observations at the W. M. Keck Observatory

    Science.gov (United States)

    Kibrick, Robert I.; Wirth, Gregory D.; Allen, Steven L.; Deich, William T. S.; Goodrich, Robert W.; Lanclos, Kyle; Lyke, James E.

    2011-03-01

    For over a decade, the W. M. Keck Observatory's two 10-meter telescopes have been operated remotely from its Waimea headquarters. Over the last 9 years, WMKO remote observing has expanded to allow observing teams at dedicated sites located across California to observe via the Internet either in collaboration with colleagues in Waimea or entirely from California; this capability was extended to Swinburne University in Melbourne, Australia in 2010 and to Yale University in New Haven, Connecticut in early 2011. All Keck facility science instruments are currently supported. Observers distributed between as many as four sites can collaborate in the interactive operation of each instrument by means of shared VNC desktops and multipoint video and/or telephone conferencing. Automated routers at primary remote observing sites ensure continued connectivity during Internet outages. Each Keck remote observing facility is similarly equipped and configured so observers have the same operating environment. This architecture provides observers the flexibility to conduct observations from the location best suited to their needs and to adapt to last-minute changes. It also enhances the ability of off-site technical staff to provide remote support.

  19. Collaborating toward improving food security in Nunavut.

    Science.gov (United States)

    Wakegijig, Jennifer; Osborne, Geraldine; Statham, Sara; Issaluk, Michelle Doucette

    2013-01-01

    Community members, Aboriginal organizations, public servants and academics have long been describing a desperate situation of food insecurity in the Eastern Canadian Arctic. The Nunavut Food Security Coalition, a partnership of Inuit Organizations and the Government of Nunavut, is collaborating to develop a territorial food security strategy to address pervasive food insecurity in the context of poverty reduction. The Nunavut Food Security Coalition has carried out this work using a community consultation model. The research was collected through community visits, stakeholder consultation and member checking at the Nunavut Food Security Symposium. In this paper, we describe a continuous course of action, based on community engagement and collective action, that has led to sustained political interest in and public mobilization around the issue of food insecurity in Nunavut. The process described in this article is a unique collaboration between multiple organizations that has led to the development of a sustainable partnership that will inform policy development while representing the voice of Nunavummiut.

  20. Collaboration with East African security organisations

    DEFF Research Database (Denmark)

    Nordby, Johannes Riber; Jacobsen, Katja L.

    2012-01-01

    of the concept. At the same time the three organisations represent different constellations of member nations and thus different national interests, and locally they have different legitimacy and political strength. Thus, when choosing collaboration partners for a security project it is not simply a question......When it comes to understanding the concept of security and the way fragile security situations should be solved, the difference is big. While EASF – the East African Standby Force – is a regular military force with a rather traditional, military perception of the concept of security, EAC (East...... African Community) and IGAD (Intergovernmental Authority on Development) have broader perceptions of the concept. According to EAC, security also concerns matters such as policy reform, legislation, education and infrastructure. IGAD considers food security and environmental and economic issues as part...

  1. Secure Environments for Collaboration among Ubiquitous Roaming Entities

    DEFF Research Database (Denmark)

    Jensen, Christian D.

    2002-01-01

    SECURE is a newly started IST project, which addresses secure collaboration among computational entities in emerging global computing systems. The properties of these systems introduce new security challenges that are not adequately addressed by existing security models and mechanisms. The scale ...... and uncertainty of this global computing environment invalidates existing security models. Instead, new security models have to be developed along with new security mechanisms that control access to protected resources.......SECURE is a newly started IST project, which addresses secure collaboration among computational entities in emerging global computing systems. The properties of these systems introduce new security challenges that are not adequately addressed by existing security models and mechanisms. The scale...

  2. Collaborating toward improving food security in Nunavut

    Directory of Open Access Journals (Sweden)

    Jennifer Wakegijig

    2013-08-01

    Full Text Available Background. Community members, Aboriginal organizations, public servants and academics have long been describing a desperate situation of food insecurity in the Eastern Canadian Arctic. Objective. The Nunavut Food Security Coalition, a partnership of Inuit Organizations and the Government of Nunavut, is collaborating to develop a territorial food security strategy to address pervasive food insecurity in the context of poverty reduction. Design. The Nunavut Food Security Coalition has carried out this work using a community consultation model. The research was collected through community visits, stakeholder consultation and member checking at the Nunavut Food Security Symposium. Results. In this paper, we describe a continuous course of action, based on community engagement and collective action, that has led to sustained political interest in and public mobilization around the issue of food insecurity in Nunavut. Conclusions. The process described in this article is a unique collaboration between multiple organizations that has led to the development of a sustainable partnership that will inform policy development while representing the voice of Nunavummiut.

  3. Using Trust for Secure Collaboration in Uncertain Environments

    DEFF Research Database (Denmark)

    Cahill, Vinny; Gray, Elizabeth; Seigneur, Jean-Marc

    2003-01-01

    The SECURE project investigates the design of security mechanisms for pervasive computing based on trust. It addresses how entities in unfamiliar pervasive computing environments can overcome initial suspicion to provide secure collaboration.......The SECURE project investigates the design of security mechanisms for pervasive computing based on trust. It addresses how entities in unfamiliar pervasive computing environments can overcome initial suspicion to provide secure collaboration....

  4. Collaborative trust evaluation for wiki security

    DEFF Research Database (Denmark)

    Lindberg, Kasper; Jensen, Christian D.

    2012-01-01

    Wiki systems form a subclass of the more general Open Collaborative Authoring Systems, where content is created and maintained by a user community. The ability of anyone to edit the content is, at the same time, their strength and their weakness. Anyone can write documents that improve the value...... of the wiki-system, but at the same time, anyone can also introduce errors into these documents, by accident or on purpose. A security model for wiki-style authoring systems has previously been proposed. This model is based on both static and dynamic document access controls that enforce a simple integrity......, but this is true for all soft security systems. We show that the system parameters can be tuned so that the amount of work required by malicious and colluding users to reach this level is well beyond most attackers' capabilities....

  5. Wide area continuous offender monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Hoshen, J. [Lucent Technologies (United States); Drake, G. [New Mexico Dept. of Corrections, Santa Fe, NM (United States); Spencer, D. [Sandia National Labs., Albuquerque, NM (United States)

    1996-11-01

    The corrections system in the U.S. is supervising over five million offenders. This number is rising fast and so are the direct and indirect costs to society. To improve supervision and reduce the cost of parole and probation, first generation home arrest systems were introduced in 1987. While these systems proved to be helpful to the corrections system, their scope is rather limited because they only cover an offender at a single location and provide only a partial time coverage. To correct the limitations of first-generation systems, second-generation wide area continuous electronic offender monitoring systems, designed to monitor the offender at all times and locations, are now on the drawing board. These systems use radio frequency location technology to track the position of offenders. The challenge for this technology is the development of reliable personal locator devices that are small, lightweight, with long operational battery life, and indoors/outdoors accuracy of 100 meters or less. At the center of a second-generation system is a database that specifies the offender`s home, workplace, commute, and time the offender should be found in each. The database could also define areas from which the offender is excluded. To test compliance, the system would compare the observed coordinates of the offender with the stored location for a given time interval. Database logfiles will also enable law enforcement to determine if a monitored offender was present at a crime scene and thus include or exclude the offender as a potential suspect.

  6. Information-Pooling Bias in Collaborative Security Incident Correlation Analysis.

    Science.gov (United States)

    Rajivan, Prashanth; Cooke, Nancy J

    2018-03-01

    Incident correlation is a vital step in the cybersecurity threat detection process. This article presents research on the effect of group-level information-pooling bias on collaborative incident correlation analysis in a synthetic task environment. Past research has shown that uneven information distribution biases people to share information that is known to most team members and prevents them from sharing any unique information available with them. The effect of such biases on security team collaborations are largely unknown. Thirty 3-person teams performed two threat detection missions involving information sharing and correlating security incidents. Incidents were predistributed to each person in the team based on the hidden profile paradigm. Participant teams, randomly assigned to three experimental groups, used different collaboration aids during Mission 2. Communication analysis revealed that participant teams were 3 times more likely to discuss security incidents commonly known to the majority. Unaided team collaboration was inefficient in finding associations between security incidents uniquely available to each member of the team. Visualizations that augment perceptual processing and recognition memory were found to mitigate the bias. The data suggest that (a) security analyst teams, when conducting collaborative correlation analysis, could be inefficient in pooling unique information from their peers; (b) employing off-the-shelf collaboration tools in cybersecurity defense environments is inadequate; and (c) collaborative security visualization tools developed considering the human cognitive limitations of security analysts is necessary. Potential applications of this research include development of team training procedures and collaboration tool development for security analysts.

  7. COLLABORATIVE NETWORK SECURITY MANAGEMENT SYSTEM BASED ON ASSOCIATION MINING RULE

    Directory of Open Access Journals (Sweden)

    Nisha Mariam Varughese

    2014-07-01

    Full Text Available Security is one of the major challenges in open network. There are so many types of attacks which follow fixed patterns or frequently change their patterns. It is difficult to find the malicious attack which does not have any fixed patterns. The Distributed Denial of Service (DDoS attacks like Botnets are used to slow down the system performance. To address such problems Collaborative Network Security Management System (CNSMS is proposed along with the association mining rule. CNSMS system is consists of collaborative Unified Threat Management (UTM, cloud based security centre and traffic prober. The traffic prober captures the internet traffic and given to the collaborative UTM. Traffic is analysed by the Collaborative UTM, to determine whether it contains any malicious attack or not. If any security event occurs, it will reports to the cloud based security centre. The security centre generates security rules based on association mining rule and distributes to the network. The cloud based security centre is used to store the huge amount of tragic, their logs and the security rule generated. The feedback is evaluated and the invalid rules are eliminated to improve the system efficiency.

  8. Security and robustness for collaborative monitors

    NARCIS (Netherlands)

    Testerink, Bas; Bulling, Nils; Dastani, Mehdi

    2016-01-01

    Decentralized monitors can be subject to robustness and security risks. Robustness risks include attacks on the monitor’s infrastructure in order to disable parts of its functionality. Security risks include attacks that try to extract information from the monitor and thereby possibly leak sensitive

  9. A new data collaboration service based on cloud computing security

    Science.gov (United States)

    Ying, Ren; Li, Hua-Wei; Wang, Li na

    2017-09-01

    With the rapid development of cloud computing, the storage and usage of data have undergone revolutionary changes. Data owners can store data in the cloud. While bringing convenience, it also brings many new challenges to cloud data security. A key issue is how to support a secure data collaboration service that supports access and updates to cloud data. This paper proposes a secure, efficient and extensible data collaboration service, which prevents data leaks in cloud storage, supports one to many encryption mechanisms, and also enables cloud data writing and fine-grained access control.

  10. Security Aspects of Computer Supported Collaborative Work

    Science.gov (United States)

    1993-09-01

    unstructured tasks at one end 11 and prescriptive tasks at the other. Unstructured tasks are those requiring creative input from a number of users and...collaborative technology begun to mature, it has begun to outstrip prevailing management attitudes. One barrier to telecommuting is the perception that

  11. Wireless Wide Area Networks for School Districts.

    Science.gov (United States)

    Nair, Prakash

    This paper considers a basic question that many schools districts face in attempting to develop affordable, expandable district-wide computer networks that are resistant to obsolescence: Should these wide area networks (WANs) employ wireless technology, stick to venerable hard-wired solutions, or combine both. This publication explores the…

  12. Obstacle of Team Teaching and Collaborative Learning in Information Security

    Directory of Open Access Journals (Sweden)

    Marn-Ling Shing

    2007-10-01

    Full Text Available The field of information security includes diverse contents such as network security and computer forensics which are highly technical-oriented topics. In addition, information forensic requires the background of criminology. The information security also includes non-technical content such as information ethics and security laws. Because the diverse nature of information security, Shing et al. has proposed the use of team teaching and collaborative learning for the information security classes. Although team teaching seems to be efficient in information security, practically it needs a few challenges. The Purdue's case mentioned in Shing's paper has funding support of National Security Agency (NSA. However, a vast amount of resources may not be available for an instructor in a normal university. In addition, many obstacles are related to the administration problems. For example, how are the teaching evaluations computed if there are multiple instructors for a single course? How will instructors in a computer forensics class prepare students (criminal justice majors and information technology majors before taking the same class with diverse background? The paper surveyed approximately 25 students in a university in Virginia concerning the satisfaction of team-teaching. Finally, this paper describes ways to meet those challenges.

  13. Wide-area situation awareness in electric power grid

    Science.gov (United States)

    Greitzer, Frank L.

    2010-04-01

    Two primary elements of the US energy policy are demand management and efficiency and renewable sources. Major objectives are clean energy transmission and integration, reliable energy transmission, and grid cyber security. Development of the Smart Grid seeks to achieve these goals by lowering energy costs for consumers, achieving energy independence and reducing greenhouse gas emissions. The Smart Grid is expected to enable real time wide-area situation awareness (SA) for operators. Requirements for wide-area SA have been identified among interoperability standards proposed by the Federal Energy Regulatory Commission and the National Institute of Standards and Technology to ensure smart-grid functionality. Wide-area SA and enhanced decision support and visualization tools are key elements in the transformation to the Smart Grid. This paper discusses human factors research to promote SA in the electric power grid and the Smart Grid. Topics that will be discussed include the role of human factors in meeting US energy policy goals, the impact and challenges for Smart Grid development, and cyber security challenges.

  14. LHCNet: Wide Area Networking and Collaborative Systems for HEP

    International Nuclear Information System (INIS)

    Newman, H.B.

    2007-01-01

    This proposal presents the status and progress in 2006-7, and the technical and financial plans for 2008-2010 for the US LHCNet transatlantic network supporting U.S. participation in the LHC physics program. US LHCNet provides transatlantic connections of the Tier1 computing facilities at Fermilab and Brookhaven with the Tier0 and Tier1 facilities at CERN as well as Tier1s elsewhere in Europe and Asia. Together with ESnet, Internet2, the GEANT pan-European network, and NSF's UltraLight project, US LHCNet also supports connections between the Tier2 centers (where most of the analysis of the data will take place, starting this year) and the Tier1s as needed.See report

  15. LHCNet: Wide Area Networking and Collaborative Systems for HEP

    Energy Technology Data Exchange (ETDEWEB)

    Newman, H.B,

    2007-08-20

    This proposal presents the status and progress in 2006-7, and the technical and financial plans for 2008-2010 for the US LHCNet transatlantic network supporting U.S. participation in the LHC physics program. US LHCNet provides transatlantic connections of the Tier1 computing facilities at Fermilab and Brookhaven with the Tier0 and Tier1 facilities at CERN as well as Tier1s elsewhere in Europe and Asia. Together with ESnet, Internet2, the GEANT pan-European network, and NSF’s UltraLight project, US LHCNet also supports connections between the Tier2 centers (where most of the analysis of the data will take place, starting this year) and the Tier1s as needed.See report

  16. Traffic Flow Wide-Area Surveillance system

    Energy Technology Data Exchange (ETDEWEB)

    Allgood, G.O.; Ferrell, R.K.; Kercel, S.W.; Abston, R.A.

    1994-09-01

    Traffic management can be thought of as a stochastic queuing process where the serving time at one of its control points is dynamically linked to the global traffic pattern, which is, in turn, dynamically linked to the control point. For this closed-loop system to be effective, the traffic management system must sense and interpret a large spatial projection of data originating from multiple sensor suites. This concept is the basis for the development of a Traffic Flow Wide-Area Surveillance (TFWAS) system. This paper presents the results of a study by Oak Ridge National Laboratory to define the operational specifications and characteristics, to determine the constraints, and to examine the state of technology of a TFWAS system in terms of traffic management and control. In doing so, the functions and attributes of a TFWAS system are mapped into an operational structure consistent with the Intelligent Vehicle Highway System (IVHS) concept and the existing highway infrastructure. This mapping includes identifying candidate sensor suites and establishing criteria, requirements, and performance measures by which these systems can be graded in their ability and practicality to meet the operational requirements of a TFWAS system. In light of this, issues such as system integration, applicable technologies, impact on traffic management and control, and public acceptance are addressed.

  17. Traffic flow wide-area surveillance system

    Science.gov (United States)

    Allgood, Glenn O.; Ferrell, Regina K.; Kercel, Stephen W.; Abston, Ruth A.

    1995-01-01

    Traffic management can be thought of as a stochastic queuing process where the serving time at one of its control points is dynamically linked to the global traffic pattern, which is, in turn, dynamically linked to the control point. For this closed-loop system to be effective, the traffic management system must sense and interpret a large spatial projection of data originating from multiple sensor suites. This concept is the basis for the development of a traffic flow wide-area surveillance (TFWAS) system. This paper presents the results of a study by Oak Ridge National Laboratory to define the operational specifications and characteristics, to determine the constraints, and to examine the state of technology of a TFWAS system in terms of traffic management and control. In doing so, the functions and attributes of a TFWAS system are mapped into an operational structure consistent with the Intelligent Vehicle Highway System (IVHS) concept and the existing highway infrastructure. This mapping includes identifying candidate sensor suites and establishing criteria, requirements, and performance measures by which these systems can be graded in their ability and practicality to meet the operational requirements of a TFWAS system. In light of this, issues such as system integration, applicable technologies, impact on traffic management and control, and public acceptance are addressed.

  18. Security in Distributed Collaborative Environments: Limitations and Solutions

    Science.gov (United States)

    Saadi, Rachid; Pierson, Jean-Marc; Brunie, Lionel

    The main goal of establishing collaboration between heterogeneous environment is to create such as Pervasive context which provide nomadic users with ubiquitous access to digital information and surrounding resources. However, the constraints of mobility and heterogeneity arise a number of crucial issues related to security, especially authentication access control and privacy. First of all, in this chapter we explore the trust paradigm, specially the transitive capability to enable a trust peer to peer collaboration. In this manner, when each organization sets its own security policy to recognize (authenticate) users members of a trusted community and provide them a local access (access control), the trust transitivity between peers will allows users to gain a broad, larger and controlled access inside the pervasive environment. Next, we study the problem of user's privacy. In fact in pervasive and ubiquitous environments, nomadic users gather and exchange certificates or credential which providing them rights to access by transitivity unknown and trusted environments. These signed documents embeds increasing number of attribute that require to be filtered according to such contextual situation. In this chapter, we propose a new morph signature enabling each certificate owner to preserve his privacy by discloses or blinds some sensitive attributes according to faced situation.

  19. Combined Arms Maneuver, Wide Area Security, and Dynamic Capabilities

    Science.gov (United States)

    2012-03-21

    Operation (COIN) had its origins in field manuals (FM’s), like FM 31-20, Operations against Guerrilla Forces (1951). The Army revised its doctrinal...work were the publication of a new counterinsurgency doctrinal manual , in December of 2006. Most of the work on this manual did not occur until 2005...October 2, 2007, http://www.washingtonpost.com/wp.dyn/content/article/2007/10/01/ ar2007100101760. htp (accessed January 15, 2012). 53 U.S

  20. Simulation studies of a wide area health care network.

    Science.gov (United States)

    McDaniel, J. G.

    1994-01-01

    There is an increasing number of efforts to install wide area health care networks. Some of these networks are being built to support several applications over a wide user base consisting primarily of medical practices, hospitals, pharmacies, medical laboratories, payors, and suppliers. Although on-line, multi-media telecommunication is desirable for some purposes such as cardiac monitoring, store-and-forward messaging is adequate for many common, high-volume applications. Laboratory test results and payment claims, for example, can be distributed using electronic messaging networks. Several network prototypes have been constructed to determine the technical problems and to assess the effectiveness of electronic messaging in wide area health care networks. Our project, Health Link, developed prototype software that was able to use the public switched telephone network to exchange messages automatically, reliably and securely. The network could be configured to accommodate the many different traffic patterns and cost constraints of its users. Discrete event simulations were performed on several network models. Canonical star and mesh networks, that were composed of nodes operating at steady state under equal loads, were modeled. Both topologies were found to support the throughput of a generic wide area health care network. The mean message delivery time of the mesh network was found to be less than that of the star network. Further simulations were conducted for a realistic large-scale health care network consisting of 1,553 doctors, 26 hospitals, four medical labs, one provincial lab and one insurer. Two network topologies were investigated: one using predominantly peer-to-peer communication, the other using client-server communication.(ABSTRACT TRUNCATED AT 250 WORDS) PMID:7949966

  1. Real Time Wide Area Radiation Surveillance System

    Science.gov (United States)

    Biafore, M.

    2012-04-01

    We present the REWARD project, financed within the FP7 programme, theme SEC-2011.1.5-1 (Development of detection capabilities of difficult to detect radioactive sources and nuclear materials - Capability Project). Within this project, we propose a novel mobile system for real time, wide area radiation surveillance. The system is based on the integration of new miniaturized solid-state radiation sensors: a CdZnTe detector for gamma radiation and a high efficiency neutron detector based on novel silicon technologies. The sensing unit will include a wireless communication interface to send the data remotely to a monitoring base station which also uses a GPS system to calculate the position of the tag. The system will also incorporate middleware and high level software to provide web-service interfaces for the exchange of information, and that will offer top level functionalities as management of users, mobile tags and environment data and alarms, database storage and management and a web-based graphical user interface. Effort will be spent to ensure that the software is modular and re-usable across as many architectural levels as possible. Finally, an expert system will continuously analyze the information from the radiation sensor and correlate it with historical data from the tag location in order to generate an alarm when an abnormal situation is detected. The system will be useful for many different scenarios, including such lost radioactive sources and radioactive contamination. It will be possible to deploy in emergency units and in general in any type of mobile or static equipment. The sensing units will be highly portable thanks to their low size and low energy consumption. The complete system will be scalable in terms of complexity and cost and will offer very high precision on both the measurement and the location of the radiation. The modularity and flexibility of the system will allow for a realistic introduction to the market. Authorities may start with a

  2. Securing Resources in Collaborative Environments: A Peer-to-peerApproach

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo; Essiari, Abdelilah; Thompson, Mary R.

    2005-09-19

    We have developed a security model that facilitates control of resources by autonomous peers who act on behalf of collaborating users. This model allows a gradual build-up of trust. It enables secure interactions among users that do not necessarily know each other and allows them to build trust over the course of their collaboration. This paper describes various aspects of our security model and describes an architecture that implements this model to provide security in pure peer-to-peer environments.

  3. Secure environment for real-time tele-collaboration on virtual simulation of radiation treatment planning.

    Science.gov (United States)

    Ntasis, Efthymios; Maniatis, Theofanis A; Nikita, Konstantina S

    2003-01-01

    A secure framework is described for real-time tele-collaboration on Virtual Simulation procedure of Radiation Treatment Planning. An integrated approach is followed clustering the security issues faced by the system into organizational issues, security issues over the LAN and security issues over the LAN-to-LAN connection. The design and the implementation of the security services are performed according to the identified security requirements, along with the need for real time communication between the collaborating health care professionals. A detailed description of the implementation is given, presenting a solution, which can directly be tailored to other tele-collaboration services in the field of health care. The pilot study of the proposed security components proves the feasibility of the secure environment, and the consistency with the high performance demands of the application.

  4. Interim Consequence Management Guidance for a Wide-Area Biological Attack

    Energy Technology Data Exchange (ETDEWEB)

    Raber, Ellen [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Kirvel, Robert [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); MacQueen, Don [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Love, Adam [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Dombroski, Matthew [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); McGrann, Thomas [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Richards, John [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Melius, Carl [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Bunt, Thomas [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hibbard, Wilthea [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Greenwalt, Robert [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Miles, Robin [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Dillon, Michael [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Mancieri, Sav [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Harris, Steve [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Michalik, Richard [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Wheeler, Richard [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hoppes, Bill [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Tucker, Mark [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Krauter, Paula [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Knowlton, Robert [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Yang, Lynn [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Franco, Dave [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Einfeld, Wayne [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Brockman, John [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Betty, Rita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2011-05-17

    The Interagency Biological Restoration Demonstration (IBRD) program is a collaborative, interagency effort co-chaired by the Department of Homeland Security and Department of Defense aimed at improving the nation‘s ability to respond to and recover from a large-scale, wide-area, domestic attack involving the release of an environmentally persistent biological warfare agent. The program is focused on understanding interactions between the civilian and military sectors, and in building mutual support to carry out such remediations. This Interim Consequence Management Guidance document provides guidance for decisionmakers in executing activities required to respond to and recover from a biological incident affecting a wide urban area insofar as information is currently available. The spore-forming bacterium Bacillus anthracis is discussed as the biological agent of primary concern because it is the most difficult of known bioterrorism agents to inactivate and is considered to be one of the key threat agents. Most other biological threat agents are much easier to remediate, and in many cases, inactivation would occur naturally within days as a result of environmental exposure; however, the framework and operational questions that need to be addressed are expected to remain the same. The guidance in this document is applicable to (1) enclosed facilities, such as commercial, residential, and continental U.S. military facilities; (2) semi-enclosed facilities, such as subways and public transit facilities; (3) outdoor areas (both localized and wide area), such as building exteriors, streets, parks, and other open spaces; (4) drinking water facilities; and (5) drinking water sources. This document follows an interagency framework [Planning Guidance for Recovery Following Biological Incidents (DHS and EPA 2009)]—which considered Raber et al. (2002) in its development—but takes the framework to a more operational level and provides guidance at key action and decision

  5. Summary of the Seattle Urban Area Consequence Management Guidance for a Wide-Area Biological Attack

    Energy Technology Data Exchange (ETDEWEB)

    Kirvel, R

    2010-09-13

    A terrorist attack involving a release of biological warfare agent in the Seattle urban area would require decision-makers to make a host of important, and sometimes untested, choices concerning how best to respond and recover. This technical supplement supports the Puget Sound Regional Biological Attack Recovery Plan Annex to the Regional Catastrophic Plan, which structures the region’s response and recovery approach, by providing technical details on how to conduct a biological remediation. More specifically, the technical supplement identifies the principal issues that must be addressed following a wide-area release of aerosolized Bacillus anthracis (B. anthracis) spores; explains the resources that are available to address the release; sets forth strategies to reduce the time required for consequence management; and focuses on remediation options, procedures, and tools that can be implemented today should such an incident occur. The content is intended to be used with the Interim Consequence Management Guidance for a Wide-Area Biological Attack (LLNL 2009). A second and related purpose of this technical supplement is to serve as a detailed guide for other geographical regions interested in formulating their own consequence management plans. This technical supplement is funded by, and was developed as part of, the Interagency Biological Restoration Demonstration (IBRD) program—a collaborative effort among Department of Homeland Security, Department of Defense, and numerous other Federal, state, and local agencies—to improve the nation’s ability to respond to and recover from a wide-area biological incident. Content of the technical supplement follows the six-phase diagram for responding to and recovering from a biological contamination incident (see Figure 1 on the next page), which represents a consensus scheme developed after multi-agency review and approval. Whereas the focus of the document is on remediation/cleanup activities, the topics of response

  6. Supporting multi-state collaboration on privacy and security to foster health IT and health information exchange.

    Science.gov (United States)

    Banger, Alison K; Alakoye, Amoke O; Rizk, Stephanie C

    2008-11-06

    As part of the HHS funded contract, Health Information Security and Privacy Collaboration, 41 states and territories have proposed collaborative projects to address cross-state privacy and security challenges related to health IT and health information exchange. Multi-state collaboration on privacy and security issues remains complicated, and resources to support collaboration around these topics are essential to the success of such collaboration. The resources outlined here offer an example of how to support multi-stakeholder, multi-state projects.

  7. SW-platform for R&D in Applications of Synchrophasor Measurements for Wide-Area Assessment, Control and Visualization in Real-Time

    DEFF Research Database (Denmark)

    Jóhannsson, Hjörtur; Morais, Hugo; Pedersen, Allan Henning Birger

    2014-01-01

    The Danish research project “Secure Operation of Sustainable Power Systems (SOSPO)” is currently being conducted in a collaboration by a group of partners from academia and industry. The focus of the project is on how to achieve secure operation of the power grid as large scale thermal power plants......, supplied by fossil fuel, are phased out in favor of non - controllable renewable energy sources like wind and solar energy. In particular, the SOSPO project aims to develop real - time stability and security assessment methods as well as wide - area control methods to re - establish stable and secure...... realistic conditions, the future system scenarios are represented in a real time grid simulator that is an integrated part of the platform. The SW - platform provides structured access to any model parameter as well as access to real - time phasor measurement unit (PMU) and remote terminal unit (RTU...

  8. Development of wide area environment accelerator operation and diagnostics method

    Science.gov (United States)

    Uchiyama, Akito; Furukawa, Kazuro

    2015-08-01

    Remote operation and diagnostic systems for particle accelerators have been developed for beam operation and maintenance in various situations. Even though fully remote experiments are not necessary, the remote diagnosis and maintenance of the accelerator is required. Considering remote-operation operator interfaces (OPIs), the use of standard protocols such as the hypertext transfer protocol (HTTP) is advantageous, because system-dependent protocols are unnecessary between the remote client and the on-site server. Here, we have developed a client system based on WebSocket, which is a new protocol provided by the Internet Engineering Task Force for Web-based systems, as a next-generation Web-based OPI using the Experimental Physics and Industrial Control System Channel Access protocol. As a result of this implementation, WebSocket-based client systems have become available for remote operation. Also, as regards practical application, the remote operation of an accelerator via a wide area network (WAN) faces a number of challenges, e.g., the accelerator has both experimental device and radiation generator characteristics. Any error in remote control system operation could result in an immediate breakdown. Therefore, we propose the implementation of an operator intervention system for remote accelerator diagnostics and support that can obviate any differences between the local control room and remote locations. Here, remote-operation Web-based OPIs, which resolve security issues, are developed.

  9. Development of wide area environment accelerator operation and diagnostics method

    Directory of Open Access Journals (Sweden)

    Akito Uchiyama

    2015-08-01

    Full Text Available Remote operation and diagnostic systems for particle accelerators have been developed for beam operation and maintenance in various situations. Even though fully remote experiments are not necessary, the remote diagnosis and maintenance of the accelerator is required. Considering remote-operation operator interfaces (OPIs, the use of standard protocols such as the hypertext transfer protocol (HTTP is advantageous, because system-dependent protocols are unnecessary between the remote client and the on-site server. Here, we have developed a client system based on WebSocket, which is a new protocol provided by the Internet Engineering Task Force for Web-based systems, as a next-generation Web-based OPI using the Experimental Physics and Industrial Control System Channel Access protocol. As a result of this implementation, WebSocket-based client systems have become available for remote operation. Also, as regards practical application, the remote operation of an accelerator via a wide area network (WAN faces a number of challenges, e.g., the accelerator has both experimental device and radiation generator characteristics. Any error in remote control system operation could result in an immediate breakdown. Therefore, we propose the implementation of an operator intervention system for remote accelerator diagnostics and support that can obviate any differences between the local control room and remote locations. Here, remote-operation Web-based OPIs, which resolve security issues, are developed.

  10. The NILE system architecture: fault-tolerant, wide-area access to computing and data resources

    International Nuclear Information System (INIS)

    Ricciardi, Aleta; Ogg, Michael; Rothfus, Eric

    1996-01-01

    NILE is a multi-disciplinary project building a distributed computing environment for HEP. It provides wide-area, fault-tolerant, integrated access to processing and data resources for collaborators of the CLEO experiment, though the goals and principles are applicable to many domains. NILE has three main objectives: a realistic distributed system architecture design, the design of a robust data model, and a Fast-Track implementation providing a prototype design environment which will also be used by CLEO physicists. This paper focuses on the software and wide-area system architecture design and the computing issues involved in making NILE services highly-available. (author)

  11. Shopping For Danger: E-commerce techniques applied to collaboration in cyber security

    Energy Technology Data Exchange (ETDEWEB)

    Bruce, Joseph R.; Fink, Glenn A.

    2012-05-24

    Collaboration among cyber security analysts is essential to a successful protection strategy on the Internet today, but it is uncommonly practiced or encouraged in operating environments. Barriers to productive collaboration often include data sensitivity, time and effort to communicate, institutional policy, and protection of domain knowledge. We propose an ambient collaboration framework, Vulcan, designed to remove the barriers of time and effort and mitigate the others. Vulcan automated data collection, collaborative filtering, and asynchronous dissemination, eliminating the effort implied by explicit collaboration among peers. We instrumented two analytic applications and performed a mock analysis session to build a dataset and test the output of the system.

  12. Security and Robustness issues in Collaborative Runtime Verification

    NARCIS (Netherlands)

    Testerink, B.J.G.; Bulling, N.; Dastani, M.M.

    2015-01-01

    Decentralized monitors can have robustness and security risks. Among robustness risks are attacks on the monitor's infrastructure in or- der to disable parts of its functionality. Among security risks are attacks that try to extract information from the monitor, and thereby possibly leak sensitive

  13. Seattle wide-area information for travelers (SWIFT) : architecture study

    Science.gov (United States)

    1998-10-19

    The SWIFT (Seattle Wide-area Information For Travelers) Field Operational Test was intended to evaluate the performance of a large-scale urban Advanced Traveler Information System (ATIS) deployment in the Seattle area. The unique features of the SWIF...

  14. The Impact of Visibility on Teamwork, Collaborative Communication, and Security in Emergency Departments: An Exploratory Study.

    Science.gov (United States)

    Gharaveis, Arsalan; Hamilton, D Kirk; Pati, Debajyoti; Shepley, Mardelle

    2017-01-01

    The aim of this study was to examine the influence of visibility on teamwork, collaborative communication, and security issues in emergency departments (EDs). This research explored whether with high visibility in EDs, teamwork and collaborative communication can be improved while the security issues will be reduced. Visibility has been regarded as a critical design consideration and can be directly and considerably impacted by ED's physical design. Teamwork is one of the major related operational outcomes of visibility and involves nurses, support staff, and physicians. The collaborative communication in an ED is another important factor in the process of care delivery and affects efficiency and safety. Furthermore, security is a behavioral factor in ED designs, which includes all types of safety including staff safety, patient safety, and the safety of visitors and family members. This qualitative study investigated the impact of visibility on teamwork, collaborative communication, and security issues in the ED. One-on-one interviews and on-site observation sessions were conducted in a community hospital. Corresponding data analysis was implemented by using computer plan analysis, observation and interview content, and theme analyses. The findings of this exploratory study provided a framework to identify visibility as an influential factor in ED design. High levels of visibility impact productivity and efficiency of teamwork and communication and improve the chance of lowering security issues. The findings of this study also contribute to the general body of knowledge about the effect of physical design on teamwork, collaborative communication, and security.

  15. Collaborative Policy Making: Vertical Integration in The Homeland Security Enterprise

    Science.gov (United States)

    2011-12-01

    national security and the interagency process ( Marcella , 2010). All these documents reviewed focused mainly on national security and overseas...administration, they were considered “the heart and soul of the process” ( Marcella , 2010). While subtle differences exist across administrations, the IPC...and build consensus across the government for action ( Marcella , 2010). During the second term of the Bush administration and during the first years

  16. Homeland Security Collaboration: Catch Phrase or Preeminent Organizational Construct?

    Science.gov (United States)

    2009-09-01

    me and helped me sustain my drive. In particular, I would like to thank Chief Phil Ruscetti, Deputy Fire Commissioner Gene Ryan, and Lieutenant Bill...that are selfish , the community well-being became a driving force to collaborate. Beginning in 1965 with the Texas Regional Planning Act,197...military, and the fire service. Deputy Commissioner Gene Ryan of the Chicago Fire Department was searching for a management tool to bring these

  17. Trust Evolution Policies for Security in Collaborative Ad Hoc Applications

    DEFF Research Database (Denmark)

    Gray, Elizabeth; Jensen, Christian D.; Connell, Paul O

    2006-01-01

    The vision of pervasive computing has introduced the notion of a vast, networked infrastructure of heterogeneous entities interact through collaborative applications, e.g., playing a multi-player online game on the way to work. This will require interactions between users who may be marginally...... admission policies in a manner similar to what would be expected from human trust assessment. This indicates that trust evolution policies can replace explicit human intervention in application scenarios that are similar to the evaluated prototype....

  18. Image-based electronic patient records for secured collaborative medical applications.

    Science.gov (United States)

    Zhang, Jianguo; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen; Yao, Yihong; Cai, Weihua; Jin, Jin; Zhang, Guozhen; Sun, Kun

    2005-01-01

    We developed a Web-based system to interactively display image-based electronic patient records (EPR) for secured intranet and Internet collaborative medical applications. The system consists of four major components: EPR DICOM gateway (EPR-GW), Image-based EPR repository server (EPR-Server), Web Server and EPR DICOM viewer (EPR-Viewer). In the EPR-GW and EPR-Viewer, the security modules of Digital Signature and Authentication are integrated to perform the security processing on the EPR data with integrity and authenticity. The privacy of EPR in data communication and exchanging is provided by SSL/TLS-based secure communication. This presentation gave a new approach to create and manage image-based EPR from actual patient records, and also presented a way to use Web technology and DICOM standard to build an open architecture for collaborative medical applications.

  19. An Architecture for a Wide Area Distributed System

    NARCIS (Netherlands)

    Homburg, P.; Steen, M.R. van; Tanenbaum, A.S.

    1996-01-01

    Distributed systems provide sharing of resources and information over a computer network. A key design issue that makes these systems attractive is that all aspects related to distribution are transparent to users. Unfortunately, general-purpose wide area distributed systems that allow users to

  20. The Evolving Wide Area Network Infrastructure in the LHC era

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The global network is more than ever taking its role as the great "enabler" for many branches of science and research. Foremost amongst such science drivers is of course the LHC/LCG programme, although there are several other sectors with growing demands of the network. Common to all of these is the realisation that a straightforward over provisioned best efforts wide area IP service is probably not enough for the future. This talk will summarise the needs of several science sectors, and the advances being made to exploit the current best efforts infrastructure. It will then describe current projects aimed as provisioning "better than best efforts" services (such bandwidth on demand), the global optical R&D testbeds and the strategy of the research network providers to move towards hybrid multi-service networks for the next generation of the global wide area production network.

  1. Architecture and Fault Identification of Wide-area Protection System

    Directory of Open Access Journals (Sweden)

    Yuxue Wang

    2012-09-01

    Full Text Available Wide-area protection system (WAPS is widely studied for the purpose of improvng the performance of conventional backup protection. In this paper, the system architecture of WAPS is proposed and its key technologies are discussed in view of engineering projects. So a mixed structurecentralized-distributed structure which is more suitable for WAPS in limited power grid region, is obtained based on the advantages of the centralized structure and distributed structure. Furthermore, regional distance protection algorithm was taken as an example to illustrate the functions of the constituent units. Faulted components can be detected based on multi-source imformation fuse in the algorithm. And the algorithm cannot only improve the selectivity, the rapidity, and the reliability of relaying protection but also has high fault tolerant capability. A simulation of 220 kV grid systems in Easter Hubei province shows the effectiveness of the wide-area protection system presented by this paper.

  2. Traffic flow wide-area surveillance system definition

    Energy Technology Data Exchange (ETDEWEB)

    Allgood, G.O.; Ferrell, R.K.; Kercel, S.W.; Abston, R.A.; Carnal, C.L. [Oak Ridge National Lab., TN (United States); Moynihan, P.I. [Jet Propulsion Lab., Pasadena, CA (United States)

    1994-11-01

    Traffic Flow Wide-Area Surveillance (TFWAS) is a system for assessing the state of traffic flow over a wide area for enhanced traffic control and improved traffic management and planning. The primary purpose of a TFWAS system is to provide a detailed traffic flow description and context description to sophisticated traffic management and control systems being developed or envisioned for the future. A successful TFWAS system must possess the attributes of safety, reconfigurability, reliability, and expandability. The primary safety premise of TFWAS is to ensure that no action or failure of the TFWAS system or its components can result in risk of injury to humans. A wide variety of communication techniques is available for use with TFWAS systems. These communication techniques can be broken down into two categories, landlines and wireless. Currently used and possible future traffic sensing technologies have been examined. Important criteria for selecting TFWAS sensors include sensor capabilities, costs, operational constraints, sensor compatibility with the infrastructure, and extent. TFWAS is a concept that can take advantage of the strengths of different traffic sensing technologies, can readily adapt to newly developed technologies, and can grow with the development of new traffic control strategies. By developing innovative algorithms that will take information from a variety of sensor types and develop descriptions of traffic flows over a wide area, a more comprehensive understanding of the traffic state can be provided to the control system to perform the most reasonable control actions over the entire wide area. The capability of characterizing the state of traffic over an entire region should revolutionize developments in traffic control strategies.

  3. Multi Agent System Based Wide Area Protection against Cascading Events

    DEFF Research Database (Denmark)

    Liu, Zhou; Chen, Zhe; Liu, Leo

    2012-01-01

    In this paper, a multi-agent system based wide area protection scheme is proposed in order to prevent long term voltage instability induced cascading events. The distributed relays and controllers work as a device agent which not only executes the normal function automatically but also can...... the effectiveness of proposed protection strategy. The simulation results indicate that the proposed multi agent control system can effectively coordinate the distributed relays and controllers to prevent the long term voltage instability induced cascading events....

  4. Regional collaboration among Urban Area Security Initiative regions: results of the Johns Hopkins urban area survey.

    Science.gov (United States)

    Errett, Nicole A; Bowman, Calvin; Barnett, Daniel J; Resnick, Beth A; Frattaroli, Shannon; Rutkow, Lainie

    2014-01-01

    Regional collaboration has been identified as a potential facilitator of public health preparedness efforts. The Urban Area Security Initiative (UASI) grant program, administered by the Federal Emergency Management Agency (FEMA) since 2003, has provided 64 high-risk metropolitan areas funding to enhance their regional preparedness capabilities. This study describes informal and formal regional collaboration infrastructure, as well as regional collaboration-related activities and assessment methods, in FFY2010 UASI regions. A cross-sectional online survey was administered via Survey Monkey from September through December 2013. Points of contact from FFY2010 funded UASI metropolitan areas completed the survey, with a response rate of 77.8% (n=49). Summary statistics were calculated to describe the current informal and formal regional collaboration infrastructure. Additionally, the cross-sectional survey collected rates of agreement with 8 collaborative preparedness statements at 3 time points. The survey found that UASI regions are engaging in collaborative activities and investments to build capabilities, with most collaboration occurring in the prevention, protection, and response mission areas. Collaborative relationships in preparedness among emergency managers and municipal chief executive officers improved during the FFY2010 UASI performance period compared to the pre-UASI award period, with lasting effects. The majority of UASI regions reported conducting independent assessments of capabilities and their measurement at the UASI region level. Urban areas that received a FFY2010 UASI grant award are engaging in collaborative activities and have established interjurisdictional relationships in preparedness. The use of grant funds to encourage collaboration in preparedness has the potential to leverage limited resources and promote informed investments.

  5. Development of Autonomous Magnetometer Rotorcraft For Wide Area Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Mark D. McKay; Matthew O. Anderson

    2011-08-01

    Large areas across the United States and internationally are potentially contaminated with unexploded ordinance (UXO), with some ranges encompassing tens to hundreds of thousands of acres. Technologies are needed which will allow for cost effective wide area scanning with (1) near 100% coverage and (2) near 100% detection of subsurface ordnance or features indicative of subsurface ordnance. The current approach to wide area assessment is a multi-level one, in which medium - altitude fixed wing optical imaging is used for an initial site assessment. This assessment is followed with low altitude manned helicopter based magnetometry. Subsequent to this wide area assessment targeted surface investigations are performed using either towed geophysical sensor arrays or man portable sensors. In order to be an effective tool for small UXO detection, the sensing altitude for magnetic site investigations needs to be on the order of 1 to 3 meters. These altitude requirements mean that manned helicopter surveys will generally only be feasible in large, open and relatively flat terrains. While such surveys are effective in mapping large areas relatively fast there are substantial mobilization/demobilization, staffing and equipment costs associated with these surveys, resulting in costs of approximately $100-$150/acre. In addition, due to the low altitude there are substantial risks to pilots and equipment. Surface towed arrays provide highresolution maps but have other limitations, e.g. in their ability to navigate rough terrain effectively. Thus there is a need for other systems, which can be used for effective data collection. An Unmanned Aerial Vehicle (UAV) magnetometer platform is an obvious alternative. The motivation behind such a system is that it reduces risk to operators, is lower in initial and Operational and Maintenance (O&M) costs (and can thus potentially be applied to smaller sites) and has the potential of being more effective in terms of detection and possibly

  6. Bayes-Based Fault Discrimination in Wide Area Backup Protection

    Directory of Open Access Journals (Sweden)

    WANG, Z.

    2012-02-01

    Full Text Available Multivariate statistical analysis is an effective tool to finish the fault location for electric power system. In Bayesian discriminant analysis as a subbranch, by the research of several populations, one can calculate the conditional probability that some samples belong to these populations, and compare the corresponding probability. The sample will be classified as population with maximum probability. In this paper, based on Bayesian discriminant analysis principle, a great number of simulation examples have confirmed that the results of Bayesian fault discriminant in wide area backup protection are accurate and reliable.

  7. Concept definition of traffic flow wide-area surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Allgood, G.O.; Ferrell, R.K.; Kercel, S.W.

    1994-07-01

    Traffic management can be thought of as a stochastic queuing process where the serving time at one of its control points is dynamically linked to the global traffic pattern, which is, in turn, dynamically linked to the control point. For this closed-loop system to be effective, the traffic management system must sense and interpret large spatial projections of data originating from multiple sensor suites. The intent of the Wide-Area Surveillance (WAS) Project is to build upon this concept and define the operational specifications and characteristics of a Traffic Flow Wide-Area Surveillance (TFWAS) system in terms of traffic management and control. In doing so, the functional capabilities of a TFWAS will be mapped onto an operational profile that is consistent with the Federal Highway Administration`s Intelligent Vehicle Highway System. This document provides the underlying foundation of this work by offering a concept definition for the TFWAS system. It concentrates on answering the question: ``What is the system?`` In doing so, the report develops a hierarchy of specialized definitions.

  8. Wide-area-distributed storage system for a multimedia database

    Science.gov (United States)

    Ueno, Masahiro; Kinoshita, Shigechika; Kuriki, Makato; Murata, Setsuko; Iwatsu, Shigetaro

    1998-12-01

    We have developed a wide-area-distribution storage system for multimedia databases, which minimizes the possibility of simultaneous failure of multiple disks in the event of a major disaster. It features a RAID system, whose member disks are spatially distributed over a wide area. Each node has a device, which includes the controller of the RAID and the controller of the member disks controlled by other nodes. The devices in the node are connected to a computer, using fiber optic cables and communicate using fiber-channel technology. Any computer at a node can utilize multiple devices connected by optical fibers as a single 'virtual disk.' The advantage of this system structure is that devices and fiber optic cables are shared by the computers. In this report, we first described our proposed system, and a prototype was used for testing. We then discussed its performance; i.e., how to read and write throughputs are affected by data-access delay, the RAID level, and queuing.

  9. Regional Collaboration Among Urban Area Security Initiative Regions: Results of the Johns Hopkins Urban Area Survey

    Science.gov (United States)

    Bowman, Calvin; Barnett, Daniel J.; Resnick, Beth A.; Frattaroli, Shannon; Rutkow, Lainie

    2014-01-01

    Regional collaboration has been identified as a potential facilitator of public health preparedness efforts. The Urban Area Security Initiative (UASI) grant program, administered by the Federal Emergency Management Agency (FEMA) since 2003, has provided 64 high-risk metropolitan areas funding to enhance their regional preparedness capabilities. This study describes informal and formal regional collaboration infrastructure, as well as regional collaboration–related activities and assessment methods, in FFY2010 UASI regions. A cross-sectional online survey was administered via Survey Monkey from September through December 2013. Points of contact from FFY2010 funded UASI metropolitan areas completed the survey, with a response rate of 77.8% (n=49). Summary statistics were calculated to describe the current informal and formal regional collaboration infrastructure. Additionally, the cross-sectional survey collected rates of agreement with 8 collaborative preparedness statements at 3 time points. The survey found that UASI regions are engaging in collaborative activities and investments to build capabilities, with most collaboration occurring in the prevention, protection, and response mission areas. Collaborative relationships in preparedness among emergency managers and municipal chief executive officers improved during the FFY2010 UASI performance period compared to the pre-UASI award period, with lasting effects. The majority of UASI regions reported conducting independent assessments of capabilities and their measurement at the UASI region level. Urban areas that received a FFY2010 UASI grant award are engaging in collaborative activities and have established interjurisdictional relationships in preparedness. The use of grant funds to encourage collaboration in preparedness has the potential to leverage limited resources and promote informed investments. PMID:25398073

  10. A collaborative virtual environment for training of security agents in nuclear emergencies

    International Nuclear Information System (INIS)

    Fernandes, Sara I.; Passos, Cláudio A.; Silva, Marcio H.; Carvalho, Paulo Victor R.; Legey, Ana Paula; Mol, Antonio Carlos; Machado, Daniel M.; Cotelli, André; Rocha, Tiago L.

    2017-01-01

    In face the recently observed security menaces related to terrorist actions and natural disasters, there is a need for a major qualification and training of the agents responsible for avoid any problems regarding to abnormal conditions. In the conventional training procedures, however, field simulations are associated to logistical and operational constraints regarded to the execution of the tests which can expose the user to risk. On the other hand, the use of virtual simulations provides an alternative to such limitations besides of promote the qualifying of professionals with a great reliability. For this reason, this paper proposes the development of a collaborative virtual environment that will be used to prepare the security agents on identifying individuals suspected of carrying radioactive materials. The development of the virtual environment consisted on modeling using Autodesk 3ds Max, where the scene itself and the scene objects were modeled besides the terrain creation and basic features programming using the Game Engine Unity 3D. In the Engine Game were included radiation detectors and avatars. The security agents were able to communicate to each other by means of auxiliary external tools like a headset software that makes possible the communication, coordination and cooperation required for an effective collaboration. Experimental tests of the virtual simulations were performed with the participation of CNEN radiological protection agents and collaborators. The tests have shown that the proposed method can contribute to improve the training results of the basic collaborative skills required for a CNEN agent in an emergency situation without the need to expose him to any kind of risk. In face of that, we hope that it can contribute to minimize the demand for qualified security professionals. (author)

  11. A collaborative virtual environment for training of security agents in nuclear emergencies

    Energy Technology Data Exchange (ETDEWEB)

    Fernandes, Sara I.; Passos, Cláudio A.; Silva, Marcio H.; Carvalho, Paulo Victor R.; Legey, Ana Paula; Mol, Antonio Carlos; Machado, Daniel M.; Cotelli, André; Rocha, Tiago L., E-mail: mol@ien.gov.br [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio de Janeiro, RJ (Brazil). Departamento de Realidade Virtual

    2017-07-01

    In face the recently observed security menaces related to terrorist actions and natural disasters, there is a need for a major qualification and training of the agents responsible for avoid any problems regarding to abnormal conditions. In the conventional training procedures, however, field simulations are associated to logistical and operational constraints regarded to the execution of the tests which can expose the user to risk. On the other hand, the use of virtual simulations provides an alternative to such limitations besides of promote the qualifying of professionals with a great reliability. For this reason, this paper proposes the development of a collaborative virtual environment that will be used to prepare the security agents on identifying individuals suspected of carrying radioactive materials. The development of the virtual environment consisted on modeling using Autodesk 3ds Max, where the scene itself and the scene objects were modeled besides the terrain creation and basic features programming using the Game Engine Unity 3D. In the Engine Game were included radiation detectors and avatars. The security agents were able to communicate to each other by means of auxiliary external tools like a headset software that makes possible the communication, coordination and cooperation required for an effective collaboration. Experimental tests of the virtual simulations were performed with the participation of CNEN radiological protection agents and collaborators. The tests have shown that the proposed method can contribute to improve the training results of the basic collaborative skills required for a CNEN agent in an emergency situation without the need to expose him to any kind of risk. In face of that, we hope that it can contribute to minimize the demand for qualified security professionals. (author)

  12. Sharing waste management data over a wide area computer network

    International Nuclear Information System (INIS)

    Menke, W.; Friberg, P.

    1992-01-01

    In this paper the authors envision a time when waste management professionals from any institution will be able to access high quality data, regardless of where this data may actually be archived. They will not have to know anything about where the data actually resides or what format it is stored in. They will only have to specify the type of data and the workstation software will handle the rest of the details of finding them and accessing them. A method - now in use at the Lamont-Doherty Geological Observatory of Columbia University and several other institutions - of achieving this vision is described in this paper. Institutions make views of their databases publicly available to users of the wide-area network (e.g. Internet), using database serving software that runs on one of their computers. This software completely automates the process of finding out what kind of data are available and of retrieving them

  13. First operation of the wide-area remote experiment system

    International Nuclear Information System (INIS)

    Furukawa, Y.; Hasegawa, K.; Ueno, G.

    2012-01-01

    The Wide-area Remote Experiment System (WRES) at Spring-8 has been successfully developed. The system communicates with remote users on the basis of SSL/TLS with bi-directional authentication to avoid interference from unauthorized access to the system. The system has a message-filtering system to allow remote users access only to the corresponding beamline equipment and safety interlock system. This is to protect persons inside the experimental station from injury from any accidental motion of heavy equipment. The system also has a video streaming system to monitor samples or experimental equipment. We have tested the system from the point of view of safety, stability, reliability etc. and successfully performed the first experiment from a remote site, i.e., RIKEN's Wako campus, which is 480 km away from Spring-8, at the end of October 2010. (authors)

  14. Wide area methane emissions mapping with airborne IPDA lidar

    Science.gov (United States)

    Bartholomew, Jarett; Lyman, Philip; Weimer, Carl; Tandy, William

    2017-08-01

    Methane emissions from natural gas production, storage, and transportation are potential sources of greenhouse gas emissions. Methane leaks also constitute revenue loss potential from operations. Since 2013, Ball Aerospace has been developing advanced airborne sensors using integrated path differential absorption (IPDA) LIDAR instrumentation to identify methane, propane, and longer-chain alkanes in the lowest region of the atmosphere. Additional funding has come from the U.S. Department of Transportation, Pipeline and Hazardous Materials Administration (PHMSA) to upgrade instrumentation to a broader swath coverage of up to 400 meters while maintaining high spatial sampling resolution and geolocation accuracy. Wide area coverage allows efficient mapping of emissions from gathering and distribution networks, processing facilities, landfills, natural seeps, and other distributed methane sources. This paper summarizes the benefits of advanced instrumentation for aerial methane emission mapping, describes the operating characteristics and design of this upgraded IPDA instrumentation, and reviews technical challenges encountered during development and deployment.

  15. Wide-area monitoring to detect undeclared nuclear facilities

    International Nuclear Information System (INIS)

    Wogman, N.

    1994-09-01

    The International Atomic Energy Agency (IAEA) is committed to strengthening and streamlining the overall effectiveness of the IAEA safeguards system. The IAEA is investigating the use of environmental monitoring techniques to strengthen its capability to detect undeclared nuclear activities. The IAEA's Program 93+2 Initiative has been established to develop, test, and assess strengthening techniques and measures. Some of the techniques have been validated and are being implemented during routine safeguards inspections. The effectiveness of other techniques is being studied as a part of extensive field trials conducted at nuclear facilities of various Member States during 1993 and 1994. Proposals based on the results of these investigations and recommendations for new safeguards activities are expected to be presented to the March 1995 Board of Governors Meeting. The techniques in use or under study during IAEA field trials address various types of environmental monitoring applications as outlined under Program 93+2's Task 3, Environmental Monitoring Techniques for Safeguards Applications, namely, the use of short-range monitoring during inspections and visits to investigate sites of possible undeclared activities. With the exception of wide-area water sampling in Iraq, the use of long-range monitoring, in the absence of any indication of undeclared nuclear activities, remains largely unexamined by the IAEA. The efficacy of long-range monitoring depends on the availability of mobile signature isotopes or compounds and on the ability to distinguish the nuclear signatures from background signals and attributing them to a source. The scope of this paper is to provide technical information to the International Atomic Energy Agency (IAEA) on possible wide-area survey techniques for the detection of undeclared nuclear activities. The primary focus is the detection of effluents from reprocessing activities

  16. Development of autonomous magnetometer rotorcraft for wide area assessment

    Energy Technology Data Exchange (ETDEWEB)

    Roelof Versteeg; Matt Anderson; Les Beard; Eric Corban; Darryl Curley; Jeff Gamey; Ross Johnson; Dwight Junkin; Mark McKay; Jared Salzmann; Mikhail Tchernychev; Suraj Unnikrishnan; Scott Vinson

    2010-04-01

    Large areas across the United States are potentially contaminated with UXO, with some ranges encompassing tens to hundreds of thousands of acres. Technologies are needed which will allow for cost effective wide area scanning with 1) near 100 % coverage and 2) near 100 % detection of subsurface ordnance or features indicative of subsurface ordnance. The current approach to wide area assessment is a multi-level one, in which medium - altitude fixed wing optical imaging is used for an initial site assessment. This assessment is followed with low altitude manned helicopter based magnetometry. Subsequent to this wide area assessment targeted surface investigations are performed using either towed geophysical sensor arrays or man portable sensors. In order to be an effective tool for small UXO detection, the sensing altitude for magnetic site investigations needs to be on the order of 1 – 3 meters. These altitude requirements mean that manned helicopter surveys will generally only be feasible in large, open and relatively flat terrains. While such surveys are effective in mapping large areas relatively fast there are substantial mobilization/demobilization, staffing and equipment costs associated with these surveys (resulting in costs of approximately $100-$150/acre). In addition, due to the low altitude there are substantial risks to pilots and equipment. Surface towed arrays provide high resolution maps but have other limitations, e.g. in their ability to navigate rough terrain effectively. There is thus a need for other systems which can be used for effective data collection. An UAV (Unmanned Aerial Vehicle) magnetometer platform is an obvious alternative. The motivation behind such a system is that it reduces risk to operators, is lower in initial and Operational and Maintenance (O&M) costs (and can thus potentially be applied to smaller sites) and has the potential of being more effective in terms of detection and possibly characterization (through the use of

  17. The Study on the Communication Network of Wide Area Measurement System in Electricity Grid

    Science.gov (United States)

    Xiaorong, Cheng; Ying, Wang; Yangdan, Ni

    Wide area measurement system(WAMS) is a fundamental part of security defense in Smart Grid, and the communication system of WAMS is an important part of Electric power communication network. For a large regional network is concerned, the real-time data which is transferred in the communication network of WAMS will affect the safe operation of the power grid directly. Therefore, WAMS raised higher requirements for real-time, reliability and security to its communication network. In this paper, the architecture of WASM communication network was studied according to the seven layers model of the open systems interconnection(OSI), and the network architecture was researched from all levels. We explored the media of WAMS communication network, the network communication protocol and network technology. Finally, the delay of the network were analyzed.

  18. On Data Transfers Over Wide-Area Dedicated Connections

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Nageswara S. [ORNL; Liu, Qiang [ORNL

    2018-01-01

    Dedicated wide-area network connections are employed in big data and high-performance computing scenarios, since the absence of cross-traffic promises to make it easier to analyze and optimize data transfers over them. However, nonlinear transport dynamics and end-system complexity due to multi-core hosts and distributed file systems make these tasks surprisingly challenging. We present an overview of methods to analyze memory and disk file transfers using extensive measurements over 10 Gbps physical and emulated connections with 0–366 ms round trip times (RTTs). For memory transfers, we derive performance profiles of TCP and UDT throughput as a function of RTT, which show concave regions in contrast to entirely convex regions predicted by previous models. These highly desirable concave regions can be expanded by utilizing large buffers and more parallel flows. We also present Poincar´e maps and Lyapunov exponents of TCP and UDT throughputtraces that indicate complex throughput dynamics. For disk file transfers, we show that throughput can be optimized using a combination of parallel I/O and network threads under direct I/O mode. Our initial throughput measurements of Lustre filesystems mounted over long-haul connections using LNet routers show convex profiles indicative of I/O limits.

  19. Highball: A high speed, reserved-access, wide area network

    Science.gov (United States)

    Mills, David L.; Boncelet, Charles G.; Elias, John G.; Schragger, Paul A.; Jackson, Alden W.

    1990-01-01

    A network architecture called Highball and a preliminary design for a prototype, wide-area data network designed to operate at speeds of 1 Gbps and beyond are described. It is intended for applications requiring high speed burst transmissions where some latency between requesting a transmission and granting the request can be anticipated and tolerated. Examples include real-time video and disk-disk transfers, national filestore access, remote sensing, and similar applications. The network nodes include an intelligent crossbar switch, but have no buffering capabilities; thus, data must be queued at the end nodes. There are no restrictions on the network topology, link speeds, or end-end protocols. The end system, nodes, and links can operate at any speed up to the limits imposed by the physical facilities. An overview of an initial design approach is presented and is intended as a benchmark upon which a detailed design can be developed. It describes the network architecture and proposed access protocols, as well as functional descriptions of the hardware and software components that could be used in a prototype implementation. It concludes with a discussion of additional issues to be resolved in continuing stages of this project.

  20. Performability indicators for the traffic analysis of wide area networks

    International Nuclear Information System (INIS)

    Tsopelas, Panagiotis; Platis, Agapios

    2003-01-01

    In connecting computing networks, reliability term is strongly related to the availability of connections of Wide Area networks (WANs) or Local Area networks (LANs). In this paper we will examine the network connections activity of a Greek University in order to provide two sources of information: The Quantity of Information Not Delivered (QIND) and the Information Flow Interruption (IFI). These indicators will provide us with the inference of information from observable characteristics of data flow(s), even when the data is encrypted or otherwise not directly available (traffic), which is lost due to failures or upgrades inside this network. The reliability analysis is obtained by collecting the network failures data (duration and frequency) and traffic (total and average) for a specified period of 1 year. It is assumed that the numerical analysis is based on the fact that the lifetime follows and exponential distribution (here as we are working on discrete time the distribution must be the geometric distribution). Hence a Markov chain model seems suitable for modelling the functioning of this system. An algorithm concentrates the results in a transition probability matrix and calculates the reward functions for the QIND/IFI indicators with the use of the power method. Finally, the application part provides an example of how final results can be used to evaluate the observed network

  1. Addressing security, collaboration, and usability with tactical edge mobile devices and strategic cloud-based systems

    Science.gov (United States)

    Graham, Christopher J.

    2012-05-01

    Success in the future battle space is increasingly dependent on rapid access to the right information. Faced with a shrinking budget, the Government has a mandate to improve intelligence productivity, quality, and reliability. To achieve increased ISR effectiveness, leverage of tactical edge mobile devices via integration with strategic cloud-based infrastructure is the single, most likely candidate area for dramatic near-term impact. This paper discusses security, collaboration, and usability components of this evolving space. These three paramount tenets outlined below, embody how mission information is exchanged securely, efficiently, with social media cooperativeness. Tenet 1: Complete security, privacy, and data integrity, must be ensured within the net-centric battle space. This paper discusses data security on a mobile device, data at rest on a cloud-based system, authorization and access control, and securing data transport between entities. Tenet 2: Lack of collaborative information sharing and content reliability jeopardizes mission objectives and limits the end user capability. This paper discusses cooperative pairing of mobile devices and cloud systems, enabling social media style interaction via tagging, meta-data refinement, and sharing of pertinent data. Tenet 3: Fielded mobile solutions must address usability and complexity. Simplicity is a powerful paradigm on mobile platforms, where complex applications are not utilized, and simple, yet powerful, applications flourish. This paper discusses strategies for ensuring mobile applications are streamlined and usable at the tactical edge through focused features sets, leveraging the power of the back-end cloud, minimization of differing HMI concepts, and directed end-user feedback.teInput=

  2. Regular Topologies for Gigabit Wide-Area Networks. Volume 1

    Science.gov (United States)

    Shacham, Nachum; Denny, Barbara A.; Lee, Diane S.; Khan, Irfan H.; Lee, Danny Y. C.; McKenney, Paul

    1994-01-01

    In general terms, this project aimed at the analysis and design of techniques for very high-speed networking. The formal objectives of the project were to: (1) Identify switch and network technologies for wide-area networks that interconnect a large number of users and can provide individual data paths at gigabit/s rates; (2) Quantitatively evaluate and compare existing and proposed architectures and protocols, identify their strength and growth potentials, and ascertain the compatibility of competing technologies; and (3) Propose new approaches to existing architectures and protocols, and identify opportunities for research to overcome deficiencies and enhance performance. The project was organized into two parts: 1. The design, analysis, and specification of techniques and protocols for very-high-speed network environments. In this part, SRI has focused on several key high-speed networking areas, including Forward Error Control (FEC) for high-speed networks in which data distortion is the result of packet loss, and the distribution of broadband, real-time traffic in multiple user sessions. 2. Congestion Avoidance Testbed Experiment (CATE). This part of the project was done within the framework of the DARTnet experimental T1 national network. The aim of the work was to advance the state of the art in benchmarking DARTnet's performance and traffic control by developing support tools for network experimentation, by designing benchmarks that allow various algorithms to be meaningfully compared, and by investigating new queueing techniques that better satisfy the needs of best-effort and reserved-resource traffic. This document is the final technical report describing the results obtained by SRI under this project. The report consists of three volumes: Volume 1 contains a technical description of the network techniques developed by SRI in the areas of FEC and multicast of real-time traffic. Volume 2 describes the work performed under CATE. Volume 3 contains the source

  3. Flexible, Secure, and Reliable Data Sharing Service Based on Collaboration in Multicloud Environment

    Directory of Open Access Journals (Sweden)

    Qiang Wei

    2018-01-01

    Full Text Available Due to the abundant storage resources and high reliability data service of cloud computing, more individuals and enterprises are motivated to outsource their data to public cloud platform and enable legal data users to search and download what they need in the outsourced dataset. However, in “Paid Data Sharing” model, some valuable data should be encrypted before outsourcing for protecting owner’s economic benefits, which is an obstacle for flexible application. Specifically, if the owner does not know who (user will download which data files in advance and even does not know the attributes of user, he/she has to either remain online all the time or import a trusted third party (TTP to distribute the file decryption key to data user. Obviously, making the owner always remain online is too inflexible, and wholly depending on the security of TTP is a potential risk. In this paper, we propose a flexible, secure, and reliable data sharing scheme based on collaboration in multicloud environment. For securely and instantly providing data sharing service even if the owner is offline and without TTP, we distribute all encrypted split data/key blocks together to multiple cloud service providers (CSPs, respectively. An elaborate cryptographic protocol we designed helps the owner verify the correctness of data exchange bills, which is directly related to the owner’s economic benefits. Besides, in order to support reliable data service, the erasure-correcting code technic is exploited for tolerating multiple failures among CSPs, and we offer a secure keyword search mechanism that makes the system more close to reality. Extensive security analyses and experiments on real-world data show that our scheme is secure and efficient.

  4. Wide-Area Emergency Control in Power Transmission

    DEFF Research Database (Denmark)

    Pedersen, Andreas Søndergaard

    -contingency stability-margin information, system protection schemes are automatically generated and armed, and it is shown that, by examination of the physical phenomena behind the security threat, emergency controls can be properly allocated. Power systems can exhibit low-frequency oscillations due to the inertia...... convex relaxations are used to compute remedial actions when an emergency condition is detected, and the method is assessed using a set of benchmark systems. An optimal power flow approach is suggested to reconfigure a power system, and methods are introduced to be able to recover from an emergency...... condition and reach a secure stable equilibrium. In order to contain fast instability mechanisms, event-based emergency controls can be necessary, and this thesis also presents a contribution to real-time generation of event-based emergency control. By the use of contingency screening with post...

  5. Giving Back: Collaborations with Others in Ecological Studies on the Nevada National Security Site - 13058

    International Nuclear Information System (INIS)

    Wade, Scott A.; Knapp, Kathryn S.; Wills, Cathy A.

    2013-01-01

    Formerly named the Nevada Test Site, the Nevada National Security Site (NNSS) was the historical site for nuclear weapons testing from the 1950's to the early 1990's. The site was renamed in 2010 to reflect the diversity of nuclear, energy, and homeland security activities now conducted at the site. Biological and ecological programs and research have been conducted on the site for decades to address the impacts of radiation and to take advantage of the relatively undisturbed and isolated lands for gathering basic information on the occurrence and distribution of native plants and animals. Currently, the Office of the Assistant Manager for Environmental Management of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) oversees the radiological biota monitoring and ecological compliance programs on the NNSS. The top priority of these programs are compliance with federal and state regulations. They focus on performing radiological dose assessments for the public who reside near the NNSS and for populations of plants and animals on the NNSS and in protecting important species and habitat from direct impacts of mission activities. The NNSS serves as an invaluable outdoor laboratory. The geographic and ecological diversity of the site offers researchers many opportunities to study human influences on ecosystems. NNSA/NSO has pursued collaborations with outside agencies and organizations to be able to conduct programs and studies that enhance radiological biota monitoring and ecosystem preservation when budgets are restrictive, as well as to provide valuable scientific information to the human health and natural resource communities at large. NNSA/NSO is using one current collaborative study to better assess the potential dose to the off-site public from the ingestion of game animals, the most realistic pathway for off-site public exposure at this time from radionuclide contamination on the NNSS. A second

  6. Giving Back: Collaborations with Others in Ecological Studies on the Nevada National Security Site

    Energy Technology Data Exchange (ETDEWEB)

    Scott A. Wade (NFO); Kathryn S. Knapp (NFO); Cathy A. Wills (NSTec)

    2013-02-24

    Formerly named the Nevada Test Site, the Nevada National Security Site (NNSS) was the historical site for nuclear weapons testing from the 1950s to the early 1990s. The site was renamed in 2010 to reflect the diversity of nuclear, energy, and homeland security activities now conducted at the site. Biological and ecological programs and research have been conducted on the site for decades to address the impacts of radiation and to take advantage of the relatively undisturbed and isolated lands for gathering basic information on the occurrence and distribution of native plants and animals. Currently, the Office of the Assistant Manager for Environmental Management of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) oversees the radiological biota monitoring and ecological compliance programs on the NNSS. The top priority of these programs are compliance with federal and state regulations. They focus on performing radiological dose assessments for the public who reside near the NNSS and for populations of plants and animals on the NNSS and in protecting important species and habitat from direct impacts of mission activities. The NNSS serves as an invaluable outdoor laboratory. The geographic and ecological diversity of the site offers researchers many opportunities to study human influences on ecosystems. NNSA/NSO has pursued collaborations with outside agencies and organizations to be able to conduct programs and studies that enhance radiological biota monitoring and ecosystem preservation when budgets are restrictive, as well as to provide valuable scientific information to the human health and natural resource communities at large. NNSA/NSO is using one current collaborative study to better assess the potential dose to the off-site public from the ingestion of game animals, the most realistic pathway for off-site public exposure at this time from radionuclide contamination on the NNSS. A second

  7. Giving Back: Collaborations with Others in Ecological Studies on the Nevada National Security Site - 13058

    Energy Technology Data Exchange (ETDEWEB)

    Wade, Scott A.; Knapp, Kathryn S. [U.S. Department of Energy National Nuclear Security Agency, Nevada Site Office, P.O. Box 98518, Las Vegas, NV 89193-8518 (United States); Wills, Cathy A. [National Nuclear Security Technologies, LLC, P.O. Box 98521, M/S 260, Las Vegas, NV 89193-8521 (United States)

    2013-07-01

    Formerly named the Nevada Test Site, the Nevada National Security Site (NNSS) was the historical site for nuclear weapons testing from the 1950's to the early 1990's. The site was renamed in 2010 to reflect the diversity of nuclear, energy, and homeland security activities now conducted at the site. Biological and ecological programs and research have been conducted on the site for decades to address the impacts of radiation and to take advantage of the relatively undisturbed and isolated lands for gathering basic information on the occurrence and distribution of native plants and animals. Currently, the Office of the Assistant Manager for Environmental Management of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) oversees the radiological biota monitoring and ecological compliance programs on the NNSS. The top priority of these programs are compliance with federal and state regulations. They focus on performing radiological dose assessments for the public who reside near the NNSS and for populations of plants and animals on the NNSS and in protecting important species and habitat from direct impacts of mission activities. The NNSS serves as an invaluable outdoor laboratory. The geographic and ecological diversity of the site offers researchers many opportunities to study human influences on ecosystems. NNSA/NSO has pursued collaborations with outside agencies and organizations to be able to conduct programs and studies that enhance radiological biota monitoring and ecosystem preservation when budgets are restrictive, as well as to provide valuable scientific information to the human health and natural resource communities at large. NNSA/NSO is using one current collaborative study to better assess the potential dose to the off-site public from the ingestion of game animals, the most realistic pathway for off-site public exposure at this time from radionuclide contamination on the NNSS. A second

  8. Collaboration and Commitment to Sealed Source Safety, Security, and Disposition - 13627

    International Nuclear Information System (INIS)

    Jennison, Meaghan; Martin, David W.

    2013-01-01

    EnergySolutions, the Division of Radiation Control at the Utah Department of Environmental Quality (UDEQ), the Conference of Radiation Control Program Directors (CRCPD), and the Department of Energy's Global Threat Reduction Initiative (GTRI) are collaborating on a truly innovative effort to expand opportunities for cost-effective sealed source disposal. These entities have developed a first-of-its-kind initiative to dispose of certain sealed sources at the EnergySolutions disposal facility near Clive, Utah, which normally cannot accept sealed sources of any type. This creative and collaborative effort to improve radiation health, safety, and security exemplifies the spirit and commitment represented by the Richard S. Hodes, M.D. Honor Lecture Award, which is presented annually at the Waste Management Symposia by the Southeast Compact Commission to encourage environmental professionals and political leaders to develop innovative approaches to waste management in the United States. The participants in the collaborative initiative are honored to receive special recognition for their efforts thus far. They also recognize that the hard work remains to be done. (authors)

  9. Wide-area, real-time monitoring and visualization system

    Science.gov (United States)

    Budhraja, Vikram S.; Dyer, James D.; Martinez Morales, Carlos A.

    2013-03-19

    A real-time performance monitoring system for monitoring an electric power grid. The electric power grid has a plurality of grid portions, each grid portion corresponding to one of a plurality of control areas. The real-time performance monitoring system includes a monitor computer for monitoring at least one of reliability metrics, generation metrics, transmission metrics, suppliers metrics, grid infrastructure security metrics, and markets metrics for the electric power grid. The data for metrics being monitored by the monitor computer are stored in a data base, and a visualization of the metrics is displayed on at least one display computer having a monitor. The at least one display computer in one said control area enables an operator to monitor the grid portion corresponding to a different said control area.

  10. Wide Area Network Monitoring System for HEP Experiments at Fermilab

    Energy Technology Data Exchange (ETDEWEB)

    Grigoriev, M.

    2004-11-23

    Large, distributed High Energy Physics (HEP) collaborations, such as D0, CDF and US-CMS, depend on stable and robust network paths between major world research centres. The evolving emphasis on data and compute Grids increases the reliance on network performance. Fermilab's experimental groups and network support personnel identified a critical need for WAN monitoring to ensure the quality and efficient utilization of such network paths. This has led to the development of the Network Monitoring system we will present in this paper. The system evolved from the IEPM-BW project, started at SLAC three years ago. At Fermilab this system has developed into a fully functional infrastructure with bi-directional active network probes and path characterizations. It is based on the Iperf achievable throughput tool, Ping and Synack to test ICMP/TCP connectivity. It uses Pipechar and Traceroute to test, compare and report hop-by-hop network path characterization. It also measures real file transfer performance by BBFTP and GridFTP. The Monitoring system has an extensive web-interface and all the data is available through standalone SOAP web services or by a MonaLISA client. Also in this paper we will present a case study of network path asymmetry and abnormal performance between FNAL and SDSC, which was discovered and resolved by utilizing the Network Monitoring system.

  11. Wide area network monitoring system for HEP experiments at Fermilab

    International Nuclear Information System (INIS)

    Grigoriev, Maxim; Fermilab; Cottrell, Les; Logg, Connie; SLAC

    2004-01-01

    Large, distributed High Energy Physics (HEP) collaborations, such as D0, CDF and US-CMS, depend on stable and robust network paths between major world research centres. The evolving emphasis on data and compute Grids increases the reliance on network performance. Fermilab's experimental groups and network support personnel identified a critical need for WAN monitoring to ensure the quality and efficient utilization of such network paths. This has led to the development of the Network Monitoring system we will present in this paper. The system evolved from the IEPM-BW project, started at SLAC three years ago. At Fermilab this system has developed into a fully functional infrastructure with bi-directional active network probes and path characterizations. It is based on the Iperf achievable throughput tool, Ping and Synack to test ICMP/TCP connectivity. It uses Pipechar and Traceroute to test, compare and report hop-by-hop network path characterization. It also measures real file transfer performance by BBFTP and GridFTP. The Monitoring system has an extensive web-interface and all the data is available through standalone SOAP web services or by a MonaLISA client. Also in this paper we will present a case study of network path asymmetry and abnormal performance between FNAL and SDSC, which was discovered and resolved by utilizing the Network Monitoring system

  12. Wide Area Network Monitoring System for HEP Experiments at Fermilab

    International Nuclear Information System (INIS)

    Grigoriev, M.

    2004-01-01

    Large, distributed High Energy Physics (HEP) collaborations, such as D0, CDF and US-CMS, depend on stable and robust network paths between major world research centres. The evolving emphasis on data and compute Grids increases the reliance on network performance. Fermilab's experimental groups and network support personnel identified a critical need for WAN monitoring to ensure the quality and efficient utilization of such network paths. This has led to the development of the Network Monitoring system we will present in this paper. The system evolved from the IEPM-BW project, started at SLAC three years ago. At Fermilab this system has developed into a fully functional infrastructure with bi-directional active network probes and path characterizations. It is based on the Iperf achievable throughput tool, Ping and Synack to test ICMP/TCP connectivity. It uses Pipechar and Traceroute to test, compare and report hop-by-hop network path characterization. It also measures real file transfer performance by BBFTP and GridFTP. The Monitoring system has an extensive web-interface and all the data is available through standalone SOAP web services or by a MonaLISA client. Also in this paper we will present a case study of network path asymmetry and abnormal performance between FNAL and SDSC, which was discovered and resolved by utilizing the Network Monitoring system

  13. Collaboration

    Science.gov (United States)

    King, Michelle L.

    2010-01-01

    This article explores collaboration between library media educators and regular classroom teachers. The article focuses on the context of the issue, positions on the issue, the impact of collaboration, and how to implement effective collaboration into the school system. Various books and professional journals are used to support conclusions…

  14. Collaborative eHealth Meets Security: Privacy-Enhancing Patient Profile Management.

    Science.gov (United States)

    Sanchez-Guerrero, Rosa; Mendoza, Florina Almenarez; Diaz-Sanchez, Daniel; Cabarcos, Patricia Arias; Lopez, Andres Marin

    2017-11-01

    Collaborative healthcare environments offer potential benefits, including enhancing the healthcare quality delivered to patients and reducing costs. As a direct consequence, sharing of electronic health records (EHRs) among healthcare providers has experienced a noteworthy growth in the last years, since it enables physicians to remotely monitor patients' health and enables individuals to manage their own health data more easily. However, these scenarios face significant challenges regarding security and privacy of the extremely sensitive information contained in EHRs. Thus, a flexible, efficient, and standards-based solution is indispensable to guarantee selective identity information disclosure and preserve patient's privacy. We propose a privacy-aware profile management approach that empowers the patient role, enabling him to bring together various healthcare providers as well as user-generated claims into an unique credential. User profiles are represented through an adaptive Merkle Tree, for which we formalize the underlying mathematical model. Furthermore, performance of the proposed solution is empirically validated through simulation experiments.

  15. Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities

    Directory of Open Access Journals (Sweden)

    Qinlong Huang

    2017-01-01

    Full Text Available Mobile healthcare social networks (MHSN integrated with connected medical sensors and cloud-based health data storage provide preventive and curative health services in smart cities. The fusion of social data together with real-time health data facilitates a novel paradigm of healthcare big data analysis. However, the collaboration of healthcare and social network service providers may pose a series of security and privacy issues. In this paper, we propose a secure health and social data sharing and collaboration scheme in MHSN. To preserve the data privacy, we realize secure and fine-grained health data and social data sharing with attribute-based encryption and identity-based broadcast encryption techniques, respectively, which allows patients to share their private personal data securely. In order to achieve enhanced data collaboration, we allow the healthcare analyzers to access both the reencrypted health data and the social data with authorization from the data owner based on proxy reencryption. Specifically, most of the health data encryption and decryption computations are outsourced from resource-constrained mobile devices to a health cloud, and the decryption of the healthcare analyzer incurs a low cost. The security and performance analysis results show the security and efficiency of our scheme.

  16. Wide area stability analysis and control of interconnected power systems with HVDC and FACTS devices

    Energy Technology Data Exchange (ETDEWEB)

    Li, Yong

    2012-11-01

    In order to damp low-frequency oscillations and improve the overall stability of large-scale interconnected power systems, this book investigates the wide-area stability analysis and control methods from different perspectives. The flexible and fast control capability of high-voltage (FACTS) is investigated in detail to implement a wide-area measurement based damping control. A sequential and global mixed optimization method is proposed to simultaneously optimize local and wide area damping controllers. A wide-area robust coordination method is presented to coordinate multiple wide-area damping controllers (WADC). A delay-dependent robust design method is also proposed to handle time-varying delays commonly existing in wide-area signal communication. A closed-loop hardware experiment is used to validate the damping performance. The research activities of this book include power system stability analysis and control, wide-area damping control as well as HVDC and FACTS technologies.

  17. Fault Identification Algorithm Based on Zone-Division Wide Area Protection System

    OpenAIRE

    Xiaojun Liu; Youcheng Wang; Hub Hu

    2014-01-01

    As the power grid becomes more magnified and complicated, wide-area protection system in the practical engineering application is more and more restricted by the communication level. Based on the concept of limitedness of wide-area protection system, the grid with complex structure is divided orderly in this paper, and fault identification and protection action are executed in each divided zone to reduce the pressure of the communication system. In protection zone, a new wide-area...

  18. Bridging the Gap in Port Security; Network Centric Theory Applied to Public/Private Collaboration

    National Research Council Canada - National Science Library

    Wright, Candice L

    2007-01-01

    ...." Admiral Thad Allen, 2007 The application of Network Centric Warfare theory enables all port stakeholders to better prepare for a disaster through increased information sharing and collaboration...

  19. Optimal Control of Sensor Threshold for Autonomous Wide Area Search Munitions

    National Research Council Canada - National Science Library

    Kish, Brian A; Jacques, David R; Pachter, Meir

    2005-01-01

    The optimal employment of autonomous wide area search munitions is addressed. The scenario considered involves an airborne munition searching a battle space for stationary targets in the presence of false targets...

  20. Demonstration of Airborne Wide Area Assessment Technologies at the Toussaint River, Ohio

    National Research Council Canada - National Science Library

    Foley, Jack; Wright, David

    2007-01-01

    ...) technology, a wide area assessment technology, to assist in the characterization of the shore and shallow areas in and around the Toussaint River relative to munitions contamination from historical...

  1. Summary of the 2012 Wide Area Recovery and Resiliency Program (WARRP) Waste Management Workshop

    Science.gov (United States)

    Workshop advanced the planning of federal, state and local officials in the area of waste management following a chemical, biological or radiological wide-area incident in the Denver, Colorado urban area.

  2. Wide-Area Haptic Guidance: Taking the User by the Hand

    OpenAIRE

    Pérez Arias, Antonia; Hanebeck, Uwe D.

    2010-01-01

    In this paper, we present a novel use of haptic information in extended range telepresence, the wide-area haptic guidance. It consists of force and position signals applied to the user's hand in order to improve safety, accuracy, and speed in some telepresent tasks. Wide-area haptic guidance assists the user in reaching a desired position in a remote environment of arbitrary size without degrading the feeling of presence. Several methods for haptic guidance are analyzed. With active haptic gu...

  3. A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security

    OpenAIRE

    Pal, Shantanu; Khatua, Sunirmal; Chaki, Nabendu; Sanyal, Sugata

    2011-01-01

    In order to determine the user's trust is a growing concern for ensuring privacy and security in a cloud computing environment. In cloud, user's data is stored in one or more remote server(s) which poses more security challenges for the system. One of the most important concerns is to protect user's sensitive information from other users and hackers that may cause data leakage in cloud storage. Having this security challenge in mind, this paper focuses on the development of a more secure clou...

  4. Transient stability enhancement of modern power grid using predictive Wide-Area Monitoring and Control

    Science.gov (United States)

    Yousefian, Reza

    This dissertation presents a real-time Wide-Area Control (WAC) designed based on artificial intelligence for large scale modern power systems transient stability enhancement. The WAC using the measurements available from Phasor Measurement Units (PMUs) at generator buses, monitors the global oscillations in the system and optimally augments the local excitation system of the synchronous generators. The complexity of the power system stability problem along with uncertainties and nonlinearities makes the conventional modeling non-practical or inaccurate. In this work Reinforcement Learning (RL) algorithm on the benchmark of Neural Networks (NNs) is used to map the nonlinearities of the system in real-time. This method different from both the centralized and the decentralized control schemes, employs a number of semi-autonomous agents to collaborate with each other to perform optimal control theory well-suited for WAC applications. Also, to handle the delays in Wide-Area Monitoring (WAM) and adapt the RL toward the robust control design, Temporal Difference (TD) is proposed as a solver for RL problem or optimal cost function. However, the main drawback of such WAC design is that it is challenging to determine if an offline trained network is valid to assess the stability of the power system once the system is evolved to a different operating state or network topology. In order to address the generality issue of NNs, a value priority scheme is proposed in this work to design a hybrid linear and nonlinear controllers. The algorithm so-called supervised RL is based on mixture of experts, where it is initialized by linear controller and as the performance and identification of the RL controller improves in real-time switches to the other controller. This work also focuses on transient stability and develops Lyapunov energy functions for synchronous generators to monitor the stability stress of the system. Using such energies as a cost function guarantees the convergence

  5. Lessons from collaborative governance and sociobiology theories for reinforcing sustained cooperation: a government food security case study.

    Science.gov (United States)

    Montoya, L A; Montoya, I; Sánchez González, O D

    2015-07-01

    This research aimed to understand how cooperation and collaboration work in interagency arrangements using a case study of the public management of food security and nutrition in Bogotá, Colombia. This study explored the available scientific literature on Collaborative Governance within the Public Management body of knowledge and the literature on Cooperation from the Sociobiology field. Then, proposals were developed for testing on the ground through an action-research effort that was documented as a case study. Finally, observations were used to test the proposals and some analytical generalizations were developed. To document the case study, several personal interviews, file reviews and normative reviews were conducted to generate a case study database. Collaboration and cooperation concepts within the framework of interagency public management can be understood as a shared desirable outcome that unites different agencies in committing efforts and resources to the accomplishment of a common goal for society, as seen in obtaining food and nutrition security for a specific territory. Collaboration emerges when the following conditions exist and decreases when they are absent: (1) a strong sponsorship that may come from a central government policy or from a distributed interagency consensus; (2) a clear definition of the participating agencies; (3) stability of the staff assigned to the coordination system; and (4) a fitness function for the staff, some mechanism to reward or punish the collaboration level of each individual in the interagency effort. As this research investigated only one case study, the findings must be taken with care and any generalization made from this study needs to be analytical in nature. Additionally, research must be done to accept these results universally. Food security and nutrition efforts are interagency in nature. For collaboration between agencies to emerge, a minimum set of characteristics that were established during the

  6. Impact of Homeland Security Communities of Learning: Developing a Strategy for Training and Collaboration

    National Research Council Canada - National Science Library

    Braziel, Rick

    2006-01-01

    As the threat of domestic terrorism increases and the demands on Emergency Responders and the public intensify, a more distributed, efficient, and flexible training and collaboration model is needed...

  7. A GIS-assisted approach to wide-area wind resource assessment and site selection for the state of Colorado

    Energy Technology Data Exchange (ETDEWEB)

    Brower, M.C. [Brower & Company, Andover, MA (United States); Hurley, P. [RLA Consulting, Bothell, WA (United States); Simon, R. [Consulting Meteorologist, Mill Valley, CA (United States)

    1996-12-31

    This paper describes the methodology and results of a wide-area wind resource assessment and site selection in Colorado. This was the first phase in a three-part assessment and monitoring program conducted for the State of Colorado Office of Energy Conservation and several collaborating utilities. The objective of this phase was to identify up to 20 candidate sites for evaluation and possible long-term monitoring. This was accomplished using a geographic information system (GIS), which takes into account such factors as topography, existing wind resource data, locations of transmission lines, land cover, and land use. The resulting list of sites recommended for evaluation in Phase 2 of the study includes locations throughout Colorado, but most are in the eastern plains. The GIS wind siting model may be modified and updated in the future as additional information becomes available. 3 figs., 1 tab.

  8. Voltage control and protection in electrical power systems from system components to wide-area control

    CERN Document Server

    Corsi, Sandro

    2015-01-01

    Based on the author’s twenty years of experience, this book shows the practicality of modern, conceptually new, wide area voltage control in transmission and distribution smart grids, in detail. Evidence is given of the great advantages of this approach, as well as what can be gained by new control functionalities which modern technologies now available can provide. The distinction between solutions of wide area voltage regulation (V-WAR) and wide area voltage protection (V-WAP) are presented, demonstrating the proper synergy between them when they operate on the same power system as well as the simplicity and effectiveness of the protection solution in this case. The author provides an overview and detailed descriptions of voltage controls, distinguishing between generalities of underdeveloped, on-field operating applications and modern and available automatic control solutions, which are as yet not sufficiently known or perceived for what they are: practical, high-performance and reliable solutions. At th...

  9. Charting a Security Landscape in the Clouds: Data Protection and Collaboration in Cloud Storage

    Science.gov (United States)

    2016-07-01

    strength of specific cryptographic primitives used such as Advanced Encryption Standard ( AES ); protection of keys and key materials beyond the protocol...Advanced Encryption Standard ( AES ) with a 256-bit key instead of a 128-bit key for example, is not a particularly insightful observation. Rather, this... AES Advanced Encryption Standard TLS/SSL Transport Layer Security/Security Socket Layer 35 REFERENCES [1] International Data Corporation

  10. Cloud-Centric and Logically Isolated Virtual Network Environment Based on Software-Defined Wide Area Network

    Directory of Open Access Journals (Sweden)

    Dongkyun Kim

    2017-12-01

    Full Text Available Recent development of distributed cloud environments requires advanced network infrastructure in order to facilitate network automation, virtualization, high performance data transfer, and secured access of end-to-end resources across regional boundaries. In order to meet these innovative cloud networking requirements, software-defined wide area network (SD-WAN is primarily demanded to converge distributed cloud resources (e.g., virtual machines (VMs in a programmable and intelligent manner over distant networks. Therefore, this paper proposes a logically isolated networking scheme designed to integrate distributed cloud resources to dynamic and on-demand virtual networking over SD-WAN. The performance evaluation and experimental results of the proposed scheme indicate that virtual network convergence time is minimized in two different network models such as: (1 an operating OpenFlow-oriented SD-WAN infrastructure (KREONET-S which is deployed on the advanced national research network in Korea, and (2 Mininet-based experimental and emulated networks.

  11. A Statewide Private Microwave Wide Area Network for Real-time Natural Hazard Monitoring

    Science.gov (United States)

    Williams, M. C.; Kent, G.; Smith, K. D.; Plank, G.; Slater, D.; Torrisi, J.; Presser, R.; Straley, K.

    2013-12-01

    The Nevada Seismological Laboratory (NSL) at the University of Nevada, Reno, operates the Nevada Seismic Network, a collection of ground motion instruments installed throughout Nevada and California, for the purposes of detecting, locating, and notifying the public of earthquakes in the state. To perform these tasks effectively, NSL has designed and built a statewide wireless microwave wide-area network (WAN) in order to receive ground motion data in near real-time. This network consists of radio access points, backhauls, and backbone communication sites transmitting time-series, images, and datalogger diagnostics to our data center servers in Reno. This privately managed communication network greatly reduces the dependence on third-party infrastructure (e.g. commercial cellular networks), and is vital for emergency management response and system uptime. Any individual seismograph or data collection device is networked through a wireless point-to-multipoint connection to a remote access point (AP) using a low-cost radio/routerboard combination. Additional point-to-point connections from AP's to radio backhauls and/or mountaintop backbone sites allow the Data Center in Reno to communicate with and receive data directly from each datalogger. Dataloggers, radios, and routers can be configured using tablets on-site, or via desktop computers at the Data Center. Redundant mountaintop links can be added to the network and facilitate the re-routing of data (similar to a meshed network) in the event of a faulty, failing, or noisy communication site. All routers, radios, and servers, including those at the Data Center, have redundant power and can operate independently in the event of a grid power or public Internet outage. A managed server room at the Data Center processes earthquake data for notifications and acts as a data source for remote users. Consisting of about 500 hosts, and spanning hundreds of miles, this WAN provides network operators access to each router and

  12. Tensions of network security and collaborative work practice: understanding a single sign-on deployment in a regional hospital.

    Science.gov (United States)

    Heckle, Rosa R; Lutters, Wayne G

    2011-08-01

    Healthcare providers and their IT staff, working in an effort to balance appropriate accessibility with stricter security mandates, are considering the use of a single network sign-on approach for authentication and password management. Single sign-on (SSO) promises to improve usability of authentication for multiple-system users, increase compliance, and help curb system maintenance costs. However, complexities are introduced when SSO is placed within a collaborative environment. These complexities include unanticipated workflow implications that introduce greater security vulnerability for the individual user. OBJECTIVES AND METHODOLOGY: In this work, we examine the challenges of implementing a single sign-on authentication technology in a hospital environment. The aim of the study was to document the factors that affected SSO adoption within the context of use. The ultimate goal is to better inform the design of usable authentication systems within collaborative healthcare work sites. The primary data collection techniques used are ethnographically informed - observation, contextual interviews, and document review. The study included a cross-section of individuals from various departments and varying rolls. These participants were a mix of both clinical and administrative staff, as well as the Information Technology group. The field work revealed fundamental mis-matches between the technology and routine work practices that will significantly impact its effective adoption. While single sign-on was effective in the administrative offices, SSO was not a good fit for collaborative areas. The collaborative needs of the clinical staff unearthed tensions in its implementation. An analysis of the findings revealed that the workflow, activities, and physical environment of the clinical areas create increased security vulnerabilities for the individual user. The clinical users were cognizant of these vulnerabilities and this created resistance to the implementation due

  13. Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio Networks

    Science.gov (United States)

    Wang, Wenkai; Li, Husheng; Sun, Yan(Lindsay); Han, Zhu

    2009-12-01

    Cognitive radio is a revolutionary paradigm to migrate the spectrum scarcity problem in wireless networks. In cognitive radio networks, collaborative spectrum sensing is considered as an effective method to improve the performance of primary user detection. For current collaborative spectrum sensing schemes, secondary users are usually assumed to report their sensing information honestly. However, compromised nodes can send false sensing information to mislead the system. In this paper, we study the detection of untrustworthy secondary users in cognitive radio networks. We first analyze the case when there is only one compromised node in collaborative spectrum sensing schemes. Then we investigate the scenario that there are multiple compromised nodes. Defense schemes are proposed to detect malicious nodes according to their reporting histories. We calculate the suspicious level of all nodes based on their reports. The reports from nodes with high suspicious levels will be excluded in decision-making. Compared with existing defense methods, the proposed scheme can effectively differentiate malicious nodes and honest nodes. As a result, it can significantly improve the performance of collaborative sensing. For example, when there are 10 secondary users, with the primary user detection rate being equal to 0.99, one malicious user can make the false alarm rate [InlineEquation not available: see fulltext.] increase to 72%. The proposed scheme can reduce it to 5%. Two malicious users can make [InlineEquation not available: see fulltext.] increase to 85% and the proposed scheme reduces it to 8%.

  14. Wide area monitoring, protection and control systems the enabler for smarter grids

    CERN Document Server

    Vaccaro, Alfredo

    2016-01-01

    This book is designed to give electrical and electronic engineers involved in the design, operation and maintenance of electrical power networks, the knowledge and skills necessary to deploy synchronised measurement technology (SMT) in Wide Area Monitoring, Protection And Control (WAMPAC) applications.

  15. Fault Identification Algorithm Based on Zone-Division Wide Area Protection System

    Directory of Open Access Journals (Sweden)

    Xiaojun Liu

    2014-04-01

    Full Text Available As the power grid becomes more magnified and complicated, wide-area protection system in the practical engineering application is more and more restricted by the communication level. Based on the concept of limitedness of wide-area protection system, the grid with complex structure is divided orderly in this paper, and fault identification and protection action are executed in each divided zone to reduce the pressure of the communication system. In protection zone, a new wide-area protection algorithm based on positive sequence fault components directional comparison principle is proposed. The special associated intelligent electronic devices (IEDs zones which contain buses and transmission lines are created according to the installation location of the IEDs. When a fault occurs, with the help of the fault information collecting and sharing from associated zones with the fault discrimination principle defined in this paper, the IEDs can identify the fault location and remove the fault according to the predetermined action strategy. The algorithm will not be impacted by the load changes and transition resistance and also has good adaptability in open phase running power system. It can be used as a main protection, and it also can be taken into account for the back-up protection function. The results of cases study show that, the division method of the wide-area protection system and the proposed algorithm are effective.

  16. Wide Area Protection Scheme Preventing Cascading Events Caused by Load Flow Transferring

    DEFF Research Database (Denmark)

    Liu, Zhou; Chen, Zhe; Sun, Haishun

    2013-01-01

    Load flow transferring after an initial contingency is regarded as one of the main reasons of causing unexpected cascading trips. A multi agent system (MAS) based wide area protection strategy is proposed in this paper to predict the load flow transferring from the point of view of impedance relays...

  17. Wide Area Protection Scheme Preventing Cascading Events based on Improved Impedance relay

    DEFF Research Database (Denmark)

    Liu, Zhou; Chen, Zhe; Sun, Haishun

    2013-01-01

    Load flow transferring after an initial contingency is regarded as one of the main reasons of causing unexpected cascading trips. A multi agent system (MAS) based wide area protection strategy is proposed in this paper to predict the load flow transferring from the point of view of impedance relays...

  18. The world in a box? Food security, edible insects, and "One World, One Health" collaboration

    NARCIS (Netherlands)

    Yates-Doerr, E.

    2015-01-01

    Scientists in the Netherlands are cultivating edible insects to address concerns of international food security. Committed to the One World, One Health (OWOH) movement, their research aims to create a safe and effective global solution to the conjoined problems of climate change and an increasing

  19. Collaborative Decision Making Process for Complex Defense, Security and Stability Challenges

    NARCIS (Netherlands)

    Bemmel, I.E. van; Eikelboom, A.R.

    2014-01-01

    How to intervene in crises and conflicts? How to cope with complex challenges in the field of defense, security and stability? Questions like these are difficult to answer due to amongst others the involvement of multiple stakeholders that contribute to these complex challenges and need to cooperate

  20. Operating a wide-area remote observing system for the W. M. Keck Observatory

    Science.gov (United States)

    Wirth, Gregory D.; Kibrick, Robert I.; Goodrich, Robert W.; Lyke, James E.

    2008-07-01

    For over a decade, the W. M. Keck Observatory's two 10-meter telescopes have been operated remotely from its Waimea headquarters. Over the last 6 years, WMKO remote observing has expanded to allow teams at dedicated sites in California to observe either in collaboration with colleagues in Waimea or entirely from the U.S. mainland. Once an experimental effort, the Observatory's mainland observing capability is now fully operational, supported on all science instruments (except the interferometer) and regularly used by astronomers at eight mainland sites. Establishing a convenient and secure observing capability from those sites required careful planning to ensure that they are properly equipped and configured. It also entailed a significant investment in hardware and software, including both custom scripts to simplify launching the instrument interface at remote sites and automated routers employing ISDN backup lines to ensure continuation of observing during Internet outages. Observers often wait until shortly before their runs to request use of the mainland facilities. Scheduling these requests and ensuring proper system operation prior to observing requires close coordination between personnel at WMKO and the mainland sites. An established protocol for approving requests and carrying out pre-run checkout has proven useful in ensuring success. The Observatory anticipates enhancing and expanding its remote observing system. Future plans include deploying dedicated summit computers for running VNC server software, implementing a web-based tracking system for mainland-based observing requests, expanding the system to additional mainland sites, and converting to full-time VNC operation for all instruments.

  1. Multi-Organizational Collaborative Public Safety and Security Planning for the 2010 Vancouver Winter Games

    Science.gov (United States)

    2012-10-01

    intermediaries bridging the gap between safety and security officials. The OCS also had the closest relationship to the three main organizations in the...a clearly shared mission and boundary-spanning personnel that are able to bridge organizational cultures and adapt to the complex challenges...commandement et contrôle) et le transfert des connaissances à partir d’événements semblables passés ou en fonction d’événements futurs. Pendant

  2. MSAT wide-area fleet management: End-user requirements and applications

    Science.gov (United States)

    Pedersen, Allister

    1995-01-01

    MSAT (Mobile SATellite) Services will become a reality in North America in 1995. MSAT will provide wide-area voice, data and fax services to land, marine and aeronautical mobile users anywhere in North America including 200 nautical miles off the coasts and into the Arctic waters. MSAT will also convey GPS position information from mobiles to dispatch centers. One broad application of MSAT is Wide Area Fleet Management (WAFM). This paper defines WAFM, outlines end-user requirements and identifies potential applications of MSAT WAFM. The paper draws from information obtained in several preMSAT WAFM field trials in land, marine and aeronautical mobile environments. The paper concludes with an outline of the potential benefits of MSAT WAFM.

  3. Wide Area Coordinated Control of Multi-FACTS Devices to Damp Power System Oscillations

    Directory of Open Access Journals (Sweden)

    Shiyun Xu

    2017-12-01

    Full Text Available Aiming at damping the inter-area oscillations of power systems, the present study proposes a wide-area decentralized coordinated control framework, where the upper-level controller is designed to coordinate the lower-level multiple FACTS devices. Based on the polytopic differential inclusion method, the derived controller adopts a decentralized structure and it is guaranteed to be robust to meet the demand of operation under multiple operating conditions. Since time delay of wide area signal transmission is inevitable, in what follows, the quantum evolution algorithm (QEA method is introduced to find an optimal solution of the time-delay coordinated controller. In this regard, the stability of the system with a prescribed time delay is guaranteed and the system damping ratio is increased. Effectiveness and applicability of the proposed controller design methods have been demonstrated through numerical simulations.

  4. MAP Fault Localization Based on Wide Area Synchronous Phasor Measurement Information

    Science.gov (United States)

    Zhang, Yagang; Wang, Zengping

    2015-02-01

    In the research of complicated electrical engineering, the emergence of phasor measurement units (PMU) is a landmark event. The establishment and application of wide area measurement system (WAMS) in power system has made widespread and profound influence on the safe and stable operation of complicated power system. In this paper, taking full advantage of wide area synchronous phasor measurement information provided by PMUs, we have carried out precise fault localization based on the principles of maximum posteriori probability (MAP). Large numbers of simulation experiments have confirmed that the results of MAP fault localization are accurate and reliable. Even if there are interferences from white Gaussian stochastic noise, the results from MAP classification are also identical to the actual real situation.

  5. Designing for Wide-Area Situation Awareness in Future Power Grid Operations

    Science.gov (United States)

    Tran, Fiona F.

    Power grid operation uncertainty and complexity continue to increase with the rise of electricity market deregulation, renewable generation, and interconnectedness between multiple jurisdictions. Human operators need appropriate wide-area visualizations to help them monitor system status to ensure reliable operation of the interconnected power grid. We observed transmission operations at a control centre, conducted critical incident interviews, and led focus group sessions with operators. The results informed a Work Domain Analysis of power grid operations, which in turn informed an Ecological Interface Design concept for wide-area monitoring. I validated design concepts through tabletop discussions and a usability evaluation with operators, earning a mean System Usability Scale score of 77 out of 90. The design concepts aim to support an operator's complete and accurate understanding of the power grid state, which operators increasingly require due to the critical nature of power grid infrastructure and growing sources of system uncertainty.

  6. Wide-Area Robust Decentralized Coordinated Control of HVDC Power System Based on Polytopic System Theory

    Directory of Open Access Journals (Sweden)

    Shiyun Xu

    2015-01-01

    Full Text Available The present study proposes a hierarchical wide-area decentralized coordinated control framework for HVDC power system that is robust to multiple operating conditions. The upper level wide-area coordinated controller is designed in the form of dynamic output feedback control that coordinates the lower level HVDC supplementary controller, PSS, and SVC. In order to enhance the robustness of the designed controller under various operating conditions, the polytopic model is introduced such that the closed-loop control system can be operated under strong damping mode in virtue of the stability criterion based on damping ratio. Simulation results demonstrate that the proposed controller design algorithm is capable of enhancing the system damping over four different conditions.

  7. Comparative analysis of the application of different Low Power Wide Area Network technologies in power grid

    Science.gov (United States)

    Wang, Hao; Sui, Hong; Liao, Xing; Li, Junhao

    2018-03-01

    Low Power Wide Area Network (LPWAN) technologies developed rapidly in recent years, but the application principle of different LPWAN technologies in power grid is still not clear. This paper gives a comparative analysis of two mainstream LPWAN technologies including NB-IoT and LoRa, and gives an application suggestion of these two LPWAN technologies, which can guide the planning and construction of LPWAN in power grid.

  8. Wide-Area Publish/Subscribe Mobile Resource Discovery Based on IPv6 GeoNetworking

    OpenAIRE

    Noguchi, Satoru; Matsuura, Satoshi; Inomata, Atsuo; Fujikawa, Kazutoshi; Sunahara, Hideki

    2013-01-01

    Resource discovery is an essential function for distributed mobile applications integrated in vehicular communication systems. Key requirements of the mobile resource discovery are wide-area geographic-based discovery and scalable resource discovery not only inside a vehicular ad-hoc network but also through the Internet. While a number of resource discovery solutions have been proposed, most of them have focused on specific scale of network. Furthermore, managing a large number of mobile res...

  9. High-Speed Optical Wide-Area Data-Communication Network

    Science.gov (United States)

    Monacos, Steve P.

    1994-01-01

    Proposed fiber-optic wide-area network (WAN) for digital communication balances input and output flows of data with its internal capacity by routing traffic via dynamically interconnected routing planes. Data transmitted optically through network by wavelength-division multiplexing in synchronous or asynchronous packets. WAN implemented with currently available technology. Network is multiple-ring cyclic shuffle exchange network ensuring traffic reaches its destination with minimum number of hops.

  10. Multiagents-based wide area protection with best-effort adaptive strategy

    Energy Technology Data Exchange (ETDEWEB)

    Zhu, Yongli; Wang, Dewen [North China Electric Power University, Baoding (China); Song, Shaoqun [Fuzhou Electric Power Industry Bureau, Fujian Province (China)

    2009-02-15

    Abstract - Multi-trips of circuit breakers often occur within a short period in a severe blackout, and the tripping usually relates to relays' mal-operations. In fact, when two ore more electric primary devices are isolated by circuit breakers, the settings of most relays to protect their power system are getting infeasible and uncoordinated. Adaptive settings are needed to prevent them from wrong operation. This paper presents an adaptive protection scheme based on wide area information with best-effort protection strategy, and the outline of multiagents and WAN Based Adaptive Protection System (MAWAPS). In the scheme, the best-effort adaptive strategy is used to guarantee the adaptive settings to operate safely and effectively in most situations. The IP/SDH-based wide area network (WAN) is used to realize real-time wide area information exchange in the proposed protection scheme. Adaptive setting algorithms for the second stage zero-sequence current and phase overcurrent relays are proposed, which can provide larger line coverage than traditional relays. Moreover, multiagent techniques and IEC 61850 are employed to realize the fast communication between different agents, and MMS plays a prominent role in real-time remote communication. A simulating system has been developed according to the above ideas and approaches, and the experimental results show that the proposed adaptive protection scheme is feasible from the view of protective performance including the executing time. (author)

  11. Field and long-term demonstration of a wide area quantum key distribution network.

    Science.gov (United States)

    Wang, Shuang; Chen, Wei; Yin, Zhen-Qiang; Li, Hong-Wei; He, De-Yong; Li, Yu-Hu; Zhou, Zheng; Song, Xiao-Tian; Li, Fang-Yi; Wang, Dong; Chen, Hua; Han, Yun-Guang; Huang, Jing-Zheng; Guo, Jun-Fu; Hao, Peng-Lei; Li, Mo; Zhang, Chun-Mei; Liu, Dong; Liang, Wen-Ye; Miao, Chun-Hua; Wu, Ping; Guo, Guang-Can; Han, Zheng-Fu

    2014-09-08

    A wide area quantum key distribution (QKD) network deployed on communication infrastructures provided by China Mobile Ltd. is demonstrated. Three cities and two metropolitan area QKD networks were linked up to form the Hefei-Chaohu-Wuhu wide area QKD network with over 150 kilometers coverage area, in which Hefei metropolitan area QKD network was a typical full-mesh core network to offer all-to-all interconnections, and Wuhu metropolitan area QKD network was a representative quantum access network with point-to-multipoint configuration. The whole wide area QKD network ran for more than 5000 hours, from 21 December 2011 to 19 July 2012, and part of the network stopped until last December. To adapt to the complex and volatile field environment, the Faraday-Michelson QKD system with several stability measures was adopted when we designed QKD devices. Through standardized design of QKD devices, resolution of symmetry problem of QKD devices, and seamless switching in dynamic QKD network, we realized the effective integration between point-to-point QKD techniques and networking schemes.

  12. Final Report "CoDeveloper: A Secure Web-Invocable Collaborative Software Development Tool"

    Energy Technology Data Exchange (ETDEWEB)

    Svetlana Shasharina

    2005-11-27

    Modern scientific simulations generate large datasets at remote sites with appropriate resources (supercomputers and clusters). Bringing these large datasets to the computers of all members of a distributed team of collaborators is often impractical or even impossible: there might not be enough bandwidth, storage capacity or appropriate data analysis and visualization tools locally available. To address the need to access remote data, avoid heavy Internet traffic and unnecessary data replication, Tech-X Corporation developed a tool, which allows running remote data visualization collaboratively and sharing the visualization objects as they get generated. The size of these objects is typically much smaller than the size of the original data. For marketing reasons, we renamed the product CoReViz. The detailed information on this product can be found at http://www.txcorp.com/products/CoReViz/. We installed and tested this tool at multiple machines at Tech-X and on seaborg at NERSC. In what follows, we give a detailed description of this tool.

  13. A sharable cloud-based pancreaticoduodenectomy collaborative database for physicians: emphasis on security and clinical rule supporting.

    Science.gov (United States)

    Yu, Hwan-Jeu; Lai, Hong-Shiee; Chen, Kuo-Hsin; Chou, Hsien-Cheng; Wu, Jin-Ming; Dorjgochoo, Sarangerel; Mendjargal, Adilsaikhan; Altangerel, Erdenebaatar; Tien, Yu-Wen; Hsueh, Chih-Wen; Lai, Feipei

    2013-08-01

    Pancreaticoduodenectomy (PD) is a major operation with high complication rate. Thereafter, patients may develop morbidity because of the complex reconstruction and loss of pancreatic parenchyma. A well-designed database is very important to address both the short-term and long-term outcomes after PD. The objective of this research was to build an international PD database implemented with security and clinical rule supporting functions, which made the data-sharing easier and improve the accuracy of data. The proposed system is a cloud-based application. To fulfill its requirements, the system comprises four subsystems: a data management subsystem, a clinical rule supporting subsystem, a short message notification subsystem, and an information security subsystem. After completing the surgery, the physicians input the data retrospectively, which are analyzed to study factors associated with post-PD common complications (delayed gastric emptying and pancreatic fistula) to validate the clinical value of this system. Currently, this database contains data from nearly 500 subjects. Five medical centers in Taiwan and two cancer centers in Mongolia are participating in this study. A data mining model of the decision tree analysis showed that elderly patients (>76 years) with pylorus-preserving PD (PPPD) have higher proportion of delayed gastric emptying. About the pancreatic fistula, the data mining model of the decision tree analysis revealed that cases with non-pancreaticogastrostomy (PG) reconstruction - body mass index (BMI)>29.65 or PG reconstruction - BMI>23.7 - non-classic PD have higher proportion of pancreatic fistula after PD. The proposed system allows medical staff to collect and store clinical data in a cloud, sharing the data with other physicians in a secure manner to achieve collaboration in research. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  14. Integration of the White Sands Complex into a Wide Area Network

    Science.gov (United States)

    Boucher, Phillip Larry; Horan, Sheila, B.

    1996-01-01

    The NASA White Sands Complex (WSC) satellite communications facility consists of two main ground stations, an auxiliary ground station, a technical support facility, and a power plant building located on White Sands Missile Range. When constructed, terrestrial communication access to these facilities was limited to copper telephone circuits. There was no local or wide area communications network capability. This project incorporated a baseband local area network (LAN) topology at WSC and connected it to NASA's wide area network using the Program Support Communications Network-Internet (PSCN-I). A campus-style LAN is configured in conformance with the International Standards Organization (ISO) Open Systems Interconnect (ISO) model. Ethernet provides the physical and data link layers. Transmission Control Protocol and Internet Protocol (TCP/IP) are used for the network and transport layers. The session, presentation, and application layers employ commercial software packages. Copper-based Ethernet collision domains are constructed in each of the primary facilities and these are interconnected by routers over optical fiber links. The network and each of its collision domains are shown to meet IEEE technical configuration guidelines. The optical fiber links are analyzed for the optical power budget and bandwidth allocation and are found to provide sufficient margin for this application. Personal computers and work stations attached to the LAN communicate with and apply a wide variety of local and remote administrative software tools. The Internet connection provides wide area network (WAN) electronic access to other NASA centers and the world wide web (WWW). The WSC network reduces and simplifies the administrative workload while providing enhanced and advanced inter-communications capabilities among White Sands Complex departments and with other NASA centers.

  15. Emerging Technologies and Techniques for Wide Area Radiological Survey and Remediation

    Energy Technology Data Exchange (ETDEWEB)

    Sutton, M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Zhao, P. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-03-24

    Technologies to survey and decontaminate wide-area contamination and process the subsequent radioactive waste have been developed and implemented following the Chernobyl nuclear power plant release and the breach of a radiological source resulting in contamination in Goiania, Brazil. These civilian examples of radioactive material releases provided some of the first examples of urban radiological remediation. Many emerging technologies have recently been developed and demonstrated in Japan following the release of radioactive cesium isotopes (Cs-134 and Cs-137) from the Fukushima Dai-ichi nuclear power plant in 2011. Information on technologies reported by several Japanese government agencies, such as the Japan Atomic Energy Agency (JAEA), the Ministry of the Environment (MOE) and the National Institute for Environmental Science (NIES), together with academic institutions and industry are summarized and compared to recently developed, deployed and available technologies in the United States. The technologies and techniques presented in this report may be deployed in response to a wide area contamination event in the United States. In some cases, additional research and testing is needed to adequately validate the technology effectiveness over wide areas. Survey techniques can be deployed on the ground or from the air, allowing a range of coverage rates and sensitivities. Survey technologies also include those useful in measuring decontamination progress and mapping contamination. Decontamination technologies and techniques range from non-destructive (e.g., high pressure washing) and minimally destructive (plowing), to fully destructive (surface removal or demolition). Waste minimization techniques can greatly impact the long-term environmental consequences and cost following remediation efforts. Recommendations on technical improvements to address technology gaps are presented together with observations on remediation in Japan.

  16. On the design of a Radio Numerology for 5G Wide Area

    DEFF Research Database (Denmark)

    Berardinelli, Gilberto; Pedersen, Klaus Ingemann; Frederiksen, Frank

    2015-01-01

    A 5th Generation (5G) radio access technology is expected to cope with the relentless increase of the data traffic demand and is meant to accommodate a plethora of services with different requirements. In this paper, we elaborate on the design of the radio numerology for a 5G wide area system...... operating at carrier frequencies below 6 GHz. The main requirements are identified, and their inevitable conflicts are addressed. The proposed numerology options enable low latency with tolerable overhead, while maintaining a common clock with the Long Term Evolution (LTE) radio technology and robustness...

  17. Stochastic Characterization of Communication Network Latency for Wide Area Grid Control Applications.

    Energy Technology Data Exchange (ETDEWEB)

    Ameme, Dan Selorm Kwami [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Guttromson, Ross [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-10-01

    This report characterizes communications network latency under various network topologies and qualities of service (QoS). The characterizations are probabilistic in nature, allowing deeper analysis of stability for Internet Protocol (IP) based feedback control systems used in grid applications. The work involves the use of Raspberry Pi computers as a proxy for a controlled resource, and an ns-3 network simulator on a Linux server to create an experimental platform (testbed) that can be used to model wide-area grid control network communications in smart grid. Modbus protocol is used for information transport, and Routing Information Protocol is used for dynamic route selection within the simulated network.

  18. Development of wide-area radiation monitor using an optical fiber

    International Nuclear Information System (INIS)

    Kawata, Naoki; Kato, Masatoshi; Baba, Mamoru; Yamadera, Akira; Miura, Takako

    2002-01-01

    We have developed a method for radiation distribution measurement by combining an optical fiber of wave-length shift type with a plastic scintillator, and studied its properties to apply as a wide-area radiation monitor. The detector employs two photomultipliers in both ends of the fiber and locate the radiation position by using the difference of light arrival time from scintillators. We tested the detector with gamma-rays and neutrons concerning with the position-response and pulse-height response of the detector. From the experiment, we confirmed the proper operation of the detector and position response with spatial resolution of 30-60 cm

  19. Applied techniques for high bandwidth data transfers across wide area networks

    International Nuclear Information System (INIS)

    Lee, J.; Gunter, D.; Tierney, B.; Allcock, B.; Bester, J.; Bresnahan, J.; Tuecke, S.

    2001-01-01

    Large distributed systems such as Computational/Data Grids require large amounts of data to be co-located with the computing facilities for processing. From their work developing a scalable distributed network cache, the authors have gained experience with techniques necessary to achieve high data throughput over high bandwidth Wide Area Networks (WAN). The authors discuss several hardware and software design techniques, and then describe their application to an implementation of an enhanced FTP protocol called GridFTP. The authors describe results from the Supercomputing 2000 conference

  20. Decentralized Gauss-Newton method for nonlinear least squares on wide area network

    Science.gov (United States)

    Liu, Lanchao; Ling, Qing; Han, Zhu

    2014-10-01

    This paper presents a decentralized approach of Gauss-Newton (GN) method for nonlinear least squares (NLLS) on wide area network (WAN). In a multi-agent system, a centralized GN for NLLS requires the global GN Hessian matrix available at a central computing unit, which may incur large communication overhead. In the proposed decentralized alternative, each agent only needs local GN Hessian matrix to update iterates with the cooperation of neighbors. The detail formulation of decentralized NLLS on WAN is given, and the iteration at each agent is defined. The convergence property of the decentralized approach is analyzed, and numerical results validate the effectiveness of the proposed algorithm.

  1. An implementation and test platform for wide area stability assessment methods

    DEFF Research Database (Denmark)

    Wittrock, Martin Lindholm; Jóhannsson, Hjörtur

    2013-01-01

    Units (PMU) can be very time consuming, especially if the testing procedure is not carried out in a systematic and automatic manner. The test platform overcomes this problem by automatically importing system model parameters, topology and simulation output from a time domain simulation of an instability...... scenario and automatically generating synthetic PMU snapshots of the system conditions. To demonstrate the platform’s potential for supporting research and development of wide area algorithms, a method to detect voltage instability is implemented and tested, giving results consistent with results from...

  2. Real time wide area radiation surveillance system (REWARD) based on 3d silicon and (CD,ZN)Te for neutron and gamma-ray detection

    Science.gov (United States)

    Disch, C.

    2014-09-01

    Mobile surveillance systems are used to find lost radioactive sources and possible nuclear threats in urban areas. The REWARD collaboration [1] aims to develop such a complete radiation monitoring system that can be installed in mobile or stationary setups across a wide area. The scenarios include nuclear terrorism threats, lost radioactive sources, radioactive contamination and nuclear accidents. This paper will show the performance capabilities of the REWARD system in different scnarios. The results include both Monte Carlo simulations as well as neutron and gamma-ray detection performances in terms of efficiency and nuclide identification. The outcomes of several radiation mapping survey with the entire REWARD system will also be presented.

  3. The world in a box? Food security, edible insects, and "One World, One Health" collaboration.

    Science.gov (United States)

    Yates-Doerr, Emily

    2015-03-01

    Scientists in the Netherlands are cultivating edible insects to address concerns of international food security. Committed to the One World, One Health (OWOH) movement, their research aims to create a safe and effective global solution to the conjoined problems of climate change and an increasing worldwide demand for protein. Their preliminary work is promising, as it suggests that when compared to other sources of meat, insects can be an efficient, safe, and low-impact source of nutrients. Additionally, in many sites with endemic malnutrition, people find insects tasty. The problem these scientists are grappling with, however, is that insects that are easily mass-produced are not the insects people typically want to eat. This paper shows how the contingency of edibility complicates existing scientific models of travel that posit that singular objects spread peripherally outwards from a center into a globally connected, singular world. The scientists are finding that the production of successful food products necessitates that insects be constantly tinkered with: there is no "insect" that can be globally edible since "the global" itself is not a singular entity. This in turn complicates the vision of replicability and "scaling up" inherent in an OWOH vision of science. The researchers' process of moving their goods from the laboratory boxes they work with into the mealtime practices they seek to impact is compelling them to cultivate and articulate new ideals for research, methods of translation, and pathways by which goods can travel. They are finding that if they want to affect the health of "the world," they must engage with many different worlds. Copyright © 2014 Elsevier Ltd. All rights reserved.

  4. Probing hot-electron effects in wide area plasmonic surfaces using X-ray photoelectron spectroscopy

    Energy Technology Data Exchange (ETDEWEB)

    Ayas, Sencer; Cupallari, Andi; Dana, Aykutlu, E-mail: aykutlu@unam.bilkent.edu.tr [UNAM Institute of Materials Science and Nanotechnology, Bilkent University, 06800 Ankara (Turkey)

    2014-12-01

    Plasmon enhanced hot carrier formation in metallic nanostructures increasingly attracts attention due to potential applications in photodetection, photocatalysis, and solar energy conversion. Here, hot-electron effects in nanoscale metal-insulator-metal (MIM) structures are investigated using a non-contact X-ray photoelectron spectroscopy based technique using continuous wave X-ray and laser excitations. The effects are observed through shifts of the binding energy of the top metal layer upon excitation with lasers of 445, 532, and 650 nm wavelength. The shifts are polarization dependent for plasmonic MIM grating structures fabricated by electron beam lithography. Wide area plasmonic MIM surfaces fabricated using a lithography free route by the dewetting of evaporated Ag on HfO{sub 2} exhibit polarization independent optical absorption and surface photovoltage. Using a simple model and making several assumptions about the magnitude of the photoemission current, the responsivity and external quantum efficiency of wide area plasmonic MIM surfaces are estimated as 500 nA/W and 11 × 10{sup −6} for 445 nm illumination.

  5. Wide-area service water information management system; Koiki suido joho kanri system

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-01-10

    A wide-area service water system is required to be more resistant to emergency situations, e.g., drought and hazards, and meet consumers' diversifying needs in each area, while stably supplying water at ordinary times by utilizing purification plants located in places within its system and piping networks in the water area. Fuji Electric is providing information management systems for wide-area service water systems, developed based on the company's abundant system know-hows accumulated for a long time and latest techniques. They are characterized by (1) Web monitoring, aided by an intranet system, (2) high-speed data transmission by a digital transmission system, (3) open network environments, and (4) emergency calling of the staff, and management of stock materials. The system allows to monitor operating conditions within the area on real time, needless to say, and business administration with civil minimum taken into consideration, e.g., stabilizing water quality by coordinating the purification plants within the system. (translated by NEDO)

  6. Wide area data replication in an ITER-relevant data environment

    International Nuclear Information System (INIS)

    Centioli, C.; Iannone, F.; Panella, M.; Vitale, V.; Bracco, G.; Guadagni, R.; Migliori, S.; Steffe, M.; Eccher, S.; Maslennikov, A.; Mililotti, M.; Molowny, M.; Palumbo, G.; Carboni, M.

    2005-01-01

    The next generation of tokamak experiments will require a new way of approaching data sharing issues among fusion organizations. In the fusion community, many researchers at different worldwide sites will analyse data produced by International Thermonuclear Experimental Reactor (ITER), wherever it will be built. In this context, an efficient availability of the data in the sites where the computational resources are located becomes a major architectural issue for the deployment of ITER computational infrastructure. The approach described in this paper goes beyond the usual site-centric model mainly devoted to granting access exclusively to experimental data stored at the device sites. To this aim, we propose a new data replication architecture relying on a wide area network, based on a Master/Slave model and on synchronization techniques producing mirrored data sites. In this architecture, data replication will affect large databases (TB) as well as large UNIX-like file systems, using open source-based software components, namely MySQL, as database management system, and RSYNC and BBFTP for data transfer. A test-bed has been set up to evaluate the performance of the software components underlying the proposed architecture. The test-bed hardware layout deploys a cluster of four Dual-Xeon Supermicro each with a raid array of 1 TB. High performance network line (1 Gbit over 400 km) provides the infrastructure to test the components on a wide area network. The results obtained will be thoroughly discussed

  7. Demonstration of a Novel Synchrophasor-based Situational Awareness System: Wide Area Power System Visualization, On-line Event Replay and Early Warning of Grid Problems

    Energy Technology Data Exchange (ETDEWEB)

    Rosso, A.

    2012-12-31

    Since the large North Eastern power system blackout on August 14, 2003, U.S. electric utilities have spent lot of effort on preventing power system cascading outages. Two of the main causes of the August 14, 2003 blackout were inadequate situational awareness and inadequate operator training In addition to the enhancements of the infrastructure of the interconnected power systems, more research and development of advanced power system applications are required for improving the wide-area security monitoring, operation and planning in order to prevent large- scale cascading outages of interconnected power systems. It is critically important for improving the wide-area situation awareness of the operators or operational engineers and regional reliability coordinators of large interconnected systems. With the installation of large number of phasor measurement units (PMU) and the related communication infrastructure, it will be possible to improve the operators’ situation awareness and to quickly identify the sequence of events during a large system disturbance for the post-event analysis using the real-time or historical synchrophasor data. The purpose of this project was to develop and demonstrate a novel synchrophasor-based comprehensive situational awareness system for control centers of power transmission systems. The developed system named WASA (Wide Area Situation Awareness) is intended to improve situational awareness at control centers of the power system operators and regional reliability coordinators. It consists of following main software modules: • Wide-area visualizations of real-time frequency, voltage, and phase angle measurements and their contour displays for security monitoring. • Online detection and location of a major event (location, time, size, and type, such as generator or line outage). • Near-real-time event replay (in seconds) after a major event occurs. • Early warning of potential wide-area stability problems. The system has been

  8. Multiagent System-Based Wide-Area Protection and Control Scheme against Cascading Events

    DEFF Research Database (Denmark)

    Liu, Zhou; Chen, Zhe; Sun, Haishun

    2015-01-01

    In this paper, a multi agent system (MAS) based wide area protection and control scheme is proposed to deal with the long term voltage instability induced cascading trips. Based on sensitivity analysis between the relay operation margin and power system state variables, an optimal emergency control...... strategy is defined to adjust the emergency states timely and prevent the unexpected relay trips. In order to supervise the control process and further minimize the load loss, an agent based process control is adopted to monitor the states of distributed controllers and adjust the emergency control...... strategy. A hybrid simulation platform based on LabVIEW and real time digital simulator (RTDS) is set up to simulate a blackout case in the power system of Eastern Denmark and to demonstrate the effectiveness of the proposed MAS based protection strategy....

  9. Sensor-Aware Recognition and Tracking for Wide-Area Augmented Reality on Mobile Phones

    Science.gov (United States)

    Chen, Jing; Cao, Ruochen; Wang, Yongtian

    2015-01-01

    Wide-area registration in outdoor environments on mobile phones is a challenging task in mobile augmented reality fields. We present a sensor-aware large-scale outdoor augmented reality system for recognition and tracking on mobile phones. GPS and gravity information is used to improve the VLAD performance for recognition. A kind of sensor-aware VLAD algorithm, which is self-adaptive to different scale scenes, is utilized to recognize complex scenes. Considering vision-based registration algorithms are too fragile and tend to drift, data coming from inertial sensors and vision are fused together by an extended Kalman filter (EKF) to achieve considerable improvements in tracking stability and robustness. Experimental results show that our method greatly enhances the recognition rate and eliminates the tracking jitters. PMID:26690439

  10. Study of the wide area of a lake with remote sensing

    Science.gov (United States)

    Lazaridou, Maria A.; Karagianni, Aikaterini C.

    2016-08-01

    Water bodies are particularly important for environment and development issues. Their study requires multiple information. Remote sensing has been proven useful in the above study. This paper concerns the wide area of Lake Orestiada in the region of Western Macedonia in Greece. The area is of particular interest because Lake Orestiada is included in the Natura 2000 network and is surrounded by diverse landcovers as built up areas and agricultural land. Multispectral and thermal Landsat 5 satellite images of two time periods are being used. Their processing is being done by Erdas Imagine software. The general physiognomy of the area and the lake shore are examined after image enhancement techniques and image interpretation. Directions of the study concern geomorphological aspects, land covers, estimation of surface temperature as well as changes through time.

  11. Prospects for the introduction of Wide Area Monitoring Using Environmental Sampling

    International Nuclear Information System (INIS)

    Wogman, N.A.

    2013-01-01

    Nuclear proliferation signatures released to the environment must be collected and distinguished from primordial and man-made backgrounds in soils, sediments, air, and surface and underground water. The delay time between the nuclear proliferation emissions and the date of the Wide-Area Environmental Sampling (WAES) analysis will determine which radionuclides would be analyzed based upon their half-lives. Various sampling and analysis technologies have been considered here for application to a WAES. Sampling procedures and equipment discussed are aimed at aquatic, airborne particulate, gas, vegetation, sediment and/or soil, and fauna media. Specific procedures must be selected based upon the application scenario; for example, sampling in the northern latitudes under freezing conditions, sampling at the equator under tropical rain-forest conditions, sampling in the mid-latitudes under desert conditions, and sampling in the marine environment require different equipment and procedures. The paper is followed by the slides of the presentation

  12. Applied techniques for high bandwidth data transfers across wide area networks

    International Nuclear Information System (INIS)

    Lee, Jason; Gunter, Dan; Tierney, Brian; Allcock, Bill; Bester, Joe; Bresnahan, John; Tuecke, Steve

    2001-01-01

    Large distributed systems such as Computational/Data Grids require large amounts of data to be co-located with the computing facilities for processing. Ensuring that the data is there in time for the computation in today's Internet is a massive problem. From our work developing a scalable distributed network cache, we have gained experience with techniques necessary to achieve high data throughput over high bandwidth Wide Area Networks (WAN). In this paper, we discuss several hardware and software design techniques and issues, and then describe their application to an implementation of an enhanced FTP protocol called GridFTP. We also describe results from two applications using these techniques, which were obtained at the Supercomputing 2000 conference

  13. Development of wide area reaction system for Reel-to-Reel TFA-MOD process

    International Nuclear Information System (INIS)

    Nomoto, Sukeharu; Aoki, Yuji; Teranishi, Ryo; Sato, Akihiro; Izumi, Teruo; Shiohara, Yuh

    2006-01-01

    The previously developed numerical simulation method for the TFA-MOD process, which calculated the YBCO growth kinetics, gas element diffusion and gas flow, was applied to study the suitable gas flow mode for a multi-turning Reel-to-Reel tape conveyance system of a long YBCO coated conductors. The high YBCO production rate with uniform J c distribution among tape lines is desired in the system. It was found by the numerical simulation for the vertical gas flow onto the tape surface to realize the above demands even in a wider reaction area. We developed a new wide area reaction tube for the Reel-to-Reel TFA-MOD process according to the numerically designed gas flow configuration. The demand for the new tube was confirmed to be satisfied by experiments

  14. Novel approach for all-optical packet switching in wide-area networks

    Science.gov (United States)

    Chlamtac, Imrich; Fumagalli, Andrea F.; Wedzinga, Gosse

    1998-09-01

    All-optical Wavelength Division Multiplexing (WDM) networks are believed to be a fundamental component in future high speed backbones. However, while wavelength routing made circuit switching in WDM feasible the reality of extant optical technology does not yet provide the necessary devices to achieve individual optical packet switching. This paper proposes to achieve all-optical packet switching in WDM Wide Area Networks (WANs) via a novel technique, called slot routing. Using slot routing, entire slots, each carrying multiple packets on distinct wavelengths, are switched transparently and individually. As a result packets can be optically transmitted and switched in the network using available fast and wavelength non-sensitive devices. The proposed routing technique leads to an optical packet switching solution, that is simple, practical, and unique as it makes it possible to build a WDM all-optical WAN with optical devices based on proven technologies.

  15. Event Based Simulator for Parallel Computing over the Wide Area Network for Real Time Visualization

    Science.gov (United States)

    Sundararajan, Elankovan; Harwood, Aaron; Kotagiri, Ramamohanarao; Satria Prabuwono, Anton

    As the computational requirement of applications in computational science continues to grow tremendously, the use of computational resources distributed across the Wide Area Network (WAN) becomes advantageous. However, not all applications can be executed over the WAN due to communication overhead that can drastically slowdown the computation. In this paper, we introduce an event based simulator to investigate the performance of parallel algorithms executed over the WAN. The event based simulator known as SIMPAR (SIMulator for PARallel computation), simulates the actual computations and communications involved in parallel computation over the WAN using time stamps. Visualization of real time applications require steady stream of processed data flow for visualization purposes. Hence, SIMPAR may prove to be a valuable tool to investigate types of applications and computing resource requirements to provide uninterrupted flow of processed data for real time visualization purposes. The results obtained from the simulation show concurrence with the expected performance using the L-BSP model.

  16. Midterm Stability Evaluation of Wide-area Power System by using Synchronized Phasor Measurements

    Science.gov (United States)

    Ota, Yutaka; Ukai, Hiroyuki; Nakamura, Koichi; Fujita, Hideki

    In recent years, the PMU (Phasor Measurement Unit) receives a great deal of attention as a synchronized measurement system of power systems. Synchronized phasor angles obtained by the PMU provide the effective information for evaluating the stability of a bulk power system. The aspect of instability phenomena during midterm tends to be more complicated, and the stability analysis using the synchronized phasor measurements is significant in order to keep a complicated power system stable. This paper proposes a midterm stability evaluation method of the wide-area power system by using the synchronized phasor measurements. By clustering and aggregating the power system to some coherent groups, the step-out is effectively predicted on the basis of the two-machine equivalent power system model. The midterm stability of a longitudinal power system model of Japanese 60Hz systems constructed by the PSA, which is a hybrid-type power system simulator, is practically evaluated using the proposed method.

  17. Damping of Inter-Area Low Frequency Oscillation Using an Adaptive Wide-Area Damping Controller

    DEFF Research Database (Denmark)

    Yao, Wei; Jiang, L.; Fang, Jiakun

    2013-01-01

    This paper presents an adaptive wide-area damping controller (WADC) based on generalized predictive control (GPC) and model identification for damping the inter-area low frequency oscillations in large-scale inter-connected power system. A recursive least-squares algorithm (RLSA) with a varying...... forgetting factor is applied to identify online the reduced-order linearlized model which contains dominant inter-area low frequency oscillations. Based on this linearlized model, the generalized predictive control scheme considering control output constraints is employed to obtain the optimal control signal...... conditions and different disturbances, but also has better robustness against to the time delay existing in the remote signals. The comparison studies with the conventional lead-lag WADC are also provided....

  18. Reflectance of Biological Turbid Tissues under Wide Area Illumination: Single Backward Scattering Approach

    Directory of Open Access Journals (Sweden)

    Guennadi Saiko

    2014-01-01

    Full Text Available Various scenarios of light propagation paths in turbid media (single backward scattering, multiple backward scattering, banana shape are discussed and their contributions to reflectance spectra are estimated. It has been found that a single backward or multiple forward scattering quasi-1D paths can be the major contributors to reflected spectra in wide area illumination scenario. Such a single backward scattering (SBS approximation allows developing of an analytical approach which can take into account refractive index mismatched boundary conditions and multilayer geometry and can be used for real-time spectral processing. The SBS approach can be potentially applied for the distances between the transport and reduced scattering domains. Its validation versus the Kubelka-Munk model, path integrals, and diffusion approximation of the radiation transport theory is discussed.

  19. Sensor-Aware Recognition and Tracking for Wide-Area Augmented Reality on Mobile Phones.

    Science.gov (United States)

    Chen, Jing; Cao, Ruochen; Wang, Yongtian

    2015-12-10

    Wide-area registration in outdoor environments on mobile phones is a challenging task in mobile augmented reality fields. We present a sensor-aware large-scale outdoor augmented reality system for recognition and tracking on mobile phones. GPS and gravity information is used to improve the VLAD performance for recognition. A kind of sensor-aware VLAD algorithm, which is self-adaptive to different scale scenes, is utilized to recognize complex scenes. Considering vision-based registration algorithms are too fragile and tend to drift, data coming from inertial sensors and vision are fused together by an extended Kalman filter (EKF) to achieve considerable improvements in tracking stability and robustness. Experimental results show that our method greatly enhances the recognition rate and eliminates the tracking jitters.

  20. Sensor-Aware Recognition and Tracking for Wide-Area Augmented Reality on Mobile Phones

    Directory of Open Access Journals (Sweden)

    Jing Chen

    2015-12-01

    Full Text Available Wide-area registration in outdoor environments on mobile phones is a challenging task in mobile augmented reality fields. We present a sensor-aware large-scale outdoor augmented reality system for recognition and tracking on mobile phones. GPS and gravity information is used to improve the VLAD performance for recognition. A kind of sensor-aware VLAD algorithm, which is self-adaptive to different scale scenes, is utilized to recognize complex scenes. Considering vision-based registration algorithms are too fragile and tend to drift, data coming from inertial sensors and vision are fused together by an extended Kalman filter (EKF to achieve considerable improvements in tracking stability and robustness. Experimental results show that our method greatly enhances the recognition rate and eliminates the tracking jitters.

  1. TWENTIES Project. Wind power for wide-area control of the grid

    Energy Technology Data Exchange (ETDEWEB)

    Perez, Juan Carlos; Combarros, Clara; Veguillas, Roberto; Hermosa, Mikel Joseba [Iberdrola Renovables, Madrid (Spain); Rubio, David [Iberdrola Ingenieria y Construccion (Spain); Egido, Ignacio [Comillas Univ. (ES). Inst. de Investigacion Tecnologica (IIT)

    2011-07-01

    Europe faces a great challenge with the 2020 scenario in which the renewable energy installed capacity in Europe should increase from its present value of approximately 80 GW to 230 GW in 2020. The future high penetration levels of wind and other renewable energies in the power system require decision makers and stakeholders of the electrical sector to work together to develop new ancillary services and to make the necessary changes to the grid infrastructure in Europe. This background is in line with the SYSERWIND demonstration lead by Iberdrola Renovables and included in the TWENTIES project, with three more partners taking part in this package: Red Electrica de Espana (REE), IIT and Gamesa Eolica. This paper introduces a first phase of preliminary work to define, install and test a Secondary Frequency Control and a Voltage Management System in a wide area, along a transport line. (orig.)

  2. KOLAM: a cross-platform architecture for scalable visualization and tracking in wide-area imagery

    Science.gov (United States)

    Fraser, Joshua; Haridas, Anoop; Seetharaman, Guna; Rao, Raghuveer M.; Palaniappan, Kannappan

    2013-05-01

    KOLAM is an open, cross-platform, interoperable, scalable and extensible framework supporting a novel multi- scale spatiotemporal dual-cache data structure for big data visualization and visual analytics. This paper focuses on the use of KOLAM for target tracking in high-resolution, high throughput wide format video also known as wide-area motion imagery (WAMI). It was originally developed for the interactive visualization of extremely large geospatial imagery of high spatial and spectral resolution. KOLAM is platform, operating system and (graphics) hardware independent, and supports embedded datasets scalable from hundreds of gigabytes to feasibly petabytes in size on clusters, workstations, desktops and mobile computers. In addition to rapid roam, zoom and hyper- jump spatial operations, a large number of simultaneously viewable embedded pyramid layers (also referred to as multiscale or sparse imagery), interactive colormap and histogram enhancement, spherical projection and terrain maps are supported. The KOLAM software architecture was extended to support airborne wide-area motion imagery by organizing spatiotemporal tiles in very large format video frames using a temporal cache of tiled pyramid cached data structures. The current version supports WAMI animation, fast intelligent inspection, trajectory visualization and target tracking (digital tagging); the latter by interfacing with external automatic tracking software. One of the critical needs for working with WAMI is a supervised tracking and visualization tool that allows analysts to digitally tag multiple targets, quickly review and correct tracking results and apply geospatial visual analytic tools on the generated trajectories. One-click manual tracking combined with multiple automated tracking algorithms are available to assist the analyst and increase human effectiveness.

  3. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment

    OpenAIRE

    Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran

    2013-01-01

    Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation’s electric grid and other critical infrastructures. Specifically, this paper discusses cy...

  4. Wide-area decontamination in an urban environment after radiological dispersion: A review and perspectives

    International Nuclear Information System (INIS)

    Kaminski, Michael D.; Lee, Sang Don; Magnuson, Matthew

    2016-01-01

    Highlights: • We review wide area, urban decontamination techniques for rapid response. • We examine historical data and its application to radiological terrorism scenario. • Data is insufficient to ensure a detailed, organized mitigation response. • Primary deficit is lessons-learned and relations to extrapolate a limited data set. • Research is needed to model a mitigation response and help guide data gathering. - Abstract: Nuclear or radiological terrorism in the form of uncontrolled radioactive contamination presents a unique challenge in the field of nuclear decontamination. Potential targets require an immediate decontamination response, or mitigation plan to limit the social and economic impact. To date, experience with urban decontamination of building materials – specifically hard, porous, external surfaces – is limited to nuclear weapon fallout and nuclear reactor accidents. Methods are lacking for performing wide-area decontamination in an urban environment so that in all release scenarios the area may be re-occupied without evaluation and/or restriction. Also lacking is experience in developing mitigation strategies, that is, methods of mitigating contamination and its resultant radiation dose in key areas during the immediate aftermath of an event and after lifesaving operations. To date, the tremendous strategy development effort primarily by the European community has focused on the recovery phase, which extends years beyond the release event. In this review, we summarize the methods and data collected over the past 70 years in the field of hard, external surface decontamination of radionuclide contaminations, with emphasis on methods suitable for response to radiological dispersal devices and their potentially unique physico-chemical characteristics. This review concludes that although a tremendous amount of work has been completed primarily by the European Community (EU) and the United Kingdom (UK), the few studies existing on each

  5. Wide-area decontamination in an urban environment after radiological dispersion: A review and perspectives

    Energy Technology Data Exchange (ETDEWEB)

    Kaminski, Michael D., E-mail: Kaminski@anl.gov [Nuclear Decontamination and Separations, Nuclear Engineering Division, Argonne National Laboratory (United States); Lee, Sang Don; Magnuson, Matthew [US Environmental Protection Agency, Office of Research and Development, National Homeland Security Research Center (United States)

    2016-03-15

    Highlights: • We review wide area, urban decontamination techniques for rapid response. • We examine historical data and its application to radiological terrorism scenario. • Data is insufficient to ensure a detailed, organized mitigation response. • Primary deficit is lessons-learned and relations to extrapolate a limited data set. • Research is needed to model a mitigation response and help guide data gathering. - Abstract: Nuclear or radiological terrorism in the form of uncontrolled radioactive contamination presents a unique challenge in the field of nuclear decontamination. Potential targets require an immediate decontamination response, or mitigation plan to limit the social and economic impact. To date, experience with urban decontamination of building materials – specifically hard, porous, external surfaces – is limited to nuclear weapon fallout and nuclear reactor accidents. Methods are lacking for performing wide-area decontamination in an urban environment so that in all release scenarios the area may be re-occupied without evaluation and/or restriction. Also lacking is experience in developing mitigation strategies, that is, methods of mitigating contamination and its resultant radiation dose in key areas during the immediate aftermath of an event and after lifesaving operations. To date, the tremendous strategy development effort primarily by the European community has focused on the recovery phase, which extends years beyond the release event. In this review, we summarize the methods and data collected over the past 70 years in the field of hard, external surface decontamination of radionuclide contaminations, with emphasis on methods suitable for response to radiological dispersal devices and their potentially unique physico-chemical characteristics. This review concludes that although a tremendous amount of work has been completed primarily by the European Community (EU) and the United Kingdom (UK), the few studies existing on each

  6. The global lambda visualization facility: An international ultra-high-definition wide-area visualization collaboratory

    Science.gov (United States)

    Leigh, J.; Renambot, L.; Johnson, Aaron H.; Jeong, B.; Jagodic, R.; Schwarz, N.; Svistula, D.; Singh, R.; Aguilera, J.; Wang, X.; Vishwanath, V.; Lopez, B.; Sandin, D.; Peterka, T.; Girado, J.; Kooima, R.; Ge, J.; Long, L.; Verlo, A.; DeFanti, T.A.; Brown, M.; Cox, D.; Patterson, R.; Dorn, P.; Wefel, P.; Levy, S.; Talandis, J.; Reitzer, J.; Prudhomme, T.; Coffin, T.; Davis, B.; Wielinga, P.; Stolk, B.; Bum, Koo G.; Kim, J.; Han, S.; Corrie, B.; Zimmerman, T.; Boulanger, P.; Garcia, M.

    2006-01-01

    The research outlined in this paper marks an initial global cooperative effort between visualization and collaboration researchers to build a persistent virtual visualization facility linked by ultra-high-speed optical networks. The goal is to enable the comprehensive and synergistic research and development of the necessary hardware, software and interaction techniques to realize the next generation of end-user tools for scientists to collaborate on the global Lambda Grid. This paper outlines some of the visualization research projects that were demonstrated at the iGrid 2005 workshop in San Diego, California.

  7. Wide area measurement system for smart grid applications involving hybrid energy sources

    Energy Technology Data Exchange (ETDEWEB)

    Amin, Mahmoud M.; Moussa, Heba B.; Mohammed, Osama A. [Florida International University, Energy Systems Research Laboratory, Department of Electrical and Computer Engineering, Miami, FL (United States)

    2012-03-15

    This paper presents a model and experimental verification for a complete scenario of a proposed wide area measurement system (WAMS) based on synchronized phasor measurement units (PMUs). The proposed system is feasible for hybrid smart ac/dc power networks; such as grid-connected PV-power plants. The purpose is to increase the overall system reliability for all power stages via significant dependence on WAMS as distributed intelligence agents with improved monitoring, protection, and control capabilities of the power networks. The developed system is simulated in the Matlab/Simulink environment. The system was tested under two different cases; normal operation and fault state. Furthermore, the proposed WAMS was experimentally validated with results obtained from a reduced scale setup which built and tested in the laboratory based on the Hardware-in-the-loop concept. It was verified that the power system status can be easily monitored and controlled in real time by using the measured bus data in real time. This improves the overall system reliability and avoids cascaded blackout during fault occurrence. The simulation and experimental results confirm the validity of the proposed WAMS technology for smart grid applications. (orig.)

  8. A Unified Model for BDS Wide Area and Local Area Augmentation Positioning Based on Raw Observations

    Directory of Open Access Journals (Sweden)

    Rui Tu

    2017-03-01

    Full Text Available In this study, a unified model for BeiDou Navigation Satellite System (BDS wide area and local area augmentation positioning based on raw observations has been proposed. Applying this model, both the Real-Time Kinematic (RTK and Precise Point Positioning (PPP service can be realized by performing different corrections at the user end. This algorithm was assessed and validated with the BDS data collected at four regional stations from Day of Year (DOY 080 to 083 of 2016. When the users are located within the local reference network, the fast and high precision RTK service can be achieved using the regional observation corrections, revealing a convergence time of about several seconds and a precision of about 2–3 cm. For the users out of the regional reference network, the global broadcast State-Space Represented (SSR corrections can be utilized to realize the global PPP service which shows a convergence time of about 25 min for achieving an accuracy of 10 cm. With this unified model, it can not only integrate the Network RTK (NRTK and PPP into a seamless positioning service, but also recover the ionosphere Vertical Total Electronic Content (VTEC and Differential Code Bias (DCB values that are useful for the ionosphere monitoring and modeling.

  9. Analysis of RDSS positioning accuracy based on RNSS wide area differential technique

    Science.gov (United States)

    Xing, Nan; Su, RanRan; Zhou, JianHua; Hu, XiaoGong; Gong, XiuQiang; Liu, Li; He, Feng; Guo, Rui; Ren, Hui; Hu, GuangMing; Zhang, Lei

    2013-10-01

    The BeiDou Navigation Satellite System (BDS) provides Radio Navigation Service System (RNSS) as well as Radio Determination Service System (RDSS). RDSS users can obtain positioning by responding the Master Control Center (MCC) inquiries to signal transmitted via GEO satellite transponder. The positioning result can be calculated with elevation constraint by MCC. The primary error sources affecting the RDSS positioning accuracy are the RDSS signal transceiver delay, atmospheric trans-mission delay and GEO satellite position error. During GEO orbit maneuver, poor orbit forecast accuracy significantly impacts RDSS services. A real-time 3-D orbital correction method based on wide-area differential technique is raised to correct the orbital error. Results from the observation shows that the method can successfully improve positioning precision during orbital maneuver, independent from the RDSS reference station. This improvement can reach 50% in maximum. Accurate calibration of the RDSS signal transceiver delay precision and digital elevation map may have a critical role in high precise RDSS positioning services.

  10. Ground target geolocation based on digital elevation model for airborne wide-area reconnaissance system

    Science.gov (United States)

    Qiao, Chuan; Ding, Yalin; Xu, Yongsen; Xiu, Jihong

    2018-01-01

    To obtain the geographical position of the ground target accurately, a geolocation algorithm based on the digital elevation model (DEM) is developed for an airborne wide-area reconnaissance system. According to the platform position and attitude information measured by the airborne position and orientation system and the gimbal angles information from the encoder, the line-of-sight pointing vector in the Earth-centered Earth-fixed coordinate frame is solved by the homogeneous coordinate transformation. The target longitude and latitude can be solved with the elliptical Earth model and the global DEM. The influences of the systematic error and measurement error on ground target geolocation calculation accuracy are analyzed by the Monte Carlo method. The simulation results show that this algorithm can improve the geolocation accuracy of ground target in rough terrain area obviously. The geolocation accuracy of moving ground target can be improved by moving average filtering (MAF). The validity of the geolocation algorithm is verified by the flight test in which the plane flies at a geodetic height of 15,000 m and the outer gimbal angle is <47°. The geolocation root mean square error of the target trajectory is <45 and <7 m after MAF.

  11. Wide Area Network Access to CMS Data Using the Lustre Filesystem

    CERN Document Server

    Rodríguez, J L; Prescott, C; Wu, Y; Kim, B; Fu, Y; Bourilkov, D; Avery, P

    2009-01-01

    In this paper, we explore the use of the Lustre cluster filesystem over the wide area network to access Compact Muon Solenoid (CMS) data stored on physical devices located hundreds of kilometres away. We describe the experimental testbed and report on the I/O performance of applications writing and reading data on the distributed Lustre filesystem established across the WAN. We compare the I/O performance of a CMS application to the performance obtained with IOzone, a standard benchmark tool. We then examine the I/O performance of the CMS application running multiple processes on a single server. And compare the Lustre results to results obtained on data stored on local filesystems. Our measurements reveal that the IOzone benchmark tool, accessing data sequentially, can saturate the Gbps network link that connects our Lustre client in Miami Florida to the Lustre storage located in Gainesville, Florida. We also find that the I/O rates of the CMS application is significantly less than what can be obtained with ...

  12. Wide area network access to CMS data using the LustreTM filesystem

    Science.gov (United States)

    Rodriguez, J. L.; Avery, P.; Brody, T.; Bourilkov, D.; Fu, Y.; Kim, B.; Prescott, C.; Wu, Y.

    2010-04-01

    In this paper, we explore the use of the LustreTM cluster filesystem over the wide area network to access Compact Muon Solenoid (CMS) data stored on physical devices located hundreds of kilometres away. We describe the experimental testbed and report on the I/O performance of applications writing and reading data on the distributed LustreTM filesystem established across the WAN. We compare the I/O performance of a CMS application to the performance obtained with IOzone, a standard benchmark tool. We then examine the I/O performance of the CMS application running multiple processes on a single server. And compare the Lustre results to results obtained on data stored on local filesystems. Our measurements reveal that the IOzone benchmark tool, accessing data sequentially, can saturate the Gbps network link that connects our Lustre client in Miami Florida to the Lustre storage located in Gainesville, Florida. We also find that the I/O rates of the CMS application is significantly less than what can be obtained with IOzone for sequential access to data.

  13. Experiments and Analyses of Data Transfers Over Wide-Area Dedicated Connections

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Nageswara S. [ORNL; Liu, Qiang [ORNL; Sen, Satyabrata [ORNL; Hanley, Jesse A. [ORNL; Foster, Ian [University of Chicago; Kettimuthu, R. [Argonne National Laboratory (ANL); Wu, Qishi [University of Memphis; Yun, Daqing [Harrisburg University; Towsley, Don [University of Massachusetts, Amherst; Vardoyan, Gayane [University of Massachusetts, Amherst

    2017-08-01

    Dedicated wide-area network connections are increasingly employed in high-performance computing and big data scenarios. One might expect the performance and dynamics of data transfers over such connections to be easy to analyze due to the lack of competing traffic. However, non-linear transport dynamics and end-system complexities (e.g., multi-core hosts and distributed filesystems) can in fact make analysis surprisingly challenging. We present extensive measurements of memory-to-memory and disk-to-disk file transfers over 10 Gbps physical and emulated connections with 0–366 ms round trip times (RTTs). For memory-to-memory transfers, profiles of both TCP and UDT throughput as a function of RTT show concave and convex regions; large buffer sizes and more parallel flows lead to wider concave regions, which are highly desirable. TCP and UDT both also display complex throughput dynamics, as indicated by their Poincare maps and Lyapunov exponents. For disk-to-disk transfers, we determine that high throughput can be achieved via a combination of parallel I/O threads, parallel network threads, and direct I/O mode. Our measurements also show that Lustre filesystems can be mounted over long-haul connections using LNet routers, although challenges remain in jointly optimizing file I/O and transport method parameters to achieve peak throughput.

  14. Grid-optimized Web 3D applications on wide area network

    Science.gov (United States)

    Wang, Frank; Helian, Na; Meng, Lingkui; Wu, Sining; Zhang, Wen; Guo, Yike; Parker, Michael Andrew

    2008-08-01

    Geographical information system has come into the Web Service times now. In this paper, Web3D applications have been developed based on our developed Gridjet platform, which provides a more effective solution for massive 3D geo-dataset sharing in distributed environments. Web3D services enabling web users could access the services as 3D scenes, virtual geographical environment and so on. However, Web3D services should be shared by thousands of essential users that inherently distributed on different geography locations. Large 3D geo-datasets need to be transferred to distributed clients via conventional HTTP, NFS and FTP protocols, which often encounters long waits and frustration in distributed wide area network environments. GridJet was used as the underlying engine between the Web 3D application node and geo-data server that utilizes a wide range of technologies including the one of paralleling the remote file access, which is a WAN/Grid-optimized protocol and provides "local-like" accesses to remote 3D geo-datasets. No change in the way of using software is required since the multi-streamed GridJet protocol remains fully compatible with existing IP infrastructures. Our recent progress includes a real-world test that Web3D applications as Google Earth over the GridJet protocol beats those over the classic ones by a factor of 2-7 where the transfer distance is over 10,000 km.

  15. Wide area network access to CMS data using the LustreTM filesystem

    International Nuclear Information System (INIS)

    Rodriguez, J L; Brody, T; Avery, P; Bourilkov, D; Fu, Y; Kim, B; Wu, Y; Prescott, C

    2010-01-01

    In this paper, we explore the use of the Lustre TM cluster filesystem over the wide area network to access Compact Muon Solenoid (CMS) data stored on physical devices located hundreds of kilometres away. We describe the experimental testbed and report on the I/O performance of applications writing and reading data on the distributed Lustre TM filesystem established across the WAN. We compare the I/O performance of a CMS application to the performance obtained with IOzone, a standard benchmark tool. We then examine the I/O performance of the CMS application running multiple processes on a single server. And compare the Lustre results to results obtained on data stored on local filesystems. Our measurements reveal that the IOzone benchmark tool, accessing data sequentially, can saturate the Gbps network link that connects our Lustre client in Miami Florida to the Lustre storage located in Gainesville, Florida. We also find that the I/O rates of the CMS application is significantly less than what can be obtained with IOzone for sequential access to data.

  16. Frequency Monitoring and Control during Power System Restoration Based on Wide Area Measurement System

    Directory of Open Access Journals (Sweden)

    Saber Nourizadeh

    2011-01-01

    Full Text Available Frequency control during power system restoration has not been strongly addressed. Operators are often concerned with the offline sizing of load and generation steps, but, nowadays, the introduction of Wide Area Measurement System (WAMS makes it possible to monitor the stability of power system online. The constraints of WAMS operation result in some changes in power system frequency control. This paper proposes a novel methodology for frequency control and monitoring during the early steps of power system restoration based on WAMS. Detailed load modeling is achieved based on the static load modeling approach. Power generators' modeling is also accomplished utilizing the single machine equivalent of the power system based on PMU measurements. Simulation results of the presented methodology on the 39 bus New England power system clearly show the effectiveness and applicability of the proposed method. The simulation results show that the presented approach has a completely acceptable precision and an outstanding speed with less than 0.05% error. The outstanding speed of the presented approach along with the result precision will result in a great promotion in power system restoration methodologies.

  17. Radiation distribution measurement using plastic scintillating optical fibers for survey of radioactive contamination in wide area

    International Nuclear Information System (INIS)

    Ito, Chikara; Ito, Keisuke; Ishikawa, Takashi; Yoshida, Akihiro; Sanada, Yukihisa; Torii, Tatsuo; Nohtomi, Akihiro; Wakabayashi, Genichiro; Miyazaki, Nobuyuki

    2013-01-01

    It is important to examine distribution of environmental contamination due to the accident of Fukushima Daiichi Nuclear Power Station and to confirm the effect of decontamination works. We have applied radiation distribution measurement using plastic scintillating optical fibers (PSFs) in the survey of contamination in wide area including residential, farmland, forests, etc. In the measurements system, two scintillation lights that emitted at an incidence of a radiation transmit to photomultiplier tubes at the both end of PSFs. The position where scintillation light emitted is obtained from the detection time difference of each photomultiplier tube. The distribution of light emission quantity indicates the distribution of radiation incident in a PSF which is corresponds to the distribution of dose-rate. The radiation detection system using the PSFs has been applied to the radiation distribution measurement on grounds, trees, etc. The results show a good agreement with point data measured by survey meters using sodium iodide scintillators. As the PSFs which have water resistance, they have been successfully applied to the radiation distribution measurement in the river. We have also succeeded in measuring two-dimensional distribution of radiation by measuring the count rate while moving to the fiber at a constant speed. (author)

  18. Time-Dependent Statistical Analysis of Wide-Area Time-Synchronized Data

    Directory of Open Access Journals (Sweden)

    A. R. Messina

    2010-01-01

    Full Text Available Characterization of spatial and temporal changes in the dynamic patterns of a nonstationary process is a problem of great theoretical and practical importance. On-line monitoring of large-scale power systems by means of time-synchronized Phasor Measurement Units (PMUs provides the opportunity to analyze and characterize inter-system oscillations. Wide-area measurement sets, however, are often relatively large, and may contain phenomena with differing temporal scales. Extracting from these measurements the relevant dynamics is a difficult problem. As the number of observations of real events continues to increase, statistical techniques are needed to help identify relevant temporal dynamics from noise or random effects in measured data. In this paper, a statistically based, data-driven framework that integrates the use of wavelet-based EOF analysis and a sliding window-based method is proposed to identify and extract, in near-real-time, dynamically independent spatiotemporal patterns from time synchronized data. The method deals with the information in space and time simultaneously, and allows direct tracking and characterization of the nonstationary time-frequency dynamics of oscillatory processes. The efficiency and accuracy of the developed procedures for extracting localized information of power system behavior from time-synchronized phasor measurements of a real event in Mexico is assessed.

  19. From rainfall to slope instability: an automatic GIS procedure for susceptibility analyses over wide areas

    Directory of Open Access Journals (Sweden)

    Bianca Federici

    2015-07-01

    Full Text Available The paper proposes an automatic procedure in geographic information system (GIS for the analysis and prediction of landslides due to rainfall events over wide areas. It runs, for each unit cell, a hydrological balance based on the Curve Number method (USDA-SCS 1985–1986, computing the evolution of groundwater as a result of precipitation and then checks the overcoming, or not, of limit equilibrium conditions of the land in the domain of interest. The mathematical model was implemented in the free and open source GIS GRASS. For any sequence of consecutive days of rain, according to the conditions of soil moisture prior to the time history under study, the hydro-geotechnical model allows (1 the determination of the oscillations of the phreatic table, (2 the part of saturated soil and (3 the slope stability analysis, by taking into proper account the pore pressures buildup. The results of this procedure are returned in raster format, allowing an easy and intuitive interpretation of the land mass sensitivity to meteoric actions. The suggested procedure was applied on an extensive kinematic phenomenon surrounding the city of Santo Stefano d’Aveto (Liguria, Italy. The realized maps of landslide susceptibility are in excellent agreement with what is evident on site.

  20. Comparison of adaptive critic-based and classical wide-area controllers for power systems.

    Science.gov (United States)

    Ray, Swakshar; Venayagamoorthy, Ganesh Kumar; Chaudhuri, Balarko; Majumder, Rajat

    2008-08-01

    An adaptive critic design (ACD)-based damping controller is developed for a thyristor-controlled series capacitor (TCSC) installed in a power system with multiple poorly damped interarea modes. The performance of this ACD computational intelligence-based method is compared with two classical techniques, which are observer-based state-feedback (SF) control and linear matrix inequality LMI-H(infinity) robust control. Remote measurements are used as feedback signals to the wide-area damping controller for modulating the compensation of the TCSC. The classical methods use a linearized model of the system whereas the ACD method is purely measurement-based, leading to a nonlinear controller with fixed parameters. A comparative analysis of the controllers' performances is carried out under different disturbance scenarios. The ACD-based design has shown promising performance with very little knowledge of the system compared to classical model-based controllers. This paper also discusses the advantages and disadvantages of ACDs, SF, and LMI-H(infinity).

  1. STIMULUS: End-System Network Interface Controller for 100 Gb/s Wide Area Networks

    Energy Technology Data Exchange (ETDEWEB)

    Zarkesh-Ha, Payman [University of New Mexico

    2014-09-12

    The main goal of this research grant is to develop a system-level solution leveraging novel technologies that enable network communications at 100 Gb/s or beyond. University of New Mexico in collaboration with Acadia Optronics LLC has been working on this project to develop the 100 Gb/s Network Interface Controller (NIC) under this Department of Energy (DOE) grant.

  2. Confabulation Based Real-time Anomaly Detection for Wide-area Surveillance Using Heterogeneous High Performance Computing Architecture

    Science.gov (United States)

    2015-06-01

    CONFABULATION BASED REAL-TIME ANOMALY DETECTION FOR WIDE-AREA SURVEILLANCE USING HETEROGENEOUS HIGH PERFORMANCE COMPUTING ARCHITECTURE SYRACUSE...DETECTION FOR WIDE-AREA SURVEILLANCE USING HETEROGENEOUS HIGH PERFORMANCE COMPUTING ARCHITECTURE 5a. CONTRACT NUMBER FA8750-12-1-0251 5b. GRANT...processors including graphic processor units (GPUs) and Intel Xeon Phi processors. Experimental results showed significant speedups, which can enable

  3. Internet-based wide area measurement applications in deregulated power systems

    Science.gov (United States)

    Khatib, Abdel-Rahman Amin

    Since the deregulation of power systems was started in 1989 in the UK, many countries have been motivated to undergo deregulation. The United State started deregulation in the energy sector in California back in 1996. Since that time many other states have also started the deregulation procedures in different utilities. Most of the deregulation market in the United States now is in the wholesale market area, however, the retail market is still undergoing changes. Deregulation has many impacts on power system network operation and control. The number of power transactions among the utilities has increased and many Independent Power Producers (IPPs) now have a rich market for competition especially in the green power market. The Federal Energy Regulatory Commission (FERC) called upon utilities to develop the Regional Transmission Organization (RTO). The RTO is a step toward the national transmission grid. RTO is an independent entity that will operate the transmission system in a large region. The main goal of forming RTOs is to increase the operation efficiency of the power network under the impact of the deregulated market. The objective of this work is to study Internet based Wide Area Information Sharing (WAIS) applications in the deregulated power system. The study is the first step toward building a national transmission grid picture using information sharing among utilities. Two main topics are covered as applications for the WAIS in the deregulated power system, state estimation and Total Transfer Capability (TTC) calculations. As a first step for building this national transmission grid picture, WAIS and the level of information sharing of the state estimation calculations have been discussed. WAIS impacts to the TTC calculations are also covered. A new technique to update the TTC using on line measurements based on WAIS created by sharing state estimation is presented.

  4. Using wide area differential GPS to improve total system error for precision flight operations

    Science.gov (United States)

    Alter, Keith Warren

    Total System Error (TSE) refers to an aircraft's total deviation from the desired flight path. TSE can be divided into Navigational System Error (NSE), the error attributable to the aircraft's navigation system, and Flight Technical Error (FTE), the error attributable to pilot or autopilot control. Improvement in either NSE or FTE reduces TSE and leads to the capability to fly more precise flight trajectories. The Federal Aviation Administration's Wide Area Augmentation System (WAAS) became operational for non-safety critical applications in 2000 and will become operational for safety critical applications in 2002. This navigation service will provide precise 3-D positioning (demonstrated to better than 5 meters horizontal and vertical accuracy) for civil aircraft in the United States. Perhaps more importantly, this navigation system, which provides continuous operation across large regions, enables new flight instrumentation concepts which allow pilots to fly aircraft significantly more precisely, both for straight and curved flight paths. This research investigates the capabilities of some of these new concepts, including the Highway-In-The Sky (HITS) display, which not only improves FTE but also reduces pilot workload when compared to conventional flight instrumentation. Augmentation to the HITS display, including perspective terrain and terrain alerting, improves pilot situational awareness. Flight test results from demonstrations in Juneau, AK, and Lake Tahoe, CA, provide evidence of the overall feasibility of integrated, low-cost flight navigation systems based on these concepts. These systems, requiring no more computational power than current-generation low-end desktop computers, have immediate applicability to general aviation flight from Cessnas to business jets and can support safer and ultimately more economical flight operations. Commercial airlines may also, over time, benefit from these new technologies.

  5. A Wide Area Risk Assessment Framework for Underwater Military Munitions Response

    Science.gov (United States)

    Holland, K. T.; Calantoni, J.

    2017-12-01

    Our objective was to develop a prototype statistical framework supporting Wide Area Assessment and Remedial Investigation decisions relating to the risk of unexploded ordnance and other military munitions concentrated in underwater environments. Decision making involving underwater munitions is inherently complex due to the high degree of uncertainty in the environmental conditions that force munitions responses (burial, decay, migration, etc.) and associated risks to the public. The prototype framework provides a consistent approach to accurately delineating contaminated areas at underwater munitions sites through the estimation of most probable concentrations. We adapted existing deterministic models and environmental data services for use within statistical modules that allowed the estimation of munition concentration given historic site information and environmental attributes. Ultimately this risk surface can be used to evaluate costs associated with various remediation approaches (e.g. removal, monitoring, etc.). Unfortunately, evaluation of the assessment framework was limited due to the lack of enduser data services from munition site managers. Of the 450 U.S. sites identified as having potential contamination with underwater munitions, assessment of available munitions information (including historic firing or disposal records, and recent ground-truth munitions samples) indicated very limited information in the databases. Example data types include the most probable munition types, approximate firing / disposal dates and locations, and any supportive munition survey or sampling results. However the overall technical goal to integrate trained statistical belief networks with detailed geophysical knowledge of sites, of sensors and of the underwater environment was demonstrated and should allow probabilistic estimates of the most likely outcomes and tradeoffs while managing uncertainty associated with military munitions response.

  6. LPWAN – Low-power Wide-area Network. Communication for the Internet of Things.

    Directory of Open Access Journals (Sweden)

    Vladislav Viktorovich Sheshalevich

    2017-07-01

    Full Text Available Recent advances in the field of cheaper sensors and various devices to control the parameters of industrial and household equipment has led to the emergence of new communication technologies, the so-called Internet of things, "machine-to-machine" or M2M technologies. The main feature of these technologies is a network communication of the physical objects without direct human intervention. The specifics of using the Low-power Wide-area Network (LPWAN network for these new communication technologies are considered. The LPWAN technologies have significant prospects for development adding to already traditional technologies such as Wi-Fi and cellular. This very term describes an approach, the communication technologies, characterized by the principles of reducing the connection speed in order to achieve wider range and lower power consumption of end nodes. Based on this concept different companies have built the specific competing systems of communication, such as Sigfox (first LPWAN technology, LoRa (derived from Long Range Ingenu RPMA, Weightless-P, “Strizh” telematics (the Russian analog of Sigfox and others. Each of the systems applies different methods to increase the range of coverage, to lower energy consumption and to use different possibilities for scalability. The principles of functioning of these communication systems are analyzed below. The major attention is paid to describing the very popular LPWAN-technology LoRa as one of the most open technology for practical applications. It is based on the same name radio modulation using its own unique method to broaden a spectrum. The topology and the main components of this network, including the sensor (end device with a radio module, the LoRa gateway and its network architecture are described in detail. Examples are given of the LoRa systems emerging on the domestic market of the Internet of things.

  7. Camera Networks The Acquisition and Analysis of Videos over Wide Areas

    CERN Document Server

    Roy-Chowdhury, Amit K

    2012-01-01

    As networks of video cameras are installed in many applications like security and surveillance, environmental monitoring, disaster response, and assisted living facilities, among others, image understanding in camera networks is becoming an important area of research and technology development. There are many challenges that need to be addressed in the process. Some of them are listed below: - Traditional computer vision challenges in tracking and recognition, robustness to pose, illumination, occlusion, clutter, recognition of objects, and activities; - Aggregating local information for wide

  8. GECM-Based Voltage Stability Assessment Using Wide-Area Synchrophasors

    OpenAIRE

    Heng-Yi Su; Tzu-Yi Liu

    2017-01-01

    Voltage instability is a crucial issue in the secure operation of power grids. Several methods for voltage stability assessment were presented. Some of them are highly computationally intensive, while others are reported not to work properly under all circumstances. This paper proposes a new methodology based on the generator equivalent circuit model (GECM) and the phasor measurement unit (PMU) technology for online voltage stability monitoring of a power grid. First, the proposed methodology...

  9. POWER STABILITY MONITORING BASED ON VOLTAGE INSTABILITY PREDICTION APPROACH THROUGH WIDE AREA SYSTEM

    OpenAIRE

    H. H. Goh; Q. S. Chua; S. W. Lee; B. C. Kok; K. C. Goh; K. T.K. Teo

    2014-01-01

    Nowadays, power systems are being forced to operate closer to its security limit due to current economic growth and the difficulties to upgrade the existing grid infrastructure. With the sudden increment of power demand, voltage instability problem has become a main concern to the power system operator because voltage instability has led or crucially contributed to some major blackouts throughout the world. Hence, methods for early warning and early prevention are required to prevent the powe...

  10. Feasibility of Wide-Area Decontamination of Bacillus anthracis Spores Using a Germination-Lysis Approach

    Science.gov (United States)

    2011-11-16

    Security, LLC 2011 CBD S& T Conference November 16, 2011 LLNL-PRES-508394 Lawrence Livermore National Laboratory LLNL-PRES-  Background...PRES-  Gruinard Island 5% formaldehyde  Sverdlosk Release UNKNOWN: but washing, chloramines , soil disposal believed to have been used...508394 Lawrence Livermore National Laboratory LLNL-PRES- 4 Disinfectant >6 Log Reduction on Materials (EPA, 2010a,b; Wood et al., 2011

  11. Wide-area decontamination in an urban environment after radiological dispersion: A review and perspectives.

    Science.gov (United States)

    Kaminski, Michael D; Lee, Sang Don; Magnuson, Matthew

    2016-03-15

    Nuclear or radiological terrorism in the form of uncontrolled radioactive contamination presents a unique challenge in the field of nuclear decontamination. Potential targets require an immediate decontamination response, or mitigation plan to limit the social and economic impact. To date, experience with urban decontamination of building materials - specifically hard, porous, external surfaces - is limited to nuclear weapon fallout and nuclear reactor accidents. Methods are lacking for performing wide-area decontamination in an urban environment so that in all release scenarios the area may be re-occupied without evaluation and/or restriction. Also lacking is experience in developing mitigation strategies, that is, methods of mitigating contamination and its resultant radiation dose in key areas during the immediate aftermath of an event and after lifesaving operations. To date, the tremendous strategy development effort primarily by the European community has focused on the recovery phase, which extends years beyond the release event. In this review, we summarize the methods and data collected over the past 70 years in the field of hard, external surface decontamination of radionuclide contaminations, with emphasis on methods suitable for response to radiological dispersal devices and their potentially unique physico-chemical characteristics. This review concludes that although a tremendous amount of work has been completed primarily by the European Community (EU) and the United Kingdom (UK), the few studies existing on each technique permit only very preliminary estimates of decontamination factors for various building materials and methods and extrapolation of those values for use in environments outside the EU and UK. This data shortage prevents us from developing an effective and detailed mitigation response plan and remediation effort. Perhaps most importantly, while the data available does include valuable information on the practical aspects of performing

  12. Simulating Brown hare (Lepus europaeus Pallas dispersion: a tool for wildlife management of wide areas

    Directory of Open Access Journals (Sweden)

    Andrea Amici

    2010-01-01

    Full Text Available The second half of the 20th century was characterised by intense processes of urbanisation, industrialisation and agricultural mechanisation, leading to a fragmentation of the agricultural and forest landscape. This, in turn, reduced the bio-permeability of the territory and affected the dispersion of many wild species. Brown hare (Lepus europeus dispersion is dramatically affected by habitat fragmentation, presence of predators, intense tillage and elevated hunting pressure. Consequently, the only stable populations of hare are often in no-hunting areas where wildlife management is efficient. It is necessary, therefore, to identify not only additional areas suitable for reproduction, but also the most suitable dispersion pathways for hares, in order to optimise management. In the present study, by means of a Geographic Information System (GIS, a deterministic hare suitability model was developed on the basis of a multicriterial approach and fuzzy logic. Subsequently, a friction surface was derived from the suitability map in order to describe the land bio-permeability. Finally, on the basis of species potential, the spread of hares from stable population areas (source areas to the remaining territory was simulated. The area of study was the province of Viterbo (central Italy. The suitability map showed good discrimination ability (ROC=0.705. The hare dispersion simulation map allowed the potential spreading of this species throughout the provincial territory to be analysed. Isolated or less connected zones were highlighted, allowing the distribution of habitat enhancements, and/or the institution of new no-hunting areas devoted to the reproduction and consequent spread of hares throughout the territory, to be localised. The presented flexible and reiterable methodology could prove useful for wildlife management and hunting planning over a wide area. It would thus provide an important contribution to reducing the importance of animal

  13. Power system low frequency oscillation mode estimation using wide area measurement systems

    Directory of Open Access Journals (Sweden)

    Papia Ray

    2017-04-01

    Full Text Available Oscillations in power systems are triggered by a wide variety of events. The system damps most of the oscillations, but a few undamped oscillations may remain which may lead to system collapse. Therefore low frequency oscillations inspection is necessary in the context of recent power system operation and control. Ringdown portion of the signal provides rich information of the low frequency oscillatory modes which has been taken into analysis. This paper provides a practical case study in which seven signal processing based techniques i.e. Prony Analysis (PA, Fast Fourier Transform (FFT, S-Transform (ST, Wigner-Ville Distribution (WVD, Estimation of Signal Parameters by Rotational Invariance Technique (ESPRIT, Hilbert-Huang Transform (HHT and Matrix Pencil Method (MPM were presented for estimating the low frequency modes in a given ringdown signal. Preprocessing of the signal is done by detrending. The application of the signal processing techniques is illustrated using actual wide area measurement systems (WAMS data collected from four different Phasor Measurement Unit (PMU i.e. Dadri, Vindyachal, Kanpur and Moga which are located near the recent disturbance event at the Northern Grid of India. Simulation results show that the seven signal processing technique (FFT, PA, ST, WVD, ESPRIT, HHT and MPM estimates two common oscillatory frequency modes (0.2, 0.5 from the raw signal. Thus, these seven techniques provide satisfactory performance in determining small frequency modes of the signal without losing its valuable property. Also a comparative study of the seven signal processing techniques has been carried out in order to find the best one. It was found that FFT and ESPRIT gives exact frequency modes as compared to other techniques, so they are recommended for estimation of low frequency modes. Further investigations were also carried out to estimate low frequency oscillatory mode with another case study of Eastern Interconnect Phasor Project

  14. End-System Network Interface Controller for 100 Gb/s Wide Area Networks: Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Wen, Jesse [Acadia Optronics LLC, Rockville, MD (United States)

    2013-08-30

    In recent years, network bandwidth requirements have scaled multiple folds, pushing the need for the development of data exchange mechanisms at 100 Gb/s and beyond. High performance computing, climate modeling, large-scale storage, and collaborative scientific research are examples of applications that can greatly benefit by leveraging high bandwidth capabilities of the order of 100 Gb/s. Such requirements and advances in IEEE Ethernet standards, Optical Transport Unit4 (OTU4), and host-system interconnects demand a network infrastructure supporting throughput rates of the order of 100 Gb/s with a single wavelength. To address such a demand Acadia Optronics in collaboration with the University of New Mexico, proposed and developed a end-system Network Interface Controller (NIC) for the 100Gbps WANs. Acadia’s 100G NIC employs an FPGA based system with a high-performance processor interconnect (PCIe 3.0) and a high capacity optical transmission link (CXP) to provide data transmission at the rate of 100 Gbps.

  15. Protocol and Topology Issues for Wide-Area Satellite Interconnection of Terrestrial Optical LANs

    Science.gov (United States)

    Parraga, N.

    2002-01-01

    Apart from broadcasting, the satellite business is targeting niche markets. Wide area interconnection is considered as one of these niche markets, since it addresses operators and business LANs (B2B, business to business) in remote areas where terrestrial infrastructure is not available. These LANs - if high-speed - are typically based on optical networks such as SONET. One of the advantages of SONET is its architecture flexibility and capacity to transport all kind of applications including multimedia with a range of different transmission rates. The applications can be carried by different protocols among which the Internet Protocol (IP) or the Asynchronous Transfer Mode (ATM) are the most prominent ones. Thus, the question arises how these protocols can be interconnected via the satellite segment. The paper addresses several solutions for interworking with different protocols. For this investigation we distinguish first of all between the topology and the switching technology of the satellites. In case of a star network with transparent satellite, the satellite protocol consists of physical layer and data layer which can be directly interconnected with layer 2 interworking function to their terrestrial counterparts in the SONET backbone. For regenerative satellites the situation is more complex: here we need to distinguish the types of transport protocols being used in the terrestrial and satellite segment. Whereas IP, ATM, MPEG dominate in the terrestrial networks, satellite systems usually do not follow these standards. Some might employ minor additions (for instance, satellite specific packet headers), some might be completely proprietary. In general, interworking must be done for the data plane on top of layer 2 (data link layer), whereas for the signaling plane the interworking is on top of layer 3. In the paper we will discuss the protocol stacks for ATM, IP, and MPEG with a regenerative satellite system. As an example we will use the EuroSkyWay satellite

  16. DISTANT EARLY WARNING SYSTEM for Tsunamis - A wide-area and multi-hazard approach

    Science.gov (United States)

    Hammitzsch, Martin; Lendholt, Matthias; Wächter, Joachim

    2010-05-01

    system and to extend the CCUI with hazard specific functionality. The presentation covers the DEWS project, the system architecture and the CCUI in conjunction with details of information logistics. The DEWS Wide Area Centre connecting national centres to allow the international communication and warning exchange is presented also. REFERENCES: [1] DEWS, www.dews-online.org [2] OGC, www.opengeospatial.org [3] SWE, www.opengeospatial.org/projects/groups/sensorweb [4] Eclipse RCP, www.eclipse.org/home/categories/rcp.php [5] uDig, udig.refractions.net [6] WMS, www.opengeospatial.org/standards/wms [7] WFS, www.opengeospatial.org/standards/wfs [8] WPS, www.opengeospatial.org/standards/wps [9] OASIS, www.oasis-open.org [10] CAP, www.oasis-open.org/specs/#capv1.1 [11] EDXL-DE, www.oasis-open.org/specs/#edxlde-v1.0 [12] SOAP, www.w3.org/TR/soap [13] GITEWS (German Indonesian Tsunami Early Warning System) is a project of the German Federal Government to aid the recon¬struction of the tsunami-prone Indian Ocean region, www.gitews.org [14] The Tsunami Service Bus is the GITEWS sensor system integration platform offering standardised services for the detection and monitoring of tsunamis

  17. Wide area change detection with satellite imagery for locating underground nuclear testing

    International Nuclear Information System (INIS)

    Canty, M.J.; Jasani, B.; Schlittenhardt, J.

    2001-01-01

    nicest aspects of the MAD method: It sorts different categories of change into different image components. Another very important characteristic of the MAD transformation is that it is invariant to linear transformations of the data. This means that if for example the sensors used for the two images have different gains, or if atmospheric haze attenuates the reflectance measurement in one of the images but not in the other, the results of the analysis will be unaffected. A Bayesian model of the probability distribution of the MAD components intensities is applied to determine automatically the decision thresholds for change and no change. The prerequisite image-to-image registration is carried out automatically with the help contour and comer matching to determine ground control points, followed by nearest-neighbor resampling. The inclusion of higher resolution panchromatic information into the procedure without loss of spectral discrimination is accomplished via wavelet fusion with the multispectral channels. A computer program CDSAT (Change Detection with SATellite imagery), which implements a user-friendly graphical environment for performing the various steps involved, is described briefly. The technique has been applied successfully to detect the exact position of an underground nuclear test in Rajasthan in 1998. In the present paper we discuss further results for tests carried out in Lop Nor, China in the 1990's and at the Nevada test site in the 1980's. Historical LANDSAT TM satellite images are used for change detection. Results are correlated with seismic and ground truth data and conclusions are drawn regarding the applicability of wide area change detection to complement seismic verification of the Comprehensive Test Ban Treaty

  18. Tsunami risk assessment for facility group over a wide area using inundation assessment method considering energy conservation law

    International Nuclear Information System (INIS)

    Fukutani, Yo; Imamura, Fumihiko; Tokunaga, Takeshi; Sato, Ichiro

    2015-01-01

    We propose a quantitative evaluation method of overall tsunami risk that the entire facility group over a wide area holds. We considerably reduced the calculation cost for tsunami inundation depth by adopting the evaluation method using energy conservation law as compared with the evaluation method using non-linear long wave equation. For financial institutions such as banks and insurance companies with contractors over a wide area and business companies with multiple their assets and facilities in various places, the proposed evaluation method in this study could be a useful approach to implement their risk-based management decisions for tsunami risk. (author)

  19. Building Infectious Disease Research Programs to Promote Security and Enhance Collaborations with Countries of the Former Soviet Union.

    Science.gov (United States)

    Bartholomew, James C; Pearson, Andrew D; Stenseth, Nils Chr; LeDuc, James W; Hirschberg, David L; Colwell, Rita R

    2015-01-01

    Addressing the threat of infectious diseases, whether natural, the results of a laboratory accident, or a deliberate act of bioterrorism, requires no corner of the world be ignored. The mobility of infectious agents and their rapid adaptability, whether to climate change or socioeconomic drivers or both, demand the science employed to understand these processes be advanced and tailored to a country or a region, but with a global vision. In many parts of the world, largely because of economic struggles, scientific capacity has not kept pace with the need to accomplish this goal and has left these regions and hence the world vulnerable to infectious disease outbreaks. To build scientific capability in a developing region requires cooperation and participation of experienced international scientists who understand the issues and are committed to educate the next generations of young investigators in the region. These efforts need to be coupled with the understanding and resolve of local governments and international agencies to promote an aggressive science agenda. International collaborative scientific investigation of infectious diseases not only adds significantly to scientific knowledge, but it promotes health security, international trust, and long-term economic benefit to the region involved. This premise is based on the observation that the most powerful human inspiration is that which brings peoples together to work on and solve important global challenges. The republics of the former Soviet Union provide a valuable case study for the need to rebuild scientific capacity as they are located at the crossroads where many of the world's great epidemics began. The scientific infrastructure and disease surveillance capabilities of the region suffered significant decline after the breakup of the Soviet Union. The U.S. Cooperative Threat Reduction (CTR) Program, a part of the U.S. Department of Defense, together with partner countries, have worked diligently to

  20. GECM-Based Voltage Stability Assessment Using Wide-Area Synchrophasors

    Directory of Open Access Journals (Sweden)

    Heng-Yi Su

    2017-10-01

    Full Text Available Voltage instability is a crucial issue in the secure operation of power grids. Several methods for voltage stability assessment were presented. Some of them are highly computationally intensive, while others are reported not to work properly under all circumstances. This paper proposes a new methodology based on the generator equivalent circuit model (GECM and the phasor measurement unit (PMU technology for online voltage stability monitoring of a power grid. First, the proposed methodology utilizes synchronized phasor (synchrophasor measurements to determine the impedance parameters of a transmission grid by means of the recursive least squares (RLS algorithm. Furthermore, it incorporates the dynamic models of generators to handle the cases with generator reactive power limit violations. After that, an enhanced voltage stability index with GECMs incorporated is developed for reliable and accurate voltage stability assessment. The proposed methodology was first demonstrated on several standard IEEE power systems, and then applied to a practical power system, the Taiwan power (Taipower system. The test results demonstrate the flexibility and effectiveness of the proposed methodology.

  1. Distributed power-line outage detection based on wide area measurement system.

    Science.gov (United States)

    Zhao, Liang; Song, Wen-Zhan

    2014-07-21

    In modern power grids, the fast and reliable detection of power-line outages is an important functionality, which prevents cascading failures and facilitates an accurate state estimation to monitor the real-time conditions of the grids. However, most of the existing approaches for outage detection suffer from two drawbacks, namely: (i) high computational complexity; and (ii) relying on a centralized means of implementation. The high computational complexity limits the practical usage of outage detection only for the case of single-line or double-line outages. Meanwhile, the centralized means of implementation raises security and privacy issues. Considering these drawbacks, the present paper proposes a distributed framework, which carries out in-network information processing and only shares estimates on boundaries with the neighboring control areas. This novel framework relies on a convex-relaxed formulation of the line outage detection problem and leverages the alternating direction method of multipliers (ADMM) for its distributed solution. The proposed framework invokes a low computational complexity, requiring only linear and simple matrix-vector operations. We also extend this framework to incorporate the sparse property of the measurement matrix and employ the LSQRalgorithm to enable a warm start, which further accelerates the algorithm. Analysis and simulation tests validate the correctness and effectiveness of the proposed approaches.

  2. Education and Strategic Research Collaborations

    Science.gov (United States)

    Los Alamos National Laboratory National Security Education Center Image Search Site submit LaboratoryNational Security Education Center Menu Program Offices Energy Security Council New Mexico Consortium Geophysics, Planetary Physics, Signatures Events Collaborations for education and strategic research, student

  3. Will available bit rate (ABR) services give us the capability to offer virtual LANs over wide-area ATM networks?

    Science.gov (United States)

    Ferrandiz, Ana; Scallan, Gavin

    1995-10-01

    The available bit rate (ABR) service allows connections to exceed their negotiated data rates during the life of the connections when excess capacity is available in the network. These connections are subject to flow control from the network in the event of network congestion. The ability to dynamically adjust the data rate of the connection can provide improved utilization of the network and be a valuable service to end users. ABR type service is therefore appropriate for the transmission of bursty LAN traffic over a wide area network in a manner that is more efficient and cost effective than allocating bandwdith at the peak cell rate. This paper describes the ABR service and discusses if it is realistic to operate a LAN like service over a wide area using ABR.

  4. Activity and function recognition for moving and static objects in urban environments from wide-area persistent surveillance inputs

    Science.gov (United States)

    Levchuk, Georgiy; Bobick, Aaron; Jones, Eric

    2010-04-01

    In this paper, we describe results from experimental analysis of a model designed to recognize activities and functions of moving and static objects from low-resolution wide-area video inputs. Our model is based on representing the activities and functions using three variables: (i) time; (ii) space; and (iii) structures. The activity and function recognition is achieved by imposing lexical, syntactic, and semantic constraints on the lower-level event sequences. In the reported research, we have evaluated the utility and sensitivity of several algorithms derived from natural language processing and pattern recognition domains. We achieved high recognition accuracy for a wide range of activity and function types in the experiments using Electro-Optical (EO) imagery collected by Wide Area Airborne Surveillance (WAAS) platform.

  5. A Mixed WLS Power System State Estimation Method Integrating a Wide-Area Measurement System and SCADA Technology

    Directory of Open Access Journals (Sweden)

    Tao Jin

    2018-02-01

    Full Text Available To address the issue that the phasor measurement units (PMUs of wide area measurement system (WAMS are not sufficient for static state estimation in most existing power systems, this paper proposes a mixed power system weighted least squares (WLS state estimation method integrating a wide-area measurement system and supervisory control and data acquisition (SCADA technology. The hybrid calculation model is established by incorporating phasor measurements (including the node voltage phasors and branch current phasors and the results of the traditional state estimator in a post-processing estimator. The performance assessment is discussed through setting up mathematical models of the distribution network. Based on PMU placement optimization and bias analysis, the effectiveness of the proposed method was proved to be accurate and reliable by simulations of different cases. Furthermore, emulating calculation shows this method greatly improves the accuracy and stability of the state estimation solution, compared with the traditional WLS state estimation.

  6. A Novel Wide-Area Backup Protection Based on Fault Component Current Distribution and Improved Evidence Theory

    Directory of Open Access Journals (Sweden)

    Zhe Zhang

    2014-01-01

    Full Text Available In order to solve the problems of the existing wide-area backup protection (WABP algorithms, the paper proposes a novel WABP algorithm based on the distribution characteristics of fault component current and improved Dempster/Shafer (D-S evidence theory. When a fault occurs, slave substations transmit to master station the amplitudes of fault component currents of transmission lines which are the closest to fault element. Then master substation identifies suspicious faulty lines according to the distribution characteristics of fault component current. After that, the master substation will identify the actual faulty line with improved D-S evidence theory based on the action states of traditional protections and direction components of these suspicious faulty lines. The simulation examples based on IEEE 10-generator-39-bus system show that the proposed WABP algorithm has an excellent performance. The algorithm has low requirement of sampling synchronization, small wide-area communication flow, and high fault tolerance.

  7. A Novel Wide-Area Backup Protection Based on Fault Component Current Distribution and Improved Evidence Theory

    Science.gov (United States)

    Zhang, Zhe; Kong, Xiangping; Yin, Xianggen; Yang, Zengli; Wang, Lijun

    2014-01-01

    In order to solve the problems of the existing wide-area backup protection (WABP) algorithms, the paper proposes a novel WABP algorithm based on the distribution characteristics of fault component current and improved Dempster/Shafer (D-S) evidence theory. When a fault occurs, slave substations transmit to master station the amplitudes of fault component currents of transmission lines which are the closest to fault element. Then master substation identifies suspicious faulty lines according to the distribution characteristics of fault component current. After that, the master substation will identify the actual faulty line with improved D-S evidence theory based on the action states of traditional protections and direction components of these suspicious faulty lines. The simulation examples based on IEEE 10-generator-39-bus system show that the proposed WABP algorithm has an excellent performance. The algorithm has low requirement of sampling synchronization, small wide-area communication flow, and high fault tolerance. PMID:25050399

  8. Problems of collaborative work of the automated process control system (APCS) and the its information security and solutions.

    Science.gov (United States)

    Arakelyan, E. K.; Andryushin, A. V.; Mezin, S. V.; Kosoy, A. A.; Kalinina, Ya V.; Khokhlov, I. S.

    2017-11-01

    The principle of interaction of the specified systems of technological protections by the Automated process control system (APCS) and information safety in case of incorrect execution of the algorithm of technological protection is offered. - checking the correctness of the operation of technological protection in each specific situation using the functional relationship between the monitored parameters. The methodology for assessing the economic feasibility of developing and implementing an information security system.

  9. A method exploiting direct communication between phasor measurement units for power system wide-area protection and control algorithms.

    Science.gov (United States)

    Almas, Muhammad Shoaib; Vanfretti, Luigi

    2017-01-01

    Synchrophasor measurements from Phasor Measurement Units (PMUs) are the primary sensors used to deploy Wide-Area Monitoring, Protection and Control (WAMPAC) systems. PMUs stream out synchrophasor measurements through the IEEE C37.118.2 protocol using TCP/IP or UDP/IP. The proposed method establishes a direct communication between two PMUs, thus eliminating the requirement of an intermediate phasor data concentrator, data mediator and/or protocol parser and thereby ensuring minimum communication latency without considering communication link delays. This method allows utilizing synchrophasor measurements internally in a PMU to deploy custom protection and control algorithms. These algorithms are deployed using protection logic equations which are supported by all the PMU vendors. Moreover, this method reduces overall equipment cost as the algorithms execute internally in a PMU and therefore does not require any additional controller for their deployment. The proposed method can be utilized for fast prototyping of wide-area measurements based protection and control applications. The proposed method is tested by coupling commercial PMUs as Hardware-in-the-Loop (HIL) with Opal-RT's eMEGAsim Real-Time Simulator (RTS). As illustrative example, anti-islanding protection application is deployed using proposed method and its performance is assessed. The essential points in the method are: •Bypassing intermediate phasor data concentrator or protocol parsers as the synchrophasors are communicated directly between the PMUs (minimizes communication delays).•Wide Area Protection and Control Algorithm is deployed using logic equations in the client PMU, therefore eliminating the requirement for an external hardware controller (cost curtailment)•Effortless means to exploit PMU measurements in an environment familiar to protection engineers.

  10. Collaborative Adaptation Planning for Water Security: Preliminary Lessons, Challenges, and the Way Forward for Maipo Basin Adaptation Plan, Chile

    Science.gov (United States)

    Vicuna, S.; Scott, C. A.; Bonelli, S.; Bustos, E.; Meza, F. J.

    2014-12-01

    The Maipo basin holds 40% of Chile's total population and almost half of the country's Gross Domestic Product. The basin is located in the semiarid central region of the country and, aside from the typical pressures of growth in developing country basins, the Maipo river faces climate change impacts associated with a reduction in total runoff and changes in its seasonality. Surface water is the main water source for human settlements and economic activities including agriculture. In 2012 we started a research project to create a climate variability and climate change adaptation plan for the basin. The pillars of the plan are co-produced by researchers and a Scenario Building Team (SBT) with membership of relevant water and land use stakeholders (including from civil society, public and private sectors) in the basin. Following similar experiences in other regions in the world that have faced the challenges of dealing with long term planning under uncertainty, the project has divided the task of developing the plan into a series of interconnected elements. A critical first component is to work on the desired vision(s) of the basin for the future. In this regards, the "water security" concept has been chosen as a framework that accommodates all objectives of the SBT members. Understanding and quantifying the uncertainties that could affect the future water security of the basin is another critical aspect of the plan. Near and long term climate scenarios are one dimension of these uncertainties that are combined with base development uncertainties such as urban growth scenarios. A third component constructs the models/tools that allows the assessment of impacts on water security that could arise under these scenarios. The final critical component relates to the development of the adaptation measures that could avoid the negative impacts and/or capture the potential opportunities. After two years in the development of the adaptation plan a series of results has been

  11. Design of Weighted Wide Area Damping Controller (WWADC Based PSS for Damping Inter-Area Low Frequency Oscillations

    Directory of Open Access Journals (Sweden)

    Saleh M. Bamasak

    2017-09-01

    Full Text Available Wide Area Measurement System (WAMS can extend and effectively improve the power system stabilizers (PSS capability in damping the inter-area low frequency oscillations in interconnected bulk power systems. This paper proposes the implementation of Weighted Wide Area Damping Controller (WWADC in which weighted factors are introduced for each remote feedback signals. Modal analysis approach is implemented for the purpose of identifying the optimal location as well as the input signals’ optimal combination of WWADC. Based on the linearized model, Differential Evolution (DE algorithm is applied to search for optimal controller parameters and optimal weighted factors. The successful application of the proposed approach is achieved in two power networks; the two-area 4-machine system and the IEEE-39 bus 10-machine system. The analysis of the eigenvalue and non-linear time domain simulations indicate that damping the inter-area oscillations and improving the system stability irrespective of the severity and the location of the disturbances can be effectively achieved by WADC

  12. A Robust WLS Power System State Estimation Method Integrating a Wide-Area Measurement System and SCADA Technology

    Directory of Open Access Journals (Sweden)

    Tao Jin

    2015-04-01

    Full Text Available With the development of modern society, the scale of the power system is rapidly increased accordingly, and the framework and mode of running of power systems are trending towards more complexity. It is nowadays much more important for the dispatchers to know exactly the state parameters of the power network through state estimation. This paper proposes a robust power system WLS state estimation method integrating a wide-area measurement system (WAMS and SCADA technology, incorporating phasor measurements and the results of the traditional state estimator in a post-processing estimator, which greatly reduces the scale of the non-linear estimation problem as well as the number of iterations and the processing time per iteration. This paper firstly analyzes the wide-area state estimation model in detail, then according to the issue that least squares does not account for bad data and outliers, the paper proposes a robust weighted least squares (WLS method that combines a robust estimation principle with least squares by equivalent weight. The performance assessment is discussed through setting up mathematical models of the distribution network. The effectiveness of the proposed method was proved to be accurate and reliable by simulations and experiments.

  13. Power System Event Ranking Using a New Linear Parameter-Varying Modeling with a Wide Area Measurement System-Based Approach

    Directory of Open Access Journals (Sweden)

    Mohammad Bagher Abolhasani Jabali

    2017-07-01

    Full Text Available Detecting critical power system events for Dynamic Security Assessment (DSA is required for reliability improvement. The approach proposed in this paper investigates the effects of events on dynamic behavior during nonlinear system response while common approaches use steady-state conditions after events. This paper presents some new and enhanced indices for event ranking based on time-domain simulation and polytopic linear parameter-varying (LPV modeling of a power system. In the proposed approach, a polytopic LPV representation is generated via linearization about some points of the nonlinear dynamic behavior of power system using wide-area measurement system (WAMS concepts and then event ranking is done based on the frequency response of the system models on the vertices. Therefore, the nonlinear behaviors of the system in the time of fault occurrence are considered for events ranking. The proposed algorithm is applied to a power system using nonlinear simulation. The comparison of the results especially in different fault conditions shows the advantages of the proposed approach and indices.

  14. Distributed Large Data-Object Environments: End-to-End Performance Analysis of High Speed Distributed Storage Systems in Wide Area ATM Networks

    Science.gov (United States)

    Johnston, William; Tierney, Brian; Lee, Jason; Hoo, Gary; Thompson, Mary

    1996-01-01

    We have developed and deployed a distributed-parallel storage system (DPSS) in several high speed asynchronous transfer mode (ATM) wide area networks (WAN) testbeds to support several different types of data-intensive applications. Architecturally, the DPSS is a network striped disk array, but is fairly unique in that its implementation allows applications complete freedom to determine optimal data layout, replication and/or coding redundancy strategy, security policy, and dynamic reconfiguration. In conjunction with the DPSS, we have developed a 'top-to-bottom, end-to-end' performance monitoring and analysis methodology that has allowed us to characterize all aspects of the DPSS operating in high speed ATM networks. In particular, we have run a variety of performance monitoring experiments involving the DPSS in the MAGIC testbed, which is a large scale, high speed, ATM network and we describe our experience using the monitoring methodology to identify and correct problems that limit the performance of high speed distributed applications. Finally, the DPSS is part of an overall architecture for using high speed, WAN's for enabling the routine, location independent use of large data-objects. Since this is part of the motivation for a distributed storage system, we describe this architecture.

  15. Secure Virtual Enclaves

    National Research Council Canada - National Science Library

    Shands, Deborah

    2002-01-01

    The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application resources, while respecting organizational autonomy over local resources...

  16. PDCI Wide-Area Damping Control: PSLF Simulations of the 2016 Open and Closed Loop Test Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wilches Bernal, Felipe [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Pierre, Brian Joseph [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Elliott, Ryan Thomas [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Schoenwald, David A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Byrne, Raymond H. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Neely, Jason C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Trudnowski, Daniel J. [Montana Tech of the Univ. of Montana, Butte, MT (United States); Donnelly, Matthew K. [Montana Tech of the Univ. of Montana, Butte, MT (United States)

    2017-03-01

    To demonstrate and validate the performance of the wide-are a damping control system, the project plans to conduct closed-loop tests on the PDCI in summer/fall 2016. A test plan details the open and closed loop tests to be conducted on the P DCI using the wide-area damping control system. To ensure the appropriate level of preparedness, simulations were performed in order to predict and evaluate any possible unsafe operations before hardware experiments are attempted. This report contains the result s from these simulations using the power system dynamics software PSLF (Power System Load Flow, trademark of GE). The simulations use the WECC (Western Electricity Coordinating Council) 2016 light summer and heavy summer base cases.

  17. WIDE-AREA BASED ON COORDINATED TUNING OF FUZZY PSS AND FACTS CONTROLLER IN MULTI-MACHINE ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Homayoun Ebrahimian

    2016-03-01

    Full Text Available In this paper coordination of fuzzy power system stabilizer (FPSS and flexible ac transmission systems (FACTS have been considered in a multi-machine power system. The proposed model, has been applied for a wide-area power system. The proposed FPSS presented with local, nonlinear feedbacks, and the corresponding control synthesis conditions are given in terms of solutions to a set of linear matrix inequalities (LMIs. For this model, in fuzzy control synthesis, the new proposed control design method is based on fewer fuzzy rules and less computational burden. Also, the parameters of FACTS controller have been evaluated by improved honey bee mating optimization (IHBMO. The effectiveness of the proposed method has been applied over two case studies of single-machine infinite-bus (SMIB and two areas four machine (TAFM Kundur’s power system. The obtained results demonstrate the superiority of proposed strategy.

  18. Error Analysis of Fast Moving Target Geo-location in Wide Area Surveillance Ground Moving Target Indication Mode

    Directory of Open Access Journals (Sweden)

    Zheng Shi-chao

    2013-12-01

    Full Text Available As an important mode in airborne radar systems, Wide Area Surveillance Ground Moving Target Indication (WAS-GMTI mode has the ability of monitoring a large area in a short time, and then the detected moving targets can be located quickly. However, in real environment, many factors introduce considerable errors into the location of moving targets. In this paper, a fast location method based on the characteristics of the moving targets in WAS-GMTI mode is utilized. And in order to improve the location performance, those factors that introduce location errors are analyzed and moving targets are relocated. Finally, the analysis of those factors is proved to be reasonable by simulation and real data experiments.

  19. Wide area scanning system and carbon microbeams at the external microbeam facility of the INFN LABEC laboratory in Florence

    Energy Technology Data Exchange (ETDEWEB)

    Giuntini, L. [Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Dipartimento di Fisica e Astronomia, Università di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Massi, M. [Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Calusi, S. [Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Dipartimento di Fisica e Astronomia, Università di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Castelli, L. [Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Carraresi, L. [Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Dipartimento di Fisica e Astronomia, Università di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Fedi, M.E.; Gelli, N. [Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Liccioli, L.; Mandò, P.A.; Mazzinghi, A. [Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Dipartimento di Fisica e Astronomia, Università di Firenze, Via Sansone 1, I-50019 Sesto Fiorentino, Firenze (Italy); Palla, L. [INFN, Sezione di Pisa and Università di Pisa, Largo B. Pontecorvo 3, I-56127 Pisa (Italy); Romano, F.P. [Consiglio Nazionale delle Ricerche (CNR), Istituto per i Beni Archeologici e Monumentali (IBAM), Via Biblioteca, 4, 95124 Catania (Italy); Istituto Nazionale di Fisica Nucleare (INFN), LNS, Via S.Sofia 62, 95125 Catania (Italy); and others

    2015-04-01

    Recently, developments have been made to the external scanning microbeam of INFN-LABEC laboratory in Florence. A new system for mechanical sample scanning was implemented. This system allows us to acquire large maps (up to 20 × 20 cm{sup 2}), of great interest in the Cultural Heritage field. In parallel, the possibility of using carbon microbeams for experiments, such as, for example, ion beam modification of materials and MeV Secondary Ion Mass Spectrometry, has been investigated. As a test application, Particle Induced X-ray Emission with carbon microbeams has been performed on a lapis lazuli stone. First results for both wide area imaging and external carbon microbeams are briefly reported.

  20. Leakage localization with an acoustic array that covers a wide area for pipeline leakage monitoring in a closed space

    Energy Technology Data Exchange (ETDEWEB)

    Park, Choon Su [Center for Safety Measurements, Division of Metrology for Quality of Life, Korea Research institute of Standards and Science, Daejeon (Korea, Republic of); Jeon, Jong Hoon [Hyundai Heavy Industry Co.,Ltd., Ulsan (Korea, Republic of); Park, Jin Ho [Korea Atomiv Energy Institute, Daejeon (Korea, Republic of)

    2013-10-15

    It is of great importance to localize leakages in complex pipelines for assuring their safety. A sensor array that can detect where leakages occur enables us to monitor a wide area with a relatively low cost. Beam forming is a fast and efficient algorithm to estimate where sources are, but it is generally made use of in free field condition. In practice, however, many pipelines are placed in a closed space for the purpose of safety and maintenance. This leads us to take reflected waves into account to the beam forming for interior leakage localization. Beam power distribution of reflected waves in a closed space is formulated, and spatial average is introduced to suppress the effect of reflected waves. Computer simulations and experiments ensure how the proposed method is effective to localize leakage in a closed space for structural health monitoring.

  1. Wide area scanning system and carbon microbeams at the external microbeam facility of the INFN LABEC laboratory in Florence

    International Nuclear Information System (INIS)

    Giuntini, L.; Massi, M.; Calusi, S.; Castelli, L.; Carraresi, L.; Fedi, M.E.; Gelli, N.; Liccioli, L.; Mandò, P.A.; Mazzinghi, A.; Palla, L.; Romano, F.P.

    2015-01-01

    Recently, developments have been made to the external scanning microbeam of INFN-LABEC laboratory in Florence. A new system for mechanical sample scanning was implemented. This system allows us to acquire large maps (up to 20 × 20 cm 2 ), of great interest in the Cultural Heritage field. In parallel, the possibility of using carbon microbeams for experiments, such as, for example, ion beam modification of materials and MeV Secondary Ion Mass Spectrometry, has been investigated. As a test application, Particle Induced X-ray Emission with carbon microbeams has been performed on a lapis lazuli stone. First results for both wide area imaging and external carbon microbeams are briefly reported

  2. Wide-area measurement system-based supervision of protection schemes with minimum number of phasor measurement units.

    Science.gov (United States)

    Gajare, Swaroop; Rao, J Ganeswara; Naidu, O D; Pradhan, Ashok Kumar

    2017-08-13

    Cascade tripping of power lines triggered by maloperation of zone-3 relays during stressed system conditions, such as load encroachment, power swing and voltage instability, has led to many catastrophic power failures worldwide, including Indian blackouts in 2012. With the introduction of wide-area measurement systems (WAMS) into the grids, real-time monitoring of transmission network condition is possible. A phasor measurement unit (PMU) sends time-synchronized data to a phasor data concentrator, which can provide a control signal to substation devices. The latency associated with the communication system makes WAMS suitable for a slower form of protection. In this work, a method to identify the faulted line using synchronized data from strategic PMU locations is proposed. Subsequently, a supervisory signal is generated for specific relays in the system for any disturbance or stressed condition. For a given system, an approach to decide the strategic locations for PMU placement is developed, which can be used for determining the minimum number of PMUs required for application of the method. The accuracy of the scheme is tested for faults during normal and stressed conditions in a New England 39-bus system simulated using EMTDC/PSCAD software. With such a strategy, maloperation of relays can be averted in many situations and thereby blackouts/large-scale disturbances can be prevented.This article is part of the themed issue 'Energy management: flexibility, risk and optimization'. © 2017 The Author(s).

  3. Performance of asynchronous transfer mode (ATM) local area and wide area networks for medical imaging transmission in clinical environment.

    Science.gov (United States)

    Huang, H K; Wong, A W; Zhu, X

    1997-01-01

    Asynchronous transfer mode (ATM) technology emerges as a leading candidate for medical image transmission in both local area network (LAN) and wide area network (WAN) applications. This paper describes the performance of an ATM LAN and WAN network at the University of California, San Francisco. The measurements were obtained using an intensive care unit (ICU) server connecting to four image workstations (WS) at four different locations of a hospital-integrated picture archiving and communication system (HI-PACS) in a daily regular clinical environment. Four types of performance were evaluated: magnetic disk-to-disk, disk-to-redundant array of inexpensive disks (RAID), RAID-to-memory, and memory-to-memory. Results demonstrate that the transmission rate between two workstations can reach 5-6 Mbytes/s from RAID-to-memory, and 8-10 Mbytes/s from memory-to-memory. When the server has to send images to all four workstations simultaneously, the transmission rate to each WS is about 4 Mbytes/s. Both situations are adequate for radiologic image communications for picture archiving and communication systems (PACS) and teleradiology applications.

  4. Wide-area mapping of resting state hemodynamic correlations at microvascular resolution with multi-contrast optical imaging (Conference Presentation)

    Science.gov (United States)

    Senarathna, Janaka; Hadjiabadi, Darian; Gil, Stacy; Thakor, Nitish V.; Pathak, Arvind P.

    2017-02-01

    Different brain regions exhibit complex information processing even at rest. Therefore, assessing temporal correlations between regions permits task-free visualization of their `resting state connectivity'. Although functional MRI (fMRI) is widely used for mapping resting state connectivity in the human brain, it is not well suited for `microvascular scale' imaging in rodents because of its limited spatial resolution. Moreover, co-registered cerebral blood flow (CBF) and total hemoglobin (HbT) data are often unavailable in conventional fMRI experiments. Therefore, we built a customized system that combines laser speckle contrast imaging (LSCI), intrinsic optical signal (IOS) imaging and fluorescence imaging (FI) to generate multi-contrast functional connectivity maps at a spatial resolution of 10 μm. This system comprised of three illumination sources: a 632 nm HeNe laser (for LSCI), a 570 nm ± 5 nm filtered white light source (for IOS), and a 473 nm blue laser (for FI), as well as a sensitive CCD camera operating at 10 frames per second for image acquisition. The acquired data enabled visualization of changes in resting state neurophysiology at microvascular spatial scales. Moreover, concurrent mapping of CBF and HbT-based temporal correlations enabled in vivo mapping of how resting brain regions were linked in terms of their hemodynamics. Additionally, we complemented this approach by exploiting the transit times of a fluorescent tracer (Dextran-FITC) to distinguish arterial from venous perfusion. Overall, we demonstrated the feasibility of wide area mapping of resting state connectivity at microvascular resolution and created a new toolbox for interrogating neurovascular function.

  5. Real-time, wide-area hyperspectral imaging sensors for standoff detection of explosives and chemical warfare agents

    Science.gov (United States)

    Gomer, Nathaniel R.; Tazik, Shawna; Gardner, Charles W.; Nelson, Matthew P.

    2017-05-01

    Hyperspectral imaging (HSI) is a valuable tool for the detection and analysis of targets located within complex backgrounds. HSI can detect threat materials on environmental surfaces, where the concentration of the target of interest is often very low and is typically found within complex scenery. Unfortunately, current generation HSI systems have size, weight, and power limitations that prohibit their use for field-portable and/or real-time applications. Current generation systems commonly provide an inefficient area search rate, require close proximity to the target for screening, and/or are not capable of making real-time measurements. ChemImage Sensor Systems (CISS) is developing a variety of real-time, wide-field hyperspectral imaging systems that utilize shortwave infrared (SWIR) absorption and Raman spectroscopy. SWIR HSI sensors provide wide-area imagery with at or near real time detection speeds. Raman HSI sensors are being developed to overcome two obstacles present in standard Raman detection systems: slow area search rate (due to small laser spot sizes) and lack of eye-safety. SWIR HSI sensors have been integrated into mobile, robot based platforms and handheld variants for the detection of explosives and chemical warfare agents (CWAs). In addition, the fusion of these two technologies into a single system has shown the feasibility of using both techniques concurrently to provide higher probability of detection and lower false alarm rates. This paper will provide background on Raman and SWIR HSI, discuss the applications for these techniques, and provide an overview of novel CISS HSI sensors focusing on sensor design and detection results.

  6. Grid computing and collaboration technology in support of fusion energy sciences

    International Nuclear Information System (INIS)

    Schissel, D.P.

    2005-01-01

    Science research in general and magnetic fusion research in particular continue to grow in size and complexity resulting in a concurrent growth in collaborations between experimental sites and laboratories worldwide. The simultaneous increase in wide area network speeds has made it practical to envision distributed working environments that are as productive as traditionally collocated work. In computing power, it has become reasonable to decouple production and consumption resulting in the ability to construct computing grids in a similar manner as the electrical power grid. Grid computing, the secure integration of computer systems over high speed networks to provide on-demand access to data analysis capabilities and related functions, is being deployed as an alternative to traditional resource sharing among institutions. For human interaction, advanced collaborative environments are being researched and deployed to have distributed group work that is as productive as traditional meetings. The DOE Scientific Discovery through Advanced Computing Program initiative has sponsored several collaboratory projects, including the National Fusion Collaboratory Project, to utilize recent advances in grid computing and advanced collaborative environments to further research in several specific scientific domains. For fusion, the collaborative technology being deployed is being used in present day research and is also scalable to future research, in particular, to the International Thermonuclear Experimental Reactor experiment that will require extensive collaboration capability worldwide. This paper briefly reviews the concepts of grid computing and advanced collaborative environments and gives specific examples of how these technologies are being used in fusion research today

  7. Wide Area Recovery and Resiliency Program (WARRP) Knowledge Enhancement Events: Private Sector Economic Resiliency & Restoration - Part 2 After Action Report

    Science.gov (United States)

    2012-05-15

    and strategic reimaging efforts of U. S. and Canadian company-owned restaurants . At the time of Hurricane Katrina, Mr. Helton owned 206 Burger...King Franchises of which 115 were affected by the storm. He shared with participants his story and lessons learned. Mr. Helton then stayed to...Helton owned 115 Burger King Restaurants affected by the hurricane. After making sure his family was secure, Mr. Helton’s next priority was to be

  8. Electronic prescribing: criteria for evaluating handheld prescribing systems and an evaluation of a new, handheld, wireless wide area network (WWAN) prescribing system.

    Science.gov (United States)

    Goldblum, O M

    2001-02-01

    The objectives of this study were: 1) to establish criteria for evaluating handheld computerized prescribing systems; and 2) to evaluate out-of-box performance and features of a new, Palm Operating System (OS)-based, handheld, wireless wide area network (WWAN) prescribing system. The system consisted of a Palm Vx handheld organizer, a Novatel Minstrel V wireless modem, OmniSky wireless internet access and ePhysician ePad 1.1, the Palm OS electronic prescribing software program. A dermatologist familiar with healthcare information technology conducted an evaluation of the performance and features of a new, handheld, WWAN electronic prescribing system in an office practice during a three-month period in 2000. System performance, defined as transmission success rate, was determined from data collected during the three-month trial. Evaluation criteria consisted of an analysis of features found in electronic prescribing systems. All prescriptions written for all patients seen during a three-month period (August - November, 2000) were eligible for inclusion. Prescriptions written for patients who intended to fill them at pharmacies without known facsimile receiving capabilities were excluded from the study. The performance of the system was evaluated using data collected during the study. Criteria for evaluating features of electronic prescribing systems were developed and used to analyze the system employed in this study. During this three-month trial, 200 electronic prescriptions were generated for 132 patients included in the study. Of these prescriptions, 92.5 percent were successfully transmitted to pharmacies. Transmission failures resulted from incorrect facsimile numbers and non-functioning facsimile machines. Criteria established for evaluation of electronic prescribing systems included System (Hardware & Software), Costs, System Features, Printing & Transmission, Formulary & Insurance, Customization, Drug Safety and Security. This study is the first effort to

  9. The insurance industry and public-private collaborations as a vector to develop and spread EO technologies and techniques in the domain of Food Security: The Swiss Re case.

    Science.gov (United States)

    Coutu, S.; Ragaz, M.; Mäder, D.; Hammer, P.; Andriesse, M.; Güttinger, U.; Feyen, H.

    2017-12-01

    The insurance industry has been contributing to the resilient development of agriculture in multiple regions of the globe since the beginning of the 19th Century. It also has from the very beginning of the development of EO Sciences, kept a very close eye on the development of technologies and techniques in this domain. Recent advances in this area such as increased satellite imagery resolution, faster computation time and Big Data management combined with the ground-based knowledge from the insurance industry have offered farmers not only tools permitting better crop management, but also reliable and live yield coverage. This study presents several of these applications at different scales (industrial farming and micro-farming) and in different climate regions, with an emphasis on the limit of current products. Some of these limits such as lack of access of to ground data, R&D efforts or understanding of ground needs could be quickly overcome through closer public-private or private-private collaborations. However, despite a clear benefit for the Food Security nexus and potential win-win situations, those collaborations are not always simple to develop. We present here successful but also disappointing collaboration cases based on the Swiss Re experience, as a global insurance leader. As a conclusion, we highlight how academia, NGOs, governmental organization, start-ups and the insurance industry can get together to foster the development of EO in the domain of Food Security, and bring cutting-edge science to game changing industrial applications.

  10. Collaboration 'Engineerability'

    NARCIS (Netherlands)

    Kolfschoten, Gwendolyn L.; de Vreede, Gert-Jan; Briggs, Robert O.; Sol, Henk G.

    Collaboration Engineering is an approach to create sustained collaboration support by designing collaborative work practices for high-value recurring tasks, and transferring those designs to practitioners to execute for themselves without ongoing support from collaboration professionals. A key

  11. THE PANCHROMATIC HUBBLE ANDROMEDA TREASURY. VIII. A WIDE-AREA, HIGH-RESOLUTION MAP OF DUST EXTINCTION IN M31

    Energy Technology Data Exchange (ETDEWEB)

    Dalcanton, Julianne J.; Fouesneau, Morgan; Weisz, Daniel R.; Williams, Benjamin F. [Department of Astronomy, Box 351580, University of Washington, Seattle, WA 98195 (United States); Hogg, David W. [Center for Cosmology and Particle Physics, Department of Physics, New York University, 4 Washington Pl #424, New York, NY 10003 (United States); Lang, Dustin [McWilliams Center for Cosmology, Department of Physics, Carnegie Mellon University, 5000 Forbes Ave, Pittsburgh, PA 15213 (United States); Leroy, Adam K. [National Radio Astronomy Observatory, 520 Edgemont Road, Charlottesville, VA 22903 (United States); Gordon, Karl D.; Gilbert, Karoline M. [Space Telescope Science Institute, 3700 San Martin Drive, Baltimore, MD 21218 (United States); Sandstrom, Karin [Steward Observatory, University of Arizona, 933 N Cherry Ave, Tucson, AZ 85721 (United States); Bell, Eric F. [Department of Astronomy, University of Michigan, 500 Church St., Ann Arbor, MI 48109 (United States); Dong, Hui; Lauer, Tod R. [National Optical Astronomy Observatory, 950 North Cherry Avenue, Tucson, AZ 85719 (United States); Gouliermis, Dimitrios A. [Max Planck Institute für Astronomie, Königstuhl 17, D-69117, Heidelberg (Germany); Guhathakurta, Puragra [Department of Astronomy and Astrophysics, University of California Santa Cruz, 1156 High Street, Santa Cruz, CA 95064 (United States); Schruba, Andreas [California Institute of Technology, Cahill Center for Astrophysics, 1200 E. California Blvd, Pasadena, CA 91125 (United States); Seth, Anil C. [University of Utah, Salt Lake City, UT (United States); Skillman, Evan D., E-mail: jd@astro.washington.edu [Minnesota Institute for Astrophysics, University of Minnesota, 116 Church Street SE, Minneapolis, MN 55455 (United States)

    2015-11-20

    We map the distribution of dust in M31 at 25 pc resolution using stellar photometry from the Panchromatic Hubble Andromeda Treasury survey. The map is derived with a new technique that models the near-infrared color–magnitude diagram (CMD) of red giant branch (RGB) stars. The model CMDs combine an unreddened foreground of RGB stars with a reddened background population viewed through a log-normal column density distribution of dust. Fits to the model constrain the median extinction, the width of the extinction distribution, and the fraction of reddened stars in each 25 pc cell. The resulting extinction map has a factor of ≳4 times better resolution than maps of dust emission, while providing a more direct measurement of the dust column. There is superb morphological agreement between the new map and maps of the extinction inferred from dust emission by Draine et al. However, the widely used Draine and Li dust models overpredict the observed extinction by a factor of ∼2.5, suggesting that M31's true dust mass is lower and that dust grains are significantly more emissive than assumed in Draine et al. The observed factor of ∼2.5 discrepancy is consistent with similar findings in the Milky Way by the Plank Collaboration et al., but we find a more complex dependence on parameters from the Draine and Li dust models. We also show that the the discrepancy with the Draine et al. map is lowest where the current interstellar radiation field has a harder spectrum than average. We discuss possible improvements to the CMD dust mapping technique, and explore further applications in both M31 and other galaxies.

  12. Leveraging Successful Collaborative Processes to Improve Performance Outcomes in Large-Scale Event Planning: Super Bowl, A Planned Homeland Security Event

    Science.gov (United States)

    2010-03-01

    are turning out to be counterproductive because they are culturally anathema (Wollman, 2009). A consideration of psychological tenets by Sigmund ... Freud suggests a principle aspect of dysfunction in collaboration. He reasoned that An Ego governed by social convention and a Superego governed by

  13. Phrenic nerve injury: An underrecognized and potentially preventable complication of pulmonary vein isolation using a wide-area circumferential ablation approach.

    Science.gov (United States)

    Yong Ji, Sang; Dewire, Jane; Barcelon, Bernadette; Philips, Binu; Catanzaro, John; Nazarian, Saman; Cheng, Alan; Spragg, David; Tandri, Harikrishna; Bansal, Sandeep; Ashikaga, Hiroshi; Rickard, Jack; Kolandaivelu, Aravindan; Sinha, Sunil; Marine, Joseph E; Calkins, Hugh; Berger, Ronald

    2013-10-01

    Phrenic nerve injury (PNI) is a well-known, although uncommon, complication of pulmonary vein isolation (PVI) using radiofrequency energy. Currently, there is no consensus about how to avoid or minimize this injury. The purpose of this study was to determine how often the phrenic nerve, as identified using a high-output pacing, lies along the ablation trajectory of a wide-area circumferential lesion set. We also sought to determine if PVI can be achieved without phrenic nerve injury by modifying the ablation lesion set so as to avoid those areas where phrenic nerve capture (PNC) is observed. We prospectively enrolled 100 consecutive patients (age 61.7 ± 9.2 years old, 75 men) who underwent RF PVI using a wide-area circumferential ablation approach. A high-output (20 mA at 2 milliseconds) endocardial pacing protocol was performed around the right pulmonary veins and the carina where a usual ablation lesion set would be made. A total of 30% of patients had PNC and required modification of ablation lines. In the group of patients with PNC, the carina was the most common site of capture (85%) followed by anterior right superior pulmonary vein (RSPV) (70%) and anterior right inferior pulmonary vein (RIPV) (30%). A total of 25% of PNC group had capture in all 3 (RSPV, RIPV, and carina) regions. There was no difference in the clinical characteristics between the groups with and without PNC. RF PVI caused no PNI in either group. High output pacing around the right pulmonary veins and the carina reveals that the phrenic nerve lies along a wide-area circumferential ablation trajectory in 30% of patients. Modification of ablation lines to avoid these sites may prevent phrenic nerve injury during RF PVI. © 2013 Wiley Periodicals, Inc.

  14. Wide area Hyperspectral Motion Imaging

    Science.gov (United States)

    2017-02-03

    detection at a manageable false alarm rate using the adaptive coherence estimator algorithm. A radiance spectrum was calculated with MODTRAN at 5km...1mHz. In order to meet SNR and update rate, the area coverage is reduced to less than the size of a football stadium. An interferometer has

  15. AIRIS Wide Area Detection System

    Science.gov (United States)

    2003-07-01

    herbicola, the chemical stimulant SF6, as well as the interferents kaolin clay dust, Dugway road dust, and diesel soot. In this paper we will report on...the SF6 column density of approximately 200 ppmv-m. In future work we hope to correlate this measurement with a Gaussian plume dispersion model of

  16. Securing a better future for all: Nuclear techniques for global development and environmental protection. NA factsheet on nuclear sciences and applications collaborating centres: Establishing a culture of cooperation

    International Nuclear Information System (INIS)

    2012-01-01

    As a large international organization with a variety of programmes, initiatives and laboratories, one of the mandates of the IAEA is to promote the peaceful use of nuclear techniques worldwide while also collaborating with other institutions in its Member States in order to implement part of its approved activities. In this regard, the IAEA designates selected institutions as official IAEA collaborating centres (IAEA-CCs). Recognizing the need to preserve and transfer nuclear knowledge, the IAEA-CCs are dedicated to furthering the research, development and training in peaceful applications of nuclear science and technology. By working alongside various nuclear related institutions from around the world, the IAEA contributes to reaching important targets laid out by the United Nations Millennium Development Goals. The IAEA-CCs are, in general, scientific institutions such as laboratories, universities, research facilities, etc., that receive public recognition by the IAEA and have been designated to collaborate with the IAEA in a variety of fields, such as food safety, environmental protection, water resources and human health. In line with the objectives of the IAEA, IAEA-CCs are expected to further the research, development and training in the peaceful applications of nuclear science and technology. Through these research and academic institutions, Member States can assist the IAEA with their own original research, development and training in nuclear technologies. As a cooperative mechanism, the IAEA-CC is also efficient, as it encourages centres to share resources, knowledge and expertise. One of the goals of the IAEA-CC is also to help developing Member States expand their capabilities in these areas and thus improve the quality of life of their citizens. So far, the IAEA-CC has led to socioeconomic benefits in many parts of the world, from Asia to Latin America.

  17. Collaborative Economy

    DEFF Research Database (Denmark)

    collaborative economy and tourism Dianne Dredge and Szilvia Gyimóthy PART I - Theoretical explorations 2.Definitions and mapping the landscape in the collaborative economy Szilvia Gyimóthy and Dianne Dredge 3.Business models of the collaborative economy Szilvia Gyimóthy 4.Responsibility and care...... in the collaborative economy Dianne Dredge 5.Networked cultures in the collaborative economy Szilvia Gyimóthy 6.Policy and regulatory perspectives in the collaborative economy Dianne Dredge PART II - Disruptions, innovations and transformations 7.Regulating innovation in the collaborative economy: An examination...... localities of tourism Greg Richards 11.Collaborative economy and destination marketing organizations: A systems approach Jonathan Day 12.Working within the Collaborative Tourist Economy: The complex crafting of work and meaning Jane Widtfeldt Meged and Mathilde Dissing Christensen PART - III Encounters...

  18. The design of delay-dependent wide-area DOFC with prescribed degree of stability α for damping inter-area low-frequency oscillations in power system.

    Science.gov (United States)

    Sun, Miaoping; Nian, Xiaohong; Dai, Liqiong; Guo, Hua

    2017-05-01

    In this paper, the delay-dependent wide-area dynamic output feedback controller (DOFC) with prescribed degree of stability is proposed for interconnected power system to damp inter-area low-frequency oscillations. Here, the prescribed degree of stability α is used to maintain all the poles on the left of s=-α in the s-plane. Firstly, residue approach is adopted to select input-output control signals and the schur balanced truncation model reduction method is utilized to obtain the reduced power system model. Secondly, based on Lyapunov stability theory and transformation operation in complex plane, the sufficient condition of asymptotic stability for closed-loop power system with prescribed degree of stability α is derived. Then, a novel method based on linear matrix inequalities (LMIs) is presented to obtain the parameters of DOFC and calculate delay margin of the closed-loop system considering the prescribed degree of stability α. Finally, case studies are carried out on the two-area four-machine system, which is controlled by classical wide-area power system stabilizer (WAPSS) in reported reference and our proposed DOFC respectively. The effectiveness and advantages of the proposed method are verified by the simulation results under different operating conditions. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  19. Collaborative Economy

    DEFF Research Database (Denmark)

    that are emerging from them, and how governments are responding to these new challenges. In doing so, the book provides both theoretical and practical insights into the future of tourism in a world that is, paradoxically, becoming both increasingly collaborative and individualized. Table of Contents Preface 1.The...... collaborative economy and tourism Dianne Dredge and Szilvia Gyimóthy PART I - Theoretical explorations 2.Definitions and mapping the landscape in the collaborative economy Szilvia Gyimóthy and Dianne Dredge 3.Business models of the collaborative economy Szilvia Gyimóthy 4.Responsibility and care...... in the collaborative economy Dianne Dredge 5.Networked cultures in the collaborative economy Szilvia Gyimóthy 6.Policy and regulatory perspectives in the collaborative economy Dianne Dredge PART II - Disruptions, innovations and transformations 7.Regulating innovation in the collaborative economy: An examination...

  20. Working Collaboratively

    DEFF Research Database (Denmark)

    Holder, Anna; Lovett, George

    2009-01-01

    identified as a transformative global force of the last decade, most notably in knowledge and information publishing, communication and creation. This paper presents a structured conversation on changing understandings of collaboration, and the realities of collaborative methodology in architectural work...

  1. 17 October 2013 - C. Ashton High Representative of the European Union for Foreign Affairs and Security Policy, Vice-President of the European Commission visiting the ATLAS cavern with ATLAS Collaboration Spokesperson D. Charlton; visiting the LHC tunnel at Point 1 with Technology Department Head F. Bordry and signing the Guest book with CERN Director-General R. Heuer.

    CERN Multimedia

    Maximilien Brice

    2013-01-01

    17 October 2013 - C. Ashton High Representative of the European Union for Foreign Affairs and Security Policy, Vice-President of the European Commission visiting the ATLAS cavern with ATLAS Collaboration Spokesperson D. Charlton; visiting the LHC tunnel at Point 1 with Technology Department Head F. Bordry and signing the Guest book with CERN Director-General R. Heuer.

  2. CMS Collaboration

    International Nuclear Information System (INIS)

    Faridah Mohammad Idris; Wan Ahmad Tajuddin Wan Abdullah; Zainol Abidin Ibrahim

    2013-01-01

    Full-text: CMS Collaboration is an international scientific collaboration located at European Organization for Nuclear Research (CERN), Switzerland, dedicated in carried out research on experimental particle physics. Consisting of 179 institutions from 41 countries from all around the word, CMS Collaboration host a general purpose detector for example the Compact Muon Solenoid (CMS) for members in CMS Collaboration to conduct experiment from the collision of two proton beams accelerated to a speed of 8 TeV in the LHC ring. In this paper, we described how the CMS detector is used by the scientist in CMS Collaboration to reconstruct the most basic building of matter. (author)

  3. Secure ICCP Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Rice, Mark J.; Bonebrake, Christopher A.; Dayley, Greg K.; Becker, Larry J.

    2017-06-30

    Inter-Control Center Communications Protocol (ICCP), defined by the IEC 60870-6 TASE.2 standard, was developed to enable data exchange over wide area networks between electric system entities, including utility control centers, Independent System Operators (ISOs), Regional Transmission Operators (RTOs) and Independent Power Producers (IPP) also known as Non-Utility Generators (NUG). ICCP is an unprotected protocol, and as a result is vulnerable to such actions as integrity violation, interception or alteration, spoofing, and eavesdropping. Because of these vulnerabilities with unprotected ICCP communication, security enhancements, referred to as Secure ICCP, have been added and are included in the ICCP products that utilities have received since 2003 when the standard was defined. This has resulted in an ICCP product whose communication can be encrypted and authenticated to address these vulnerabilities.

  4. The Sea Ice for Walrus Outlook: A collaboration between scientific and Indigenous communities to support safety and food security in a changing Arctic

    Science.gov (United States)

    Sheffield Guy, L.; Wiggins, H. V.; Schreck, M. B.; Metcalf, V. K.

    2017-12-01

    The Sea Ice for Walrus Outlook (SIWO) provides Alaskan Native subsistence walrus hunters and Bering Strait coastal communities with weekly reports on spring sea ice and weather conditions to promote hunter safety, food security, and preservation of cultural heritage. These reports integrate scientific and Indigenous knowledge into a co-produced tool that is used by both local and scientific communities. SIWO is a team effort led by the Arctic Research Consortium of the U.S. (ARCUS, with funding from NSF Arctic Sciences Section), with the Eskimo Walrus Commission, National Weather Service - Alaska Sea Ice Program, University of Alaska Fairbanks - International Arctic Research Center, and local observers. For each weekly outlook, the National Weather Service provides location-specific weather and sea ice forecasts and regional satellite imagery. Local observations of sea ice, weather, and hunting conditions are provided by observers from five Alaskan communities in the Bering Strait region: Wales, Shishmaref, Nome, Gambell, and Savoonga. These observations typically include a written description of conditions accompanied by photographs of sea ice or subsistence activities. Outlooks are easily accessible and provide a platform for sharing of knowledge among hunters in neighboring communities. The opportunity to contribute is open, and Indigenous language and terms are encouraged. These observations from local hunters and community members also provide a valuable tool for validation of weather forecasts, satellite products, and other information for scientists. This presentation will discuss the process, products, and mutually beneficial outcomes of the Sea Ice for Walrus Outlook.

  5. Collaborative Economy

    DEFF Research Database (Denmark)

    collaborative economy and tourism Dianne Dredge and Szilvia Gyimóthy PART I - Theoretical explorations 2.Definitions and mapping the landscape in the collaborative economy Szilvia Gyimóthy and Dianne Dredge 3.Business models of the collaborative economy Szilvia Gyimóthy 4.Responsibility and care...... and similar phenomena are among these collective innovations in tourism that are shaking the very bedrock of an industrial system that has been traditionally sustained along commercial value chains. To date there has been very little investigation of these trends, which have been inspired by, amongst other...... in the collaborative economy Dianne Dredge 5.Networked cultures in the collaborative economy Szilvia Gyimóthy 6.Policy and regulatory perspectives in the collaborative economy Dianne Dredge PART II - Disruptions, innovations and transformations 7.Regulating innovation in the collaborative economy: An examination...

  6. Collaboration and E-collaboration

    DEFF Research Database (Denmark)

    Razmerita, Liana; Kirchner, Kathrin

    2015-01-01

    Understanding student’s perception of collaboration and how collaboration is supported by ICT is important for its efficient use in the classroom. This article aims to investigate how students perceive collaboration and how they use new technologies in collaborative group work. Furthermore......, it tries to measure the impact of technology on students’ satisfaction with collaboration outcomes. In particular, the study aims to address the following research questions: Which demographic information (e.g. gender and place of origin) is significant for collaboration and ecollaboration? and Which...... are the perceived factors that influence the students’ group performance? The findings of this study emphasize that there are gender and cultural differences with respect to the perception of e-collaboration. Furthermore, the article summarizes in a model the most significant factors influencing group performance....

  7. Collaborative experience

    DEFF Research Database (Denmark)

    Mortensen, Thomas Bøtker

    -Doerr, 1996) and has been shown to have a positive effect to the outcome of collaborative R&D (Sampson, 2005). Anand & Khanna (2000), furthermore, hypothesized that research joint ventures are more ambiguous than marketing joint ventures and even more the licensing and showed that the effect of collaborative......Literature review: Collaborative experience has been shown to have a positive effect on the collaborative outcome in general (Anand & Khanna, 2000; Kale, Dyer & Singh, 2002). Furthermore, it has been linked to the ability to exploit the network of the firm for learning (Powell, Koput and Smith...... experience was largest the higher the hypothesized ambiguity. Theoretically contribution: This research project aims at contributing to existing literature by arguing, that collaborative experience is a moderating variable which moderates the effects on collaborative outcome from the level of complexity...

  8. Support and development for remote collaborations in fusion research

    International Nuclear Information System (INIS)

    Casper, T.A.; Jong, R.A.; Meyer, W.H.; Moller, J.M.

    2000-01-01

    Major fusion experiments and modeling efforts rely on joint research of scientists from several locations around the world. A variety of software tools are in use to provide remote interactive access to facilities and data are routinely available over wide-area-network connections to researchers. Audio and video communications, monitoring of control room information and synchronization of remote sites with experimental operations all enhance participation during experiments. Remote distributed computing capabilities allow utilization of off-site computers that now help support the demands of control room analyses and plasma modeling. A collaborative software development project is currently using object technologies with CORBA-based communications to build a network executable transport code that further demonstrates the ability to utilize geographically dispersed resources. Development to extend these concepts with security and naming services and possible applications to instrumentation systems has been initiated. An Information Technology Initiative is deploying communication systems, ISDN (telephone) and IP (network) audio/video (A/V) and web browser-based, to build the infrastructure needed to support remote physics meetings, seminars and interactive discussions

  9. Support and development for remote collaboration in fusion research

    International Nuclear Information System (INIS)

    Casper, T A; Jong, R A; Meyer, W H; Moller, J M

    1999-01-01

    Major fusion experiments and modeling efforts rely on joint research of scientists from several locations around the world. A variety of software tools are in use to provide remote interactive access to facilities and data are routinely available over wide-area-network connections to researchers. Audio and video communications, monitoring of control room information and synchronization of remote sites with experimental operations all enhance participation during experiments. Remote distributed computing capabilities allow utilization of off-site computers that now help support the demands of control room analyses and plasma modeling. A collaborative software development project is currently using object technologies with CORBA-based communications to build a network executable transport code that further demonstrates the ability to utilize geographically dispersed resources. Development to extend these concepts with security and naming services and possible applications to instrumentation systems has been initiated. An Information Technology Initiative is deploying communication systems, ISDN (telephone) and IP (network) audio/video (A/V) and web browser-based, to build the infrastructure needed to support remote physics meetings, seminars and interactive discussions

  10. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  11. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  12. Evidence-based recommendations for musculoskeletal kinematic 4D-CT studies using wide area-detector scanners: a phantom study with cadaveric correlation

    Energy Technology Data Exchange (ETDEWEB)

    Gondim Teixeira, Pedro Augusto; Formery, Anne-Sophie; Blum, Alain [CHRU-Nancy Hopital Central, Service d' Imagerie Guilloz, Nancy (France); Hossu, Gabriela [Universite de Lorraine, IADI U947, Nancy (France); INSERM, CIC-IT 1433, Nancy (France); Winninger, Daniel [IDCmem, Nancy (France); Batch, Toufik [Hopital de Mercy, Service de Radiologie, Metz (France); Gervaise, Alban [Legouest Military Instruction Hospital, Medical Imaging Department, Metz (France)

    2017-02-15

    To establish evidence-based recommendations for musculoskeletal kinematic 4D-CT on wide area-detector CT. In order to assess factors influencing image quality in kinematic CT studies, a phantom consisting of a polymethylmethacrylate rotating disk with round wells of different sizes was imaged with various acquisition protocols. Cadaveric acquisitions were performed on the ankle joint during motion in two different axes and at different speeds to allow validation of phantom data. Images were acquired with a 320 detector-row CT scanner and were evaluated by two readers. Motion artefacts were significantly correlated with various parameters (movement axis, distance to centre, rotation speed and volume acquisition speed) (p < 0.0001). The relation between motion artefacts and distance to motion fulcrum was exponential (R{sup 2} 0.99). Half reconstruction led to a 23 % increase in image noise and a 40 % decrease in motion artefacts. Cadaveric acquisitions confirmed phantom data. Based on these findings, high tube rotation speed and half reconstruction are recommended for kinematic CT. The axis of motion significantly influences image artefacts and should be considered in patient training and evaluation of acquisition protocol suitability. This study provides evidence-based recommendations for musculoskeletal kinematic 4D-CT. (orig.)

  13. Measurement of air dose rates over a wide area around the Fukushima Dai-ichi Nuclear Power Plant through a series of car-borne surveys.

    Science.gov (United States)

    Andoh, Masaki; Nakahara, Yukio; Tsuda, Shuichi; Yoshida, Tadayoshi; Matsuda, Norihiro; Takahashi, Fumiaki; Mikami, Satoshi; Kinouchi, Nobuyuki; Sato, Tetsuro; Tanigaki, Minoru; Takamiya, Koichi; Sato, Nobuhiro; Okumura, Ryo; Uchihori, Yukio; Saito, Kimiaki

    2015-01-01

    A series of car-borne surveys using the Kyoto University RAdiation MApping (KURAMA) and KURAMA-II survey systems has been conducted over a wide area in eastern Japan since June 2011 to evaluate the distribution of air dose rates around the Fukushima Dai-ichi Nuclear Power Plant and to evaluate the time-dependent trend of decrease in air dose rates. An automated data processing system for the KURAMA-II system was established, which enabled rapid analysis of large amounts of data obtained using about 100 KURAMA-II units. The initial data used for evaluating the migration status of radioactive cesium were obtained in the first survey, followed by other car-borne surveys conducted over more extensive and wider measurement ranges. By comparing the measured air dose rates obtained in each survey (until December 2012), the decreasing trend of air dose rates measured through car-borne surveys was found to be more pronounced than those expected on the basis of the physical decay of radioactive cesium and of the air dose rates measured using NaI (Tl) survey meters in the areas surrounding the roadways. In addition, it was found that the extent of decrease in air dose rates depended on land use, wherein it decreased faster for land used as building sites than for forested areas. Copyright © 2014 Elsevier Ltd. All rights reserved.

  14. A Hardware-in-the-Loop Based Co-Simulation Platform of Cyber-Physical Power Systems for Wide Area Protection Applications

    Directory of Open Access Journals (Sweden)

    Yi Tang

    2017-12-01

    Full Text Available With the development of smart grid technology, there has been an increasingly strong tendency towards the integration between the aspects of power and communication. The traditional power system has gradually transformed into the cyber-physical power system (CPPS, where co-simulation technologies can be utilized as an effective measure to describe the computation, communication, and integration processes of a power grid. In this paper, the construction methods and application scenarios of co-simulation platforms in the current research are first summarized. Then, a scheme of the real-time hardware-in-the-loop co-simulation platform is put forward. On the basis of power grid simulation developed with the Real-Time Laboratory (RT-LAB, and the communication network simulation developed with OPNET, the control center was developed with hardware devices to realize real-world control behavior instead of digital simulations. Therefore, the mixed-signal platform is capable of precisely simulating the dynamic features of CPPS with high speed. The distributed simulation components can be coordinated in a unified environment with high interoperability and reusability. Moreover, through a case study of a wide area load control system, the performance of the proposed platform under various conditions of control strategies, communication environments, and sampling frequencies was revealed and compared. As a result, the platform provided an intuitive and accurate way to reconstruct the CPPS environment where the influence of the information side of the CPPS control effects was verified.

  15. Development of a Geographical Information System (GIS for the Integration of Solar Energy in the Energy Planning of a Wide Area

    Directory of Open Access Journals (Sweden)

    Angelamaria Massimo

    2014-08-01

    Full Text Available Energy planning has become one of the most powerful tools for urban planning even if several constraints, (i.e., aesthetic, archaeological, landscape and technological (low diffusion of Renewable Energy Sources, RES reduce its spreading. An efficient and sustainable urban planning process should be based on detailed energy issues, such as: (i the effective energetic characteristics and needs of the area like urban density and energy consumption, (ii the integration of different RES and (iii the diffusion of high efficiency technologies for energy production like cogeneration and district heating. The above-mentioned energetic issues and constraints must be constantly updated, in order to evaluate the consequences on environment and landscape due to new distributed generation technologies. Moreover, energy strategies and policies must be adapted to the actual evolution of the area. In this paper the authors present a Geographical Information Database System (GIS DB based on: (i the availability of land use (Land Capability Classification, LCC to evaluate the productive potential; (ii the estimation of residential energy consumptions (e.g., electricity, (iii the integration of RES. The GIS DB model has been experimented in a wide area of Central Italy, considering exclusively the solar energy source for energy generation.

  16. Collaborative Hierarchy.

    Science.gov (United States)

    Maris, Mariann

    The University of Wisconsin-Milwaukee writing program is collaborative, not divisionary, as some, such as Jeanne Gunner, have suggested. Three terms are useful in understanding the relationships and ethics governing operations at Wisconsin-Milwaukee: (1) authority and collaboration; (2) hierarchical difference; (3) professional respect.…

  17. Collaborative Prototyping

    DEFF Research Database (Denmark)

    Bogers, Marcel; Horst, Willem

    2014-01-01

    of the prototyping process, the actual prototype was used as a tool for communication or development, thus serving as a platform for the cross-fertilization of knowledge. In this way, collaborative prototyping leads to a better balance between functionality and usability; it translates usability problems into design......This paper presents an inductive study that shows how collaborative prototyping across functional, hierarchical, and organizational boundaries can improve the overall prototyping process. Our combined action research and case study approach provides new insights into how collaborative prototyping...... can provide a platform for prototype-driven problem solving in early new product development (NPD). Our findings have important implications for how to facilitate multistakeholder collaboration in prototyping and problem solving, and more generally for how to organize collaborative and open innovation...

  18. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  19. Exploring the Mechanisms of Knowledge Transfer in University-Industry Collaborations

    DEFF Research Database (Denmark)

    Nielsen, Christian; Cappelen, Katja

    2014-01-01

    respondents have been involved in collaborative projects, such as student-industry cooperation or collaboration projects between scientists and businesses. This research shows that to secure real value adding through knowledge transfer in universityindustry collaboration projects, it is important...

  20. Informatics for neglected diseases collaborations.

    Science.gov (United States)

    Bost, Frederic; Jacobs, Robert T; Kowalczyk, Paul

    2010-05-01

    Many different public and private organizations from across the globe are collaborating on neglected diseases drug-discovery and development projects with the aim of identifying a cure for tropical infectious diseases. These neglected diseases collaborations require a global, secure, multi-organization data-management solution, combined with a platform that facilitates communication and supports collaborative work. This review discusses the solutions offered by 'Software as a Service' (SaaS) web-based platforms, despite notable challenges, and the evolution of these platforms required to foster efficient virtual research efforts by geographically dispersed scientists.

  1. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP

    Directory of Open Access Journals (Sweden)

    Dan Garcia-Carrillo

    2017-11-01

    Full Text Available The Internet-of-Things (IoT landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN, the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP, which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA infrastructures and the Extensible Authentication Protocol (EAP protocol. For this integration, we use the Constrained Application Protocol (CoAP to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  2. Standoff detection of bioaerosols over wide area using a newly developed sensor combining a cloud mapper and a spectrometric LIF lidar

    Science.gov (United States)

    Buteau, Sylvie; Simard, Jean-Robert; Roy, Gilles; Lahaie, Pierre; Nadeau, Denis; Mathieu, Pierre

    2013-10-01

    A standoff sensor called BioSense was developed to demonstrate the capacity to map, track and classify bioaerosol clouds from a distant range and over wide area. The concept of the system is based on a two steps dynamic surveillance: 1) cloud detection using an infrared (IR) scanning cloud mapper and 2) cloud classification based on a staring ultraviolet (UV) Laser Induced Fluorescence (LIF) interrogation. The system can be operated either in an automatic surveillance mode or using manual intervention. The automatic surveillance operation includes several steps: mission planning, sensor deployment, background monitoring, surveillance, cloud detection, classification and finally alarm generation based on the classification result. One of the main challenges is the classification step which relies on a spectrally resolved UV LIF signature library. The construction of this library relies currently on in-chamber releases of various materials that are simultaneously characterized with the standoff sensor and referenced with point sensors such as Aerodynamic Particle Sizer® (APS). The system was tested at three different locations in order to evaluate its capacity to operate in diverse types of surroundings and various environmental conditions. The system showed generally good performances even though the troubleshooting of the system was not completed before initiating the Test and Evaluation (T&E) process. The standoff system performances appeared to be highly dependent on the type of challenges, on the climatic conditions and on the period of day. The real-time results combined with the experience acquired during the 2012 T & E allowed to identify future ameliorations and investigation avenues.

  3. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP.

    Science.gov (United States)

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander

    2017-11-17

    The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  4. Measurement of air dose rates over a wide area around the Fukushima Dai-ichi Nuclear Power Plant through a series of car-borne surveys

    International Nuclear Information System (INIS)

    Andoh, Masaki; Nakahara, Yukio; Tsuda, Shuichi; Yoshida, Tadayoshi; Matsuda, Norihiro; Takahashi, Fumiaki; Mikami, Satoshi; Kinouchi, Nobuyuki; Sato, Tetsuro; Tanigaki, Minoru; Takamiya, Koichi; Sato, Nobuhiro; Okumura, Ryo; Uchihori, Yukio; Saito, Kimiaki

    2015-01-01

    A series of car-borne surveys using the Kyoto University RAdiation MApping (KURAMA) and KURAMA-II survey systems has been conducted over a wide area in eastern Japan since June 2011 to evaluate the distribution of air dose rates around the Fukushima Dai-ichi Nuclear Power Plant and to evaluate the time-dependent trend of decrease in air dose rates. An automated data processing system for the KURAMA-II system was established, which enabled rapid analysis of large amounts of data obtained using about 100 KURAMA-II units. The initial data used for evaluating the migration status of radioactive cesium were obtained in the first survey, followed by other car-borne surveys conducted over more extensive and wider measurement ranges. By comparing the measured air dose rates obtained in each survey (until December 2012), the decreasing trend of air dose rates measured through car-borne surveys was found to be more pronounced than those expected on the basis of the physical decay of radioactive cesium and of the air dose rates measured using NaI (Tl) survey meters in the areas surrounding the roadways. In addition, it was found that the extent of decrease in air dose rates depended on land use, wherein it decreased faster for land used as building sites than for forested areas. - Highlights: • Air dose rates distribution maps were constructed by Car-borne surveys. • KURAMA and KURAMA-II systems have been used for the measurement since 2011. • An automated data processing system for the KURAMA-II system was established. • Decreasing of the dose rates was more pronounced than those of the physical decay. • The dose rates decreased faster for building sites than for forested areas

  5. Wide-Area Landslide Deformation Mapping with Multi-Path ALOS PALSAR Data Stacks: A Case Study of Three Gorges Area, China

    Directory of Open Access Journals (Sweden)

    Xuguo Shi

    2016-02-01

    Full Text Available In recent years, satellite synthetic aperture radar interferometry (InSAR has been adopted as a spaceborne geodetic tool to successfully measure surface deformation of a few well-known landslides in the Three Gorges area. In consideration of the fact that most events of slope failure happened at places other than those famous landslides since the reservoir impoundment in 2003, focusing on a limited number of slopes is insufficient to meet the requirements of regional-scale landslide disaster prevention and early warning. As a result, it has become a vital task to evaluate the overall stability of slopes across the vast area of Three Gorges using wide-coverage InSAR datasets. In this study, we explored the approach of carrying out joint analysis of multi-path InSAR data stacks for wide-area landslide deformation mapping. As an example, three ALOS (Advanced Land Observing Satellite PALSAR (Phased Array type L-band Synthetic Aperture Radar data stacks of neighboring ascending paths covering the area along the Yangtze River from Fengjie to Zigui were analyzed. A key problem to be solved is the separation of the tropospheric signal from the interferometric phase, for which we employed a hybrid description model of the atmospheric phase screen (APS to improve APS estimation from time series interferograms. The estimated atmospheric phase was largely correlated with the seasonal rainfall in the temporal dimension. The experimental results show that about 30 slopes covering total areas of 48 km2 were identified to be landslides in active deformation and should be kept under routine surveillance. Analyses of time series displacement measurements revealed that most landslides in the mountainous area far away from Yangtze River suffered from linear deformation, whereas landslides located on the river bank were destabilized predominantly by the influences of reservoir water level fluctuation and rainfall.

  6. Authentication and Data Security in ITS Telecommunications Solutions

    Directory of Open Access Journals (Sweden)

    Tomas Zelinka

    2014-04-01

    Full Text Available Paper presents telecommunications security issues with dynamically changing networking. Paper also presents performance indicators of authentication as an integral part of the approach to non-public information. Expected level of security depend on relevant ITS services requirements, different solutions require different levels of quality. Data volumes transferred both in private data vehicle on board networks as well as between vehicles and infrastructure or other vehicles significantly and progressively grow. This trend leads to increase of the fatal problems if security of the wide area networks is not relevantly treated. Relevant communications security treatment becomes crucial part of the ITS telecommunications solution because probability of hazards appearances grow if vehicles networks are integrated in the dynamically organized wide area networks. Besides of available "off shelf" security tools solution based on non-public universal identifier with dynamical extension and data selection according to actor role or category is presented including performances indicators for the authentication process.

  7. Collaborative Consumption

    DEFF Research Database (Denmark)

    Gjerdrum Pedersen, Esben Rahbek; Netter, Sarah

    2015-01-01

    Purpose – The purpose of this paper is to explore barriers and opportunities for business models based on the ideas of collaborative consumption within the fashion industry. Design/methodology/approach – The analysis is based on a multiple-case study of Scandinavian fashion libraries – a new...... to the new phenomenon of fashion libraries and does not cover other types of collaborative consumption within the fashion industry (Swap-parties, etc.). Originality/value – The paper is one of the first attempts to examine new business models of collaborative consumption in general and the fashion library...... concept in particular. The study contributes to the discussions of whether and how fashion sharing and collaboration holds promise as a viable business model and as a means to promote sustainability....

  8. Collaborative Consumption

    DEFF Research Database (Denmark)

    Gjerdrum Pedersen, Esben Rahbek; Netter, Sarah

    Purpose: The purpose of this paper is to explore barriers and opportunities for business models based on the ideas of collaborative consumption within the fashion industry. Design/methodology/approach: The analysis is based on a multiple-­‐‑case study of Scandinavian fashion libraries – a new...... to the new phenomenon of fashion libraries and does not cover other types of collaborative consumption within the fashion industry (Swap-­‐‑parties, etc.). Originality/value: The paper is one of the first attempts to examine new business models of collaborative consumption in general and the fashion library...... concept in particular. The study contributes to the discussions of whether and how fashion sharing and collaboration holds promise as a viable business model and as a means to promote sustainability....

  9. Development of environmental monitoring robot against nuclear hazard and establishment of its wide-area transportation method using a cargo plane

    International Nuclear Information System (INIS)

    Magara, Shigenori; Kimura, Norio; Onishi, Ryoichi; Yamasaki, Hitoshi; Kimura, Toshimasa; Sugisaki, Norihiko; Maeyama, Hiroshi

    2008-01-01

    In case of nuclear hazard, collecting images and radiological information around the epicenter are strongly anticipated for making evacuation plans and securing residents' safety. In order to meet with this requirement, Nuclear Safety Technology Center has developed the two types of environmental monitoring robots; MONIROBO-A and -B, which work for gathering the images and monitoring the radiation doses in hazardous area through the remote-control by the operator in distant secured area. MONIROBO-A collects the images of hazard center using laser scanner and infrared camera, while MONIROBO-B monitors the atmospheric condition using neutron measurement device, flammable gas detector and dust sampler. Also the both types have gamma ray measurement instruments and manipulators. They are sized almost 1.5 m in length and height, and weighed 600kg in mass. (author)

  10. Building Collaborative Capacity for Homeland Security

    Science.gov (United States)

    2004-11-01

    Kesner, I. F. (1993). Top Managerial Prestige, Power and Tender Offer Response - a Study of Elite Social Networks and Target Firm Cooperation During...Organization Science, 12(3), 372-388. Galaskiewicz, J., & Burt, R. S. (1991). Interorganization Contagion in Corporate Philanthropy . Administrative

  11. Wireless security in mobile health.

    Science.gov (United States)

    Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan

    2012-12-01

    Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.

  12. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  13. Collaborative Economy

    DEFF Research Database (Denmark)

    things, de-industrialization processes and post-capitalist forms of production and consumption, postmaterialism, the rise of the third sector and collaborative governance. Addressing that gap, this book explores the character, depth and breadth of these disruptions, the creative opportunities for tourism...... that are emerging from them, and how governments are responding to these new challenges. In doing so, the book provides both theoretical and practical insights into the future of tourism in a world that is, paradoxically, becoming both increasingly collaborative and individualized. Table of Contents Preface 1.The......This book employs an interdisciplinary, cross-sectoral lens to explore the collaborative dynamics that are currently disrupting, re-creating and transforming the production and consumption of tourism. House swapping, ridesharing, voluntourism, couchsurfing, dinner hosting, social enterprise...

  14. Collaborative Improvement

    DEFF Research Database (Denmark)

    Kaltoft, Rasmus

    The thesis data have been collected in the EU-sponsored project: Collaborative Improvement Tool for the Extended Manufacturing Enterprise, CO-IMPROVE. In this project four universities (Denmark, Ireland, Italy, and The Netherlands), two software vendors (Greece and Sweden) and three companies...... (Denmark, Italy and The Netherlands) each with three to five suppliers were involved. The CO-IMPROVE project and the thesis is based on “action research” and “action learning”. The main aim of the whole project is through actual involvement and actions make the researchers, companies and selected suppliers...... learn how to improve operations in (hopefully) a win-win like manner through collaboration....

  15. Collaborative Improvement

    DEFF Research Database (Denmark)

    Kaltoft, Rasmus

    -organisational continuous improvement of their performance, relative to that of other EMEs. Developing a collaborative improvement relationship between companies is a protracted and complex process and, according to some surveys, the failure rate is as low as one to three. This failure rate is affected by a whole range...... of factors. The research presented in this thesis was aimed at identifying these factors and investigating their interplay and influence on the progress and success of the development of the collaborative improvement. This thesis presents our findings regarding the factors found, their interplay...

  16. Contested collaboration

    DEFF Research Database (Denmark)

    Sonnenwald, Diane H.

    1995-01-01

    . The model describes design phases, roles, themes, and intergroup communication networks as they evolve throughout the design process and characterizes design as a process of "contested collaboration". It is a first step towards a predictive design model that suggests strategies which may help participants...

  17. Timeline Collaboration

    DEFF Research Database (Denmark)

    Bohøj, Morten; Borchorst, Nikolaj Gandrup; Bouvin, Niels Olof

    2010-01-01

    This paper explores timelines as a web-based tool for collaboration between citizens and municipal caseworkers. The paper takes its outset in a case study of planning and control of parental leave; a process that may involve surprisingly many actors. As part of the case study, a web-based timeline...

  18. Collaborative Appropriation

    DEFF Research Database (Denmark)

    Muller, Michael; Neureiter, Katja; Verdezoto, Nervo

    2016-01-01

    Previous workshops and papers have examined how individual users adopt and adapt technologies to meet their own local needs, by “completing design through use.” However, there has been little systematic study of how groups of people engage collaboratively in these activities. This workshop opens ...

  19. Collaborative Design

    Science.gov (United States)

    Broderick, Debora

    2014-01-01

    This practitioner research study investigates the power of multimodal texts within a real-world context and argues that a participatory culture focused on literary arts offers marginalized high school students opportunities for collaborative design and authoring. Additionally, this article invites educators to rethink the at-risk label. This…

  20. Securing Distributed Research

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    Global science calls for global infrastructure. A typical large-scale research group will use a suite of international services and involve hundreds of collaborating institutes and users from around the world. How can these users access those services securely? How can their digital identities be established, verified and maintained? We will explore the motivation for distributed authentication and the ways in which research communities are addressing the challenges. We will discuss security incident response in distributed environments - a particular challenge for the operators of these infrastructures. Through this course you should gain an overview of federated identity technologies and protocols, including x509 certificates, SAML and OIDC.

  1. Surface computing and collaborative analysis work

    CERN Document Server

    Brown, Judith; Gossage, Stevenson; Hack, Chris

    2013-01-01

    Large surface computing devices (wall-mounted or tabletop) with touch interfaces and their application to collaborative data analysis, an increasingly important and prevalent activity, is the primary topic of this book. Our goals are to outline the fundamentals of surface computing (a still maturing technology), review relevant work on collaborative data analysis, describe frameworks for understanding collaborative processes, and provide a better understanding of the opportunities for research and development. We describe surfaces as display technologies with which people can interact directly, and emphasize how interaction design changes when designing for large surfaces. We review efforts to use large displays, surfaces or mixed display environments to enable collaborative analytic activity. Collaborative analysis is important in many domains, but to provide concrete examples and a specific focus, we frequently consider analysis work in the security domain, and in particular the challenges security personne...

  2. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  3. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  4. Collaborative Information Technologies

    Science.gov (United States)

    Meyer, William; Casper, Thomas

    1999-11-01

    Significant effort has been expended to provide infrastructure and to facilitate the remote collaborations within the fusion community and out. Through the Office of Fusion Energy Science Information Technology Initiative, communication technologies utilized by the fusion community are being improved. The initial thrust of the initiative has been collaborative seminars and meetings. Under the initiative 23 sites, both laboratory and university, were provided with hardware required to remotely view, or project, documents being presented. The hardware is capable of delivering documents to a web browser, or to compatible hardware, over ESNET in an access controlled manner. The ability also exists for documents to originate from virtually any of the collaborating sites. In addition, RealNetwork servers are being tested to provide audio and/or video, in a non-interactive environment with MBONE providing two-way interaction where needed. Additional effort is directed at remote distributed computing, file systems, security, and standard data storage and retrieval methods. This work supported by DoE contract No. W-7405-ENG-48

  5. Proof of Concept Integration of a Single-Level Service-Oriented Architecture into a Multi-Domain Secure Environment

    National Research Council Canada - National Science Library

    Gilkey, Craig M

    2008-01-01

    .... Such web services operating across multiple security domains would provide additional advantages, including improved intelligence aggregation, and real-time collaboration between users in different security domains...

  6. Collaborative Consumption

    OpenAIRE

    Rahbek Gjerdrum Pedersen, Esben; Netter, Sarah

    2013-01-01

    Purpose: The purpose of this paper is to explore barriers and opportunities for business models based on the ideas of collaborative consumption within the fashion industry. Design/methodology/approach: The analysis is based on a multiple-­‐‑case study of Scandinavian fashion libraries – a new, clothes-­‐‑sharing concept that has emerged as a fashion niche within the last decade. Findings: It is concluded that fashion libraries offers interesting perspectives, e.g. by allow...

  7. Collaborative sketching

    DEFF Research Database (Denmark)

    Johansson, Martin Wetterstrand

    2006-01-01

    Sketching is a most central activity with in most design projects. But what happens if we adopt the ideas of collaborative design and invite participants that are not trained to sketch in to the design process, how can they participate in this central activity? This paper offers an introduction to...... the design material has been used to co- author possible futures within the scope of design sessions....

  8. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  9. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  10. Additional Security Considerations for Grid Management

    Science.gov (United States)

    Eidson, Thomas M.

    2003-01-01

    The use of Grid computing environments is growing in popularity. A Grid computing environment is primarily a wide area network that encompasses multiple local area networks, where some of the local area networks are managed by different organizations. A Grid computing environment also includes common interfaces for distributed computing software so that the heterogeneous set of machines that make up the Grid can be used more easily. The other key feature of a Grid is that the distributed computing software includes appropriate security technology. The focus of most Grid software is on the security involved with application execution, file transfers, and other remote computing procedures. However, there are other important security issues related to the management of a Grid and the users who use that Grid. This note discusses these additional security issues and makes several suggestions as how they can be managed.

  11. Next generation environment for collaborative research

    International Nuclear Information System (INIS)

    Collados, D.; Denis, G.; Galvez, P.; Newman, H.

    2001-01-01

    Collaborative environments supporting point to point and multipoint video-conferencing, document and application sharing across both local and wide area networks, video on demand (broadcast and playback) and interactive text facilities will be a crucial element for the development of the next generation of HEP experiments by geographically dispersed collaborations. The 'Virtual Room Video conferencing System' (VRVS) has been developed since 1995, in order to provide a low cost, bandwidth-efficient, extensible means for video conferencing and remote collaboration over networks within the High Energy and Nuclear Physics communities. The VRVS provides worldwide videoconferencing service and collaborative environment to the research and education communities. VRVS uses the Internet2 and ESnet high-performance networks infrastructure to deploy its Web-based system, which now includes more than 5790 registered hosts running VRVS software in more than 50 different countries. VRVS hosts an average of 100-multipoint videoconference and collaborative sessions worldwide every month. There are around 35 reflectors that manage the traffic flow, at HENP labs and universities in the US and Europe. So far, there are 7 Virtual Rooms for World Wide Conferences (involving more than one continent), and 4 Virtual Rooms each for intra-continental conferences in the US, Europe and Asia. VRVS continues to expand and implement new digital video technologies, including H.323 ITU standard integration, MPEG-2 videoconferencing integration, shared environments, and Quality of Service

  12. Collaborative Care

    OpenAIRE

    Schuyler, Dean

    2005-01-01

    本書を著したHornbyは英国のソーシャルワーカーである。彼女は1983年に「Collaboration in social work(Journal of social work practice,1.1)」を発表し、ソーシャルワークでの職種間の連携の重要性について報告している。さらに1993年に発刊した本書では、同一機関内の人間関係 ...

  13. AUTOMATING THE DATA SECURITY PROCESS

    OpenAIRE

    Florin Ogigau-Neamtiu

    2017-01-01

    Contemporary organizations face big data security challenges in the cyber environment due to modern threats and actual business working model which relies heavily on collaboration, data sharing, tool integration, increased mobility, etc. The nowadays data classification and data obfuscation selection processes (encryption, masking or tokenization) suffer because of the human implication in the process. Organizations need to shirk data security domain by classifying information based on its...

  14. INFORMATION SECURITY IN LOGISTICS COOPERATION

    Directory of Open Access Journals (Sweden)

    Tomasz Małkus

    2015-03-01

    Full Text Available Cooperation of suppliers of raw materials, semi-finished products, finished products, wholesalers, retailers in the form of the supply chain, as well as outsourcing of specialized logistics service require ensuring adequate support of information. It concerns the use of appropriate computer tools. The security of information in such conditions of collaboration becomes the important problem for parties of contract. The objective of the paper is to characterize main issues relating to security of information in logistics cooperation.

  15. Technology Empowerment: Security Challenges.

    Energy Technology Data Exchange (ETDEWEB)

    Warren, Drake Edward [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Backus, George A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Wendell [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nelson, Thomas R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Skocypec, Russell D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-03-01

    “Technology empowerment” means that innovation is increasingly accessible to ordinary people of limited means. As powerful technologies become more affordable and accessible, and as people are increasingly connected around the world, ordinary people are empowered to participate in the process of innovation and share the fruits of collaborative innovation. This annotated briefing describes technology empowerment and focuses on how empowerment may create challenges to U.S. national security. U.S. defense research as a share of global innovation has dwindled in recent years. With technology empowerment, the role of U.S. defense research is likely to shrink even further while technology empowerment will continue to increase the speed of innovation. To avoid falling too far behind potential technology threats to U.S. national security, U.S. national security institutions will need to adopt many of the tools of technology empowerment.

  16. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  17. Agricultural biodiversity, food security and climate change: a call for research and international collaboration.; Biodiversidad agricola, seguridad alimentaria y cambio climatico: una llamada a la investigacion y a la colaboracion internacional

    Energy Technology Data Exchange (ETDEWEB)

    Hodgkin, T.; Frison, E.; Fanzo, J.; Lopez Noriega, I.

    2011-07-01

    The events of these last years have shown that there are still major problems in the global food supply and food security and food prices can change very quickly. Therefore the reduction of food stocks, such as poor harvests, competition with bio fuels production, land grabbing and speculation have been identified as causing this situation. whatever the cause, the crisis has shown how far we are to achieve genuine food security. (Author) 31 refs.

  18. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  19. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  20. Java parallel secure stream for grid computing

    International Nuclear Information System (INIS)

    Chen, J.; Akers, W.; Chen, Y.; Watson, W.

    2001-01-01

    The emergence of high speed wide area networks makes grid computing a reality. However grid applications that need reliable data transfer still have difficulties to achieve optimal TCP performance due to network tuning of TCP window size to improve the bandwidth and to reduce latency on a high speed wide area network. The authors present a pure Java package called JPARSS (Java Parallel Secure Stream) that divides data into partitions that are sent over several parallel Java streams simultaneously and allows Java or Web applications to achieve optimal TCP performance in a gird environment without the necessity of tuning the TCP window size. Several experimental results are provided to show that using parallel stream is more effective than tuning TCP window size. In addition X.509 certificate based single sign-on mechanism and SSL based connection establishment are integrated into this package. Finally a few applications using this package will be discussed

  1. Collaborative Environments. Considerations Concerning Some Collaborative Systems

    Directory of Open Access Journals (Sweden)

    Mihaela I. MUNTEAN

    2009-01-01

    Full Text Available It is obvious, that all collaborative environments (workgroups, communities of practice, collaborative enterprises are based on knowledge and between collaboration and knowledge management there is a strong interdependence. The evolution of information systems in these collaborative environments led to the sudden necessity to adopt, for maintaining the virtual activities and processes, the latest technologies/systems, which are capable to support integrated collaboration in business services. In these environments, portal-based IT platforms will integrate multi-agent collaborative systems, collaborative tools, different enterprise applications and other useful information systems.

  2. FY 1974 Report on results of Sunshine Project. Research and development of methods for wide-area thermal structure exploitation; 1974 nendo koiki netsu kozo chosaho no kenkyu kaihatsu seika hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1975-05-28

    The project of (research and development of methods for wide-area thermal structure exploitation) is to pursue (1) development of heat flow rate analyzers, and researches on the methods for measurement/analysis of heat flow rates, (2) researches on geological thermometers with the cores collected from test bores as the samples, (3) observation/analysis of microearthquakes, and application of the results to the geothermal structure exploitation, and (4) development, on a trial basis, small, light air drilling machines. The method for clearly elucidating thermal structures has not been well established. Therefore, a test bore was drilled to measure temperature and collect the core samples in the wide-area geothermal district at Kita Yahata-daira as the model district, for measurement of heat flows, and analysis of the cores to estimate temperature at which they are formed. Microearthquakes, which frequently occur in geothermal areas, are also observed for extended periods. This project of (research and development of methods for wide-area thermal structure exploitation) is aimed at, based on the above efforts, to estimate/elucidate depth of thermal sources by the geological, geophysical and geochemical studies, relationships between geological structures and high-temperature zones, geothermal propagation structures, and geothermal reserves. This report summarizes the R and D results in the initial year of the 6-year plan. (NEDO)

  3. Collaborative innovation

    DEFF Research Database (Denmark)

    Torfing, Jacob; Sørensen, Eva; Hartley, Jean

    2013-01-01

    , which emphasizes market competition; the neo-Weberian state, which emphasizes organizational entrepreneurship; and collaborative governance, which emphasizes multiactor engagement across organizations in the private, public, and nonprofit sectors. The authors conclude that the choice of strategies......-driven private sector is more innovative than the public sector by showing that both sectors have a number of drivers of as well as barriers to innovation, some of which are similar, while others are sector specific. The article then systematically analyzes three strategies for innovation: New Public Management......There are growing pressures for the public sector to be more innovative but considerable disagreement about how to achieve it. This article uses institutional and organizational analysis to compare three major public innovation strategies. The article confronts the myth that the market...

  4. Enhancing regional collaboration -- taking the next step

    OpenAIRE

    Temple, Jennie M.

    2007-01-01

    CHDS State/Local Enhancing regional collaboration has been identified as one of the eight National Priorities for Homeland Security by the president of the United States. While South Carolina has made significant efforts in expanding regional collaboration, such as the creation of regional Counter Terrorism Coordinating Councils (CTCCs), there is still much work to be done. There are several teams and capabilities in place throughout the state, but they are uncoordinated, lack structure,...

  5. Collaboration between mental health and employment services to support employment of individuals with mental disorders

    NARCIS (Netherlands)

    Holwerda, Anja; Fokkens, Andrea S.; Engbers, Carola; Brouwer, Sandra

    2016-01-01

    Purpose: The aim of this study was to investigate the extent of the interdisciplinary collaboration between mental health (MHS) professionals and social security professionals (SSI), their perceptions of this interdisciplinary collaboration and whether these perceptions differed between

  6. Data security in Intelligent Transport Systems

    Directory of Open Access Journals (Sweden)

    Tomas Zelinka

    2012-10-01

    Full Text Available Intelligent Transport Services expect availability of the secure seamless communications solutions typically covering widely spread areas. Different ITS solutions require different portfolio of telecommunications service quality. These parameters have to correspond with ITS service performance parameters required by specific service. Even though quite extensive range of public wireless data services with reasonable coverage are provided, most of them are provided with no guaranteed quality and security. ITS requirements can be in most parameters easier reached if multi-path communications systems are applied core solution is combined with both public as well as private ones where and when it is needed. Such solution requires implementation of relevant flexible system architecture supported by the efficient decision processes. This paper is concentrated the telecommunications security issues relevant to the ITS wide area networking. Expected level of security varies in dependence on relevant ITS service requirements. Data volumes transferred both in private data vehicle on board networks as well as between vehicles and infrastructure (C2I or other vehicles (C2C progressively grow. Such trend upsurges the fatal problems appearance probability in case security of the wide area networks is not relevantly treated. That is reason why relevant communications security treatment becomes crucial part of the ITS solution. Besides of available "off shelf" security tools we present solution based on non-public universal identifier with dynamical extension (time and position dependency as an autonomous variables and data selection according to actor role or category. Presented results were obtained within projects e-Ident1, DOTEK2 and SRATVU3.

  7. Collaborative Access Control For Critical Infrastructures

    Science.gov (United States)

    Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed

    A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.

  8. Using JASON to secure SOA

    NARCIS (Netherlands)

    Chmielewski, Lukasz; Brinkman, Richard; Hoepman, J.H.; Bos, Bert

    2008-01-01

    Nowadays business applications closely collaborate with other business applications by sharing one or more services. Unfortunately, opening your business application to the outside world also sacrifices security. There is quite a number of standards that aims at protecting these services. However,

  9. Masters in Nuclear Security

    International Nuclear Information System (INIS)

    Rickwood, Peter

    2013-01-01

    Continuing global efforts to improve the security of nuclear and other radioactive material against the threat of malicious acts are being assisted by a new initiative, the development of a corps of professional experts to strengthen nuclear security. The IAEA, the European Commission, universities, research institutions and other bodies working in collaboration have established an International Nuclear Security Education Network (INSEN). In 2011, six European academic institutions, the Vienna University of Technology, the Brandenburg University of Applied Sciences, the Demokritos National Centre for Scientific Research in Greece, the Reactor Institute Delft of the Delft University of Technology in the Netherlands, the University of Oslo, and the University of Manchester Dalton Nuclear Institute, started developing a European Master of Science Programme in Nuclear Security Management. In March 2013, the masters project was inaugurated when ten students commenced studies at the Brandenburg University of Applied Sciences in Germany for two weeks. In April, they moved to the Delft University of Technology in the Netherlands for a further two weeks of studies. The pilot programme consists of six teaching sessions in different academic institutions. At the inauguration in Delft, IAEA Director General Yukiya Amano commended this effort to train a new generation of experts who can help to improve global nuclear security. ''It is clear that we will need a new generation of policy-makers and nuclear professionals - people like you - who will have a proper understanding of the importance of nuclear security,'' Mr. Amano told students and faculty members. ''The IAEA's goal is to support the development of such programmes on a global basis,'' said David Lambert, Senior Training Officer in the IAEA's Office of Nuclear Security. ''An existing postgraduate degree programme focused on nuclear security at Naif Arab University for Security Sciences (NAUSS) is currently supported by

  10. Canadian International Food Security Research Fund (CIFSRF ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Canadian International Food Security Research Fund (CIFSRF). The Canadian International Food Security Research Fund (CIFS-RF) is a collaborative program of the Canadian International Development Agency (CIDA) and IDRC valued at CA $61 654 707 (CIDA: CA $50 000 000; IDRC: CA $11 654 707). The program ...

  11. Radioactive source security: the cultural challenges

    International Nuclear Information System (INIS)

    Englefield, Chris

    2015-01-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. (authors)

  12. Collaborative information seeking

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2008-01-01

    Since common ground is pivotal to collaboration, this paper proposes to define collaborative information seeking as the combined activity of information seeking and collaborative grounding. While information-seeking activities are necessary for collaborating actors to acquire new information......, the activities involved in information seeking are often performed by varying subgroups of actors. Consequently, collaborative grounding is necessary to share information among collaborating actors and, thereby, establish and maintain the common ground necessary for their collaborative work. By focusing...... on the collaborative level, collaborative information seeking aims to avoid both individual reductionism and group reductionism, while at the same time recognizing that only some information and understanding need be shared....

  13. Practice brief. Securing wireless technology for healthcare.

    Science.gov (United States)

    Retterer, John; Casto, Brian W

    2004-05-01

    Wireless networking can be a very complex science, requiring an understanding of physics and the electromagnetic spectrum. While the radio theory behind the technology can be challenging, a basic understanding of wireless networking can be sufficient for small-scale deployment. Numerous security mechanisms are available to wireless technologies, making it practical, scalable, and affordable for healthcare organizations. The decision on the selected security model should take into account the needs for additional server hardware and administrative costs. Where wide area network connections exist between cooperative organizations, deployment of a distributed security model can be considered to reduce administrative overhead. The wireless approach chosen should be dynamic and concentrate on the organization's specific environmental needs. Aspects of organizational mission, operations, service level, and budget allotment as well as an organization's risk tolerance are all part of the balance in the decision to deploy wireless technology.

  14. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  15. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  16. Collaboration rules.

    Science.gov (United States)

    Evans, Philip; Wolf, Bob

    2005-01-01

    Corporate leaders seeking to boost growth, learning, and innovation may find the answer in a surprising place: the Linux open-source software community. Linux is developed by an essentially volunteer, self-organizing community of thousands of programmers. Most leaders would sell their grandmothers for workforces that collaborate as efficiently, frictionlessly, and creatively as the self-styled Linux hackers. But Linux is software, and software is hardly a model for mainstream business. The authors have, nonetheless, found surprising parallels between the anarchistic, caffeinated, hirsute world of Linux hackers and the disciplined, tea-sipping, clean-cut world of Toyota engineering. Specifically, Toyota and Linux operate by rules that blend the self-organizing advantages of markets with the low transaction costs of hierarchies. In place of markets' cash and contracts and hierarchies' authority are rules about how individuals and groups work together (with rigorous discipline); how they communicate (widely and with granularity); and how leaders guide them toward a common goal (through example). Those rules, augmented by simple communication technologies and a lack of legal barriers to sharing information, create rich common knowledge, the ability to organize teams modularly, extraordinary motivation, and high levels of trust, which radically lowers transaction costs. Low transaction costs, in turn, make it profitable for organizations to perform more and smaller transactions--and so increase the pace and flexibility typical of high-performance organizations. Once the system achieves critical mass, it feeds on itself. The larger the system, the more broadly shared the knowledge, language, and work style. The greater individuals' reputational capital, the louder the applause and the stronger the motivation. The success of Linux is evidence of the power of that virtuous circle. Toyota's success is evidence that it is also powerful in conventional companies.

  17. Wide Area Wind Field Monitoring Status & Results

    Energy Technology Data Exchange (ETDEWEB)

    Alan Marchant; Jed Simmons

    2011-09-30

    Volume-scanning elastic has been investigated as a means to derive 3D dynamic wind fields for characterization and monitoring of wind energy sites. An eye-safe volume-scanning lidar system was adapted for volume imaging of aerosol concentrations out to a range of 300m. Reformatting of the lidar data as dynamic volume images was successfully demonstrated. A practical method for deriving 3D wind fields from dynamic volume imagery was identified and demonstrated. However, the natural phenomenology was found to provide insufficient aerosol features for reliable wind sensing. The results of this study may be applicable to wind field measurement using injected aerosol tracers.

  18. Locating Objects in Wide-Area Systems

    NARCIS (Netherlands)

    Steen, M. van; Hauck, F.J.; Homburg, P.; Tanenbaum, A.S.

    Locating mobile objects in a worldwide system requires a scalable location service. An object can be a telephone or a notebook computer, but also a software or data object, such as a file or an electronic document. Our service strictly separates an object's name from the addresses where it can be

  19. ICPP digital wide area portal monitor

    International Nuclear Information System (INIS)

    Nichols, C.E.

    1978-01-01

    A portal montior is described which is used to check personnel for contamination. The monitor is extremely sensitive. In addition to personnel contamination control, it serves as an extremely effective SNM detector capable of detecting U-235 in half the quantities specified in Federal Standards

  20. Managing collaborative design

    NARCIS (Netherlands)

    Sebastian, R.

    2007-01-01

    Collaborative design has been emerging in building projects everywhere. The more complex a building project becomes, the closer and more intensive collaboration between the design actors is required. This research focuses on collaborative design in the conceptual architecture design phase,

  1. Collaborative networks: Reference modeling

    NARCIS (Netherlands)

    Camarinha-Matos, L.M.; Afsarmanesh, H.

    2008-01-01

    Collaborative Networks: Reference Modeling works to establish a theoretical foundation for Collaborative Networks. Particular emphasis is put on modeling multiple facets of collaborative networks and establishing a comprehensive modeling framework that captures and structures diverse perspectives of

  2. Nuclear Security Education in Morocco

    International Nuclear Information System (INIS)

    Hakam, O.K.

    2015-01-01

    Morocco has made significant progress in the field of nuclear security by supporting the efforts and activities of the International Atomic Energy Agency (IAEA), promoting nuclear security under international initiatives and continues to undertake actions aiming at strengthening capacity building in nuclear security. As well, Morocco has developed a new law on radiological and nuclear safety and security which was promulgated in 2014. Some Moroccan universities in cooperation with the IAEA-International Nuclear Security Education Network (INSEN) and the US-DoS Partnership for Nuclear Security (PNS) are working to develop their nuclear security educational programmes. In this regard, faculties who have been involved in INSEN Professional Development Courses (PDCs) have acquired a high-quality of knowledge and teaching tools in nuclear security topics that led them to be able to develop and teach their nuclear security curriculum as is the case at the University of Ibn Tofail. Furthermore, University of Ibn Tofail has developed in 2014 with collaboration with CRDFGlobal the first Institute of Nuclear Material Management (INMM) Student Chapter in Africa. This Chapter has organized many events to promote best practices among the young generation. Moreover, University of Ibn Tofail and Brandenburg University in Germany are working to develop a PDC on Nuclear IT/Cyber Security to be held in Kenitra, Morocco. This PDC aims at building capacity among the academic communities from Africa and MENA Region in order to further raise awareness, develop and disseminate best practices, increase professional standards and therefore enhance nuclear security culture. So, this paper will present some nuclear security education activities in Morocco and more specifically at the University of Ibn Tofail. These activities involve women as leaders but also contribute in education and training of young generation of women in nuclear field. (author)

  3. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  4. Embedding security messages in existing processes: a pragmatic and effective approach to information security culture change

    CERN Document Server

    Lopienski, Sebastian

    Companies and organizations world-wide depend more and more on IT infrastructure and operations. Computer systems store vital information and sensitive data; computing services are essential for main business processes. This high dependency comes with a number of security risks, which have to be managed correctly on technological, organizational and human levels. Addressing the human aspects of information security often boils down just to procedures, training and awareness raising. On the other hand, employees and collaborators do not adopt security attitude and habits simply when told to do so – a real change in behaviour requires an established security culture. But how to introduce a security culture? This thesis outlines the need of developing or improving security culture, and discusses how this can be done. The proposed approach is to gradually build security knowledge and awareness, and influence behaviours. The way to achieve this is to make security communication pervasive by embedding security me...

  5. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  6. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  7. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  8. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  9. The collaborative tokamak control room

    International Nuclear Information System (INIS)

    Schissel, D.P.

    2006-01-01

    Magnetic fusion experiments keep growing in size and complexity resulting in a concurrent growth in collaborations between experimental sites and laboratories worldwide. In the US, the National Fusion Collaboratory Project is developing a persistent infrastructure to enable scientific collaboration for all aspects of magnetic fusion energy research by creating a robust, user-friendly collaborative environment and deploying this to the more than 1000 US fusion scientists in 40 institutions who perform magnetic fusion research. This paper reports on one aspect of the project which is the development of the collaborative tokamak control room to enhance both collocated and remote scientific participation in experimental operations. This work includes secured computational services that can be scheduled as required, the ability to rapidly compare experimental data with simulation results, a means to easily share individual results with the group by moving application windows to a shared display, and the ability for remote scientists to be fully engaged in experimental operations through shared audio, video, and applications. The project is funded by the USDOE Office of Science, Scientific Discovery through Advanced Computing (SciDAC) Program and unites fusion and computer science researchers to directly address these challenges

  10. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  11. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  12. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  13. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  14. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  15. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  16. A security scheme of SMS system

    Science.gov (United States)

    Zhang, Fangzhou; Yang, Hong-Wei; Song, Chuck

    2005-02-01

    With the prosperous development and the use of SMS, more and more important information need to be transferred through the wireless and mobile networks by the users. But in the GSM/GPRS network, the SMS messages are transferred in text mode through the signaling channel and there is no integrality for SMS messages. Because of the speciality of the mobile communications, the security of signaling channel is very weak. So we need to improve and enhance the security and integrality of SMS. At present, developed investigation based on SMS security is still incomplete. The key distribution and management is not perfect to meet the usability in a wide area. This paper introduces a high-level security method to solve this problem. We design the Secure SMS of GSM/GPRS in order to improve the security of the important information that need to be transferred by the mobile networks. Using this method, we can improve the usability of E-payment and other mobile electronic commerce.

  17. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  18. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  19. Software To Secure Distributed Propulsion Simulations

    Science.gov (United States)

    Blaser, Tammy M.

    2003-01-01

    Distributed-object computing systems are presented with many security threats, including network eavesdropping, message tampering, and communications middleware masquerading. NASA Glenn Research Center, and its industry partners, has taken an active role in mitigating the security threats associated with developing and operating their proprietary aerospace propulsion simulations. In particular, they are developing a collaborative Common Object Request Broker Architecture (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines

  20. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  1. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  2. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  3. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    This thesis proposes to overhaul the state and urban area homeland security strategy program by improving the strategic planning process guidance and assistance and strategy review in collaboration...

  4. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  5. 3D Reconstruction in Nuclear Security

    International Nuclear Information System (INIS)

    Bostrom, G.; Fiocco, M.; Goncalves, J.M.C.; Puig, D.; Sequeira, V.; Chartier, B.; Mariotte, F.; Richard, M.; Zamora, P.; Kiesser, R.

    2008-01-01

    Accurate modelling is gaining increasing importance in security applications. Indeed, realistic and dimensionally accurate models of critical areas can be used for prevention and simulation exercises as well as for planning emergency responses once an attack is perpetrated. CEA-DAM and EC-JRC engaged in a joint exercise involving the simulation of a terrorist attack in an urban area with possible release of radiological substances. JRC was responsible for creating a dimensionally accurate (centimetre accuracy) 3D model from the urban area as-is before and after the attack. Further tests involved the automatic 3D detection of changes in both indoors and outdoors environments. The paper describes the principles and technologies behind the generation of photo-realistic and accurate 3D models of wide areas as-is, and will discuss the use of those technologies for nuclear security applications

  6. ISOGA: Integrated Services Optical Grid Architecture for Emerging E-Science Collaborative Applications

    Energy Technology Data Exchange (ETDEWEB)

    Oliver Yu

    2008-11-28

    This final report describes the accomplishments in the ISOGA (Integrated Services Optical Grid Architecture) project. ISOGA enables efficient deployment of existing and emerging collaborative grid applications with increasingly diverse multimedia communication requirements over a wide-area multi-domain optical network grid; and enables collaborative scientists with fast retrieval and seamless browsing of distributed scientific multimedia datasets over a wide-area optical network grid. The project focuses on research and development in the following areas: the polymorphic optical network control planes to enable multiple switching and communication services simultaneously; the intelligent optical grid user-network interface to enable user-centric network control and monitoring; and the seamless optical grid dataset browsing interface to enable fast retrieval of local/remote dataset for visualization and manipulation.

  7. 78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-03-04

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... HSSTAC input on how to improve that collaboration. --Cyber Security and the evolution of the Cyber... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0014] Homeland Security Science and...

  8. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  9. Collaborative Contracting in Projects

    NARCIS (Netherlands)

    Suprapto, M.

    2016-01-01

    Project practitioners have increasingly recognized the importance of collaborative relationships to ensure successful executions of projects. However, the ability to sustain and consistenly drive real collaborative attitudes and behavior for achieving the desired outcomes remains of enduring

  10. Global Collaborative STEM Education

    Science.gov (United States)

    Meabh Kelly, Susan; Smith, Walter

    2016-04-01

    Global Collaborative STEM Education, as the name suggests, simultaneously supports two sets of knowledge and skills. The first set is STEM -- science, technology, engineering and math. The other set of content knowledge and skills is that of global collaboration. Successful global partnerships require awareness of one's own culture, the biases embedded within that culture, as well as developing awareness of the collaborators' culture. Workforce skills fostered include open-mindedness, perseverance when faced with obstacles, and resourceful use of technological "bridges" to facilitate and sustain communication. In respect for the 2016 GIFT Workshop focus, Global Collaborative STEM Education projects dedicated to astronomy research will be presented. The projects represent different benchmarks within the Global Collaborative STEM Education continuum, culminating in an astronomy research experience that fully reflects how the global STEM workforce collaborates. To facilitate wider engagement in Global Collaborative STEM Education, project summaries, classroom resources and contact information for established international collaborative astronomy research projects will be disseminated.

  11. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  12. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  13. Experiences of Collaborative Research

    Science.gov (United States)

    Kahneman, Daniel

    2003-01-01

    The author's personal history of the research that led to his recognition in economics is described, focusing on the process of collaboration and on the experience of controversy. The author's collaboration with Amos Tversky dealt with 3 major topics: judgment under uncertainty, decision making, and framing effects. A subsequent collaboration,…

  14. The challenges of multi-layered security governance in Ituri

    DEFF Research Database (Denmark)

    Hoffmann, Kasper; Vlassenroot, Koen

    governance is that the inclusion of local non-state actors in security governance will improve security provision to people because they have more legitimacy. But in reality ‘multi-layered’ security governance is often marked by conflict and competition as much as by collaboration and common solutions......There has been a slow, but growing awareness among external actors that some local non-state security actors should be involved in security governance in conflict-affected situations. Already in 2006, the OECD published a report that called for a ‘multi-layered’ approach to reforming actors...... and institutions that provide security and justice services (Scheye and McLean, 2006). Often these actors consist of local authorities, such as customary chiefs, village elders, or business people working in collaboration with different kinds of self-defense groups. The idea behind ‘multi-layered’ security...

  15. The second international workshop on enterprise security

    OpenAIRE

    Chang, V; Ramachandran, M; Yen, NN; Walters, RJ; Wills, G

    2016-01-01

    Welcome to our second international workshop on Enterprise Security as part of CloudCom 2015, Vancouver, Canada, November 30-December 3, 2015. The first international workshop held in Singapore has been a major success since then we have achieved greater team activities, research, and international collaborations as the major and significant outcome of our first workshop on this topic. Enterprise Security involves all business, products, governments, organization, and their contractors. This ...

  16. The future of infrastructure security :

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, Pablo; Turnley, Jessica Glicken; Parrott, Lori K.

    2013-05-01

    Sandia National Laboratories hosted a workshop on the future of infrastructure security on February 27-28, 2013, in Albuquerque, NM. The 17 participants came from backgrounds as diverse as federal policy, the insurance industry, infrastructure management, and technology development. The purpose of the workshop was to surface key issues, identify directions forward, and lay groundwork for cross-sectoral and cross-disciplinary collaborations. The workshop addressed issues such as the problem space (what is included in infrastructure problems?), the general types of threats to infrastructure (such as acute or chronic, system-inherent or exogenously imposed) and definitions of secure and resilient infrastructures. The workshop concluded with a consideration of stakeholders and players in the infrastructure world, and identification of specific activities that could be undertaken by the Department of Homeland Security (DHS) and other players.

  17. A governor's guide to emergency management. Volume two : homeland security

    Science.gov (United States)

    2002-09-19

    Homeland security is a complex challenge that demands significant investment; collaboration among local, state, and federal governments; and integration with the private sector. The purpose of A Governor's Guide to Emergency Management Volume Two: Ho...

  18. Trust repertoires for collaboration

    DEFF Research Database (Denmark)

    Fuglsang, Lars

    This case study analyses the role of trust in a public private innovation network that involved a private consultancy company as a facilitator. We know that collaboration is a important for innovation, and that collaboration across organizational boundaries is not a trivial issue. But we know very...... little about how such processes develop and how trust, understood as “confident positive expectations” (Lewicki et al. 1998) to collaborative activities, arises out of collaboration. The paper contributes by showing how trust and collaboration are intertwined. The main finding is that a facilitator can...

  19. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  20. Report on achievements in fiscal 1975 in Sunshine Project. Studies on wide area existence of geothermal resources in great depth; 1975 nendo koiki shinbu chinetsu shigen fuson ni kansuru kenkyu seika hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1976-03-01

    This paper reports the achievements in the following study items: (1) studies on the AFMT method, (2) observation of heat dissipation by using infrared thermal images, (3) evaluation on the annular topographic pattern in the Hachimantai area identified from the Landsat satellite images, (4) studies on the Tamagawa welded pyroclastic rocks, (5) studies on minerals transformed from the Tamagawa welded pyroclastic rocks, and (6) a method to analyze ground temperature data by using graphic display. Items 2 and 6 in the studies are on the heat balance method, and Item 3 is on remote sensing. Items 4 and 5 were performed as the study on geologic thermometry. In Item 1, a prototype AFMT method exploration device was fabricated, and field experiments were performed in the Onuma area in the Hachimantai wide-area geothermal experiment field. The experiment placed importance on finding problems in transmission and reception of signals from an artificially fluctuating magnetic field, whose result was found greatly contributive to understanding the physical phenomena. However, it was not possible to reach a level to analyze geological structures from the data. In Item 2, simple meteorological observation was performed on ground surface temperature distribution by using an infrared radiation thermometer of remote sensing type. Development was made on a method to measure natural heat dissipation amount from heat balance on the ground surface. (NEDO)

  1. Fiscal 1999 achievement report on development of wide-area energy utilization network system. Research on energy system design technology (Research on Eco-Energy City systematization); Eco ene toshi no system ka kenkyu 1999 nendo seika hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-05-01

    Efforts are being exerted to develop systems for effectively utilizing various kinds of waste heat in presence in cities and their neighborhood. In fiscal 1999, investigations were conducted into cases of low temperature waste heat utilization at 16 locations in Japan and into trends of heat utilization in five European countries, with a visit paid to European District Heating Association. There are 128 district heat supplying sites in service in Japan, of which 25 handles low temperature waste heat. As for their types of utilization, 12 are of the temperature difference energy utilization type while 13 are of the heat recovery type. When it comes to the system details, the importance of proper selection of structures and materials for heat accumulating systems and heat exchangers on the secondary side should be emphasized although it is the heat pump that assumes the key role. In Europe, indications are that district systems are developing into wide-area networks and that they are growing increasingly marketable. In the northern and eastern parts of Europe, 30-70% of demand for heat is met by district heating. Waste heat from power generation is the heat source, and this occupies 30-80% of the whole. Thanks to the introduction of the environmental tax, in addition, environments are now complete under which recoverable energy utilization will enjoy an advantageous position. (NEDO)

  2. Collaborative Data Mining

    Science.gov (United States)

    Moyle, Steve

    Collaborative Data Mining is a setting where the Data Mining effort is distributed to multiple collaborating agents - human or software. The objective of the collaborative Data Mining effort is to produce solutions to the tackled Data Mining problem which are considered better by some metric, with respect to those solutions that would have been achieved by individual, non-collaborating agents. The solutions require evaluation, comparison, and approaches for combination. Collaboration requires communication, and implies some form of community. The human form of collaboration is a social task. Organizing communities in an effective manner is non-trivial and often requires well defined roles and processes. Data Mining, too, benefits from a standard process. This chapter explores the standard Data Mining process CRISP-DM utilized in a collaborative setting.

  3. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  4. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  5. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  6. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  7. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  8. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  9. The Diesel Combustion Collaboratory: Combustion Researchers Collaborating over the Internet

    Energy Technology Data Exchange (ETDEWEB)

    C. M. Pancerella; L. A. Rahn; C. Yang

    2000-02-01

    The Diesel Combustion Collaborator (DCC) is a pilot project to develop and deploy collaborative technologies to combustion researchers distributed throughout the DOE national laboratories, academia, and industry. The result is a problem-solving environment for combustion research. Researchers collaborate over the Internet using DCC tools, which include: a distributed execution management system for running combustion models on widely distributed computers, including supercomputers; web-accessible data archiving capabilities for sharing graphical experimental or modeling data; electronic notebooks and shared workspaces for facilitating collaboration; visualization of combustion data; and video-conferencing and data-conferencing among researchers at remote sites. Security is a key aspect of the collaborative tools. In many cases, the authors have integrated these tools to allow data, including large combustion data sets, to flow seamlessly, for example, from modeling tools to data archives. In this paper the authors describe the work of a larger collaborative effort to design, implement and deploy the DCC.

  10. Collaborative research: Accomplishments & potential

    Science.gov (United States)

    Katsouyanni, Klea

    2008-01-01

    Although a substantial part of scientific research is collaborative and increasing globalization will probably lead to its increase, very few studies actually investigate the advantages, disadvantages, experiences and lessons learned from collaboration. In environmental epidemiology interdisciplinary collaboration is essential and the contrasting geographical patterns in exposure and disease make multi-location projects essential. This paper is based on a presentation given at the Annual Conference of the International Society for Environmental Epidemiology, Paris 2006, and is attempting to initiate a discussion on a framework for studying collaborative research. A review of the relevant literature showed that indeed collaborative research is rising, in some countries with impressive rates. However, there are substantial differences between countries in their outlook, need and respect for collaboration. In many situations collaborative publications receive more citations than those based on national authorship. The European Union is the most important host of collaborative research, mainly driven by the European Commission through the Framework Programmes. A critical assessment of the tools and trends of collaborative networks under FP6, showed that there was a need for a critical revision, which led to changes in FP7. In conclusion, it is useful to study the characteristics of collaborative research and set targets for the future. The added value for science and for the researchers involved may be assessed. The motivation for collaboration could be increased in the more developed countries. Particular ways to increase the efficiency and interaction in interdisciplinary and intercultural collaboration may be developed. We can work towards "the principles of collaborative research" in Environmental Epidemiology. PMID:18208596

  11. International energy technology collaboration: benefits and achievements

    International Nuclear Information System (INIS)

    1996-01-01

    The IEA Energy Technology Collaboration Programme facilitates international collaboration on energy technology research, development and deployment. More than 30 countries are involved in Europe, America, Asia, Australasia and Africa. The aim is to accelerate the development and deployment of new energy technologies to meet energy security, environmental and economic development goals. Costs and resources are shared among participating governments, utilities, corporations and universities. By co-operating, they avoid unproductive duplication and maximize the benefits from research budgets. The IEA Programme results every year in hundreds of publications which disseminate information about the latest energy technology developments and their commercial utilisation. The IEA Energy Technology Collaboration Programme operates through a series of agreements among governments. This report details the activities and achievements of all 41 agreements, covering energy technology information centres and Research and Development projects in fossil fuels, renewable energy efficient end-use, and nuclear fusion technologies. (authors). 58 refs., 9 tabs

  12. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  13. Securing India's energy future

    International Nuclear Information System (INIS)

    Raghuraman, V.

    2009-01-01

    India's development aspirations are challenged by energy security and climate change considerations. The integrated energy policy clearly deliberates the need to intensify all energy options with emphasis on maximizing indigenous coal production, harnessing hydropower, increasing adoption of renewables, intensifying hydrocarbon exploration and production and anchoring nuclear power development to meet the long-term requirements. The report also emphasizes the need to secure overseas hydrocarbon and coal assets. Subsequently the National Action Plan on climate change has underscored the need to wean away from fossil fuels, the ambitious National Solar Mission is a case in point. Ultimately securing India's energy future lies in clean coal, safe nuclear and innovative solar. Coal is the key energy option in the foreseeable future. Initiatives are needed to take lead role in clean coal technologies, in-situ coal gasification, tapping coal bed methane, coal to liquids and coal to gas technologies. There is need to intensify oil exploration by laying the road-map to open acreage to unlock the hydrocarbon potential. Pursue alternate routes based on shale, methane from marginal fields. Effectively to use oil diplomacy to secure and diversify sources of supply including trans-national pipelines and engage with friendly countries to augment strategic resources. Technologies to be accessed and developed with international co-operation and financial assistance. Public-Private Partnerships, in collaborative R and D projects need to be accelerated. Nuclear share of electricity generation capacity to be increased 6 to 7% of 63000 MW by 2031-32 and further to 25% (300000 MW) capacity by 2050 is to be realized by operationalizing the country's thorium programme. Nuclear renaissance has opened up opportunities for the Indian industry to meet not only India's requirements but also participate in the global nuclear commerce; India has the potential to emerge as a manufacturing hub

  14. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  15. Dynamic Security Assessment of Western Danish Power System Based on Ensemble Decision Trees

    DEFF Research Database (Denmark)

    Liu, Leo; Bak, Claus Leth; Chen, Zhe

    2014-01-01

    With the increasing penetration of renewable energy resources and other forms of dispersed generation, more and more uncertainties will be brought to the dynamic security assessment (DSA) of power systems. This paper proposes an approach that uses ensemble decision trees (EDT) for online DSA. Fed...... with online wide-area measurement data, it is capable of not only predicting the security states of current operating conditions (OC) with high accuracy, but also indicating the confidence of the security states 1 minute ahead of the real time by an outlier identification method. The results of EDT together...

  16. Collaboration across the Arctic

    DEFF Research Database (Denmark)

    Huppert, Verena Gisela; Chuffart, Romain François R.

    2017-01-01

    The Arctic is witnessing the rise of a new paradigm caused by an increase in pan-Arctic collaborations which co-exist with the region’s traditional linkages with the South. Using an analysis of concrete examples of regional collaborations in the Arctic today in the fields of education, health...... and infrastructure, this paper questions whether pan-Arctic collaborations in the Arctic are more viable than North-South collaborations, and explores the reasons behind and the foreseeable consequences of such collaborations. It shows that the newly emerging East-West paradigm operates at the same time...... as the traditional North-South paradigm, with no signs of the East-West paradigm being more viable in the foreseeable future. However, pan-Arctic collaboration, both due to pragmatic reasons and an increased awareness of similarities, is likely to increase in the future. The increased regionalization process...

  17. Security Threats in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Giannetsos, Athanasios

    2011-01-01

    Over the last few years, technological advances in the design of processors, memory, and radio communications have propelled an active interest in the area of distributed sensor networking, in which a number of independent, self-sustainable nodes collaborate to perform a large sensing task. Secur...

  18. Professional Learning and Collaboration

    OpenAIRE

    Greer, Janet Agnes

    2012-01-01

    The American education system must utilize collaboration to meet the challenges and demands our culture poses for schools. Deeply rooted processes and structures favor teaching and learning in isolation and hinder the shift to a more collaborative paradigm. Professional learning communities (PLCs) support continuous teacher learning, improved efficacy, and program implementation. The PLC provides the framework for the development and enhancement of teacher collaboration and teacher collaborat...

  19. Managing collaborative design

    OpenAIRE

    Sebastian, R.

    2007-01-01

    Collaborative design has been emerging in building projects everywhere. The more complex a building project becomes, the closer and more intensive collaboration between the design actors is required. This research focuses on collaborative design in the conceptual architecture design phase, especially during the elaboration of the masterplan and the development of the preliminary building designs. This research is descriptive and has two aims. First, it aims at describing the characteristics a...

  20. Opposing incentives for collaboration

    DEFF Research Database (Denmark)

    Dorch, Bertil F.; Wien, Charlotte; Larsen, Asger Væring

    , and gives a bonus for publications done through inter-institutionary collaboration. Credits given to universities are fractionalized between the participating universities. So far credits are not assigned to the individual authors but only to their institutions. However, it turns out that research...... collaboration is associated with a higher number of citations than single authorship which may present the author with two opposing incentives for research collaboration....

  1. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  2. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  3. The Emerging Architecture of a Regional Security Complex in the ...

    African Journals Online (AJOL)

    2015-03-03

    Mar 3, 2015 ... Council for the Development of Social Science Research in Africa, 2017 .... of International Security Studies by appropriating Regional Security .... collaborative network is also embedded across Saharan and Sahelian Africa, ... (previously located in the city of Baga in Nigeria's Borno State), fell into the.

  4. The Collaborative Future

    Directory of Open Access Journals (Sweden)

    Thomas Marlowe

    2011-10-01

    Full Text Available Collaboration has become an important goal in modern ventures, across the spectrum of commercial, social, and intellectual activities, sometimes as a mediating factor, and sometimes as a driving, foundational principle. Research, development, social programs, and ongoing ventures of all sorts benefit from interactions between teams, groups, and organizations, across intellectual disciplines and across facets and features of the inquiry, product, entity, or activity under consideration. We present a survey of the state of collaboration and collaborative enterprise, in the context of papers and presentations at the International Symposium on Collaborative Enterprises 2011 (CENT 2011, and the extended papers appearing in this special issue.

  5. Commemorating Misadventures, Celebrating Collaborations

    Centers for Disease Control (CDC) Podcasts

    Byron Breedlove, Managing Editor of Emerging Infectious Diseases journal, reads his February 2018 cover essay, "Commemorating Misadventures, Celebrating Collaborations" and discusses a sketch by Picasso and zoonoses.

  6. Collaborative Service Arrangements

    DEFF Research Database (Denmark)

    J. May, Peter; Winter, Søren

    While much of prior research on collaboration addresses the service delivery network as a whole, we address collaborative relationships between one type of organization—municipal employment services—and a range of governmental and non-governmental partners for employment services in Denmark....... Municipalities differ in the type, degree, and character of collaboration with these partners. As others have found in prior research, we find that organizational benefits, trust, and a variety of contextual factors help shape the extent of collaboration. But, the relevance of these and problem-solving benefits...

  7. The EGS Data Collaboration Platform: Enabling Scientific Discovery

    Energy Technology Data Exchange (ETDEWEB)

    Weers, Jonathan D [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Johnston, Henry [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Huggins, Jay V [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2018-02-14

    Collaboration in the digital age has been stifled in recent years. Reasonable responses to legitimate security concerns have created a virtual landscape of silos and fortified castles incapable of sharing information efficiently. This trend is unfortunately opposed to the geothermal scientific community's migration toward larger, more collaborative projects. To facilitate efficient sharing of information between team members from multiple national labs, universities, and private organizations, the 'EGS Collab' team has developed a universally accessible, secure data collaboration platform and has fully integrated it with the U.S. Department of Energy's (DOE) Geothermal Data Repository (GDR) and the National Geothermal Data System (NGDS). This paper will explore some of the challenges of collaboration in the modern digital age, highlight strategies for active data management, and discuss the integration of the EGS Collab data management platform with the GDR to enable scientific discovery through the timely dissemination of information.

  8. International Nuclear Security Education Network (INSEN) and the Nuclear Security Training and Support Centre (NSSC) Network

    International Nuclear Information System (INIS)

    Nikonov, Dmitriy

    2013-01-01

    International Nuclear Security Education Network established in 2010: A partnership between the IAEA and universities, research institutions and other stakeholders - •Promotion of nuclear security education; • Development of educational materials; • Professional development for faculty members; • Collaborative research and resource sharing. Currently over 90 members from 38 member states. Mission: to enhance global nuclear security by developing, sharing and promoting excellence in nuclear security education. Nuclear Security Support Centre: Primary objectives are: • Develop human resources through the implementation of a tailored training programme; • Develop a network of experts; • Provide technical support for lifecycle equipment management and scientific support for the detection of and the response to nuclear security events

  9. New Collaborative Filtering Algorithms Based on SVD++ and Differential Privacy

    OpenAIRE

    Xian, Zhengzheng; Li, Qiliang; Li, Gai; Li, Lei

    2017-01-01

    Collaborative filtering technology has been widely used in the recommender system, and its implementation is supported by the large amount of real and reliable user data from the big-data era. However, with the increase of the users’ information-security awareness, these data are reduced or the quality of the data becomes worse. Singular Value Decomposition (SVD) is one of the common matrix factorization methods used in collaborative filtering, which introduces the bias information of users a...

  10. Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level

    OpenAIRE

    Dan Constantin TOFAN; Maria Lavinia ANDREI; Lavinia Mihaela DINCÄ‚

    2012-01-01

    Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, di...

  11. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  12. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  13. Collaboration in teacher teams

    NARCIS (Netherlands)

    Brouwer, P.

    2011-01-01

    In order to deal with innovations and the associated complexity of work, ongoing collaboration between teachers has become more important in secondary education. Teacher collaboration is one of the factors that contribute to the successful implementation of innovations in secondary schools. However,

  14. Enabling distributed collaborative science

    DEFF Research Database (Denmark)

    Hudson, T.; Sonnenwald, Diane H.; Maglaughlin, K.

    2000-01-01

    To enable collaboration over distance, a collaborative environment that uses a specialized scientific instrument called a nanoManipulator is evaluated. The nanoManipulator incorporates visualization and force feedback technology to allow scientists to see, feel, and modify biological samples bein...

  15. Solo Librarians Working Collaboratively

    Science.gov (United States)

    Nickel, Robbie

    2011-01-01

    The Elko County School District in Nevada has elementary school librarians that are "solo" librarians. Over the last several years they have worked to collaborate on meeting monthly--even though the district covers 17,100 square miles--and on providing professional development face to face and online. Sharing and collaboration help them…

  16. Collaborating with Rising Stars

    DEFF Research Database (Denmark)

    Andersen, Kristina Vaarst; Mors, Marie Louise; Jeppesen, Jacob

    2018-01-01

    Status provides preferential access to resources, as well as favorable judgment, which in turn may lead to increases in performance. Prior work has established that such benefits even spill over between collaboration partners, thus allowing collaboration partners of high status individuals to bas...

  17. Negotiating Collaborative Governance Designs

    DEFF Research Database (Denmark)

    Plotnikof, Mie

    2017-01-01

    This chapter addresses the design and implementation issues of collaborative governance, a public management practice aimed at involving stakeholders in problem-solving and public innovation.......This chapter addresses the design and implementation issues of collaborative governance, a public management practice aimed at involving stakeholders in problem-solving and public innovation....

  18. Enhancing performance through collaboration

    International Nuclear Information System (INIS)

    Froats, J.

    2010-01-01

    This presentation examines how co-operation and collaboration are keys to high performing organizations and attempts to provoke some thinking about how one can improve the game to meet the challenges of today. The presentation discusses the origins of the belief system and gives examples of the benefits of collaborative approaches.

  19. Collaborative Car Pooling System

    OpenAIRE

    João Ferreira; Paulo Trigo; Porfírio Filipe

    2009-01-01

    This paper describes the architecture for a collaborative Car Pooling System based on a credits mechanism to motivate the cooperation among users. Users can spend the accumulated credits on parking facilities. For this, we propose a business model to support the collaboration between a car pooling system and parking facilities. The Portuguese Lisbon-s Metropolitan area is used as application scenario.

  20. Emergent Collaboration on Twitter

    DEFF Research Database (Denmark)

    Lundgaard, Daniel; Razmerita, Liana; Tan, Chee-Wee

    2018-01-01

    This paper explores the organizing elements that foster emergent collaboration within large-scale communities on online social platforms like Twitter. This study is based on a case study of the #BlackLivesMatter social movement and draws on organizing dynamics and online social network literature...... foster emergent collaboration in social movements using Twitter....

  1. Collaborative Policy Innovation

    DEFF Research Database (Denmark)

    Sørensen, Eva; Boch Waldorff, Susanne

    2014-01-01

    Governments all over the Western world currently face wicked problems that call for policy innovation. A new strand of research in public innovation points to collaboration between public authorities and relevant and affected stakeholders as an important driver of public innovation. A case study...... of collaborative policy innovation in the area of mental health care in Denmark indicates that collaboration can contribute to qualify the politicians’ understanding of wicked policy problems, and to fostering new creative policy solutions. The study also shows, however, that the new problem understandings...... and policy ideas produced in collaborative governance arenas are not diffused to the formal political institutions of representative democracy because the participating politicians only to a limited extent function as boundary spanners between the collaborative governance arena and the decision making arenas...

  2. Nurse-patient collaboration

    DEFF Research Database (Denmark)

    Sørensen, Dorthe; Frederiksen, Kirsten; Groefte, Thorbjoern

    2013-01-01

    Objectives: This paper provides a theoretical account of nurses’ collaboration with patients with chronic obstructive pulmonary disease during non-invasive ventilation treatment in hospital. Background: Despite strong evidence for the effect of non-invasive ventilation treatment, success remains...... a huge challenge. Nurse-patient collaboration may be vital for treatment tolerance and success. A better understanding of how nurses and patients collaborate during non-invasive ventilation may therefore contribute to improvement in treatment success. Design: A constant comparative classical grounded...... at three intensive care units and one general respiratory ward in Denmark. Results: Succeeding emerged as the nurses’ main concern in the nurse-patient collaboration during non-invasive ventilation treatment. Four collaborative typologies emerged as processing their main concern: (1) twofold oriented...

  3. Electronic Collaboration Logbook

    International Nuclear Information System (INIS)

    Gysin, Suzanne; Mandrichenko, Igor; Podstavkov, Vladimir; Vittone, Margherita

    2012-01-01

    In HEP, scientific research is performed by large collaborations of organizations and individuals. The logbook of a scientific collaboration is an important part of the collaboration record. Often it contains experimental data. At Fermi National Accelerator Laboratory (FNAL), we developed an Electronic Collaboration Logbook (ECL) application, which is used by about 20 different collaborations, experiments and groups at FNAL. The ECL is the latest iteration of the project formerly known as the Control Room Logbook (CRL). We have been working on mobile (IOS and Android) clients for the ECL. We will present the history, current status and future plans of the project, as well as design, implementation and support solutions made by the project.

  4. Writing as collaborative inquiry

    DEFF Research Database (Denmark)

    Frølunde, Lisbeth; Pedersen, Christina Hee; Novak, Martin

    2015-01-01

    involved in collaborative knowledge production across difference (including age, professional position, life situation, nation). We tell about our experiences with how collaboration can lead toward re-invention of our research practices and methods, as well as our own subjectivities, through involvement......In our presentation we strive to disturb and unravel the romantic discourses of collaboration, dialogue and empowerment in relation to qualitative inquiry. For more than two years we (five Danish and Czech researchers) have been exploring the complex obstructions, difficulties and potentials...... in the not-yet-known. Over the years, we have shared and analyzed personal stories about our collaborative experiences in an on-going reflective learning process. We draw on writing methodologies, including memory-work (Haug, Davies) and collaborative writing such as by Wyatt, Gale, Gannon & Davies. Our...

  5. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  6. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  7. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  8. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  9. Theoretical foundations for collaboration engineering

    NARCIS (Netherlands)

    Kolfschoten, G.L.

    2007-01-01

    Collaboration is often presented as the solution to numerous problems in business and society. However, collaboration is challenging, and collaboration support is not an off-the-shelf-product. This research offers theoretical foundations for Collaboration Engineering. Collaboration Engineering is an

  10. Radioactive source security: the cultural challenges.

    Science.gov (United States)

    Englefield, Chris

    2015-04-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  11. IAEA Nuclear Security - Achievements 2002-2011

    International Nuclear Information System (INIS)

    2012-03-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes is real. This calls for a collective commitment to the control of, and accountancy for, material, as well as to adequate levels of protection in order to prevent criminal or unauthorized access to the material or associated facilities. Sharing of knowledge and experience, coordination among States and collaboration with other international organizations, initiatives and industries supports an effective international nuclear security framework. In 2001, the Board of Governors tasked the IAEA with improving nuclear security worldwide. The report that follows provides an overview of accomplishments over the last decade and reflects the importance that States assign to keeping material in the right hands. The IAEA has established a comprehensive nuclear security programme, described first in the Nuclear Security Plan of 2002-2005 and subsequently in the second plan of 2006- 2009. Activities included developing internationally accepted nuclear security guidance, supporting international legal instruments, protecting material and facilities, securing transport and borders, detecting and interdicting illicit nuclear trafficking, strengthening human resource capacity and preparing response plans should a nuclear security event occur. The IAEA has begun the implementation of its third Nuclear Security Plan, to be completed at the end of 2013. This approach to nuclear security recognizes that an effective national nuclear security regime builds on a number of factors: the implementation of relevant international legal instruments; IAEA guidance and standards; information protection; physical protection; material accounting and control; detection of, and response to, trafficking in such material; national response plans and contingency measures. Implemented in a systematic manner, these building blocks make up a sustainable national nuclear security regime and contribute to global

  12. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    While classically cryptography is concerned with the problem of private communication among two entities, say players, in modern cryptography multi-player protocols play an important role. And among these, it is probably fair to say that secret sharing, and its stronger version verifiable secret...... sharing (VSS), as well as multi-party computation (MPC) belong to the most appealing and/or useful ones. The former two are basic tools to achieve better robustness of cryptographic schemes against malfunction or misuse by “decentralizing” the security from one single to a whole group of individuals...... (captured by the term threshold cryptography). The latter allows—at least in principle—to execute any collaboration among a group of players in a secure way that guarantees the correctness of the outcome but simultaneously respects the privacy of the participants. In this work, we study three aspects...

  13. AUTOMATING THE DATA SECURITY PROCESS

    Directory of Open Access Journals (Sweden)

    Florin Ogigau-Neamtiu

    2017-11-01

    Full Text Available Contemporary organizations face big data security challenges in the cyber environment due to modern threats and actual business working model which relies heavily on collaboration, data sharing, tool integration, increased mobility, etc. The nowadays data classification and data obfuscation selection processes (encryption, masking or tokenization suffer because of the human implication in the process. Organizations need to shirk data security domain by classifying information based on its importance, conduct risk assessment plans and use the most cost effective data obfuscation technique. The paper proposes a new model for data protection by using automated machine decision making procedures to classify data and to select the appropriate data obfuscation technique. The proposed system uses natural language processing capabilities to analyze input data and to select the best course of action. The system has capabilities to learn from previous experiences thus improving itself and reducing the risk of wrong data classification.

  14. Energy Efficiency Collaboratives

    Energy Technology Data Exchange (ETDEWEB)

    Li, Michael [US Department of Energy, Washington, DC (United States); Bryson, Joe [US Environmental Protection Agency, Washington, DC (United States)

    2015-09-01

    Collaboratives for energy efficiency have a long and successful history and are currently used, in some form, in more than half of the states. Historically, many state utility commissions have used some form of collaborative group process to resolve complex issues that emerge during a rate proceeding. Rather than debate the issues through the formality of a commission proceeding, disagreeing parties are sent to discuss issues in a less-formal setting and bring back resolutions to the commission. Energy efficiency collaboratives take this concept and apply it specifically to energy efficiency programs—often in anticipation of future issues as opposed to reacting to a present disagreement. Energy efficiency collaboratives can operate long term and can address the full suite of issues associated with designing, implementing, and improving energy efficiency programs. Collaboratives can be useful to gather stakeholder input on changing program budgets and program changes in response to performance or market shifts, as well as to provide continuity while regulators come and go, identify additional energy efficiency opportunities and innovations, assess the role of energy efficiency in new regulatory contexts, and draw on lessons learned and best practices from a diverse group. Details about specific collaboratives in the United States are in the appendix to this guide. Collectively, they demonstrate the value of collaborative stakeholder processes in producing successful energy efficiency programs.

  15. Assessing Online Collaborative Discourse.

    Science.gov (United States)

    Breen, Henny

    2015-01-01

    This qualitative study using transcript analysis was undertaken to clarify the value of Harasim's Online Collaborative Learning Theory as a way to assess the collaborative process within nursing education. The theory incorporated three phases: (a) idea generating; (b) idea organizing; and (c) intellectual convergence. The transcripts of asynchronous discussions from a 2-week module about disaster nursing using a virtual community were analyzed and formed the data for this study. This study supports the use of Online Collaborative Learning Theory as a framework for assessing online collaborative discourse. Individual or group outcomes were required for the students to move through all three phases of the theory. The phases of the Online Collaborative Learning Theory could be used to evaluate the student's ability to collaborate. It is recommended that group process skills, which have more to do with interpersonal skills, be evaluated separately from collaborative learning, which has more to do with cognitive skills. Both are required for practicing nurses. When evaluated separately, the student learning needs are more clearly delineated. © 2014 Wiley Periodicals, Inc.

  16. Collaborative quality improvement.

    Science.gov (United States)

    Luckenbaugh, Amy N; Miller, David C; Ghani, Khurshid R

    2017-07-01

    Quality improvement collaboratives were developed in many medical and surgical disciplines with the goal of measuring and improving the quality of care provided to patients. The aim of this review is to provide an overview of surgical quality improvement collaboratives, and in particular those aimed at improving urological care. Quality improvement collaboratives collect high-quality data using standardized methodologies, and use the data to provide feedback to physicians and practices, and then implement processes to improve patient outcomes. The largest regional collaborative in urology is the Michigan Urological Surgery Improvement Collaborative (MUSIC). Recent efforts by this group have been focused at understanding variation in care, improving patient selection for treatment, reducing treatment morbidity and measuring and optimizing technical skill. The American Urological Association has also recently launched a national quality registry (AQUA), with an initial focus on prostate cancer care. By understanding factors that result in exemplary performance, quality improvement collaboratives are able to develop best practices around areas of care with high variation that have the potential to improve outcomes and reduce costs. These developments have been made possible by the unique model offered by the collaborative structure with the goal of improving patient care at a population level.

  17. Security-by-design handbook.

    Energy Technology Data Exchange (ETDEWEB)

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

    2013-01-01

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  18. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  19. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  20. Interfacing Nuclear Security and Safeguards through Education and Support Centre Networks

    International Nuclear Information System (INIS)

    Nikonov, D.

    2015-01-01

    This paper presents the work of the International Nuclear Security Education Network (INSEN) and the International Nuclear Security Training and Support Centre Network (NSSC) as the means to achieve sustainable human resource development in member states. The paper also examines how both security and safeguards can benefit from collaborative and coordinated activities when such networks focus on practical achievements. (author)

  1. Designing collaborative policy innovation

    DEFF Research Database (Denmark)

    Agger, Annika; Sørensen, Eva

    2014-01-01

    Recent approaches to enhancing public innovation suffer from two shortcomings: They overemphasize competition as a driver of innovation and overlook the fact that public sector innovation involves policy innovation as well as service innovation. Drawing on governance research and innovation theory......, the chapter investigates the extent to which and how collaboration between politicians and relevant stakeholders can spur the formulation, implementation and diffusion of new innovative policies. A case study of a process of collaborative policy innovation in a Danish municipality shows that collaborative...... policy arenas do contribute to policy innovation but also that the degree to which they do so depends on the institutional design of these arenas....

  2. Comprehensive multiplatform collaboration

    Science.gov (United States)

    Singh, Kundan; Wu, Xiaotao; Lennox, Jonathan; Schulzrinne, Henning G.

    2003-12-01

    We describe the architecture and implementation of our comprehensive multi-platform collaboration framework known as Columbia InterNet Extensible Multimedia Architecture (CINEMA). It provides a distributed architecture for collaboration using synchronous communications like multimedia conferencing, instant messaging, shared web-browsing, and asynchronous communications like discussion forums, shared files, voice and video mails. It allows seamless integration with various communication means like telephones, IP phones, web and electronic mail. In addition, it provides value-added services such as call handling based on location information and presence status. The paper discusses the media services needed for collaborative environment, the components provided by CINEMA and the interaction among those components.

  3. Collaboration in experiential therapy.

    Science.gov (United States)

    Berdondini, Lucia; Elliott, Robert; Shearer, Joan

    2012-02-01

    We offer a view of the nature and role of client-therapist collaboration in experiential psychotherapy, focusing on Gestalt and emotion-focused therapy (EFT). We distinguish between the necessary condition of mutual trust (the emotional bond between client and therapist) and effective collaboration (regarding the goals and tasks of therapy). Using a case study of experiential therapy for social anxiety, we illustrate how the development of collaboration can be both complex and pivotal for therapeutic success, and how it can involve client and therapist encountering one another through taking risks by openly and nonjudgementally disclosing difficult experiences in order to enrich and advance the work. © 2012 Wiley Periodicals, Inc.

  4. Collaborative Video Sketching

    DEFF Research Database (Denmark)

    Henningsen, Birgitte; Gundersen, Peter Bukovica; Hautopp, Heidi

    2017-01-01

    This paper introduces to what we define as a collaborative video sketching process. This process links various sketching techniques with digital storytelling approaches and creative reflection processes in video productions. Traditionally, sketching has been used by designers across various...... findings: 1) They are based on a collaborative approach. 2) The sketches act as a mean to externalizing hypotheses and assumptions among the participants. Based on our analysis we present an overview of factors involved in collaborative video sketching and shows how the factors relate to steps, where...... the participants: shape, record, review and edit their work, leading the participants to new insights about their work....

  5. Sensemaking in collaborative networks

    DEFF Research Database (Denmark)

    Peronard, Jean-Paul; Brix, Jacob

    2018-01-01

    be redesigned to strengthen the collaboration between companies. To enable this discussion we delve into the sensemaking literature and theory from loosely coupled systems. Our discussion leads to the development of the Balanced Activity System (BAS) model. The paper’s key contribution is the prescriptive BAS......The purpose of the study is to advance research on open business models as activity systems (Zott and Amit, 2010) in collaborative networks. We utilize Bradley’s (1995) theory of exchange behavior to discuss how new joint activities can be explored as well as how existing activities can...... model that can be used strategically in collaborative networks to redesign or create new joint activities....

  6. Security and Efficiency Concerns With Distributed Collaborative Networking Environments

    National Research Council Canada - National Science Library

    Felker, Keith

    2003-01-01

    ... exception. Recent technology advancements in the areas of multicast, firewalls, encryption techniques, and bandwidth availability have made the next level of interpersonal communication possible...

  7. Industrial Espionage in Denmark: Collaborative Security in a Corporatist State

    DEFF Research Database (Denmark)

    Afsah, Ebrahim

    the manner Danish state and society deal with regulatory questions, including the penal protection against industrial espionage. Unlike many other nations, Danes view their state as a friend and, consequently, accept and cooperate with a kind of intrusive state action that elsewhere would be viewed...

  8. Survey of Collaboration Technologies in Multi-level Security Environments

    Science.gov (United States)

    2014-04-28

    urban area. It evaluates how municipal fire service, law enforcement, emergency management, and public health organizations have used federal government...heterogeneous operational environments. Mercado , A. (2008) Exploring Data Sharing Between Geographically Distributed Mobile and Fixed Nodes Supporting

  9. Collaborative Learning in the Cloud

    DEFF Research Database (Denmark)

    Kirchner, Kathrin; Razmerita, Liana

    2015-01-01

    This present study aims to investigate how students perceive collaboration and identifies associated technologies used to collaborate. In particular we aim to address the following research questions: What are the factors that impact satisfaction with collaboration? How do these factors differ in...... in different collaborative settings? Based on data from 75 students from Denmark and Germany, the article identifies collaborative practices and factors that impact positively and negatively satisfaction with collaboration....

  10. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  11. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  12. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  13. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  14. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  15. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  16. Collaborative engagement experiment

    Science.gov (United States)

    Mullens, Katherine; Troyer, Bradley; Wade, Robert; Skibba, Brian; Dunn, Michael

    2006-05-01

    Unmanned ground and air systems operating in collaboration have the potential to provide future Joint Forces a significant capability for operations in complex terrain. Collaborative Engagement Experiment (CEE) is a consolidation of separate Air Force, Army and Navy collaborative efforts within the Joint Robotics Program (JRP) to provide a picture of the future of unmanned warfare. The Air Force Research Laboratory (AFRL), Material and Manufacturing Directorate, Aerospace Expeditionary Force Division, Force Protection Branch (AFRL/MLQF), The Army Aviation and Missile Research, Development and Engineering Center (AMRDEC) Joint Technology Center (JTC)/Systems Integration Laboratory (SIL), and the Space and Naval Warfare Systems Center - San Diego (SSC San Diego) are conducting technical research and proof of principle experiments for an envisioned operational concept for extended range, three dimensional, collaborative operations between unmanned systems, with enhanced situational awareness for lethal operations in complex terrain. This paper describes the work by these organizations to date and outlines some of the plans for future work.

  17. Collaborative Learning through Teletutorials.

    Science.gov (United States)

    Idrus, Rozhan

    1993-01-01

    Describes the use of audiographic teleconferencing for distance education courses for adult higher education at the Universiti Sains Malaysia. Telecommunications is discussed, and a collaborative learning strategy is explained that emphasizes the student-teacher relationship. (Contains 18 references.) (LRW)

  18. Collaborative Knowledge Management

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... collaboration of knowledge. The organizational structures and ... enables organizations to see the collective knowledge as a base element of ..... requirements for communication across different equipment and applications by ...

  19. Collaborative Communities of Firms

    DEFF Research Database (Denmark)

    2011-01-01

    and developing strategic initiatives that aid the community as a whole. We discuss the facilitator role of the shared services provider, contrasting it with the coordinator role found in other multi-firm organizations, and we show how shared services providers function by describing three examples...... is an organizational model called the collaborative community of firms. This chapter addresses an important organizational role in a collaborative community, that of the shared services provider. The shared services provider acts as a facilitator in the community, helping member firms collaborate with one another...... of collaborative communities of firms from different sectors: the U.S.-based Blade.org and two Denmark-based communities, the Kalundborg Industrial Symbiosis and MG50. Implications for the theory and practice of organization design are discussed....

  20. Drivers of Collaborative Advantage

    DEFF Research Database (Denmark)

    Weihe, Gudrid

    processes and behavioural dimensions is practically non-existent. This article tries to remedy the current gap in the literature by reviewing research findings on interfirm collaboration (alliances). On that basis a conceptual framework for analyzing partnership processes is developed. Finally......, the antecedents of collaborative advantage are theoretically examined, and the organizational competences contributing to collaborative success are identified. The conclusion is that operational processes and social dynamics are vital drivers of collaborative advantage. Another significant conclusion...... is that public management research can benefit from drawing upon existing alliance research. Alliance scholars have during the past couple of decades accumulated an impressive amount of knowledge on different aspects of inter-firm cooperation, and therefore the learning potential for public management scholars...

  1. Collaboration in scientific practice

    DEFF Research Database (Denmark)

    Wagenknecht, Susann

    2014-01-01

    This monograph investigates the collaborative creation of scientific knowledge in research groups. To do so, I combine philosophical analysis with a first-hand comparative case study of two research groups in experimental science. Qualitative data are gained through observation and interviews......, and I combine empirical insights with existing approaches to knowledge creation in philosophy of science and social epistemology. On the basis of my empirically-grounded analysis I make several conceptual contributions. I study scientific collaboration as the interaction of scientists within research...... to their publication. Specifically, I suggest epistemic difference and the porosity of social structure as two conceptual leitmotifs in the study of group collaboration. With epistemic difference, I emphasize the value of socio-cognitive heterogeneity in group collaboration. With porosity, I underline the fact...

  2. EPA Collaboration with Israel

    Science.gov (United States)

    The United States and Israel focus on scientific and technical collaboration to protect the environment, by exchanging scientific and technical information, arranging visits of scientific personnel, cooperating in scientific symposia and workshops, etc.

  3. Providers’ perspectives on collaboration

    Directory of Open Access Journals (Sweden)

    Patricia Bruner

    2011-08-01

    Full Text Available Objective: Changes in models of health care are required to better meet the needs of diverse, underserved patient populations. Collaboration among providers is one way to promote accessible, comprehensive and continuous care in healthcare organizations. This paper describes the quantitative findings from two time points that examined providers' views of collaboration among a sample of diverse personnel (e.g. clinical nurses, social workers, dental providers, mental health providers, clerical staff, medical assistants, public health staff, and administrators within a federally qualified nurse managed health care centre in the United States. Methods: The quantitative arm of a mixed-method study is presented in this paper. Two instruments, the Collaboration and Satisfaction About Care Decisions Scale and the University of the West of England Interprofessional Questionnaire (comprised of 4 subscales-Communication and Teamwork Scale, Interprofessional Learning Scale, Interprofessional Interaction Scale, and Interprofessional Relationships Scale were administered to providers at baseline and three to eight months following six same discipline focus group discussions on collaboration, in order to evaluate whether participating in the focus group discussions changed providers' views of collaboration. A summary of the focus group data which were published elsewhere is additionally summarized to help provide insight to the quantitative findings. Thirty-nine staff participated. Results: Paired t-tests revealed that only one scale out of the five, Collaboration and Satisfaction About Care Decisions Scale (33.97 at time one and 37.45 at time two, significantly and positively changed after the focus group discussion (p=0.046. Providers' views on collaboration ranged from positive to moderate views of collaboration; most measures revealed a non-significant improvement after the focus group discussions. Staff with some graduate school reported the greatest

  4. Providers’ perspectives on collaboration

    Directory of Open Access Journals (Sweden)

    Patricia Bruner

    2011-08-01

    Full Text Available Objective: Changes in models of health care are required to better meet the needs of diverse, underserved patient populations. Collaboration among providers is one way to promote accessible, comprehensive and continuous care in healthcare organizations. This paper describes the quantitative findings from two time points that examined providers' views of collaboration among a sample of diverse personnel (e.g. clinical nurses, social workers, dental providers, mental health providers, clerical staff, medical assistants, public health staff, and administrators within a federally qualified nurse managed health care centre in the United States.Methods: The quantitative arm of a mixed-method study is presented in this paper. Two instruments, the Collaboration and Satisfaction About Care Decisions Scale and the University of the West of England Interprofessional Questionnaire (comprised of 4 subscales-Communication and Teamwork Scale, Interprofessional Learning Scale, Interprofessional Interaction Scale, and Interprofessional Relationships Scale were administered to providers at baseline and three to eight months following six same discipline focus group discussions on collaboration, in order to evaluate whether participating in the focus group discussions changed providers' views of collaboration. A summary of the focus group data which were published elsewhere is additionally summarized to help provide insight to the quantitative findings. Thirty-nine staff participated.Results: Paired t-tests revealed that only one scale out of the five, Collaboration and Satisfaction About Care Decisions Scale (33.97 at time one and 37.45 at time two, significantly and positively changed after the focus group discussion (p=0.046. Providers' views on collaboration ranged from positive to moderate views of collaboration; most measures revealed a non-significant improvement after the focus group discussions. Staff with some graduate school reported the greatest

  5. Silence in Intercultural Collaboration

    NARCIS (Netherlands)

    Verouden, Nick W.; Sanden, Van der Maarten C.A.; Aarts, Noelle

    2018-01-01

    China is widely recognized as a significant scientific partner for Western universities. Given that many Western universities are now operating in the Chinese context, this study investigates the everyday conversations in which international partnerships are collaboratively developed and

  6. Indico: CERN Collaboration Hub

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Indico development is also moving towards a broader collaboration where other institutes, hosting their own Indico instance, can contribute to the project in order make it a better and more complete tool.

  7. Computer Security: Geneva, Suisse Romande and beyond

    CERN Multimedia

    Computer Security Team

    2014-01-01

    To ensure good computer security, it is essential for us to keep in close contact and collaboration with a multitude of official and unofficial, national and international bodies, agencies, associations and organisations in order to discuss best practices, to learn about the most recent (and, at times, still unpublished) vulnerabilities, and to handle jointly any security incident. A network of peers - in particular a network of trusted peers - can provide important intelligence about new vulnerabilities or ongoing attacks much earlier than information published in the media. In this article, we would like to introduce a few of the official peers we usually deal with.*   Directly relevant for CERN are SWITCH, our partner for networking in Switzerland, and our contacts within the WLCG, i.e. the European Grid Infrastructure (EGI), and the U.S. Open Science Grid (OSG). All three are essential partners when discussing security implementations and resolving security incidents. SWITCH, in...

  8. Electronic Collaboration Logbook

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    At FNAL, we developed an Electronic Collaboration Logbook (ECL) application which is used by about 20 different collaborations, experiments and groups at FNAL. ECL is the latest iteration of the project formerly known as Control Room Logbook (CRL). We have been working on mobile (IOS and Android) clients for ECL. We will present history, current status and future plans of the project, as well as design, implementation and support solutions made by the project.

  9. Embarrassing To Collaborate

    DEFF Research Database (Denmark)

    Mitchell, Robb

    This position paper briefly outlines my interest in embarrassment– principally in relation to experiments provoking collaborative encounters in contexts that range from urban spaces to art galleries, and from music events to industrial innovation workshops.......This position paper briefly outlines my interest in embarrassment– principally in relation to experiments provoking collaborative encounters in contexts that range from urban spaces to art galleries, and from music events to industrial innovation workshops....

  10. Collaboration Between Multistakeholder Standards

    DEFF Research Database (Denmark)

    Rasche, Andreas; Maclean, Camilla

    Public interest in corporate social responsibility (CSR) has resulted in a wide variety of multistakeholder CSR standards in which companies can choose to participate. While such standards reflect collaborative governance arrangements between public and private actors, the market for corporate...... responsibility is unlikely to support a great variety of partly competing and overlapping standards. Increased collaboration between these standards would enhance both their impact and their adoption by firms. This report examines the nature, benefits, and shortcomings of existing multistakeholder standards...

  11. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach.

    Science.gov (United States)

    Sanchez-Iborra, Ramon; Sánchez-Gómez, Jesús; Pérez, Salvador; Fernández, Pedro J; Santa, José; Hernández-Ramos, José L; Skarmeta, Antonio F

    2018-06-05

    Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT) field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN), which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa) and its layer-two supporter LoRa Wide Area Network (LoRaWAN), which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie⁻Hellman Over COSE (EDHOC) is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN.

  12. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach

    Directory of Open Access Journals (Sweden)

    Ramon Sanchez-Iborra

    2018-06-01

    Full Text Available Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN, which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa and its layer-two supporter LoRa Wide Area Network (LoRaWAN, which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie–Hellman Over COSE (EDHOC is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN.

  13. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  14. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  15. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  16. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  17. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  18. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  19. Staging Collaborative Innovation Processes

    DEFF Research Database (Denmark)

    Pedersen, Signe; Clausen, Christian

    Organisations are currently challenged by demands for increased collaborative innovation internally as well as with external and new entities - e.g. across the value chain. The authors seek to develop new approaches to managing collaborative innovative processes in the context of open innovation ...... the diverse matters of concern into a coherent product or service concept, and 2) in the same process move these diverse holders of the matters of concern into a translated actor network which carry or support the concept.......Organisations are currently challenged by demands for increased collaborative innovation internally as well as with external and new entities - e.g. across the value chain. The authors seek to develop new approaches to managing collaborative innovative processes in the context of open innovation...... and public private innovation partnerships. Based on a case study of a collaborative design process in a large electronics company the paper points to the key importance of staging and navigation of collaborative innovation process. Staging and navigation is presented as a combined activity: 1) to translate...

  20. Collaborations in fusion research

    International Nuclear Information System (INIS)

    Barnes, D.; Davis, S.; Roney, P.

    1995-01-01

    This paper reviews current experimental collaborative efforts in the fusion community and extrapolates to operational scenarios for the Tokamak Physics Experiment (TPX) and the International Thermonuclear Experimental Reactor (ITER). Current requirements, available technologies and tools, and problems, issues and concerns are discussed. This paper specifically focuses on the issues that apply to experimental operational collaborations. Special requirements for other types of collaborations, such as theoretical or design and construction efforts, will not be addressed. Our current collaborative efforts have been highly successful, even though the tools in use will be viewed as primitive by tomorrow's standards. An overview of the tools and technologies in today's collaborations can be found in the first section of this paper. The next generation of fusion devices will not be primarily institutionally based, but will be national (TPX) and international (ITER) in funding, management, operation and in ownership of scientific results. The TPX will present the initial challenge of real-time remotely distributed experimental data analysis for a steady state device. The ITER will present new challenges with the possibility of several remote control rooms all participating in the real-time operation of the experimental device. A view to the future of remote collaborations is provided in the second section of this paper

  1. Assured Resource Sharing in Ad-Hoc Collaboration

    Energy Technology Data Exchange (ETDEWEB)

    Ahn, Gail-Joon [Arizona State Univ., Tempe, AZ (United States)

    2015-12-19

    The project seeks an innovative framework to enable users to access and selectively share resources in distributed environments, enhancing the scalability of information sharing. We have investigated secure sharing & assurance approaches for ad-hoc collaboration, focused on Grids, Clouds, and ad-hoc network environments.

  2. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  3. Security model for picture archiving and communication systems.

    Science.gov (United States)

    Harding, D B; Gac, R J; Reynolds, C T; Romlein, J; Chacko, A K

    2000-05-01

    The modern information revolution has facilitated a metamorphosis of health care delivery wrought with the challenges of securing patient sensitive data. To accommodate this reality, Congress passed the Health Insurance Portability and Accountability Act (HIPAA). While final guidance has not fully been resolved at this time, it is up to the health care community to develop and implement comprehensive security strategies founded on procedural, hardware and software solutions in preparation for future controls. The Virtual Radiology Environment (VRE) Project, a landmark US Army picture archiving and communications system (PACS) implemented across 10 geographically dispersed medical facilities, has addressed that challenge by planning for the secure transmission of medical images and reports over their local (LAN) and wide area network (WAN) infrastructure. Their model, which is transferable to general PACS implementations, encompasses a strategy of application risk and dataflow identification, data auditing, security policy definition, and procedural controls. When combined with hardware and software solutions that are both non-performance limiting and scalable, the comprehensive approach will not only sufficiently address the current security requirements, but also accommodate the natural evolution of the enterprise security model.

  4. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  5. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  6. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  7. Collaboration between Supported Employment and Human Resource Services: Strategies for Success

    Science.gov (United States)

    Post, Michal; Campbell, Camille; Heinz, Tom; Kotsonas, Lori; Montgomery, Joyce; Storey, Keith

    2010-01-01

    The article presents the benefits of successful collaboration between supported employment agencies and human resource managers when working together to secure employment for individuals with disabilities. Two case studies are presented: one involving a successful collaboration with county human resource managers in negotiating a change in the…

  8. Organizing distributed knowledge for collaborative action: Structure, functioning, and emergence of organizational transactive memory systems

    NARCIS (Netherlands)

    Schakel, J.K.

    2013-01-01

    In the domain of safety and security specialized organizations often have to collaborate on an occasional basis with other organizations to head challenges that none of the partners can head (as easily) on its own. Such collaborations are temporal and often virtual in nature. One emerging

  9. Collaborative engagement experiment (CEE)

    Science.gov (United States)

    Wade, Robert L.; Reames, Joseph M.

    2005-05-01

    Unmanned ground and air systems operating in collaboration have the potential to provide future Joint Forces a significant capability for operations in complex terrain. Ground and air collaborative engagements potentially offer force conservation, perform timely acquisition and dissemination of essential combat information, and can eliminate high value and time critical targets. These engagements can also add considerably to force survivability by reducing soldier and equipment exposure during critical operations. The Office of the Secretary of Defense, Joint Robotics Program (JRP) sponsored Collaborative Engagement Experiment (CEE) is a consolidation of separate Air Force, Army and Navy collaborative efforts to provide a Joint capability. The Air Force Research Laboratory (AFRL), Material and Manufacturing Directorate, Aerospace Expeditionary Force Division, Force Protection Branch (AFRLMLQF), The Army Aviation and Missile Research, Development and Engineering Center (AMRDEC) Joint Technology Center (JTC)/Systems Integration Laboratory (SIL), and the Space and Naval Warfare Systems Center-San Diego (SSC San Diego) are conducting technical research and proof of principle for an envisioned operational concept for extended range, three dimensional, collaborative operations between unmanned systems, with enhanced situational awareness for lethal operations in complex terrain. This program will assess information requirements and conduct experiments to identify and resolve technical risks for collaborative engagements using Unmanned Ground Vehicles (UGVs) and Unmanned Aerial Vehicles (UAVs). It will research, develop and physically integrate multiple unmanned systems and conduct live collaborative experiments. Modeling and Simulation systems will be upgraded to reflect engineering fidelity levels to greater understand technical challenges to operate as a team. This paper will provide an update of a multi-year program and will concentrate primarily on the JTC

  10. Technologies for Augmented Collaboration

    National Research Council Canada - National Science Library

    Pierce, Linda; Sutton, Janet; Foltz, Peter; Lavoie, Noelle; Scott-Nash, Shelly; Lauper, Ursula

    2006-01-01

    Teams have always been important in military operations, but the nature of military teamwork is changing to accommodate an increasing number of missions in stability, security, transition, and reconstruction (SSTR...

  11. Accessing HEP Collaboration documents using WWW and WAIS

    Energy Technology Data Exchange (ETDEWEB)

    Nguyen, T.D.; Buckley-Geer, E.; Ritchie, D.J.

    1995-09-01

    WAIS stands for Wide Area Information Server. It is a distributed information retrieval system. A WAIS system has a client-server architecture which consists of clients talking to a server via a TCP/IP network using the ANSI standard Z39-50 VI protocol. A freely available version (FreeWAIS) is supported by the Clearinghouse for Networked Information Discovery and Retrieval, also known as CNIDR. FreeWAIS-sf, which is the software the authors are using at Fermilab, is an extension of FreeWAIS. FreeWAIS-sf supports all the functionalities which FreeWAIS offers as well as additional indexing and searching capabilities for structured fields. World Wide Web (WWW) was originally developed by Tim Berners-Lee at CERN and is now the backbone for serving information on Internet. Here, the authors describe a system for accessing HEP collaboration documents using WWW and WAIS.

  12. Accessing HEP Collaboration documents using WWW and WAIS

    International Nuclear Information System (INIS)

    Nguyen, T.D.; Buckley-Geer, E.; Ritchie, D.J.

    1995-09-01

    WAIS stands for Wide Area Information Server. It is a distributed information retrieval system. A WAIS system has a client-server architecture which consists of clients talking to a server via a TCP/IP network using the ANSI standard Z39-50 VI protocol. A freely available version (FreeWAIS) is supported by the Clearinghouse for Networked Information Discovery and Retrieval, also known as CNIDR. FreeWAIS-sf, which is the software the authors are using at Fermilab, is an extension of FreeWAIS. FreeWAIS-sf supports all the functionalities which FreeWAIS offers as well as additional indexing and searching capabilities for structured fields. World Wide Web (WWW) was originally developed by Tim Berners-Lee at CERN and is now the backbone for serving information on Internet. Here, the authors describe a system for accessing HEP collaboration documents using WWW and WAIS

  13. Developments in Remote Collaboration and Computation

    International Nuclear Information System (INIS)

    Burruss, J.R.; Abla, G.; Flanagan, S.; Keahey, K.; Leggett, T.; Ludesche, C.; McCune, D.; Papka, M.E.; Peng, Q.; Randerson, L.; Schissel, D.P.

    2005-01-01

    The National Fusion Collaboratory (NFC) is creating and deploying collaborative software tools to unite magnetic fusion research in the United States. In particular, the NFC is developing and deploying a national FES 'Grid' (FusionGrid) for secure sharing of computation, visualization, and data resources over the Internet. The goal of FusionGrid is to allow scientists at remote sites to participate as fully in experiments, machine design, and computational activities as if they were working on site thereby creating a unified virtual organization of the geographically dispersed U.S. fusion community

  14. Reputational Information and Strategic Collaboration

    DEFF Research Database (Denmark)

    Andersen, Poul Houman; Bendix, Henrik B.

    1998-01-01

    What types of information do decision-makers use when deciding on collaboration? What are the role of reputational information in relation to decisions on collaboration......What types of information do decision-makers use when deciding on collaboration? What are the role of reputational information in relation to decisions on collaboration...

  15. Distance collaborations with industry

    Energy Technology Data Exchange (ETDEWEB)

    Peskin, A.; Swyler, K.

    1998-06-01

    The college industry relationship has been identified as a key policy issue in Engineering Education. Collaborations between academic institutions and the industrial sector have a long history and a bright future. For Engineering and Engineering Technology programs in particular, industry has played a crucial role in many areas including advisement, financial support, and practical training of both faculty and students. Among the most important and intimate interactions are collaborative projects and formal cooperative education arrangements. Most recently, such collaborations have taken on a new dimension, as advances in technology have made possible meaningful technical collaboration at a distance. There are several obvious technology areas that have contributed significantly to this trend. Foremost is the ubiquitous presence of the Internet. Perhaps almost as important are advances in computer based imaging. Because visual images offer a compelling user experience, it affords greater knowledge transfer efficiency than other modes of delivery. Furthermore, the quality of the image appears to have a strongly correlated effect on insight. A good visualization facility offers both a means for communication and a shared information space for the subjects, which are among the essential features of both peer collaboration and distance learning.

  16. COLLABORATION BOARD (CB55)

    CERN Multimedia

    B. Cousins

    Open Access Publication Policy ATLAS had recently issued a short statement in support of open access publishing. The mood of the discussions in the December CMS Collaboration Board had appeared to be in favour and so it was being proposed that CMS issue the same statement as that made by ATLAS (the statement is attached to the agenda of this meeting). The Collaboration Board agreed. Election of the Chair of the Collaboration Board Following the agreement to shorten the terms of both the Spokesperson and the Collaboration Board Chair, and to introduce a longer overlap period between the election and the start of the term, the election for the next Collaboration Board Chair was due in December 2007. If the old standard schedule specified in the Constitution were adapted to this date, then the Board should be informed at the present meeting that the election was being prepared. However, it was felt that the experience of the previous year's election of the Spokesperson had shown that it would be desirable to...

  17. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  18. Unix Security Cookbook

    Science.gov (United States)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  19. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  20. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  1. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  2. FS-OpenSecurity: A Taxonomic Modeling of Security Threats in SDN for Future Sustainable Computing

    Directory of Open Access Journals (Sweden)

    Yunsick Sung

    2016-09-01

    Full Text Available Software Defined Networking (SDN has brought many changes in terms of the interaction processes between systems and humans. It has become the key enabler of software defined architecture, which allows enterprises to build a highly agile Information Technology (IT infrastructure. For Future Sustainability Computing (FSC, SDN needs to deliver on many information technology commitments—more automation, simplified design, increased agility, policy-based management, and network management bond to more liberal IT workflow systems. To address the sustainability problems, SDN needs to provide greater collaboration and tighter integration with networks, servers, and security teams that will have an impact on how enterprises design, plan, deploy and manage networks. In this paper, we propose FS-OpenSecurity, which is a new and pragmatic security architecture model. It consists of two novel methodologies, Software Defined Orchestrator (SDO and SQUEAK, which offer a robust and secure architecture. The secure architecture is required for protection from diverse threats. Usually, security administrators need to handle each threat individually. However, handling threats automatically by adapting to the threat landscape is a critical demand. Therefore, the architecture must handle defensive processes automatically that are collaboratively based on intelligent external and internal information.

  3. Data security on the national fusion grid

    International Nuclear Information System (INIS)

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    The National Fusion Collaboratory project is developing and deploying new distributed computing and remote collaboration technologies with the goal of advancing magnetic fusion energy research. This work has led to the development of the US Fusion Grid (FusionGrid), a computational grid composed of collaborative, compute, and data resources from the three large US fusion research facilities and with users both in the US and in Europe. Critical to the development of FusionGrid was the creation and deployment of technologies to ensure security in a heterogeneous environment. These solutions to the problems of authentication, authorization, data transfer, and secure data storage, as well as the lessons learned during the development of these solutions, may be applied outside of FusionGrid and scale to future computing infrastructures such as those for next-generation devices like ITER

  4. Security on the US Fusion Grid

    International Nuclear Information System (INIS)

    Burruss, Justin R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    The National Fusion Collaboratory project is developing and deploying new distributed computing and remote collaboration technologies with the goal of advancing magnetic fusion energy research. This work has led to the development of the US Fusion Grid (FusionGrid), a computational grid composed of collaborative, compute, and data resources from the three large US fusion research facilities and with users both in the US and in Europe. Critical to the development of FusionGrid was the creation and deployment of technologies to ensure security in a heterogeneous environment. These solutions to the problems of authentication, authorization, data transfer, and secure data storage, as well as the lessons learned during the development of these solutions, may be applied outside of FusionGrid and scale to future computing infrastructures such as those for next-generation devices like ITER

  5. Security on the US Fusion Grid

    Energy Technology Data Exchange (ETDEWEB)

    Burruss, Justin R.; Fredian, Tom W.; Thompson, Mary R.

    2005-06-01

    The National Fusion Collaboratory project is developing and deploying new distributed computing and remote collaboration technologies with the goal of advancing magnetic fusion energy research. This work has led to the development of the US Fusion Grid (FusionGrid), a computational grid composed of collaborative, compute, and data resources from the three large US fusion research facilities and with users both in the US and in Europe. Critical to the development of FusionGrid was the creation and deployment of technologies to ensure security in a heterogeneous environment. These solutions to the problems of authentication, authorization, data transfer, and secure data storage, as well as the lessons learned during the development of these solutions, may be applied outside of FusionGrid and scale to future computing infrastructures such as those for next-generation devices like ITER.

  6. Data security on the national fusion grid

    Energy Technology Data Exchange (ETDEWEB)

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-06-01

    The National Fusion Collaboratory project is developing and deploying new distributed computing and remote collaboration technologies with the goal of advancing magnetic fusion energy research. This work has led to the development of the US Fusion Grid (FusionGrid), a computational grid composed of collaborative, compute, and data resources from the three large US fusion research facilities and with users both in the US and in Europe. Critical to the development of FusionGrid was the creation and deployment of technologies to ensure security in a heterogeneous environment. These solutions to the problems of authentication, authorization, data transfer, and secure data storage, as well as the lessons learned during the development of these solutions, may be applied outside of FusionGrid and scale to future computing infrastructures such as those for next-generation devices like ITER.

  7. Security on the US fusion grid

    International Nuclear Information System (INIS)

    Burruss, J.R.; Fredian, T.W.; Thompson, M.R.

    2006-01-01

    The National Fusion Collaboratory project is developing and deploying new distributed computing and remote collaboration technologies with the goal of advancing magnetic fusion energy research. This has led to the development of the U.S. fusion grid (FusionGrid), a computational grid composed of collaborative, compute, and data resources from the three large U.S. fusion research facilities and with users both in the U.S. and in Europe. Critical to the development of FusionGrid was the creation and deployment of technologies to ensure security in a heterogeneous environment. These solutions to the problems of authentication, authorization, data transfer, and secure data storage, as well as the lessons learned during the development of these solutions, may be applied outside of FusionGrid and scale to future computing infrastructures such as those for next-generation devices like ITER

  8. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  9. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  10. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  11. Managing collaborative innovation networks

    DEFF Research Database (Denmark)

    Stevens, Vidar; Agger, Annika

    2017-01-01

    Collaborative innovation networks are increasingly used as vehicles for fostering innovative policy solutions. However, scholars have noted that the extent to which collaborative networks can actually contribute to the development of innovative policy solutions depends on how they are managed...... a Flemish administrative network to develop a radical new Spatial Planning Policy Plan. This study shows that the best way to manage collaborative innovation networks is not to press directly for results, but take the time to invest in relationship-building and together agree on a planning and clear process...... steps. Such a management approach allows actors to get to know each other and from thereon expand, with more background and appreciation for the others’ goals, behaviors, and intentions, their group activities concerning the formulation of a radical and innovative policy plan....

  12. Innovation and network collaboration

    DEFF Research Database (Denmark)

    Kesting, Peter; Müller, Sabine; Jørgensen, Frances

    2011-01-01

    Research suggests that small and medium-sized enterprises (SMEs) can benefit from network collaboration by enhancing opportunities for innovation. Managing the necessary collaboration to benefit from network participation may however be particularly challenging for SMEs due to their size...... and their inherent shortage of resources. In this paper, we propose that human resource management (HRM) practices may provide a means by which SMEs can increase their innovation capacity through network collaboration. Following a brief presentation of the relevant literature on networks, and innovation in networks...... in particular, and HRM, we analyse and evaluate the potential applicability of existing models for supporting innovation in SMEs participating in networks. Finally, we propose several lines of inquiry arising from our analysis that provide directions for future research....

  13. Intercultural Collaboration Stories

    DEFF Research Database (Denmark)

    Gertsen, Martine Cardel; Søderberg, Anne-Marie

    2011-01-01

    The objective of this article is to show how narrative methods provide useful tools for international business research. We do this by presenting a study of stories told about the collaboration between a Danish expatriate manager and his Chinese CEO in the Shanghai subsidiary of an MNE. First, we...... to elucidate intercultural collaboration processes by analyzing how each member of a dyad of interacting managers narrates the same chain of events. We show how the narratological concepts of peripeteia and anagnorisis are well suited to identifying focal points in their stories: situations where change...... follows their recognizing new dimensions of their conflicts, eventually furthering their collaboration. We explain how Greimas's actantial model is valuable when mapping differences between and changes in the narrators’ projects, alliances and oppositions in the course of their interaction. Thus, we make...

  14. Playful Collaboration (or Not)

    DEFF Research Database (Denmark)

    Bogers, Marcel

    2011-01-01

    This paper explores how games and play, which are deeply rooted in human beings as a way to learn and interact, can be used to teach certain concepts and practices related to open collaborative innovation. We discuss how playing games can be a source of creativity, imagination and fun, while it can...... also be conducive to deep learning. As such, a game can engage different dimensions of learning and embed elements of active, collaborative, cooperative and problem-based learning. Building on this logic, we present an exploratory case study of the use of a particular board game in a class of a course...... collaboration at the cost of individual performance and possible long-term collective performance as well....

  15. Collaborative Economy and Tourism

    DEFF Research Database (Denmark)

    Dredge, Dianne; Gyimóthy, Szilvia

    2017-01-01

    The digital collaborative economy is one of the most fascinating developments to have claimed our attention in the last decade. Not only does it defy clear definition, but its historical links back to non-monetised sharing and gift economies and its contemporary foundations in monetising idling...... or spare capacity make it difficult to theorise. In this chapter, we lay the foundation for a social science approach to the exploration of the collaborative economy and its relationship with tourism. We argue that “collaborative” and “economy” should be conceptualised in a broad and inclusive manner...... in order to avoid narrow theorisations and blinkered accounts that focus only on digitally-mediated, monetised transactions. A balance between individual and collective dimensions of the collaborative economy is also necessary if we are to understand its societal implications....

  16. The collaboration imperative.

    Science.gov (United States)

    Nidumolu, Ram; Ellison, Jib; Whalen, John; Billman, Erin

    2014-04-01

    Addressing global sustainability challenges--including climate change, resource depletion, and ecosystem loss--is beyond the individual capabilities of even the largest companies. To tackle these threats, and unleash new value, companies and other stakeholders must collaborate in new ways that treat fragile and complex ecosystems as a whole. In this article, the authors draw on cases including the Latin American Water Funds Partnership, the Sustainable Apparel Coalition (led by Nike, Patagonia, and Walmart), and Action to Accelerate Recycling (a partnership between Alcoa, consumer packaged goods companies, and local governments, among others) to describe four new collaboration models that create shared value and address environmental protection across the value stream. Optimal collaborations focus on improving either business processes or outcomes. They start with a small group of key organizations, bring in project management expertise, link self-interest to shared interest, encourage productive competition, create quick wins, and, above all, build and maintain trust.

  17. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  18. Communication and collaboration technologies.

    Science.gov (United States)

    Cheeseman, Susan E

    2012-01-01

    This is the third in a series of columns exploring health information technology (HIT) in the neonatal intensive care unit (NICU). The first column provided background information on the implementation of information technology throughout the health care delivery system, as well as the requisite informatics competencies needed for nurses to fully engage in the digital era of health care. The second column focused on information and resources to master basic computer competencies described by the TIGER initiative (Technology Informatics Guiding Education Reform) as learning about computers, computer networks, and the transfer of data.1 This column will provide additional information related to basic computer competencies, focusing on communication and collaboration technologies. Computers and the Internet have transformed the way we communicate and collaborate. Electronic communication is the ability to exchange information through the use of computer equipment and software.2 Broadly defined, any technology that facilitates linking one or more individuals together is a collaborative tool. Collaboration using technology encompasses an extensive range of applications that enable groups of individuals to work together including e-mail, instant messaging (IM ), and several web applications collectively referred to as Web 2.0 technologies. The term Web 2.0 refers to web applications where users interact and collaborate with each other in a collective exchange of ideas generating content in a virtual community. Examples of Web 2.0 technologies include social networking sites, blogs, wikis, video sharing sites, and mashups. Many organizations are developing collaborative strategies and tools for employees to connect and interact using web-based social media technologies.3.

  19. Playful Collaboration (Or Not)

    DEFF Research Database (Denmark)

    Bogers, Marcel; Sproedt, Henrik

    2012-01-01

    This article explores how playing games can be used to teach intangible social interaction across boundaries, in particular within open collaborative innovation. We present an exploratory case study of how students learned from playing a board game in a graduate course of the international...... and interdisciplinary Innovation and Business master's program in Denmark. We identify several important themes related to the process of learning through playing and the social dynamics of open collaborative innovation, while we also highlight possible caveats of “playing” and practicing open innovation. Our findings...

  20. Organizing for Asymmetric Collaboration

    DEFF Research Database (Denmark)

    Nielsen, Jørn Flohr; Sørensen, Henrik B.

      The vision of new organizational forms consists of less-organized networks and alliances between organizations, in which collaborative capabilities are assumed to be crucial (Miles et al., 2005). The path to such new forms may go through fragile cooperative efforts. Despite the good will of many...... complexity to already complex models, we claim that our approach has practical implications: it offers rather simple diagnostic cues to change agents that are coping with the barriers to management and collaboration among loosely coupled units....