Science.gov

Sample records for additional security measures

  1. 12 CFR 619.9010 - Additional security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Additional security. 619.9010 Section 619.9010 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM DEFINITIONS § 619.9010 Additional security. Supplementary collateral to the primary security taken in connection with the loan....

  2. 12 CFR 619.9010 - Additional security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Additional security. 619.9010 Section 619.9010 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM DEFINITIONS § 619.9010 Additional security. Supplementary collateral to the primary security taken in connection with the loan....

  3. Additional Security Considerations for Grid Management

    NASA Technical Reports Server (NTRS)

    Eidson, Thomas M.

    2003-01-01

    The use of Grid computing environments is growing in popularity. A Grid computing environment is primarily a wide area network that encompasses multiple local area networks, where some of the local area networks are managed by different organizations. A Grid computing environment also includes common interfaces for distributed computing software so that the heterogeneous set of machines that make up the Grid can be used more easily. The other key feature of a Grid is that the distributed computing software includes appropriate security technology. The focus of most Grid software is on the security involved with application execution, file transfers, and other remote computing procedures. However, there are other important security issues related to the management of a Grid and the users who use that Grid. This note discusses these additional security issues and makes several suggestions as how they can be managed.

  4. 49 CFR 1554.101 - Security Measures.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT REPAIR STATION SECURITY Security Measures... display area of an airport covered by an airport security program under 49 CFR part 1542 in the United... 49 Transportation 9 2014-10-01 2014-10-01 false Security Measures. 1554.101 Section...

  5. Interior view of addition pharmacy showing dutch door and security ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Interior view of addition pharmacy showing dutch door and security ceiling grate, facing north. - Albrook Air Force Station, Dispensary, East side of Canfield Avenue, Balboa, Former Panama Canal Zone, CZ

  6. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  7. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  8. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices... approved VSP. These additional security measures may include: (1) Increasing the frequency and detail of... operations to deter unauthorized access; (4) Limiting the number of access points to the vessel by...

  9. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices... approved VSP. These additional security measures may include: (1) Increasing the frequency and detail of... operations to deter unauthorized access; (4) Limiting the number of access points to the vessel by...

  10. Measuring Human Performance within Computer Security Incident Response Teams

    SciTech Connect

    McClain, Jonathan T.; Silva, Austin Ray; Avina, Glory Emmanuel; Forsythe, James C.

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  11. Validity and reliability of food security measures.

    PubMed

    Cafiero, Carlo; Melgar-Quiñonez, Hugo R; Ballard, Terri J; Kepple, Anne W

    2014-12-01

    This paper reviews some of the existing food security indicators, discussing the validity of the underlying concept and the expected reliability of measures under reasonably feasible conditions. The main objective of the paper is to raise awareness on existing trade-offs between different qualities of possible food security measurement tools that must be taken into account when such tools are proposed for practical application, especially for use within an international monitoring framework. The hope is to provide a timely, useful contribution to the process leading to the definition of a food security goal and the associated monitoring framework within the post-2015 Development Agenda. PMID:25407084

  12. Portfolio analysis of layered security measures.

    PubMed

    Chatterjee, Samrat; Hora, Stephen C; Rosoff, Heather

    2015-03-01

    Layered defenses are necessary for protecting the public from terrorist attacks. Designing a system of such defensive measures requires consideration of the interaction of these countermeasures. In this article, we present an analysis of a layered security system within the lower Manhattan area. It shows how portfolios of security measures can be evaluated through portfolio decision analysis. Consideration is given to the total benefits and costs of the system. Portfolio diagrams are created that help communicate alternatives among stakeholders who have differing views on the tradeoffs between security and economic activity. PMID:25487829

  13. Validity and reliability of food security measures.

    PubMed

    Cafiero, Carlo; Melgar-Quiñonez, Hugo R; Ballard, Terri J; Kepple, Anne W

    2014-12-01

    This paper reviews some of the existing food security indicators, discussing the validity of the underlying concept and the expected reliability of measures under reasonably feasible conditions. The main objective of the paper is to raise awareness on existing trade-offs between different qualities of possible food security measurement tools that must be taken into account when such tools are proposed for practical application, especially for use within an international monitoring framework. The hope is to provide a timely, useful contribution to the process leading to the definition of a food security goal and the associated monitoring framework within the post-2015 Development Agenda.

  14. 40 CFR 412.47 - Additional measures.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 29 2011-07-01 2009-07-01 true Additional measures. 412.47 Section 412.47 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND... Calves § 412.47 Additional measures. (a) Each CAFO subject to this subpart must implement...

  15. 40 CFR 412.47 - Additional measures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 28 2010-07-01 2010-07-01 true Additional measures. 412.47 Section 412.47 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND... Calves § 412.47 Additional measures. (a) Each CAFO subject to this subpart must implement...

  16. 33 CFR 101.130 - Equivalent security measures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Equivalent security measures. 101.130 Section 101.130 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: GENERAL General § 101.130 Equivalent security measures. (a) For...

  17. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets the... inspections and screening of people and their personal effects; and (11) Respond to the presence of... additional security measures may include: (1) Increasing the frequency and detail of screening of people...

  18. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets the... inspections and screening of people and their personal effects; and (11) Respond to the presence of... additional security measures may include: (1) Increasing the frequency and detail of screening of people...

  19. 33 CFR 105.260 - Security measures for restricted areas.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... additional security measures may include: (1) Increasing the intensity and frequency of monitoring and access... number of access points to restricted areas, and enhancing the controls applied at the remaining accesses... equipment; (7) Enhancing the number and frequency of patrols, including waterborne patrols undertaken......

  20. 33 CFR 105.260 - Security measures for restricted areas.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... additional security measures may include: (1) Increasing the intensity and frequency of monitoring and access... number of access points to restricted areas, and enhancing the controls applied at the remaining accesses... equipment; (7) Enhancing the number and frequency of patrols, including waterborne patrols undertaken......

  1. 33 CFR 101.130 - Equivalent security measures.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Equivalent security measures. 101... MARITIME SECURITY MARITIME SECURITY: GENERAL General § 101.130 Equivalent security measures. (a) For any measure required by part 104, 105, or 106 of this subchapter, the owner or operator may substitute...

  2. 40 CFR 412.47 - Additional measures.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... STANDARDS CONCENTRATED ANIMAL FEEDING OPERATIONS (CAFO) POINT SOURCE CATEGORY Swine, Poultry, and Veal Calves § 412.47 Additional measures. (a) Each CAFO subject to this subpart must implement the requirements of § 412.37(a). (b) Each CAFO subject to this subpart must comply with the...

  3. 40 CFR 412.47 - Additional measures.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... STANDARDS CONCENTRATED ANIMAL FEEDING OPERATIONS (CAFO) POINT SOURCE CATEGORY Swine, Poultry, and Veal Calves § 412.47 Additional measures. (a) Each CAFO subject to this subpart must implement the requirements of § 412.37(a). (b) Each CAFO subject to this subpart must comply with the...

  4. 40 CFR 412.47 - Additional measures.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... STANDARDS CONCENTRATED ANIMAL FEEDING OPERATIONS (CAFO) POINT SOURCE CATEGORY Swine, Poultry, and Veal Calves § 412.47 Additional measures. (a) Each CAFO subject to this subpart must implement the requirements of § 412.37(a). (b) Each CAFO subject to this subpart must comply with the...

  5. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  6. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  7. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  8. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  9. Surface texture measurement for additive manufacturing

    NASA Astrophysics Data System (ADS)

    Triantaphyllou, Andrew; Giusca, Claudiu L.; Macaulay, Gavin D.; Roerig, Felix; Hoebel, Matthias; Leach, Richard K.; Tomita, Ben; Milne, Katherine A.

    2015-06-01

    The surface texture of additively manufactured metallic surfaces made by powder bed methods is affected by a number of factors, including the powder’s particle size distribution, the effect of the heat source, the thickness of the printed layers, the angle of the surface relative to the horizontal build bed and the effect of any post processing/finishing. The aim of the research reported here is to understand the way these surfaces should be measured in order to characterise them. In published research to date, the surface texture is generally reported as an Ra value, measured across the lay. The appropriateness of this method for such surfaces is investigated here. A preliminary investigation was carried out on two additive manufacturing processes—selective laser melting (SLM) and electron beam melting (EBM)—focusing on the effect of build angle and post processing. The surfaces were measured using both tactile and optical methods and a range of profile and areal parameters were reported. Test coupons were manufactured at four angles relative to the horizontal plane of the powder bed using both SLM and EBM. The effect of lay—caused by the layered nature of the manufacturing process—was investigated, as was the required sample area for optical measurements. The surfaces were also measured before and after grit blasting.

  10. 33 CFR 104.275 - Security measures for handling cargo.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for handling... measures for handling cargo. (a) General. The vessel owner or operator must ensure that security measures... there are regular or repeated cargo operations with the same shipper, coordinate security measures...

  11. Muon Fluence Measurements for Homeland Security Applications

    SciTech Connect

    Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

    2010-08-10

    This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

  12. Validity Evidence for the Security Scale as a Measure of Perceived Attachment Security in Adolescence

    ERIC Educational Resources Information Center

    Van Ryzin, Mark J.; Leve, Leslie D.

    2012-01-01

    In this study, the validity of a self-report measure of children's perceived attachment security (the Kerns Security Scale) was tested using adolescents. With regards to predictive validity, the Security Scale was significantly associated with (1) observed mother-adolescent interactions during conflict and (2) parent- and teacher-rated social…

  13. Defining and Computing a Valued Based Cyber-Security Measure

    SciTech Connect

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2012-01-01

    In earlier work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  14. Defining and Computing a Value Based Cyber-Security Measure

    SciTech Connect

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    In past work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities\\; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper we discuss the specification and design of a system that collects, updates and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  15. Measuring and Modeling Security and Privacy Laws

    ERIC Educational Resources Information Center

    Romanosky, Sasha

    2012-01-01

    This manuscript presents empirical and analytical analysis and discussion of security and privacy laws. The introduction, together with the three substantive chapters each represent separate research papers written as partial fulfillment of my PhD dissertation in the Heinz College, Carnegie Mellon University. Chapter 2 is an abbreviated version of…

  16. 7 CFR 1962.8 - Liens on real estate for additional security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 14 2010-01-01 2009-01-01 true Liens on real estate for additional security. 1962.8 Section 1962.8 Agriculture Regulations of the Department of Agriculture (Continued) RURAL HOUSING SERVICE, RURAL BUSINESS-COOPERATIVE SERVICE, RURAL UTILITIES SERVICE, AND FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE (CONTINUED) PROGRAM...

  17. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices... unescorted access to secure areas for a period of no longer than 7 consecutive calendar days if: (i) The... paragraph (d) of this section. (5) Deny or revoke a person's authorization to be on the facility if...

  18. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices... unescorted access to secure areas for a period of no longer than 7 consecutive calendar days if: (i) The... paragraph (d) of this section. (5) Deny or revoke a person's authorization to be on the facility if...

  19. 61 FR 25729 - Security Measures; Hellenikon International Airport, Athens, Greece

    Federal Register 2010, 2011, 2012, 2013, 2014

    1996-05-22

    ... Security Measures; Hellenikon International Airport, Athens, Greece Summary The Secretary of Transportation has now determined that Hellenikon International Airport, Athens, Greece, maintains and carries out... that Hellenikon International Airport, Athens, Greece, did not maintain and carry out...

  20. 33 CFR 106.262 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for newly-hired... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.262 Security measures for newly-hired employees....

  1. 33 CFR 106.262 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for newly-hired... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.262 Security measures for newly-hired employees....

  2. A Secure LFSR Based Random Measurement Matrix for Compressive Sensing

    NASA Astrophysics Data System (ADS)

    George, Sudhish N.; Pattathil, Deepthi P.

    2014-11-01

    In this paper, a novel approach for generating the secure measurement matrix for compressive sensing (CS) based on linear feedback shift register (LFSR) is presented. The basic idea is to select the different states of LFSR as the random entries of the measurement matrix and normalize these values to get independent and identically distributed (i.i.d.) random variables with zero mean and variance , where N is the number of input samples. The initial seed for the LFSR system act as the key to the user to provide security. Since the measurement matrix is generated from the LFSR system, and memory overload to store the measurement matrix is avoided in the proposed system. Moreover, the proposed system can provide security maintaining the robustness to noise of the CS system. The proposed system is validated through different block-based CS techniques of images. To enhance security, the different blocks of images are measured with different measurement matrices so that the proposed encryption system can withstand known plaintext attack. A modulo division circuit is used to reseed the LFSR system to generate multiple random measurement matrices, whereby after each fundamental period of LFSR, the feedback polynomial of the modulo circuit is modified in terms of a chaotic value. The proposed secure robust CS paradigm for images is subjected to several forms of attacks and is proven to be resistant against the same. From experimental analysis, it is proven that the proposed system provides better performance than its counterparts.

  3. Defining and Computing a Valued Based Cyber Security Measure

    SciTech Connect

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    In earlier works (Ben-Aissa et al. 2010; Abercrombie et al. 2008; Sheldon et al. 2009), we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  4. Measurable Control System Security through Ideal Driven Technical Metrics

    SciTech Connect

    Miles McQueen; Wayne Boyer; Sean McBride; Marie Farrar; Zachary Tudor

    2008-01-01

    The Department of Homeland Security National Cyber Security Division supported development of a small set of security ideals as a framework to establish measurable control systems security. Based on these ideals, a draft set of proposed technical metrics was developed to allow control systems owner-operators to track improvements or degradations in their individual control systems security posture. The technical metrics development effort included review and evaluation of over thirty metrics-related documents. On the bases of complexity, ambiguity, or misleading and distorting effects the metrics identified during the reviews were determined to be weaker than necessary to aid defense against the myriad threats posed by cyber-terrorism to human safety, as well as to economic prosperity. Using the results of our metrics review and the set of security ideals as a starting point for metrics development, we identified thirteen potential technical metrics - with at least one metric supporting each ideal. Two case study applications of the ideals and thirteen metrics to control systems were then performed to establish potential difficulties in applying both the ideals and the metrics. The case studies resulted in no changes to the ideals, and only a few deletions and refinements to the thirteen potential metrics. This led to a final proposed set of ten core technical metrics. To further validate the security ideals, the modifications made to the original thirteen potential metrics, and the final proposed set of ten core metrics, seven separate control systems security assessments performed over the past three years were reviewed for findings and recommended mitigations. These findings and mitigations were then mapped to the security ideals and metrics to assess gaps in their coverage. The mappings indicated that there are no gaps in the security ideals and that the ten core technical metrics provide significant coverage of standard security issues with 87% coverage. Based

  5. Low-Cost Security Measures for School Facilities

    ERIC Educational Resources Information Center

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    This paper discusses a variety of school safety and security measures that may be implemented at little or no cost and without the use of complex technology. Measures are presented according to these categories: (1) General; (2) Outside the Building; and (3) Inside the Building.

  6. 17 CFR 41.25 - Additional conditions for trading for security futures products.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... following provisions: (i) Trading of a security futures product based on a single security shall be halted... of a security futures product based on a narrow-based security index shall be halted at all times... percent or more of the market capitalization of the narrow-based security index. (3) Speculative...

  7. 17 CFR 41.25 - Additional conditions for trading for security futures products.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... following provisions: (i) Trading of a security futures product based on a single security shall be halted... of a security futures product based on a narrow-based security index shall be halted at all times... percent or more of the market capitalization of the narrow-based security index. (3) Speculative...

  8. 17 CFR 41.25 - Additional conditions for trading for security futures products.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... following provisions: (i) Trading of a security futures product based on a single security shall be halted... of a security futures product based on a narrow-based security index shall be halted at all times... percent or more of the market capitalization of the narrow-based security index. (3) Speculative...

  9. 17 CFR 41.25 - Additional conditions for trading for security futures products.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... following provisions: (i) Trading of a security futures product based on a single security shall be halted... of a security futures product based on a narrow-based security index shall be halted at all times... percent or more of the market capitalization of the narrow-based security index. (3) Speculative...

  10. Secure quantum weak oblivious transfer against individual measurements

    NASA Astrophysics Data System (ADS)

    He, Guang Ping

    2015-06-01

    In quantum weak oblivious transfer, Alice sends Bob two bits and Bob can learn one of the bits at his choice. It was found that the security of such a protocol is bounded by , where is the probability with which Alice can guess Bob's choice, and is the probability with which Bob can guess both of Alice's bits given that he learns one of the bits with certainty. Here we propose a protocol and show that as long as Alice is restricted to individual measurements, then both and can be made arbitrarily close to , so that maximal violation of the security bound can be reached. Even with some limited collective attacks, the security bound can still be violated. Therefore, although our protocol still cannot break the bound in principle when Alice has unlimited cheating power, it is sufficient for achieving secure quantum weak oblivious transfer in practice.

  11. Gamification for Measuring Cyber Security Situational Awareness

    SciTech Connect

    Fink, Glenn A.; Best, Daniel M.; Manz, David O.; Popovsky, V. M.; Endicott-Popovsky, Barbara E.

    2013-03-01

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge could lead to better preparation of cyber defenders in both military and civilian settings. This paper describes how one regional competition, the PRCCDC, a participant in the national CCDC program, conducted proof of concept experimentation to collect data during the annual competition for later analysis. The intent is to create an ongoing research agenda that expands on this current work and incorporates augmented cognition and gamification methods for measuring cybersecurity situational awareness under the stress of cyber attack.

  12. 33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Pt. 105, App. A Appendix A to Part 105—Facility Vulnerability and Security Measures Summary (Form CG-6025)...

  13. 17 CFR 41.25 - Additional conditions for trading for security futures products.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... provisions: (i) Trading of a security futures product based on a single security shall be halted at all times... futures product based on a narrow-based security index shall be halted at all times that a regulatory halt... market capitalization of the narrow-based security index. (3) Speculative position limits. The...

  14. Punishment in School: The Role of School Security Measures

    ERIC Educational Resources Information Center

    Mowen, Thomas J.

    2014-01-01

    Although investigation of school security measures and their relationships to various outcomes including school crime rates (Gottfredson, 2001), perpetuation of social inequality (Ferguson, 2001; Nolan, 2011; Welch & Payne, 2010), and the impact on childhood experiences has seen significant growth within the last 20 years (Newman, 2004;…

  15. Securing Biometric Templates Where Similarity Is Measured with Set Intersection

    NASA Astrophysics Data System (ADS)

    Socek, Daniel; Božović, Vladimir; Ćulibrk, Dubravko

    A novel scheme for securing biometric templates of variable size and order is proposed. The proposed scheme is based on a new similarity measure approach, namely the set intersection, which strongly resembles the methodology used in most of the current state-of-the-art biometrics matching systems. The applicability of the new scheme is compared with that of the existing principal schemes, and it is shown that the new scheme has definite advantages over the existing approaches. The proposed scheme is analyzed both in terms of security and performance.

  16. Unconditionally secure bit commitment by transmitting measurement outcomes.

    PubMed

    Kent, Adrian

    2012-09-28

    We propose a new unconditionally secure bit commitment scheme based on Minkowski causality and the properties of quantum information. The receiving party sends a number of randomly chosen Bennett-Brassard 1984 (BB84) qubits to the committer at a given point in space-time. The committer carries out measurements in one of the two BB84 bases, depending on the committed bit value, and transmits the outcomes securely at (or near) light speed in opposite directions to remote agents. These agents unveil the bit by returning the outcomes to adjacent agents of the receiver. The protocol's security relies only on simple properties of quantum information and the impossibility of superluminal signalling. PMID:23030073

  17. Securely Measuring the Overlap between Private Datasets with Cryptosets

    PubMed Central

    Swamidass, S. Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data—collected by different groups or across large collaborative networks—into a combined analysis. Unfortunately, some of the most interesting and powerful datasets—like health records, genetic data, and drug discovery data—cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset’s contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach “information-theoretic” security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure. PMID:25714898

  18. Securely measuring the overlap between private datasets with cryptosets.

    PubMed

    Swamidass, S Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data--collected by different groups or across large collaborative networks--into a combined analysis. Unfortunately, some of the most interesting and powerful datasets--like health records, genetic data, and drug discovery data--cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset's contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach "information-theoretic" security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure.

  19. Securely measuring the overlap between private datasets with cryptosets.

    PubMed

    Swamidass, S Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data--collected by different groups or across large collaborative networks--into a combined analysis. Unfortunately, some of the most interesting and powerful datasets--like health records, genetic data, and drug discovery data--cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset's contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach "information-theoretic" security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure. PMID:25714898

  20. 33 CFR 106.262 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.262 Security measures for newly-hired employees. (a... accordance with 49 CFR part 1572 by completing the full enrollment process, paying the user fee, and is...

  1. 33 CFR 106.262 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.262 Security measures for newly-hired employees. (a... accordance with 49 CFR part 1572 by completing the full enrollment process, paying the user fee, and is...

  2. [Planning a Health Residence for Prison Security Measures, Tuscany (Italy)].

    PubMed

    Porfido, Eugenio; Colombai, Renato; Scarpa, Franco; Totaro, Michele; Tani, Luca; Baldini, Claudio; Baggiani, Angelo

    2016-01-01

    Health Residences for Prison Security Measures are facilities hosting psychotic persons who have committed crimes and providing them with personalized rehabilitation and treatment plans to promote their reinstatement in society. The aim of this study was to describe the criteria for planning and designing a prison health residence in the Tuscany region (Italy), to be managed by the regional healthcare service, in line with current regulations, with dedicated staff for providing specific treatment plans and programmes. PMID:27510291

  3. Usefulness of additional measurements of the median nerve with ultrasonography.

    PubMed

    Claes, F; Meulstee, J; Claessen-Oude Luttikhuis, T T M; Huygen, P L M; Verhagen, W I M

    2010-12-01

    High resolution sonography is a relatively new diagnostic technique in diagnosing carpal tunnel syndrome (CTS). Normal values in different studies, however, vary and this makes their practical use difficult. The aim of this study was to establish normal values for the median nerve cross-sectional area (CSA) and to investigate the value of measuring additional parameters. Ninety-eight wrists of 29 women and 25 men without signs or symptoms of CTS were included. Width and circumference of the wrist were measured. The CSA of the median nerve at the level of the pisiform bone was measured using ultrasonography. We found a significant correlation between the CSA of the median nerve at the wrist and wrist circumference. Measuring wrist circumference will establish the upper level of normal more accurately compared to predictions solely based upon gender. This has important implications in diagnosing CTS with ultrasonography. PMID:20429021

  4. Additives

    NASA Technical Reports Server (NTRS)

    Smalheer, C. V.

    1973-01-01

    The chemistry of lubricant additives is discussed to show what the additives are chemically and what functions they perform in the lubrication of various kinds of equipment. Current theories regarding the mode of action of lubricant additives are presented. The additive groups discussed include the following: (1) detergents and dispersants, (2) corrosion inhibitors, (3) antioxidants, (4) viscosity index improvers, (5) pour point depressants, and (6) antifouling agents.

  5. The Strategic Measures for the Industrial Security of Small and Medium Business

    PubMed Central

    Lee, Chang-Moo

    2014-01-01

    The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures. PMID:24955414

  6. The strategic measures for the industrial security of small and medium business.

    PubMed

    Lee, Chang-Moo

    2014-01-01

    The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures. PMID:24955414

  7. The strategic measures for the industrial security of small and medium business.

    PubMed

    Lee, Chang-Moo

    2014-01-01

    The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures.

  8. 33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Facility Vulnerability and Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Pt. 105, App. A Appendix A to Part 105—Facility Vulnerability...

  9. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations

    ERIC Educational Resources Information Center

    Tanner-Smith, Emily E.; Fisher, Benjamin W.

    2015-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance,…

  10. [Unnecessary use of security measures and psychiatric hospitalisation].

    PubMed

    Hajdukiewicz, Danuta; Heitzman, Janusz

    2006-01-01

    The authors of this paper formulated an expertise opinion in answering the court on the former opinion of expert psychiatrists which concerned the psychic state and legibility, as well as the necessity of using security measures in the case of a woman who was considered non legible due to a delusional disorder, when she damaged the tyres in a car. The faults in the opinion stimulated the authors to present the results of the analysis formulated, with the idea that other experts will take more care when forming their expertise opinions. PMID:17068938

  11. Porosity Measurements and Analysis for Metal Additive Manufacturing Process Control.

    PubMed

    Slotwinski, John A; Garboczi, Edward J; Hebenstreit, Keith M

    2014-01-01

    Additive manufacturing techniques can produce complex, high-value metal parts, with potential applications as critical metal components such as those found in aerospace engines and as customized biomedical implants. Material porosity in these parts is undesirable for aerospace parts - since porosity could lead to premature failure - and desirable for some biomedical implants - since surface-breaking pores allows for better integration with biological tissue. Changes in a part's porosity during an additive manufacturing build may also be an indication of an undesired change in the build process. Here, we present efforts to develop an ultrasonic sensor for monitoring changes in the porosity in metal parts during fabrication on a metal powder bed fusion system. The development of well-characterized reference samples, measurements of the porosity of these samples with multiple techniques, and correlation of ultrasonic measurements with the degree of porosity are presented. A proposed sensor design, measurement strategy, and future experimental plans on a metal powder bed fusion system are also presented.

  12. Porosity Measurements and Analysis for Metal Additive Manufacturing Process Control.

    PubMed

    Slotwinski, John A; Garboczi, Edward J; Hebenstreit, Keith M

    2014-01-01

    Additive manufacturing techniques can produce complex, high-value metal parts, with potential applications as critical metal components such as those found in aerospace engines and as customized biomedical implants. Material porosity in these parts is undesirable for aerospace parts - since porosity could lead to premature failure - and desirable for some biomedical implants - since surface-breaking pores allows for better integration with biological tissue. Changes in a part's porosity during an additive manufacturing build may also be an indication of an undesired change in the build process. Here, we present efforts to develop an ultrasonic sensor for monitoring changes in the porosity in metal parts during fabrication on a metal powder bed fusion system. The development of well-characterized reference samples, measurements of the porosity of these samples with multiple techniques, and correlation of ultrasonic measurements with the degree of porosity are presented. A proposed sensor design, measurement strategy, and future experimental plans on a metal powder bed fusion system are also presented. PMID:26601041

  13. Modeling Errors in Daily Precipitation Measurements: Additive or Multiplicative?

    NASA Technical Reports Server (NTRS)

    Tian, Yudong; Huffman, George J.; Adler, Robert F.; Tang, Ling; Sapiano, Matthew; Maggioni, Viviana; Wu, Huan

    2013-01-01

    The definition and quantification of uncertainty depend on the error model used. For uncertainties in precipitation measurements, two types of error models have been widely adopted: the additive error model and the multiplicative error model. This leads to incompatible specifications of uncertainties and impedes intercomparison and application.In this letter, we assess the suitability of both models for satellite-based daily precipitation measurements in an effort to clarify the uncertainty representation. Three criteria were employed to evaluate the applicability of either model: (1) better separation of the systematic and random errors; (2) applicability to the large range of variability in daily precipitation; and (3) better predictive skills. It is found that the multiplicative error model is a much better choice under all three criteria. It extracted the systematic errors more cleanly, was more consistent with the large variability of precipitation measurements, and produced superior predictions of the error characteristics. The additive error model had several weaknesses, such as non constant variance resulting from systematic errors leaking into random errors, and the lack of prediction capability. Therefore, the multiplicative error model is a better choice.

  14. Porosity Measurements and Analysis for Metal Additive Manufacturing Process Control

    PubMed Central

    Slotwinski, John A; Garboczi, Edward J; Hebenstreit, Keith M

    2014-01-01

    Additive manufacturing techniques can produce complex, high-value metal parts, with potential applications as critical metal components such as those found in aerospace engines and as customized biomedical implants. Material porosity in these parts is undesirable for aerospace parts - since porosity could lead to premature failure - and desirable for some biomedical implants - since surface-breaking pores allows for better integration with biological tissue. Changes in a part’s porosity during an additive manufacturing build may also be an indication of an undesired change in the build process. Here, we present efforts to develop an ultrasonic sensor for monitoring changes in the porosity in metal parts during fabrication on a metal powder bed fusion system. The development of well-characterized reference samples, measurements of the porosity of these samples with multiple techniques, and correlation of ultrasonic measurements with the degree of porosity are presented. A proposed sensor design, measurement strategy, and future experimental plans on a metal powder bed fusion system are also presented. PMID:26601041

  15. 33 CFR 104.270 - Security measures for restricted areas.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... detection devices, which if used must activate an audible and/or visual alarm at a location that is... measures may include: (1) Restricting access to additional areas; and (2) Searching restricted areas...

  16. 33 CFR 104.270 - Security measures for restricted areas.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... detection devices, which if used must activate an audible and/or visual alarm at a location that is... measures may include: (1) Restricting access to additional areas; and (2) Searching restricted areas...

  17. CSER 79-028, Addendum 2: Security bar addition to pedestal storage racks in Room 3 in 2736-Z Building

    SciTech Connect

    Miller, E.M.

    1994-11-18

    The Plutonium Finishing Plant (PFP) is installing security bars on plutonium storage racks in Room 3 in 2736-Z Building to meet International Atomic Energy Agency (IAEA) material control requirements. Figures show the existing arrangement and design of the security bars. The security bars are to be fabricated of aluminum or carbon steel. The detailed fabrication sketches are reproduced in Appendix C. The security bars are to be installed close to the chains of plutonium so a determination of their effect on criticality safety needs to be made. The addition of security bars to the storage array of 2.5 kg plutonium buttons in Room 3 can effect reactivity by reflecting neutrons back into the plutonium in the storage cans, by absorbing neutrons, and by moderating neutrons between stored plutonium buttons. The small amount of metal added by the storage bars in comparison to the amount of concrete in the walls and aluminum in the shelf monitors already in place would not significantly increase the k{sub eff} of the storage array. Several computer calculations in previous analyses show that the security bars will have a negligible affect on reactivity.

  18. 78 FR 48218 - Emergency Order Establishing Additional Requirements for Attendance and Securement of Certain...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-07

    ... Terminal The Federal Railroad Administration (FRA) of the United States Department of Transportation (DOT... terminal are properly secured against unintended movement. FRA re-examined its regulations governing the... mainline track or mainline siding outside of a yard or terminal to ensure ] the safe transportation by...

  19. Cleaning and Cleanliness Measurement of Additive Manufactured Parts

    NASA Technical Reports Server (NTRS)

    Welker, Roger W.; Mitchell, Mark A.

    2015-01-01

    The successful acquisition and utilization of piece parts and assemblies for contamination sensitive applications requires application of cleanliness acceptance criteria. Contamination can be classified using many different schemes. One common scheme is classification as organic, ionic and particulate contaminants. These may be present in and on the surface of solid components and assemblies or may be dispersed in various gaseous or liquid media. This discussion will focus on insoluble particle contamination on the surface of piece parts and assemblies. Cleanliness of parts can be controlled using two strategies, referred to as gross cleanliness and precision cleanliness. Under a gross cleanliness strategy acceptance is based on visual cleanliness. This approach introduces a number of concerns that render it unsuitable for controlling cleanliness of high technology products. Under the precision cleanliness strategy, subjective, visual assessment of cleanliness is replaced by objective measurement of cleanliness. When a precision cleanliness strategy is adopted there naturally arises the question: How clean is clean enough? The six commonly used methods for establishing objective cleanliness acceptance limits will be discussed. Special emphasis shall focus on the use of multiple extraction, a technique that has been demonstrated for additively manufactured parts.

  20. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... seeking entry; (4) Using security personnel, automatic intrusion detection devices, surveillance equipment... of patrols or automatic intrusion detection devices; (2) Reducing the number of access points...

  1. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... seeking entry; (4) Using security personnel, automatic intrusion detection devices, surveillance equipment... of patrols or automatic intrusion detection devices; (2) Reducing the number of access points...

  2. Electronic Security Systems in Libraries: Measuring the Costs and Benefits.

    ERIC Educational Resources Information Center

    Vincent, Ida

    1978-01-01

    Discusses factors involved in costing and evaluating electronic security systems for libraries including equipment costs, installation and maintenance, labor costs, staff training, public relations, and comparison of systems. Assessing book losses and potential savings from a security system are also addressed. (RAO)

  3. Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities

    PubMed Central

    Yeo, Kiho; Lee, Keehyuck; Kim, Jong-Min; Kim, Tae-Hun; Choi, Yong-Hoon; Jeong, Woo-Jin; Hwang, Hee; Baek, Rong Min

    2012-01-01

    Objectives The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. Methods The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. Results From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. Conclusions This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another. PMID:22844648

  4. 78 FR 9769 - Bureau of International Security and Nonproliferation Imposition of Nonproliferation Measures on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-11

    ... of International Security and Nonproliferation Imposition of Nonproliferation Measures on Chinese and... persons have engaged in proliferation activities that warrant the imposition of measures pursuant to... foreign persons have engaged in proliferation activities that warrant the imposition of measures...

  5. Academic Consequences of Multiple Victimization and the Role of School Security Measures.

    PubMed

    Gardella, Joseph H; Tanner-Smith, Emily E; Fisher, Benjamin W

    2016-09-01

    Adolescents who experience multiple victimization (i.e., victimization on a regular basis) are at greater risk for having negative academic outcomes including lower achievement and poorer attendance than those who do not experience such victimization. Yet, the role of school contexts in this relationship remains unclear. Nevertheless, school-based efforts to reduce victimization often focus on altering contexts without sufficient evidence of associations with improved student outcomes. School security measures constitute one such suite of contextual interventions aimed at reducing victimization. This study tested a moderated mediation model in which the relationship between multiple victimization and academic performance is mediated by absenteeism, and the relationship between multiple victimization and absenteeism is moderated by the presence of school security measures. Participants were 5930 (49.6% female and 79.51% White) 12- to 18-year-old adolescents from a national sample collected through the 2011 School Crime Supplement to the National Crime Victimization Survey. Results of path analysis models indicated that the relationship between multiple victimization and academic performance was partially mediated by absenteeism, and that both metal detectors and security guards moderated the relationship between multiple victimization and absenteeism. Additional analyses revealed the utility of considering subpopulations of victims characterized by specific facets of their contexts. Implications for practitioners and researchers are discussed. PMID:27530261

  6. Academic Consequences of Multiple Victimization and the Role of School Security Measures.

    PubMed

    Gardella, Joseph H; Tanner-Smith, Emily E; Fisher, Benjamin W

    2016-09-01

    Adolescents who experience multiple victimization (i.e., victimization on a regular basis) are at greater risk for having negative academic outcomes including lower achievement and poorer attendance than those who do not experience such victimization. Yet, the role of school contexts in this relationship remains unclear. Nevertheless, school-based efforts to reduce victimization often focus on altering contexts without sufficient evidence of associations with improved student outcomes. School security measures constitute one such suite of contextual interventions aimed at reducing victimization. This study tested a moderated mediation model in which the relationship between multiple victimization and academic performance is mediated by absenteeism, and the relationship between multiple victimization and absenteeism is moderated by the presence of school security measures. Participants were 5930 (49.6% female and 79.51% White) 12- to 18-year-old adolescents from a national sample collected through the 2011 School Crime Supplement to the National Crime Victimization Survey. Results of path analysis models indicated that the relationship between multiple victimization and academic performance was partially mediated by absenteeism, and that both metal detectors and security guards moderated the relationship between multiple victimization and absenteeism. Additional analyses revealed the utility of considering subpopulations of victims characterized by specific facets of their contexts. Implications for practitioners and researchers are discussed.

  7. Simple Additivity of Stochastic Psychological Processes: Tests and Measures.

    ERIC Educational Resources Information Center

    Balakrishnan, J. D.

    1994-01-01

    Methods of testing relatively complete (distributional) models of internal psychological processes are described. It is shown that there is a sufficient condition for additive models to imply this property of the likelihood ratio. Also discussed are the examination of hazard rate functions of component processes and change in cumulative…

  8. Security camera resolution measurements: Horizontal TV lines versus modulation transfer function measurements.

    SciTech Connect

    Birch, Gabriel Carisle; Griffin, John Clark

    2015-01-01

    The horizontal television lines (HTVL) metric has been the primary quantity used by division 6000 related to camera resolution for high consequence security systems. This document shows HTVL measurements are fundamen- tally insufficient as a metric to determine camera resolution, and propose a quantitative, standards based methodology by measuring the camera system modulation transfer function (MTF), the most common and accepted metric of res- olution in the optical science community. Because HTVL calculations are easily misinterpreted or poorly defined, we present several scenarios in which HTVL is frequently reported, and discuss their problems. The MTF metric is discussed, and scenarios are presented with calculations showing the application of such a metric.

  9. What are we assessing when we measure food security? A compendium and review of current metrics.

    PubMed

    Jones, Andrew D; Ngure, Francis M; Pelto, Gretel; Young, Sera L

    2013-01-01

    The appropriate measurement of food security is critical for targeting food and economic aid; supporting early famine warning and global monitoring systems; evaluating nutrition, health, and development programs; and informing government policy across many sectors. This important work is complicated by the multiple approaches and tools for assessing food security. In response, we have prepared a compendium and review of food security assessment tools in which we review issues of terminology, measurement, and validation. We begin by describing the evolving definition of food security and use this discussion to frame a review of the current landscape of measurement tools available for assessing food security. We critically assess the purpose/s of these tools, the domains of food security assessed by each, the conceptualizations of food security that underpin each metric, as well as the approaches that have been used to validate these metrics. Specifically, we describe measurement tools that 1) provide national-level estimates of food security, 2) inform global monitoring and early warning systems, 3) assess household food access and acquisition, and 4) measure food consumption and utilization. After describing a number of outstanding measurement challenges that might be addressed in future research, we conclude by offering suggestions to guide the selection of appropriate food security metrics. PMID:24038241

  10. What are we assessing when we measure food security? A compendium and review of current metrics.

    PubMed

    Jones, Andrew D; Ngure, Francis M; Pelto, Gretel; Young, Sera L

    2013-09-01

    The appropriate measurement of food security is critical for targeting food and economic aid; supporting early famine warning and global monitoring systems; evaluating nutrition, health, and development programs; and informing government policy across many sectors. This important work is complicated by the multiple approaches and tools for assessing food security. In response, we have prepared a compendium and review of food security assessment tools in which we review issues of terminology, measurement, and validation. We begin by describing the evolving definition of food security and use this discussion to frame a review of the current landscape of measurement tools available for assessing food security. We critically assess the purpose/s of these tools, the domains of food security assessed by each, the conceptualizations of food security that underpin each metric, as well as the approaches that have been used to validate these metrics. Specifically, we describe measurement tools that 1) provide national-level estimates of food security, 2) inform global monitoring and early warning systems, 3) assess household food access and acquisition, and 4) measure food consumption and utilization. After describing a number of outstanding measurement challenges that might be addressed in future research, we conclude by offering suggestions to guide the selection of appropriate food security metrics.

  11. 33 CFR 105.270 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... vessel stores and bunkers. 105.270 Section 105.270 Navigation and Navigable Waters COAST GUARD... Requirements § 105.270 Security measures for delivery of vessel stores and bunkers. (a) General. The facility owner or operator must ensure that security measures relating to the delivery of vessel stores...

  12. 33 CFR 105.270 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... vessel stores and bunkers. 105.270 Section 105.270 Navigation and Navigable Waters COAST GUARD... Requirements § 105.270 Security measures for delivery of vessel stores and bunkers. (a) General. The facility owner or operator must ensure that security measures relating to the delivery of vessel stores...

  13. 33 CFR 104.280 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... vessel stores and bunkers. 104.280 Section 104.280 Navigation and Navigable Waters COAST GUARD... § 104.280 Security measures for delivery of vessel stores and bunkers. (a) General. The vessel owner or operator must ensure that security measures relating to the delivery of vessel stores and bunkers...

  14. 33 CFR 104.280 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... vessel stores and bunkers. 104.280 Section 104.280 Navigation and Navigable Waters COAST GUARD... § 104.280 Security measures for delivery of vessel stores and bunkers. (a) General. The vessel owner or operator must ensure that security measures relating to the delivery of vessel stores and bunkers...

  15. 33 CFR 104.280 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... vessel stores and bunkers. 104.280 Section 104.280 Navigation and Navigable Waters COAST GUARD... § 104.280 Security measures for delivery of vessel stores and bunkers. (a) General. The vessel owner or operator must ensure that security measures relating to the delivery of vessel stores and bunkers...

  16. 33 CFR 104.280 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... vessel stores and bunkers. 104.280 Section 104.280 Navigation and Navigable Waters COAST GUARD... § 104.280 Security measures for delivery of vessel stores and bunkers. (a) General. The vessel owner or operator must ensure that security measures relating to the delivery of vessel stores and bunkers...

  17. 33 CFR 104.280 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... vessel stores and bunkers. 104.280 Section 104.280 Navigation and Navigable Waters COAST GUARD... § 104.280 Security measures for delivery of vessel stores and bunkers. (a) General. The vessel owner or operator must ensure that security measures relating to the delivery of vessel stores and bunkers...

  18. Parental Involvement in School and the Role of School Security Measures

    ERIC Educational Resources Information Center

    Mowen, Thomas J.

    2015-01-01

    Over the past three decades, the United States has experienced a significant increase in the use of security measures in public and private secondary schools. Measures including police officers, metal detectors, and security cameras are becoming more common in the hallways of American schools. Following this surge, a number of academics have…

  19. Development of a food security measurement tool for New Zealand households.

    PubMed

    Parnell, Winsome R; Gray, Andrew R

    2014-10-28

    To determine the prevalence of household food insecurity in New Zealand (NZ), eight food security statements were included in the 1997 National Nutrition Survey of adults. Rasch model analysis was performed to determine whether each food security statement (addressing a food security attribute) was discrete and could be ranked on a unidimensional scale. The NZ model had marginal 'household' reliability (0·60-0·66), good item separation (17·20-17·77) and item infit/outfit values between 0·8 and 1·25. Indices could be ranked by level of severity and represent the experience of household food insecurity in NZ. Categories of food security were assigned and used to predict food choice, and energy and nutrient intakes. Compared with fully secure/almost fully secure households, those that were moderately secure or of low security were less likely to consume the recommended daily servings of fruit and vegetables, and more likely to consume fatty meats. Intake of total fat, saturated, monounsaturated and polyunsaturated fat, cholesterol, lactose and vitamin B12 increased with lower levels of food security. Intakes of glucose, fructose and vitamin C were highest in the fully secure/almost fully secure category. This unique eight-component food security measurement tool has less respondent burden than the US Core Food Security Measure. The relationships between the level of food insecurity and food choice and nutrient intakes illustrate that the most food-insecure households have less healthy diets. This relatively brief population-specific measurement tool is suitable to monitor population food security status, and is a useful marker of nutritional status.

  20. Additional studies for the spectrophotometric measurement of iodine in water

    NASA Technical Reports Server (NTRS)

    1972-01-01

    Previous work in iodine spectroscopy is briefly reviewed. Continued studies of the direct spectrophotometric determination of aqueous iodine complexed with potassium iodide show that free iodine is optimally determined at the isosbestic point for these solutions. The effects on iodine determinations of turbidity and chemical substances (in trace amounts) is discussed and illustrated. At the levels tested, iodine measurements are not significantly altered by such substances. A preliminary design for an on-line, automated iodine monitor with eventual capability of operating also as a controller was analyzed and developed in detail with respect single beam colorimeter operating at two wavelengths (using a rotating filter wheel). A flow-through sample cell allows the instrument to operate continuously, except for momentary stop flow when measurements are made. The timed automatic cycling of the system may be interrupted whenever desired, for manual operation. An analog output signal permits controlling an iodine generator.

  1. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  2. Security Problems of Scan Design and Accompanying Measures

    NASA Astrophysics Data System (ADS)

    Biasizzo, Anton; Novak, Franc

    2016-05-01

    The paper deals with the security problems of scan design and investigates currently proposed solutions. A solution based on data encryption to protect the data in scan chains is discussed and problems related to the block-based encoding are outlined. Next, security extension for IEEE Std. 1149.1 providing a locking mechanism is analysed. The mechanism prevents unauthorised users to interfere via test bus with the system normal operation. Possible attack scenario is considered and the probabilities of successful attack within a given time interval are calculated for different lengths of the Lock register. The paper concludes with the description of current work focused on improvements the security of the locking mechanism, in particular by using simplified public key infrastructure.

  3. 33 CFR 104.270 - Security measures for restricted areas.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) Navigation bridge, machinery spaces and other control stations; (2) Spaces containing security and...-conditioning systems and other similar spaces; (4) Spaces with access to potable water tanks, pumps, or manifolds; (5) Spaces containing dangerous goods or hazardous substances; (6) Spaces containing cargo...

  4. 33 CFR 104.270 - Security measures for restricted areas.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...) Navigation bridge, machinery spaces and other control stations; (2) Spaces containing security and...-conditioning systems and other similar spaces; (4) Spaces with access to potable water tanks, pumps, or manifolds; (5) Spaces containing dangerous goods or hazardous substances; (6) Spaces containing cargo...

  5. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... security and surveillance equipment and systems and their controls, and lighting system controls; and (3...) Telecommunications; (iii) Power distribution system; (iv) Access points for ventilation and air-conditioning systems... restricted areas, and enhancing the controls applied at the remaining accesses; (3) Further......

  6. 33 CFR 104.270 - Security measures for restricted areas.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... security and surveillance equipment and systems; and (6) Protect cargo and vessel stores from tampering. (b... surveillance equipment and systems and their controls and lighting system controls; (3) Ventilation and air-conditioning systems and other similar spaces; (4) Spaces with access to potable water tanks, pumps,...

  7. 33 CFR 105.275 - Security measures for monitoring.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., security guards, waterborne patrols, automatic intrusion-detection devices, or surveillance equipment, as... water; (2) Restricted areas within the facility; and (3) Vessels at the facility and areas surrounding the vessels. (b) MARSEC Level 1. At MARSEC Level 1, the facility owner or operator must ensure...

  8. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... the unauthorized introduction of dangerous substances and devices, including any device intended to... with the individual's claim of loss or theft. (3) If an individual cannot present his or her TWIC for... approved Facility Security Plan (FSP) the frequency of application of any access controls, particularly...

  9. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... the unauthorized introduction of dangerous substances and devices, including any device intended to... with the individual's claim of loss or theft. (3) If an individual cannot present his or her TWIC for... approved Facility Security Plan (FSP) the frequency of application of any access controls, particularly...

  10. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... TWIC; (ii) Verification that the TWIC has not expired; and (iii) A visual check of the various security... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets the... full or partial search of the OCS facility....

  11. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... has not expired; and (iii) A visual check of the various security features present on the card to... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... operations; (8) Evacuating the vessel; (9) Moving the vessel; or (10) Preparing for a full or partial...

  12. Cleaning and Cleanliness Measurement of Additive Manufactured Parts

    NASA Technical Reports Server (NTRS)

    Mitchell, Mark A.; Raley, Randy

    2016-01-01

    The successful acquisition and utilization of piece parts and assemblies for contamination sensitive applications requires application of cleanliness acceptance criteria. Contamination can be classified using many different schemes. One common scheme is classification as organic, ionic and particulate contaminants. These may be present in and on the surface of solid components and assemblies or may be dispersed in various gaseous or liquid media. This discussion will focus on insoluble particle contamination on the surfaces of piece parts and assemblies. Cleanliness of parts can be controlled using two strategies, referred to as gross cleanliness and precision cleanliness. Under a gross cleanliness strategy acceptance is based on visual cleanliness. This approach introduces a number of concerns that render it unsuitable for controlling cleanliness of high technology products. Under the precision cleanliness strategy, subjective, visual assessment of cleanliness is replaced by objective measurement of cleanliness. When a precision cleanliness strategy is adopted there naturally arises the question: How clean is clean enough? The methods for establishing objective cleanliness acceptance limits will be discussed.

  13. Examining School Security Measures as Moderators of the Association between Homophobic Victimization and School Avoidance

    ERIC Educational Resources Information Center

    Fisher, Benjamin W.; Tanner-Smith, Emily E.

    2015-01-01

    Homophobic victimization is a pervasive problem in U.S. schools that leads to negative outcomes for students. Those who experience homophobic victimization are at greater risk for avoiding particular spaces in school because they feel unsafe or afraid. Visible school security measures (e.g., security guards, metal detectors, and cameras) offer…

  14. Examining School Security Measures as Moderators of the Association between Homophobic Victimization and School Avoidance

    ERIC Educational Resources Information Center

    Fisher, Benjamin W.; Tanner-Smith, Emily E.

    2016-01-01

    Homophobic victimization is a pervasive problem in U.S. schools that leads to negative outcomes for students. Those who experience homophobic victimization are at greater risk for avoiding particular spaces in school because they feel unsafe or afraid. Visible school security measures (e.g., security guards, metal detectors, and cameras) offer…

  15. Food safety security: a new concept for enhancing food safety measures.

    PubMed

    Iyengar, Venkatesh; Elmadfa, Ibrahim

    2012-06-01

    The food safety security (FSS) concept is perceived as an early warning system for minimizing food safety (FS) breaches, and it functions in conjunction with existing FS measures. Essentially, the function of FS and FSS measures can be visualized in two parts: (i) the FS preventive measures as actions taken at the stem level, and (ii) the FSS interventions as actions taken at the root level, to enhance the impact of the implemented safety steps. In practice, along with FS, FSS also draws its support from (i) legislative directives and regulatory measures for enforcing verifiable, timely, and effective compliance; (ii) measurement systems in place for sustained quality assurance; and (iii) shared responsibility to ensure cohesion among all the stakeholders namely, policy makers, regulators, food producers, processors and distributors, and consumers. However, the functional framework of FSS differs from that of FS by way of: (i) retooling the vulnerable segments of the preventive features of existing FS measures; (ii) fine-tuning response systems to efficiently preempt the FS breaches; (iii) building a long-term nutrient and toxicant surveillance network based on validated measurement systems functioning in real time; (iv) focusing on crisp, clear, and correct communication that resonates among all the stakeholders; and (v) developing inter-disciplinary human resources to meet ever-increasing FS challenges. Important determinants of FSS include: (i) strengthening international dialogue for refining regulatory reforms and addressing emerging risks; (ii) developing innovative and strategic action points for intervention {in addition to Hazard Analysis and Critical Control Points (HACCP) procedures]; and (iii) introducing additional science-based tools such as metrology-based measurement systems.

  16. Development of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan

    NASA Astrophysics Data System (ADS)

    Kobayashi, Hideaki; Watanabe, Kenji; Watanabe, Takahito; Nagayasu, Yukinobu

    In recent years, the dilemma of cyber attacks by malicious third parties targeting security vulnerabilities in information and communication systems has emerged, resulting in security incidents. This situation suggests that the establishment of proactive efforts and recurrence prevention measures are becoming imperative, especially in critical infrastructure sectors.This paper provides an analysis of 58 security incident cases, which occurred in critical infrastructures worldwide and were published in media. The purpose of the analysis is to conclude to a valid list of recurrence prevention measures that constitute good practices.

  17. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation

    PubMed Central

    2016-01-01

    Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model—ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it’s recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes. PMID:27655001

  18. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations.

    PubMed

    Tanner-Smith, Emily E; Fisher, Benjamin W

    2016-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance, and postsecondary educational aspirations. The data for this study came from two large national surveys--the School Crime Supplement to the National Crime Victimization Survey (N = 38,707 students; 51% male, 77% White, MAge = 14.72) and the School Survey on Crime and Safety (N = 10,340 schools; average student composition of 50% male, 57% White). The results provided no evidence that visible security measures had consistent beneficial effects on adolescents' academic outcomes; some security utilization patterns had modest detrimental effects on adolescents' academic outcomes, particularly the heavy surveillance patterns observed in a small subset of high schools serving predominantly low socioeconomic students. The findings of this study provide no evidence that visible security measures have any sizeable effects on academic performance, attendance, or postsecondary aspirations among U.S. middle and high school students.

  19. Alternate measures of replacement rates for social security benefits and retirement income.

    PubMed

    Biggs, Andrew G; Springstead, Glenn R

    2008-01-01

    Discussions of retirement planning and Social Security policy often focus on replacement rates, which represent retirement income or Social Security benefits relative to preretirement earnings. Replacement rates are a rule of thumb designed to simplify the process of smoothing consumption over individuals' lifetimes. Despite their widespread use, however, there is no common means of measuring replacement rates. Various measures of preretirement earnings mean that the denominators used in replacement rate calculations are often inconsistent and can lead to confusion. Whether a given replacement rate represents an adequate retirement income depends on whether the denominator in the replacement rate calculation is an appropriate measure of preretirement earnings. This article illustrates replacement rates using four measures of preretirement earnings: final earnings; the constant income payable from the present value (PV) of lifetime earnings (PV payment); the wage-indexed average of all earnings prior to claiming Social Security benefits; and the inflation-adjusted average of all earnings prior to claiming Social Security benefits (consumer price index (CPI) average). The article then measures replacement rates against a sample of the Social Security beneficiary population using the Social Security Administration's Modeling Income in the Near Term (MINT) microsimulation model. Replacement rates are shown based on Social Security benefits alone, to indicate the adequacy of the current benefit structure, as well as on total retirement income including defined benefit pensions and financial assets, to indicate total preparedness for retirement. The results show that replacement rates can vary considerably based on the definition of preretirement earnings used and whether replacement rates are measured on an individual or a shared basis. For current new retirees, replacement rates based on all sources of retirement income seem strong by most measures and are projected to

  20. EPA-ORD MEASUREMENT SCIENCE SUPPORT FOR HOMELAND SECURITY

    EPA Science Inventory

    This presentation will describe the organization and the research and development activities of the ORD National Exposure Measurements Center and will focus on the Center's planned role in providing analytical method development, statistical sampling and design guidance, quality ...

  1. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... personnel identification at access points; and (iii) Lighting effects, such as glare, and their impact on...) Ensure that any automatic intrusion detection device, sets off an audible or visual alarm, or both, at a... visual identification of persons seeking access to the OCS facility. (c) MARSEC Level 2. In addition...

  2. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... personnel identification at access points; and (iii) Lighting effects, such as glare, and their impact on...) Ensure that any automatic intrusion detection device, sets off an audible or visual alarm, or both, at a... visual identification of persons seeking access to the OCS facility. (c) MARSEC Level 2. In addition...

  3. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... OCS facility access points and restricted areas; (2) Be able to conduct emergency searches of the OCS...) Ensure that any automatic intrusion detection device, sets off an audible or visual alarm, or both, at a... visual identification of persons seeking access to the OCS facility. (c) MARSEC Level 2. In addition...

  4. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... OCS facility access points and restricted areas; (2) Be able to conduct emergency searches of the OCS...) Ensure that any automatic intrusion detection device, sets off an audible or visual alarm, or both, at a... visual identification of persons seeking access to the OCS facility. (c) MARSEC Level 2. In addition...

  5. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... OCS facility access points and restricted areas; (2) Be able to conduct emergency searches of the OCS...) Ensure that any automatic intrusion detection device, sets off an audible or visual alarm, or both, at a... visual identification of persons seeking access to the OCS facility. (c) MARSEC Level 2. In addition...

  6. Measuring political commitment and opportunities to advance food and nutrition security: piloting a rapid assessment tool.

    PubMed

    Fox, Ashley M; Balarajan, Yarlini; Cheng, Chloe; Reich, Michael R

    2015-06-01

    Lack of political commitment has been identified as a primary reason for the low priority that food and nutrition interventions receive from national governments relative to the high disease burden caused by malnutrition. Researchers have identified a number of factors that contribute to food and nutrition's 'low-priority cycle' on national policy agendas, but few tools exist to rapidly measure political commitment and identify opportunities to advance food and nutrition on the policy agenda. This article presents a theory-based rapid assessment approach to gauging countries' level of political commitment to food and nutrition security and identifying opportunities to advance food and nutrition on the policy agenda. The rapid assessment tool was piloted among food and nutrition policymakers and planners in 10 low- and middle-income countries in April to June 2013. Food and nutrition commitment and policy opportunity scores were calculated for each country and strategies to advance food and nutrition on policy agendas were designed for each country. The article finds that, in a majority of countries, political leaders had verbally and symbolically committed to addressing food and nutrition, but adequate financial resources were not allocated to implement specific programmes. In addition, whereas the low cohesion of the policy community has been viewed a major underlying cause of the low-priority status of food and nutrition, the analysis finds that policy community cohesion and having a well thought-out policy alternative were present in most countries. This tool may be useful to policymakers and planners providing information that can be used to benchmark and/or evaluate advocacy efforts to advance reforms in the food and nutrition sector; furthermore, the results can help identify specific strategies that can be employed to move the food and nutrition agenda forward. This tool complements others that have been recently developed to measure national commitment to

  7. Measuring political commitment and opportunities to advance food and nutrition security: piloting a rapid assessment tool.

    PubMed

    Fox, Ashley M; Balarajan, Yarlini; Cheng, Chloe; Reich, Michael R

    2015-06-01

    Lack of political commitment has been identified as a primary reason for the low priority that food and nutrition interventions receive from national governments relative to the high disease burden caused by malnutrition. Researchers have identified a number of factors that contribute to food and nutrition's 'low-priority cycle' on national policy agendas, but few tools exist to rapidly measure political commitment and identify opportunities to advance food and nutrition on the policy agenda. This article presents a theory-based rapid assessment approach to gauging countries' level of political commitment to food and nutrition security and identifying opportunities to advance food and nutrition on the policy agenda. The rapid assessment tool was piloted among food and nutrition policymakers and planners in 10 low- and middle-income countries in April to June 2013. Food and nutrition commitment and policy opportunity scores were calculated for each country and strategies to advance food and nutrition on policy agendas were designed for each country. The article finds that, in a majority of countries, political leaders had verbally and symbolically committed to addressing food and nutrition, but adequate financial resources were not allocated to implement specific programmes. In addition, whereas the low cohesion of the policy community has been viewed a major underlying cause of the low-priority status of food and nutrition, the analysis finds that policy community cohesion and having a well thought-out policy alternative were present in most countries. This tool may be useful to policymakers and planners providing information that can be used to benchmark and/or evaluate advocacy efforts to advance reforms in the food and nutrition sector; furthermore, the results can help identify specific strategies that can be employed to move the food and nutrition agenda forward. This tool complements others that have been recently developed to measure national commitment to

  8. 31 CFR 1023.410 - Additional records to be made and retained by brokers or dealers in securities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... retained by brokers or dealers in securities. 1023.410 Section 1023.410 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Records Required To Be Maintained by Brokers or...

  9. 31 CFR 103.35 - Additional records to be made and retained by brokers or dealers in securities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... securities after June 30, 1972, and before October 1, 2003, by a person residing or doing business in the... such account is opened, secure and maintain a record of the taxpayer identification number of the... identification required within the 30-day period specified, it shall nevertheless not be deemed to be...

  10. 'Known Secure Sensor Measurements' for Critical Infrastructure Systems: Detecting Falsification of System State

    SciTech Connect

    Miles McQueen; Annarita Giani

    2011-09-01

    This paper describes a first investigation on a low cost and low false alarm, reliable mechanism for detecting manipulation of critical physical processes and falsification of system state. We call this novel mechanism Known Secure Sensor Measurements (KSSM). The method moves beyond analysis of network traffic and host based state information, in fact it uses physical measurements of the process being controlled to detect falsification of state. KSSM is intended to be incorporated into the design of new, resilient, cost effective critical infrastructure control systems. It can also be included in incremental upgrades of already in- stalled systems for enhanced resilience. KSSM is based on known secure physical measurements for assessing the likelihood of an attack and will demonstrate a practical approach to creating, transmitting, and using the known secure measurements for detection.

  11. An assessment of various household food security measures in Hawaiì has implications for national food security research and monitoring.

    PubMed

    Derrickson, J P; Fisher, A G; Anderson, J E; Brown, A C

    2001-03-01

    The Core Food Security Module (CFSM), the national food security monitoring tool, requires three affirmative responses to categorize households as food insecure. If this tool is unreliable or inaccurate, vulnerable segments of our population may be adversely affected. The objectives of the present study were to assess the credibility of applying the CFSM categorical measure to a population sample from Hawaiì and to assess the concurrent validity of the CFSM, the new face-valid measure and measures adapted from the Radimer/Cornell (RC) measure and Community Childhood Hunger Identification Project. The sample included 1469 respondents gathered through a statewide telephone sample and 144 food pantry recipients. Responses to the 18 CFSM questions were used to create all four measures. The credibility of the CFSM categorical measure was also assessed via comparisons with individual items and with the 1995 national modal CFSM response pattern. Categorical measures were compared across food security prevalence estimates and indices of income and vegetable intake and with the CFSM scale measure. Differences in the modal response pattern between samples affected CFSM categorization. Only 36% of households followed the Hawaiì modal response pattern, and categorization was not consistent with the content of key items. Although 85% of the households were classified as food secure by the CFSM, only 78% were classified as food secure with each of the other food security measures. Concurrent validity of all measures was confirmed. A reassessment of the national CFSM categorical measure appears warranted.

  12. ADAPTING FTIR MEASUREMENT TECHNOLOGY TO HOMELAND SECURITY APPLICATIONS

    EPA Science Inventory

    Open-path Fourier transform infrared (OP-FTIR) sensors have numerous advantages for measuring chemical plumes over wide areas compared to point detection sensors. Extractive FTIR sensors have been used for industrial stack monitoring and are attractive for building ventilation sy...

  13. 75 FR 28672 - Bureau of International Security and Nonproliferation; Lifting of Nonproliferation Measures...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-21

    ... January 8, 1999 (see 64 FR 2935). Dated: May 17, 2010. C.S. Eliot Kang, Acting Assistant Secretary of... of International Security and Nonproliferation; Lifting of Nonproliferation Measures Against Two... measures on two Russian entities. DATES: Effective Date: May 21, 2010. FOR FURTHER INFORMATION...

  14. Controlled quantum secure direct communication by entanglement distillation or generalized measurement

    NASA Astrophysics Data System (ADS)

    Tan, Xiaoqing; Zhang, Xiaoqian

    2016-05-01

    We propose two controlled quantum secure communication schemes by entanglement distillation or generalized measurement. The sender Alice, the receiver Bob and the controllers David and Cliff take part in the whole schemes. The supervisors David and Cliff can control the information transmitted from Alice to Bob by adjusting the local measurement angles θ _4 and θ _3. Bob can verify his secret information by classical one-way function after communication. The average amount of information is analyzed and compared for these two methods by MATLAB. The generalized measurement is a better scheme. Our schemes are secure against some well-known attacks because classical encryption and decoy states are used to ensure the security of the classical channel and the quantum channel.

  15. Household food security status measured by the US-Household Food Security/Hunger Survey Module (US-FSSM) is in line with coping strategy indicators found in urban and rural Indonesia.

    PubMed

    Usfar, Avita A; Fahmida, Umi; Februhartanty, Judhiastuty

    2007-01-01

    The food security assessment used by the United State's Food Security/Hunger Survey Module (US- FSSM) was used in five studies: these were in two urban and four rural areas in Indonesia between February 2004- August 2005. The number of households assessed was 3,704 and consisted of 45% urban and 55% rural. All households had children below five years. This paper aims to assess the applicability of US-FSSM for measuring household food-insecurity in Indonesia. Common coping-strategies discussed are to borrow money from the family, get an additional job, to lessen portion size of food, and to sell small assets. Although households in urban and rural areas were similar in size/number of children and male headed; the urban households were more income-secure, educated, and had better access to electrical appliances. A majority of the households was food-insecure (77% and 84% in urban and rural consecutively). More food-insecure households without and with hunger were found in rural areas. The number of affirmative responses to 17 out of 18 questions in the USFSSM was more in the rural households, showing less fortunate cases of food-insecurity. For a given coping strategy, as food-security status becomes more severe, the higher the percentage of households employing it. For a given food-security status, percentage of households was higher among lower-degree and less among higher-degree coping. Combining food-security and coping-strategy indicators may help to identify transient-food-secure households. Observing both indicators throughout different time of the year continuously may further identify adaptive mechanism by chronic-food-insecure households. Information on household food diversity could enrich findings on dietary intake modification, hence moving from food-security to nutrition-security.

  16. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... stores and industrial supplies. 106.270 Section 106.270 Navigation and Navigable Waters COAST GUARD... stores and industrial supplies. (a) General. The OCS facility owner or operator must ensure that security measures relating to the delivery of stores or industrial supplies to the OCS facility are implemented...

  17. Preventing School Bullying: Should Schools Prioritize an Authoritative School Discipline Approach over Security Measures?

    ERIC Educational Resources Information Center

    Gerlinger, Julie; Wo, James C.

    2016-01-01

    A common response to school violence features the use of security measures to deter serious and violent incidents. However, a second approach, based on school climate theory, suggests that schools exhibiting authoritative school discipline (i.e., high structure and support) might more effectively reduce school disorder. We tested these approaches…

  18. 33 CFR 105.270 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... vessel stores and bunkers. 105.270 Section 105.270 Navigation and Navigable Waters COAST GUARD... Requirements § 105.270 Security measures for delivery of vessel stores and bunkers. (a) General. The facility... bunkers are implemented to: (1) Check vessel stores for package integrity; (2) Prevent vessel stores...

  19. Situational Awareness as a Measure of Performance in Cyber Security Collaborative Work

    SciTech Connect

    Malviya, Ashish; Fink, Glenn A.; Sego, Landon H.; Endicott-Popovsky, Barbara E.

    2011-04-11

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge in turn could lead to better preparation of cyber defenders in both military and civilian settings. We conducted proof of concept experimentation to collect data during the Pacific-rim Regional Collegiate Cyber Defense Competition (PRCCDC) and analyzed it to study the behavior of cyber defenders. We propose that situational awareness predicts performance of cyber security professionals, and in this paper we focus on our collection and analysis of competition data to determine whether it supports our hypothesis. In addition to normal cyber data, we collected situational awareness and workload data and compared it against the performance of cyber defenders as indicated by their competition score. We conclude that there is a weak correlation between our measure of situational awareness and performance that we hope to exploit in further studies.

  20. Hilbertian sine as an absolute measure of Bayesian inference in ISR, homeland security, medicine, and defense

    NASA Astrophysics Data System (ADS)

    Jannson, Tomasz; Wang, Wenjian; Hodelin, Juan; Forrester, Thomas; Romanov, Volodymyr; Kostrzewski, Andrew

    2016-05-01

    In this paper, Bayesian Binary Sensing (BBS) is discussed as an effective tool for Bayesian Inference (BI) evaluation in interdisciplinary areas such as ISR (and, C3I), Homeland Security, QC, medicine, defense, and many others. In particular, Hilbertian Sine (HS) as an absolute measure of BI, is introduced, while avoiding relativity of decision threshold identification, as in the case of traditional measures of BI, related to false positives and false negatives.

  1. What Are We Assessing When We Measure Food Security? A Compendium and Review of Current Metrics12

    PubMed Central

    Jones, Andrew D.; Ngure, Francis M.; Pelto, Gretel; Young, Sera L.

    2013-01-01

    The appropriate measurement of food security is critical for targeting food and economic aid; supporting early famine warning and global monitoring systems; evaluating nutrition, health, and development programs; and informing government policy across many sectors. This important work is complicated by the multiple approaches and tools for assessing food security. In response, we have prepared a compendium and review of food security assessment tools in which we review issues of terminology, measurement, and validation. We begin by describing the evolving definition of food security and use this discussion to frame a review of the current landscape of measurement tools available for assessing food security. We critically assess the purpose/s of these tools, the domains of food security assessed by each, the conceptualizations of food security that underpin each metric, as well as the approaches that have been used to validate these metrics. Specifically, we describe measurement tools that 1) provide national-level estimates of food security, 2) inform global monitoring and early warning systems, 3) assess household food access and acquisition, and 4) measure food consumption and utilization. After describing a number of outstanding measurement challenges that might be addressed in future research, we conclude by offering suggestions to guide the selection of appropriate food security metrics. PMID:24038241

  2. Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems

    NASA Astrophysics Data System (ADS)

    Une, Masashi; Otsuka, Akira; Imai, Hideki

    This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.

  3. Measures for assessing architectural speech security (privacy) of closed offices and meeting rooms.

    PubMed

    Gover, Bradford N; Bradley, John S

    2004-12-01

    Objective measures were investigated as predictors of the speech security of closed offices and rooms. A new signal-to-noise type measure is shown to be a superior indicator for security than existing measures such as the Articulation Index, the Speech Intelligibility Index, the ratio of the loudness of speech to that of noise, and the A-weighted level difference of speech and noise. This new measure is a weighted sum of clipped one-third-octave-band signal-to-noise ratios; various weightings and clipping levels are explored. Listening tests had 19 subjects rate the audibility and intelligibility of 500 English sentences, filtered to simulate transmission through various wall constructions, and presented along with background noise. The results of the tests indicate that the new measure is highly correlated with sentence intelligibility scores and also with three security thresholds: the threshold of intelligibility (below which speech is unintelligible), the threshold of cadence (below which the cadence of speech is inaudible), and the threshold of audibility (below which speech is inaudible). The ratio of the loudness of speech to that of noise, and simple A-weighted level differences are both shown to be well correlated with these latter two thresholds (cadence and audibility), but not well correlated with intelligibility. PMID:15658699

  4. Calibration-free absolute frequency response measurement of directly modulated lasers based on additional modulation.

    PubMed

    Zhang, Shangjian; Zou, Xinhai; Wang, Heng; Zhang, Yali; Lu, Rongguo; Liu, Yong

    2015-10-15

    A calibration-free electrical method is proposed for measuring the absolute frequency response of directly modulated semiconductor lasers based on additional modulation. The method achieves the electrical domain measurement of the modulation index of directly modulated lasers without the need for correcting the responsivity fluctuation in the photodetection. Moreover, it doubles measuring frequency range by setting a specific frequency relationship between the direct and additional modulation. Both the absolute and relative frequency response of semiconductor lasers are experimentally measured from the electrical spectrum of the twice-modulated optical signal, and the measured results are compared to those obtained with conventional methods to check the consistency. The proposed method provides calibration-free and accurate measurement for high-speed semiconductor lasers with high-resolution electrical spectrum analysis.

  5. Measuring food and nutrition security: tools and considerations for use among people living with HIV.

    PubMed

    Fielden, Sarah J; Anema, Aranka; Fergusson, Pamela; Muldoon, Katherine; Grede, Nils; de Pee, Saskia

    2014-10-01

    As an increasing number of countries implement integrated food and nutrition security (FNS) and HIV programs, global stakeholders need clarity on how to best measure FNS at the individual and household level. This paper reviews prominent FNS measurement tools, and describes considerations for interpretation in the context of HIV. There exist a range of FNS measurement tools and many have been adapted for use in HIV-endemic settings. Considerations in selecting appropriate tools include sub-types (food sufficiency, dietary diversity and food safety); scope/level of application; and available resources. Tools need to reflect both the needs of PLHIV and affected households and FNS program objectives. Generalized food sufficiency and dietary diversity tools may provide adequate measures of FNS in PLHIV for programmatic applications. Food consumption measurement tools provide further data for clinical or research applications. Measurement of food safety is an important, but underdeveloped aspect of assessment, especially for PLHIV.

  6. Analysis of occupational accidents: prevention through the use of additional technical safety measures for machinery

    PubMed Central

    Dźwiarek, Marek; Latała, Agata

    2016-01-01

    This article presents an analysis of results of 1035 serious and 341 minor accidents recorded by Poland's National Labour Inspectorate (PIP) in 2005–2011, in view of their prevention by means of additional safety measures applied by machinery users. Since the analysis aimed at formulating principles for the application of technical safety measures, the analysed accidents should bear additional attributes: the type of machine operation, technical safety measures and the type of events causing injuries. The analysis proved that the executed tasks and injury-causing events were closely connected and there was a relation between casualty events and technical safety measures. In the case of tasks consisting of manual feeding and collecting materials, the injuries usually occur because of the rotating motion of tools or crushing due to a closing motion. Numerous accidents also happened in the course of supporting actions, like removing pollutants, correcting material position, cleaning, etc. PMID:26652689

  7. Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements

    SciTech Connect

    Ondrej Linda; Milos Manic; Miles McQueen

    2012-09-01

    Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

  8. Generic System for Remote Testing and Calibration of Measuring Instruments: Security Architecture

    NASA Astrophysics Data System (ADS)

    Jurčević, M.; Hegeduš, H.; Golub, M.

    2010-01-01

    Testing and calibration of laboratory instruments and reference standards is a routine activity and is a resource and time consuming process. Since many of the modern instruments include some communication interfaces, it is possible to create a remote calibration system. This approach addresses a wide range of possible applications and permits to drive a number of different devices. On the other hand, remote calibration process involves a number of security issues due to recommendations specified in standard ISO/IEC 17025, since it is not under total control of the calibration laboratory personnel who will sign the calibration certificate. This approach implies that the traceability and integrity of the calibration process directly depends on the collected measurement data. The reliable and secure remote control and monitoring of instruments is a crucial aspect of internet-enabled calibration procedure.

  9. Controlling Crime and Delinquency in the Schools: An Exploratory Study of Student Perceptions of School Security Measures

    ERIC Educational Resources Information Center

    Brown, Ben

    2005-01-01

    This paper provides an analysis of data on school security measures which were obtained from a survey administered to a sample of 230 high school students. The majority of students indicated that the school police officers and security officers help keep the schools safe and that the drug-sniffing dogs help reduce drugs in the schools, but there…

  10. 40 CFR 52.1163 - Additional control measures for East Boston.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 4 2013-07-01 2013-07-01 false Additional control measures for East Boston. 52.1163 Section 52.1163 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... spaces at Logan Airport and increased parking charges at remaining spaces; (5) Construction of...

  11. Study raises questions about measurement of 'additionality,'or maintaining domestic health spending amid foreign donations.

    PubMed

    Garg, Charu C; Evans, David B; Dmytraczenko, Tania; Izazola-Licea, José-Antonio; Tangcharoensathien, Viroj; Ejeder, Tessa Tan-Torres

    2012-02-01

    Donor nations and philanthropic organizations increasingly require that funds provided for a specific health priority such as HIV should supplement domestic spending on that priority-a concept known as "additionality." We investigated the "additionality" concept using data from Honduras, Rwanda, and Thailand, and we found that the three countries increased funding for HIV in response to increased donor funding. In contrast, the study revealed that donors, faced with increased Global Fund resources for HIV in certain countries, tended to decrease their funding for HIV or shift funds for use in non-HIV health areas. More broadly, we found many problems in the measurement and interpretation of additionality. These findings suggest that it would be preferable for donors and countries to agree on how best to use available domestic and external funds to improve population health, and to develop better means of tracking outcomes, than to try to develop more sophisticated methods to track additionality.

  12. Methods of Measuring Vapor Pressures of Lubricants With Their Additives Using TGA and/or Microbalances

    NASA Technical Reports Server (NTRS)

    Scialdone, John J.; Miller, Michael K.; Montoya, Alex F.

    1996-01-01

    The life of a space system may be critically dependent on the lubrication of some of its moving parts. The vapor pressure, the quantity of the available lubricant, the temperature and the exhaust venting conductance passage are important considerations in the selection and application of a lubricant. In addition, the oil additives employed to provide certain properties of low friction, surface tension, antioxidant and load bearing characteristics, are also very important and need to be known with regard to their amounts and vapor pressures. This paper reports on the measurements and analyses carried out to obtain those parameters for two often employed lubricants, the Apiezon(TM)-C and the Krytox(TM) AB. The measurements were made employing an electronic microbalance and a thermogravimetric analyzer (TGA) modified to operate in a vacuum. The results have been compared to other data on these oils when available. The identification of the mass fractions of the additives in the oil and their vapor pressures as a function of the temperature were carried out. These may be used to estimate the lubricant life given its quantity and the system vent exhaust conductance. It was found that the Apiezon(TM)-C has three main components with different rates of evaporation while the Krytox(TM) did not indicate any measurable additive.

  13. Improvement in topology measurement accuracy of atomic force microscope using additional sensor

    NASA Astrophysics Data System (ADS)

    Yoon, Yeomin; Jeong, Jiseong; Kim, Junsup; Park, Kyihwan

    2015-07-01

    The topology image of an atomic force microscope is obtained by picking up a controlled output of a force-feedback loop that is proportional to the height of a sample under the assumption that no dynamics in a z-axis actuator exist. However, the dynamic effects such as hysteresis and creep in a PZT driving z-axis actuator cannot be ignored. To solve this problem, a strain-gage sensor is used as an additional sensor, which enables measurement of the absolute displacement of a z-axis PZT nano scanner. The advantage of using an additional sensor is experimentally provided and validated in topology images.

  14. A new approach to handle additive and multiplicative uncertainties in the measurement for ? LPV filtering

    NASA Astrophysics Data System (ADS)

    Lacerda, Márcio J.; Tognetti, Eduardo S.; Oliveira, Ricardo C. L. F.; Peres, Pedro L. D.

    2016-04-01

    This paper presents a general framework to cope with full-order ? linear parameter-varying (LPV) filter design subject to inexactly measured parameters. The main novelty is the ability of handling additive and multiplicative uncertainties in the measurements, for both continuous and discrete-time LPV systems, in a unified approach. By conveniently modelling scheduling parameters and uncertainties affecting the measurements, the ? filter design problem can be expressed in terms of robust matrix inequalities that become linear when two scalar parameters are fixed. Therefore, the proposed conditions can be efficiently solved through linear matrix inequality relaxations based on polynomial solutions. Numerical examples are presented to illustrate the improved efficiency of the proposed approach when compared to other methods and, more important, its capability to deal with scenarios where the available strategies in the literature cannot be used.

  15. Measurement of powder bed density in powder bed fusion additive manufacturing processes

    NASA Astrophysics Data System (ADS)

    Jacob, G.; Donmez, A.; Slotwinski, J.; Moylan, S.

    2016-11-01

    Many factors influence the performance of additive manufacturing (AM) processes, resulting in a high degree of variation in process outcomes. Therefore, quantifying these factors and their correlations to process outcomes are important challenges to overcome to enable widespread adoption of emerging AM technologies. In the powder bed fusion AM process, the density of the powder layers in the powder bed is a key influencing factor. This paper introduces a method to determine the powder bed density (PBD) during the powder bed fusion (PBF) process. A complete uncertainty analysis associated with the measurement method was also described. The resulting expanded measurement uncertainty, U PBD (k  =  2), was determined as 0.004 g · cm‑3. It was shown that this expanded measurement uncertainty is about three orders of magnitude smaller than the typical powder bed density. This method enables establishing correlations between the changes in PBD and the direction of motion of the powder recoating arm.

  16. Field Measurements and Guidelines for the Application of Wireless Sensor Networks to the Environment and Security

    PubMed Central

    Gil Jiménez, Víctor P.; Armada, Ana García

    2009-01-01

    Frequently, Wireless Sensor Networks (WSN) are designed focusing on applications and omitting transmission problems in these wireless networks. In this paper, we present a measurement campaign that has been carried out using one of the most commonly used WSN platforms, the micaZ from Crossbow©. Based on these measurements, some guidelines to deploy a robust and reliable WSN are provided. The results are focused on security and environmental applications but can also be extrapolated to other scenarios. A main conclusion that can be extracted is that, from the transmission point of view, a dense WSN is one of the best choices to overcome many of the transmission problems such as the existence of a transitional region, redundance, forwarding, obstructions or interference with other systems. PMID:22303175

  17. Update on NRF Measurements on ^237Np for National Security and Safeguards Applications

    NASA Astrophysics Data System (ADS)

    Angell, C. T.; Joshi, T.; Yee, R.; Swanberg, E.; Norman, E. B.; Kulp, W. D.; Warren, G.; Hicks, C. L., Jr.; Korbly, S.; Klimenko, A.; Wilson, C.; Bray, T. H.; Copping, R.; Shuh, D. K.

    2010-11-01

    Nuclear resonance fluorescence (NRF) uses γ rays to excite nuclear levels and measure their properties. This provides a unique isotopic signature, and can be used to identify and assay material. This is particularly important for applications that detect the smuggling of nuclear material or the diversion of fissile material for covert weapon programs, both of which present grave risks to world security. ^237Np presents significant safeguard challenges; it is fissile yet currently has fewer safeguard restrictions potentially making it an attractive material for covert weapon programs. This talk will present the final results of two measurements of NRF on ^237Np using a bremsstrahlung photon source. 15 NRF states have been identified between 1.5 and 2.5 MeV excitation energy.

  18. Balance times of multidimensional quasi-additive potentials for a measure-preserving semiflow

    NASA Astrophysics Data System (ADS)

    Dai, Xiongping

    2013-12-01

    Let \\theta\\colon X\\times{T}\\rightarrow X;\\ (x,t)\\mapsto{x{\\boldsymbol\\cdot} t} , where {T}={Z}_+ or {R}_+ , be a measure-preserving semiflow on a probability space (X,\\mathscr{F},\\mu) and given a d-dimensional measurable potential p\\colon X\\times{T}\\rightarrow{R}^d which is δ-quasi-additive with respect to θ, where δ ⩾ 0 namely, for μ-a.e. x ∈ X and for all s,t\\in{T} , \\begin{equation*}|p(x,t+s)-(p(x,t)+p(x{\\boldsymbol\\cdot} t,s))|\\le\\delta. \\end{equation*} We prove that if there exists a measurable {R}^d -valued function p*(x) such that \\begin{equation*}\\lim_{t\\to\\infty}\\frac{1}{t}p(x,t)=p^*(x)\\tqs for~\\mu-a.e.\\, x\\in X, \\end{equation*} then for μ-a.e. x ∈ X and any ε > 0, there holds the following tight control by p*(x): \\begin{equation*}{\\bf mes}\\left\\{t\\in{T}\\colon|p(x,t)-p^*(x)t|\\le\\varepsilon+ \\delta\\right\\}=\\infty, \\end{equation*} where mes{·} stands for the Lebesgue measure in the real line {R} or the counting measure in {Z} . This can be applied to the study of ergodic forced monotonic circle maps and of the normal numbers.

  19. A multiple additive regression tree analysis of three exposure measures during Hurricane Katrina.

    PubMed

    Curtis, Andrew; Li, Bin; Marx, Brian D; Mills, Jacqueline W; Pine, John

    2011-01-01

    This paper analyses structural and personal exposure to Hurricane Katrina. Structural exposure is measured by flood height and building damage; personal exposure is measured by the locations of 911 calls made during the response. Using these variables, this paper characterises the geography of exposure and also demonstrates the utility of a robust analytical approach in understanding health-related challenges to disadvantaged populations during recovery. Analysis is conducted using a contemporary statistical approach, a multiple additive regression tree (MART), which displays considerable improvement over traditional regression analysis. By using MART, the percentage of improvement in R-squares over standard multiple linear regression ranges from about 62 to more than 100 per cent. The most revealing finding is the modelled verification that African Americans experienced disproportionate exposure in both structural and personal contexts. Given the impact of exposure to health outcomes, this finding has implications for understanding the long-term health challenges facing this population.

  20. Simulation and measurement of optical aberrations of injection molded progressive addition lenses.

    PubMed

    Li, Likai; Raasch, Thomas W; Yi, Allen Y

    2013-08-20

    Injection molding is an important mass-production tool in the optical industry. In this research our aim is to develop a process of combining ultraprecision diamond turning and injection molding to create a unique low-cost manufacturing process for progressive addition lenses (PALs). In industry, it is a well-known fact that refractive index variation and geometric deformation of injection molded lenses due to the rheological properties of polymers will distort their optical performance. To address this problem, we developed a method for determining the optical aberrations of the injection molded PALs. This method involves reconstructing the wavefront pattern in the presence of uneven refractive index distribution and surface warpage using a finite element method. In addition to numerical modeling, a measurement system based on a Shack-Hartmann wavefront sensor was used to verify the modeling results. The measured spherocylindrical powers and aberrations of the PALs were in good agreement with the model. Consequently, the optical aberrations of injection molded PALs were successfully predicted by finite element modeling. In summary, it was demonstrated in this study that numerically based optimization for PAL manufacturing is feasible. PMID:24085007

  1. The Role of Earnings and Financial Risk in Distributional Analyses of Social Security Reform Measures

    ERIC Educational Resources Information Center

    Hungerford, Thomas L.

    2006-01-01

    The Social Security Trustees project that the Social Security program faces longterm financing difficulties. Several proposals that have been offered to shore-up the finances of the Social Security program would create individual retirement accounts funded with part of the payroll tax. The authors of many of these proposals claim that future…

  2. Better Safe than Sorry: Panic Buttons as a Security Measure in an Academic Medical Library

    ERIC Educational Resources Information Center

    McMullen, Karen D.; Kane, Laura Townsend

    2008-01-01

    In the wake of recent tragedies, campus security has become a hot issue nationwide. Campus libraries, as traditional meeting spots for varied groups of people, are particularly vulnerable to security issues. Safety and security problems that can occur at any library generally include theft, vandalism, arson, antisocial behavior, and assaults on…

  3. Continuous field measurement of N2O isotopologues using FTIR spectroscopy following 15N addition

    NASA Astrophysics Data System (ADS)

    Phillips, R. L.; Griffith, D. W.; Dijkstra, F. A.; Lugg, G.; Lawrie, R.; Macdonald, B.

    2012-12-01

    Anthropogenic additions of fertilizer nitrogen (N) have significantly increased the mole fraction of nitrous oxide (N2O) in the troposphere. Tracking the fate of fertilizer N and its transformation to N2O is important to advance knowledge of greenhouse gas emissions from soils. Transport and transformations are frequently studied using 15N labeling experiments, but instruments capable of continuous measurements of 15N-N2O at the surface of soil have only recently come to the fore. Our primary aim was to quantify emissions of N2O and the fraction of 15N emitted as N2O from an agricultural soil following 15N addition using a mobile Fourier Transform Infrared (FTIR) spectrometer. We set up a short-term field experiment on a coastal floodplain site near Nowra, New South Wales. We deployed an automated chamber system connected to a multi-pass cell (optical pathlength 24 m) and low resolution FTIR spectrometer to measure fluxes of all N2O isotopologues collected from five 0.25 m2 chambers every three hours. We measured N2O fluxes pre and post-application of 15N-labeled substrate as potassium nitrate (KNO3) or urea [CO(NH2)2] to the soil surface. Root mean square uncertainties for all isotopologue measurements were less than 0.3 nmol mol-1 for 1 minute average concentration measurements, and minimum detectable fluxes for each isotopologue were <0.1 ng N m-2 s-1. Emissions of all N2O isotopologues were evident immediately following 15N addition. Emissions of 14N15NO, 15N14NO and 15N15NO isotopologues subsided within 10 d, but 14N14NO fluxes were evident over the entire experiment. The figure provides an overview of the emissions. Cumulative 15N-N2O fluxes (sum of the three 15N isotopologues) per chamber for the 14 days following 15N addition ranged from 1.5 to 10.3 mg 15N-N2O m-2. The chambers were destructively sampled after 2 weeks and 15N analyzed in soil and plant material using isotope ratio mass spectrometry. Approximately 1% (range 0.7 - 1.9%) of the total amount of

  4. Additional Measurements and Analyses of H217O and H218O

    NASA Astrophysics Data System (ADS)

    Pearson, John; Yu, Shanshan; Walters, Adam; Daly, Adam M.

    2015-06-01

    Historically the analysis of the spectrum of water has been a balance between the quality of the data set and the applicability of the Hamiltonian to a highly non-rigid molecule. Recently, a number of different non-rigid analysis approaches have successfully been applied to 16O water resulting in a self-consistent set of transitions and energy levels to high J which allowed the spectrum to be modeled to experimental precision. The data set for 17O and 18O water was previously reviewed and many of the problematic measurements identified, but Hamiltonian modeling of the remaining data resulted in significantly poorer quality fits than that for the 16O parent. As a result, we have made additional microwave measurements and modeled the existing 17O and 18O data sets with an Euler series model. This effort has illuminated a number of additional problematic measurements in the previous data sets and has resulted in analyses of 17O and 18O water that are of similar quality to the 16O analysis. We report the new lines, the analyses and make recommendations on the quality of the experimental data sets. SS. Yu, J.C. Pearson, B.J. Drouin et al. J. Mol. Spectrosc. 279,~16-25 (2012) J. Tennyson, P.F. Bernath, L.R. Brown et al. J. Quant. Spectrosc. Rad. Trans. 117, 29-58 (2013) J. Tennyson, P.F. Bernath, L.R. Brown et al. J. Quant. Spectrosc. Rad. Trans. 110, 573-596 (2009) H.M. Pickett, J.C. Pearson, C.E. Miller J. Mol. Spectrosc. 233, 174-179 (2005)

  5. Time-Resolved In Situ Measurements During Rapid Alloy Solidification: Experimental Insight for Additive Manufacturing

    DOE PAGES

    McKeown, Joseph T.; Zweiacker, Kai; Liu, Can; Coughlin, Daniel R.; Clarke, Amy J.; Baldwin, J. Kevin; Gibbs, John W.; Roehling, John D.; Imhoff, Seth D.; Gibbs, Paul J.; et al

    2016-01-27

    In research and industrial environments, additive manufacturing (AM) of metals and alloys is becoming a pervasive technology, though significant challenges remain before widespread implementation of AM can be realized. In situ investigations of rapid alloy solidification with high spatial and temporal resolutions can provide unique experimental insight into microstructure evolution and kinetics that are relevant for AM processing. Hypoeutectic thin-film Al–Cu and Al–Si alloys were investigated using dynamic transmission electron microscopy to monitor pulsed-laser-induced rapid solidification across microsecond timescales. Solid–liquid interface velocities measured from time-resolved images revealed accelerating solidification fronts in both alloys. We observed microstructure evolution, solidification product, andmore » presence of a morphological instability at the solid–liquid interface in the Al–4 at.%Cu alloy are related to the measured interface velocities and small differences in composition that affect the thermophysical properties of the alloys. These time-resolved in situ measurements can inform and validate predictive modeling efforts for AM.« less

  6. Longitudinal and transversal bioimpedance measurements in addition to diagnosis of heart failure

    NASA Astrophysics Data System (ADS)

    Ribas, N.; Nescolarde, L.; Domingo, M.; Gastelurrutia, P.; Bayés-Genis, A.; Rosell-Ferrer, J.

    2010-04-01

    Heart Failure (HF) is a clinical syndrome characterised by signs of systemic and pulmonary fluid retention, shortness of breath and/or fatigue. There is a lack of reliable indicators of disease state. Benefits and applicability of non-invasive bioimpedance measurement in the hydration state of soft tissues have been validated, fundamentally, in dialysis patients. Four impedance configurations (2 longitudinal and 2 transversal) were analyzed in 48 HF patients (M=28, F=20) classified according to a clinical disease severity score (CDSS) derived from the Framingham criteria: CDSS<=2 (G1: M = 23, F = 14) and CDSS>2 (G2: M = 5, F = 6). The aim of this study is to analyze longitudinal and transversal bioimpedance measurement at 50 kHz, in addition to clinical diagnosis parameters of heart failure, including: clinical disease severity score (CDSS) and a biomarker concentrations (NT-proBNP). The Kolmogorov-Smirnov test was used for the normality test of all variables. The CDSS, NTproBNP and impedance parameters between groups (G1 and G2) were compared by mean of Mann Withney U-test. The statistical significance was considered with P < 0.05. Whole-body impedance measured was analyzed using RXc graph.

  7. Improvement of ocean loading correction on gravity data with additional tide gauge measurements

    NASA Astrophysics Data System (ADS)

    Neumeyer, Juergen; del Pino, Jorge; Dierks, Olaf; Sun, He-Ping; Pflug, Hartmut

    2005-08-01

    Because a gravimeter records the sum of all gravity variations associated with mass redistribution in its near and far surrounding the investigation of a single special gravity effect (e.g. Earth tides or core modes) requires the reduction of all other effects from the data. In our study, we are dealing with the ocean loading effect. High-precision tidal gravity and atmospheric pressure observations are carried out at the station Rio Carpintero in combination with tide gauge measurements at the coast of Santiago de Cuba. The gravity data are subjected to atmospheric pressure and ocean loading corrections with different oceanic tidal models. In order to test the efficiency of the different ocean loading corrections the gravity data are analysed for various tidal waves and the determined Earth tide parameters are compared with model parameters. Additionally, tide gauge measurements are analysed and used for improving the ocean loading correction on gravity data. The results show that present-day global oceanic tidal models, e.g. NAO99b and FES2002 in combination with the ocean loading calculation program (LOAD97), are not sufficient for a complete correction of this effect. With our approach, the discrepancies between the observed Earth tide parameters and those from theoretical prediction for main waves in diurnal and semidiurnal tidal bands are further reduced when taking into account the tide gauge data recorded offshore. After additional removal of oceanic signals, based on the tide gauge data, the analysed Earth tide parameters are closer to the Wahr-Dehant model. The improvement is up to 4% and the noise is reduced from 20 nm/s 2 to 10 nm/s 2 within the examined period range of 10-1500 min. Therefore, high-precision gravity measurements (e.g. with Superconducting Gravimeters), especially for stations near the coastal lines, should take into account tide gauge measurements for the ocean loading correction. With improved ocean loading correction and reduced noise

  8. Development of ligase-assisted spacer addition for the measurement of microsatellites.

    PubMed

    Brockhurst, V; Barnard, R; Wolter, L; Giffard, P; Timms, P

    2001-07-01

    Conventional methods for detecting differences in microsatellite repeat lengths rely on electrophoretic fractionation on long denaturing polyacrylamide gels, a time-consuming and labor-intensive method. Therefore, there is a need for the development of new and rapid approaches to routinely detect such length polymorphisms. The advent of techniques allowing the coupling of DNA molecules to solid surfaces has provided new prospects in the area of mutation detection. We describe here the development and optimization of the ligase-assisted spacer addition (LASA) method, a novel and rapid procedure based on an ELISA format to measure microsatellite repeat lengths. The LASA assay was successfully applied to a set of 11 bird samples to assess its capabilities as a genotyping method. PMID:11464526

  9. Non-additivity of molecule-surface van der Waals potentials from force measurements

    PubMed Central

    Wagner, Christian; Fournier, Norman; Ruiz, Victor G.; Li, Chen; Müllen, Klaus; Rohlfing, Michael; Tkatchenko, Alexandre; Temirov, Ruslan; Tautz, F. Stefan

    2014-01-01

    Van der Waals (vdW) forces act ubiquitously in condensed matter. Despite being weak on an atomic level, they substantially influence molecular and biological systems due to their long range and system-size scaling. The difficulty to isolate and measure vdW forces on a single-molecule level causes our present understanding to be strongly theory based. Here we show measurements of the attractive potential between differently sized organic molecules and a metal surface using an atomic force microscope. Our choice of molecules and the large molecule-surface separation cause this attraction to be purely of vdW type. The experiment allows testing the asymptotic vdW force law and its validity range. We find a superlinear growth of the vdW attraction with molecular size, originating from the increased deconfinement of electrons in the molecules. Because such non-additive vdW contributions are not accounted for in most first-principles or empirical calculations, we suggest further development in that direction. PMID:25424490

  10. Non-additivity of molecule-surface van der Waals potentials from force measurements.

    PubMed

    Wagner, Christian; Fournier, Norman; Ruiz, Victor G; Li, Chen; Müllen, Klaus; Rohlfing, Michael; Tkatchenko, Alexandre; Temirov, Ruslan; Tautz, F Stefan

    2014-11-26

    Van der Waals (vdW) forces act ubiquitously in condensed matter. Despite being weak on an atomic level, they substantially influence molecular and biological systems due to their long range and system-size scaling. The difficulty to isolate and measure vdW forces on a single-molecule level causes our present understanding to be strongly theory based. Here we show measurements of the attractive potential between differently sized organic molecules and a metal surface using an atomic force microscope. Our choice of molecules and the large molecule-surface separation cause this attraction to be purely of vdW type. The experiment allows testing the asymptotic vdW force law and its validity range. We find a superlinear growth of the vdW attraction with molecular size, originating from the increased deconfinement of electrons in the molecules. Because such non-additive vdW contributions are not accounted for in most first-principles or empirical calculations, we suggest further development in that direction.

  11. Nuclear Resonance Fluorescence Measurements on ^237Np for Security and Safeguards Applications

    NASA Astrophysics Data System (ADS)

    Angell, C. T.; Joshi, T.; Yee, Ryan; Norman, E. B.; Kulp, W. D.; Warren, G. A.; Korbly, S.; Klimenko, A.; Wilson, C.; Copping, R.; Shuh, D. K.

    2009-10-01

    The smuggling of nuclear material and the diversion of fissile material for covert weapon programs both present grave risks to world security. Methods are needed to detect nuclear material smuggled in cargo, and for proper material accountability in civilian fuel re-processing facilities. Nuclear resonance fluorescence (NRF) is a technique that can address both needs. It is a non-destructive active interrogation method that provides isotope-specific information. It works by using a γ-ray beam to resonantly excite levels in a nucleus and observing the γ-rays emitted whose energy and intensity are characteristic of that isotope. ^237Np presents significant safeguard challenges; it is fissile yet currently has fewer safeguard restrictions. NRF measurements on ^237Np will expand the nuclear database and will permit designing interrogation and assay systems. Measurements were made using the bremsstrahlung beam at the HVRL at MIT on a 7 g target of ^237Np with two incident electron energies of 2.8 and 3.1 MeV. Results will be presented with discussion of the relevant nuclear structure necessary to predict levels in other actinides.

  12. Nitrate removal in stream ecosystems measured by 15N addition experiments: 2. Denitrification

    SciTech Connect

    Mulholland, Patrick J; Hall, Robert; Sobota, Daniel; Dodds, Walter; Findlay, Stuart; Grimm, Nancy; Hamilton, Stephen; McDowell, William; O'Brien, Jon; Tank, Jennifer; Ashkenas, Linda; Cooper, Lee W; Dahm, Cliff; Gregory, Stanley; Johnson, Sherri; Meyer, Judy; Peterson, Bruce; Poole, Geoff; Valett, H. Maurice; Webster, Jackson; Arango, Clay; Beaulieu, Jake; Bernot, Melody; Burgin, Amy; Crenshaw, Chelsea; Helton, Ashley; Johnson, Laura; Niederlehner, Bobbie; Potter, Jody; Sheibley, Rich; Thomas, Suzanne

    2009-01-01

    We measured denitrification rates using a field {sup 15}N-NO{sub 3}{sup -} tracer-addition approach in a large, cross-site study of nitrate uptake in reference, agricultural, and suburban-urban streams. We measured denitrification rates in 49 of 72 streams studied. Uptake length due to denitrification (S{sub Wden}) ranged from 89 m to 184 km (median of 9050 m) and there were no significant differences among regions or land-use categories, likely because of the wide range of conditions within each region and land use. N{sub 2} production rates far exceeded N{sub 2}O production rates in all streams. The fraction of total NO{sub 3}{sup -} removal from water due to denitrification ranged from 0.5% to 100% among streams (median of 16%), and was related to NH{sub 4}{sup +} concentration and ecosystem respiration rate (ER). Multivariate approaches showed that the most important factors controlling S{sub Wden} were specific discharge (discharge/width) and NO{sub 3}{sup -} concentration (positive effects), and ER and transient storage zones (negative effects). The relationship between areal denitrification rate (U{sub den}) and NO{sub 3}{sup -} concentration indicated a partial saturation effect. A power function with an exponent of 0.5 described this relationship better than a Michaelis-Menten equation. Although U{sub den} increased with increasing NO{sub 3}{sup -} concentration, the efficiency of NO{sub 3}{sup -} removal from water via denitrification declined, resulting in a smaller proportion of streamwater NO{sub 3}{sup -} load removed over a given length of stream. Regional differences in stream denitrification rates were small relative to the proximate factors of NO{sub 3}{sup -} concentration and ecosystem respiration rate, and land use was an important but indirect control on denitrification in streams, primarily via its effect on NO{sub 3}{sup -} concentration.

  13. Modeling particulate matter concentrations measured through mobile monitoring in a deletion/substitution/addition approach

    NASA Astrophysics Data System (ADS)

    Su, Jason G.; Hopke, Philip K.; Tian, Yilin; Baldwin, Nichole; Thurston, Sally W.; Evans, Kristin; Rich, David Q.

    2015-12-01

    Land use regression modeling (LUR) through local scale circular modeling domains has been used to predict traffic-related air pollution such as nitrogen oxides (NOX). LUR modeling for fine particulate matters (PM), which generally have smaller spatial gradients than NOX, has been typically applied for studies involving multiple study regions. To increase the spatial coverage for fine PM and key constituent concentrations, we designed a mobile monitoring network in Monroe County, New York to measure pollutant concentrations of black carbon (BC, wavelength at 880 nm), ultraviolet black carbon (UVBC, wavelength at 3700 nm) and Delta-C (the difference between the UVBC and BC concentrations) using the Clarkson University Mobile Air Pollution Monitoring Laboratory (MAPL). A Deletion/Substitution/Addition (D/S/A) algorithm was conducted, which used circular buffers as a basis for statistics. The algorithm maximizes the prediction accuracy for locations without measurements using the V-fold cross-validation technique, and it reduces overfitting compared to other approaches. We found that the D/S/A LUR modeling approach could achieve good results, with prediction powers of 60%, 63%, and 61%, respectively, for BC, UVBC, and Delta-C. The advantage of mobile monitoring is that it can monitor pollutant concentrations at hundreds of spatial points in a region, rather than the typical less than 100 points from a fixed site saturation monitoring network. This research indicates that a mobile saturation sampling network, when combined with proper modeling techniques, can uncover small area variations (e.g., 10 m) in particulate matter concentrations.

  14. Nitrate removal in stream ecosystems measured by 15N addition experiments: Total uptake

    USGS Publications Warehouse

    Hall, R.O.; Tank, J.L.; Sobota, D.J.; Mulholland, P.J.; O'Brien, J. M.; Dodds, W.K.; Webster, J.R.; Valett, H.M.; Poole, G.C.; Peterson, B.J.; Meyer, J.L.; McDowell, W.H.; Johnson, S.L.; Hamilton, S.K.; Grimm, N. B.; Gregory, S.V.; Dahm, Clifford N.; Cooper, L.W.; Ashkenas, L.R.; Thomas, S.M.; Sheibley, R.W.; Potter, J.D.; Niederlehner, B.R.; Johnson, L.T.; Helton, A.M.; Crenshaw, C.M.; Burgin, A.J.; Bernot, M.J.; Beaulieu, J.J.; Arangob, C.P.

    2009-01-01

    We measured uptake length of 15NO-3 in 72 streams in eight regions across the United States and Puerto Rico to develop quantitative predictive models on controls of NO-3 uptake length. As part of the Lotic Intersite Nitrogen eXperiment II project, we chose nine streams in each region corresponding to natural (reference), suburban-urban, and agricultural land uses. Study streams spanned a range of human land use to maximize variation in NO-3 concentration, geomorphology, and metabolism. We tested a causal model predicting controls on NO-3 uptake length using structural equation modeling. The model included concomitant measurements of ecosystem metabolism, hydraulic parameters, and nitrogen concentration. We compared this structural equation model to multiple regression models which included additional biotic, catchment, and riparian variables. The structural equation model explained 79% of the variation in log uptake length (S Wtot). Uptake length increased with specific discharge (Q/w) and increasing NO-3 concentrations, showing a loss in removal efficiency in streams with high NO-3 concentration. Uptake lengths shortened with increasing gross primary production, suggesting autotrophic assimilation dominated NO-3 removal. The fraction of catchment area as agriculture and suburban-urban land use weakly predicted NO-3 uptake in bivariate regression, and did improve prediction in a set of multiple regression models. Adding land use to the structural equation model showed that land use indirectly affected NO-3 uptake lengths via directly increasing both gross primary production and NO-3 concentration. Gross primary production shortened SWtot, while increasing NO-3 lengthened SWtot resulting in no net effect of land use on NO- 3 removal. ?? 2009.

  15. Nitrate removal in stream ecosystems measured by 15N addition experiments: Denitrification

    USGS Publications Warehouse

    Mulholland, P.J.; Hall, R.O.; Sobota, D.J.; Dodds, W.K.; Findlay, S.E.G.; Grimm, N. B.; Hamilton, S.K.; McDowell, W.H.; O'Brien, J. M.; Tank, J.L.; Ashkenas, L.R.; Cooper, L.W.; Dahm, Clifford N.; Gregory, S.V.; Johnson, S.L.; Meyer, J.L.; Peterson, B.J.; Poole, G.C.; Valett, H.M.; Webster, J.R.; Arango, C.P.; Beaulieu, J.J.; Bernot, M.J.; Burgin, A.J.; Crenshaw, C.L.; Helton, A.M.; Johnson, L.T.; Niederlehner, B.R.; Potter, J.D.; Sheibley, R.W.; Thomasn, S.M.

    2009-01-01

    We measured denitrification rates using a field 15N-NO- 3 tracer-addition approach in a large, cross-site study of nitrate uptake in reference, agricultural, and suburban-urban streams. We measured denitrification rates in 49 of 72 streams studied. Uptake length due to denitrification (SWden) ranged from 89 m to 184 km (median of 9050 m) and there were no significant differences among regions or land-use categories, likely because of the wide range of conditions within each region and land use. N2 production rates far exceeded N2O production rates in all streams. The fraction of total NO-3 removal from water due to denitrification ranged from 0.5% to 100% among streams (median of 16%), and was related to NHz 4 concentration and ecosystem respiration rate (ER). Multivariate approaches showed that the most important factors controlling SWden were specific discharge (discharge / width) and NO-3 concentration (positive effects), and ER and transient storage zones (negative effects). The relationship between areal denitrification rate (Uden) and NO- 3 concentration indicated a partial saturation effect. A power function with an exponent of 0.5 described this relationship better than a Michaelis-Menten equation. Although Uden increased with increasing NO- 3 concentration, the efficiency of NO-3 removal from water via denitrification declined, resulting in a smaller proportion of streamwater NO-3 load removed over a given length of stream. Regional differences in stream denitrification rates were small relative to the proximate factors of NO-3 concentration and ecosystem respiration rate, and land use was an important but indirect control on denitrification in streams, primarily via its effect on NO-3 concentration. ?? 2009.

  16. Nitrate removal in stream ecosystems measured by 15N addition experiments: Total uptake

    SciTech Connect

    Mulholland, Patrick J; Hall, Robert; Tank, Jennifer; Sobota, Daniel; O'Brien, Jon; Webster, Jackson; Valett, H. Maurice; Dodds, Walter; Poole, Geoff; Peterson, Chris G.; Meyer, Judy; McDowell, William; Johnson, Sherri; Hamilton, Stephen; Gregory, Stanley; Grimm, Nancy; Dahm, Cliff; Cooper, Lee W; Ashkenas, Linda; Thomas, Suzanne; Sheibley, Rich; Potter, Jody; Niederlehner, Bobbie; Johnson, Laura; Helton, Ashley; Crenshaw, Chelsea; Burgin, Amy; Bernot, Melody; Beaulieu, Jake; Arango, Clay

    2009-01-01

    We measured uptake length of {sup 15}NO{sub 3}{sup -} in 72 streams in eight regions across the United States and Puerto Rico to develop quantitative predictive models on controls of NO{sub 3}{sup -} uptake length. As part of the Lotic Intersite Nitrogen Experiment II project, we chose nine streams in each region corresponding to natural (reference), suburban-urban, and agricultural land uses. Study streams spanned a range of human land use to maximize variation in NO{sub 3}{sup -} concentration, geomorphology, and metabolism. We tested a causal model predicting controls on NO{sub 3}{sup -} uptake length using structural equation modeling. The model included concomitant measurements of ecosystem metabolism, hydraulic parameters, and nitrogen concentration. We compared this structural equation model to multiple regression models which included additional biotic, catchment, and riparian variables. The structural equation model explained 79% of the variation in log uptake length (S{sub Wtot}). Uptake length increased with specific discharge (Q/w) and increasing NO{sub 3}{sup -} concentrations, showing a loss in removal efficiency in streams with high NO{sub 3}{sup -} concentration. Uptake lengths shortened with increasing gross primary production, suggesting autotrophic assimilation dominated NO{sub 3}{sup -} removal. The fraction of catchment area as agriculture and suburban-urban land use weakly predicted NO{sub 3}{sup -} uptake in bivariate regression, and did improve prediction in a set of multiple regression models. Adding land use to the structural equation model showed that land use indirectly affected NO{sub 3}{sup -} uptake lengths via directly increasing both gross primary production and NO{sub 3}{sup -} concentration. Gross primary production shortened S{sub Wtot}, while increasing NO{sub 3}{sup -} lengthened S{sub Wtot} resulting in no net effect of land use on NO{sub 3}{sup -} removal.

  17. Non-additivity of molecule-surface van der Waals potentials from force measurements

    NASA Astrophysics Data System (ADS)

    Tautz, Stefan

    2014-03-01

    Van der Waals (vdW) forces act ubiquitously in condensed matter. Their description as an inherently quantum mechanical phenomenon was developed for single atoms and homogeneous macroscopic bodies by London, Casimir, and Lifshitz. For intermediate-sized objects like organic molecules an atomistic description is required, but explicit first principles calculations are very difficult since correlations between many interacting electrons have to be considered. Hence, semi-empirical correction schemes are often used that simplify the vdW interaction to a sum over atom-pair potentials. A similar gap exists between successful measurements of vdW and Casimir forces for single atoms on the one hand and macroscopic bodies on the other, as comparable experiments for molecules are absent. I will present experiments in which long-range vdW potentials between a series of related molecules and a metal surface have been determined experimentally. The experiments rely on the extremely sensitive force detection of an atomic force microscope in combination with its molecular manipulation capabilities. The results allow us to confirm the asymptotic force law and to quantify the non-additive part of the vdW interaction which is particularly challenging for theory. In the present case, cooperative effects account for 10% of the total interaction. This effect is of general validity in molecules and thus relevant at the intersection of chemistry, physics, biology, and materials science.

  18. Secure Mass Measurements from Transit Timing: 10 Kepler Exoplanets between 3 and 8 M⊕ with Diverse Densities and Incident Fluxes

    NASA Astrophysics Data System (ADS)

    Jontof-Hutter, Daniel; Ford, Eric B.; Rowe, Jason F.; Lissauer, Jack J.; Fabrycky, Daniel C.; Van Laerhoven, Christa; Agol, Eric; Deck, Katherine M.; Holczer, Tomer; Mazeh, Tsevi

    2016-03-01

    We infer dynamical masses in eight multiplanet systems using transit times measured from Kepler's complete data set, including short-cadence data where available. Of the 18 dynamical masses that we infer, 10 pass multiple tests for robustness. These are in systems Kepler-26 (KOI-250), Kepler-29 (KOI-738), Kepler-60 (KOI-2086), Kepler-105 (KOI-115), and Kepler-307 (KOI-1576). Kepler-105 c has a radius of 1.3 R⊕ and a density consistent with an Earth-like composition. Strong transit timing variation (TTV) signals were detected from additional planets, but their inferred masses were sensitive to outliers or consistent solutions could not be found with independently measured transit times, including planets orbiting Kepler-49 (KOI-248), Kepler-57 (KOI-1270), Kepler-105 (KOI-115), and Kepler-177 (KOI-523). Nonetheless, strong upper limits on the mass of Kepler-177 c imply an extremely low density of ˜0.1 g cm-3. In most cases, individual orbital eccentricities were poorly constrained owing to degeneracies in TTV inversion. For five planet pairs in our sample, strong secular interactions imply a moderate to high likelihood of apsidal alignment over a wide range of possible eccentricities. We also find solutions for the three planets known to orbit Kepler-60 in a Laplace-like resonance chain. However, nonlibrating solutions also match the transit timing data. For six systems, we calculate more precise stellar parameters than previously known, enabling useful constraints on planetary densities where we have secure mass measurements. Placing these exoplanets on the mass-radius diagram, we find that a wide range of densities is observed among sub-Neptune-mass planets and that the range in observed densities is anticorrelated with incident flux.

  19. Does the anti-prothrombin antibodies measurement provide additional information in patients with thrombosis?

    PubMed

    Bardin, Nathalie; Alessi, Marie Christine; Dignat-George, Francoise; Vague, Irene Juhan; Sampol, Jose; Harlé, Jean Robert; Sanmarco, Marielle

    2007-01-01

    The aim of this study is to get new insight into the relevance of IgG anti-prothrombin antibodies in patients with thrombosis and to determine whether human prothrombin alone (aPT) or complexed to phosphatidylserine (aPS/PT) should be preferentially used for measuring these antibodies by enzyme-linked immunosorbent assay (ELISA). To this end, prevalence of anti-prothrombin antibodies, their characteristics in terms of avidity and heterogeneity, and their relationship with anti-beta2 glycoprotein I antibodies (abeta2GPI) were studied in 152 patients with thrombosis. Patients were divided into two groups according to the presence or absence of antiphospholipid antibodies (aPL), called aPL+ or aPL-, respectively. In the aPL- group (n=90), the prevalence of anti-prothrombin antibodies was substantial (10%) but not significantly different from that of control (5%). In the aPL+ group (n=62), lupus anticoagulant (LA) or anticardiolipin antibodies (aCL) positive, 61% were positive for anti-prothrombin antibodies with no statistical difference between aPT and aPS/PT prevalence (42% vs. 55%, respectively). In the whole thrombotic population, 19% were only aPT and 34% only aPS/PT suggesting the presence of different antibodies. Absorption experiments confirmed the heterogeneity of aPT and aPS/PT. No difference in their avidity was demonstrated. From the aPL+ group, 60 were LA positive. Among them, 18% were negative for abeta2GPI and anti-prothrombin antibodies showing that the detection of these antibodies could not substitute for LA determination. In conclusion, our data show that the screening of the different anti-prothrombin antibodies is not warranted in the aPL+ group since these antibodies do not provide additional information compared to aCL, LA and/or abeta2GPI measurement. Nevertheless, the substantial prevalence of anti-prothrombin antibodies in the aPL- group should be further explored in a large prospective study. PMID:17678713

  20. Effect of silica fume addition on the PGNAA measurement of chlorine in concrete.

    PubMed

    Naqvi, A A; Maslehuddin, M; Garwan, M A; Nagadi, M M; Al-Amoudi, O S B; Raashid, M; Khateeb-ur-Rehman

    2010-03-01

    Pozzolanic materials, such as fly ash (FA), silica fume (SF), and blast furnace slag (BFS) are added to Portland cement in concrete to prevent reinforcement steel corrosion in concrete. Further preventive measure against reinforcement steel corrosion require monitoring of chloride salts concentration in concrete using non-destructive techniques, such as the prompt gamma-ray neutron activation analysis (PGNAA) technique. Due to interferences between gamma-rays from chlorine and calcium in PGNAA technique, detection limit of chlorine in concrete strongly depends upon calcium concentration in concrete. SF mainly contains silica and its addition to cement concrete reduces overall concentration of calcium in concrete. This may result in an improvement in detection limit of chlorine in SF-based concrete in PGNAA studies. Particularly for chlorine detection using 6.11 and 6.62 MeV prompt gamma-rays that strongly interfere with 6.42 MeV prompt gamma-rays from calcium. In this study, SF was added to Portland cement to prevent concrete reinforcement steel from corrosion. The chlorine concentration in SF cement concrete specimens containing 0.2-3.0 wt% chlorine was measured through yield of 1.16, 1.95, 6.11, 6.62, 7.41, 7.79, and 8.58 MeV chlorine gamma-rays using PGNAA technique. An excellent agreement was noted between the experimental yield of the prompt gamma-rays and the gamma-ray yield calculated through the Monte Carlo simulations. Further the minimum detectable concentration (MDC) of chlorine in SF cement concrete was calculated and compared with the MDC values of chlorine in plain concrete and concrete mixed with fly ash cement. The MDC of chlorine in SF-based concrete through 6.11 MeV, and 6.62 MeV chlorine gamma-rays was found to be improved as compared to those in plain concrete and concrete mixed with fly ash cement. PMID:20042342

  1. 20 CFR 664.210 - How is the “requires additional assistance to complete an educational program, or to secure and...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... and documented? 664.210 Section 664.210 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION... secure and hold employment” criterion in § 664.200(c)(6) defined and documented? Definitions and... educational program, or to secure and hold employment” criterion of § 664.200(c)(6) may be established at...

  2. Airborne Dust Cloud Measurements at the INL National Security Test Range

    SciTech Connect

    Michael L. Abbott; Norm Stanley; Larry Radke; Charles Smeltzer

    2007-09-01

    On July 11, 2007, a surface, high-explosive test (<20,000 lb TNT-equivalent) was carried out at the National Security Test Range (NSTR) on the Idaho National Laboratory (INL) Site. Aircraft-mounted rapid response (1-sec) particulate monitors were used to measure airborne PM-10 concentrations directly in the dust cloud and to develop a PM-10 emission factor that could be used for subsequent tests at the NSTR. The blast produced a mushroom-like dust cloud that rose approximately 2,500–3,000 ft above ground level, which quickly dissipated (within 5 miles of the source). In general, the cloud was smaller and less persistence than expected, or that might occur in other areas, likely due to the coarse sand and subsurface conditions that characterize the immediate NSTR area. Maximum short time-averaged (1-sec) PM-10 concentrations at the center of the cloud immediately after the event reached 421 µg m-3 but were rapidly reduced (by atmospheric dispersion and fallout) to near background levels (~10 µg m-3) after about 15 minutes. This occurred well within the INL Site boundary, about 8 km (5 miles) from the NSTR source. These findings demonstrate that maximum concentrations in ambient air beyond the INL Site boundary (closest is 11.2 km from NSTR) from these types of tests would be well within the 150 µg m-3 24-hour National Ambient Air Quality Standards for PM-10. Aircraft measurements and geostatistical techniques were used to successfully quantify the initial volume (1.64E+9 m3 or 1.64 km3) and mass (250 kg) of the PM-10 dust cloud, and a PM-10 emission factor (20 kg m-3 crater soil volume) was developed for this specific type of event at NSTR. The 250 kg of PM-10 mass estimated from this experiment is almost seven-times higher than the 36 kg estimated for the environmental assessment (DOE-ID 2007) using available Environmental Protection Agency (EPA 1995) emission factors. This experiment demonstrated that advanced aircraft-mounted instruments operated by

  3. What are we measuring? Comparison of household food security indicators in the Eastern Cape Province, South Africa.

    PubMed

    Hendriks, Sheryl L; van der Merwe, Corné; Ngidi, Mjabuliseni S; Manyamba, Christopher; Mbele, Mondli; McIntyre, Angela M; Mkandawire, Elizabeth; Molefe, Queeneth N; Mphephu, Mulalo Q; Ngwane, Lithle

    2016-01-01

    The development of national food security information systems is constrained by a lack of guidance on which indicators to use. This paper compares food security indicators across two seasons (summer and winter) in one of the most deprived areas of the Eastern Cape province of South Africa. The results show that only anthropometric indicators are sensitive enough to differentiate levels of food insecurity. The lack of consistent classification across indicators means that surveys must use a combination of food consumption and experience of hunger measures backed up by anthropometric measures. Targeting interventions is difficult if the measures cannot be relied on. Further investigation is needed to identify a suite of appropriate indicators for a national information and surveillance system.

  4. a Measuring System with AN Additional Channel for Eliminating the Dynamic Error

    NASA Astrophysics Data System (ADS)

    Dichev, Dimitar; Koev, Hristofor; Louda, Petr

    2014-03-01

    The present article views a measuring system for determining the parameters of vessels. The system has high measurement accuracy when operating in both static and dynamic mode. It is designed on a gyro-free principle for plotting a vertical. High accuracy of measurement is achieved by using a simplified design of the mechanical module as well by minimizing the instrumental error. A new solution for improving the measurement accuracy in dynamic mode is offered. The approach presented is based on a method where the dynamic error is eliminated in real time, unlike the existing measurement methods and tools where stabilization of the vertical in the inertial space is used. The results obtained from the theoretical experiments, which have been performed on the basis of the developed mathematical model, demonstrate the effectiveness of the suggested measurement approach.

  5. 49 CFR 1544.305 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars... and Information Circulars. (a) TSA may issue an Information Circular to notify aircraft operators of security concerns. When TSA determines that additional security measures are necessary to respond to...

  6. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Contingency Measures § 1542.303 Security Directives and Information Circulars. (a) TSA may issue an Information Circular to notify airport operators of security concerns. When TSA determines that additional... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information...

  7. 49 CFR 192.935 - What additional preventive and mitigative measures must an operator take?

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Gas Transmission Pipeline Integrity Management § 192.935 What additional preventive and mitigative... capabilities, the type of gas being transported, operating pressure, the rate of potential release,...

  8. Mortality Measurement at Advanced Ages: A Study of the Social Security Administration Death Master File

    PubMed Central

    Gavrilov, Leonid A.; Gavrilova, Natalia S.

    2011-01-01

    Accurate estimates of mortality at advanced ages are essential to improving forecasts of mortality and the population size of the oldest old age group. However, estimation of hazard rates at extremely old ages poses serious challenges to researchers: (1) The observed mortality deceleration may be at least partially an artifact of mixing different birth cohorts with different mortality (heterogeneity effect); (2) standard assumptions of hazard rate estimates may be invalid when risk of death is extremely high at old ages and (3) ages of very old people may be exaggerated. One way of obtaining estimates of mortality at extreme ages is to pool together international records of persons surviving to extreme ages with subsequent efforts of strict age validation. This approach helps researchers to resolve the third of the above-mentioned problems but does not resolve the first two problems because of inevitable data heterogeneity when data for people belonging to different birth cohorts and countries are pooled together. In this paper we propose an alternative approach, which gives an opportunity to resolve the first two problems by compiling data for more homogeneous single-year birth cohorts with hazard rates measured at narrow (monthly) age intervals. Possible ways of resolving the third problem of hazard rate estimation are elaborated. This approach is based on data from the Social Security Administration Death Master File (DMF). Some birth cohorts covered by DMF could be studied by the method of extinct generations. Availability of month of birth and month of death information provides a unique opportunity to obtain hazard rate estimates for every month of age. Study of several single-year extinct birth cohorts shows that mortality trajectory at advanced ages follows the Gompertz law up to the ages 102–105 years without a noticeable deceleration. Earlier reports of mortality deceleration (deviation of mortality from the Gompertz law) at ages below 100 appear to be

  9. Voice measures of workload in the advanced flight deck: Additional studies

    NASA Technical Reports Server (NTRS)

    Schneider, Sid J.; Alpert, Murray

    1989-01-01

    These studies investigated acoustical analysis of the voice as a measure of workload in individual operators. In the first study, voice samples were recorded from a single operator during high, medium, and low workload conditions. Mean amplitude, frequency, syllable duration, and emphasis all tended to increase as workload increased. In the second study, NASA test pilots performed a laboratory task, and used a flight simulator under differing work conditions. For two of the pilots, high workload in the simulator brought about greater amplitude, peak duration, and stress. In both the laboratory and simulator tasks, high workload tended to be associated with more statistically significant drop-offs in the acoustical measures than were lower workload levels. There was a great deal of intra-subject variability in the acoustical measures. The results suggested that in individual operators, increased workload might be revealed by high initial amplitude and frequency, followed by rapid drop-offs over time.

  10. [Security measures in the penal code, in the opinions of expert psychiatrists and some problems in their applications].

    PubMed

    Hajdukiewicz, Danuta

    2006-01-01

    The aim of this paper is to remind expert psychiatrists, the three basic elements required for the application of security measures such as placing the convict in a psychiatric hospital. They are: 1) An act was of serious social damage, 2) the damage was committed in a state of non-liability, 3) there is a high risk of the person repeating the act of similar social damage. The fulfilment of these three is an obligation for the court to apply the security measure of placing the person in a psychiatric hospital (art. 94 section 1 of the penal code). Practice shows that experts have difficulties in these evaluations, which in turn results in faults in directing for placement withoutjust cause, or in turn-there is no directing, even though there are causes for it. There is a huge need for legal regulations on these manners, after the forensic psychiatric observation ends. The non-liable delinquent who committed an act of serious social damage is in risk of committing this act once more, whilst he is not in custody. The issue is in showing a legal basis for keeping the non-liable delinquent from such an act in a psychiatric hospital, in spite of ending the observation, until the legal sentence on the security measure is in place.

  11. Additional atmospheric opacity measurements at lambda = 1.1 mm from Mauna Kea Observatory, Hawaii

    NASA Technical Reports Server (NTRS)

    Parrish, A.; De Zafra, R. L.; Barrett, J. W.; Solomon, P.; Connor, B.

    1987-01-01

    Atmospheric opacity values in the zenith direction are given for a wavelength of 1.1 mm (278 GHz) at the summit of Mauna Kea in the Hawaiian Islands. A total of 75 days is covered during the period 1983-1986. Observations were made on a quasi-continuous basis, with opacity measured every 20 minutes around the clock for significant periods of time. A conversion from opacity at lambda = 1.1 mm to the equivalent precipitable water vapor column is given from the measurements of Zammit and Ade (1981), from which opacities at other wavelengths may be derived.

  12. 33 CFR 105.257 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    .... The Coast Guard will issue guidance for use in making these determinations. (b) Newly-hired facility... applied for a TWIC in accordance with 49 CFR part 1572 by completing the full enrollment process, paying...; (iii) Social security number (optional); (iv) Employer name and 24 hour contact information; and...

  13. 33 CFR 104.267 - Security measures for newly hired employees.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    .... The Coast Guard will issue guidance for use in making these determinations. (b) Newly-hired vessel... has applied for a TWIC in accordance with 49 CFR part 1572 by completing the full enrollment process...) Social security number (optional); (iv) Employer name and 24 hour contact information; and (v) Date...

  14. 33 CFR 104.267 - Security measures for newly hired employees.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    .... The Coast Guard will issue guidance for use in making these determinations. (b) Newly-hired vessel... has applied for a TWIC in accordance with 49 CFR part 1572 by completing the full enrollment process...) Social security number (optional); (iv) Employer name and 24 hour contact information; and (v) Date...

  15. 33 CFR 105.257 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... applied for a TWIC in accordance with 49 CFR part 1572 by completing the full enrollment process, paying... operator or the Facility Security Officer (FSO) must have the new hire sign a statement affirming this, and... or the FSO enters the following information on the new hire into the Coast Guard's Homeport...

  16. 33 CFR 105.257 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... applied for a TWIC in accordance with 49 CFR part 1572 by completing the full enrollment process, paying... operator or the Facility Security Officer (FSO) must have the new hire sign a statement affirming this, and... suspicion regarding the new hire's ability to obtain a TWIC, and the facility owner or operator or FSO...

  17. 33 CFR 105.257 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... applied for a TWIC in accordance with 49 CFR part 1572 by completing the full enrollment process, paying... operator or the Facility Security Officer (FSO) must have the new hire sign a statement affirming this, and... or the FSO enters the following information on the new hire into the Coast Guard's Homeport...

  18. 33 CFR 105.257 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... applied for a TWIC in accordance with 49 CFR part 1572 by completing the full enrollment process, paying... operator or the Facility Security Officer (FSO) must have the new hire sign a statement affirming this, and... or the FSO enters the following information on the new hire into the Coast Guard's Homeport...

  19. An Additional Measure of Overall Effect Size for Logistic Regression Models

    ERIC Educational Resources Information Center

    Allen, Jeff; Le, Huy

    2008-01-01

    Users of logistic regression models often need to describe the overall predictive strength, or effect size, of the model's predictors. Analogs of R[superscript 2] have been developed, but none of these measures are interpretable on the same scale as effects of individual predictors. Furthermore, R[superscript 2] analogs are not invariant to the…

  20. Turbulence measurements over immobile gravel with additions of sand from supply limited to capacity transport conditions

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Measurement of the turbulence that drives sand transport over and through immobile gravels is relevant to efforts to model sediment movement downstream of dams, where fine sediments are eroded from coarse substrates and are not replaced due to the presence of the upstream dam. The relative elevatio...

  1. 42 CFR 414.1230 - Additional measures for groups of physicians.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... diabetes. The rate of potentially preventable hospital admissions for diabetes is a composite measure of uncontrolled diabetes, short term diabetes complications, long term diabetes complications and lower extremity amputation for diabetes. (b) A composite of rates of potentially preventable hospital admissions...

  2. 42 CFR 414.1230 - Additional measures for groups of physicians.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... diabetes. The rate of potentially preventable hospital admissions for diabetes is a composite measure of uncontrolled diabetes, short term diabetes complications, long term diabetes complications and lower extremity amputation for diabetes. (b) A composite of rates of potentially preventable hospital admissions...

  3. Assessing the use of an infrared spectrum hyperpixel array imager to measure temperature during additive and subtractive manufacturing

    NASA Astrophysics Data System (ADS)

    Whitenton, Eric; Heigel, Jarred; Lane, Brandon; Moylan, Shawn

    2016-05-01

    Accurate non-contact temperature measurement is important to optimize manufacturing processes. This applies to both additive (3D printing) and subtractive (material removal by machining) manufacturing. Performing accurate single wavelength thermography suffers numerous challenges. A potential alternative is hyperpixel array hyperspectral imaging. Focusing on metals, this paper discusses issues involved such as unknown or changing emissivity, inaccurate greybody assumptions, motion blur, and size of source effects. The algorithm which converts measured thermal spectra to emissivity and temperature uses a customized multistep non-linear equation solver to determine the best-fit emission curve. Emissivity dependence on wavelength may be assumed uniform or have a relationship typical for metals. The custom software displays residuals for intensity, temperature, and emissivity to gauge the correctness of the greybody assumption. Initial results are shown from a laser powder-bed fusion additive process, as well as a machining process. In addition, the effects of motion blur are analyzed, which occurs in both additive and subtractive manufacturing processes. In a laser powder-bed fusion additive process, the scanning laser causes the melt pool to move rapidly, causing a motion blur-like effect. In machining, measuring temperature of the rapidly moving chip is a desirable goal to develop and validate simulations of the cutting process. A moving slit target is imaged to characterize how the measured temperature values are affected by motion of a measured target.

  4. Lattice strain measurements of deuteride (hydride) formation in epitaxial Nb: Additional results and further insights into past measurements

    SciTech Connect

    Allain, Monica M.C.; Heuser, Brent J.

    2005-08-01

    The evolution of lattice strain during in situ gas-phase deuterium loading of epitaxial (110) Nb films on the (1120) sapphire was measured with x-ray diffraction. Two samples with film thicknesses 208 and 1102 A were driven through the miscibility gap. Strains in three orthogonal directions were recorded, permitting the complete set of unit cell parameters to be determined for both the solid solution and deuteride phases. The overall film thickness was simultaneously measured by recording the glancing angle reflectivity response. The behavior of the two films was markedly different, with the thicker film exhibiting a much more compliant behavior and concomitant irreversible plastic deformation. The correlation between out-of-plane lattice and film expansion for both films is also consistent with this observation. These results help explain past inconsistencies observed by others.

  5. Efficient method for computing the maximum-likelihood quantum state from measurements with additive Gaussian noise.

    PubMed

    Smolin, John A; Gambetta, Jay M; Smith, Graeme

    2012-02-17

    We provide an efficient method for computing the maximum-likelihood mixed quantum state (with density matrix ρ) given a set of measurement outcomes in a complete orthonormal operator basis subject to Gaussian noise. Our method works by first changing basis yielding a candidate density matrix μ which may have nonphysical (negative) eigenvalues, and then finding the nearest physical state under the 2-norm. Our algorithm takes at worst O(d(4)) for the basis change plus O(d(3)) for finding ρ where d is the dimension of the quantum state. In the special case where the measurement basis is strings of Pauli operators, the basis change takes only O(d(3)) as well. The workhorse of the algorithm is a new linear-time method for finding the closest probability distribution (in Euclidean distance) to a set of real numbers summing to one.

  6. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    PubMed

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.

  7. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    PubMed

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats. PMID:24187744

  8. 20 CFR 664.210 - How is the “requires additional assistance to complete an educational program, or to secure and...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... and documented? 664.210 Section 664.210 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT OF LABOR YOUTH ACTIVITIES UNDER TITLE I OF THE WORKFORCE INVESTMENT ACT Eligibility for Youth... secure and hold employment” criterion in § 664.200(c)(6) defined and documented? Definitions...

  9. Conceptual foundation for measures of physical function and behavioral health function for Social Security work disability evaluation.

    PubMed

    Marfeo, Elizabeth E; Haley, Stephen M; Jette, Alan M; Eisen, Susan V; Ni, Pengsheng; Bogusz, Kara; Meterko, Mark; McDonough, Christine M; Chan, Leighton; Brandt, Diane E; Rasch, Elizabeth K

    2013-09-01

    Physical and mental impairments represent the 2 largest health condition categories for which workers receive Social Security disability benefits. Comprehensive assessment of physical and mental impairments should include aspects beyond medical conditions such as a person's underlying capabilities as well as activity demands relevant to the context of work. The objective of this article is to describe the initial conceptual stages of developing new measurement instruments of behavioral health and physical functioning relevant for Social Security work disability evaluation purposes. To outline a clear conceptualization of the constructs to be measured, 2 content models were developed using structured and informal qualitative approaches. We performed a structured literature review focusing on work disability and incorporating aspects of the International Classification of Functioning, Disability and Health as a unifying taxonomy for framework development. Expert interviews provided advice and consultation to enhance face validity of the resulting content models. The content model for work-related behavioral health function identifies 5 major domains: (1) behavior control, (2) basic interactions, (3) temperament and personality, (4) adaptability, and (5) workplace behaviors. The content model describing physical functioning includes 3 domains: (1) changing and maintaining body position, (2) whole-body mobility, and (3) carrying, moving, and handling objects. These content models informed subsequent measurement properties including item development and measurement scale construction, and provided conceptual coherence guiding future empirical inquiry. The proposed measurement approaches show promise to comprehensively and systematically assess physical and behavioral health functioning relevant to work.

  10. Conceptual foundation for measures of physical function and behavioral health function for Social Security work disability evaluation.

    PubMed

    Marfeo, Elizabeth E; Haley, Stephen M; Jette, Alan M; Eisen, Susan V; Ni, Pengsheng; Bogusz, Kara; Meterko, Mark; McDonough, Christine M; Chan, Leighton; Brandt, Diane E; Rasch, Elizabeth K

    2013-09-01

    Physical and mental impairments represent the 2 largest health condition categories for which workers receive Social Security disability benefits. Comprehensive assessment of physical and mental impairments should include aspects beyond medical conditions such as a person's underlying capabilities as well as activity demands relevant to the context of work. The objective of this article is to describe the initial conceptual stages of developing new measurement instruments of behavioral health and physical functioning relevant for Social Security work disability evaluation purposes. To outline a clear conceptualization of the constructs to be measured, 2 content models were developed using structured and informal qualitative approaches. We performed a structured literature review focusing on work disability and incorporating aspects of the International Classification of Functioning, Disability and Health as a unifying taxonomy for framework development. Expert interviews provided advice and consultation to enhance face validity of the resulting content models. The content model for work-related behavioral health function identifies 5 major domains: (1) behavior control, (2) basic interactions, (3) temperament and personality, (4) adaptability, and (5) workplace behaviors. The content model describing physical functioning includes 3 domains: (1) changing and maintaining body position, (2) whole-body mobility, and (3) carrying, moving, and handling objects. These content models informed subsequent measurement properties including item development and measurement scale construction, and provided conceptual coherence guiding future empirical inquiry. The proposed measurement approaches show promise to comprehensively and systematically assess physical and behavioral health functioning relevant to work. PMID:23548543

  11. Neutron measurements of stresses in a test artifact produced by laser-based additive manufacturing

    SciTech Connect

    Gnäupel-Herold, Thomas; Slotwinski, John; Moylan, Shawn

    2014-02-18

    A stainless steel test artifact produced by Direct Metal Laser Sintering and similar to a proposed standardized test artifact was examined using neutron diffraction. The artifact contained a number of structures with different aspect ratios pertaining to wall thickness, height above base plate, and side length. Through spatial resolutions of the order of one millimeter the volumetric distribution of stresses in several was measured. It was found that the stresses peak in the tensile region around 500 MPa near the top surface, with balancing compressive stresses in the interior. The presence of a support structure (a one millimeter high, thin walled, hence weaker, lattice structure deposited on the base plate, followed by a fully dense AM structure) has only minor effects on the stresses.

  12. Time- and isomer-resolved measurements of sequential addition of acetylene to the propargyl radical

    DOE PAGES

    Savee, John D.; Selby, Talitha M.; Welz, Oliver; Taatjes, Craig A.; Osborn, David L.

    2015-10-06

    Soot formation in combustion is a complex process in which polycyclic aromatic hydrocarbons (PAHs) are believed to play a critical role. Recent works concluded that three consecutive additions of acetylene (C2H2) to propargyl (C3H3) create a facile route to the PAH indene (C9H8). However, the isomeric forms of C5H5 and C7H7 intermediates in this reaction sequence are not known. We directly investigate these intermediates using time- and isomer-resolved experiments. Both the resonance stabilized vinylpropargyl (vp-C5H5) and 2,4-cyclopentadienyl (c-C5H5) radical isomers of C5H5 are produced, with substantially different intensities at 800 K vs 1000 K. In agreement with literature master equationmore » calculations, we find that c-C5H5 + C2H2 produces only the tropyl isomer of C7H7 (tp-C7H7) below 1000 K, and that tp-C7H7 + C2H2 terminates the reaction sequence yielding C9H8 (indene) + H. Lastly, this work demonstrates a pathway for PAH formation that does not proceed through benzene.« less

  13. Addition of a channel for XCO observations to a portable FTIR spectrometer for greenhouse gas measurements

    NASA Astrophysics Data System (ADS)

    Hase, Frank; Frey, Matthias; Kiel, Matthäus; Blumenstock, Thomas; Harig, Roland; Keens, Axel; Orphal, Johannes

    2016-05-01

    The portable FTIR (Fourier transform infrared) spectrometer EM27/SUN, dedicated to the precise and accurate observation of column-averaged abundances of methane and carbon dioxide, has been equipped with a second detector channel, which allows the detection of additional species, especially carbon monoxide. This allows an improved characterisation of observed carbon dioxide enhancements and makes the extended spectrometer especially suitable as a validation tool of ESA's Sentinel 5 Precursor mission, as it now covers the same spectral region as used by the infrared channel of the TROPOMI (TROPOspheric Monitoring Instrument) sensor. The extension presented here does not rely on a dichroic, but instead a fraction of the solar beam is decoupled near the aperture stop of the spectrometer using a small plane mirror. This approach allows maintaining the camera-controlled solar tracker set-up, which is referenced to the field stop in front of the primary detector. Moreover, the upgrade of existing instruments can be performed without alterating the optical set-up of the primary channel and resulting changes of the instrumental characteristics of the original instrument.

  14. Time- and Isomer-Resolved Measurements of Sequential Addition of Acetylene to the Propargyl Radical.

    PubMed

    Savee, John D; Selby, Talitha M; Welz, Oliver; Taatjes, Craig A; Osborn, David L

    2015-10-15

    Soot formation in combustion is a complex process in which polycyclic aromatic hydrocarbons (PAHs) are believed to play a critical role. Recent works concluded that three consecutive additions of acetylene (C2H2) to propargyl (C3H3) create a facile route to the PAH indene (C9H8). However, the isomeric forms of C5H5 and C7H7 intermediates in this reaction sequence are not known. We directly investigate these intermediates using time- and isomer-resolved experiments. Both the resonance stabilized vinylpropargyl (vp-C5H5) and 2,4-cyclopentadienyl (c-C5H5) radical isomers of C5H5 are produced, with substantially different intensities at 800 K vs 1000 K. In agreement with literature master equation calculations, we find that c-C5H5 + C2H2 produces only the tropyl isomer of C7H7 (tp-C7H7) below 1000 K, and that tp-C7H7 + C2H2 terminates the reaction sequence yielding C9H8 (indene) + H. This work demonstrates a pathway for PAH formation that does not proceed through benzene. PMID:26722791

  15. Time- and isomer-resolved measurements of sequential addition of acetylene to the propargyl radical

    SciTech Connect

    Savee, John D.; Selby, Talitha M.; Welz, Oliver; Taatjes, Craig A.; Osborn, David L.

    2015-10-06

    Soot formation in combustion is a complex process in which polycyclic aromatic hydrocarbons (PAHs) are believed to play a critical role. Recent works concluded that three consecutive additions of acetylene (C2H2) to propargyl (C3H3) create a facile route to the PAH indene (C9H8). However, the isomeric forms of C5H5 and C7H7 intermediates in this reaction sequence are not known. We directly investigate these intermediates using time- and isomer-resolved experiments. Both the resonance stabilized vinylpropargyl (vp-C5H5) and 2,4-cyclopentadienyl (c-C5H5) radical isomers of C5H5 are produced, with substantially different intensities at 800 K vs 1000 K. In agreement with literature master equation calculations, we find that c-C5H5 + C2H2 produces only the tropyl isomer of C7H7 (tp-C7H7) below 1000 K, and that tp-C7H7 + C2H2 terminates the reaction sequence yielding C9H8 (indene) + H. Lastly, this work demonstrates a pathway for PAH formation that does not proceed through benzene.

  16. Ocular accommodation and cognitive demand: An additional indicator besides pupil size and cardiovascular measures?

    PubMed Central

    Jainta, Stephanie; Hoormann, Joerg; Jaschinski, Wolfgang

    2008-01-01

    Background The aim of the present study was to assess accommodation as a possible indicator of changes in the autonomic balance caused by altered cognitive demand. Accounting for accommodative responses from a human factors perspective may be motivated by the interest of designing virtual image displays or by establishing an autonomic indicator that allows for remote measurement at the human eye. Heart period, pulse transit time, and the pupillary response were considered as reference for possible closed-loop accommodative effects. Cognitive demand was varied by presenting monocularly numbers at a viewing distance of 5 D (20 cm) which had to be read, added or multiplied; further, letters were presented in a "n-back" task. Results Cardiovascular parameters and pupil size indicated a change in autonomic balance, while error rates and reaction time confirmed the increased cognitive demand during task processing. An observed decrease in accommodation could not be attributed to the cognitive demand itself for two reasons: (1) the cognitive demand induced a shift in gaze direction which, for methodological reasons, accounted for a substantial part of the observed accommodative changes. (2) Remaining effects disappeared when the correctness of task processing was taken into account. Conclusion Although the expectation of accommodation as possible autonomic indicator of cognitive demand was not confirmed, the present results are informative for the field of applied psychophysiology noting that it seems not to be worthwhile to include closed-loop accommodation in future studies. From a human factors perspective, expected changes of accommodation due to cognitive demand are of minor importance for design specifications – of, for example, complex visual displays. PMID:18721478

  17. Measuring Productive Elements of Multi-Word Phrase Vocabulary Knowledge among Children with English as an Additional or Only Language

    ERIC Educational Resources Information Center

    Smith, Sara A.; Murphy, Victoria A.

    2015-01-01

    Vocabulary plays a critical role in language and reading development for children, particularly those learning English as an additional language (EAL) (Stahl & Nagy, 2006). Previous research on vocabulary has mainly focused on measuring individual words without considering multi-word phrase knowledge, despite evidence that these items occur…

  18. [What additional measures should be recommended in atopic dermatitis in children?].

    PubMed

    Boralevi, F

    2005-01-01

    The so-called 'adjuvant' measures are an important part of atopic dermatitis (AD) consultations. The practitioner is the 'expert' in the patients' eyes in prescribing, proposing, counselling and replying to the questions concerning moisturizers, thermal spring water cures, the resort to alternative medical, and vaccinations. Moisturizers are aimed at rapidly restoring water in the epidermis, decreasing the sensitivity to irritants and improving the patients' comfort. The available products are usually composed of water, occlusive agents, humidifiers, varyingly combined with tensioactive agents, preservatives and perfumes... Their short term efficacy has been demonstrated, but no study has shown superiority of one product over another. The recommended treatment is 1 to 2 daily applications of a cream or lotion, selected among the products having demonstrated their efficacy, contained the least amount of irritant or sensitizers, the presentation and cost of which is acceptable to the patient. There are no arguments to recommend moisturizers in the absence of xerosis, nor for prolonged periods of clinical remission. Spring water thermal cures. In France there are many cure centres and the spring waters used are distinguished by their clinical or physical features. Although there are no studies that clearly establish their efficacy in AD, the craze and satisfaction of many patients for spring water thermal cures must be taken into consideration, as well as the educational dimension, in the hopes that a consensus will be reached and that regular assessments be made. Alternative medical practices, such as homeopathy or acupuncture, represent a therapeutic alternative chosen by more than one third of patients with AD. However, no study has sufficiently demonstrated the interest of these alternatives and they cannot therefore be integrated in the validated arsenal of treatments. Used in various oriental countries, Chinese herbs have been the subject of controlled studies

  19. New security measures are proposed for N-plants: Insider Rule package is issued by NRC

    SciTech Connect

    Not Available

    1984-09-01

    New rules proposed by the Nuclear Regulatory Commission (NRC) will require background investigations and psychological assessments of new job candidates and continual monitoring of the behavior of all power plant workers with access to sensitive areas. Licensees will have to submit an ''access authorization'' program for approval describing how they will conduct these security activities. The employee checks will go back five years to examine credit, educational, and criminal histories. Implementation of the rules could involve the Edison Electric Institute as an intermediary to funnel criminal checks from the Justice Department and FBI. The NRC is also considering a clarification of areas designated as ''vital'' because current designations may be too strict.

  20. Additional Value of CH₄ Measurement in a Combined (13)C/H₂ Lactose Malabsorption Breath Test: A Retrospective Analysis.

    PubMed

    Houben, Els; De Preter, Vicky; Billen, Jaak; Van Ranst, Marc; Verbeke, Kristin

    2015-09-07

    The lactose hydrogen breath test is a commonly used, non-invasive method for the detection of lactose malabsorption and is based on an abnormal increase in breath hydrogen (H₂) excretion after an oral dose of lactose. We use a combined (13)C/H₂ lactose breath test that measures breath (13)CO₂ as a measure of lactose digestion in addition to H₂ and that has a better sensitivity and specificity than the standard test. The present retrospective study evaluated the results of 1051 (13)C/H₂ lactose breath tests to assess the impact on the diagnostic accuracy of measuring breath CH₄ in addition to H₂ and (13)CO₂. Based on the (13)C/H₂ breath test, 314 patients were diagnosed with lactase deficiency, 138 with lactose malabsorption or small bowel bacterial overgrowth (SIBO), and 599 with normal lactose digestion. Additional measurement of CH₄ further improved the accuracy of the test as 16% subjects with normal lactose digestion and no H₂-excretion were found to excrete CH₄. These subjects should have been classified as subjects with lactose malabsorption or SIBO. In conclusion, measuring CH₄-concentrations has an added value to the (13)C/H₂ breath test to identify methanogenic subjects with lactose malabsorption or SIBO.

  1. Additional Value of CH₄ Measurement in a Combined (13)C/H₂ Lactose Malabsorption Breath Test: A Retrospective Analysis.

    PubMed

    Houben, Els; De Preter, Vicky; Billen, Jaak; Van Ranst, Marc; Verbeke, Kristin

    2015-09-01

    The lactose hydrogen breath test is a commonly used, non-invasive method for the detection of lactose malabsorption and is based on an abnormal increase in breath hydrogen (H₂) excretion after an oral dose of lactose. We use a combined (13)C/H₂ lactose breath test that measures breath (13)CO₂ as a measure of lactose digestion in addition to H₂ and that has a better sensitivity and specificity than the standard test. The present retrospective study evaluated the results of 1051 (13)C/H₂ lactose breath tests to assess the impact on the diagnostic accuracy of measuring breath CH₄ in addition to H₂ and (13)CO₂. Based on the (13)C/H₂ breath test, 314 patients were diagnosed with lactase deficiency, 138 with lactose malabsorption or small bowel bacterial overgrowth (SIBO), and 599 with normal lactose digestion. Additional measurement of CH₄ further improved the accuracy of the test as 16% subjects with normal lactose digestion and no H₂-excretion were found to excrete CH₄. These subjects should have been classified as subjects with lactose malabsorption or SIBO. In conclusion, measuring CH₄-concentrations has an added value to the (13)C/H₂ breath test to identify methanogenic subjects with lactose malabsorption or SIBO. PMID:26371034

  2. Routing Corners of Building Structures - by the Method of Vector Addition - Measured with RTN GNSS Surveying Technology

    NASA Astrophysics Data System (ADS)

    Krzyżek, Robert

    2015-12-01

    The paper deals with the problem of surveying buildings in the RTN GNSS mode using modernized indirect methods of measurement. As a result of the classical realtime measurements using indirect methods (intersection of straight lines or a point on a straight line), we obtain a building structure (a building) which is largely deformed. This distortion is due to the inconsistency of the actual dimensions of the building (tie distances) relative to the obtained measurement results. In order to eliminate these discrepancies, and thus to ensure full consistency of the building geometric structure, an innovative solution was applied - the method of vector addition - to modify the linear values (tie distances) of the external face of the building walls. A separate research problem tackled in the article, although not yet fully solved, is the issue of coordinates of corners of a building obtained after the application of the method of vector addition.

  3. Combined analysis of passive and active seismic measurements using additional geologic data for the determination of shallow subsurface structures

    NASA Astrophysics Data System (ADS)

    Horstmann, Tobias; Brüstle, Andrea; Spies, Thomas; Schlittenhardt, Jörg; Schmidt, Bernd

    2016-04-01

    A detailed knowledge of subsurface structure is essential for geotechnical projects and local seismic hazard analyses. Passive seismic methods like microtremor measurements are widely used in geotechnical practice, but limitations and developments are still in focus of scientific discussion. The presentation outlines microtremor measurements in the context of microzonation in the scale of districts or small communities. H/V measurements are used to identify zones with similar underground properties. Subsequently a shear wave velocity (Vs) depth profile for each zone is determined by array measurements at selected sites. To reduce possible uncertainties in dispersion curve analyses of passive array measurements and ambiguities within the inversion process, we conducted an additional active seismic experiment and included available geological information. The presented work is realized in the framework of the research project MAGS2 ("Microseismic Activity of Geothermal Systems") and deals with the determination of seismic hazard analysis at sites near deep geothermal power plants in Germany. The measurements were conducted in the Upper Rhine Graben (URG) and the Bavarian molasses, where geothermal power plants are in operation. The results of the H/V- and array-measurements in the region of Landau (URG) are presented and compared to known geological-tectonic structures. The H/V measurements show several zones with similar H/V-curves which indicate homogenous underground properties. Additionally to the passive seismic measurements an active refraction experiment was performed and evaluated using the MASW method („Multichannel Analysis of Surface Waves") to strengthen the determination of shear-wave-velocity depth profile. The dispersion curves for Rayleigh-waves of the active experiment support the Rayleigh-dispersion curves from passive measurements and therefore provide a valuable supplement. Furthermore, the Rayleigh-wave ellipticity was calculated to reduce

  4. Assessing the internal validity of a household survey-based food security measure adapted for use in Iran

    PubMed Central

    Rafiei, Morteza; Nord, Mark; Sadeghizadeh, Atefeh; Entezari, Mohammad H

    2009-01-01

    Background The prevalence of food insecurity is an indicator of material well-being in an area of basic need. The U.S. Food Security Module has been adapted for use in a wide variety of cultural and linguistic settings around the world. We assessed the internal validity of the adapted U.S. Household Food Security Survey Module to measure adult and child food insecurity in Isfahan, Iran, using statistical methods based on the Rasch measurement model. Methods The U.S. Household Food Security Survey Module was translated into Farsi and after adaptation, administered to a representative sample. Data were provided by 2,004 randomly selected households from all sectors of the population of Isfahan, Iran, during 2005. Results 53.1 percent reported that their food had run out at some time during the previous 12 months and they did not have money to buy more, while 26.7 percent reported that an adult had cut the size of a meal or skipped a meal because there was not enough money for food, and 7.2 percent reported that an adult did not eat for a whole day because there was not enough money for food. The severity of the items in the adult scale, estimated under Rasch-model assumptions, covered a range of 6.65 logistic units, and those in the child scale 11.68 logistic units. Most Item-infit statistics were near unity, and none exceeded 1.20. Conclusion The range of severity of items provides measurement coverage across a wide range of severity of food insecurity for both adults and children. Both scales demonstrated acceptable levels of internal validity, although several items should be improved. The similarity of the response patterns in the Isfahan and the U.S. suggests that food insecurity is experienced, managed, and described similarly in the two countries. PMID:19558676

  5. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  6. PREFACE: 2014 Joint IMEKO TC1-TC7-TC13 Symposium: Measurement Science Behind Safety and Security

    NASA Astrophysics Data System (ADS)

    Sousa, João A.; Ribeiro, Álvaro S.; Filipe, Eduarda

    2015-02-01

    The 2014 Joint IMEKO (International Measurement Confederation) TC1-TC7-TC13 Symposium was organized by RELACRE - Portuguese Association of Accredited Laboratories and the Portuguese Society for Metrology, on 3-5 September 2014. The work of this symposium is reported in this volume. The scope of the symposium includes the main topics covered by the above Technical Committees: - TC1 Education and Training in measurement and Instrumentation - TC7 Measurement Science - TC13 Measurements in Biology and Medicine The effort towards excellence of previous events, in this well established series, is maintained. There has been a special focus on measurement science behind safety and security, with the aim of highlighting the interdisciplinary character of measurement science and the importance of metrology in our daily lives. The discussion was introduced by keynote lectures on measurement challenges in biometrics, health monitoring and social sciences, to promote useful interactions with scientists from different disciplines. The Symposium was attended by experts working in these areas from 18 countries, including USA, Japan and China, and provided a useful forum for them to share and exchange their work and ideas. In total over fifty papers are included in the volume, organized according to the presentation sessions. Each paper was independently peer-reviewed by two reviewers from a distinguished international panel. The Symposium was held in Funchal, capital of Madeira Islands, known as the Atlantic Pearl. This wonderful Atlantic archipelago, formed by Madeira and Porto Santo islands, discovered in the 14th century, was chosen to host the 2014 IMEKO TC1-TC7-TC13 Joint Symposium ''Measurement Science behind Safety and Security''. It was the first territory discovered by the Portuguese sailors, when set out to discover a new world, in an epic journey where instrumentation and quality of measurement played a central role in the success of the enterprise, and gave an

  7. Measurements at Los Alamos National Laboratory Plutonium Facility in Support of Global Security Mission Space

    SciTech Connect

    Stange, Sy; Mayo, Douglas R.; Herrera, Gary D.; McLaughlin, Anastasia D.; Montoya, Charles M.; Quihuis, Becky A.; Trujillo, Julio B.; Van Pelt, Craig E.; Wenz, Tracy R.

    2012-07-13

    The Los Alamos National Laboratory Plutonium Facility at Technical Area (TA) 55 is one of a few nuclear facilities in the United States where Research & Development measurements can be performed on Safeguards Category-I (CAT-I) quantities of nuclear material. This capability allows us to incorporate measurements of CAT-IV through CAT-I materials as a component of detector characterization campaigns and training courses conducted at Los Alamos. A wider range of measurements can be supported. We will present an overview of recent measurements conducted in support of nuclear emergency response, nuclear counterterrorism, and international and domestic safeguards. This work was supported by the NNSA Office of Counterterrorism.

  8. Analysis of the laser powder bed fusion additive manufacturing process through experimental measurement and finite element modeling

    NASA Astrophysics Data System (ADS)

    Dunbar, Alexander Jay

    The objective in this work is to provide rigourous experimental measurements to aid in the development of laser powder bed fusion (LPBF) additive manufacturing (AM). A specialized enclosed instrumented measurement system is designed to provide in situ experimental measurements of temperature and distortion. Experiments include comparisons of process parameters, materials and LPBF machines. In situ measurements of distortion and temperature made throughout the build process highlight inter-layer distortion effects previously undocumented for laser powder bed fusion. Results from these experiments are also be implemented in the development and validation of finite element models of the powder bed build process. Experimental analysis is extended from small-scale to larger part-scale builds where experimental post-build measurements are used in analysis of distortion profiles. Experimental results provided from this study are utilized in the validation of a finite element model capable of simulating production scale parts. The validated finite element model is then implemented in the analysis of the part to provide information regarding the distortion evolution process. A combination of experimental measurements and simulation results are used to identify the mechanism that results in the measured distortion profile for this geometry. Optimization of support structure primarily focuses on the minimization of material use and scan time, but no information regarding failure criteria for support structure is available. Tensile test samples of LPBF built support structure are designed, built, and tested to provide measurements of mechanical properties of the support structure. Experimental tests show that LPBF built support structure has only 30-40% of the ultimate tensile strength of solid material built in the same machine. Experimental measurement of LPBF built support structure provides clear failure criteria to be utilized in the future design and implementation of

  9. Influence of oxygen addition to the carrier gas on laser-induced breakdown spectroscopy measurements on aerosols

    NASA Astrophysics Data System (ADS)

    Palazzo, N.; Migliorini, F.; Dondè, R.; Maffi, S.; De Iuliis, S.

    2016-01-01

    In this work, laser-induced breakdown spectrosopy is implemented on aerosol particles for absolute concentration analysis. The aim of this work is the investigation of the effect of the bath gas used for nebulizing the aerosol. Nitrogen, air, and 50% O2 in N2 mixture have been chosen as carrier gasses in order to analyze the effect of oxygen addition to the gas. LIBS measurements have been carried out on aerosol particles produced from CuCl2 2H2O solutions, and the 324.7 nm Cu line is considered. As a first analysis, plasma parameters, such as temperature and electron density, have been evaluated changing the carrier gas. Measurements to derive the LIBS calibration curve of the 324.7 nm Cu line are carried out in air and in N2. The significant difference in the slope of the resulting calibration curves has to be attributed to the oxygen addition to the bath gas. To explore such behavior, time-resolved measurements of the Cu line and peak/base ratio have been performed. The presence of two competitive effects have been observed that becomes significant increasing the amount of oxygen in the carrier gas. One is the oxygen-quenching effect, already observed in the literature, and the other one is the enhancement of the Cu LIBS signal, expecially at short delay times. These effects have been observed also at other Cu lines and changing the analyte source. The results are presented and widely discussed.

  10. Effect of polyglycerol esters additive on palm oil crystallization using focused beam reflectance measurement and differential scanning calorimetry.

    PubMed

    Saw, M H; Hishamuddin, E; Chong, C L; Yeoh, C B; Lim, W H

    2017-01-01

    The effect of 0.1-0.7% (w/w) of polyglycerol esters (PGEmix-8) on palm oil crystallization was studied using focused beam reflectance measurement (FBRM) to analyze the in-line changes of crystal size distribution during the crystallization. FBRM results show that 0.1-0.5% (w/w) of PGEmix-8 did not significantly affect nucleation but slightly retarded crystal growth. The use of 0.7% (w/w) additive showed greater heterogeneous nucleation compared to those with lower dosages of additive. Crystal growth was also greatly reduced when using 0.7% (w/w) dosage. The morphological study indicated that the palm oil crystals were smaller and more even in size than when more additive was added. Isothermal crystallization studies using differential scanning calorimetry (DSC) showed increased inhibitory effects on palm oil crystal growth with increasing concentration of PGEmix-8. These results imply that PGEmix-8 is a nucleation enhancing and crystal growth retarding additive in palm oil crystallization at 0.7% (w/w) dosage.

  11. Effect of polyglycerol esters additive on palm oil crystallization using focused beam reflectance measurement and differential scanning calorimetry.

    PubMed

    Saw, M H; Hishamuddin, E; Chong, C L; Yeoh, C B; Lim, W H

    2017-01-01

    The effect of 0.1-0.7% (w/w) of polyglycerol esters (PGEmix-8) on palm oil crystallization was studied using focused beam reflectance measurement (FBRM) to analyze the in-line changes of crystal size distribution during the crystallization. FBRM results show that 0.1-0.5% (w/w) of PGEmix-8 did not significantly affect nucleation but slightly retarded crystal growth. The use of 0.7% (w/w) additive showed greater heterogeneous nucleation compared to those with lower dosages of additive. Crystal growth was also greatly reduced when using 0.7% (w/w) dosage. The morphological study indicated that the palm oil crystals were smaller and more even in size than when more additive was added. Isothermal crystallization studies using differential scanning calorimetry (DSC) showed increased inhibitory effects on palm oil crystal growth with increasing concentration of PGEmix-8. These results imply that PGEmix-8 is a nucleation enhancing and crystal growth retarding additive in palm oil crystallization at 0.7% (w/w) dosage. PMID:27507476

  12. 20 CFR 664.210 - How is the “requires additional assistance to complete an educational program, or to secure and...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ..., DEPARTMENT OF LABOR (CONTINUED) YOUTH ACTIVITIES UNDER TITLE I OF THE WORKFORCE INVESTMENT ACT Eligibility for Youth Services § 664.210 How is the “requires additional assistance to complete an...

  13. 20 CFR 664.210 - How is the “requires additional assistance to complete an educational program, or to secure and...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ..., DEPARTMENT OF LABOR (CONTINUED) YOUTH ACTIVITIES UNDER TITLE I OF THE WORKFORCE INVESTMENT ACT Eligibility for Youth Services § 664.210 How is the “requires additional assistance to complete an...

  14. 20 CFR 664.210 - How is the “requires additional assistance to complete an educational program, or to secure and...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., DEPARTMENT OF LABOR (CONTINUED) YOUTH ACTIVITIES UNDER TITLE I OF THE WORKFORCE INVESTMENT ACT Eligibility for Youth Services § 664.210 How is the “requires additional assistance to complete an...

  15. Review on measurement techniques of transport properties of nanowires Additions and Corrections. See DOI:10.1039/C3NR03242F Click here for additional data file.

    PubMed Central

    Rojo, Miguel Muñoz; Calero, Olga Caballero; Lopeandia, A. F.; Rodriguez-Viejo, J.

    2013-01-01

    Physical properties at the nanoscale are novel and different from those in bulk materials. Over the last few decades, there has been an ever growing interest in the fabrication of nanowire structures for a wide variety of applications including energy generation purposes. Nevertheless, the study of their transport properties, such as thermal conductivity, electrical conductivity or Seebeck coefficient, remains an experimental challenge. For instance, in the particular case of nanostructured thermoelectrics, theoretical calculations have shown that nanowires offer a promising way of enhancing the hitherto low efficiency of these materials in the conversion of temperature differences into electricity. Therefore, within the thermoelectrical community there has been a great experimental effort in the measurement of these quantities in actual nanowires. The measurements of these properties at the nanoscale are also of interest in fields other than energy, such as electrical components for microchips, field effect transistors, sensors, and other low scale devices. For all these applications, knowing the transport properties is mandatory. This review deals with the latest techniques developed to perform the measurement of these transport properties in nanowires. A thorough overview of the most important and modern techniques used for the characterization of different kinds of nanowires will be shown. PMID:24113712

  16. The 1998-2000 SHADOZ (Southern Hemisphere ADditional Ozonesondes) Tropical Ozone Climatology: Comparison with TOMS and Ground-Based Measurements

    NASA Technical Reports Server (NTRS)

    Thompson, Anne M.; Witte, Jacquelyn; McPeters, Richard D.; Oltmans, Samuel J.; Schmidlin, Francis J.; Logan, Jennifer A.; Fujiwara, Masatormo; Kirchhoff, Volker W. J. H.; Posny, Francoise; Coetzee, Gerhard J. R.; Bhartia, P. K. (Technical Monitor)

    2001-01-01

    A network of 10 southern hemisphere tropical and Subtropical stations, designated the Southern Hemisphere ADditional OZonesondes, (SHADOZ) project and established from operational sites, provided over 1000 ozone profiles during the period 1998-2000. Balloon-borne electrochemical concentration cell (ECC) ozonesondes, combined with standard radiosondes for pressure, temperature and relative humidity measurements, collected profiles in the troposphere and lower- to mid-stratosphere at: Ascension Island; Nairobi, Kenya; Irene, South Africa: Reunion Island, Watukosek Java; Fiji; Tahiti; American Samoa; San Cristobal, Galapagos; Natal, Brazil.

  17. A new life for a 10-year old MueTec2010 CD measurement system: the ultimate precision upgrade with additional film thickness measurement capability

    NASA Astrophysics Data System (ADS)

    Cassol, Gian Luca; Bianucci, Giovanni; Murai, Shiaki; Falk, Günther; Scheuring, Gerd; Döbereiner, Stefan; Brück, Hans-Jürgen

    2006-06-01

    A 10-year old MueTec2010, white light CD measurement system, installed at DNP Photomask Europe and previously owned by STMicroelectronics, has been upgraded to fulfill the high-end optical CD measurement requirements, and to add the film thickness measurement capability. That is the ultimate upgrade, consisting of two new computers with WINDOWS 2000 operating system, a new 150X measurement objective, a new 16-bit CCD digital camera, a new tube lens for the old Leica Ergoplan microscope, and the NanoStar software with the pattern recognition option. The upgrade yielded an average 45% repeatability improvement for isolated and dense lines and spaces, with 1.2nm average repeatability in a 0.3-10μm CD nominal range. Contact holes report an average 50% repeatability improvement, with 2.5nm average repeatability. The improved precision allows a +/-2-nm CD calibration and correlation down to 0.4μm CD nominal. Overall, the upgraded MueTec2010 shows same or better performance than the already installed Leica LWM250UV CD measurement system, despite the longer illumination wavelength of the former. The improved short and long term repeatability reduced the Gauge RandR figure from 24% to 11% at +/-20nm tolerance, which qualifies the system for high-end binary mask down to 0.5μm CD nominal. The feasibility to calibrate the system for 248nm Molybdenum Silicide Phase Shifting Masks is currently being investigated. In addition to that, the new measurement algorithms, the capability to take multiple measurements within the FOV, and the pattern recognition capability included in the NanoStar software gave a 75% throughput boost to the fully automated macros for the weekly calibration tests of the laser writing tools, compared to the LWM250UV run time. With little additional hardware and software, the system has also been upgraded to include the film thickness measurement capability for the PSM resist coating process (2nd exposure), without the need for a dedicated, more expensive

  18. Photon Doppler Velocimeter to Measure Entrained Additive Manufactured Bulk Metal Powders in Hot Subsonic and Supersonic Oxygen Gas

    NASA Technical Reports Server (NTRS)

    Tylka, Jonathan

    2016-01-01

    Parts produced by additive manufacturing, particularly selective laser melting (SLM), have been shown to silt metal particulate even after undergoing stringent precision aerospace cleaning processes (Lowrey 2016). As printed parts are used in oxygen systems with increased pressures, temperatures, and gas velocity, the risk of ignition by particle impact, the most common direct ignition source of metals in oxygen, substantially increases. The White Sands Test Facility (WSTF), in collaboration with Marshall Space Flight Center (MSFC), desires to test the ignitability of SLM metals by particle impact in heated oxygen. The existing test systems rely on gas velocity calculations to infer particle velocity in both subsonic and supersonic particle impact systems. Until now, it was not possible to directly measure particle velocity. To increase the fidelity of planned SLM ignition studies, it is necessary to validate that the Photon Doppler Velocimetry(PDV) test system can accurately measure particle velocity.

  19. Alternative security

    SciTech Connect

    Weston, B.H. )

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview.

  20. Measuring Sustainability: Deriving Metrics From A Secure Human-Environment Relationship

    EPA Science Inventory

    The ability of individuals and institutions to take actions that would achieve sustainability is often lost in rhetoric about what it is or isn't and how to measure progress. Typically, sustainability is viewed as an objective and in this capacity efforts are made to identify i...

  1. Determination of dielectric material properties using passive MMW measurements for security applications

    NASA Astrophysics Data System (ADS)

    Dill, Stephan; Peichl, Markus; Suess, Helmut

    2007-04-01

    Microwaves can be used to detect hidden objects behind optically opaque materials. Hence, the penetration capability through such materials is of fundamental importance. In order to characterize a material of interest in the microwave region, its permittivity should be known besides its physical structure. In many cases the permittivity is unknown, inaccurately known, or known for only specific frequencies. Also very often the range of values given in the literature can have a large variability for a specific situation. In this paper we describe a procedure to determine the permittivity from radiometric free space measurements of nearly arbitrary materials. The advantage of this method is that large material samples like brick or wooden plates, and materials like textiles, which are hard to mount in a defined way in a waveguide, can be studied. An earlier presented method has been improved to obtain more accurate results. Some representative results for those MMW measurements are shown. The first attempts showed a satisfying performance.

  2. Radiometric measurements of dielectric material properties at MMW frequencies for security applications

    NASA Astrophysics Data System (ADS)

    Peichl, Markus; Dill, Stephan; Suess, Helmut

    2006-05-01

    Microwaves can be used to detect hidden objects behind optically opaque materials. Hence, the penetration capability through such materials is of fundamental importance. In order to characterise a material of interest in the microwave region, its permittivity should be known besides its physical structure. In many cases the permittivity is unknown, inaccurately known, or known for only specific frequencies. Also very often the range of values given in the literature can have a large variability for a specific situation. In this paper we describe a procedure to determine the permittivity from radiometric free-space measurements of nearly arbitrary materials. The advantage of this method is that large material samples like brick or wooden plates, and materials like textiles, which are hard to mount in a defined way in a waveguide, can be investigated. Some representative results for MMW measurements are shown, and an estimation of the presently achieved precision is given. The first attempts showed a satisfying performance, although not for all materials and frequencies a unique solution could be found.

  3. Integrating Multi-Sensor Remote Sensing and In-situ Measurements for Africa Drought Monitoring and Food Security Assessment

    NASA Astrophysics Data System (ADS)

    Hao, X.; Qu, J. J.; Motha, R. P.; Stefanski, R.; Malherbe, J.

    2014-12-01

    Drought is one of the most complicated natural hazards, and causes serious environmental, economic and social consequences. Agricultural production systems, which are highly susceptible to weather and climate extremes, are often the first and most vulnerable sector to be affected by drought events. In Africa, crop yield potential and grazing quality are already nearing their limit of temperature sensitivity, and, rapid population growth and frequent drought episodes pose serious complications for food security. It is critical to promote sustainable agriculture development in Africa under conditions of climate extremes. Soil moisture is one of the most important indicators for agriculture drought, and is a fundamentally critical parameter for decision support in crop management, including planting, water use efficiency and irrigation. While very significant technological advances have been introduced for remote sensing of surface soil moisture from space, in-situ measurements are still critical for calibration and validation of soil moisture estimation algorithms. For operational applications, synergistic collaboration is needed to integrate measurements from different sensors at different spatial and temporal scales. In this presentation, a collaborative effort is demonstrated for drought monitoring in Africa, supported and coordinated by WMO, including surface soil moisture and crop status monitoring. In-situ measurements of soil moisture, precipitation and temperature at selected sites are provided by local partners in Africa. Measurements from the Soil Moisture and Ocean Salinity (SMOS) and the Moderate Resolution Imaging Spectroradiometer (MODIS) are integrated with in-situ observations to derive surface soil moisture at high spatial resolution. Crop status is estimated through temporal analysis of current and historical MODIS measurements. Integrated analysis of soil moisture data and crop status provides both in-depth understanding of drought conditions and

  4. Integrating Multi-Sensor Remote Sensing and In-situ Measurements for Africa Drought Monitoring and Food Security Assessment

    NASA Astrophysics Data System (ADS)

    Hao, X.; Qu, J. J.; Motha, R. P.; Stefanski, R.; Malherbe, J.

    2015-12-01

    Drought is one of the most complicated natural hazards, and causes serious environmental, economic and social consequences. Agricultural production systems, which are highly susceptible to weather and climate extremes, are often the first and most vulnerable sector to be affected by drought events. In Africa, crop yield potential and grazing quality are already nearing their limit of temperature sensitivity, and, rapid population growth and frequent drought episodes pose serious complications for food security. It is critical to promote sustainable agriculture development in Africa under conditions of climate extremes. Soil moisture is one of the most important indicators for agriculture drought, and is a fundamentally critical parameter for decision support in crop management, including planting, water use efficiency and irrigation. While very significant technological advances have been introduced for remote sensing of surface soil moisture from space, in-situ measurements are still critical for calibration and validation of soil moisture estimation algorithms. For operational applications, synergistic collaboration is needed to integrate measurements from different sensors at different spatial and temporal scales. In this presentation, a collaborative effort is demonstrated for drought monitoring in Africa, supported and coordinated by WMO, including surface soil moisture and crop status monitoring. In-situ measurements of soil moisture, precipitation and temperature at selected sites are provided by local partners in Africa. Measurements from the Soil Moisture and Ocean Salinity (SMOS) and the Moderate Resolution Imaging Spectroradiometer (MODIS) are integrated with in-situ observations to derive surface soil moisture at high spatial resolution. Crop status is estimated through temporal analysis of current and historical MODIS measurements. Integrated analysis of soil moisture data and crop status provides both in-depth understanding of drought conditions and

  5. A City and National Metric measuring Isolation from the Global Market for Food Security Assessment

    NASA Technical Reports Server (NTRS)

    Brown, Molly E.; Silver, Kirk Coleman; Rajagopalan, Krishnan

    2013-01-01

    The World Bank has invested in infrastructure in developing countries for decades. This investment aims to reduce the isolation of markets, reducing both seasonality and variability in food availability and food prices. Here we combine city market price data, global distance to port, and country infrastructure data to create a new Isolation Index for countries and cities around the world. Our index quantifies the isolation of a city from the global market. We demonstrate that an index built at the country level can be applied at a sub-national level to quantify city isolation. In doing so, we offer policy makers with an alternative metric to assess food insecurity. We compare our isolation index with other indices and economic data found in the literature.We show that our Index measures economic isolation regardless of economic stability using correlation and analysis

  6. Climate-derived tensions in Arctic security.

    SciTech Connect

    Backus, George A.; Strickland, James Hassler

    2008-09-01

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  7. Investigation of security related fully polarimetric signatures of radiometer measurements at W band

    NASA Astrophysics Data System (ADS)

    Dill, Stephan; Peichl, Markus; Rudolf, Daniel

    2011-11-01

    The actual and continuous threat by international terrorism and the increasing number of terroristic attacks raise the danger to the public and create a new and more complex dimension of threat. This evolution must and can only be combat by the application of new counter-measures like advanced imaging technologies for wide-area surveillance and the detection of concealed dangerous objects. Passive microwave remote sensing allows a daytime independent non-destructive observation and examination of the objects of interest under nearly all weather conditions without artificial exposure of persons and observation areas, hence fully avoiding health risks. Furthermore the acquisition of polarimetric object characteristics can increase the detection capability by gathering complementary object information. The recent development and construction of a fullypolarimetric receiver at W band allows the acquisition of a new dimension of information compared to former imaging capabilities. The new receiver can be part of various imaging systems used at DLR over the years. This paper will show some imaging results recorded recently from different sceneries.

  8. Measuring the Effectiveness of Information Security Training: A Comparative Analysis of Computer-Based Training and Instructor-Based Training

    ERIC Educational Resources Information Center

    Kim, Philip

    2010-01-01

    Financial institutions are increasingly finding difficulty defending against information security risks and threats, as they are often the number one target for information thieves. An effective information security training and awareness program can be a critical component of protecting an organization's information assets. Many financial…

  9. Measuring the Effectiveness of Visual Analytics and Data Fusion Techniques on Situation Awareness in Cyber-Security

    ERIC Educational Resources Information Center

    Giacobe, Nicklaus A.

    2013-01-01

    Cyber-security involves the monitoring a complex network of inter-related computers to prevent, identify and remediate from undesired actions. This work is performed in organizations by human analysts. These analysts monitor cyber-security sensors to develop and maintain situation awareness (SA) of both normal and abnormal activities that occur on…

  10. Predicting Perceptions of Fear at School and Going to and from School for African American and White Students: The Effects of School Security Measures

    ERIC Educational Resources Information Center

    Bachman, Ronet; Randolph, Antonia; Brown, Bethany L.

    2011-01-01

    This article uses the School Crime Supplement of the National Crime Victimization Survey to investigate the factors related to White and African American students' perceived levels of fear of harm, while at school and while commuting to and from school. Of particular interest were the effects of school security measures, including metal detectors,…

  11. Security Evolution.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  12. Collection Security.

    ERIC Educational Resources Information Center

    Boss, Richard W.

    1984-01-01

    Presents a systematic approach to the problem of security of library collections and facilities from theft and vandalism. Highlights include responses to losses, defining security needs, typical weaknesses of facilities, policies and procedures that weaken a library's security, conducting a security audit, cost of security, cost-effectiveness, and…

  13. Gross anatomy of network security

    NASA Technical Reports Server (NTRS)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  14. An ounce of prevention vs. a pound of cure: How can we measure the value of IT security solutions?

    SciTech Connect

    Arora, Ashish; Hall, Dennis; Pinto, C. Ariel; Ramsey, Dwayne; Telang, Rahul

    2004-01-12

    This article discusses a framework to evaluate the costs and benefits of IT security solutions using a company's risk profile. This method uses an unconventional concept of benefit based on risk avoided rather than increased productivity.

  15. Securing collaborative environments

    SciTech Connect

    Agarwal, Deborah; Jackson, Keith; Thompson, Mary

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  16. Additional security features for optically variable foils

    NASA Astrophysics Data System (ADS)

    Marshall, Allan C.; Russo, Frank

    1998-04-01

    For thousands of years, man has exploited the attraction and radiance of pure gold to adorn articles of great significance. Today, designers decorate packaging with metallic gold foils to maintain the prestige of luxury items such as perfumes, chocolates, wine and whisky, and to add visible appeal and value to wide range of products. However, today's products do not call for the hand beaten gold leaf of the Ancient Egyptians, instead a rapid production technology exists which makes use of accurately coated thin polymer films and vacuum deposited metallic layers. Stamping Foils Technology is highly versatile since several different layers may be combined into one product, each providing a different function. Not only can a foil bring visual appeal to an article, it can provide physical and chemical resistance properties and also protect an article from human forms of interference, such as counterfeiting, copying or tampering. Stamping foils have proved to be a highly effective vehicle for applying optical devices to items requiring this type of protection. Credit cards, bank notes, personal identification documents and more recently high value packaged items such as software and perfumes are protected by optically variable devices applied using stamping foil technology.

  17. Process Control Systems in the Chemical Industry: Safety vs. Security

    SciTech Connect

    Jeffrey Hahn; Thomas Anderson

    2005-04-01

    Traditionally, the primary focus of the chemical industry has been safety and productivity. However, recent threats to our nation’s critical infrastructure have prompted a tightening of security measures across many different industry sectors. Reducing vulnerabilities of control systems against physical and cyber attack is necessary to ensure the safety, security and effective functioning of these systems. The U.S. Department of Homeland Security has developed a strategy to secure these vulnerabilities. Crucial to this strategy is the Control Systems Security and Test Center (CSSTC) established to test and analyze control systems equipment. In addition, the CSSTC promotes a proactive, collaborative approach to increase industry's awareness of standards, products and processes that can enhance the security of control systems. This paper outlines measures that can be taken to enhance the cybersecurity of process control systems in the chemical sector.

  18. Statistical security for Social Security.

    PubMed

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts. PMID:22592944

  19. Standard addition flow method for potentiometric measurements at low concentration levels: application to the determination of fluoride in food samples.

    PubMed

    Galvis-Sánchez, Andrea C; Santos, João Rodrigo; Rangel, António O S S

    2015-02-01

    A standard addition method was implemented by using a flow manifold able to perform automatically multiple standard additions and in-line sample treatment. This analytical strategy was based on the in-line mixing of sample and standard addition solutions, using a merging zone approach. The flow system aimed to exploit the standard addition method to quantify the target analyte particularly in cases where the analyte concentration in the matrix is below the lower limit of linear response of the detector. The feasibility of the proposed flow configuration was assessed through the potentiometric determination of fluoride in sea salts of different origins and different types of coffee infusions. The limit of quantification of the proposed manifold was 5×10(-6) mol L(-1), 10-fold lower than the lower limit of linear response of the potentiometric detector used. A determination rate of 8 samples h(-1) was achieved considering an experimental procedure based on three standard additions per sample. The main advantage of the proposed strategy is the simple approach to perform multiple standard additions, which can be implemented with other ion selective electrodes, especially in cases when the primary ion is below the lower limit of linear response of the detector.

  20. School Safety and Security.

    ERIC Educational Resources Information Center

    California State Dept. of Education, Sacramento.

    This document offers additional guidelines for school facilities in California in the areas of safety and security, lighting, and cleanliness. It also offers a description of technology resources available on the World Wide Web. On the topic of safety and security, the document offers guidelines in the areas of entrances, doors, and controlled…

  1. Direct measurement of additional Ar-H2O vibration-rotation-tunneling bands in the millimeter-submillimeter range

    NASA Astrophysics Data System (ADS)

    Zou, Luyao; Widicus Weaver, Susanna L.

    2016-06-01

    Three new weak bands of the Ar-H2O vibration-rotation-tunneling spectrum have been measured in the millimeter wavelength range. These bands were predicted from combination differences based on previously measured bands in the submillimeter region. Two previously reported submillimeter bands were also remeasured with higher frequency resolution. These new measurements allow us to obtain accurate information on the Coriolis interaction between the 101 and 110 states. Here we report these results and the associated improved molecular constants.

  2. FOILFEST :community enabled security.

    SciTech Connect

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6

  3. Water security - Nation state and international security implications

    USGS Publications Warehouse

    Tindall, James A.; Andrew A. Campbell,

    2009-01-01

    A terrorist attack such as poisoning and sabotage of the national water supply and water-quality infrastructure of the continental United States or any country, could disrupt the delivery of vital human services, threaten both public health and the environment, potentially cause mass casualties and pose grave public concern for homeland security. Most significantly, an attack on water resources would weaken social cohesion and trust in government. A threat to continuity of services is a potential threat to continuity of government since both are necessary for continuity of operations. Water infrastructure is difficult to protect, as it extends over vast areas across the U.S. and for which ownership is overwhelmingly nonfederal (approximately 85 percent). Since the 9111 attacks, federal dam operators and water and wastewater utilities have established counter measures. Similar measures have been taken in countries around the world. These include enhanced physical security, improved coordination between corporate ownership, Department of Homeland Security, and local law enforcement, and research into risk assessment and vulnerability analysis to ensure greater system safety. A key issue is the proportionate additional resources directed at public and private sector specific priorities. Agencies that have the scientific and technological ability to leverage resources, exploit integrated science approaches, focus on interdisciplinary practices, utilize informatics expertise and employ a wide use of evolving technologies should play a key role in water security and related issues.

  4. Are Dietary Restraint Scales Valid Measures of Dietary Restriction? Additional Objective Behavioral and Biological Data Suggest Not

    PubMed Central

    Stice, Eric; Sysko, Robyn; Roberto, Christina A.; Allison, Shelley

    2009-01-01

    Prospective studies find that individuals with elevated dietary restraint scores are at increased risk for bulimic symptom onset, yet experiments find that assignment to energy-deficit diet interventions reduce bulimic symptoms. One explanation for the conflicting findings is that the dietary restraint scales used in the former studies do not actually identify individuals who are restraining their caloric intake. Thus, we tested whether dietary restraint scales showed inverse relations to objectively measured caloric intake in three studies. Four dietary restraint scales did not correlate with doubly labeled water estimates of caloric intake over a 2-week period (M r = .01). One scale showed a significant inverse correlation with objectively measured caloric intake during a regular meal ordered from an ecologically valid menu (M r = −.30), but a significant positive relation that was qualified by a significant quadratic effect, to objectively measured caloric intake during multiple eating episodes in the lab (M r = .32). In balance, results suggest that dietary restraint scales are not valid measures of dietary restriction, replicating findings from prior studies that examined objective measures of caloric intake. PMID:20006662

  5. National Security Technology Incubator Operations Plan

    SciTech Connect

    2008-04-30

    This report documents the operations plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The operation plan includes detailed descriptions of the structure and organization, policies and procedures, scope, tactics, and logistics involved in sustainable functioning of the NSTI program. Additionally, the operations plan will provide detailed descriptions of continuous quality assurance measures based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Forms that assist in operations of NSTI have been drafted and can be found as an attachment to the document.

  6. A rapid automated procedure for laboratory and shipboard spectrophotometric measurements of seawater alkalinity: continuously monitored single-step acid additions

    NASA Astrophysics Data System (ADS)

    Liu, X.; Byrne, R. H.; Lindemuth, M.; Easley, R. A.; Patsavas, M. C.

    2012-12-01

    An automated system for shipboard and laboratory alkalinity measurements is presented. The simple system, which consists of a Dosimat titrator to deliver acid volumetrically and a USB 4000 spectrophotometer to monitor the titration progress, provides fast, precise and accurate measurements of total alkalinity for oceanographic research. The analytical method is based on single-point HCl titrations of seawater samples of a known volume; bromol cresol purple is used as an indicator to determine the final pH. Field data from an Arctic cruise demonstrates accuracy and precision around 1 micro mol/kg and a sample processing rate of 6 min per sample.

  7. Network Security Is Manageable

    ERIC Educational Resources Information Center

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  8. Near-road modeling and measurement of cerium-containing particles generated by nanoparticle diesel fuel additive use

    EPA Science Inventory

    Cerium oxide nanoparticles (nCe) are used as a fuel-borne catalyst in diesel engines to reduce particulate emissions, yet the environmental and human health impacts of the exhaust particles are not well understood. To bridge the gap between emission measurements and ambient impac...

  9. New initiatives in materials security

    SciTech Connect

    Cynthia, G.; Jones, Ph.D.

    2008-07-01

    NRC Mission: To license and regulate the Nation's civilian use of byproduct, source, and special nuclear materials to ensure adequate protection of public health and safety, promote the common defense and security, and protect the environment. Scope of Responsibility: NRC's regulatory mission covers three main areas: - Reactors: commercial reactors for generating electric power and non-power reactors used for research, testing, and training; - Materials: uses of nuclear materials in medical, industrial, and academic settings and facilities that produce nuclear fuel; - Waste: transportation, storage, and disposal of nuclear materials and waste, and decommissioning of nuclear facilities from service. A Changing Environment: - National security is dominant concern; - Obtain appropriate balance between safety and Security initiatives and Operational activities; - Multiple layers of systems, infrastructures for various licensees. Effective Communication: Not easy; Sound bites galore; Nuclear 'phobia'; Acceptability of risk; Balance of cost and benefits; Responsibility of the regulator, licensees and radiation protection professionals. Prioritized Licensee Groups: - High priority: Panoramic irradiators; manufacturers/distributors; - Medium priority: medical and research facilities, radiography, well-logging, broad-scope licenses, self-shielded irradiators, open-field irradiators, and other licensees; - Low priority: Portable gauges. Increased Security Measures: Security Zone; Control Access; Monitor, Detect, Assess, and Respond; Transportation Security; Additional control to secure portable and mobile devices; Liaison with Local Law Enforcement Agencies; Background Investigations and Fingerprinting; License Verification; Document Retention; Information Protection; Orders/Legally binding requirements to more than 3000 licensees. Orders Issued: Large Panoramic Irradiators Security Measures (60 Orders issued 6/03, Inspections done); Manufacturing and Distribution Licensees

  10. 31 CFR 354.10 - Additional provisions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT REGULATIONS GOVERNING BOOK-ENTRY SECURITIES OF THE STUDENT LOAN MARKETING ASSOCIATION (SALLIE MAE) § 354.10 Additional provisions. (a) Additional... Securities in Book-entry System. The interest of a debtor in a Security Entitlement may be reached by...

  11. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... Security Administration--023 Workplace Violence Prevention Program System of Records AGENCY: Privacy Office..., ``Department of Homeland Security/Transportation Security Administration--023 Workplace Violence Prevention... and maintain records on their Workplace Violence Prevention Program. Additionally, the Department...

  12. Secure Quantum Technologies

    NASA Astrophysics Data System (ADS)

    Malik, Mehul

    Over the past three decades, quantum mechanics has allowed the development of technologies that provide unconditionally secure communication. In parallel, the quantum nature of the transverse electromagnetic field has spawned the field of quantum imaging that encompasses technologies such as quantum lithography, quantum ghost imaging, and high-dimensional quantum key distribution (QKD). The emergence of such quantum technologies also highlights the need for the development of accurate and efficient methods of measuring and characterizing the elusive quantum state itself. In this thesis, I present new technologies that use the quantum properties of light for security. The first of these is a technique that extends the principles behind QKD to the field of imaging and optical ranging. By applying the polarization-based BB84 protocol to individual photons in an active imaging system, we obtained images that were secure against any intercept-resend jamming attacks. The second technology presented in this thesis is based on an extension of quantum ghost imaging, a technique that uses position-momentum entangled photons to create an image of an object without directly gaining any spatial information from it. We used a holographic filtering technique to build a quantum ghost image identification system that uses a few pairs of photons to identify an object from a set of known objects. The third technology addressed in this thesis is a high-dimensional QKD system that uses orbital-angular-momentum (OAM) modes of light for encoding. Moving to a high-dimensional state space in QKD allows one to impress more information on each photon, as well as introduce higher levels of security. I discuss the development of two OAM-QKD protocols based on the BB84 and Ekert protocols of QKD. In addition, I present a study characterizing the effects of turbulence on a communication system using OAM modes for encoding. The fourth and final technology presented in this thesis is a relatively

  13. Security Locks

    ERIC Educational Resources Information Center

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions affected--perhaps the…

  14. National security in the third world

    SciTech Connect

    Al-Mashat, A.M.M.

    1985-01-01

    For nations of the Third World, national security poses serious dilemmas. Unlike Western nations, less-developed countries must balance the complex and often contradictory requirements of socio-economic and political development with problems of internal stability and the requirements of national defense. For these countries, a concept of national security that focuses primarily on the international threat system and its overt manifestations of wars and violence, ignoring domestic well-being, is inadequate on theoretical and pragmatic grounds. This book addresses the security problems of Third World states, arguing for new ways to define and measure national security so that the concept may be appropriately applied to the needs of developing countries. In addition, the author argues that the tranquility of a state, a concept traditionally linked with national security, cannot necessarily be associated with quality of life as measured by conventional means. Dr. Al-Mashat constructs a tranquility index for 95 developing nations and tests its relationship with the physical quality-of-life index to demonstrate this point. Attempts to improve quality of life, he suggests, may in many countries lead to a reduction in security unless simultaneous attempts are made to democratize the regime.

  15. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.

    PubMed

    Harrop, Wayne; Matteson, Ashley

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA.

  16. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.

    PubMed

    Harrop, Wayne; Matteson, Ashley

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA. PMID:24457326

  17. Applications for cyber security - System and application monitoring

    SciTech Connect

    Marron, J. E.

    2006-07-01

    Standard network security measures are adequate for defense against external attacks. However, many experts agree that the greater threat is from internal sources. Insiders with malicious intentions can change controller instructions, change alarm thresholds, and issue commands to equipment which can damage equipment and compromise control system integrity. In addition to strict physical security the state of the system must be continually monitored. System and application monitoring goes beyond the capabilities of network security appliances. It will include active processes, operating system services, files, network adapters and IP addresses. The generation of alarms is a crucial feature of system and application monitoring. The alarms should be integrated to avoid the burden on operators of checking multiple locations for security violations. Tools for system and application monitoring include commercial software, free software, and ad-hoc tools that can be easily created. System and application monitoring is part of a 'defense-in-depth' approach to a control network security plan. Layered security measures prevent an individual security measure failure from being exploited into a successful security breach. Alarming of individual failures is essential for rapid isolation and correction of single failures. System and application monitoring is the innermost layer of this defense strategy. (authors)

  18. Additional Value of CH4 Measurement in a Combined 13C/H2 Lactose Malabsorption Breath Test: A Retrospective Analysis

    PubMed Central

    Houben, Els; De Preter, Vicky; Billen, Jaak; Van Ranst, Marc; Verbeke, Kristin

    2015-01-01

    The lactose hydrogen breath test is a commonly used, non-invasive method for the detection of lactose malabsorption and is based on an abnormal increase in breath hydrogen (H2) excretion after an oral dose of lactose. We use a combined 13C/H2 lactose breath test that measures breath 13CO2 as a measure of lactose digestion in addition to H2 and that has a better sensitivity and specificity than the standard test. The present retrospective study evaluated the results of 1051 13C/H2 lactose breath tests to assess the impact on the diagnostic accuracy of measuring breath CH4 in addition to H2 and 13CO2. Based on the 13C/H2 breath test, 314 patients were diagnosed with lactase deficiency, 138 with lactose malabsorption or small bowel bacterial overgrowth (SIBO), and 599 with normal lactose digestion. Additional measurement of CH4 further improved the accuracy of the test as 16% subjects with normal lactose digestion and no H2-excretion were found to excrete CH4. These subjects should have been classified as subjects with lactose malabsorption or SIBO. In conclusion, measuring CH4-concentrations has an added value to the 13C/H2 breath test to identify methanogenic subjects with lactose malabsorption or SIBO. PMID:26371034

  19. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-09

    .... Electronic access is limited by computer security measures that are strictly enforced. TSA file areas are... SECURITY Privacy Act of 1974; Department of Homeland Security Transportation Security Administration--DHS/TSA-001 Transportation Security Enforcement Record System System of Records AGENCY: Privacy...

  20. 7 CFR 1738.22 - Loan security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 11 2011-01-01 2011-01-01 false Loan security. 1738.22 Section 1738.22 Agriculture... security. (a) RUS makes loans only if, in the judgment of the Administrator, the security therefore is...'s property and such additional security as RUS may require. If necessary, RUS will share in...

  1. 7 CFR 1738.22 - Loan security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Loan security. 1738.22 Section 1738.22 Agriculture... security. (a) RUS makes loans only if, in the judgment of the Administrator, the security therefore is...'s property and such additional security as RUS may require. If necessary, RUS will share in...

  2. Food additives

    PubMed Central

    Spencer, Michael

    1974-01-01

    Food additives are discussed from the food technology point of view. The reasons for their use are summarized: (1) to protect food from chemical and microbiological attack; (2) to even out seasonal supplies; (3) to improve their eating quality; (4) to improve their nutritional value. The various types of food additives are considered, e.g. colours, flavours, emulsifiers, bread and flour additives, preservatives, and nutritional additives. The paper concludes with consideration of those circumstances in which the use of additives is (a) justified and (b) unjustified. PMID:4467857

  3. Food security in the context of HIV: towards harmonized definitions and indicators.

    PubMed

    Anema, Aranka; Fielden, Sarah J; Castleman, Tony; Grede, Nils; Heap, Amie; Bloem, Martin

    2014-10-01

    Integration of HIV and food security services is imperative to improving the health and well-being of people living with HIV. However, consensus does not exist on definitions and measures of food security to guide service delivery and evaluation in the context of HIV. This paper reviews definitions and indicators of food security used by key agencies; outlines their relevance in the context of HIV; highlights opportunities for harmonized monitoring and evaluation indicators; and discusses promising developments in data collection and management. In addition to the commonly used dimensions of food availability, access, utilization and stability, we identify three components of food security-food sufficiency, dietary quality, and food safety-that are useful for understanding and measuring food security needs of HIV-affected and other vulnerable people. Harmonization across agencies of food security indicators in the context of HIV offers opportunities to improve measurement and tracking, strengthen coordination, and inform evidence-based programming. PMID:24292252

  4. Food security in the context of HIV: towards harmonized definitions and indicators.

    PubMed

    Anema, Aranka; Fielden, Sarah J; Castleman, Tony; Grede, Nils; Heap, Amie; Bloem, Martin

    2014-10-01

    Integration of HIV and food security services is imperative to improving the health and well-being of people living with HIV. However, consensus does not exist on definitions and measures of food security to guide service delivery and evaluation in the context of HIV. This paper reviews definitions and indicators of food security used by key agencies; outlines their relevance in the context of HIV; highlights opportunities for harmonized monitoring and evaluation indicators; and discusses promising developments in data collection and management. In addition to the commonly used dimensions of food availability, access, utilization and stability, we identify three components of food security-food sufficiency, dietary quality, and food safety-that are useful for understanding and measuring food security needs of HIV-affected and other vulnerable people. Harmonization across agencies of food security indicators in the context of HIV offers opportunities to improve measurement and tracking, strengthen coordination, and inform evidence-based programming.

  5. The CSCE forum for security cooperation

    SciTech Connect

    Borawski, J.; George, B.

    1993-10-01

    What are the next steps for arms control in Europe, given the tectonic changes that have shaken the continent over the past four years? Negotiators in Europe, who labored for nearly two decades on the details of conventional force reductions and confidence-building measures, are grappling with that question. On September 22, 1992, a fresh, if perhaps belated, attempt to adapt to the new conditions of the post-Cold War era began in Vienna with the creation of the 54-member Forum for Security Cooperation (FSC). The FSC is the security component of the multifaceted Conference on Security and Cooperation in Europe (CSCEO), which deals with a range of issues, including human rights, in addition to the various items on the security agenda. The forum is facing a task unprecedented in the scope of the CSCE: it is simultaneously trying to address arms control negotiations, security enhancement and cooperation, and conflict prevention. The primary objective of the forum will be to adapt the traditional tools of arms control, including those applied to military activity, to the contemporary {open_quotes}security parlance{close_quotes} of preventive diplomacy, peacemaking, peacekeeping, peace enforcement and peace building.

  6. Security of medical multimedia.

    PubMed

    Tzelepi, S; Pangalos, G; Nikolacopoulou, G

    2002-09-01

    The application of information technology to health care has generated growing concern about the privacy and security of medical information. Furthermore, data and communication security requirements in the field of multimedia are higher. In this paper we describe firstly the most important security requirements that must be fulfilled by multimedia medical data, and the security measures used to satisfy these requirements. These security measures are based mainly on modern cryptographic and watermarking mechanisms as well as on security infrastructures. The objective of our work is to complete this picture, exploiting the capabilities of multimedia medical data to define and implement an authorization model for regulating access to the data. In this paper we describe an extended role-based access control model by considering, within the specification of the role-permission relationship phase, the constraints that must be satisfied in order for the holders of the permission to use those permissions. The use of constraints allows role-based access control to be tailored to specifiy very fine-grained and flexible content-, context- and time-based access control policies. Other restrictions, such as role entry restriction also can be captured. Finally, the description of system architecture for a secure DBMS is presented.

  7. Telemedicine Security: A Systematic Review

    PubMed Central

    Garg, Vaibhav; Brewer, Jeffrey

    2011-01-01

    Telemedicine is a technology-based alternative to traditional health care delivery. However, poor security measures in telemedicine services can have an adverse impact on the quality of care provided, regardless of the chronic condition being studied. We undertook a systematic review of 58 journal articles pertaining to telemedicine security. These articles were selected based on a keyword search on 14 relevant journals. The articles were coded to evaluate the methodology and to identify the key areas of research in security that are being reviewed. Seventy-six percent of the articles defined the security problem they were addressing, and only 47% formulated a research question pertaining to security. Sixty-one percent proposed a solution, and 20% of these tested the security solutions that they proposed. Prior research indicates inadequate reporting of methodology in telemedicine research. We found that to be true for security research as well. We also identified other issues such as using outdated security standards. PMID:21722592

  8. Telemedicine security: a systematic review.

    PubMed

    Garg, Vaibhav; Brewer, Jeffrey

    2011-05-01

    Telemedicine is a technology-based alternative to traditional health care delivery. However, poor security measures in telemedicine services can have an adverse impact on the quality of care provided, regardless of the chronic condition being studied. We undertook a systematic review of 58 journal articles pertaining to telemedicine security. These articles were selected based on a keyword search on 14 relevant journals. The articles were coded to evaluate the methodology and to identify the key areas of research in security that are being reviewed. Seventy-six percent of the articles defined the security problem they were addressing, and only 47% formulated a research question pertaining to security. Sixty-one percent proposed a solution, and 20% of these tested the security solutions that they proposed. Prior research indicates inadequate reporting of methodology in telemedicine research. We found that to be true for security research as well. We also identified other issues such as using outdated security standards.

  9. 17 CFR 230.408 - Additional information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Additional information. 230... RULES AND REGULATIONS, SECURITIES ACT OF 1933 General Requirements § 230.408 Additional information. (a) In addition to the information expressly required to be included in a registration statement,...

  10. 17 CFR 230.408 - Additional information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Additional information. 230... RULES AND REGULATIONS, SECURITIES ACT OF 1933 General Requirements § 230.408 Additional information. (a) In addition to the information expressly required to be included in a registration statement,...

  11. Design of the national health security preparedness index.

    PubMed

    Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M

    2014-01-01

    The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts.

  12. 33 CFR 105.405 - Format and content of the Facility Security Plan (FSP).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) Security measures for access control, including designated public access areas; (11) Security measures for restricted areas; (12) Security measures for handling cargo; (13) Security measures for delivery of vessel stores and bunkers; (14) Security measures for monitoring; (15) Security incident procedures; (16)...

  13. Social Security.

    ERIC Educational Resources Information Center

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  14. Physical Security

    SciTech Connect

    2008-01-01

    The future of physical security at government facilities and national laboratories is rapidly progressing beyond the cliché of gates, guns and guards, and is quickly being replaced by radars, sensors and cameras. Learn more about INL's security research at http://www.facebook.com/idahonationallaboratory.

  15. 33 CFR 101.405 - Maritime Security (MARSEC) Directives.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... this section shall be marked as sensitive security information (SSI) in accordance with 49 CFR part... of and access to sensitive security information, and that under 49 CFR 1520.5(b), they have a need to... SECURITY MARITIME SECURITY MARITIME SECURITY: GENERAL Control Measures for Security § 101.405...

  16. Analysis of Air Toxics From NOAA WP-3 Aircraft Measurements During the TexAQS 2006 Campaign: Comparison With Emission Inventories and Additive Inhalation Risk Factors

    NASA Astrophysics Data System (ADS)

    Del Negro, L. A.; Warneke, C.; de Gouw, J. A.; Atlas, E.; Lueb, R.; Zhu, X.; Pope, L.; Schauffler, S.; Hendershot, R.; Washenfelder, R.; Fried, A.; Richter, D.; Walega, J. G.; Weibring, P.

    2007-12-01

    Benzene and nine other air toxics classified as human carcinogens by the International Agency for Research on Cancer (IARC) were measured from the NOAA WP-3 aircraft during the TexAQS 2006 campaign. In-situ measurements of benzene, measured with a PTR-MS instrument, are used to estimate emission fluxes for comparison with point source emission inventories developed by the Texas Commission on Environmental Quality. Mean and median mixing ratios for benzene, acetaldehyde, formaldehyde, 1,3-butadiene, carbon tetrachloride, chloroform, 1,2-dichloroethane, dibromoethane, dichloromethane, and vinyl chloride, encountered over the city of Houston during the campaign, are combined with inhalation unit risk factor values developed by the California Environmental Protection Agency and the United States Environmental Protection Agency to estimate the additive inhalation risk factor. This additive risk factor represents the risk associated with lifetime (70 year) exposure at the levels measured and should not be used as an absolute indicator of risk to individuals. However, the results are useful for assessments of changing relative risk over time, and for identifying dominant contributions to the overall air toxic risk.

  17. The short- to medium-term predictive accuracy of static and dynamic risk assessment measures in a secure forensic hospital.

    PubMed

    Chu, Chi Meng; Thomas, Stuart D M; Ogloff, James R P; Daffern, Michael

    2013-04-01

    Although violence risk assessment knowledge and practice has advanced over the past few decades, it remains practically difficult to decide which measures clinicians should use to assess and make decisions about the violence potential of individuals on an ongoing basis, particularly in the short to medium term. Within this context, this study sought to compare the predictive accuracy of dynamic risk assessment measures for violence with static risk assessment measures over the short term (up to 1 month) and medium term (up to 6 months) in a forensic psychiatric inpatient setting. Results showed that dynamic measures were generally more accurate than static measures for short- to medium-term predictions of inpatient aggression. These findings highlight the necessity of using risk assessment measures that are sensitive to important clinical risk state variables to improve the short- to medium-term prediction of aggression within the forensic inpatient setting. Such knowledge can assist with the development of more accurate and efficient risk assessment procedures, including the selection of appropriate risk assessment instruments to manage and prevent the violence of offenders with mental illnesses during inpatient treatment.

  18. National Security Technology Incubator Action Plan

    SciTech Connect

    2008-02-28

    This report documents the action plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). This action plan serves as a tool in measuring progress in the development process and delivery of services for the NSTI program. Continuous review and evaluation of the action plan is necessary in the development process of the NSTI. The action plan includes detailed steps in developing the NSTI program based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Included are tasks required to implement the NSTI, developed within a work breakdown structure. In addition, a timeline is identified for each task.

  19. 27 CFR 19.704 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2011-04-01 2011-04-01 false Security. 19.704 Section... Construction, Equipment, and Security § 19.704 Security. (a) General. The proprietor of an alcohol fuel plant must provide adequate security measures at the alcohol fuel plant in order to protect against...

  20. 30 CFR 250.1205 - Site security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 2 2011-07-01 2011-07-01 false Site security. 250.1205 Section 250.1205... Measurement, Surface Commingling, and Security § 250.1205 Site security. (a) What are the requirements for site security? You must: (1) Protect Federal production against production loss or theft; (2) Post...

  1. 27 CFR 19.281 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Security. 19.281 Section... THE TREASURY LIQUORS DISTILLED SPIRITS PLANTS Construction, Equipment and Security § 19.281 Security. (a) General. The proprietor shall provide adequate security measures at the distilled spirits...

  2. 27 CFR 19.704 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2014-04-01 2014-04-01 false Security. 19.704 Section... Construction, Equipment, and Security § 19.704 Security. (a) General. The proprietor of an alcohol fuel plant must provide adequate security measures at the alcohol fuel plant in order to protect against...

  3. 27 CFR 19.704 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2012-04-01 2012-04-01 false Security. 19.704 Section... Construction, Equipment, and Security § 19.704 Security. (a) General. The proprietor of an alcohol fuel plant must provide adequate security measures at the alcohol fuel plant in order to protect against...

  4. 27 CFR 19.704 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2013-04-01 2013-04-01 false Security. 19.704 Section... Construction, Equipment, and Security § 19.704 Security. (a) General. The proprietor of an alcohol fuel plant must provide adequate security measures at the alcohol fuel plant in order to protect against...

  5. Secure Objectives for School Security

    ERIC Educational Resources Information Center

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  6. Need for a gender-sensitive human security framework: results of a quantitative study of human security and sexual violence in Djohong District, Cameroon

    PubMed Central

    2014-01-01

    Background Human security shifts traditional concepts of security from interstate conflict and the absence of war to the security of the individual. Broad definitions of human security include livelihoods and food security, health, psychosocial well-being, enjoyment of civil and political rights and freedom from oppression, and personal safety, in addition to absence of conflict. Methods In March 2010, we undertook a population-based health and livelihood study of female refugees from conflict-affected Central African Republic living in Djohong District, Cameroon and their female counterparts within the Cameroonian host community. Embedded within the survey instrument were indicators of human security derived from the Leaning-Arie model that defined three domains of psychosocial stability suggesting individuals and communities are most stable when their core attachments to home, community and the future are intact. Results While the female refugee human security outcomes describe a population successfully assimilated and thriving in their new environments based on these three domains, the ability of human security indicators to predict the presence or absence of lifetime and six-month sexual violence was inadequate. Using receiver operating characteristic (ROC) analysis, the study demonstrates that common human security indicators do not uncover either lifetime or recent prevalence of sexual violence. Conclusions These data suggest that current gender-blind approaches of describing human security are missing serious threats to the safety of one half of the population and that efforts to develop robust human security indicators should include those that specifically measure violence against women. PMID:24829613

  7. Secure PVM

    SciTech Connect

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  8. Additional hemodynamic measurements with an esophageal Doppler monitor: a preliminary report of compliance, force, kinetic energy, and afterload in the clinical setting.

    PubMed

    Atlas, Glen; Brealey, David; Dhar, Sunil; Dikta, Gerhard; Singer, Meryvn

    2012-12-01

    The esophageal Doppler monitor (EDM) is a minimally-invasive hemodynamic device which evaluates both cardiac output (CO), and fluid status, by estimating stroke volume (SV) and calculating heart rate (HR). The measurement of these parameters is based upon a continuous and accurate approximation of distal thoracic aortic blood flow. Furthermore, the peak velocity (PV) and mean acceleration (MA), of aortic blood flow at this anatomic location, are also determined by the EDM. The purpose of this preliminary report is to examine additional clinical hemodynamic calculations of: compliance (C), kinetic energy (KE), force (F), and afterload (TSVR(i)). These data were derived using both velocity-based measurements, provided by the EDM, as well as other contemporaneous physiologic parameters. Data were obtained from anesthetized patients undergoing surgery or who were in a critical care unit. A graphical inspection of these measurements is presented and discussed with respect to each patient's clinical situation. When normalized to each of their initial values, F and KE both consistently demonstrated more discriminative power than either PV or MA. The EDM offers additional applications for hemodynamic monitoring. Further research regarding the accuracy, utility, and limitations of these parameters is therefore indicated.

  9. The Short- to Medium-Term Predictive Accuracy of Static and Dynamic Risk Assessment Measures in a Secure Forensic Hospital

    ERIC Educational Resources Information Center

    Chu, Chi Meng; Thomas, Stuart D. M.; Ogloff, James R. P.; Daffern, Michael

    2013-01-01

    Although violence risk assessment knowledge and practice has advanced over the past few decades, it remains practically difficult to decide which measures clinicians should use to assess and make decisions about the violence potential of individuals on an ongoing basis, particularly in the short to medium term. Within this context, this study…

  10. Secure portal.

    SciTech Connect

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing the secure portal

  11. Design and use of a constant geometry system to measure activated indium foil in personnel security badges

    SciTech Connect

    Barclay, R.K.

    1984-06-01

    A device for measuring the exposure rate from neutron-activated indium foil, under constant geometry, has been designed, constructed, and tested. The device is intended for use with the Juno ionization chambers, although it adapts to Victoreen CDV-700 and Victoreen 193 G-M instruments. Juno dose-response data for low (53 rad) and high (226 rad) doses were compiled and modeled. This model was compared to that assumed from the indium foil dose-response model in current use; plots of fitted and assumed models are congruent. An analysis of data from both Juno and CDV-700 instruments indicates that the constant geometry device may be used effectively to monitor the decay of In-116m. Tolerance limits for the Juno dose-response curve increase with time after activation, which results in diminished precision of dose estimates made by indium foil measurement. From the data collected in these experiments, the system appears to be most useful if activation is measured within 250 min after exposure. 5 references, 7 figures, 1 table.

  12. The Shaping of Managers' Security Objectives through Information Security Awareness Training

    ERIC Educational Resources Information Center

    Harris, Mark A.

    2010-01-01

    Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…

  13. [Food security in Mexico].

    PubMed

    Urquía-Fernández, Nuria

    2014-01-01

    An overview of food security and nutrition in Mexico is presented, based on the analysis of the four pillars of food security: availability, access, utilization of food, and stability of the food supply. In addition, the two faces of malnutrition in Mexico were analyzed: obesity and undernourishment. Data were gathered from the food security indicators of the United Nations's Food and Agriculture Organization, from the Mexican Scale of Food Security, and from the National Health and Nutrition Survey. Mexico presents an index of availability of 3 145 kilocalories per person per day, one of the highest indexes in the world, including both food production and imports. In contrast, Mexico is affected by a double burden of malnutrition: whereas children under five present 14% of stunt, 30% of the adult population is obese. Also, more than 18% of the population cannot afford the basic food basket (food poverty). Using perception surveys, people reports important levels of food insecurity, which concentrates in seven states of the Mexican Federation. The production structure underlying these indicators shows a very heterogeneous landscape, which translates in to a low productivity growth across the last years. Food security being a multidimensional concept, to ensure food security for the Mexican population requires a revision and redesign of public productive and social policies, placing a particular focus on strengthening the mechanisms of institutional governance. PMID:25649459

  14. [Food security in Mexico].

    PubMed

    Urquía-Fernández, Nuria

    2014-01-01

    An overview of food security and nutrition in Mexico is presented, based on the analysis of the four pillars of food security: availability, access, utilization of food, and stability of the food supply. In addition, the two faces of malnutrition in Mexico were analyzed: obesity and undernourishment. Data were gathered from the food security indicators of the United Nations's Food and Agriculture Organization, from the Mexican Scale of Food Security, and from the National Health and Nutrition Survey. Mexico presents an index of availability of 3 145 kilocalories per person per day, one of the highest indexes in the world, including both food production and imports. In contrast, Mexico is affected by a double burden of malnutrition: whereas children under five present 14% of stunt, 30% of the adult population is obese. Also, more than 18% of the population cannot afford the basic food basket (food poverty). Using perception surveys, people reports important levels of food insecurity, which concentrates in seven states of the Mexican Federation. The production structure underlying these indicators shows a very heterogeneous landscape, which translates in to a low productivity growth across the last years. Food security being a multidimensional concept, to ensure food security for the Mexican population requires a revision and redesign of public productive and social policies, placing a particular focus on strengthening the mechanisms of institutional governance.

  15. Data validation and security for reprocessing.

    SciTech Connect

    Tolk, Keith Michael; Merkle, Peter Benedict; DurÔan, Felicia Angelica; Cipiti, Benjamin B.

    2008-10-01

    Next generation nuclear fuel cycle facilities will face strict requirements on security and safeguards of nuclear material. These requirements can result in expensive facilities. The purpose of this project was to investigate how to incorporate safeguards and security into one plant monitoring system early in the design process to take better advantage of all plant process data, to improve confidence in the operation of the plant, and to optimize costs. An existing reprocessing plant materials accountancy model was examined for use in evaluating integration of safeguards (both domestic and international) and security. International safeguards require independent, secure, and authenticated measurements for materials accountability--it may be best to design stand-alone systems in addition to domestic safeguards instrumentation to minimize impact on operations. In some cases, joint-use equipment may be appropriate. Existing domestic materials accountancy instrumentation can be used in conjunction with other monitoring equipment for plant security as well as through the use of material assurance indicators, a new metric for material control that is under development. Future efforts will take the results of this work to demonstrate integration on the reprocessing plant model.

  16. Phosphazene additives

    DOEpatents

    Harrup, Mason K; Rollins, Harry W

    2013-11-26

    An additive comprising a phosphazene compound that has at least two reactive functional groups and at least one capping functional group bonded to phosphorus atoms of the phosphazene compound. One of the at least two reactive functional groups is configured to react with cellulose and the other of the at least two reactive functional groups is configured to react with a resin, such as an amine resin of a polycarboxylic acid resin. The at least one capping functional group is selected from the group consisting of a short chain ether group, an alkoxy group, or an aryloxy group. Also disclosed are an additive-resin admixture, a method of treating a wood product, and a wood product.

  17. Potlining Additives

    SciTech Connect

    Rudolf Keller

    2004-08-10

    In this project, a concept to improve the performance of aluminum production cells by introducing potlining additives was examined and tested. Boron oxide was added to cathode blocks, and titanium was dissolved in the metal pool; this resulted in the formation of titanium diboride and caused the molten aluminum to wet the carbonaceous cathode surface. Such wetting reportedly leads to operational improvements and extended cell life. In addition, boron oxide suppresses cyanide formation. This final report presents and discusses the results of this project. Substantial economic benefits for the practical implementation of the technology are projected, especially for modern cells with graphitized blocks. For example, with an energy savings of about 5% and an increase in pot life from 1500 to 2500 days, a cost savings of $ 0.023 per pound of aluminum produced is projected for a 200 kA pot.

  18. Information risk and security modeling

    NASA Astrophysics Data System (ADS)

    Zivic, Predrag

    2005-03-01

    This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.

  19. 33 CFR 106.205 - Company Security Officer (CSO).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... TWIC. (b) Qualifications. The CSO must have general knowledge, through training or equivalent job... training and education, including security measures and procedures. (c) In addition to the knowledge and training in paragraph (b) of this section, the CSO must have general knowledge, through training...

  20. The recovery of the polymerizability of Lys-61-labelled actin by the addition of phalloidin. Fluorescence polarization and resonance-energy-transfer measurements.

    PubMed

    Miki, M

    1987-04-01

    Modification of Lys-61 in actin with fluorescein-5-isothiocyanate (FITC) blocks actin polymerization [Burtnick, L. D. (1984) Biochim. Biophys. Acta 791, 57-62]. FITC-labelled actin recovered its ability to polymerize on addition of phalloidin. The polymers had the same characteristic helical thread-like structure as normal F-actin and the addition of myosin subfragment-1 to the polymers formed the characteristic arrowhead structure in electron microscopy. The polymers activated the ATPase activity of myosin subfragment-1 as efficiently as normal F-actin. These results indicate that Lys-61 is not directly involved in an actin-actin binding region nor in myosin binding site. From static fluorescence polarization measurements, the rotational relaxation time of FITC-labelled actin filaments was calculated to be 20 ns as the value reduced in water at 20 degrees C, while any rotational relaxation time of 1,5-IAEDANS bound to Cys-374 on F-actin in the presence of a twofold molar excess of phalloidin could not be detected by static polarization measurements under the same conditions. This indicates that the Lys-61 side chain is extremely mobile even in the filamentous structure. Fluorescence resonance energy transfer between the donor 1,5-IAEDANS bound to SH1 of myosin subfragment-1 and the acceptor fluorescein-5-isothiocyanate bound to Lys-61 of actin in the rigor complex was measured. The transfer efficiency was 0.39 +/- 0.05 which corresponds to the distance of 5.2 +/- 0.1 nm, assuming that the energy donor and acceptor rotate rapidly relative to the fluorescence lifetime and that the transfer occurs between a single donor and an acceptor.

  1. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    SciTech Connect

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  2. Security in the Schools.

    ERIC Educational Resources Information Center

    Nelson, Jesse

    1997-01-01

    Discusses the benefits of school library security, software security, and computer security systems. Describes specific products for each type of security system. A sidebar lists names and addresses of security manufacturers and distributors. (AEF)

  3. Unfalsifiability of security claims.

    PubMed

    Herley, Cormac

    2016-06-01

    There is an inherent asymmetry in computer security: Things can be declared insecure by observation, but not the reverse. There is no observation that allows us to declare an arbitrary system or technique secure. We show that this implies that claims of necessary conditions for security (and sufficient conditions for insecurity) are unfalsifiable. This in turn implies an asymmetry in self-correction: Whereas the claim that countermeasures are sufficient is always subject to correction, the claim that they are necessary is not. Thus, the response to new information can only be to ratchet upward: Newly observed or speculated attack capabilities can argue a countermeasure in, but no possible observation argues one out. Further, when justifications are unfalsifiable, deciding the relative importance of defensive measures reduces to a subjective comparison of assumptions. Relying on such claims is the source of two problems: once we go wrong we stay wrong and errors accumulate, and we have no systematic way to rank or prioritize measures.

  4. 45 CFR 164.306 - Security standards: General rules.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., hardware, and software security capabilities. (iii) The costs of security measures. (iv) The probability... provision of reasonable and appropriate protection of electronic protected health information, and...

  5. 45 CFR 164.306 - Security standards: General rules.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., hardware, and software security capabilities. (iii) The costs of security measures. (iv) The probability... provision of reasonable and appropriate protection of electronic protected health information, and...

  6. Capturing security requirements for software systems

    PubMed Central

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-01-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way. PMID:25685514

  7. Capturing security requirements for software systems.

    PubMed

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-07-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  8. Data security.

    PubMed

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement.

  9. Data security.

    PubMed

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement. PMID:27581899

  10. Managing secure computer systems and networks.

    PubMed

    Von Solms, B

    1996-10-01

    No computer system or computer network can today be operated without the necessary security measures to secure and protect the electronic assets stored, processed and transmitted using such systems and networks. Very often the effort in managing such security and protection measures are totally underestimated. This paper provides an overview of the security management needed to secure and protect a typical IT system and network. Special reference is made to this management effort in healthcare systems, and the role of the information security officer is also highlighted.

  11. Secure medical digital libraries.

    PubMed

    Papadakis, I; Chrissikopoulos, V; Polemi, D

    2001-12-01

    In this paper, a secure medical digital library is presented. It is based on the CORBA specifications for distributed systems. The described approach relies on a three-tier architecture. Interaction between the medical digital library and its users is achieved through a Web server. The choice of employing Web technology for the dissemination of medical data has many advantages compared to older approaches, but also poses extra requirements that need to be fulfilled. Thus, special attention is paid to the distinguished nature of such medical data, whose integrity and confidentiality should be preserved at all costs. This is achieved through the employment of Trusted Third Parties (TTP) technology for the support of the required security services. Additionally, the proposed digital library employs smartcards for the management of the various security tokens that are used from the above services.

  12. Port and Harbor Security

    SciTech Connect

    Saito, T; Guthmuller, H; DeWeert, M

    2004-12-15

    Port and Harbor Security is a daunting task to which optics and photonics offers significant solutions. We are pleased to report that the 2005 Defense and Security Symposium (DSS, Orlando, FL) will include reports on active and passive photonic systems operating from both airborne and subsurface platforms. In addition to imaging techniques, there are various photonic applications, such as total internal reflection fluorescence (TIRF), which can be used to ''sniff'' for traces of explosives or contaminants in marine. These non-imaging technologies are beyond the scope of this article, but will also be represented at DSS 2005. We encourage colleagues to join our technical group to help us to make our ports and harbors safer and more secure.

  13. Integrated safeguards & security for material protection, accounting, and control.

    SciTech Connect

    Duran, Felicia Angelica; Cipiti, Benjamin B.

    2009-10-01

    Traditional safeguards and security design for fuel cycle facilities is done separately and after the facility design is near completion. This can result in higher costs due to retrofits and redundant use of data. Future facilities will incorporate safeguards and security early in the design process and integrate the systems to make better use of plant data and strengthen both systems. The purpose of this project was to evaluate the integration of materials control and accounting (MC&A) measurements with physical security design for a nuclear reprocessing plant. Locations throughout the plant where data overlap occurs or where MC&A data could be a benefit were identified. This mapping is presented along with the methodology for including the additional data in existing probabilistic assessments to evaluate safeguards and security systems designs.

  14. Quantum cryptography: Security criteria reexamined

    SciTech Connect

    Kaszlikowski, Dagomir; Liang, Y.C.; Englert, Berthold-Georg; Gopinathan, Ajay; Kwek, L.C.

    2004-09-01

    We find that the generally accepted security criteria are flawed for a whole class of protocols for quantum cryptography. This is so because a standard assumption of the security analysis, namely that the so-called square-root measurement is optimal for eavesdropping purposes, is not true in general. There are rather large parameter regimes in which the optimal measurement extracts substantially more information than the square-root measurement.

  15. Voyager 1/UVS measurements of the backscattered solar Lyman-alpha emission at the distant heliosphere: unknown source of additional emission

    NASA Astrophysics Data System (ADS)

    Katushkina, Olga; Alexashov, Dmitry; Sandel, Bill R.; Izmodenov, Vladislav; Quemerais, Eric

    2016-07-01

    Voyager 1/UVS has been performing measurements of the backscattered solar Lyman-alpha intensities for more than 35 years at distances 5-130 AU from the Sun. Backscattered Lyman-alpha emission depends on the interstellar hydrogen distribution in the solar wind / LISM interaction region. Therefore, measurement of the Lyman-alpha intensities is a tool for remote sensing of the hydrogen parameters at the heliospheric boundary. It is interesting to study dependence of the Lyman-alpha intensities on distance from the Sun. Namely, the Voyager 1 data show decrease of intensity (after correction for the solar flux variations) from 5 to 90 AU (1979-2003), then almost constant intensity between 90 and 115 AU (2003-2011), and decrease of intensity again at 115-130 AU (2011-2014). We perform numerical modeling and an analysis of the data by using our kinetic-MHD heliospheric model (Izmodenov & Alexashov, 2015) and the radiative transfer code (Quemerais, 2000). It is shown that the data obtained up to 90 AU (before 2003) can be fitted by the model quite well. After that the model predicts decrease of intensity, while the data show almost constant values. This behavior can be explained by addition to the model some portion of isotropic "extraheliospheric" Lyman-alpha emission, which does not scattered in the heliosphere and does not depend on the solar Lyman-alpha flux.

  16. Addition of posttraumatic stress and sensory hypersensitivity more accurately estimates disability and pain than fear avoidance measures alone after whiplash injury.

    PubMed

    Pedler, Ashley; Kamper, Steven J; Sterling, Michele

    2016-08-01

    The fear avoidance model (FAM) has been proposed to explain the development of chronic disability in a variety of conditions including whiplash-associated disorders (WADs). The FAM does not account for symptoms of posttraumatic stress and sensory hypersensitivity, which are associated with poor recovery from whiplash injury. The aim of this study was to explore a model for the maintenance of pain and related disability in people with WAD including symptoms of PTSD, sensory hypersensitivity, and FAM components. The relationship between individual components in the model and disability and how these relationships changed over the first 12 weeks after injury were investigated. We performed a longitudinal study of 103 (74 female) patients with WAD. Measures of pain intensity, cold and mechanical pain thresholds, symptoms of posttraumatic stress, pain catastrophising, kinesiophobia, and fear of cervical spine movement were collected within 6 weeks of injury and at 12 weeks after injury. Mixed-model analysis using Neck Disability Index (NDI) scores and average 24-hour pain intensity as the dependent variables revealed that overall model fit was greatest when measures of fear of movement, posttraumatic stress, and sensory hypersensitivity were included. The interactive effects of time with catastrophising and time with fear of activity of the cervical spine were also included in the best model for disability. These results provide preliminary support for the addition of neurobiological and stress system components to the FAM to explain poor outcome in patients with WAD. PMID:27007066

  17. Secure Information Sharing

    2005-09-09

    We are develoing a peer-to-peer system to support secure, location independent information sharing in the scientific community. Once complete, this system will allow seamless and secure sharing of information between multiple collaborators. The owners of information will be able to control how the information is stored, managed. ano shared. In addition, users will have faster access to information updates within a collaboration. Groups collaborating on scientific experiments have a need to share information and data.more » This information and data is often represented in the form of files and database entries. In a typical scientific collaboration, there are many different locations where data would naturally be stored. This makes It difficult for collaborators to find and access the information they need. Our goal is to create a lightweight file-sharing system that makes it’easy for collaborators to find and use the data they need. This system must be easy-to-use, easy-to-administer, and secure. Our information-sharing tool uses group communication, in particular the InterGroup protocols, to reliably deliver each query to all of the current participants in a scalable manner, without having to discover all of their identities. We will use the Secure Group Layer (SGL) and Akenti to provide security to the participants of our environment, SGL will provide confldentiality, integrity, authenticity, and authorization enforcement for the InterGroup protocols and Akenti will provide access control to other resources.« less

  18. Energy and national security.

    SciTech Connect

    Karas, Thomas H.

    2003-09-01

    On May 19 and 20, 2003, thirty-some members of Sandia staff and management met to discuss the long-term connections between energy and national security. Three broad security topics were explored: I. Global and U.S. economic dependence on oil (and gas); II. Potential security implications of global climate change; and III. Vulnerabilities of the U.S. domestic energy infrastructure. This report, rather than being a transcript of the workshop, represents a synthesis of background information used in the workshop, ideas that emerged in the discussions, and ex post facto analysis of the discussions. Each of the three subjects discussed at this workshop has significant U.S. national security implications. Each has substantial technology components. Each appears a legitimate area of concern for a national security laboratory with relevant technology capabilities. For the laboratory to play a meaningful role in contributing to solutions to national problems such as these, it needs to understand the political, economic, and social environments in which it expects its work to be accepted and used. In addition, it should be noted that the problems of oil dependency and climate change are not amenable to solution by the policies of any one nation--even the one that is currently the largest single energy consumer. Therefore, views, concerns, policies, and plans of other countries will do much to determine which solutions might work and which might not.

  19. Southern Hemisphere Additional Ozonesondes (SHADOZ) 1998-2000 tropical ozone climatology 1. Comparison with Total Ozone Mapping Spectrometer (TOMS) and ground-based measurements

    NASA Astrophysics Data System (ADS)

    Thompson, Anne M.; Witte, Jacquelyn C.; McPeters, Richard D.; Oltmans, Samuel J.; Schmidlin, Francis J.; Logan, Jennifer A.; Fujiwara, Masatomo; Kirchhoff, Volker W. J. H.; Posny, FrançOise; Coetzee, Gert J. R.; Hoegger, Bruno; Kawakami, Shuji; Ogawa, Toshihiro; Johnson, Bryan J.; VöMel, Holger; Labow, Gordon

    2003-01-01

    A network of 10 southern hemisphere tropical and subtropical stations, designated the Southern Hemisphere Additional Ozonesondes (SHADOZ) project and established from operational sites, provided over 1000 ozone profiles during the period 1998-2000. Balloon-borne electrochemical concentration cell (ECC) ozonesondes, combined with standard radiosondes for pressure, temperature, and relative humidity measurements, collected profiles in the troposphere and lower to midstratosphere at: Ascension Island; Nairobi, Kenya; Irene, South Africa; Réunion Island; Watukosek, Java; Fiji; Tahiti; American Samoa; San Cristóbal, Galapagos; and Natal, Brazil. The archived data are available at: . In this paper, uncertainties and accuracies within the SHADOZ ozone data set are evaluated by analyzing: (1) imprecisions in profiles and in methods of extrapolating ozone above balloon burst; (2) comparisons of column-integrated total ozone from sondes with total ozone from the Earth-Probe/Total Ozone Mapping Spectrometer (TOMS) satellite and ground-based instruments; and (3) possible biases from station to station due to variations in ozonesonde characteristics. The key results are the following: (1) Ozonesonde precision is 5%. (2) Integrated total ozone column amounts from the sondes are usually to within 5% of independent measurements from ground-based instruments at five SHADOZ sites and overpass measurements from the TOMS satellite (version 7 data). (3) Systematic variations in TOMS-sonde offsets and in ground-based-sonde offsets from station to station reflect biases in sonde technique as well as in satellite retrieval. Discrepancies are present in both stratospheric and tropospheric ozone. (4) There is evidence for a zonal wave-one pattern in total and tropospheric ozone, but not in stratospheric ozone.

  20. Teaching Web Security Using Portable Virtual Labs

    ERIC Educational Resources Information Center

    Chen, Li-Chiou; Tao, Lixin

    2012-01-01

    We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…

  1. 7 CFR 764.235 - Security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.235 Section 764.235... AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Conservation Loan Program § 764.235 Security requirements. (a... estate may be taken as additional security if needed. (c) Loans of $25,000 of less for real...

  2. 7 CFR 1738.154 - Loan security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 11 2013-01-01 2013-01-01 false Loan security. 1738.154 Section 1738.154 Agriculture... RURAL BROADBAND ACCESS LOANS AND LOAN GUARANTEES Direct Loan Terms § 1738.154 Loan security. (a) The... the applicant's property and revenues and such additional security as the Agency may require....

  3. Development of security engineering curricula at US universities

    SciTech Connect

    Garcia, M.L.

    1998-06-01

    The Southwest Surety Institute was formed in 1996 to create unique, science-based educational programs in security engineering. The programs will integrate business, technology, and criminal justice elements to educate a new generation of security professionals. Graduates of the programs will better understand basic security system design and evaluation and contribute to strengthening of the body of knowledge in the area of security. A systematic approach incorporating people, procedures, and equipment will be taught that will emphasize basic security principles and establish the science of security engineering. The use of performance measures in the analysis of designed systems will enable effective decisions by an enterprise and provide the rationale for investment in security systems. Along with educational programs, Institute members will conduct original research and development built on existing relationships with sponsors from government and industry in areas such as counterterroism, microelectronics, banking, aviation, and sensor development. Additional information and updates on the Southwest Surety Institute are available via the Institute home page at www.emrtc.nmt.edu/ssi.

  4. [Food additives and healthiness].

    PubMed

    Heinonen, Marina

    2014-01-01

    Additives are used for improving food structure or preventing its spoilage, for example. Many substances used as additives are also naturally present in food. The safety of additives is evaluated according to commonly agreed principles. If high concentrations of an additive cause adverse health effects for humans, a limit of acceptable daily intake (ADI) is set for it. An additive is a risk only when ADI is exceeded. The healthiness of food is measured on the basis of nutrient density and scientifically proven effects.

  5. Security system

    DOEpatents

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  6. Security seal

    DOEpatents

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  7. Application of the deletion/substitution/addition algorithm to selecting land use regression models for interpolating air pollution measurements in California

    NASA Astrophysics Data System (ADS)

    Beckerman, Bernardo S.; Jerrett, Michael; Martin, Randall V.; van Donkelaar, Aaron; Ross, Zev; Burnett, Richard T.

    2013-10-01

    Land use regression (LUR) models are widely employed in health studies to characterize chronic exposure to air pollution. The LUR is essentially an interpolation technique that employs the pollutant of interest as the dependent variable with proximate land use, traffic, and physical environmental variables used as independent predictors. Two major limitations with this method have not been addressed: (1) variable selection in the model building process, and (2) dealing with unbalanced repeated measures. In this paper, we address these issues with a modeling framework that implements the deletion/substitution/addition (DSA) machine learning algorithm that uses a generalized linear model to average over unbalanced temporal observations. Models were derived for fine particulate matter with aerodynamic diameter of 2.5 microns or less (PM2.5) and nitrogen dioxide (NO2) using monthly observations. We used 4119 observations at 108 sites and 15,301 observations at 138 sites for PM2.5 and NO2, respectively. We derived models with good predictive capacity (cross-validated-R2 values were 0.65 and 0.71 for PM2.5 and NO2, respectively). By addressing these two shortcomings in current approaches to LUR modeling, we have developed a framework that minimizes arbitrary decisions during the model selection process. We have also demonstrated how to integrate temporally unbalanced data in a theoretically sound manner. These developments could have widespread applicability for future LUR modeling efforts.

  8. Determination of fluorine and chlorine in geological materials by induction furnace pyrohydrolysis and standard-addition ion-selective electrode measurement.

    PubMed

    Rice, T D

    1988-03-01

    Fluorine and chlorine in geological materials are volatilized by pyrohydrolysis at about 1150 degrees in a stream of oxygen (1000 ml/min) plus steam in an induction furnace. The catalyst is a 7:2:1 mixture of silica gel, tungstic oxide and potassium dihydrogen phosphate. The sample/catalyst mixture is pyrohydrolysed in a re-usable alumina crucible (already containing four drops of 1 + 3 phosphoric acid) inserted in a silica-enclosed graphite crucible. The absorption solution is buffered at pH 6.5 and spiked with 1.6 mug of fluoride and 16 mug of chloride per g of solution, to ensure rapid and linear electrode response during subsequent standard-addition measurement. The simple plastic absorption vessel has 99.5% efficiency. The 3s limits of detection are 5-10 mug/g and 40-100 mug/g for fluorine and chlorine respectively. The procedure is unsuitable for determining chlorine in coal. PMID:18964490

  9. Effects of water additions, chemical amendments, and plants on in situ measures of nutrient bioavailability in calcareous soils of southeastern Utah, USA

    USGS Publications Warehouse

    Miller, M.E.; Belnap, J.; Beatty, S.W.; Webb, B.L.

    2006-01-01

    We used ion-exchange resin bags to investigate effects of water additions, chemical amendments, and plant presence on in situ measures of nutrient bioavailability in conjunction with a study examining soil controls of ecosystem invasion by the exotic annual grass Bromus tectorum L. At five dryland sites in southeastern Utah, USA, resin bags were buried in experimental plots randomly assigned to combinations of two watering treatments (wet and dry), four chemical-amendment treatments (KCl, MgO, CaO, and no amendment), and four plant treatments (B. tectorum alone, the perennial bunchgrass Stipa hymenoides R. & S. alone, B. tectorum and S. hymenoides together, and no plants). Resin bags were initially buried in September 1997; replaced in January, April, and June 1998; and removed at the end of the study in October 1998. When averaged across watering treatments, plots receiving KCl applications had lower resin-bag NO 3- than plots receiving no chemical amendments during three of four measurement periods-probably due to NO 3- displacement from resin bags by Cl- ions. During the January-April period, KCl application in wet plots (but not dry plots) decreased resin-bag NH 4+ and increased resin-bag NO 3- . This interaction effect likely resulted from displacement of NH 4+ from resins by K+ ions, followed by nitrification and enhanced NO 3- capture by resin bags. In plots not receiving KCl applications, resin-bag NH 4+ was higher in wet plots than in dry plots during the same period. During the January-April period, resin-bag measures for carbonate-related ions HPO 42- , Ca2+, and Mn2+ tended to be greater in the presence of B. tectorum than in the absence of B. tectorum. This trend was evident only in wet plots where B. tectorum densities were much higher than in dry plots. We attribute this pattern to the mobilization of carbonate-associated ions by root exudates of B. tectorum. These findings indicate the importance of considering potential indirect effects of soil

  10. Food security under climate change

    NASA Astrophysics Data System (ADS)

    Hertel, Thomas W.

    2016-01-01

    Using food prices to assess climate change impacts on food security is misleading. Differential impacts on income require a broader measure of household well-being, such as changes in absolute poverty.

  11. Security of attachment and preschool friendships.

    PubMed

    Park, K A; Waters, E

    1989-10-01

    Attachment theory proposes that the quality of the mother-child tie predicts the quality of a child's other close relationships. The purpose of this study was to test whether security of attachment to mother is related to the quality of a preschooler's best friendships. 33 4-year-old and their best friends participated (mean age = 46 months). Attachment Q-set data were collected to score security of mother-child attachment. Security data were used to classify the friend pairs as secure-secure or secure-insecure. Best friend dyads were observed for a 1-hour free-play session. Each pair's behavior was described with the Dyadic Relationships Q-set, a measure designed to describe the behavior of a pair of children. Secure-secure pairs were more harmonious, less controlling, more responsive, and happier than secure-insecure pairs. The results are related to previous work on attachment and social competence.

  12. 18 CFR 1314.10 - Additional provisions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Additional provisions. 1314.10 Section 1314.10 Conservation of Power and Water Resources TENNESSEE VALLEY AUTHORITY BOOK-ENTRY... attachment for TVA Power Securities in Book-entry System. The interest of a debtor in a Security...

  13. 18 CFR 1314.10 - Additional provisions.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 18 Conservation of Power and Water Resources 2 2011-04-01 2011-04-01 false Additional provisions. 1314.10 Section 1314.10 Conservation of Power and Water Resources TENNESSEE VALLEY AUTHORITY BOOK-ENTRY... attachment for TVA Power Securities in Book-entry System. The interest of a debtor in a Security...

  14. 18 CFR 1314.10 - Additional provisions.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 18 Conservation of Power and Water Resources 2 2014-04-01 2014-04-01 false Additional provisions. 1314.10 Section 1314.10 Conservation of Power and Water Resources TENNESSEE VALLEY AUTHORITY BOOK-ENTRY... attachment for TVA Power Securities in Book-entry System. The interest of a debtor in a Security...

  15. 18 CFR 1314.10 - Additional provisions.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 18 Conservation of Power and Water Resources 2 2012-04-01 2012-04-01 false Additional provisions. 1314.10 Section 1314.10 Conservation of Power and Water Resources TENNESSEE VALLEY AUTHORITY BOOK-ENTRY... attachment for TVA Power Securities in Book-entry System. The interest of a debtor in a Security...

  16. 18 CFR 1314.10 - Additional provisions.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 18 Conservation of Power and Water Resources 2 2013-04-01 2012-04-01 true Additional provisions. 1314.10 Section 1314.10 Conservation of Power and Water Resources TENNESSEE VALLEY AUTHORITY BOOK-ENTRY... attachment for TVA Power Securities in Book-entry System. The interest of a debtor in a Security...

  17. UK photonics in defence and security

    NASA Astrophysics Data System (ADS)

    Gracie, C.; Tooley, I.; Wilson, A.

    2008-10-01

    The UK is globally recognised as strong in Photonics. However its Photonics sector is fragmented and the size and sectors of interest have not previously been established. The UK government has instigated the formation of the Photonics Knowledge Transfer Network (PKTN) to bring the Photonics community together. The UK features in Defence & Security; Communications; Measurement; Medical Technology; Lighting; Solar Energy; Information Technology and Flat Panels. This expertise is scattered through out the UK in geographic areas each with a breadth of Photonic interests. The PKTN has mapped the UK capability in all Photonics sectors. This paper will present the capability of the Companies, Research Institutions and Infrastructure making up the Defence & Security Photonics scene in the UK. Large Defence companies in the UK are well known throughout the world. However, there are a large number of SMEs, which may not be as well known in the supply chain. These are being actively encouraged by the UK MoD to engage with the Defence & Security Market and shall be discussed here. The presentation will reference a number of organisations which help to fund and network the community, such as the Defence Technology Centres. In addition the Roadmap for Defence & Security in the UK, produced for the UK Photonics Strategy (July 2006) by the Scottish Optoelectronics Association will be described and the plans in taking it forward under the PKTN will be revealed.

  18. Validating Cyber Security Requirements: A Case Study

    SciTech Connect

    Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, security should not be quantified by the number of vulnerabilities. Security should be managed by pursuing a policy that leads us first to the highest impact vulnerabilities. In light of these observations, we argue in favor of shifting our focus from vulnerability avoidance/removal to measurable security attributes. To this effect, we recommend a logic be used for system security, which captures/represents security properties in quantifiable, verifiable, measurable terms so that it is possible to reason about security in terms of its observable/perceptible effects rather than its hypothesized causes. This approach is orthogonal to existing techniques for vulnerability avoidance, removal, detection, and recovery, in the sense that it provides a means to assess, quantify, and combine these techniques.

  19. Third-generation security robot

    NASA Astrophysics Data System (ADS)

    Everett, Hobart R.; Gage, Douglas W.

    1997-01-01

    ROBART III is an advanced demonstration platform for non- lethal security response measures, incorporating reflexive teleoperated control concepts developed on the earlier ROBART II system. The addition of threat-response capability to the detection and assessment features developed on previous systems has been motivated by increased military interest in Law Enforcement and Operations Other Than War. Like the MDARS robotic security system being developed at NCCOSC RDTE DIV, ROBART III will be capable of autonomously navigating in semi-structured environments such as office buildings and warehouses. Reflexive teleoperation mode employs the vehicle's extensive onboard sensor suite to prevent collisions with obstacles when the human operator assumes control and remotely drives the vehicle to investigate a situation of interest. The non-lethal-response weapon incorporated in the ROBART III system is a pneumatically-powered dart gun capable of firing a variety of 3/16-inch-diameter projectiles, including tranquilizer darts. A Gatling-gun style rotating barrel arrangement allows size shots with minimal mechanical complexity. All six darts can be fired individually or in rapid succession, and a visible-red laser sight is provided to facilitate manual operation under joystick control using video relayed to the operator from the robot's head-mounted camera. This paper presents a general description of the overall ROBART III system, with focus on sensor-assisted reflexive teleoperation of both navigation and weapon firing, and various issues related to non-lethal response capabilities.

  20. Nuclear security

    SciTech Connect

    Dingell, J.D.

    1991-02-01

    The Department of Energy's (DOE) Lawrence Livermore National Laboratory, located in Livermore, California, generates and controls large numbers of classified documents associated with the research and testing of nuclear weapons. Concern has been raised about the potential for espionage at the laboratory and the national security implications of classified documents being stolen. This paper determines the extent of missing classified documents at the laboratory and assesses the adequacy of accountability over classified documents in the laboratory's custody. Audit coverage was limited to the approximately 600,000 secret documents in the laboratory's custody. The adequacy of DOE's oversight of the laboratory's secret document control program was also assessed.

  1. Experimental unconditionally secure bit commitment.

    PubMed

    Liu, Yang; Cao, Yuan; Curty, Marcos; Liao, Sheng-Kai; Wang, Jian; Cui, Ke; Li, Yu-Huai; Lin, Ze-Hong; Sun, Qi-Chao; Li, Dong-Dong; Zhang, Hong-Fei; Zhao, Yong; Chen, Teng-Yun; Peng, Cheng-Zhi; Zhang, Qiang; Cabello, Adán; Pan, Jian-Wei

    2014-01-10

    Quantum physics allows for unconditionally secure communication between parties that trust each other. However, when the parties do not trust each other such as in the bit commitment scenario, quantum physics is not enough to guarantee security unless extra assumptions are made. Unconditionally secure bit commitment only becomes feasible when quantum physics is combined with relativistic causality constraints. Here we experimentally implement a quantum bit commitment protocol with relativistic constraints that offers unconditional security. The commitment is made through quantum measurements in two quantum key distribution systems in which the results are transmitted via free-space optical communication to two agents separated with more than 20 km. The security of the protocol relies on the properties of quantum information and relativity theory. In each run of the experiment, a bit is successfully committed with less than 5.68×10(-2) cheating probability. This demonstrates the experimental feasibility of quantum communication with relativistic constraints.

  2. Experimental Unconditionally Secure Bit Commitment

    NASA Astrophysics Data System (ADS)

    Liu, Yang; Cao, Yuan; Curty, Marcos; Liao, Sheng-Kai; Wang, Jian; Cui, Ke; Li, Yu-Huai; Lin, Ze-Hong; Sun, Qi-Chao; Li, Dong-Dong; Zhang, Hong-Fei; Zhao, Yong; Chen, Teng-Yun; Peng, Cheng-Zhi; Zhang, Qiang; Cabello, Adán; Pan, Jian-Wei

    2014-01-01

    Quantum physics allows for unconditionally secure communication between parties that trust each other. However, when the parties do not trust each other such as in the bit commitment scenario, quantum physics is not enough to guarantee security unless extra assumptions are made. Unconditionally secure bit commitment only becomes feasible when quantum physics is combined with relativistic causality constraints. Here we experimentally implement a quantum bit commitment protocol with relativistic constraints that offers unconditional security. The commitment is made through quantum measurements in two quantum key distribution systems in which the results are transmitted via free-space optical communication to two agents separated with more than 20 km. The security of the protocol relies on the properties of quantum information and relativity theory. In each run of the experiment, a bit is successfully committed with less than 5.68×10-2 cheating probability. This demonstrates the experimental feasibility of quantum communication with relativistic constraints.

  3. Experimental unconditionally secure bit commitment

    NASA Astrophysics Data System (ADS)

    Liu, Yang; Cao, Yuan; Curty, Marcos; Liao, Sheng-Kai; Wang, Jian; Cui, Ke; Li, Yu-Huai; Lin, Ze-Hong; Sun, Qi-Chao; Li, Dong-Dong; Zhang, Hong-Fei; Zhao, Yong; Chen, Teng-Yun; Peng, Cheng-Zhi; Zhang, Qiang; Cabello, Adan; Pan, Jian-Wei

    2014-03-01

    Quantum physics allows unconditionally secure communication between parties that trust each other. However, when they do not trust each other such as in the bit commitment, quantum physics is not enough to guarantee security. Only when relativistic causality constraints combined, the unconditional secure bit commitment becomes feasible. Here we experimentally implement a quantum bit commitment with relativistic constraints that offers unconditional security. The commitment is made through quantum measurements in two quantum key distribution systems in which the results are transmitted via free-space optical communication to two agents separated with more than 20 km. Bits are successfully committed with less than 5 . 68 ×10-2 cheating probability. This provides an experimental proof of unconditional secure bit commitment and demonstrates the feasibility of relativistic quantum communication.

  4. Experimental unconditionally secure bit commitment.

    PubMed

    Liu, Yang; Cao, Yuan; Curty, Marcos; Liao, Sheng-Kai; Wang, Jian; Cui, Ke; Li, Yu-Huai; Lin, Ze-Hong; Sun, Qi-Chao; Li, Dong-Dong; Zhang, Hong-Fei; Zhao, Yong; Chen, Teng-Yun; Peng, Cheng-Zhi; Zhang, Qiang; Cabello, Adán; Pan, Jian-Wei

    2014-01-10

    Quantum physics allows for unconditionally secure communication between parties that trust each other. However, when the parties do not trust each other such as in the bit commitment scenario, quantum physics is not enough to guarantee security unless extra assumptions are made. Unconditionally secure bit commitment only becomes feasible when quantum physics is combined with relativistic causality constraints. Here we experimentally implement a quantum bit commitment protocol with relativistic constraints that offers unconditional security. The commitment is made through quantum measurements in two quantum key distribution systems in which the results are transmitted via free-space optical communication to two agents separated with more than 20 km. The security of the protocol relies on the properties of quantum information and relativity theory. In each run of the experiment, a bit is successfully committed with less than 5.68×10(-2) cheating probability. This demonstrates the experimental feasibility of quantum communication with relativistic constraints. PMID:24483878

  5. Tabulated pressure measurements of a NASA supercritical-wing research airplane model with and without fuselage area-rule additions at Mach 0.25 to 1.00

    NASA Technical Reports Server (NTRS)

    Harris, C. D.; Bartlett, D. W.

    1972-01-01

    Basic pressure measurements were made on a 0.087-scale model of a supercritical wing research airplane in the Langley 8 foot transonic pressure tunnel at Mach numbers from 0.25 to 1.00 to determine the effects on the local aerodynamic loads over the wing and rear fuselage of area-rule additions to the sides of the fuselage. In addition, pressure measurements over the surface of the area-rule additions themselves were obtained at angles of sideslip of approximately - 5 deg, 0 deg, and 5 deg to aid in the structural design of the additions. Except for representative figures, results are presented in tabular form without analysis.

  6. Consumers Are Ready to Accept the Transition to Online and Electronic Records If They Can Be Assured of the Security Measures

    PubMed Central

    Chhanabhai, Prajesh; Holt, Alec

    2007-01-01

    Background Healthcare has entered the electronic domain. This domain has improved data collection and storage abilities while allowing almost instantaneous access and results to data queries. Furthermore, it allows direct communication between healthcare providers and health consumers. The development of privacy, confidentiality, and security principles are necessary to protect consumers' interests against inappropriate access. Studies have shown that the health consumer is the important stakeholder in this process. With the international push toward electronic health records (EHRs), this article presents the importance of secure EHR systems from the public's perspective. Objective To examine the public's perception of the security of electronic systems and report on how their perceptions can shape the building of stronger systems. Methods A cross-sectional survey (September-November 2005) of people attending healthcare providers (n = 400) was conducted in the 4 major cities in New Zealand. Participants were surveyed on computer use, knowledge of EHR-proposed benefits and issues, security issues, and demographics. Results A total of 300 surveys were completed and returned (a 75% response rate), with 180 (60%) being women. One hundred eighty-eight (62.6%) had not heard of EHRs, with those who had heard of them indicating that they were a positive innovation in the health sector. However, 202 (73.3%) participants were highly concerned about the security and privacy of their health records. This feeling was further accentuated when participants were asked about security of electronic systems. Participants were worried about hackers (79.4%), vendor access (72.7%), and malicious software (68%). Participants were also introduced to various security systems, and in each case, over 80% of participants believed that these would make EHR systems more secure. A number of chi-square tests were carried out with each variable, and it was found that there were strong

  7. Metaphors for cyber security.

    SciTech Connect

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  8. A network security monitor

    SciTech Connect

    Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. . Dept. of Electrical Engineering and Computer Science)

    1989-11-01

    The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

  9. Aviation security x-ray detection challenges

    NASA Astrophysics Data System (ADS)

    Harvey, T.

    2016-05-01

    In this paper, a review of the background and some drivers are provided for X-ray screening for aviation security. Some of the key considerations are highlighted along with impacts of the image-based approaches and signature approaches. The role of information theory is discussed along with some recent work that may influence the technical direction by posing the question: "what measurements, parameters and metrics should be considered in future system design?" A path forward should be based on information theory, however electronic machines will likely interface with humans and be dollar-cost driven, so ultimately solutions must consider additional parameters other than only technical performance factors.

  10. 44 CFR 6.81 - Additional copies.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Additional copies. 6.81... HOMELAND SECURITY GENERAL IMPLEMENTATION OF THE PRIVACY ACT OF 1974 Fees § 6.81 Additional copies. A reasonable number of additional copies shall be provided for the applicable fee to a requestor who...

  11. Security for grids

    SciTech Connect

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  12. Attachment Security Balances Perspectives: Effects of Security Priming on Highly Optimistic and Pessimistic Explanatory Styles.

    PubMed

    Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue

    2016-01-01

    Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming - activating supportive representations of attachment security - on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.

  13. Attachment Security Balances Perspectives: Effects of Security Priming on Highly Optimistic and Pessimistic Explanatory Styles

    PubMed Central

    Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue

    2016-01-01

    Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming – activating supportive representations of attachment security – on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed. PMID:27610092

  14. Attachment Security Balances Perspectives: Effects of Security Priming on Highly Optimistic and Pessimistic Explanatory Styles

    PubMed Central

    Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue

    2016-01-01

    Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming – activating supportive representations of attachment security – on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.

  15. Attachment Security Balances Perspectives: Effects of Security Priming on Highly Optimistic and Pessimistic Explanatory Styles.

    PubMed

    Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue

    2016-01-01

    Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming - activating supportive representations of attachment security - on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed. PMID:27610092

  16. Unfalsifiability of security claims.

    PubMed

    Herley, Cormac

    2016-06-01

    There is an inherent asymmetry in computer security: Things can be declared insecure by observation, but not the reverse. There is no observation that allows us to declare an arbitrary system or technique secure. We show that this implies that claims of necessary conditions for security (and sufficient conditions for insecurity) are unfalsifiable. This in turn implies an asymmetry in self-correction: Whereas the claim that countermeasures are sufficient is always subject to correction, the claim that they are necessary is not. Thus, the response to new information can only be to ratchet upward: Newly observed or speculated attack capabilities can argue a countermeasure in, but no possible observation argues one out. Further, when justifications are unfalsifiable, deciding the relative importance of defensive measures reduces to a subjective comparison of assumptions. Relying on such claims is the source of two problems: once we go wrong we stay wrong and errors accumulate, and we have no systematic way to rank or prioritize measures. PMID:27217574

  17. 17 CFR 240.12b-20 - Additional information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Additional information. 240... Securities Exchange Act of 1934 General Requirements As to Contents § 240.12b-20 Additional information. In addition to the information expressly required to be included in a statement or report, there shall...

  18. Evaluating Factors of Security Policy on Information Security Effectiveness in Developing Nations: A Case of Nigeria

    ERIC Educational Resources Information Center

    Okolo, Nkiru Benjamin

    2016-01-01

    Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…

  19. Security of healthcare information systems based on the CORBA middleware.

    PubMed

    Blobel, B; Holena, M

    1997-01-01

    The development of healthcare systems in accordance to the "Shared Care" paradigm results in co-operative health information systems across the boundaries of organisational, technological, and policy domains. Increasingly, these distributed and heterogeneous systems are based on middleware approaches, such as CORBA. Regarding the sensitivity of personal and medical data, such open, distributed, and heterogeneous health information systems demand a high level of data protection and data security, both with respect to patient information and with respect to users. The security concepts and measures available and additionally needed in health information systems based on CORBA architecture are described in this paper. The proposed security solution is also open to other middleware approaches, such as DHE or HL7. PMID:10179515

  20. Security of healthcare information systems based on the CORBA middleware.

    PubMed

    Blobel, B; Holena, M

    1997-01-01

    The development of healthcare systems in accordance to the "Shared Care" paradigm results in co-operative health information systems across the boundaries of organisational, technological, and policy domains. Increasingly, these distributed and heterogeneous systems are based on middleware approaches, such as CORBA. Regarding the sensitivity of personal and medical data, such open, distributed, and heterogeneous health information systems demand a high level of data protection and data security, both with respect to patient information and with respect to users. The security concepts and measures available and additionally needed in health information systems based on CORBA architecture are described in this paper. The proposed security solution is also open to other middleware approaches, such as DHE or HL7.

  1. Secure and Efficient Reactive Video Surveillance for Patient Monitoring.

    PubMed

    Braeken, An; Porambage, Pawani; Gurtov, Andrei; Ylianttila, Mika

    2016-01-02

    Video surveillance is widely deployed for many kinds of monitoring applications in healthcare and assisted living systems. Security and privacy are two promising factors that align the quality and validity of video surveillance systems with the caliber of patient monitoring applications. In this paper, we propose a symmetric key-based security framework for the reactive video surveillance of patients based on the inputs coming from data measured by a wireless body area network attached to the human body. Only authenticated patients are able to activate the video cameras, whereas the patient and authorized people can consult the video data. User and location privacy are at each moment guaranteed for the patient. A tradeoff between security and quality of service is defined in order to ensure that the surveillance system gets activated even in emergency situations. In addition, the solution includes resistance against tampering with the device on the patient's side.

  2. Secure and Efficient Reactive Video Surveillance for Patient Monitoring.

    PubMed

    Braeken, An; Porambage, Pawani; Gurtov, Andrei; Ylianttila, Mika

    2016-01-01

    Video surveillance is widely deployed for many kinds of monitoring applications in healthcare and assisted living systems. Security and privacy are two promising factors that align the quality and validity of video surveillance systems with the caliber of patient monitoring applications. In this paper, we propose a symmetric key-based security framework for the reactive video surveillance of patients based on the inputs coming from data measured by a wireless body area network attached to the human body. Only authenticated patients are able to activate the video cameras, whereas the patient and authorized people can consult the video data. User and location privacy are at each moment guaranteed for the patient. A tradeoff between security and quality of service is defined in order to ensure that the surveillance system gets activated even in emergency situations. In addition, the solution includes resistance against tampering with the device on the patient's side. PMID:26729130

  3. Secure and Efficient Reactive Video Surveillance for Patient Monitoring

    PubMed Central

    Braeken, An; Porambage, Pawani; Gurtov, Andrei; Ylianttila, Mika

    2016-01-01

    Video surveillance is widely deployed for many kinds of monitoring applications in healthcare and assisted living systems. Security and privacy are two promising factors that align the quality and validity of video surveillance systems with the caliber of patient monitoring applications. In this paper, we propose a symmetric key-based security framework for the reactive video surveillance of patients based on the inputs coming from data measured by a wireless body area network attached to the human body. Only authenticated patients are able to activate the video cameras, whereas the patient and authorized people can consult the video data. User and location privacy are at each moment guaranteed for the patient. A tradeoff between security and quality of service is defined in order to ensure that the surveillance system gets activated even in emergency situations. In addition, the solution includes resistance against tampering with the device on the patient’s side. PMID:26729130

  4. New security system for ID certificates in IT society

    NASA Astrophysics Data System (ADS)

    Nagashima, Hisato; Saito, Kazuharu

    2004-06-01

    This paper introduces a new security solution regarding security documents with secure unique information. Our newly proposed security measure enables outputting ID documents by commercially available printer. On this basis, a citizen can apply and accept his ID certificates to and from Issuing Authority via website. A unique gradational latent image emerges if a third party authenticates it under Infrared ray. The principle of this new measure lies in the complicated microstructure generated by our specially designed software. It is understood that its security feature based on secure software and wide applicability for commercially available printers show profound potentiality to construct new security system for ID documents in IT society.

  5. 49 CFR 1548.19 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars... CARRIER SECURITY § 1548.19 Security Directives and Information Circulars. (a) TSA may issue an Information... security measures are necessary to respond to a threat assessment, or to a specific threat against...

  6. 50 CFR 453.06 - Additional Committee powers.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF COMMERCE); ENDANGERED SPECIES COMMITTEE REGULATIONS ENDANGERED SPECIES EXEMPTION PROCESS ENDANGERED SPECIES COMMITTEE § 453.06 Additional Committee powers. (a) Secure information....

  7. 50 CFR 453.06 - Additional Committee powers.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... ADMINISTRATION, DEPARTMENT OF COMMERCE); ENDANGERED SPECIES COMMITTEE REGULATIONS ENDANGERED SPECIES EXEMPTION PROCESS ENDANGERED SPECIES COMMITTEE § 453.06 Additional Committee powers. (a) Secure information....

  8. 50 CFR 453.06 - Additional Committee powers.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... ADMINISTRATION, DEPARTMENT OF COMMERCE); ENDANGERED SPECIES COMMITTEE REGULATIONS ENDANGERED SPECIES EXEMPTION PROCESS ENDANGERED SPECIES COMMITTEE § 453.06 Additional Committee powers. (a) Secure information....

  9. 50 CFR 453.06 - Additional Committee powers.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... ADMINISTRATION, DEPARTMENT OF COMMERCE); ENDANGERED SPECIES COMMITTEE REGULATIONS ENDANGERED SPECIES EXEMPTION PROCESS ENDANGERED SPECIES COMMITTEE § 453.06 Additional Committee powers. (a) Secure information....

  10. 50 CFR 453.06 - Additional Committee powers.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... ADMINISTRATION, DEPARTMENT OF COMMERCE); ENDANGERED SPECIES COMMITTEE REGULATIONS ENDANGERED SPECIES EXEMPTION PROCESS ENDANGERED SPECIES COMMITTEE § 453.06 Additional Committee powers. (a) Secure information....

  11. Computer security engineering management

    SciTech Connect

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system.

  12. Transportation Security Administration

    MedlinePlus

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index What Can I Bring? Search form Apples Main menu Administrator Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  13. Social security financing.

    PubMed

    1980-05-01

    After nearly 2 years of study, the 1979 Advisory Council on Social Security submitted its findings and recommendations in December. In February the Bulletin published the Executive Summary of the Council's report. Because of the continuing wide public interest in the future of social security financing, the Council's detailed findings and recommendations on that subject are published below. The Council unanimously reports that all current and future beneficiaries can count on receiving the payments to which they are entitled. Among the recommendations it calls for are partial financing with nonpayroll-tax revenues. Suggested changes include hospital insurance (HI) financed through portins of personal and corporate income taxes and a part of the HI insurance payroll tax diverted to cash benefits with the balance of this tax repealed. The Council also recommends that the social security cash benefits program be brought into long-run actuarial balance--with a payroll-tax rate increase in the year 2005. It rejects the idea of a value-added tax as being inflationary. Parenthetical remarks represent additional views of the Council members cited. PMID:7423348

  14. Asian Energy Security

    SciTech Connect

    Peter Hayes, PhD

    2003-12-01

    OAK-B135 In the Asian Energy Security (AES) Project, Nautilus Institute works together with a network of collaborating groups from the countries of Northeast Asia to evaluate the energy security implications of different national and regional energy ''paths''. The goal of the Asia Energy Security project is to illuminate energy paths--and the energy policy choices that might help to bring them about--that result in a higher degree of energy security for the region and for the world as a whole, that is, to identify energy paths that are ''robust'' in meeting many different energy security and development objectives, while also offering flexibility in the face of uncertainty. In work to date, Nautilus has carefully assembled a network of colleagues from the countries of the region, trained them together as a group in the use of a common, flexible, and transparent energy and environmental analysis planning software tool (LEAP, the Long-range Energy Alternatives Planning system), and worked with them to prepare base-year energy sector models for each country. To date, complete data sets and models for ''Business as Usual'' (BAU) energy paths have been compiled for China, Japan, the Republic of Korea, and the Democratic Peoples' Republic of Korea. A partial data set and BAU path has been compiled for the Russian Far East, and a data set is being started in Mongolia, where a team of researchers has just joined the AES project. In several countries, ''Alternative'' energy paths have been developed as well, or partially elaborated. National energy sector developments, progress on national LEAP modeling, additional LEAP training, and planning for the next phase of the AES project were the topics of a recent (early November) workshop held in Vancouver, British Columbia. With funding from the Department of Energy, Nautilus is poised to build upon the successes of the project to date with a coordinated international effort to research the energy security ramifications of

  15. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  16. Measured effects of retrofits -- a refrigerant oil additive and a condenser spray device -- on the cooling performance of a heat pump

    SciTech Connect

    Levins, W.P.; Sand, J.R.; Baxter, V.D.; Linkous, R.L.

    1996-05-01

    A 15-year old, 3-ton single package air-to-air heat pump was tested in laboratory environmental chambers simulating indoor and outdoor conditions. After documenting initial performance, the unit was retrofitted with a prototype condenser water-spray device and retested. Results at standard ARI cooling rating conditions (95 F outdoor dry bulb and 80/67 F indoor dry bulb/wet bulb temperatures) showed the capacity increased by about 7%, and the electric power demand dropped by about 8%, resulting in a steady-state EER increase of 17%. Suction and discharge pressures were reduced by 7 and 37 psi, respectively. A refrigerant oil additive formulated to enhance refrigerant-side heat transfer was added at a dose of one ounce per ton of rated capacity, and the unit was tested for several days at the same 95 F outdoor conditions and showed essentially no increase in capacity, and a slight 3% increase in steady-state EER. Adding more additive lowered the EER slightly. Suction and discharge pressures were essentially unchanged. The short-term testing showed that the condenser-spray device was effective in increasing the cooling capacity and lowering the electrical demand on an old and relatively inefficient heat pump, but the refrigerant additive had little effect on the cooling performance of the unit. Sprayer issues to be resolved include the effect of a sprayer on a new, high-efficiency air conditioner/heat pump, reliable long-term operation, and economics.

  17. Barriers to creating a secure MPI

    SciTech Connect

    Brightwell, R.; Greenberg, D.S.; Matt, B.J.; Davida, G.I.

    1997-08-01

    This paper explores some of the many issues in developing security enhanced MPI for embedded real-time systems supporting the Department of Defense`s Multi-level Security policy (DoD MLS) are presented along with the preliminary design for such an MPI variant. In addition some of the many issues that need to be addressed in creating security enhanced versions of MPI for other domains are discussed. 19 refs.

  18. Redefining security.

    PubMed

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  19. Redefining security.

    PubMed

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services. PMID:12343986

  20. Secure Storage Architectures

    SciTech Connect

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to

  1. ADP computer security classification program

    SciTech Connect

    Augustson, S.J.

    1984-01-01

    CG-ADP-1, the Automatic Data Processing Security Classification Guide, provides for classification guidance (for security information) concerning the protection of Department of Energy (DOE) and DOE contractor Automatic Data Processing (ADP) systems which handle classified information. Within the DOE, ADP facilities that process classified information provide potentially lucrative targets for compromise. In conjunction with the security measures required by DOE regulations, necessary precautions must be taken to protect details of those ADP security measures which could aid in their own subversion. Accordingly, the basic principle underlying ADP security classification policy is to protect information which could be of significant assistance in gaining unauthorized access to classified information being processed at an ADP facility. Given this policy, classification topics and guidelines are approved for implementation. The basic program guide, CG-ADP-1 is broad in scope and based upon it, more detailed local guides are sometimes developed and approved for specific sites. Classification topics are provided for system features, system and security management, and passwords. Site-specific topics can be addressed in local guides if needed.

  2. 30 CFR 250.406 - What additional safety measures must I take when I conduct drilling operations on a platform that...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... when I conduct drilling operations on a platform that has producing wells or has other hydrocarbon flow... hydrocarbon flow? You must take the following safety measures when you conduct drilling operations on a platform with producing wells or that has other hydrocarbon flow: (a) You must install an...

  3. An Analysis of Potential Additional Measures of Fiscal Capacity of South Dakota School Districts. Papers in Education Finance, No. 13. Revised.

    ERIC Educational Resources Information Center

    Vincent, Phillip E.; Adams, E. Kathleen

    To help South Dakota develop new measures of school district fiscal capacity (besides assessed value per pupil) to use in its state school aid formula, researchers used multiple regression analysis to examine the effects on district expenditure per pupil of each district's average family income and of the composition of the property tax base. Also…

  4. Competition, Speculative Risks, and IT Security Outsourcing

    NASA Astrophysics Data System (ADS)

    Cezar, Asunur; Cavusoglu, Huseyin; Raghunathan, Srinivasan

    Information security management is becoming a more critical and, simultaneously, a challenging function for many firms. Even though many security managers are skeptical about outsourcing of IT security, others have cited reasons that are used for outsourcing of traditional IT functions for why security outsourcing is likely to increase. Our research offers a novel explanation, based on competitive externalities associated with IT security, for firms' decisions to outsource IT security. We show that if competitive externalities are ignored, then a firm will outsource security if and only if the MSSP offers a quality (or a cost) advantage over in-house operations, which is consistent with the traditional explanation for security outsourcing. However, a higher quality is neither a prerequisite nor a guarantee for a firm to outsource security. The competitive risk environment and the nature of the security function outsourced, in addition to quality, determine firms' outsourcing decisions. If the reward from the competitor's breach is higher than the loss from own breach, then even if the likelihood of a breach is higher under the MSSP the expected benefit from the competitive demand externality may offset the loss from the higher likelihood of breaches, resulting in one or both firms outsourcing security. The incentive to outsource security monitoring is higher than that of infrastructure management because the MSSP can reduce the likelihood of breach on both firms and thus enhance the demand externality effect. The incentive to outsource security monitoring (infrastructure management) is higher (lower) if either the likelihood of breach on both firms is lower (higher) when security is outsourced or the benefit (relative to loss) from the externality is higher (lower). The benefit from the demand externality arising out of a security breach is higher when more of the customers that leave the breached firm switch to the non-breached firm.

  5. Security analysis for fingerprint fuzzy vaults

    NASA Astrophysics Data System (ADS)

    Hartloff, Jesse; Bileschi, Maxwell; Tulyakov, Sergey; Dobler, Jimmy; Rudra, Atri; Govindaraju, Venu

    2013-05-01

    In this work we place some of the traditional biometrics work on fingerprint verification via the fuzzy vault scheme within a cryptographic framework. We show that the breaking of a fuzzy vault leads to decoding of Reed-Solomon codes from random errors, which has been proposed as a hard problem in the cryptography community. We provide a security parameter for the fuzzy vault in terms of the decoding problem, which gives context for the breaking of the fuzzy vault, whereas most of the existing literature measures the strength of the fuzzy vault in terms of its resistance to pre-defined attacks or by the entropy of the vault. We keep track of our security parameter, and provide it alongside ROC statistics. We also aim to be more aware of the nature of the fingerprints when placing them in the fuzzy vault, noting that the distribution of minutiae is far from uniformly random. The results we show provide additional support that the fuzzy vault can be a viable scheme for secure fingerprint verification.

  6. 7 CFR 766.112 - Additional security for restructured loans.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... a loan. (b) The Agency will take the best lien obtainable on all assets the borrower owns, except... subpart G of 7 CFR part 1940; (3) When the Agency cannot obtain a valid lien; (4) When the property is subsistence livestock, cash, special collateral accounts the borrower uses for the farming...

  7. 7 CFR 766.112 - Additional security for restructured loans.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... subpart G of 7 CFR part 1940; (3) When the Agency cannot obtain a valid lien; (4) When the property is... such as hand tools and lawn mowers; or (5) When a contractor holds title to a livestock or...

  8. Extremal quantum correlations and cryptographic security.

    PubMed

    Franz, T; Furrer, F; Werner, R F

    2011-06-24

    We investigate a fundamental property of device-independent security in quantum cryptography by characterizing probability distributions which are necessarily independent of the measurement results of any eavesdropper. We show that probability distributions that are secure in this sense are exactly the extremal quantum probability distributions. This allows us to give a characterization of security in algebraic terms. We apply the method to common examples for two-party as well as multiparty setups and present a scheme for verifying security of probability distributions with two parties, two measurement settings, and two outcomes. PMID:21770618

  9. From Secure Memories to Smart Card Security

    NASA Astrophysics Data System (ADS)

    Handschuh, Helena; Trichina, Elena

    Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.

  10. Security Technologies for Open Networking Environments (STONE)

    SciTech Connect

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  11. United States security strategy for the east Asia-Pacific region

    SciTech Connect

    1995-02-01

    The United States National Security Strategy published in July 1994 is based on enlarging the community of market democracies while deterring and containing a range of threats to our nation, our allies and our interests. Focusing on new threats and new opportunities, its central goals are: to enhance security by maintaining a strong defense capability and promoting cooperative security measures; to open foreign markets and spur global economic growth; and to promote democracy abroad. In accordance with the National Security Strategy, this document explains United States defense policy toward furthering these goals in the Asia-Pacific region. It builds upon the Strategy`s emphasis on maintaining a strong defense capability to enhance U.S. security and to provide a foundation for regional stability through mutually beneficial security partnerships. As the Strategy states, East Asia is a region of growing importance to American goals: nowhere are the strands of our three-part strategy more intertwined; nowhere is the need for continued engagement more evident. In thinking about the Asia-Pacific region, security comes first, and a committed United States military presence will continue to serve as a bedrock for America`s security role in this dynamic area of the world. The regional security strategy for the Asia-Pacific region emphasizes strengthening the bilateral alliances that have been at the heart of United States strategy for more than forty years. The United States is also committed to contribute to regional security through active participation in new multi-lateral fora like the ASEAN Regional Forum. Through such multi-lateral mechanisms the countries of the region seek to develop new cooperative approaches to achieve greater stability and security. Additionally, the Pacific Command sponsors multi-national military activities.

  12. Emerging Technology for School Security

    ERIC Educational Resources Information Center

    Doss, Kevin T.

    2012-01-01

    Locks and keys ring up huge costs for education institutions. No wonder many facility directors and public-safety directors have turned to automated access-control systems with magnetic-stripe cards, proximity cards and, most recently, smart cards. Smart cards can provide a host of on- and off-campus services beyond security. In addition to…

  13. 76 FR 8946 - Security Ratings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-16

    ... filed its reports timely during that 12 month period, and must not have defaulted on any debt or failed... addition, certain subsidiaries are eligible to use Form S-3 or Form F-3 for debt offerings if the parent... the registration of issuances of certain high quality debt securities.\\26\\ The criteria for use...

  14. Quality of Protection Evaluation of Security Mechanisms

    PubMed Central

    Ksiezopolski, Bogdan; Zurek, Tomasz; Mokkas, Michail

    2014-01-01

    Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol. PMID:25136683

  15. Quality of protection evaluation of security mechanisms.

    PubMed

    Ksiezopolski, Bogdan; Zurek, Tomasz; Mokkas, Michail

    2014-01-01

    Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol.

  16. STELLAR DIAMETERS AND TEMPERATURES. III. MAIN-SEQUENCE A, F, G, AND K STARS: ADDITIONAL HIGH-PRECISION MEASUREMENTS AND EMPIRICAL RELATIONS

    SciTech Connect

    Boyajian, Tabetha S.; Jones, Jeremy; White, Russel; McAlister, Harold A.; Gies, Douglas; Von Braun, Kaspar; Van Belle, Gerard; Farrington, Chris; Schaefer, Gail; Ten Brummelaar, Theo A.; Sturmann, Laszlo; Sturmann, Judit; Turner, Nils H.; Goldfinger, P. J.; Vargas, Norm; Ridgway, Stephen

    2013-07-01

    Based on CHARA Array measurements, we present the angular diameters of 23 nearby, main-sequence stars, ranging from spectral types A7 to K0, 5 of which are exoplanet host stars. We derive linear radii, effective temperatures, and absolute luminosities of the stars using Hipparcos parallaxes and measured bolometric fluxes. The new data are combined with previously published values to create an Angular Diameter Anthology of measured angular diameters to main-sequence stars (luminosity classes V and IV). This compilation consists of 125 stars with diameter uncertainties of less than 5%, ranging in spectral types from A to M. The large quantity of empirical data is used to derive color-temperature relations to an assortment of color indices in the Johnson (BVR{sub J} I{sub J} JHK), Cousins (R{sub C} I{sub C}), Kron (R{sub K} I{sub K}), Sloan (griz), and WISE (W{sub 3} W{sub 4}) photometric systems. These relations have an average standard deviation of {approx}3% and are valid for stars with spectral types A0-M4. To derive even more accurate relations for Sun-like stars, we also determined these temperature relations omitting early-type stars (T{sub eff} > 6750 K) that may have biased luminosity estimates because of rapid rotation; for this subset the dispersion is only {approx}2.5%. We find effective temperatures in agreement within a couple of percent for the interferometrically characterized sample of main-sequence stars compared to those derived via the infrared flux method and spectroscopic analysis.

  17. Broadband Screening for Interstellar Species: Additional Laboratory Measurements and Interstellar Detection of Ethanimine (CH3CHNH) in Sgr B2(N) Using GBT PRIMOS Survey Data

    NASA Astrophysics Data System (ADS)

    Loomis, Ryan; Zaleski, D.; Steber, A.; Neill, J.; Muckle, M. T.; Harris, B. J.; Seifert, N.; Pate, B.; Lattanzi, V.; Martinez, O.; McCarthy, M. C.; Remijan, A. J.

    2013-01-01

    As the availability of publicly accessible spectral line surveys from radio astronomy increases, new approaches to the identification of molecules in the interstellar medium are possible. We have performed reaction product screening measurements using broadband rotational spectroscopy to identify potential matches in the laboratory and radio astronomy spectra. A broadband spectrum of an electrical discharge of CH3CN and H2S contained several matches to unidentified features in the GBT PRIMOS Survey1 of Sgr B2(N) that did not have molecular assignments in the radio astronomy spectral catalogs. These transitions have been assigned to the E- and Z-isomers of ethanimine (CH3CHNH). The rotational spectrum of the E- and Z-isomers of CH3CHNH have been reported at mm-wave frequencies in 1980 by Lovas et al.2 and then in 1981 by Brown et al.3 The analysis of the rotational spectra of these two isomers has been extended to the microwave frequency region to verify the assignments from the GBT PRIMOS Survey. Combined fits over the range of 8 to 130GHz consisting of data from Lovas et al., broadband CP-FTMW measurements, and cavity double resonance measurements are presented for both isomers. Evidence for the detection of both isomers in Sgr B2(N) is shown along with a discussion of the method of their detection and a brief analysis of possible formation routes. 1. GBT PRIMOS Survey, http://www.cv.nrao.edu aremijan/PRIMOS 2. F.J. Lovas, R.D. Suenram, D.R. Johnson, F.O. Clark, E. Tiemann, J. Chem. Phys., 72, 4964-4972, (1980). 3. R.D. Brown, P.D. Godfrey, D.A. Winkler, Chem. Phys., 59, 243-247, (1981).

  18. Cyberspace security system

    DOEpatents

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  19. Measurement of toverline{t} production with additional jet activity, including b quark jets, in the dilepton decay channel using pp collisions at √{s} = 8 {TeV}

    NASA Astrophysics Data System (ADS)

    Khachatryan, V.; Sirunyan, A. M.; Tumasyan, A.; Adam, W.; Asilar, E.; Bergauer, T.; Brandstetter, J.; Brondolin, E.; Dragicevic, M.; Erö, J.; Friedl, M.; Frühwirth, R.; Ghete, V. M.; Hartl, C.; Hörmann, N.; Hrubec, J.; Jeitler, M.; Knünz, V.; König, A.; Krammer, M.; Krätschmer, I.; Liko, D.; Matsushita, T.; Mikulec, I.; Rabady, D.; Rahbaran, B.; Rohringer, H.; Schieck, J.; Schöfbeck, R.; Strauss, J.; Treberer-Treberspurg, W.; Waltenberger, W.; Wulz, C.-E.; Mossolov, V.; Shumeiko, N.; Suarez Gonzalez, J.; Alderweireldt, S.; Cornelis, T.; de Wolf, E. A.; Janssen, X.; Knutsson, A.; Lauwers, J.; Luyckx, S.; van de Klundert, M.; van Haevermaet, H.; van Mechelen, P.; van Remortel, N.; van Spilbeeck, A.; Abu Zeid, S.; Blekman, F.; D'Hondt, J.; Daci, N.; de Bruyn, I.; Deroover, K.; Heracleous, N.; Keaveney, J.; Lowette, S.; Moreels, L.; Olbrechts, A.; Python, Q.; Strom, D.; Tavernier, S.; van Doninck, W.; van Mulders, P.; van Onsem, G. P.; van Parijs, I.; Barria, P.; Brun, H.; Caillol, C.; Clerbaux, B.; de Lentdecker, G.; Fasanella, G.; Favart, L.; Grebenyuk, A.; Karapostoli, G.; Lenzi, T.; Léonard, A.; Maerschalk, T.; Marinov, A.; Perniè, L.; Randle-Conde, A.; Reis, T.; Seva, T.; Vander Velde, C.; Yonamine, R.; Vanlaer, P.; Yonamine, R.; Zenoni, F.; Zhang, F.; Adler, V.; Beernaert, K.; Benucci, L.; Cimmino, A.; Crucy, S.; Dobur, D.; Fagot, A.; Garcia, G.; Gul, M.; McCartin, J.; Ocampo Rios, A. A.; Poyraz, D.; Ryckbosch, D.; Salva, S.; Sigamani, M.; Strobbe, N.; Tytgat, M.; van Driessche, W.; Yazgan, E.; Zaganidis, N.; Basegmez, S.; Beluffi, C.; Bondu, O.; Brochet, S.; Bruno, G.; Caudron, A.; Ceard, L.; da Silveira, G. G.; Delaere, C.; Favart, D.; Forthomme, L.; Giammanco, A.; Hollar, J.; Jafari, A.; Jez, P.; Komm, M.; Lemaitre, V.; Mertens, A.; Musich, M.; Nuttens, C.; Perrini, L.; Pin, A.; Piotrzkowski, K.; Popov, A.; Quertenmont, L.; Selvaggi, M.; Vidal Marono, M.; Beliy, N.; Hammad, G. H.; Júnior, W. L. Aldá; Alves, F. L.; Alves, G. A.; Brito, L.; Correa Martins Junior, M.; Hamer, M.; Hensel, C.; Mora Herrera, C.; Moraes, A.; Pol, M. E.; Rebello Teles, P.; Belchior Batista Das Chagas, E.; Carvalho, W.; Chinellato, J.; Custódio, A.; da Costa, E. M.; de Jesus Damiao, D.; de Oliveira Martins, C.; Fonseca de Souza, S.; Huertas Guativa, L. M.; Malbouisson, H.; Matos Figueiredo, D.; Mundim, L.; Nogima, H.; Prado da Silva, W. L.; Santoro, A.; Sznajder, A.; Tonelli Manganote, E. J.; Vilela Pereira, A.; Ahuja, S.; Bernardes, C. A.; de Souza Santos, A.; Dogra, S.; Fernandez Perez Tomei, T. R.; Gregores, E. M.; Mercadante, P. G.; Moon, C. S.; Novaes, S. F.; Padula, Sandra S.; Romero Abad, D.; Ruiz Vargas, J. C.; Aleksandrov, A.; Hadjiiska, R.; Iaydjiev, P.; Rodozov, M.; Stoykova, S.; Sultanov, G.; Vutova, M.; Dimitrov, A.; Glushkov, I.; Litov, L.; Pavlov, B.; Petkov, P.; Ahmad, M.; Bian, J. G.; Chen, G. M.; Chen, H. S.; Chen, M.; Cheng, T.; Du, R.; Jiang, C. H.; Plestina, R.; Romeo, F.; Shaheen, S. M.; Spiezia, A.; Tao, J.; Wang, C.; Wang, Z.; Zhang, H.; Asawatangtrakuldee, C.; Ban, Y.; Li, Q.; Liu, S.; Mao, Y.; Qian, S. J.; Wang, D.; Xu, Z.; Avila, C.; Cabrera, A.; Chaparro Sierra, L. F.; Florez, C.; Gomez, J. P.; Gomez Moreno, B.; Sanabria, J. C.; Godinovic, N.; Lelas, D.; Puljak, I.; Ribeiro Cipriano, P. M.; Antunovic, Z.; Kovac, M.; Brigljevic, V.; Kadija, K.; Luetic, J.; Micanovic, S.; Sudic, L.; Attikis, A.; Mavromanolakis, G.; Mousa, J.; Nicolaou, C.; Ptochos, F.; Razis, P. A.; Rykaczewski, H.; Bodlak, M.; Finger, M.; Finger, M.; El Sawy, M.; El-Khateeb, E.; Elkafrawy, T.; Mohamed, A.; Salama, E.; Calpas, B.; Kadastik, M.; Murumaa, M.; Raidal, M.; Tiko, A.; Veelken, C.; Eerola, P.; Pekkanen, J.; Voutilainen, M.; Härkönen, J.; Karimäki, V.; Kinnunen, R.; Lampén, T.; Lassila-Perini, K.; Lehti, S.; Lindén, T.; Luukka, P.; Mäenpää, T.; Peltola, T.; Tuominen, E.; Tuominiemi, J.; Tuovinen, E.; Wendland, L.; Talvitie, J.; Tuuva, T.; Besancon, M.; Couderc, F.; Dejardin, M.; Denegri, D.; Fabbro, B.; Faure, J. L.; Favaro, C.; Ferri, F.; Ganjour, S.; Givernaud, A.; Gras, P.; Hamel de Monchenault, G.; Jarry, P.; Locci, E.; Machet, M.; Malcles, J.; Rander, J.; Rosowsky, A.; Titov, M.; Zghiche, A.; Antropov, I.; Baffioni, S.; Beaudette, F.; Busson, P.; Cadamuro, L.; Chapon, E.; Charlot, C.; Dahms, T.; Davignon, O.; Filipovic, N.; Florent, A.; Granier de Cassagnac, R.; Lisniak, S.; Mastrolorenzo, L.; Miné, P.; Naranjo, I. N.; Nguyen, M.; Ochando, C.; Ortona, G.; Paganini, P.; Pigard, P.; Regnard, S.; Salerno, R.; Sauvan, J. B.; Sirois, Y.; Strebler, T.; Yilmaz, Y.; Zabi, A.; Agram, J.-L.; Andrea, J.; Aubin, A.; Bloch, D.; Brom, J.-M.; Buttignol, M.; Chabert, E. C.; Chanon, N.; Collard, C.; Conte, E.; Coubez, X.; Fontaine, J.-C.; Gelé, D.; Goerlach, U.; Goetzmann, C.; Le Bihan, A.-C.; Merlin, J. A.; Skovpen, K.; van Hove, P.; Gadrat, S.; Beauceron, S.; Bernet, C.; Boudoul, G.; Bouvier, E.; Carrillo Montoya, C. A.; Chierici, R.; Contardo, D.; Courbon, B.; Depasse, P.; El Mamouni, H.; Fan, J.; Fay, J.; Gascon, S.; Gouzevitch, M.; Ille, B.; Lagarde, F.; Laktineh, I. B.; Lethuillier, M.; Mirabito, L.; Pequegnot, A. L.; Perries, S.; Ruiz Alvarez, J. D.; Sabes, D.; Sgandurra, L.; Sordini, V.; Vander Donckt, M.; Verdier, P.; Viret, S.; Toriashvili, T.; Lomidze, D.; Autermann, C.; Beranek, S.; Edelhoff, M.; Feld, L.; Heister, A.; Kiesel, M. K.; Klein, K.; Lipinski, M.; Ostapchuk, A.; Preuten, M.; Raupach, F.; Schael, S.; Schulte, J. F.; Verlage, T.; Weber, H.; Wittmer, B.; Zhukov, V.; Ata, M.; Brodski, M.; Dietz-Laursonn, E.; Duchardt, D.; Endres, M.; Erdmann, M.; Erdweg, S.; Esch, T.; Fischer, R.; Güth, A.; Hebbeker, T.; Heidemann, C.; Hoepfner, K.; Klingebiel, D.; Knutzen, S.; Kreuzer, P.; Merschmeyer, M.; Meyer, A.; Millet, P.; Olschewski, M.; Padeken, K.; Papacz, P.; Pook, T.; Radziej, M.; Reithler, H.; Rieger, M.; Scheuch, F.; Sonnenschein, L.; Teyssier, D.; Thüer, S.; Cherepanov, V.; Erdogan, Y.; Flügge, G.; Geenen, H.; Geisler, M.; Hoehle, F.; Kargoll, B.; Kress, T.; Kuessel, Y.; Künsken, A.; Lingemann, J.; Nehrkorn, A.; Nowack, A.; Nugent, I. M.; Pistone, C.; Pooth, O.; Stahl, A.; Aldaya Martin, M.; Asin, I.; Bartosik, N.; Behnke, O.; Behrens, U.; Bell, A. J.; Borras, K.; Burgmeier, A.; Campbell, A.; Choudhury, S.; Costanza, F.; Diez Pardos, C.; Dolinska, G.; Dooling, S.; Dorland, T.; Eckerlin, G.; Eckstein, D.; Eichhorn, T.; Flucke, G.; Gallo, E.; Garcia, J. Garay; Geiser, A.; Gizhko, A.; Gunnellini, P.; Hauk, J.; Hempel, M.; Jung, H.; Kalogeropoulos, A.; Karacheban, O.; Kasemann, M.; Katsas, P.; Kieseler, J.; Kleinwort, C.; Korol, I.; Lange, W.; Leonard, J.; Lipka, K.; Lobanov, A.; Lohmann, W.; Mankel, R.; Marfin, I.; Melzer-Pellmann, I.-A.; Meyer, A. B.; Mittag, G.; Mnich, J.; Mussgiller, A.; Naumann-Emme, S.; Nayak, A.; Ntomari, E.; Perrey, H.; Pitzl, D.; Placakyte, R.; Raspereza, A.; Roland, B.; Sahin, M. Ö.; Saxena, P.; Schoerner-Sadenius, T.; Schröder, M.; Seitz, C.; Spannagel, S.; Trippkewitz, K. D.; Walsh, R.; Wissing, C.; Blobel, V.; Centis Vignali, M.; Draeger, A. R.; Erfle, J.; Garutti, E.; Goebel, K.; Gonzalez, D.; Görner, M.; Haller, J.; Hoffmann, M.; Höing, R. S.; Junkes, A.; Klanner, R.; Kogler, R.; Lapsien, T.; Lenz, T.; Marchesini, I.; Marconi, D.; Meyer, M.; Nowatschin, D.; Ott, J.; Pantaleo, F.; Peiffer, T.; Perieanu, A.; Pietsch, N.; Poehlsen, J.; Rathjens, D.; Sander, C.; Schettler, H.; Schleper, P.; Schlieckau, E.; Schmidt, A.; Schwandt, J.; Sola, V.; Stadie, H.; Steinbrück, G.; Tholen, H.; Troendle, D.; Usai, E.; Vanelderen, L.; Vanhoefer, A.; Vormwald, B.; Akbiyik, M.; Barth, C.; Baus, C.; Berger, J.; Böser, C.; Butz, E.; Chwalek, T.; Colombo, F.; de Boer, W.; Descroix, A.; Dierlamm, A.; Fink, S.; Frensch, F.; Friese, R.; Giffels, M.; Gilbert, A.; Haitz, D.; Hartmann, F.; Heindl, S. M.; Husemann, U.; Katkov, I.; Kornmayer, A.; Lobelle Pardo, P.; Maier, B.; Mildner, H.; Mozer, M. U.; Müller, T.; Müller, Th.; Plagge, M.; Quast, G.; Rabbertz, K.; Röcker, S.; Roscher, F.; Sieber, G.; Simonis, H. J.; Stober, F. M.; Ulrich, R.; Wagner-Kuhr, J.; Wayand, S.; Weber, M.; Weiler, T.; Wöhrmann, C.; Wolf, R.; Anagnostou, G.; Daskalakis, G.; Geralis, T.; Giakoumopoulou, V. A.; Kyriakis, A.; Loukas, D.; Psallidas, A.; Topsis-Giotis, I.; Agapitos, A.; Kesisoglou, S.; Panagiotou, A.; Saoulidou, N.; Tziaferi, E.; Evangelou, I.; Flouris, G.; Foudas, C.; Kokkas, P.; Loukas, N.; Manthos, N.; Papadopoulos, I.; Paradas, E.; Strologas, J.; Bencze, G.; Hajdu, C.; Hazi, A.; Hidas, P.; Horvath, D.; Sikler, F.; Veszpremi, V.; Vesztergombi, G.; Zsigmond, A. J.; Beni, N.; Czellar, S.; Karancsi, J.; Molnar, J.; Szillasi, Z.; Bartók, M.; Makovec, A.; Raics, P.; Trocsanyi, Z. L.; Ujvari, B.; Mal, P.; Mandal, K.; Sahoo, D. K.; Sahoo, N.; Swain, S. K.; Bansal, S.; Beri, S. B.; Bhatnagar, V.; Chawla, R.; Gupta, R.; Bhawandeep, U.; Kalsi, A. K.; Kaur, A.; Kaur, M.; Kumar, R.; Mehta, A.; Mittal, M.; Singh, J. B.; Walia, G.; Kumar, Ashok; Bhardwaj, A.; Choudhary, B. C.; Garg, R. B.; Kumar, A.; Malhotra, S.; Naimuddin, M.; Nishu, N.; Ranjan, K.; Sharma, R.; Sharma, V.; Bhattacharya, S.; Chatterjee, K.; Dey, S.; Dutta, S.; Jain, Sa.; Majumdar, N.; Modak, A.; Mondal, K.; Mukherjee, S.; Mukhopadhyay, S.; Roy, A.; Roy, D.; Roy Chowdhury, S.; Sarkar, S.; Sharan, M.; Abdulsalam, A.; Chudasama, R.; Dutta, D.; Jha, V.; Kumar, V.; Mohanty, A. K.; Pant, L. M.; Shukla, P.; Topkar, A.; Aziz, T.; Banerjee, S.; Bhowmik, S.; Chatterjee, R. M.; Dewanjee, R. K.; Dugad, S.; Ganguly, S.; Ghosh, S.; Guchait, M.; Gurtu, A.; Kole, G.; Kumar, S.; Mahakud, B.; Maity, M.; Majumder, G.; Mazumdar, K.; Mitra, S.; Mohanty, G. B.; Parida, B.; Sarkar, T.; Sur, N.; Sutar, B.; Wickramage, N.; Chauhan, S.; Dube, S.; Sharma, S.; Bakhshiansohi, H.; Behnamian, H.; Etesami, S. M.; Fahim, A.; Goldouzian, R.; Khakzad, M.; Mohammadi Najafabadi, M.; Naseri, M.; Paktinat Mehdiabadi, S.; Rezaei Hosseinabadi, F.; Safarzadeh, B.; Zeinali, M.; Felcini, M.; Grunewald, M.; Abbrescia, M.; Calabria, C.; Caputo, C.; Colaleo, A.; Creanza, D.; Cristella, L.; de Filippis, N.; de Palma, M.; Fiore, L.; Iaselli, G.; Maggi, G.; Miniello, G.; Maggi, M.; My, S.; Nuzzo, S.; Pompili, A.; Pugliese, G.; Radogna, R.; Ranieri, A.; Selvaggi, G.; Silvestris, L.; Venditti, R.; Verwilligen, P.; Abbiendi, G.; Battilana, C.; Benvenuti, A. C.; Bonacorsi, D.; Braibant-Giacomelli, S.; Brigliadori, L.; Campanini, R.; Capiluppi, P.; Castro, A.; Cavallo, F. R.; Chhibra, S. S.; Codispoti, G.; Cuffiani, M.; Dallavalle, G. M.; Fabbri, F.; Fanfani, A.; Fasanella, D.; Giacomelli, P.; Grandi, C.; Guiducci, L.; Marcellini, S.; Masetti, G.; Montanari, A.; Navarria, F. L.; Perrotta, A.; Rossi, A. M.; Primavera, F.; Rovelli, T.; Siroli, G. P.; Tosi, N.; Travaglini, R.; Cappello, G.; Chiorboli, M.; Costa, S.; di Mattia, A.; Giordano, F.; Potenza, R.; Tricomi, A.; Tuve, C.; Barbagli, G.; Ciulli, V.; Civinini, C.; D'Alessandro, R.; Focardi, E.; Gonzi, S.; Gori, V.; Lenzi, P.; Meschini, M.; Paoletti, S.; Sguazzoni, G.; Tropiano, A.; Viliani, L.; Benussi, L.; Bianco, S.; Fabbri, F.; Piccolo, D.; Primavera, F.; Calvelli, V.; Ferro, F.; Lo Vetere, M.; Monge, M. R.; Robutti, E.; Tosi, S.; Brianza, L.; Dinardo, M. E.; Fiorendi, S.; Gennai, S.; Gerosa, R.; Ghezzi, A.; Govoni, P.; Malvezzi, S.; Manzoni, R. A.; Marzocchi, B.; Menasce, D.; Moroni, L.; Paganoni, M.; Pedrini, D.; Ragazzi, S.; Redaelli, N.; Tabarelli de Fatis, T.; Buontempo, S.; Cavallo, N.; di Guida, S.; Esposito, M.; Fabozzi, F.; Iorio, A. O. M.; Lanza, G.; Lista, L.; Meola, S.; Merola, M.; Paolucci, P.; Sciacca, C.; Thyssen, F.; Azzi, P.; Bacchetta, N.; Bellato, M.; Benato, L.; Bisello, D.; Boletti, A.; Carlin, R.; Checchia, P.; Dall'Osso, M.; Dorigo, T.; Dosselli, U.; Fanzago, F.; Gasparini, F.; Gasparini, U.; Gonella, F.; Gozzelino, A.; Lacaprara, S.; Margoni, M.; Meneguzzo, A. T.; Pazzini, J.; Pozzobon, N.; Ronchese, P.; Simonetto, F.; Torassa, E.; Tosi, M.; Zanetti, M.; Zotto, P.; Zucchetta, A.; Zumerle, G.; Braghieri, A.; Magnani, A.; Montagna, P.; Ratti, S. P.; Re, V.; Riccardi, C.; Salvini, P.; Vai, I.; Vitulo, P.; Alunni Solestizi, L.; Biasini, M.; Bilei, G. M.; Ciangottini, D.; Fanò, L.; Lariccia, P.; Mantovani, G.; Menichelli, M.; Saha, A.; Santocchia, A.; Androsov, K.; Azzurri, P.; Bagliesi, G.; Bernardini, J.; Boccali, T.; Castaldi, R.; Ciocci, M. A.; Dell'Orso, R.; Donato, S.; Fedi, G.; Fiori, F.; Foà, L.; Giassi, A.; Grippo, M. T.; Ligabue, F.; Lomtadze, T.; Martini, L.; Messineo, A.; Palla, F.; Rizzi, A.; Savoy-Navarro, A.; Serban, A. T.; Spagnolo, P.; Tenchini, R.; Tonelli, G.; Venturi, A.; Verdini, P. G.; Barone, L.; Cavallari, F.; D'Imperio, G.; Del Re, D.; Diemoz, M.; Gelli, S.; Jorda, C.; Longo, E.; Margaroli, F.; Meridiani, P.; Organtini, G.; Paramatti, R.; Preiato, F.; Rahatlou, S.; Rovelli, C.; Santanastasio, F.; Traczyk, P.; Amapane, N.; Arcidiacono, R.; Argiro, S.; Arneodo, M.; Bellan, R.; Biino, C.; Cartiglia, N.; Costa, M.; Covarelli, R.; Degano, A.; Demaria, N.; Finco, L.; Kiani, B.; Mariotti, C.; Maselli, S.; Migliore, E.; Monaco, V.; Monteil, E.; Obertino, M. M.; Pacher, L.; Pastrone, N.; Pelliccioni, M.; Pinna Angioni, G. L.; Ravera, F.; Potenza, A.; Romero, A.; Ruspa, M.; Sacchi, R.; Solano, A.; Staiano, A.; Tamponi, U.; Belforte, S.; Candelise, V.; Casarsa, M.; Cossutti, F.; Della Ricca, G.; Gobbo, B.; La Licata, C.; Marone, M.; Schizzi, A.; Zanetti, A.; Kropivnitskaya, T. A.; Nam, S. K.; Kim, D. H.; Kim, G. N.; Kim, M. S.; Kim, M. S.; Kong, D. J.; Lee, S.; Oh, Y. D.; Sakharov, A.; Son, D. C.; Brochero Cifuentes, J. A.; Kim, H.; Kim, T. J.; Song, S.; Choi, S.; Go, Y.; Gyun, D.; Hong, B.; Jo, M.; Kim, H.; Kim, Y.; Lee, B.; Lee, K.; Lee, K. S.; Lee, S.; Lee, S.; Park, S. K.; Roh, Y.; Yoo, H. D.; Choi, M.; Kim, H.; Kim, J. H.; Lee, J. S. H.; Park, I. C.; Ryu, G.; Ryu, M. S.; Choi, Y.; Goh, J.; Kim, D.; Kwon, E.; Lee, J.; Yu, I.; Juodagalvis, A.; Vaitkus, J.; Ahmed, I.; Ibrahim, Z. A.; Komaragiri, J. R.; Md Ali, M. A. B.; Mohamad Idris, F.; Wan Abdullah, W. A. T.; Yusli, M. N.; Wan Abdullah, W. A. T.; Casimiro Linares, E.; Castilla-Valdez, H.; de La Cruz-Burelo, E.; Heredia-de La Cruz, I.; Hernandez-Almada, A.; Lopez-Fernandez, R.; Sanchez-Hernandez, A.; Carrillo Moreno, S.; Vazquez Valencia, F.; Pedraza, I.; Salazar Ibarguen, H. A.; Morelos Pineda, A.; Krofcheck, D.; Butler, P. H.; Ahmad, A.; Ahmad, M.; Hassan, Q.; Hoorani, H. R.; Khan, W. A.; Khurshid, T.; Shoaib, M.; Bialkowska, H.; Bluj, M.; Boimska, B.; Frueboes, T.; Górski, M.; Kazana, M.; Nawrocki, K.; Romanowska-Rybinska, K.; Szleper, M.; Zalewski, P.; Brona, G.; Bunkowski, K.; Byszuk, A.; Doroba, K.; Kalinowski, A.; Konecki, M.; Krolikowski, J.; Misiura, M.; Olszewski, M.; Walczak, M.; Bargassa, P.; da Cruz E Silva, C. Beir Ao; di Francesco, A.; Faccioli, P.; Parracho, P. G. Ferreira; Gallinaro, M.; Leonardo, N.; Lloret Iglesias, L.; Nguyen, F.; Rodrigues Antunes, J.; Seixas, J.; Toldaiev, O.; Vadruccio, D.; Varela, J.; Vischia, P.; Afanasiev, S.; Bunin, P.; Gavrilenko, M.; Golutvin, I.; Gorbunov, I.; Kamenev, A.; Karjavin, V.; Konoplyanikov, V.; Lanev, A.; Malakhov, A.; Matveev, V.; Moisenz, P.; Palichik, V.; Perelygin, V.; Savina, M.; Shmatov, S.; Shulha, S.; Smirnov, V.; Zarubin, A.; Golovtsov, V.; Ivanov, Y.; Kim, V.; Kuznetsova, E.; Levchenko, P.; Murzin, V.; Oreshkin, V.; Smirnov, I.; Sulimov, V.; Uvarov, L.; Vavilov, S.; Vorobyev, A.; Andreev, Yu.; Dermenev, A.; Gninenko, S.; Golubev, N.; Karneyeu, A.; Kirsanov, M.; Krasnikov, N.; Pashenkov, A.; Tlisov, D.; Toropin, A.; Epshteyn, V.; Gavrilov, V.; Lychkovskaya, N.; Popov, V.; Pozdnyakov, L.; Safronov, G.; Spiridonov, A.; Vlasov, E.; Zhokin, A.; Bylinkin, A.; Andreev, V.; Azarkin, M.; Dremin, I.; Kirakosyan, M.; Leonidov, A.; Mesyats, G.; Rusakov, S. V.; Baskakov, A.; Belyaev, A.; Boos, E.; Bunichev, V.; Dubinin, M.; Dudko, L.; Klyukhin, V.; Kodolova, O.; Korneeva, N.; Lokhtin, I.; Myagkov, I.; Obraztsov, S.; Perfilov, M.; Petrushanko, S.; Savrin, V.; Azhgirey, I.; Bayshev, I.; Bitioukov, S.; Kachanov, V.; Kalinin, A.; Konstantinov, D.; Krychkine, V.; Petrov, V.; Ryutin, R.; Sobol, A.; Tourtchanovitch, L.; Troshin, S.; Tyurin, N.; Uzunian, A.; Volkov, A.; Adzic, P.; Milosevic, J.; Rekovic, V.; Alcaraz Maestre, J.; Battilana, C.; Calvo, E.; Cerrada, M.; Chamizo Llatas, M.; Colino, N.; de La Cruz, B.; Delgado Peris, A.; Domínguez Vázquez, D.; Escalante Del Valle, A.; Fernandez Bedoya, C.; Ramos, J. P. Fernández; Flix, J.; Fouz, M. C.; Garcia-Abia, P.; Gonzalez Lopez, O.; Goy Lopez, S.; Hernandez, J. M.; Josa, M. I.; Navarro de Martino, E.; Yzquierdo, A. Pérez-Calero; Puerta Pelayo, J.; Quintario Olmeda, A.; Redondo, I.; Romero, L.; Santaolalla, J.; Soares, M. S.; Albajar, C.; de Trocóniz, J. F.; Missiroli, M.; Moran, D.; Cuevas, J.; Fernandez Menendez, J.; Folgueras, S.; Gonzalez Caballero, I.; Palencia Cortezon, E.; Vizan Garcia, J. M.; Cabrillo, I. J.; Calderon, A.; Castiñeiras de Saa, J. R.; de Castro Manzano, P.; Duarte Campderros, J.; Fernandez, M.; Garcia-Ferrero, J.; Gomez, G.; Lopez Virto, A.; Marco, J.; Marco, R.; Martinez Rivero, C.; Matorras, F.; Munoz Sanchez, F. J.; Piedra Gomez, J.; Rodrigo, T.; Rodríguez-Marrero, A. Y.; Ruiz-Jimeno, A.; Scodellaro, L.; Trevisani, N.; Vila, I.; Vilar Cortabitarte, R.; Abbaneo, D.; Auffray, E.; Auzinger, G.; Bachtis, M.; Baillon, P.; Ball, A. H.; Barney, D.; Benaglia, A.; Bendavid, J.; Benhabib, L.; Benitez, J. F.; Berruti, G. M.; Bloch, P.; Bocci, A.; Bonato, A.; Botta, C.; Breuker, H.; Camporesi, T.; Castello, R.; Cerminara, G.; D'Alfonso, M.; D'Enterria, D.; Dabrowski, A.; Daponte, V.; David, A.; de Gruttola, M.; de Guio, F.; de Roeck, A.; de Visscher, S.; di Marco, E.; Dobson, M.; Dordevic, M.; Dorney, B.; Du Pree, T.; Dünser, M.; Dupont, N.; Elliott-Peisert, A.; Franzoni, G.; Funk, W.; Gigi, D.; Gill, K.; Giordano, D.; Girone, M.; Glege, F.; Guida, R.; Gundacker, S.; Guthoff, M.; Hammer, J.; Harris, P.; Hegeman, J.; Innocente, V.; Janot, P.; Kirschenmann, H.; Kortelainen, M. J.; Kousouris, K.; Krajczar, K.; Lecoq, P.; Lourenço, C.; Lucchini, M. T.; Magini, N.; Malgeri, L.; Mannelli, M.; Martelli, A.; Masetti, L.; Meijers, F.; Mersi, S.; Meschi, E.; Moortgat, F.; Morovic, S.; Mulders, M.; Nemallapudi, M. V.; Neugebauer, H.; Orfanelli, S.; Orsini, L.; Pape, L.; Perez, E.; Peruzzi, M.; Petrilli, A.; Petrucciani, G.; Pfeiffer, A.; Piparo, D.; Racz, A.; Rolandi, G.; Rovere, M.; Ruan, M.; Sakulin, H.; Schäfer, C.; Schwick, C.; Seidel, M.; Sharma, A.; Silva, P.; Simon, M.; Sphicas, P.; Steggemann, J.; Stieger, B.; Stoye, M.; Takahashi, Y.; Treille, D.; Triossi, A.; Tsirou, A.; Veres, G. I.; Wardle, N.; Wöhri, H. K.; Zagozdzinska, A.; Zeuner, W. D.; Bertl, W.; Deiters, K.; Erdmann, W.; Horisberger, R.; Ingram, Q.; Kaestli, H. C.; Kotlinski, D.; Langenegger, U.; Renker, D.; Rohe, T.; Bachmair, F.; Bäni, L.; Bianchini, L.; Casal, B.; Dissertori, G.; Dittmar, M.; Donegà, M.; Eller, P.; Grab, C.; Heidegger, C.; Hits, D.; Hoss, J.; Kasieczka, G.; Lustermann, W.; Mangano, B.; Marionneau, M.; Martinez Ruiz Del Arbol, P.; Masciovecchio, M.; Meister, D.; Micheli, F.; Musella, P.; Nessi-Tedaldi, F.; Pandolfi, F.; Pata, J.; Pauss, F.; Perrozzi, L.; Quittnat, M.; Rossini, M.; Starodumov, A.; Takahashi, M.; Tavolaro, V. R.; Theofilatos, K.; Wallny, R.; Aarrestad, T. K.; Amsler, C.; Caminada, L.; Canelli, M. F.; Chiochia, V.; de Cosa, A.; Galloni, C.; Hinzmann, A.; Hreus, T.; Kilminster, B.; Lange, C.; Ngadiuba, J.; Pinna, D.; Robmann, P.; Ronga, F. J.; Salerno, D.; Yang, Y.; Cardaci, M.; Chen, K. H.; Doan, T. H.; Jain, Sh.; Khurana, R.; Konyushikhin, M.; Kuo, C. M.; Lin, W.; Lu, Y. J.; Yu, S. S.; Kumar, Arun; Bartek, R.; Chang, P.; Chang, Y. H.; Chao, Y.; Chen, K. F.; Chen, P. H.; Dietz, C.; Fiori, F.; Grundler, U.; Hou, W.-S.; Hsiung, Y.; Liu, Y. F.; Lu, R.-S.; Miñano Moya, M.; Petrakou, E.; Tsai, J. F.; Tzeng, Y. M.; Asavapibhop, B.; Kovitanggoon, K.; Singh, G.; Srimanobhas, N.; Suwonjandee, N.; Adiguzel, A.; Cerci, S.; Demiroglu, Z. S.; Dozen, C.; Dumanoglu, I.; Girgis, S.; Gokbulut, G.; Guler, Y.; Guler, Y.; Gurpinar, E.; Hos, I.; Kangal, E. E.; Kayis Topaksu, A.; Onengut, G.; Ozdemir, K.; Ozturk, S.; Tali, B.; Topakli, H.; Vergili, M.; Zorbilmez, C.; Akin, I. V.; Bilin, B.; Bilmis, S.; Isildak, B.; Karapinar, G.; Yalvac, M.; Zeyrek, M.; Gülmez, E.; Kaya, M.; Kaya, O.; Yetkin, E. A.; Yetkin, T.; Cakir, A.; Cankocak, K.; Sen, S.; Vardarlı, F. I.; Grynyov, B.; Levchuk, L.; Sorokin, P.; Aggleton, R.; Ball, F.; Beck, L.; Brooke, J. J.; Clement, E.; Cussans, D.; Flacher, H.; Goldstein, J.; Grimes, M.; Heath, G. P.; Heath, H. F.; Jacob, J.; Kreczko, L.; Lucas, C.; Meng, Z.; Newbold, D. M.; Paramesvaran, S.; Poll, A.; Sakuma, T.; Seif El Nasr-Storey, S.; Senkin, S.; Smith, D.; Smith, V. J.; Bell, K. W.; Belyaev, A.; Brew, C.; Brown, R. M.; Calligaris, L.; Cieri, D.; Cockerill, D. J. A.; Coughlan, J. A.; Harder, K.; Harper, S.; Olaiya, E.; Petyt, D.; Shepherd-Themistocleous, C. H.; Thea, A.; Tomalin, I. R.; Williams, T.; Womersley, W. J.; Worm, S. D.; Baber, M.; Bainbridge, R.; Buchmuller, O.; Bundock, A.; Burton, D.; Casasso, S.; Citron, M.; Colling, D.; Corpe, L.; Cripps, N.; Dauncey, P.; Davies, G.; de Wit, A.; Della Negra, M.; Dunne, P.; Elwood, A.; Elwood, A.; Ferguson, W.; Fulcher, J.; Futyan, D.; Hall, G.; Iles, G.; Kenzie, M.; Lane, R.; Lucas, R.; Lyons, L.; Magnan, A.-M.; Malik, S.; Nash, J.; Nikitenko, A.; Pela, J.; Pesaresi, M.; Petridis, K.; Raymond, D. M.; Richards, A.; Rose, A.; Seez, C.; Tapper, A.; Uchida, K.; Vazquez Acosta, M.; Virdee, T.; Zenz, S. C.; Cole, J. E.; Hobson, P. R.; Khan, A.; Kyberd, P.; Leggat, D.; Leslie, D.; Reid, I. D.; Symonds, P.; Teodorescu, L.; Turner, M.; Borzou, A.; Call, K.; Dittmann, J.; Hatakeyama, K.; Liu, H.; Pastika, N.; Scarborough, T.; Wu, Z.; Charaf, O.; Cooper, S. I.; Henderson, C.; Rumerio, P.; Arcaro, D.; Avetisyan, A.; Bose, T.; Fantasia, C.; Gastler, D.; Lawson, P.; Rankin, D.; Richardson, C.; Rohlf, J.; St. John, J.; Sulak, L.; Zou, D.; Alimena, J.; Berry, E.; Bhattacharya, S.; Cutts, D.; Dhingra, N.; Ferapontov, A.; Garabedian, A.; Hakala, J.; Heintz, U.; Laird, E.; Landsberg, G.; Mao, Z.; Narain, M.; Piperov, S.; Sagir, S.; Syarif, R.; Breedon, R.; Breto, G.; de La Barca Sanchez, M. Calderon; Chauhan, S.; Chertok, M.; Conway, J.; Conway, R.; Cox, P. T.; Erbacher, R.; Gardner, M.; Ko, W.; Lander, R.; Mulhearn, M.; Pellett, D.; Pilot, J.; Ricci-Tam, F.; Shalhout, S.; Smith, J.; Squires, M.; Stolp, D.; Tripathi, M.; Wilbur, S.; Yohay, R.; Cousins, R.; Everaerts, P.; Farrell, C.; Hauser, J.; Ignatenko, M.; Saltzberg, D.; Valuev, V.; Weber, M.; Burt, K.; Clare, R.; Ellison, J.; Gary, J. W.; Hanson, G.; Heilman, J.; Ivova Paneva, M.; Jandir, P.; Kennedy, E.; Lacroix, F.; Long, O. R.; Luthra, A.; Malberti, M.; Negrete, M. Olmedo; Shrinivas, A.; Wei, H.; Wimpenny, S.; Yates, B. R.; Branson, J. G.; Cerati, G. B.; Cittolin, S.; D'Agnolo, R. T.; Derdzinski, M.; Holzner, A.; Kelley, R.; Klein, D.; Letts, J.; MacNeill, I.; Olivito, D.; Padhi, S.; Pieri, M.; Sani, M.; Sharma, V.; Simon, S.; Tadel, M.; Tu, Y.; Vartak, A.; Wasserbaech, S.; Welke, C.; Würthwein, F.; Yagil, A.; Zevi Della Porta, G.; Bradmiller-Feld, J.; Campagnari, C.; Dishaw, A.; Dutta, V.; Flowers, K.; Franco Sevilla, M.; Geffert, P.; George, C.; Golf, F.; Gouskos, L.; Gran, J.; Incandela, J.; McColl, N.; Mullin, S. D.; Mullin, S. D.; Richman, J.; Stuart, D.; Suarez, I.; West, C.; Yoo, J.; Anderson, D.; Apresyan, A.; Bornheim, A.; Bunn, J.; Chen, Y.; Duarte, J.; Mott, A.; Newman, H. B.; Pena, C.; Pierini, M.; Spiropulu, M.; Vlimant, J. R.; Xie, S.; Zhu, R. Y.; Andrews, M. B.; Azzolini, V.; Calamba, A.; Carlson, B.; Ferguson, T.; Paulini, M.; Russ, J.; Sun, M.; Vogel, H.; Vorobiev, I.; Cumalat, J. P.; Ford, W. T.; Gaz, A.; Jensen, F.; Johnson, A.; Krohn, M.; Mulholland, T.; Nauenberg, U.; Stenson, K.; Wagner, S. R.; Alexander, J.; Chatterjee, A.; Chaves, J.; Chu, J.; Dittmer, S.; Eggert, N.; Mirman, N.; Nicolas Kaufman, G.; Patterson, J. R.; Rinkevicius, A.; Ryd, A.; Skinnari, L.; Soffi, L.; Sun, W.; Tan, S. M.; Teo, W. D.; Thom, J.; Thompson, J.; Tucker, J.; Weng, Y.; Wittich, P.; Abdullin, S.; Albrow, M.; Anderson, J.; Apollinari, G.; Banerjee, S.; Bauerdick, L. A. T.; Beretvas, A.; Berryhill, J.; Bhat, P. C.; Bolla, G.; Burkett, K.; Butler, J. N.; Cheung, H. W. K.; Chlebana, F.; Cihangir, S.; Elvira, V. D.; Fisk, I.; Freeman, J.; Gottschalk, E.; Gray, L.; Green, D.; Grünendahl, S.; Gutsche, O.; Hanlon, J.; Hare, D.; Harris, R. M.; Hasegawa, S.; Hirschauer, J.; Hu, Z.; Jindariani, S.; Johnson, M.; Joshi, U.; Jung, A. W.; Klima, B.; Kreis, B.; Kwan, S.; Lammel, S.; Linacre, J.; Lincoln, D.; Lipton, R.; Liu, T.; Lopes de Sá, R.; Lykken, J.; Maeshima, K.; Marraffino, J. M.; Martinez Outschoorn, V. I.; Maruyama, S.; Mason, D.; McBride, P.; Merkel, P.; Mishra, K.; Mrenna, S.; Nahn, S.; Newman-Holmes, C.; O'Dell, V.; Pedro, K.; Prokofyev, O.; Rakness, G.; Sexton-Kennedy, E.; Soha, A.; Spalding, W. J.; Spiegel, L.; Taylor, L.; Tkaczyk, S.; Tran, N. V.; Uplegger, L.; Vaandering, E. W.; Vernieri, C.; Verzocchi, M.; Vidal, R.; Weber, H. A.; Whitbeck, A.; Yang, F.; Acosta, D.; Avery, P.; Bortignon, P.; Bourilkov, D.; Carnes, A.; Carver, M.; Curry, D.; Das, S.; di Giovanni, G. P.; Field, R. D.; Furic, I. K.; Gleyzer, S. V.; Hugon, J.; Konigsberg, J.; Korytov, A.; Low, J. F.; Ma, P.; Matchev, K.; Mei, H.; Milenovic, P.; Mitselmakher, G.; Rank, D.; Rossin, R.; Shchutska, L.; Snowball, M.; Sperka, D.; Terentyev, N.; Thomas, L.; Wang, J.; Wang, S.; Yelton, J.; Hewamanage, S.; Linn, S.; Markowitz, P.; Martinez, G.; Rodriguez, J. L.; Adams, J. R.; Ackert, A.; Adams, T.; Askew, A.; Bochenek, J.; Diamond, B.; Haas, J.; Hagopian, S.; Hagopian, V.; Johnson, K. F.; Khatiwada, A.; Prosper, H.; Weinberg, M.; Baarmand, M. M.; Bhopatkar, V.; Colafranceschi, S.; Hohlmann, M.; Kalakhety, H.; Noonan, D.; Roy, T.; Yumiceva, F.; Adams, M. R.; Apanasevich, L.; Berry, D.; Betts, R. R.; Bucinskaite, I.; Cavanaugh, R.; Evdokimov, O.; Gauthier, L.; Gerber, C. E.; Hofman, D. J.; Kurt, P.; O'Brien, C.; Sandoval Gonzalez, L. D.; Silkworth, C.; Turner, P.; Varelas, N.; Wu, Z.; Zakaria, M.; Bilki, B.; Clarida, W.; Dilsiz, K.; Durgut, S.; Gandrajula, R. P.; Haytmyradov, M.; Khristenko, V.; Merlo, J.-P.; Mermerkaya, H.; Mestvirishvili, A.; Moeller, A.; Nachtman, J.; Ogul, H.; Onel, Y.; Ozok, F.; Penzo, A.; Snyder, C.; Tiras, E.; Wetzel, J.; Yi, K.; Anderson, I.; Anderson, I.; Barnett, B. A.; Blumenfeld, B.; Eminizer, N.; Fehling, D.; Feng, L.; Gritsan, A. V.; Maksimovic, P.; Martin, C.; Osherson, M.; Roskes, J.; Sady, A.; Sarica, U.; Swartz, M.; Xiao, M.; Xin, Y.; You, C.; Xiao, M.; Baringer, P.; Bean, A.; Benelli, G.; Bruner, C.; Kenny, R. P.; Majumder, D.; Majumder, D.; Malek, M.; Murray, M.; Sanders, S.; Stringer, R.; Wang, Q.; Ivanov, A.; Kaadze, K.; Khalil, S.; Makouski, M.; Maravin, Y.; Mohammadi, A.; Saini, L. K.; Skhirtladze, N.; Toda, S.; Lange, D.; Rebassoo, F.; Wright, D.; Anelli, C.; Baden, A.; Baron, O.; Belloni, A.; Calvert, B.; Eno, S. C.; Ferraioli, C.; Gomez, J. A.; Hadley, N. J.; Jabeen, S.; Jabeen, S.; Kellogg, R. G.; Kolberg, T.; Kunkle, J.; Lu, Y.; Mignerey, A. C.; Shin, Y. H.; Skuja, A.; Tonjes, M. B.; Tonwar, S. C.; Apyan, A.; Barbieri, R.; Baty, A.; Bierwagen, K.; Brandt, S.; Bierwagen, K.; Busza, W.; Cali, I. A.; Demiragli, Z.; Di Matteo, L.; Gomez Ceballos, G.; Goncharov, M.; Gulhan, D.; Iiyama, Y.; Innocenti, G. M.; Klute, M.; Kovalskyi, D.; Lai, Y. S.; Lee, Y.-J.; Levin, A.; Luckey, P. D.; Marini, A. C.; McGinn, C.; Mironov, C.; Narayanan, S.; Niu, X.; Paus, C.; Ralph, D.; Roland, C.; Roland, G.; Salfeld-Nebgen, J.; Stephans, G. S. F.; Sumorok, K.; Varma, M.; Velicanu, D.; Veverka, J.; Wang, J.; Wang, T. W.; Wyslouch, B.; Yang, M.; Zhukova, V.; Dahmes, B.; Evans, A.; Finkel, A.; Gude, A.; Hansen, P.; Kalafut, S.; Kao, S. C.; Klapoetke, K.; Kubota, Y.; Lesko, Z.; Mans, J.; Nourbakhsh, S.; Ruckstuhl, N.; Rusack, R.; Tambe, N.; Turkewitz, J.; Acosta, J. G.; Oliveros, S.; Avdeeva, E.; Bloom, K.; Bose, S.; Claes, D. R.; Dominguez, A.; Fangmeier, C.; Gonzalez Suarez, R.; Kamalieddin, R.; Keller, J.; Knowlton, D.; Kravchenko, I.; Meier, F.; Monroy, J.; Ratnikov, F.; Siado, J. E.; Snow, G. R.; Alyari, M.; Dolen, J.; George, J.; Godshalk, A.; Harrington, C.; Iashvili, I.; Kaisen, J.; Kharchilava, A.; Kumar, A.; Rappoccio, S.; Roozbahani, B.; Alverson, G.; Barberis, E.; Baumgartel, D.; Chasco, M.; Hortiangtham, A.; Massironi, A.; Morse, D. M.; Nash, D.; Orimoto, T.; Teixeira de Lima, R.; Trocino, D.; Wang, R.-J.; Wood, D.; Zhang, J.; Hahn, K. A.; Kubik, A.; Mucia, N.; Odell, N.; Pollack, B.; Pozdnyakov, A.; Schmitt, M.; Stoynev, S.; Sung, K.; Trovato, M.; Velasco, M.; Brinkerhoff, A.; Dev, N.; Hildreth, M.; Jessop, C.; Karmgard, D. J.; Kellams, N.; Lannon, K.; Lynch, S.; Marinelli, N.; Meng, F.; Mueller, C.; Musienko, Y.; Pearson, T.; Planer, M.; Reinsvold, A.; Ruchti, R.; Smith, G.; Taroni, S.; Valls, N.; Wayne, M.; Wolf, M.; Woodard, A.; Antonelli, L.; Brinson, J.; Bylsma, B.; Durkin, L. S.; Flowers, S.; Hart, A.; Hill, C.; Hughes, R.; Ji, W.; Kotov, K.; Ling, T. Y.; Liu, B.; Luo, W.; Puigh, D.; Rodenburg, M.; Winer, B. L.; Wulsin, H. W.; Driga, O.; Elmer, P.; Hardenbrook, J.; Hebda, P.; Koay, S. A.; Lujan, P.; Marlow, D.; Medvedeva, T.; Mooney, M.; Olsen, J.; Palmer, C.; Piroué, P.; Saka, H.; Stickland, D.; Tully, C.; Zuranski, A.; Malik, S.; Barnes, V. E.; Benedetti, D.; Bortoletto, D.; Gutay, L.; Jha, M. K.; Jones, M.; Jung, K.; Miller, D. H.; Neumeister, N.; Primavera, F.; Radburn-Smith, B. C.; Shi, X.; Shipsey, I.; Silvers, D.; Sun, J.; Svyatkovskiy, A.; Wang, F.; Xie, W.; Xu, L.; Parashar, N.; Stupak, J.; Adair, A.; Akgun, B.; Chen, Z.; Ecklund, K. M.; Geurts, F. J. M.; Guilbaud, M.; Li, W.; Michlin, B.; Northup, M.; Padley, B. P.; Redjimi, R.; Roberts, J.; Rorie, J.; Tu, Z.; Zabel, J.; Betchart, B.; Bodek, A.; de Barbaro, P.; Demina, R.; Eshaq, Y.; Ferbel, T.; Galanti, M.; Galanti, M.; Garcia-Bellido, A.; Han, J.; Harel, A.; Hindrichs, O.; Hindrichs, O.; Khukhunaishvili, A.; Petrillo, G.; Tan, P.; Verzetti, M.; Arora, S.; Barker, A.; Chou, J. P.; Contreras-Campana, C.; Contreras-Campana, E.; Duggan, D.; Ferencek, D.; Gershtein, Y.; Gray, R.; Halkiadakis, E.; Hidas, D.; Hughes, E.; Kaplan, S.; Kunnawalkam Elayavalli, R.; Lath, A.; Nash, K.; Panwalkar, S.; Park, M.; Salur, S.; Schnetzer, S.; Sheffield, D.; Somalwar, S.; Stone, R.; Thomas, S.; Thomassen, P.; Walker, M.; Foerster, M.; Riley, G.; Rose, K.; Spanier, S.; York, A.; Bouhali, O.; Castaneda Hernandez, A.; Dalchenko, M.; de Mattia, M.; Delgado, A.; Dildick, S.; Dildick, S.; Eusebi, R.; Gilmore, J.; Kamon, T.; Krutelyov, V.; Krutelyov, V.; Mueller, R.; Osipenkov, I.; Pakhotin, Y.; Patel, R.; Patel, R.; Perloff, A.; Rose, A.; Safonov, A.; Tatarinov, A.; Ulmer, K. A.; Akchurin, N.; Cowden, C.; Damgov, J.; Dragoiu, C.; Dudero, P. R.; Faulkner, J.; Kunori, S.; Lamichhane, K.; Lee, S. W.; Libeiro, T.; Undleeb, S.; Volobouev, I.; Appelt, E.; Delannoy, A. G.; Greene, S.; Gurrola, A.; Janjam, R.; Johns, W.; Maguire, C.; Mao, Y.; Melo, A.; Ni, H.; Sheldon, P.; Snook, B.; Tuo, S.; Velkovska, J.; Xu, Q.; Arenton, M. W.; Cox, B.; Francis, B.; Goodell, J.; Hirosky, R.; Ledovskoy, A.; Li, H.; Lin, C.; Neu, C.; Sinthuprasith, T.; Sun, X.; Wang, Y.; Wolfe, E.; Wood, J.; Xia, F.; Clarke, C.; Harr, R.; Karchin, P. E.; Kottachchi Kankanamge Don, C.; Lamichhane, P.; Sturdy, J.; Belknap, D. A.; Carlsmith, D.; Cepeda, M.; Dasu, S.; Dodd, L.; Duric, S.; Gomber, B.; Grothe, M.; Hall-Wilton, R.; Herndon, M.; Hervé, A.; Klabbers, P.; Lanaro, A.; Levine, A.; Long, K.; Loveless, R.; Mohapatra, A.; Ojalvo, I.; Perry, T.; Pierro, G. A.; Polese, G.; Ruggles, T.; Sarangi, T.; Savin, A.; Sharma, A.; Smith, N.; Smith, W. H.; Taylor, D.; Woods, N.; Collaboration, [Authorinst]The Cms

    2016-07-01

    Jet multiplicity distributions in top quark pair ({t}{overline{t}}) events are measured in pp collisions at a centre-of-mass energy of 8 TeV with the CMS detector at the LHC using a data set corresponding to an integrated luminosity of 19.7 {fb}^ {-1}. The measurement is performed in the dilepton decay channels (e^+e^-, μ^+ μ^-, and e^{±} μ^{∓}). The absolute and normalized differential cross sections for {t}overline{t} production are measured as a function of the jet multiplicity in the event for different jet transverse momentum thresholds and the kinematic properties of the leading additional jets. The differential {t overline{t} b} and {t overline{t} b overline{b}} cross sections are presented for the first time as a function of the kinematic properties of the leading additional b jets. Furthermore, the fraction of events without additional jets above a threshold is measured as a function of the transverse momenta of the leading additional jets and the scalar sum of the transverse momenta of all additional jets. The data are compared and found to be consistent with predictions from several perturbative quantum chromodynamics event generators and a next-to-leading order calculation.

  20. Measurement of $$\\mathrm{ t \\bar{t} } $$ production with additional jet activity, including b quark jets, in the dilepton decay channel using pp collisions at $$\\sqrt{s} =$$ 8 TeV

    DOE PAGES

    Khachatryan, Vardan

    2016-07-07

    Jet multiplicity distributions in top quark pair (tt-bar) events are measured in pp collisions at a centre-of-mass energy of 8 TeV with the CMS detector at the LHC using a data set corresponding to an integrated luminosity of 19.7 fb-1. The measurement is performed in the dilepton decay channels (e+e-,μ+μ- and e±μ∓). Furthermore, the absolute and normalized differential cross sections for tt-bar production are measured as a function of the jet multiplicity in the event for different jet transverse momentum thresholds and the kinematic properties of the leading additional jets. The differential tt-barb and tt-barbb-bar cross sections are presented formore » the first time as a function of the kinematic properties of the leading additional b jets. Furthermore, the fraction of events without additional jets above a threshold is measured as a function of the transverse momenta of the leading additional jets and the scalar sum of the transverse momenta of all additional jets. Finally, the data are compared and found to be consistent with predictions from several perturbative quantum chromodynamics event generators and a next-to-leading ordercalculation.« less

  1. Additive and epistatic genome-wide association for growth and ultrasound scan measures of carcass-related traits in Brahman cattle.

    PubMed

    Ali, A A; Khatkar, M S; Kadarmideen, H N; Thomson, P C

    2015-04-01

    Genome-wide association studies are routinely used to identify genomic regions associated with traits of interest. However, this ignores an important class of genomic associations, that of epistatic interactions. A genome-wide interaction analysis between single nucleotide polymorphisms (SNPs) using highly dense markers can detect epistatic interactions, but is a difficult task due to multiple testing and computational demand. However, It is important for revealing complex trait heredity. This study considers analytical methods that detect statistical interactions between pairs of loci. We investigated a three-stage modelling procedure: (i) a model without the SNP to estimate the variance components; (ii) a model with the SNP using variance component estimates from (i), thus avoiding iteration; and (iii) using the significant SNPs from (ii) for genome-wide epistasis analysis. We fitted these three-stage models to field data for growth and ultrasound measures for subcutaneous fat thickness in Brahman cattle. The study demonstrated the usefulness of modelling epistasis in the analysis of complex traits as it revealed extra sources of genetic variation and identified potential candidate genes affecting the concentration of insulin-like growth factor-1 and ultrasound scan measure of fat depth traits. Information about epistasis can add to our understanding of the complex genetic networks that form the fundamental basis of biological systems. PMID:25754883

  2. Additive and epistatic genome-wide association for growth and ultrasound scan measures of carcass-related traits in Brahman cattle.

    PubMed

    Ali, A A; Khatkar, M S; Kadarmideen, H N; Thomson, P C

    2015-04-01

    Genome-wide association studies are routinely used to identify genomic regions associated with traits of interest. However, this ignores an important class of genomic associations, that of epistatic interactions. A genome-wide interaction analysis between single nucleotide polymorphisms (SNPs) using highly dense markers can detect epistatic interactions, but is a difficult task due to multiple testing and computational demand. However, It is important for revealing complex trait heredity. This study considers analytical methods that detect statistical interactions between pairs of loci. We investigated a three-stage modelling procedure: (i) a model without the SNP to estimate the variance components; (ii) a model with the SNP using variance component estimates from (i), thus avoiding iteration; and (iii) using the significant SNPs from (ii) for genome-wide epistasis analysis. We fitted these three-stage models to field data for growth and ultrasound measures for subcutaneous fat thickness in Brahman cattle. The study demonstrated the usefulness of modelling epistasis in the analysis of complex traits as it revealed extra sources of genetic variation and identified potential candidate genes affecting the concentration of insulin-like growth factor-1 and ultrasound scan measure of fat depth traits. Information about epistasis can add to our understanding of the complex genetic networks that form the fundamental basis of biological systems.

  3. Building Security into Schools.

    ERIC Educational Resources Information Center

    Kosar, John E.; Ahmed, Faruq

    2000-01-01

    Offers tips for redesigning safer school sites; installing and implementing security technologies (closed-circuit television cameras, door security hardware, electronic security panels, identification cards, metal detectors, and panic buttons); educating students and staff about security functions; and minimizing costs via a comprehensive campus…

  4. Unix Security Cookbook

    NASA Astrophysics Data System (ADS)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  5. School Security Roundtable, 2000.

    ERIC Educational Resources Information Center

    Agron, Joe, Ed.; Anderson, Larry, Ed.

    A roundtable discussion is presented revealing what experts say about school security problems and how they are being addressed. Also included are trend data from the School Security 2000 survey revealing top security concerns, strategies, and security equipment preferences; how site surveys can be used to keep schools safe; and how creating a…

  6. Chapter 3: Energy Security

    SciTech Connect

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  7. Seismic Absorption and Modulus Measurements in Porous Rocks in Lab and Field: Physical, Chemical, and Biological Effects of Fluids (Detecting a Biosurfactant Additive in a Field Irrigation Experiment)

    SciTech Connect

    Spetzler, Hartmut

    2006-05-01

    We have been exploring a new technology that is based on using low-frequency seismic attenuation data to monitor changes in fluid saturation conditions in two-fluid phase porous materials. The seismic attenuation mechanism is related to the loss of energy due to the hysteresis of resistance to meniscus movement (changes in surface tension, wettability) when a pore containing two fluids is stressed at very low frequencies (< 10 Hz). This technology has potential applications to monitoring changes in (1) leakage at buried waste sites, (2) contaminant remediation, and (3) flooding during enhanced petroleum recovery. We have concluded a three year field study at the Maricopa Agricultural Center site of the University of Arizona. Three sets of instruments were installed along an East-West line perpendicular to the 50m by 50m inigation site. Each set of instruments consisted of one three component seismometer and one tiltmeter. Microseisms and solid Earth-tides served as strain sources. The former have a power peak at a period of about 6 seconds and the tides have about two cycles per day. Installation of instruments commenced in late summer of 2002. The instruments operated nearly continuously until April 2005. During the fall of 2003 the site was irrigated with water and one year later with water containing 150 ppm of a biosurfactant additive. This biodegradable additive served to mimic a class of contaminants that change the surface tension of the inigation fluid. Tilt data clearly show tidal tilts superimposed on local tilts due to agricultural irrigation and field work. When the observed signals were correlated with site specific theoretical tilt signals we saw no anomalies for the water irrigation in 2003, but large anomalies on two stations for the surfactant irrigation in 2004. Occasional failures of seismometers as well as data acquisition systems contributed to less than continuous coverage. These data are noisier than the tilt data, but do also show possible

  8. Accounting Issues: An Essay Series Part VI--Investments in Securities

    ERIC Educational Resources Information Center

    Laux, Judy

    2008-01-01

    The sixth in a series of theory-based essays, this article presents accounting for investments in debt and equity securities along with some related conceptual and measurement issues. Additional coverage is devoted to potential ethical dilemmas and both theoretical and empirical literature related to this asset. (Contains 1 footnote.)

  9. Security guide for subcontractors

    SciTech Connect

    Not Available

    1988-01-01

    The objectives of security in the Department of Energy (DOE) contractor/subcontractor program are: (1) to ensure the protection of information which, if related, would endanger the common defense and security of the nation; and (2) to safeguard the plants and installations of the DOE and its contractors in order that research and production programs will not be interrupted. To achieve these objectives, security responsibilities have been divided into three interdependent categories: personnel security, physical security, and security education and quality audits. This guide presents instructions for implementing a security program at a contractor/subcontractor site.

  10. Secure videoconferencing equipment switching system and method

    DOEpatents

    Hansen, Michael E.

    2009-01-13

    A switching system and method are provided to facilitate use of videoconference facilities over a plurality of security levels. The system includes a switch coupled to a plurality of codecs and communication networks. Audio/Visual peripheral components are connected to the switch. The switch couples control and data signals between the Audio/Visual peripheral components and one but nor both of the plurality of codecs. The switch additionally couples communication networks of the appropriate security level to each of the codecs. In this manner, a videoconferencing facility is provided for use on both secure and non-secure networks.

  11. Development and validation of an Arab family food security scale.

    PubMed

    Sahyoun, Nadine R; Nord, Mark; Sassine, Anniebelle J; Seyfert, Karin; Hwalla, Nahla; Ghattas, Hala

    2014-05-01

    The objective of this article was to describe 1) the validation of 2 similar but not identical food security modules used to collect data from 2 vulnerable populations, southern Lebanon residents (n = 815) and Palestinian refugees in Lebanon (n = 2501), and 2) the development and validation of an Arab Family Food Security Scale (AFFSS). The surveys used a cluster-randomized sampling design. The 2 food security subscales underwent face and construct validity. In addition, both of these tools and the AFFSS underwent psychometric assessment for internal validity by using statistical methods based on Item Response Theory. The food security questions tested by focus groups were understood and accepted in all regions of Lebanon. The food security subscales and the AFFSS had acceptable levels of internal consistency. The psychometric assessment confirmed that the 7 items of the AFFSS had good internal validity and reasonable reliability with item in-fits from 0.73 to 1.16. Food insecurity was identified among 42% of southern Lebanese and 62% of Palestinian refugee households. The determinants and consequences of food security measured in this study provide additional support for the validity of the modules. Using multivariate logistic regression, the higher the mean monthly income per household member and the higher the educational attainment of the head of household, the lower the risk of food insecurity [ORs (95% CIs): 0.99 (0.98, 0.99) and 0.66 (0.54, 0.80), respectively]. There was a strong significant association between food insecurity and lower food expenditure and lower intake of all food categories except for legumes, which was significantly associated in the opposite direction (P < 0.001). The odds of borrowing money and accepting gifts/donations were significantly higher among moderately and severely food-insecure households (P < 0.000). The AFFSS has been validated within Lebanon and can potentially be extended to other Arab-speaking populations.

  12. Additive Manufacturing Infrared Inspection

    NASA Technical Reports Server (NTRS)

    Gaddy, Darrell

    2014-01-01

    Additive manufacturing is a rapid prototyping technology that allows parts to be built in a series of thin layers from plastic, ceramics, and metallics. Metallic additive manufacturing is an emerging form of rapid prototyping that allows complex structures to be built using various metallic powders. Significant time and cost savings have also been observed using the metallic additive manufacturing compared with traditional techniques. Development of the metallic additive manufacturing technology has advanced significantly over the last decade, although many of the techniques to inspect parts made from these processes have not advanced significantly or have limitations. Several external geometry inspection techniques exist such as Coordinate Measurement Machines (CMM), Laser Scanners, Structured Light Scanning Systems, or even traditional calipers and gages. All of the aforementioned techniques are limited to external geometry and contours or must use a contact probe to inspect limited internal dimensions. This presentation will document the development of a process for real-time dimensional inspection technique and digital quality record of the additive manufacturing process using Infrared camera imaging and processing techniques.

  13. Security of Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Lütkenhaus, Norbert

    2007-03-01

    Quantum Key Distribution (QKD) is the most advanced application of Quantum Information Science. It allows extending secret keys over some distances in such a way that the security of the resulting key material can be guaranteed by the laws of quantum mechanics. In contrast to presently used encryption techniques, the security of QKD can be proven in terms of information-theoretic measures. The resulting key can then be used for many tasks, including exchanging secret messages. QKD has been developed in the language of abstract two-level systems, the qubits. They cannot be easily implemented in optical signals. It took some time to bring the protocols and theory of QKD to the point where they fit to the realities of fiber-optical or free-space applications, including lossy channels. Today, QKD schemes can be implemented reliably using standard off-the-shelf components. Information theoretic security is a theoretical concept. Naturally, it is impossible to demonstrate directly that a given experimental set-up indeed creates a secret key. What one can do is to show that the experiment can give data within a certain parameters regime, such as error rate and loss rate, for which a security proof exists. I will discuss what parameter regime gives provable secure key and which parameter regime cannot lead to secret key. It is desirable to prove `unconditional security,' as it is termed in the world of classical cryptography: no assumption is made about the attacks of an eavesdropper on the quantum channel. However, one has to assume that the signal structure and the measurement device are correctly described by the adopted model and that no eavesdropper can intrude the sender or receiver unit. In this talk I will briefly introduce the concept of QKD and optical implementations. Especially I will discuss security aspects of modern approaches of QKD schemes that allow us to increase the covered distance and the achievable rate.

  14. Security Data Warehouse Application

    NASA Technical Reports Server (NTRS)

    Vernon, Lynn R.; Hennan, Robert; Ortiz, Chris; Gonzalez, Steve; Roane, John

    2012-01-01

    The Security Data Warehouse (SDW) is used to aggregate and correlate all JSC IT security data. This includes IT asset inventory such as operating systems and patch levels, users, user logins, remote access dial-in and VPN, and vulnerability tracking and reporting. The correlation of this data allows for an integrated understanding of current security issues and systems by providing this data in a format that associates it to an individual host. The cornerstone of the SDW is its unique host-mapping algorithm that has undergone extensive field tests, and provides a high degree of accuracy. The algorithm comprises two parts. The first part employs fuzzy logic to derive a best-guess host assignment using incomplete sensor data. The second part is logic to identify and correct errors in the database, based on subsequent, more complete data. Host records are automatically split or merged, as appropriate. The process had to be refined and thoroughly tested before the SDW deployment was feasible. Complexity was increased by adding the dimension of time. The SDW correlates all data with its relationship to time. This lends support to forensic investigations, audits, and overall situational awareness. Another important feature of the SDW architecture is that all of the underlying complexities of the data model and host-mapping algorithm are encapsulated in an easy-to-use and understandable Perl language Application Programming Interface (API). This allows the SDW to be quickly augmented with additional sensors using minimal coding and testing. It also supports rapid generation of ad hoc reports and integration with other information systems.

  15. Cyber Security and Resilient Systems

    SciTech Connect

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  16. High-Tech Security Help.

    ERIC Educational Resources Information Center

    Flanigan, Robin L.

    2000-01-01

    Advocates embrace high-tech security measures as necessary to avoid Columbine-style massacres. Critics contend that school systems can go overboard, making students feel less safe and too closely scrutinized. Current electronic, biometric, and computer-mapping devices and school applications are discussed. Vendors are listed. (MLH)

  17. Shootings Revive Debates on Security

    ERIC Educational Resources Information Center

    Shah, Nirvi

    2013-01-01

    By nearly all accounts, the staff and students at Sandy Hook Elementary School did everything right on Dec. 14--and with the security measures they took before that day--when a young man armed with powerful weapons blasted his way into the school. But the deadliest K-12 school shooting in American history, a day that President Barack Obama has…

  18. Valuable security features in a competitive banking environment: does security attract criminals instead of customers?

    NASA Astrophysics Data System (ADS)

    Brongers, J. D.

    1991-10-01

    This paper highlights the problems a Dutch bank has in choosing the security measures it takes for valuable documents. The various types of fraud for which the security measures are intended are dealt with. The magnitude of fraud and its subsequent effects are examined, leading to the conclusion that security is necessary for more than just financial reasons. Security procedures and measures that are possible elsewhere are examined. After that, the application of security possibilities to value documents will be elaborated on, particularly from the point of view of effectiveness and costs. It is assumed that security and science can serve the interests of the criminal and consequently, to some extent, harm the interests of the bank and its customers

  19. 12 CFR 168.3 - Security program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ..., or larceny committed against the association; (3) Provide for initial and periodic training of... law enforcement officers of an attempted or perpetrated robbery or burglary; and (5) Such other... law enforcement officers; (iv) The cost of the security devices; (v) Other security measures in...

  20. 12 CFR 568.3 - Security program.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., or larceny committed against the association; (3) Provide for initial and periodic training of... law enforcement officers of an attempted or perpetrated robbery or burglary; and (5) Such other... law enforcement officers; (iv) The cost of the security devices; (v) Other security measures in...

  1. 12 CFR 568.3 - Security program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ..., or larceny committed against the association; (3) Provide for initial and periodic training of... law enforcement officers of an attempted or perpetrated robbery or burglary; and (5) Such other... law enforcement officers; (iv) The cost of the security devices; (v) Other security measures in...

  2. 12 CFR 168.3 - Security program.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ..., or larceny committed against the association; (3) Provide for initial and periodic training of... law enforcement officers of an attempted or perpetrated robbery or burglary; and (5) Such other... law enforcement officers; (iv) The cost of the security devices; (v) Other security measures in...

  3. Social Security and Part-Time Employment.

    ERIC Educational Resources Information Center

    Euzeby, Alain

    1988-01-01

    Discusses rules governing social security and their implications for part-time employees in various countries. Topics include (1) methods of financing social security, (2) benefits, (3) measures concerning the unemployed, (4) a floor for employers' contributions, (5) graduated contribution rates, and (6) financial incentives. (CH)

  4. 30 CFR 250.1634 - Site security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 2 2011-07-01 2011-07-01 false Site security. 250.1634 Section 250.1634 Mineral Resources BUREAU OF OCEAN ENERGY MANAGEMENT, REGULATION, AND ENFORCEMENT, DEPARTMENT OF THE... § 250.1634 Site security. (a) All locations where sulphur is produced, measured, or stored shall...

  5. Electronic security device

    DOEpatents

    Eschbach, Eugene A.; LeBlanc, Edward J.; Griffin, Jeffrey W.

    1992-01-01

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  6. Electronic security device

    DOEpatents

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  7. Digital security technology simplified.

    PubMed

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  8. Fundamental quantitative security in quantum key generation

    SciTech Connect

    Yuen, Horace P.

    2010-12-15

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographic context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.

  9. Integrated Safeguards and Security Management Self-Assessment 2004

    SciTech Connect

    Lunford, Dan; Ramsey, Dwayne

    2005-04-01

    In 2002 Ernest Orlando Lawrence Berkeley National Laboratory deployed the first Integrated Safeguards and Security Management (ISSM) Self-Assessment process, designed to measure the effect of the Laboratory's ISSM efforts. This process was recognized by DOE as a best practice and model program for self-assessment and training. In 2004, the second Self-Assessment was launched. The cornerstone of this process was an employee survey that was designed to meet several objectives: (1) Ensure that Laboratory assets are protected. (2) Provide a measurement of the Laboratory's current security status that can be compared against the 2002 Self-Assessment baseline. (3) Educate all Laboratory staff about security responsibilities, tools, and practices. (4) Provide security staff with feedback on the effectiveness of security programs. (5) Provide line management with the information they need to make informed decisions about security. This 2004 Self Assessment process began in July 2004 with every employee receiving an information packet and instructions for completing the ISSM survey. The Laboratory-wide survey contained questions designed to measure awareness and conformance to policy and best practices. The survey response was excellent--90% of Berkeley Lab employees completed the questionnaire. ISSM liaisons from each division followed up on the initial survey results with individual employees to improve awareness and resolve ambiguities uncovered by the questionnaire. As with the 2002 survey, the Self-Assessment produced immediate positive results for the ISSM program and revealed opportunities for longer-term corrective actions. Results of the questionnaire provided information for organizational profiles and an institutional summary. The overall level of security protection and awareness was very high--often above 90%. Post-survey work by the ISSM liaisons and line management consistently led to improved awareness and metrics, as shown by a comparison of profiles at the

  10. Qualification of security printing features

    NASA Astrophysics Data System (ADS)

    Simske, Steven J.; Aronoff, Jason S.; Arnabat, Jordi

    2006-02-01

    This paper describes the statistical and hardware processes involved in qualifying two related printing features for their deployment in product (e.g. document and package) security. The first is a multi-colored tiling feature that can also be combined with microtext to provide additional forms of security protection. The color information is authenticated automatically with a variety of handheld, desktop and production scanners. The microtext is authenticated either following magnification or manually by a field inspector. The second security feature can also be tile-based. It involves the use of two inks that provide the same visual color, but differ in their transparency to infrared (IR) wavelengths. One of the inks is effectively transparent to IR wavelengths, allowing emitted IR light to pass through. The other ink is effectively opaque to IR wavelengths. These inks allow the printing of a seemingly uniform, or spot, color over a (truly) uniform IR emitting ink layer. The combination converts a uniform covert ink and a spot color to a variable data region capable of encoding identification sequences with high density. Also, it allows the extension of variable data printing for security to ostensibly static printed regions, affording greater security protection while meeting branding and marketing specifications.

  11. Predictive Dynamic Security Assessment through Advanced Computing

    SciTech Connect

    Huang, Zhenyu; Diao, Ruisheng; Jin, Shuangshuang; Chen, Yousu

    2014-11-30

    Abstract— Traditional dynamic security assessment is limited by several factors and thus falls short in providing real-time information to be predictive for power system operation. These factors include the steady-state assumption of current operating points, static transfer limits, and low computational speed. This addresses these factors and frames predictive dynamic security assessment. The primary objective of predictive dynamic security assessment is to enhance the functionality and computational process of dynamic security assessment through the use of high-speed phasor measurements and the application of advanced computing technologies for faster-than-real-time simulation. This paper presents algorithms, computing platforms, and simulation frameworks that constitute the predictive dynamic security assessment capability. Examples of phasor application and fast computation for dynamic security assessment are included to demonstrate the feasibility and speed enhancement for real-time applications.

  12. FY 2004 Energy Use and Recommended Energy Conservation Measures--Environmental Technology and National Security Buildings at Pacific Northwest National Laboratory

    SciTech Connect

    Olson, Norman J.; Hadley, Donald L.; Routh, Richard M.

    2006-06-14

    This revision adds additional information to the original study of the differences in 2003-04 energy usage between PNNL's ETB and NSB. The original PNNL report (PNNL-15535) of this study was published in Dec. 2005.

  13. NFPA 99 Chapter 13 and healthcare security management.

    PubMed

    D'Angelo, Michael S

    2016-01-01

    The new NFPA 99 Security Management Standard for healthcare facilities requires a Security Vulnerability Analysis be conducted annually, the author reports. This will usually uncover little change from year to year, he says, but by using the right model the analysis can be used to win back security additions that had previously been rejected by the C-Suite. PMID:26978960

  14. Measurements of fiducial cross-sections for tt¯ production with one or two additional b-jets in pp collisions at √s = 8 TeV using the ATLAS detector

    DOE PAGES

    Aad, G.; Abbott, B.; Abdallah, J.; Abdinov, O.; Aben, R.; Abolins, M.; AbouZeid, O. S.; Abramowicz, H.; Abreu, H.; Abreu, R.; et al

    2016-01-07

    Fiducial cross-sections for tt¯ production with one or two additional b -jets are reported, using an integrated luminosity of 20.3 fb–1 of proton–proton collisions at a centre-of-mass energy of 8 TeV at the Large Hadron Collider, collected with the ATLAS detector. The cross-section times branching ratio for tt¯ events with at least one additional b-jet is measured to be 950 ± 70 (stat.) +240-190 (syst.) fb in the lepton-plus-jets channel and 50 ± 10 (stat.) +15-10 (syst.) fb in the eμ channel. The cross-section times branching ratio for events with at least two additional b -jets is measured to bemore » 19.3 ± 3.5 (stat.) ± 5.7 (syst.) fb in the dilepton channel ( eμ , μμ , and ee ) using a method based on tight selection criteria, and 13.5 ± 3.3 (stat.) ± 3.6 (syst.) fb using a looser selection that allows the background normalisation to be extracted from data. The latter method also measures a value of 1.30 ± 0.33 (stat.) ± 0.28 (syst.)% for the ratio of tt¯ production with two additional b-jets to tt¯ production with any two additional jets. As a result, all measurements are in good agreement with recent theory predictions.« less

  15. Nuclear security policy in the context of counter-terrorism in Cambodia

    NASA Astrophysics Data System (ADS)

    Khun, Vuthy; Wongsawaeng, Doonyapong

    2016-01-01

    The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the context of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia.

  16. Measures for groundwater security during and after the Hanshin-Awaji earthquake (1995) and the Great East Japan earthquake (2011), Japan

    NASA Astrophysics Data System (ADS)

    Tanaka, Tadashi

    2016-03-01

    Many big earthquakes have occurred in the tectonic regions of the world, especially in Japan. Earthquakes often cause damage to crucial life services such as water, gas and electricity supply systems and even the sewage system in urban and rural areas. The most severe problem for people affected by earthquakes is access to water for their drinking/cooking and toilet flushing. Securing safe water for daily life in an earthquake emergency requires the establishment of countermeasures, especially in a mega city like Tokyo. This paper described some examples of groundwater use in earthquake emergencies, with reference to reports, books and newspapers published in Japan. The consensus is that groundwater, as a source of water, plays a major role in earthquake emergencies, especially where the accessibility of wells coincides with the emergency need. It is also important to introduce a registration system for citizen-owned and company wells that can form the basis of a cooperative during a disaster; such a registration system was implemented by many Japanese local governments after the Hanshin-Awaji Earthquake in 1995 and the Great East Japan Earthquake in 2011, and is one of the most effective countermeasures for groundwater use in an earthquake emergency. Emphasis is also placed the importance of establishing of a continuous monitoring system of groundwater conditions for both quantity and quality during non-emergency periods.

  17. 78 FR 55274 - Privacy Act of 1974; Department of Homeland Security/Transportation Security Administration-DHS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-10

    ... screening at participating U.S. airport security checkpoints. Additionally, the Department of Homeland... ineligible for the program will continue to be screened at airport security checkpoints according to TSA... screening at airport security checkpoints. The Program retains a component of randomness to maintain...

  18. Seven layers of security to help protect biomedical research facilities.

    PubMed

    Mortell, Norman

    2010-04-01

    In addition to risks such as theft and fire that can confront any type of business, the biomedical research community often faces additional concerns over animal rights extremists, infiltrations, data security and intellectual property rights. Given these concerns, it is not surprising that the industry gives a high priority to security. This article identifies security threats faced by biomedical research companies and shows how these threats are ranked in importance by industry stakeholders. The author then goes on to discuss seven key 'layers' of security, from the external environment to the research facility itself, and how these layers all contribute to the creation of a successfully secured facility.

  19. 40 CFR 412.37 - Additional measures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... water diversion devices, runoff diversion structures, and devices channelling contaminated storm water to the wastewater and manure storage and containment structure; (ii) Daily inspection of water lines, including drinking water or cooling water lines; (iii) Weekly inspections of the manure, litter, and...

  20. 40 CFR 412.37 - Additional measures.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... water diversion devices, runoff diversion structures, and devices channelling contaminated storm water to the wastewater and manure storage and containment structure; (ii) Daily inspection of water lines, including drinking water or cooling water lines; (iii) Weekly inspections of the manure, litter, and...

  1. 40 CFR 412.37 - Additional measures.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... water diversion devices, runoff diversion structures, and devices channelling contaminated storm water to the wastewater and manure storage and containment structure; (ii) Daily inspection of water lines, including drinking water or cooling water lines; (iii) Weekly inspections of the manure, litter, and...

  2. 40 CFR 412.37 - Additional measures.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... water diversion devices, runoff diversion structures, and devices channelling contaminated storm water to the wastewater and manure storage and containment structure; (ii) Daily inspection of water lines, including drinking water or cooling water lines; (iii) Weekly inspections of the manure, litter, and...

  3. 40 CFR 412.37 - Additional measures.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... from the date they are created a complete copy of the information required by 40 CFR 122.21(i)(1) and 40 CFR 122.42(e)(1)(ix) and the records specified in paragraphs (b)(1) through (b)(6) of this section... the information required by § 412.4 and 40 CFR 122.42(e)(1)(ix) and the records specified...

  4. Security system signal supervision

    SciTech Connect

    Chritton, M.R. ); Matter, J.C. )

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  5. Gasoline additives, emissions, and performance

    SciTech Connect

    1995-12-31

    The papers included in this publication deal with the influence of fuel, additive, and hardware changes on a variety of vehicle performance characteristics. Advanced techniques for measuring these performance parameters are also described. Contents include: Fleet test evaluation of gasoline additives for intake valve and combustion chamber deposit clean up; A technique for evaluating octane requirement additives in modern engines on dynamometer test stands; A fleet test of two additive technologies comparing their effects on tailpipe emissions; Investigation into the vehicle exhaust emissions of high percentage ethanol blends; Variability in hydrocarbon speciation measurements at low emission (ULEV) levels; and more.

  6. Security: Progress and Challenges

    ERIC Educational Resources Information Center

    Luker, Mark A.

    2004-01-01

    The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…

  7. School Violence: Physical Security.

    ERIC Educational Resources Information Center

    Utah State Office of Education, Salt Lake City.

    This booklet provides an overview of security technology product areas that might be appropriate and affordable for school applications. Topics cover security concepts and operational issues; security issues when designing for new schools; the role of maintenance; video camera use; walk-through metal detectors; duress alarm devices; and a partial…

  8. Selecting Security Technology Providers

    ERIC Educational Resources Information Center

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  9. Homeland Security and Information.

    ERIC Educational Resources Information Center

    Relyea, Harold C.

    2002-01-01

    Reviews the development of two similar policy concepts, national security and internal security, before exploring the new phrase homeland security that has become popular since the September 11 terrorist attacks. Discusses the significance of each for information policy and practice. (Author/LRW)

  10. Filling a Security Gap

    ERIC Educational Resources Information Center

    Parks and Recreation, 1978

    1978-01-01

    A new type of public facility security system, utilizing a radio system and voice logging recorder, has effectively improved security at the John F. Kennedy Center for the Performing Arts. The system monitors security operations, provides a reliable record in the case of conflicting claims, and accurately pinpoints the time of events. (DS)

  11. 75 FR 26171 - Cyber Security Certification Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-11

    ... the Commission has sought to motivate industry to adopt effective cyber security measures has been... how the criteria could be structured to reward greater transparency among service providers so...

  12. 75 FR 29567 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-26

    ... March 11, 2010. 75 FR 11552. The collection involves surveying travelers to measure customer... OMB Review: Aviation Security Customer Satisfaction Performance Measurement Passenger Survey AGENCY...; Aviation Security Customer Satisfaction Performance Measurement Passenger Survey. TSA, with OMB's...

  13. Protection of data carriers using secure optical codes

    NASA Astrophysics Data System (ADS)

    Peters, John A.; Schilling, Andreas; Staub, René; Tompkin, Wayne R.

    2006-02-01

    Smartcard technologies, combined with biometric-enabled access control systems, are required for many high-security government ID card programs. However, recent field trials with some of the most secure biometric systems have indicated that smartcards are still vulnerable to well equipped and highly motivated counterfeiters. In this paper, we present the Kinegram Secure Memory Technology which not only provides a first-level visual verification procedure, but also reinforces the existing chip-based security measures. This security concept involves the use of securely-coded data (stored in an optically variable device) which communicates with the encoded hashed information stored in the chip memory via a smartcard reader device.

  14. Secure Transportation Management

    SciTech Connect

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  15. Information Security Management (ISM)

    NASA Astrophysics Data System (ADS)

    Šalgovičová, Jarmila; Prajová, Vanessa

    2012-12-01

    Currently, all organizations have to tackle the issue of information security. The paper deals with various aspects of Information Security Management (ISM), including procedures, processes, organizational structures, policies and control processes. Introduction of Information Security Management should be a strategic decision. The concept and implementation of Information Security Management in an organization are determined by the corporate needs and objectives, security requirements, the processes deployed as well as the size and structure of the organization. The implementation of ISM should be carried out to the extent consistent with the needs of the organization.

  16. Developing a Security Metrics Scorecard for Healthcare Organizations.

    PubMed

    Elrefaey, Heba; Borycki, Elizabeth; Kushniruk, Andrea

    2015-01-01

    In healthcare, information security is a key aspect of protecting a patient's privacy and ensuring systems availability to support patient care. Security managers need to measure the performance of security systems and this can be achieved by using evidence-based metrics. In this paper, we describe the development of an evidence-based security metrics scorecard specific to healthcare organizations. Study participants were asked to comment on the usability and usefulness of a prototype of a security metrics scorecard that was developed based on current research in the area of general security metrics. Study findings revealed that scorecards need to be customized for the healthcare setting in order for the security information to be useful and usable in healthcare organizations. The study findings resulted in the development of a security metrics scorecard that matches the healthcare security experts' information requirements.

  17. Visualizing Cyber Security: Usable Workspaces

    SciTech Connect

    Fink, Glenn A.; North, Christopher L.; Endert, Alexander; Rose, Stuart J.

    2009-10-11

    An environment that supports cyber analytics work should enable multiple, simultaneous investigations, information foraging, and provide a solution space for organizing data. We describe our study of cyber security professionals and visualizations in a large, high-resolution display work environment. We discuss the tasks and needs of analysts that such an environment can support and present several prototypes designed to support these needs. We conclude with a usability evaluation of the prototypes and additional lessons learned.

  18. 46 CFR 180.25 - Additional requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Additional requirements. 180.25 Section 180.25 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER 100 GROSS TONS... the requirements of this part inadequate; or (2) The vessel is operated in Arctic, Antarctic, or...

  19. 46 CFR 117.25 - Additional requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Additional requirements. 117.25 Section 117.25 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS CARRYING MORE THAN 150... the requirements of this part inadequate; or (2) The vessel is operated in Arctic, Antarctic, or...

  20. 32 CFR 2001.24 - Additional requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Markings § 2001.24 Additional requirements. (a) Marking prohibitions. Markings other than “Top Secret,” “Secret,” and “Confidential” shall not be used to identify classified national security information. (b... Order and this Directive, as well as the marking requirements in 10 CFR part 1045,...

  1. 32 CFR 2001.24 - Additional requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Markings § 2001.24 Additional requirements. (a) Marking prohibitions. Markings other than “Top Secret,” “Secret,” and “Confidential” shall not be used to identify classified national security information. (b... Order and this Directive, as well as the marking requirements in 10 CFR part 1045,...

  2. Computer Security Systems Enable Access.

    ERIC Educational Resources Information Center

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  3. Insider Threat and Information Security Management

    NASA Astrophysics Data System (ADS)

    Coles-Kemp, Lizzie; Theoharidou, Marianthi

    The notion of insider has multiple facets. An organization needs to identify which ones to respond to. The selection, implementetion and maintenance of information security countermeasures requires a complex combination of organisational policies, functions and processes, which form Information Security Management. This chapter examines the role of current information security management practices in addressing the insider threat. Most approaches focus on frameworks for regulating insider behaviour and do not allow for the various cultural responses to the regulatory and compliance framework. Such responses are not only determined by enforcement of policies and awareness programs, but also by various psychological and organisational factors at an individual or group level. Crime theories offer techniques that focus on such cultural responses and can be used to enhance the information security management design. The chapter examines the applicability of several crime theories and concludes that they can contribute in providing additional controls and redesign of information security management processes better suited to responding to the insider threat.

  4. Computer security is out of balance

    SciTech Connect

    Bush, G.; Brand, R.

    1989-01-31

    System Engineering practices are being applied to Computer Security, but not broadly enough. If we concentrate on only the computer security aspects in our field of computer security, then our focus may be too narrow, and consequently be out of balance. We must examine the complete system that includes the computers, the users, and their environment on the broadest scale possible. As an example of the problem in balance of emphasis, the work being done on Trusted Computer Bases is excellent, but is easily nullified by indifferent users. Our business is the search for weakest links, but that search cannot focus exclusively on just the part of the system that includes the computers. The dambuilding platitude is also relevant to this issue of focus, when the left side team builds their side of the dam higher than the right side team, no additional security (water) is realized. All parts and security programs must be in balance to be effective. 7 refs.

  5. Enhancing regional security agreements through cooperative monitoring

    SciTech Connect

    Pregenzer, A.L.

    1995-05-01

    This paper proposes that strengthening regional capabilities for formulating and implementing arms control and confidence-building measures is a tangible method of enhancing regional security. It discusses the importance of developing a regional infrastructure for arms control and confidence building and elucidates the role of technology in facilitating regional arms control and confidence-building agreements. In addition, it identifies numerous applications for regional cooperative monitoring in the areas of arms control, resource management, international commerce and disaster response. The Cooperative Monitoring Center at Sandia National Laboratories, whose aim is to help individual countries and regions acquire the tools they need to develop their own solutions to regional problems, is discussed briefly. The paper ends with recommendations for establishing regional cooperative monitoring centers.

  6. Alignment and bit extraction for secure fingerprint biometrics

    NASA Astrophysics Data System (ADS)

    Nagar, A.; Rane, S.; Vetro, A.

    2010-01-01

    Security of biometric templates stored in a system is important because a stolen template can compromise system security as well as user privacy. Therefore, a number of secure biometrics schemes have been proposed that facilitate matching of feature templates without the need for a stored biometric sample. However, most of these schemes suffer from poor matching performance owing to the difficulty of designing biometric features that remain robust over repeated biometric measurements. This paper describes a scheme to extract binary features from fingerprints using minutia points and fingerprint ridges. The features are amenable to direct matching based on binary Hamming distance, but are especially suitable for use in secure biometric cryptosystems that use standard error correcting codes. Given all binary features, a method for retaining only the most discriminable features is presented which improves the Genuine Accept Rate (GAR) from 82% to 90% at a False Accept Rate (FAR) of 0.1% on a well-known public database. Additionally, incorporating singular points such as a core or delta feature is shown to improve the matching tradeoff.

  7. Balancing Security and Learning. School Security Supplement.

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2002-01-01

    Discusses ways to provide vital safety to schools without inhibiting the learning environment for students. Describes security efforts at Orange County, Florida schools, such as using video cameras, school police officers, and access-control systems. (EV)

  8. 33 CFR 105.210 - Facility personnel with security duties.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... must have knowledge, through training or equivalent job experience, in the following, as appropriate: (a) Knowledge of current security threats and patterns; (b) Recognition and detection of dangerous... to threaten security; (d) Techniques used to circumvent security measures; (e) Crowd management...

  9. Securing medical research: a cybersecurity point of view.

    PubMed

    Schneier, Bruce

    2012-06-22

    The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough to ensure the security of existing data sets. Lessons from cryptography illustrate that neither secrecy measures, such as deleting technical details, nor national solutions, such as export controls, will work. PMID:22723410

  10. 33 CFR 105.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... evacuation routes and assembly stations; and (viii) Existing security and safety equipment for protection of...-side security services; (ix) Any conflicting policies between safety and security measures and... and their equipment; (vii) Use of a vessel moored at the facility as a weapon or as a means to...

  11. 33 CFR 105.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... evacuation routes and assembly stations; and (viii) Existing security and safety equipment for protection of...-side security services; (ix) Any conflicting policies between safety and security measures and... and their equipment; (vii) Use of a vessel moored at the facility as a weapon or as a means to...

  12. 33 CFR 105.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... evacuation routes and assembly stations; and (viii) Existing security and safety equipment for protection of...-side security services; (ix) Any conflicting policies between safety and security measures and... and their equipment; (vii) Use of a vessel moored at the facility as a weapon or as a means to...

  13. 6 CFR 27.225 - Site security plans.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM...) Identify and describe how security measures selected by the facility will address the applicable risk-based... facility will meet or exceed each applicable performance standard for the appropriate risk-based tier...

  14. 6 CFR 27.225 - Site security plans.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM...) Identify and describe how security measures selected by the facility will address the applicable risk-based... facility will meet or exceed each applicable performance standard for the appropriate risk-based tier...

  15. 6 CFR 27.225 - Site security plans.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM...) Identify and describe how security measures selected by the facility will address the applicable risk-based... facility will meet or exceed each applicable performance standard for the appropriate risk-based tier...

  16. 10 CFR 37.43 - General security program requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... overall security strategy to ensure the integrated and effective functioning of the security program required by this subpart. The security plan must, at a minimum: (i) Describe the measures and strategies... lessons learned; (iii) Relevant results of NRC inspections; and (iv) Relevant results of the...

  17. Lifetime studies of security inks using a novel gonio-spectrometer with in situ aging capability

    NASA Astrophysics Data System (ADS)

    Emerich, Markus; Rosenberg, Erwin; Deinhammer, Harald; Paleczek, Susanne; Fajmann, Peter; Schwarzbach, Daniel

    2004-06-01

    The state of the art in manufacturing security documents includes the usage of a multitude of inks and pigments. The chemical and physical stability of these materials is a crucial point for their application in long lasting security products such as banknotes. For our studies regarding the bleaching characteristics of pigments and inks we have developed a highly integrated double beam gonio-spectrometer with in-situ ageing capability. The new spectrometer is equipped with a stabilized solar simulator lamp featuring a dosimeter, which is an advanced alternative to the commonly used blue wool scale. Additionally the sample temperature can be stabilized during ageing tests by a thermostatted sample holder. The instrument is capable of performing reflection measurements using monochromatic and polychromatic excitation and further allows fluorescence, phosphorescence and polarization measurements with high resolution over a wide wavelength range. We will present first results of defined ageing tests on a variety of security pigments and the setup of the newly developed spectrometer.

  18. Security-by-design handbook.

    SciTech Connect

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji; Ochiai, Kazuya; Iida, Toru

    2013-01-01

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  19. What is Security? A perspective on achieving security

    SciTech Connect

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  20. A Layered Trust Information Security Architecture

    PubMed Central

    de Oliveira Albuquerque, Robson; García Villalba, Luis Javier; Sandoval Orozco, Ana Lucila; Buiati, Fábio; Kim, Tai-Hoon

    2014-01-01

    Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk management job; the task is to manage the inherent risks of information disclosure. Current information security platforms do not deal with the different facets of information technology. This paper presents a layered trust information security architecture (TISA) and its creation was motivated by the need to consider information and security from different points of view in order to protect it. This paper also extends and discusses security information extensions as a way of helping the CIA triad. Furthermore, this paper suggests information representation and treatment elements, operations and support components that can be integrated to show the various risk sources when dealing with both information and security. An overview of how information is represented and treated nowadays in the technological environment is shown, and the reason why it is so difficult to guarantee security in all aspects of the information pathway is discussed. PMID:25470490