4. VIEW OF SECURITY GATE LOOKING SOUTHWEST FROM ROOF OF ...
4. VIEW OF SECURITY GATE LOOKING SOUTHWEST FROM ROOF OF BUILDING 8970 (CREW READINESS BUILDING) SHOWING BUILDING 8965 (SECURITY POLICE ENTRY CONTROL BUILDING) IN RIGHT MIDDLE GROUND AND BUILDING 8966 (ELECTRIC POWER STATION BUILDING) IN RIGHT FOREGROUND. - Loring Air Force Base, Alert Area, Southeastern portion of base, east of southern end of runway, Limestone, Aroostook County, ME
WEAPONS STORAGE AREA, LOOKING TOWARD ELECTRIC POWER STATION BUILDING (BUILDING ...
WEAPONS STORAGE AREA, LOOKING TOWARD ELECTRIC POWER STATION BUILDING (BUILDING 3583), STORAGE BUILDING (BUILDING 3584)NIGHT AND SECURITY POLICE ENTRY CONTROL (BUILDING 3582)LEFT. VIEW TO NORTHEAST - Plattsburgh Air Force Base, U.S. Route 9, Plattsburgh, Clinton County, NY
19. SITE BUILDING 002 SCANNER BUILDING AIR POLICE ...
19. SITE BUILDING 002 - SCANNER BUILDING - AIR POLICE SITE SECURITY OFFICE WITH "SITE PERIMETER STATUS PANEL" AND REAL TIME VIDEO DISPLAY OUTPUT FROM VIDEO CAMERA SYSTEM AT SECURITY FENCE LOCATIONS. - Cape Cod Air Station, Technical Facility-Scanner Building & Power Plant, Massachusetts Military Reservation, Sandwich, Barnstable County, MA
Rapid Building Assessment Project
2014-05-01
Efficiency Buildings Hub EISA Energy Independence Security Act EPRI The Electric Power and Research Institute ESTCP Environmental Security Technology...Ordinary Least Squares PG&E Pacific Gas & Electric R&D research and development RBA Remote Building Analytics REST representational state...utilities across North America and Europe. Requiring only hourly utility electric meter data, the building type, and address, FirstFuel can produce a
18. SITE BUILDING 002 SCANNER BUILDING VIEW OF ...
18. SITE BUILDING 002 - SCANNER BUILDING - VIEW OF SITE SECURITY OFFICE ACCESS DOOR FROM EXTERIOR OF OFFICE. - Cape Cod Air Station, Technical Facility-Scanner Building & Power Plant, Massachusetts Military Reservation, Sandwich, Barnstable County, MA
Trends in Public Library Buildings.
ERIC Educational Resources Information Center
Holt, Raymond M.
1987-01-01
Review of trends in public library buildings covers cycles in building activity; financial support; site selection; expansion, remodeling, or conversion of existing buildings; size of buildings; and such architectural concerns as flexible space, lighting, power, accommodation of computer systems, heat and ventilation, fire protection, security,…
1. VIEW, LOOKING NORTH, OF THE SOUTH ELEVATION OF BUILDING ...
1. VIEW, LOOKING NORTH, OF THE SOUTH ELEVATION OF BUILDING 901. BUILDING 901 IS ONE OF FOUR GUARD TOWERS INSTALLED AS PART OF THE PERIMETER SECURITY ZONE TO PROVIDE PROTECTIVE FORCE PERSONNEL WITH A CLEAR HIGH VIEW OF THE SURROUNDING AREAS. THE PERIMETER SECURITY ZONE CONSISTS OF A DOUBLE PERIMETER FENCE WITH CLOSED CIRCUIT TELEVISIONS, ALARMS, AND AN UNINTERRUPTED POWER SUPPLY. - Rocky Flats Plant, Guard Tower, Southeast corner of protected area, Golden, Jefferson County, CO
2013-12-01
device (IED) in a public park is more difficult than setting off an IED in a secured government building . Alternatively, constructing a pipe bomb is...against nuclear and power industry installations” intended to “seize nuclear materials and use them to build WMD for their own political use.” 5...reactor under construction .469 Damascus faces unresolved allegations that it illicitly tried to build a plutonium production reactor at a site
Superstorm Sandy: Implications For Designing A PostCyber Attack Power Restoration System
2016-03-31
for such progress. Phillip Allison, “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems: Building Security into Your Industrial...TechSvcs/Multi-stateFleetResponseWorkshopReport-02-21-13.pdf. Allison, Phillip. “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems
Afghanistan: Post-Taliban Governance, Security, and U.S. Policy
2009-12-02
relations with the Taliban leadership when it was in power, possibly viewing engagement as a more effective means of preventing spillover of radical...Building............................................................................. 23 Taliban, Al Qaeda, and Related Insurgent Groups...42 Table 5. Major Security- Related Indicators
Implementing a High-Assurance Smart-Card OS
NASA Astrophysics Data System (ADS)
Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.
Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.
Forced Shortsightedness: Security Force Assistance Missions
2014-06-01
legislation , it is therefore the intention of the Congress to promote the peace of the world and the foreign policy, security, and general welfare of the... legislation , Congressional Research Service (CRS) reports, the Defense Institute of Security Assistance Management’s (DISAM) Green Book, and interviews with...developed database, there are “184 separate legislative authorities that power the 165 Building Partnership Capacity (BPC) programs managed across
SPERTI Reactor Pit Building (PER605) from contrasting direction as photo ...
SPERT-I Reactor Pit Building (PER-605) from contrasting direction as photo above (ID-33-F-32). Note Guard House door, security fencing around facility. Photographer: R.G. Larsen. Date: July 22, 1955. INEEL negative no. 55-1702. - Idaho National Engineering Laboratory, SPERT-I & Power Burst Facility Area, Scoville, Butte County, ID
Novel technology for enhanced security and trust in communication networks
NASA Astrophysics Data System (ADS)
Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit; Jannson, Tomasz
2011-06-01
A novel technology that significantly enhances security and trust in wireless and wired communication networks has been developed. It is based on integration of a novel encryption mechanism and novel data packet structure with enhanced security tools. This novel data packet structure results in an unprecedented level of security and trust, while at the same time reducing power consumption and computing/communication overhead in networks. As a result, networks are provided with protection against intrusion, exploitation, and cyber attacks and posses self-building, self-awareness, self-configuring, self-healing, and self-protecting intelligence.
Communication Security for Control Systems in Smart Grid
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Tai-Hoon
As an example of Control System, Supervisory Control and Data Acquisition systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power plant or the activity of a municipal water system. SCADA systems are basically Process Control Systems, designed to automate systems such as traffic control, power grid management, waste processing etc. Connecting SCADA to the Internet can provide a lot of advantages in terms of control, data viewing and generation. SCADA infrastructures like electricity can also be a part of a Smart Grid. Connecting SCADA to a public network can bring a lot of security issues. To answer the security issues, a SCADA communication security solution is proposed.
WASTE HANDLING BUILDING ELECTRICAL SYSTEM DESCRIPTION DOCUMENT
DOE Office of Scientific and Technical Information (OSTI.GOV)
S.C. Khamamkar
2000-06-23
The Waste Handling Building Electrical System performs the function of receiving, distributing, transforming, monitoring, and controlling AC and DC power to all waste handling building electrical loads. The system distributes normal electrical power to support all loads that are within the Waste Handling Building (WHB). The system also generates and distributes emergency power to support designated emergency loads within the WHB within specified time limits. The system provides the capability to transfer between normal and emergency power. The system provides emergency power via independent and physically separated distribution feeds from the normal supply. The designated emergency electrical equipment will bemore » designed to operate during and after design basis events (DBEs). The system also provides lighting, grounding, and lightning protection for the Waste Handling Building. The system is located in the Waste Handling Building System. The system consists of a diesel generator, power distribution cables, transformers, switch gear, motor controllers, power panel boards, lighting panel boards, lighting equipment, lightning protection equipment, control cabling, and grounding system. Emergency power is generated with a diesel generator located in a QL-2 structure and connected to the QL-2 bus. The Waste Handling Building Electrical System distributes and controls primary power to acceptable industry standards, and with a dependability compatible with waste handling building reliability objectives for non-safety electrical loads. It also generates and distributes emergency power to the designated emergency loads. The Waste Handling Building Electrical System receives power from the Site Electrical Power System. The primary material handling power interfaces include the Carrier/Cask Handling System, Canister Transfer System, Assembly Transfer System, Waste Package Remediation System, and Disposal Container Handling Systems. The system interfaces with the MGR Operations Monitoring and Control System for supervisory monitoring and control signals. The system interfaces with all facility support loads such as heating, ventilation, and air conditioning, office, fire protection, monitoring and control, safeguards and security, and communications subsystems.« less
Final environmental assessment: Sacramento Energy Service Center
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1994-03-01
The Sacramento Area Office (SAO) of the Western Area Power Administration (Western) needs to increase the security of operations, to eliminate overcrowding at the current leased location of the existing facilities, to provide for future growth, to improve efficiency, and to reduce operating costs. The proposed action is to construct an approximate 40,000-square foot building and adjacent parking lot with a Solar Powered Electric Vehicle Charging Station installed to promote use of energy efficient transportation. As funding becomes available and technology develops, additional innovative energy-efficient measures will be incorporated into the building. For example the proposed construction of the Solarmore » Powered Electric Vehicle Charging.« less
Ensuring reliability in expansion schemes.
Kamal-Uddin, Abu Sayed; Williams, Donald Leigh
2005-01-01
Existing electricity power supplies must serve, or be adapted to serve, the expansion of hospital buildings. With the existing power supply assets of many hospitals being up to 20 years old, assessing the security and reliability of the power system must be given appropriate priority to avoid unplanned outages due to overloads and equipment failures. It is imperative that adequate contingency is planned for essential and non-essential electricity circuits. This article describes the methodology undertaken, and the subsequent recommendations that were made, when evaluating the security and reliability of electricity power supplies to a number of major London hospitals. The methodology described aligns with the latest issue of NHS Estates HTM 2011 'Primary Electrical Infrastructure Emergency Electrical Services Design Guidance' (to which ERA Technology has contributed).
SPERTI Reactor Pit Building (PER605). Earth shielding protect adjacent Instrument ...
SPERT-I Reactor Pit Building (PER-605). Earth shielding protect adjacent Instrument Cell (PER-606). Security fencing surrounds complex, to which gate entry is provided next to Guard House (PER-607). Note gravel road leading to control area. Earth-covered conduit leads from instrument cell to terminal building out of view. Photographer: R.G. Larsen. Date: June 22, 1955. INEEL negative no. 55-1701 - Idaho National Engineering Laboratory, SPERT-I & Power Burst Facility Area, Scoville, Butte County, ID
Building Collaborative Capacity for Homeland Security
2004-11-01
Kesner, I. F. (1993). Top Managerial Prestige, Power and Tender Offer Response - a Study of Elite Social Networks and Target Firm Cooperation During...Organization Science, 12(3), 372-388. Galaskiewicz, J., & Burt, R. S. (1991). Interorganization Contagion in Corporate Philanthropy . Administrative
Secure and Time-Aware Communication of Wireless Sensors Monitoring Overhead Transmission Lines.
Mazur, Katarzyna; Wydra, Michal; Ksiezopolski, Bogdan
2017-07-11
Existing transmission power grids suffer from high maintenance costs and scalability issues along with a lack of effective and secure system monitoring. To address these problems, we propose to use Wireless Sensor Networks (WSNs) as a technology to achieve energy efficient, reliable, and low-cost remote monitoring of transmission grids. With WSNs, smart grid enables both utilities and customers to monitor, predict and manage energy usage effectively and react to possible power grid disturbances in a timely manner. However, the increased application of WSNs also introduces new security challenges, especially related to privacy, connectivity, and security management, repeatedly causing unpredicted expenditures. Monitoring the status of the power system, a large amount of sensors generates massive amount of sensitive data. In order to build an effective Wireless Sensor Network (WSN) for a smart grid, we focus on designing a methodology of efficient and secure delivery of the data measured on transmission lines. We perform a set of simulations, in which we examine different routing algorithms, security mechanisms and WSN deployments in order to select the parameters that will not affect the delivery time but fulfill their role and ensure security at the same time. Furthermore, we analyze the optimal placement of direct wireless links, aiming at minimizing time delays, balancing network performance and decreasing deployment costs.
Secure and Time-Aware Communication of Wireless Sensors Monitoring Overhead Transmission Lines
Mazur, Katarzyna; Wydra, Michal; Ksiezopolski, Bogdan
2017-01-01
Existing transmission power grids suffer from high maintenance costs and scalability issues along with a lack of effective and secure system monitoring. To address these problems, we propose to use Wireless Sensor Networks (WSNs)as a technology to achieve energy efficient, reliable, and low-cost remote monitoring of transmission grids. With WSNs, smart grid enables both utilities and customers to monitor, predict and manage energy usage effectively and react to possible power grid disturbances in a timely manner. However, the increased application of WSNs also introduces new security challenges, especially related to privacy, connectivity, and security management, repeatedly causing unpredicted expenditures. Monitoring the status of the power system, a large amount of sensors generates massive amount of sensitive data. In order to build an effective Wireless Sensor Networks (WSNs) for a smart grid, we focus on designing a methodology of efficient and secure delivery of the data measured on transmission lines. We perform a set of simulations, in which we examine different routing algorithms, security mechanisms and WSN deployments in order to select the parameters that will not affect the delivery time but fulfill their role and ensure security at the same time. Furthermore, we analyze the optimal placement of direct wireless links, aiming at minimizing time delays, balancing network performance and decreasing deployment costs. PMID:28696390
ERIC Educational Resources Information Center
Agron, Joe, Ed.
1999-01-01
Presents advice from five school administrators on how schools are meeting facility and business challenges in the new millennium. Issues discussed concern power needs, the Y2K computer problem, the explosion of new educational technology, school security, educational finance, and building deterioration. (GR)
Fiber optic sensor based on Mach-Zehnder interferometer for securing entrance areas of buildings
NASA Astrophysics Data System (ADS)
Nedoma, Jan; Fajkus, Marcel; Martinek, Radek; Mec, Pavel; Novak, Martin; Bednarek, Lukas; Vasinek, Vladimir
2017-10-01
Authors of this article focused on the utilization of fiber optic sensors based on interferometric measurements for securing entrance areas of buildings such as windows and doors. We described the implementation of the fiber-optic interferometer (type Mach-Zehnder) into the window frame or door, sensor sensitivity, analysis of the background noise and methods of signal evaluation. The advantage of presented solution is the use of standard telecommunication fiber standard G.652.D, high sensitivity, immunity of sensor to electromagnetic interference (EMI) and passivity of the sensor regarding power supply. Authors implemented the Graphical User Interface (GUI) which offers the possibility of remote monitoring presented sensing solution.
Effects Of The Subsurface Domain On The Security Of The Korean Peninsula
2017-12-01
1960s and ‘70s. The KPN Sang-O captured in 1996 revealed modifications using commercial equipment. Despite the fact that the submarines are old and...the integration of commercial navigation and communication equipment. Yet, the mostly outdated and archaic KPN submarines have been able to take...78 industry and experience in building submarines and nuclear power plants the ROK may not need much assistance in building its own nuclear
IN2 Profile: Go Electric Provides Grid Stabilizing Energy Service Solutions to Utilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pless, Shanti
Through the Wells Fargo Innovation Incubator (IN²) program, Go Electric will validate their Link DR technology, which is an advanced, uninterruptable power supply that provides secure power, lowers facility energy costs, integrates renewables, and generates income from utility demand response programs. The IN² program launched in October 2014 and is part of Wells Fargo’s 2020 Environmental Commitment to provide $100 million to environmentally-focused nonprofits and universities. The goal is to create an ecosystem that fosters and accelerates the commercialization of promising commercial buildings technologies that can provide scalable solutions to reduce the energy impact of buildings. According to the Departmentmore » of Energy, nearly 40 percent of energy consumption in the U.S. today comes from buildings at an estimated cost of $413 billion.« less
Augmenting Probabilistic Risk Assesment with Malevolent Initiators
DOE Office of Scientific and Technical Information (OSTI.GOV)
Curtis Smith; David Schwieder
2011-11-01
As commonly practiced, the use of probabilistic risk assessment (PRA) in nuclear power plants only considers accident initiators such as natural hazards, equipment failures, and human error. Malevolent initiators are ignored in PRA, but are considered the domain of physical security, which uses vulnerability assessment based on an officially specified threat (design basis threat). This paper explores the implications of augmenting and extending existing PRA models by considering new and modified scenarios resulting from malevolent initiators. Teaming the augmented PRA models with conventional vulnerability assessments can cost-effectively enhance security of a nuclear power plant. This methodology is useful for operatingmore » plants, as well as in the design of new plants. For the methodology, we have proposed an approach that builds on and extends the practice of PRA for nuclear power plants for security-related issues. Rather than only considering 'random' failures, we demonstrated a framework that is able to represent and model malevolent initiating events and associated plant impacts.« less
Preventing Blackouts by Building a Better Power Grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Huang, Henry
America’s power grid is undergoing significant change. New mixes of electricity generation, as well as evolving consumer demand, make it even more challenging to manage. Moment-to-moment changes in electricity supply and demand can vary drastically, challenging power grid operators who must maintain a balance—in real time—to avoid disruptions and blackouts. Enter Senior Power Engineer Zhenyu (Henry) Huang. Henry leads PNNL’s initiative to develop technologies that will shape the future of the power grid, and he’s part of a team that is determined to make our nation’s grid more reliable and secure.
Using Social Media to Engage Students and Families
ERIC Educational Resources Information Center
Nielsen, Lisa
2014-01-01
Using social media in education requires putting some building blocks for success in place. A strong foundation for successful use of social networking in education starts by securing parent/guardian and student agreements. Social networking provides a powerful platform for learning and connecting. Facebook is not just for sharing status updates…
Building Maritime Security in Southeast Asia: Outsiders Not Welcome?
2008-01-01
Perspective/ RSIS0182007.pdf. 4. See Catherine Zara Raymond, “The Malacca Straits and the Threat of Maritime Terror- ism,” Power and Interest News...Catherine Zara Raymond (Singapore: World Scientific, 2005), p. 263. 39. Arthur Stein, “Coordination and Collabora- tion: Regimes in an Anarchic World
Credit BG. Northeast and northwest facades of Building 4496 (Security ...
Credit BG. Northeast and northwest facades of Building 4496 (Security Facility) as seen when looking south (178°) from entrance to secured area. The Control Tower (Building 4500) appears in background. The Security Facility is part of the secured Building 4505 complex - Edwards Air Force Base, North Base, Security Facility, Northeast of A Street, Boron, Kern County, CA
2016-2020 Strategic Plan and Implementing Framework
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2015-11-01
The 2016-2020 Strategic Plan and Implementing Framework from the Office of Energy Efficiency and Renewable Energy (EERE) is the blueprint for launching the nation’s leadership in the global clean energy economy. This document will guide the organization to build on decades of progress in powering our nation from clean, affordable and secure energy.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mollahan, K; Nattrass, L
America is in a unique position in its history. In maintaining its position as the world's only superpower, the US consistently finds itself taking on the role of a global cop, chief exporter of hard and soft power, and primary impetus for globalization. A view of the current global situation shows an America that can benefit greatly from the effects of globalization and soft power. Similarly, America's power can be reduced significantly if globalization and its soft power are not handled properly. At the same time, America has slowly come to realize that its next major adversary is not amore » near peer competitor but terrorism and disconnected nations that seek nuclear capabilities. In dealing with this new threat, America needs to come to terms with its own nuclear arsenal and build a security rule set that will establish for the world explicitly what actions will cause the US to consider nuclear weapons release. This rule set; however, needs to be established with sensitivity to the US's international interests in globalization and soft power. The US must find a way to establish its doctrine governing nuclear weapons release without threatening other peaceful nations in the process.« less
VIEW LOOKING SOUTHWEST AT BUILDING 121, THE PLANT SECURITY BUILDING. ...
VIEW LOOKING SOUTHWEST AT BUILDING 121, THE PLANT SECURITY BUILDING. BUILDING 121 WAS ONE OF THE ORIGINAL STRUCTURES AT THE ROCKY FLATS PLANT. IT SHARES A COMMON WALL WITH BUILDING 122, THE EMERGENCY MEDICAL BUILDING. (7/29/52) - Rocky Flats Plant, Security & Armory, West of Third Street, south of Central Avenue, Golden, Jefferson County, CO
SECURITY GATE FOR WEAPONS STORAGE AREA. FROM LEFT TO RIGHT, ...
SECURITY GATE FOR WEAPONS STORAGE AREA. FROM LEFT TO RIGHT, STORAGE BUILDING (BUILDING 3584), CONVENTIONAL MUNITIONS SHOP (BUILDING 3580), AND SECURITY POLICE ENTRY CONTROL BUILDING (BUILDING 3582). VIEW TO SOUTHWEST - Plattsburgh Air Force Base, U.S. Route 9, Plattsburgh, Clinton County, NY
ERIC Educational Resources Information Center
Intercultural Development Research Association, 2014
2014-01-01
Intercultural Development Research Association's (IDRA) 2014 Annual Report highlights seven defining moments in the work of the previous year: (1) Securing Opportunity; (2) Defending Children's Educational and Civil Rights; (3) Building a National Grassroots Family Model; (4) Putting Quality Early Education at the Forefront; (5) Empowering…
Electric Power Infrastructure Reliability and Security (EPIRS) Reseach and Development Initiative
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rick Meeker; L. Baldwin; Steinar Dale
2010-03-31
Power systems have become increasingly complex and face unprecedented challenges posed by population growth, climate change, national security issues, foreign energy dependence and an aging power infrastructure. Increased demand combined with increased economic and environmental constraints is forcing state, regional and national power grids to expand supply without the large safety and stability margins in generation and transmission capacity that have been the rule in the past. Deregulation, distributed generation, natural and man-made catastrophes and other causes serve to further challenge and complicate management of the electric power grid. To meet the challenges of the 21st century while also maintainingmore » system reliability, the electric power grid must effectively integrate new and advanced technologies both in the actual equipment for energy conversion, transfer and use, and in the command, control, and communication systems by which effective and efficient operation of the system is orchestrated - in essence, the 'smart grid'. This evolution calls for advances in development, integration, analysis, and deployment approaches that ultimately seek to take into account, every step of the way, the dynamic behavior of the system, capturing critical effects due to interdependencies and interaction. This approach is necessary to better mitigate the risk of blackouts and other disruptions and to improve the flexibility and capacity of the grid. Building on prior Navy and Department of Energy investments in infrastructure and resources for electric power systems research, testing, modeling, and simulation at the Florida State University (FSU) Center for Advanced Power Systems (CAPS), this project has continued an initiative aimed at assuring reliable and secure grid operation through a more complete understanding and characterization of some of the key technologies that will be important in a modern electric system, while also fulfilling an education and outreach mission to provide future energy workforce talent and support the electric system stakeholder community. Building upon and extending portions of that research effort, this project has been focused in the following areas: (1) Building high-fidelity integrated power and controls hardware-in-the-loop research and development testbed capabilities (Figure 1). (2) Distributed Energy Resources Integration - (a) Testing Requirements and Methods for Fault Current Limiters, (b) Contributions to the Development of IEEE 1547.7, (c) Analysis of a STATCOM Application for Wind Resource Integration, (d) Development of a Grid-Interactive Inverter with Energy Storage Elements, (e) Simulation-Assisted Advancement of Microgrid Understanding and Applications; (3) Availability of High-Fidelity Dynamic Simulation Tools for Grid Disturbance Investigations; (4) HTS Material Characterization - (a) AC Loss Studies on High Temperature Superconductors, (b) Local Identification of Current-Limiting Mechanisms in Coated Conductors; (5) Cryogenic Dielectric Research; and (6) Workshops, education, and outreach.« less
OVERALL view OF CONTROL BUILDING AND SECURITY GATE. view TO ...
OVERALL view OF CONTROL BUILDING AND SECURITY GATE. view TO EAST. - Plattsburgh Air Force Base, Security Police Entry Control Building, Off Perimeter Road in Weapons Storage Area, Plattsburgh, Clinton County, NY
OVERALL VIEW OF CONTROL BUILDING AND SECURITY GATE. VIEW TO ...
OVERALL VIEW OF CONTROL BUILDING AND SECURITY GATE. VIEW TO NORTH. - Plattsburgh Air Force Base, Security Police Entry Control Building, Off Perimeter Road in SAC Alert Area, Plattsburgh, Clinton County, NY
Building Security and Personal Safety. SPEC Kit 150.
ERIC Educational Resources Information Center
Bingham, Karen Havill
This report on a survey of Association of Research Libraries (ARL) member libraries on building security and personal safety policies examines three areas in detail: (1) general building security (access to the building, key distribution, patrols or monitors, intrusion prevention, lighting, work environment after dark); (2) problem behavior…
Providing security assurance in line with national DBT assumptions
NASA Astrophysics Data System (ADS)
Bajramovic, Edita; Gupta, Deeksha
2017-01-01
As worldwide energy requirements are increasing simultaneously with climate change and energy security considerations, States are thinking about building nuclear power to fulfill their electricity requirements and decrease their dependence on carbon fuels. New nuclear power plants (NPPs) must have comprehensive cybersecurity measures integrated into their design, structure, and processes. In the absence of effective cybersecurity measures, the impact of nuclear security incidents can be severe. Some of the current nuclear facilities were not specifically designed and constructed to deal with the new threats, including targeted cyberattacks. Thus, newcomer countries must consider the Design Basis Threat (DBT) as one of the security fundamentals during design of physical and cyber protection systems of nuclear facilities. IAEA NSS 10 describes the DBT as "comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated". Nowadays, many threat actors, including hacktivists, insider threat, cyber criminals, state and non-state groups (terrorists) pose security risks to nuclear facilities. Threat assumptions are made on a national level. Consequently, threat assessment closely affects the design structures of nuclear facilities. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to nuclear facilities. Therefore, the cybersecurity context is essential for secure and safe use of nuclear power. In addition, States should include multiple DBT scenarios in order to protect various target materials, types of facilities, and adversary objectives. Development of a comprehensive DBT is a precondition for the establishment and further improvement of domestic state nuclear-related regulations in the field of physical and cyber protection. These national regulations have to be met later on by I&C platform suppliers, electrical systems suppliers, system integrators and turn-key providers.
Solar power. [comparison of costs to wind, nuclear, coal, oil and gas
NASA Technical Reports Server (NTRS)
Walton, A. L.; Hall, Darwin C.
1990-01-01
This paper describes categories of solar technologies and identifies those that are economic. It compares the private costs of power from solar, wind, nuclear, coal, oil, and gas generators. In the southern United States, the private costs of building and generating electricity from new solar and wind power plants are less than the private cost of electricity from a new nuclear power plant. Solar power is more valuable than nuclear power since all solar power is available during peak and midpeak periods. Half of the power from nuclear generators is off-peak power and therefore is less valuable. Reliability is important in determining the value of wind and nuclear power. Damage from air pollution, when factored into the cost of power from fossil fuels, alters the cost comparison in favor of solar and wind power. Some policies are more effective at encouraging alternative energy technologies that pollute less and improve national security.
Confidence-Building Measures in Philippine Security.
1998-05-01
service or government agency. STRATEGY RESEARCH PROJECT i CONFIDENCE-BUILDING MEASURES IN PHILIPPINE SECURITY BY LIEUTENANT COLONEL RAMON G...WAR COLLEGE, CARLISLE BARRACKS, PA 17013-5050 rimo*’^»®*raBl USAWC STRATEGY RESEARCH PROJECT CONFIDENCE-BUILDING MEASURES IN PHILIPPINE...Colonel Ramon Santos, Philippine Army TITLE: Confidence-Building Measures in Philippine Security FORMAT: Strategy Research Project DATE: 1
Building a Secure Library System.
ERIC Educational Resources Information Center
Benson, Allen C.
1998-01-01
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
NASA Astrophysics Data System (ADS)
Rachi, Hideki
Sodium-Sulfur battery (NAS battery), which has more than 3 times of energy density compared with the conventional lead-acid battery and can be compactly established, has a great installation effects as a distributed energy storage system in the urban area which consumes big electric power. For the power company, NAS battery contributes to the load leveling, the supply capability up at the peak period, the efficient operation of the electric power equipment and the reduction of the capital expenditure. And for the customer, it is possible to enjoy the reduction of the electricity charges by utilizing nighttime electric power and the securing of a security. The contribution to the highly sophisticated information society where the higher electric power quality is desired, mainly office buildings and factories by the progress of IT, is very big. Tokyo Electric Power Company (TEPCO) developed the elementary technology of NAS battery from 1984 and ended the development of practical battery which has long-term durability and the safety and the performance verification of the megawatt scale. Finally TEPCO accomplished the practical application and commercialization of the stationary energy storage technology by NAS battery. In this paper, we introduces about conquered problems until practical application and commercialization.
U.S.-Latin American Nuclear Relations: From Commitment to Defiance
2012-09-01
domestic legislation to increase the levels of 3 nuclear transparency and accountability by relying extensively on technical and scientific...which some say was influenced by environmental groups), President Bachelet delayed the decision to build a nuclear power until 2010, when Sebastian...currently engaged in nuclear trafficking, the risk is there. According to Alex Sánchez, in 2008, Colombian security forces discovered that the
Federating Cyber and Physical Models for Event-Driven Situational Awareness
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stephan, Eric G.; Pawlowski, Ronald A.; Sridhar, Siddharth
The purpose of this paper is to describe a novel method to improve electric power system monitoring and control software application interoperability. This method employs the concept of federation, which is defined as the use of existing models that represent aspects of a system in specific domains (such as physical and cyber security domains) and building interface to link all of domain models.
A 3S Risk ?3SR? Assessment Approach for Nuclear Power: Safety Security and Safeguards.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Forrest, Robert; Reinhardt, Jason Christian; Wheeler, Timothy A.
Safety-focused risk analysis and assessment approaches struggle to adequately include malicious, deliberate acts against the nuclear power industry's fissile and waste material, infrastructure, and facilities. Further, existing methods do not adequately address non- proliferation issues. Treating safety, security, and safeguards concerns independently is inefficient because, at best, it may not take explicit advantage of measures that provide benefits against multiple risk domains, and, at worst, it may lead to implementations that increase overall risk due to incompatibilities. What is needed is an integrated safety, security and safeguards risk (or "3SR") framework for describing and assessing nuclear power risks that canmore » enable direct trade-offs and interactions in order to inform risk management processes -- a potential paradigm shift in risk analysis and management. These proceedings of the Sandia ePRA Workshop (held August 22-23, 2017) are an attempt to begin the discussions and deliberations to extend and augment safety focused risk assessment approaches to include security concerns and begin moving towards a 3S Risk approach. Safeguards concerns were not included in this initial workshop and are left to future efforts. This workshop focused on four themes in order to begin building out a the safety and security portions of the 3S Risk toolkit: 1. Historical Approaches and Tools 2. Current Challenges 3. Modern Approaches 4. Paths Forward and Next Steps This report is organized along the four areas described above, and concludes with a summary of key points. 2 Contact: rforres@sandia.gov; +1 (925) 294-2728« less
The construction of power grid operation index system considering the risk of maintenance
NASA Astrophysics Data System (ADS)
Tang, Jihong; Wang, Canlin; Jiang, Xinfan; Ye, Jianhui; Pan, Feilai
2018-02-01
In recent years, large-scale blackout occurred at home and abroad caused widespread concern about the operation of the grid in the world, and the maintenance risk is an important indicator of grid safety. The barrier operation of the circuit breaker exists in the process of overhaul of the power grid. The operation of the different barrier is of great significance to the change of the power flow, thus affecting the safe operation of the system. Most of the grid operating status evaluation index system did not consider the risk of maintenance, to this end, this paper from the security, economy, quality and cleanliness of the four angles, build the power grid operation index system considering the risk of maintenance.
WASTE TREATMENT BUILDING SYSTEM DESCRIPTION DOCUMENT
DOE Office of Scientific and Technical Information (OSTI.GOV)
F. Habashi
2000-06-22
The Waste Treatment Building System provides the space, layout, structures, and embedded subsystems that support the processing of low-level liquid and solid radioactive waste generated within the Monitored Geologic Repository (MGR). The activities conducted in the Waste Treatment Building include sorting, volume reduction, and packaging of dry waste, and collecting, processing, solidification, and packaging of liquid waste. The Waste Treatment Building System is located on the surface within the protected area of the MGR. The Waste Treatment Building System helps maintain a suitable environment for the waste processing and protects the systems within the Waste Treatment Building (WTB) from mostmore » of the natural and induced environments. The WTB also confines contaminants and provides radiological protection to personnel. In addition to the waste processing operations, the Waste Treatment Building System provides space and layout for staging of packaged waste for shipment, industrial and radiological safety systems, control and monitoring of operations, safeguards and security systems, and fire protection, ventilation and utilities systems. The Waste Treatment Building System also provides the required space and layout for maintenance activities, tool storage, and administrative facilities. The Waste Treatment Building System integrates waste processing systems within its protective structure to support the throughput rates established for the MGR. The Waste Treatment Building System also provides shielding, layout, and other design features to help limit personnel radiation exposures to levels which are as low as is reasonably achievable (ALARA). The Waste Treatment Building System interfaces with the Site Generated Radiological Waste Handling System, and with other MGR systems that support the waste processing operations. The Waste Treatment Building System interfaces with the General Site Transportation System, Site Communications System, Site Water System, MGR Site Layout, Safeguards and Security System, Site Radiological Monitoring System, Site Electrical Power System, Site Compressed Air System, and Waste Treatment Building Ventilation System.« less
15. Front security entrance to the perimeter acquisition radar building, ...
15. Front security entrance to the perimeter acquisition radar building, showing rotogates 1 and 2 and entrance door to security operations control center (SOCC), room #108 - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
1990-01-01
leadership coupled the US and the West, In arms control, difficult issues a massive and sustained arms buildup with assertive remain, including questions...announced journal : unilateral reductions, the le’cl o1t their forces will still outnumber those l’ any other country in the world, and Security in the...strategic conventional offensive could pr,- economic, The economic costs of building and sustain - emptively deny NATO any incentive to initiate nuclear ing
5. SOUTH ELEVATION OF BUILDING 8965 (SECURITY POLICE ENTRY CONTROL ...
5. SOUTH ELEVATION OF BUILDING 8965 (SECURITY POLICE ENTRY CONTROL BUILDING). - Loring Air Force Base, Alert Area, Southeastern portion of base, east of southern end of runway, Limestone, Aroostook County, ME
6. SOUTHWEST CORNER OF BUILDING 8965 (SECURITY POLICE ENTRY CONTROL ...
6. SOUTHWEST CORNER OF BUILDING 8965 (SECURITY POLICE ENTRY CONTROL BUILDING). - Loring Air Force Base, Alert Area, Southeastern portion of base, east of southern end of runway, Limestone, Aroostook County, ME
7. SOUTHEAST CORNER OF BUILDING 8965 (SECURITY POLICE ENTRY CONTROL ...
7. SOUTHEAST CORNER OF BUILDING 8965 (SECURITY POLICE ENTRY CONTROL BUILDING). - Loring Air Force Base, Alert Area, Southeastern portion of base, east of southern end of runway, Limestone, Aroostook County, ME
Integrating quantum key distribution with classical communications in backbone fiber network.
Mao, Yingqiu; Wang, Bi-Xiao; Zhao, Chunxu; Wang, Guangquan; Wang, Ruichun; Wang, Honghai; Zhou, Fei; Nie, Jimin; Chen, Qing; Zhao, Yong; Zhang, Qiang; Zhang, Jun; Chen, Teng-Yun; Pan, Jian-Wei
2018-03-05
Quantum key distribution (QKD) provides information-theoretic security based on the laws of quantum mechanics. The desire to reduce costs and increase robustness in real-world applications has motivated the study of coexistence between QKD and intense classical data traffic in a single fiber. Previous works on coexistence in metropolitan areas have used wavelength-division multiplexing, however, coexistence in backbone fiber networks remains a great experimental challenge, as Tbps data of up to 20 dBm optical power is transferred, and much more noise is generated for QKD. Here we present for the first time, to the best of our knowledge, the integration of QKD with a commercial backbone network of 3.6 Tbps classical data at 21 dBm launch power over 66 km fiber. With 20 GHz pass-band filtering and large effective core area fibers, real-time secure key rates can reach 4.5 kbps and 5.1 kbps for co-propagation and counter-propagation at the maximum launch power, respectively. This demonstrates feasibility and represents an important step towards building a quantum network that coexists with the current backbone fiber infrastructure of classical communications.
Valued Sustainable Services: Building Partnership Capacity Through Collaborating Approaches
2013-07-01
and national Security Policy, institute for national Strategic Studies , at the national defense university. he is also a distinguished research...for choosing a site for ValSServ initiation is the enthusiasm of the population—that is, the priority generally is to work with those who are...applied to domains to improve daily life in a ValSServ project area. Agriculture/Food. Power for cool or cold storage and on-site processing of
1967-01-01
Workmen secure a J-2 engine onto the S-IVB (second) stage thrust structure. As part of Marshall Space Center's "building block" approach to the Saturn development, the S-IVB was utilized in the Saturn IBC launch vehicle as a second stage and the Saturn V launch vehicle as a third stage. The booster, built for NASA by McDornell Douglas Corporation, was powered by a single J-2 engine, initially capable of 200,000 pounds of thrust.
Modeling and Analysis of Commercial Building Electrical Loads for Demand Side Management
NASA Astrophysics Data System (ADS)
Berardino, Jonathan
In recent years there has been a push in the electric power industry for more customer involvement in the electricity markets. Traditionally the end user has played a passive role in the planning and operation of the power grid. However, many energy markets have begun opening up opportunities to consumers who wish to commit a certain amount of their electrical load under various demand side management programs. The potential benefits of more demand participation include reduced operating costs and new revenue opportunities for the consumer, as well as more reliable and secure operations for the utilities. The management of these load resources creates challenges and opportunities to the end user that were not present in previous market structures. This work examines the behavior of commercial-type building electrical loads and their capacity for supporting demand side management actions. This work is motivated by the need for accurate and dynamic tools to aid in the advancement of demand side operations. A dynamic load model is proposed for capturing the response of controllable building loads. Building-specific load forecasting techniques are developed, with particular focus paid to the integration of building management system (BMS) information. These approaches are tested using Drexel University building data. The application of building-specific load forecasts and dynamic load modeling to the optimal scheduling of multi-building systems in the energy market is proposed. Sources of potential load uncertainty are introduced in the proposed energy management problem formulation in order to investigate the impact on the resulting load schedule.
Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.
Dunn Cavelty, Myriam
2014-09-01
Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.
Power Grid Construction Project Portfolio Optimization Based on Bi-level programming model
NASA Astrophysics Data System (ADS)
Zhao, Erdong; Li, Shangqi
2017-08-01
As the main body of power grid operation, county-level power supply enterprises undertake an important emission to guarantee the security of power grid operation and safeguard social power using order. The optimization of grid construction projects has been a key issue of power supply capacity and service level of grid enterprises. According to the actual situation of power grid construction project optimization of county-level power enterprises, on the basis of qualitative analysis of the projects, this paper builds a Bi-level programming model based on quantitative analysis. The upper layer of the model is the target restriction of the optimal portfolio; the lower layer of the model is enterprises’ financial restrictions on the size of the enterprise project portfolio. Finally, using a real example to illustrate operation proceeding and the optimization result of the model. Through qualitative analysis and quantitative analysis, the bi-level programming model improves the accuracy and normative standardization of power grid enterprises projects.
Energy efficiency in buildings, industry and transportation
NASA Astrophysics Data System (ADS)
Milovanovic, Dobrica; Babic, Milun; Jovicic, Nebojsa; Gordic, Dusan
2012-11-01
This paper reviews the literature concerning the energy saving and outlines the importance of energy efficiency, particularly in three the most important areas: buildings, industry and transportation. Improving energy efficiency plays a crucial role in minimizing the societal and environmental impacts of economic growth and offers a powerful tool for achieving sustainable development by reducing the need for investment in new infrastructure, by cutting fuel costs, and by increasing competitiveness for businesses and welfare for consumers. It creates environmental benefits through reduced emissions of greenhouse gases and local air pollutants. It can offer social benefits in the form of increased energy security (through reduced dependence on fossil fuels, particularly when imported) and better energy services.
2010-01-01
through the eyes of Abraham Maslow , a prominent humanistic psychologist. Maslow defined a hierarchy of needs which builds a person toward self...ones would come first in the person’s search for satisfaction.”(emphasis added) Maslow further postulates that once physiological needs are met, a...intimidation as their only means to remain in power. Understanding this hierarchy of needs is the key to developing stable, effective government within an
The Strategic Logic of the Contemporary Security Dilemma
2011-12-01
could outweigh the risks. In that context, Albert Camus reminds us that Hitler’s attempt to change the international system began as a 4 gang (the...Politics Among Nations: The Strug- gle for Power and Peace, New York: McGraw Hill-Publishing Com- pany, 1985. 5. Albert Camus , The Rebel, New York...state and nonstate actors, Al- bert Camus admonishes us to understand that: 38 He who dedicates himself to the destruction of the old in order to build
VIEW ALONG FLIGHT LINE FROM SECURITY GUARD TOWER (BUILDING 30631, ...
VIEW ALONG FLIGHT LINE FROM SECURITY GUARD TOWER (BUILDING 30631, LOOKING TOWARD FB-1 11A AIRCRAFT SHELTERS (BUILDINGS 3066, 3067,3068,3069,3071,3072,3073,3074,3076). VIEW TO SOUTHEAST - Plattsburgh Air Force Base, U.S. Route 9, Plattsburgh, Clinton County, NY
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pestovich, Kimberly Shay
Harnessing the power of the nuclear sciences for national security and to benefit others is one of Los Alamos National Laboratory’s missions. MST-8 focuses on manipulating and studying how the structure, processing, properties, and performance of materials interact at the atomic level under nuclear conditions. Within this group, single crystal scintillators contribute to the safety and reliability of weapons, provide global security safeguards, and build on scientific principles that carry over to medical fields for cancer detection. Improved cladding materials made of ferritic-martensitic alloys support the mission of DOE-NE’s Fuel Cycle Research and Development program to close the nuclear fuelmore » cycle, aiming to solve nuclear waste management challenges and thereby increase the performance and safety of current and future reactors.« less
NASA Astrophysics Data System (ADS)
Forcier, Bob
2003-09-01
This paper describes a digital-ultrasonic ground network, which forms an unique "unattended mote sensor system" for monitoring the environment, personnel, facilities, vehicles, power generation systems or aircraft in Counter-Terrorism, Force Protection, Prognostic Health Monitoring (PHM) and other ground applications. Unattended wireless smart sensor/tags continuously monitor the environment and provide alerts upon changes or disruptions to the environment. These wireless smart sensor/tags are networked utilizing ultrasonic wireless motes, hybrid RF/Ultrasonic Network Nodes and Base Stations. The network is monitored continuously with a 24/7 remote and secure monitoring system. This system utilizes physical objects such as a vehicle"s structure or a building to provide the media for two way secure communication of key metrics and sensor data and eliminates the "blind spots" that are common in RF solutions because of structural elements of buildings, etc. The digital-ultrasonic sensors have networking capability and a 32-bit identifier, which provide a platform for a robust data acquisition (DAQ) for a large amount of sensors. In addition, the network applies a unique "signature" of the environment by comparing sensor-to-sensor data to pick up on minute changes, which would signal an invasion of unknown elements or signal a potential tampering in equipment or facilities. The system accommodates satellite and other secure network uplinks in either RF or UWB protocols. The wireless sensors can be dispersed by ground or air maneuvers. In addition, the sensors can be incorporated into the structure or surfaces of vehicles, buildings, or clothing of field personnel.
Building Security. Honeywell Planning Guide.
ERIC Educational Resources Information Center
Honeywell, Inc., Minneapolis, Minn.
A general discussion of building detection and alarm systems to provide security against burglary and vandalism is provided by a manufacturer of automated monitoring and control systems. Security systems are identified as--(1) local alarm system, (2) central station alarm system, (3) proprietary alarm system, and (4) direct connect alarm system..…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Basu, Chandrayee; Ghatikar, Girish
The United States and India have among the largest economies in the world, and they continue to work together to address current and future challenges in reliable electricity supply. The acceleration to efficient, grid-responsive, resilient buildings represents a key energy security objective for federal and state agencies in both countries. The weaknesses in the Indian grid system were manifest in 2012, in the country’s worst blackout, which jeopardized the lives of half of India’s 1.2 billion people. While both countries are investing significantly in power sector reform, India, by virtue of its colossal growth rate in commercial energy intensity andmore » commercial floor space, is better placed than the United States to integrate and test state-of-art Smart Grid technologies in its future grid-responsive commercial buildings. This paper presents a roadmap of technical collaboration between the research organizations, and public-private stakeholders in both countries to accelerate the building-to-grid integration through pilot studies in India.« less
None
2017-12-09
In 1999, the National Nuclear Security Administration (NNSA) signed a contract with a consortium, now called Shaw AREVA MOX Services, LLC to design, build, and operate a Mixed Oxide (MOX) Fuel Fabrication Facility. This facility will be a major component in the United States program to dispose of surplus weapon-grade plutonium. The facility will take surplus weapon-grade plutonium, remove impurities, and mix it with uranium oxide to form MOX fuel pellets for reactor fuel assemblies. These assemblies will be irradiated in commercial nuclear power reactors.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2010-05-21
In 1999, the National Nuclear Security Administration (NNSA) signed a contract with a consortium, now called Shaw AREVA MOX Services, LLC to design, build, and operate a Mixed Oxide (MOX) Fuel Fabrication Facility. This facility will be a major component in the United States program to dispose of surplus weapon-grade plutonium. The facility will take surplus weapon-grade plutonium, remove impurities, and mix it with uranium oxide to form MOX fuel pellets for reactor fuel assemblies. These assemblies will be irradiated in commercial nuclear power reactors.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2009-07-29
In 1999, the Nuclear Nuclear Security Administration (NNSA) signed a contract with a consortium, now called Shaw AREVA MOX Services, LLC to design, build, and operate a Mixed Oxide (MOX) Fuel Fabrication Facility. This facility will be a major component in the United States program to dispose of surplus weapon-grade plutonium. The facility will take surplus weapon-grade plutonium, remove impurities, and mix it with uranium oxide to form MOX fuel pellets for reactor fuel assemblies. These assemblies will be irradiated in commercial nuclear power reactors.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Reeves, Geoff
The Sun’s continuous bombardment of the Earth with high-energy electrons, protons, and other nuclei results in space weather that can wreak havoc on the nation’s satellites, aircraft, communications networks, navigation systems, and the electric power grid. Because of the potential for space weather to so critically impact national security, Los Alamos National Laboratory has been studying it for decades, designing and building space-based sensors to detect emissions from potential nuclear events here on Earth and to study natural and man-made radiation in space.
None
2018-01-16
In 1999, the Nuclear Nuclear Security Administration (NNSA) signed a contract with a consortium, now called Shaw AREVA MOX Services, LLC to design, build, and operate a Mixed Oxide (MOX) Fuel Fabrication Facility. This facility will be a major component in the United States program to dispose of surplus weapon-grade plutonium. The facility will take surplus weapon-grade plutonium, remove impurities, and mix it with uranium oxide to form MOX fuel pellets for reactor fuel assemblies. These assemblies will be irradiated in commercial nuclear power reactors.
The Road to DLCZ Protocol in Rubidium Ensemble
NASA Astrophysics Data System (ADS)
Li, Chang; Pu, Yunfei; Jiang, Nan; Chang, Wei; Zhang, Sheng; CenterQuantum Information, InstituteInterdisciplinary Information Sciences, Tsinghua Univ Team
2017-04-01
Quantum communication is the powerful approach achieving a fully secure information transferal. The DLCZ protocol ensures that photon linearly decays with transferring distance increasing, which improves the success potential and shortens the time to build up an entangled channel. Apart from that, it provides an advanced idea that building up a quantum internet based on different nodes connected to different sites and themselves. In our laboratory, three sets of laser-cooled Rubidium 87 ensemble have been built. Two of them serve as the single photon emitter, which generate the entanglement between ensemble and photon. What's more, crossed AODs are equipped to multiplex and demultiplex optical circuit so that ensemble is divided into 2 hundred of 2D sub-memory cells. And the third ensemble is used as quantum telecommunication, which converts 780nm photon into telecom-wavelength one. And we have been building double-MOT system, which provides more atoms in ensemble and larger optical density.
Honeywell: Comfort and economy
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lukaszewski, J.
1995-12-31
The presentation of the Company starts with having it ranked among the ones operating on the customers` market or those acting on the professional market. But it is not so. Honeywell is beyond such simple criteria. We are a company supplying products, systems and services related with generally conceived automatic control engineering, yet the operational range does comprise so many apparently diversified fields, for instance automatic control in aeronautics, heavy power engineering, building of apartment buildings, detached houses, heat engineering and some others. Nevertheless, our targets are always the same: maximum increase in efficiency and reliability of the process linesmore » controlled by our systems as well as securing the best comfort of work and rest for people who stay in the buildings controlled by our devices. Simultaneously, the utilization of energy sources and the natural environment resources must be as sensible as possible.« less
Fuel cells provide a revenue-generating solution to power quality problems
DOE Office of Scientific and Technical Information (OSTI.GOV)
King, J.M. Jr.
Electric power quality and reliability are becoming increasingly important as computers and microprocessors assume a larger role in commercial, health care and industrial buildings and processes. At the same time, constraints on transmission and distribution of power from central stations are making local areas vulnerable to low voltage, load addition limitations, power quality and power reliability problems. Many customers currently utilize some form of premium power in the form of standby generators and/or UPS systems. These include customers where continuous power is required because of health and safety or security reasons (hospitals, nursing homes, places of public assembly, air trafficmore » control, military installations, telecommunications, etc.) These also include customers with industrial or commercial processes which can`t tolerance an interruption of power because of product loss or equipment damage. The paper discusses the use of the PC25 fuel cell power plant for backup and parallel power supplies for critical industrial applications. Several PC25 installations are described: the use of propane in a PC25; the use by rural cooperatives; and a demonstration of PC25 technology using landfill gas.« less
Securing Resources in Collaborative Environments: A Peer-to-peerApproach
DOE Office of Scientific and Technical Information (OSTI.GOV)
Berket, Karlo; Essiari, Abdelilah; Thompson, Mary R.
2005-09-19
We have developed a security model that facilitates control of resources by autonomous peers who act on behalf of collaborating users. This model allows a gradual build-up of trust. It enables secure interactions among users that do not necessarily know each other and allows them to build trust over the course of their collaboration. This paper describes various aspects of our security model and describes an architecture that implements this model to provide security in pure peer-to-peer environments.
77 FR 62249 - Federal Property Suitable as Facilities To Assist the Homeless
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-12
... Reasons: Secured Area New Mexico 3 Buildings Kirtland AFB Kirtland AFB NM 87117 Landholding Agency: Air... security Reasons: Secured Area Bldg. 30116 5801 Manzano St SE Kirtland AFB NM 87117 Landholding Agency: Air... Area 6 Buildings Kirtland AFB Kirtland AFB NM 87117 Landholding Agency: Air Force Property Number...
ARPA-E: Transforming Our Energy Future
Williams, Ellen; Raman, Aaswath
2018-06-22
ARPA-E helps to translate cutting-edge inventions into technological innovations that could change how we use, generate and store energy. In just seven years, ARPA-E technologies are demonstrating technical and commercial progress, surpassing $1.25 billion in private sector follow on funding. In this video, ARPA-E Director Dr. Ellen D. Williams highlights an exciting project from Stanford University that is developing a radiative cooling technology that could enable buildings, power plants, solar cells and even clothing to cool without using electric power or loss of water. This project is just one example among ARPA-Eâs 400+ innovative technologies that are reimagining energy and helping to create a more secure, affordable and sustainable American energy future.
75 FR 3743 - Medicare Program; Meeting of the Practicing Physicians Advisory Council, March 8, 2010
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-22
... will be provided on the Physician Regulatory Issues Team. In accordance with the Council charter, we... Building, the Hubert H. Humphrey Building, Federal security measures are applicable. In planning your arrival time, we recommend allowing additional time to clear security. To gain access to the building...
6. LAUNCH CONTROL SUPPORT BUILDING. INTERIOR OF SECURITY OFFICE. VIEW ...
6. LAUNCH CONTROL SUPPORT BUILDING. INTERIOR OF SECURITY OFFICE. VIEW TO WEST. - Minuteman III ICBM Launch Control Facility November-1, 1.5 miles North of New Raymer & State Highway 14, New Raymer, Weld County, CO
7. LAUNCH CONTROL SUPPORT BUILDING. INTERIOR OF SECURITY OFFICE. VIEW ...
7. LAUNCH CONTROL SUPPORT BUILDING. INTERIOR OF SECURITY OFFICE. VIEW TO NORTH. - Minuteman III ICBM Launch Control Facility November-1, 1.5 miles North of New Raymer & State Highway 14, New Raymer, Weld County, CO
NASA Astrophysics Data System (ADS)
Voskresenskaya, Elena; Vorona-Slivinskaya, Lubov
2018-03-01
The article considers the issues of developing national standards for high-rise construction. The system of standards should provide industrial, operational, economic and terrorist safety of high-rise buildings and facilities. Modern standards of high-rise construction should set the rules for designing engineering systems of high-rise buildings, which will ensure the integrated security of buildings, increase their energy efficiency and reduce the consumption of resources in construction and operation.
Making Our Buildings Safer: Security Management and Equipment Issues.
ERIC Educational Resources Information Center
Clark, James H.
1997-01-01
Discusses three major components of library security: physical security of the environment; operating procedures for library staff, the public, and security personnel; and a contract security force (or campus security in academic institutions.) Topics include risk management; maintenance; appropriate technology, including security systems and…
ARPA-E: Transforming Our Energy Future
DOE Office of Scientific and Technical Information (OSTI.GOV)
Williams, Ellen; Raman, Aaswath
2016-03-02
ARPA-E helps to translate cutting-edge inventions into technological innovations that could change how we use, generate and store energy. In just seven years, ARPA-E technologies are demonstrating technical and commercial progress, surpassing $1.25 billion in private sector follow on funding. In this video, ARPA-E Director Dr. Ellen D. Williams highlights an exciting project from Stanford University that is developing a radiative cooling technology that could enable buildings, power plants, solar cells and even clothing to cool without using electric power or loss of water. This project is just one example among ARPA-E’s 400+ innovative technologies that are reimagining energy andmore » helping to create a more secure, affordable and sustainable American energy future.« less
The Evolution and Design of American Air Power After World War II: The Finletter Commission
1993-05-25
made it imperative that the United Stales build a strong air atomic capability to assure its own security.6 Vice-chairman George Haker was even more...34 Interestingly enough, Haker admitted that We couldn’t find any answer other dian "you do it to us, you’ll die." liiere didn’t seem to be any other...78-79. Oral History Interview. George V. Haker . December 1977, 51 53, Truman Library. " Ibid. Survival in the Air Age. 14. Finletter remembered
NASA Astrophysics Data System (ADS)
Sihombing, P.; Siregar, Y. M.; Tarigan, J. T.; Jaya, I.; Turnip, A.
2018-03-01
Security system is one of the common problems to protect an environment such as personal house or a warehouse. There are numerous methods and technologies that can be used as part of a security system. In this paper, we present a security system that offers a better efficiency. The purpose of this study is to build a system that can monitor home security at any time in particular fire and theft. Through sensors, the system will be able to provide warning information of hazard conditions via LCD monitor, sound, and alarm. This information will be sent automatically to the home owner’s smartphone as well as to the corresponding to the security agency. Thus the prevention of theft and fire hazards can be immediately anticipated by the police and firefighters. The system will also notify the position of the coordinates of the location of the building (the house) by a link to the Google map in order to make it easier to get the location quickly.
A Proactive Approach to Building Security.
ERIC Educational Resources Information Center
Winters, Sharon
1994-01-01
Describes building security procedures developed at the Hampton Public Library (Virginia) to deal with problem patrons. Highlights include need for the library monitor program; staffing patterns; monitor selection criteria; training procedures; library behavior guidelines; library policy statements; theft detection systems; and sample job…
Green Secure Processors: Towards Power-Efficient Secure Processor Design
NASA Astrophysics Data System (ADS)
Chhabra, Siddhartha; Solihin, Yan
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.
Secure VM for Monitoring Industrial Process Controllers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dasgupta, Dipankar; Ali, Mohammad Hassan; Abercrombie, Robert K
2011-01-01
In this paper, we examine the biological immune system as an autonomic system for self-protection, which has evolved over millions of years probably through extensive redesigning, testing, tuning and optimization process. The powerful information processing capabilities of the immune system, such as feature extraction, pattern recognition, learning, memory, and its distributive nature provide rich metaphors for its artificial counterpart. Our study focuses on building an autonomic defense system, using some immunological metaphors for information gathering, analyzing, decision making and launching threat and attack responses. In order to detection Stuxnet like malware, we propose to include a secure VM (or dedicatedmore » host) to the SCADA Network to monitor behavior and all software updates. This on-going research effort is not to mimic the nature but to explore and learn valuable lessons useful for self-adaptive cyber defense systems.« less
SPAR: a security- and power-aware routing protocol for wireless ad hoc and sensor networks
NASA Astrophysics Data System (ADS)
Oberoi, Vikram; Chigan, Chunxiao
2005-05-01
Wireless Ad Hoc and Sensor Networks (WAHSNs) are vulnerable to extensive attacks as well as severe resource constraints. To fulfill the security needs, many security enhancements have been proposed. Like wise, from resource constraint perspective, many power aware schemes have been proposed to save the battery power. However, we observe that for the severely resource limited and extremely vulnerable WAHSNs, taking security or power (or any other resource) alone into consideration for protocol design is rather inadequate toward the truly "secure-and-useful" WAHSNs. For example, from resource constraint perspective, we identify one of the potential problems, the Security-Capable-Congestion (SCC) behavior, for the WAHSNs routing protocols where only the security are concerned. On the other hand, the design approach where only scarce resource is concerned, such as many power-aware WAHSNs protocols, leaves security unconsidered and is undesirable to many WAHSNs application scenarios. Motivated by these observations, we propose a co-design approach, where both the high security and effective resource consumption are targeted for WAHSNs protocol design. Specifically, we propose a novel routing protocol, Security- and Power- Aware Routing (SPAR) protocol based on this co-design approach. In SPAR, the routing decisions are made based on both security and power as routing criteria. The idea of the SPAR mechanism is routing protocol independent and therefore can be broadly integrated into any of the existing WAHSNs routing protocols. The simulation results show that SPAR outperforms the WAHSNs routing protocols where security or power alone is considered, significantly. This research finding demonstrates the proposed security- and resource- aware co-design approach is promising towards the truly "secure-and-useful" WAHSNs.
Building Security into Schools.
ERIC Educational Resources Information Center
Kosar, John E.; Ahmed, Faruq
2000-01-01
Offers tips for redesigning safer school sites; installing and implementing security technologies (closed-circuit television cameras, door security hardware, electronic security panels, identification cards, metal detectors, and panic buttons); educating students and staff about security functions; and minimizing costs via a comprehensive campus…
Karvetski, Christopher W; Lambert, James H; Linkov, Igor
2011-04-01
Military and industrial facilities need secure and reliable power generation. Grid outages can result in cascading infrastructure failures as well as security breaches and should be avoided. Adding redundancy and increasing reliability can require additional environmental, financial, logistical, and other considerations and resources. Uncertain scenarios consisting of emergent environmental conditions, regulatory changes, growth of regional energy demands, and other concerns result in further complications. Decisions on selecting energy alternatives are made on an ad hoc basis. The present work integrates scenario analysis and multiple criteria decision analysis (MCDA) to identify combinations of impactful emergent conditions and to perform a preliminary benefits analysis of energy and environmental security investments for industrial and military installations. Application of a traditional MCDA approach would require significant stakeholder elicitations under multiple uncertain scenarios. The approach proposed in this study develops and iteratively adjusts a scoring function for investment alternatives to find the scenarios with the most significant impacts on installation security. A robust prioritization of investment alternatives can be achieved by integrating stakeholder preferences and focusing modeling and decision-analytical tools on a few key emergent conditions and scenarios. The approach is described and demonstrated for a campus of several dozen interconnected industrial buildings within a major installation. Copyright © 2010 SETAC.
Environmental analysis Waste Isolation Pilot Plant (WIPP) cost reduction proposals
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
The Waste Isolation Pilot Plant (WIPP) is a research and development facility to demonstrate the safe disposal of radioactive wastes resulting from the defense activities and programs of the United States government. The facility is planned to be developed in bedded salt at the Los Medanos site in southeastern New Mexico. The environmental consequences of contruction and operation of the WIPP facility are documented in ''Final Environmental Impact Statement, Waste Isolation Pilot Plant''. The proposed action addressed by this environmental analysis is to simplify and reduce the scope of the WIPP facility as it is currently designed. The proposed changesmore » to the existing WIPP design are: limit the waste storage rate to 500,000 cubic feet per year; eliminate one shaft and revise the underground ventilation system; eliminate the underground conveyor system; combine the Administration Building, the Underground Personnel Building and the Waste Handling Building office area; simplify the central monitoring system; simplify the security control systems; modify the Waste Handling Building; simplify the storage exhaust system; modify the above ground salt handling logistics; simplify the power system; reduce overall site features; simplify the Warehouse/Shops Building and eliminate the Vehicle Maintenance Building; and allow resource recovery in Control Zone IV.« less
2017-03-24
effort 11. NADR - Counterterrorism Finance Assists partner nations to build and strengthen effective anti- money laundering and counterterrorism...Counsel. Briefing slide deck: “Authority and Money : Basics for Building Partner Capacity.” February 2016. (Current as of 2016 DOD Appropriations Act...Warfare Program Provide seed money to support international cooperative development of technological solutions that enable U.S. and friendly armed
Lachat, Carl; Roberfroid, Dominique; Van den Broeck, Lien; Van den Briel, Natalie; Nago, Eunice; Kruger, Annamarie; Holdsworth, Michelle; Garimoi Orach, Christopher; Kolsteren, Patrick
2015-07-01
Malnutrition in Africa has not improved compared with other regions in the world. Investment in the build-up of a strong African research workforce is essential to provide contextual solutions to the nutritional problems of Africa. To orientate this process, we reviewed nutrition research carried out in Africa and published during the last decade. We assessed nutrition research from Africa published between 2000 and 2010 from MEDLINE and EMBASE and analysed the study design and type of intervention for studies indexed with major MeSH terms for vitamin A deficiency, protein-energy malnutrition, obesity, breast-feeding, nutritional status and food security. Affiliations of first authors were visualised as a network and power of affiliations was assessed using centrality metrics. Africa. Africans, all age groups. Most research on the topics was conducted in Southern (36%) and Western Africa (34%). The intervention studies (9%; n 95) mainly tested technological and curative approaches to the nutritional problems. Only for papers on protein-energy malnutrition and obesity did lead authorship from Africa exceed that from non-African affiliations. The 10% most powerfully connected affiliations were situated mainly outside Africa for publications on vitamin A deficiency, breast-feeding, nutritional status and food security. The development of the evidence base for nutrition research in Africa is focused on treatment and the potential for cross-African networks to publish nutrition research from Africa remains grossly underutilised. Efforts to build capacity for effective nutrition action in Africa will require forging a true academic partnership between African and non-African research institutions.
SAFETY AND SECURITY BUILDING, TRA614. ELEVATIONS. SECTIONS. TWO ROOF LEVELS. ...
SAFETY AND SECURITY BUILDING, TRA-614. ELEVATIONS. SECTIONS. TWO ROOF LEVELS. BLAW-KNOX 3150-814-2, 3/1950. INL INDEX NO. 531-0614-00-098-100703, REV. 6. - Idaho National Engineering Laboratory, Test Reactor Area, Materials & Engineering Test Reactors, Scoville, Butte County, ID
SAFETY AND SECURITY BUILDING, TRA614. SIMPLIFIED FLOOR LAYOUT AND WEST ...
SAFETY AND SECURITY BUILDING, TRA-614. SIMPLIFIED FLOOR LAYOUT AND WEST ELEVATION. BLAW-KNOX 3150-14-1, 1/1950. INL INDEX NO. 531-0614-00-098-100024, REV. 2. - Idaho National Engineering Laboratory, Test Reactor Area, Materials & Engineering Test Reactors, Scoville, Butte County, ID
Secure Utilization of Beacons and UAVs in Emergency Response Systems for Building Fire Hazard
Seo, Seung-Hyun; Choi, Jung-In; Song, Jinseok
2017-01-01
An intelligent emergency system for hazard monitoring and building evacuation is a very important application area in Internet of Things (IoT) technology. Through the use of smart sensors, such a system can provide more vital and reliable information to first-responders and also reduce the incidents of false alarms. Several smart monitoring and warning systems do already exist, though they exhibit key weaknesses such as a limited monitoring coverage and security, which have not yet been sufficiently addressed. In this paper, we propose a monitoring and emergency response method for buildings by utilizing beacons and Unmanned Aerial Vehicles (UAVs) on an IoT security platform. In order to demonstrate the practicability of our method, we also implement a proof of concept prototype, which we call the UAV-EMOR (UAV-assisted Emergency Monitoring and Response) system. Our UAV-EMOR system provides the following novel features: (1) secure communications between UAVs, smart sensors, the control server and a smartphone app for security managers; (2) enhanced coordination between smart sensors and indoor/outdoor UAVs to expand real-time monitoring coverage; and (3) beacon-aided rescue and building evacuation. PMID:28946659
Secure Utilization of Beacons and UAVs in Emergency Response Systems for Building Fire Hazard.
Seo, Seung-Hyun; Choi, Jung-In; Song, Jinseok
2017-09-25
An intelligent emergency system for hazard monitoring and building evacuation is a very important application area in Internet of Things (IoT) technology. Through the use of smart sensors, such a system can provide more vital and reliable information to first-responders and also reduce the incidents of false alarms. Several smart monitoring and warning systems do already exist, though they exhibit key weaknesses such as a limited monitoring coverage and security, which have not yet been sufficiently addressed. In this paper, we propose a monitoring and emergency response method for buildings by utilizing beacons and Unmanned Aerial Vehicles (UAVs) on an IoT security platform. In order to demonstrate the practicability of our method, we also implement a proof of concept prototype, which we call the UAV-EMOR (UAV-assisted Emergency Monitoring and Response) system. Our UAV-EMOR system provides the following novel features: (1) secure communications between UAVs, smart sensors, the control server and a smartphone app for security managers; (2) enhanced coordination between smart sensors and indoor/outdoor UAVs to expand real-time monitoring coverage; and (3) beacon-aided rescue and building evacuation.
Lessons from Burundi’s Security Sector Reform Process
2014-11-01
Defense University,Africa Center for Strategic Studies,300 Fifth Avenue, Building 20 Fort McNair,Washington ,DC,20319-5066 8. PERFORMING ORGANIZATION...Fifth Avenue, Building 20 Fort McNair Washington, D.C. 20319-5066 Phone: + 1 202-685-7300 Website: www.africacenter.org AfricA Security briefS Director...Official Complicity and Impunity (New York: Human Rights Watch, March 2010). 4 Louis- Alexandre Berg, “Security Governance and the Recurrence of
Cybersecurity and Optimization in Smart “Autonomous” Buildings
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mylrea, Michael E.; Gourisetti, Sri Nikhil Gup
Significant resources have been invested in making buildings “smart” by digitizing, networking and automating key systems and operations. Smart autonomous buildings create new energy efficiency, economic and environmental opportunities. But as buildings become increasingly networked to the Internet, they can also become more vulnerable to various cyber threats. Automated and Internet-connected buildings systems, equipment, controls, and sensors can significantly increase cyber and physical vulnerabilities that threaten the confidentiality, integrity, and availability of critical systems in organizations. Securing smart autonomous buildings presents a national security and economic challenge to the nation. Ignoring this challenge threatens business continuity and the availability ofmore » critical infrastructures that are enabled by smart buildings. In this chapter, the authors address challenges and explore new opportunities in securing smart buildings that are enhanced by machine learning, cognitive sensing, artificial intelligence (AI) and smart-energy technologies. The chapter begins by identifying cyber-threats and challenges to smart autonomous buildings. Then it provides recommendations on how AI enabled solutions can help smart buildings and facilities better protect, detect and respond to cyber-physical threats and vulnerabilities. Next, the chapter will provide case studies that examine how combining AI with innovative smart-energy technologies can increase both cybersecurity and energy efficiency savings in buildings. The chapter will conclude by proposing recommendations for future cybersecurity and energy optimization research for examining AI enabled smart-energy technology.« less
76 FR 12353 - Combined Notice of Filings #2
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-07
... PowerSecure Inc. at Washington, NC Walmart. Filed Date: 07/02/2010. Accession Number: 20100702-5029...: Self-Certification of PowerSecure Inc. at Laurinburg, NC Walmart. Filed Date: 07/02/2010. Accession...Secure, Inc. Description: Self-Certification of PowerSecure Inc. at Wilson, NC Walmart. Filed Date: 07/02...
GENERAL VIEW OF FLIGHT LINE BUILDINGS. FROM RIGHT TO LEFT, ...
GENERAL VIEW OF FLIGHT LINE BUILDINGS. FROM RIGHT TO LEFT, PETROLEUM OPERATIONS BUILDING (BUILDING, 2840), SECURITY POLICE CENTRAL CONTROL BUILDING (BUILDING 2841). MAINTENANCE DOCK (BUILDING 2837) AND MAINTENANCE DOCK (BUILDING 2890). VIEW TO NORTHWEST - Plattsburgh Air Force Base, U.S. Route 9, Plattsburgh, Clinton County, NY
NASA Astrophysics Data System (ADS)
Hamid, Nasri A.; Mujaini, Madihah; Mohamed, Abdul Aziz
2017-01-01
The Center for Nuclear Energy (CNE), College of Engineering, Universiti Tenaga Nasional (UNITEN) has a great responsibility to undertake educational activities that promote developing human capital in the area of nuclear engineering and technology. Developing human capital in nuclear through education programs is necessary to support the implementation of nuclear power projects in Malaysia in the near future. In addition, the educational program must also meet the nuclear power industry needs and requirements. In developing a certain curriculum, the contents must comply with the university's Outcomes Based Education (OBE) philosophy. One of the important courses in the nuclear curriculum is in the area of nuclear security. Basically the nuclear security course covers the current issues of law, politics, military strategy, and technology with regard to weapons of mass destruction and related topics in international security, and review legal regulations and political relationship that determine the state of nuclear security at the moment. In addition, the course looks into all aspects of the nuclear safeguards, builds basic knowledge and understanding of nuclear non-proliferation, nuclear forensics and nuclear safeguards in general. The course also discusses tools used to combat nuclear proliferation such as treaties, institutions, multilateral arrangements and technology controls. In this paper, we elaborate the development of undergraduate nuclear security course at the College of Engineering, Universiti Tenaga Nasional. Since the course is categorized as mechanical engineering subject, it must be developed in tandem with the program educational objectives (PEO) of the Bachelor of Mechanical Engineering program. The course outcomes (CO) and transferrable skills are also identified. Furthermore, in aligning the CO with program outcomes (PO), the PO elements need to be emphasized through the CO-PO mapping. As such, all assessments and distribution of Bloom Taxonomy levels are assigned in accordance with the CO-PO mapping. Finally, the course has to fulfill the International Engineering Alliance (IEA) Graduate Attributes of the Washington Accord.
Building Afghanistan’s Security Forces in Wartime: The Soviet Experience
2011-01-01
weaponry (aircraft, rockets , and thou- sands of Shmel flamethrowers), and funds to pay fighters.16 The Soviets 13 Liakhovskii, 2009. 14 Timofeev...effort to build an effective state in Afghanistan was a failure, prospects for success in developing the security forces of that state were, in retro
There is presently much focus on Homeland Security and the need to understand how potential sources of toxic material are transported and dispersed in the urban environment. Material transport and dispersion within these urban centers is highly influenced by the buildings. Compu...
Checklist for the Safety and Security of Buildings and Grounds.
ERIC Educational Resources Information Center
Virginia State Dept. of Education, Richmond.
An evaluation checklist is provided for assessing a school's strengths and weaknesses relative to the safety and security of buildings and grounds, as well as assessing development and enforcement of policies, the presence of intervention and prevention plans, staff development, parent and community involvement, opportunities for student…
Guidelines for Network Security in the Learning Environment.
ERIC Educational Resources Information Center
Littman, Marlyn Kemper
1996-01-01
Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)
Wide Area Security Region Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Makarov, Yuri V.; Lu, Shuai; Guo, Xinxin
2010-03-31
This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of systemmore » parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of security hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed technology. Recommendations for the future work have also been formulated.« less
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Physical security controls for non-practitioners..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Security Requirements § 1301.73 Physical security... adequate security for the area or building. If such security requires an alarm, such alarm, upon...
18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 18 Conservation of Power and Water Resources 2 2013-04-01 2012-04-01 true Creation of Participant's Security Entitlement; security interests. 1314.5 Section 1314.5 Conservation of Power and Water... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A...
18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 18 Conservation of Power and Water Resources 2 2012-04-01 2012-04-01 false Creation of Participant's Security Entitlement; security interests. 1314.5 Section 1314.5 Conservation of Power and Water... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A...
18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 18 Conservation of Power and Water Resources 2 2011-04-01 2011-04-01 false Creation of Participant's Security Entitlement; security interests. 1314.5 Section 1314.5 Conservation of Power and Water... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A...
18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 18 Conservation of Power and Water Resources 2 2014-04-01 2014-04-01 false Creation of Participant's Security Entitlement; security interests. 1314.5 Section 1314.5 Conservation of Power and Water... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A...
18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Creation of Participant's Security Entitlement; security interests. 1314.5 Section 1314.5 Conservation of Power and Water... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A...
78 FR 15797 - Service Delivery Plan
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0048] Service Delivery Plan AGENCY: Social... information, such as Social Security numbers or medical information. 1. Internet: We strongly recommend that... Regulations and Reports Clearance, Social Security Administration, 107 Altmeyer Building, 6401 Security...
2014-10-01
Views September–October 2014 Air & Space Power Journal | 92 Aviation Security Cooperation Advancing Global Vigilance, Global Reach, and Global Power...2014 to 00-00-2014 4. TITLE AND SUBTITLE Aviation Security Cooperation: Advancing Global Vigilance, Global Reach, and Global Power in a Dynamic
Code of Federal Regulations, 2011 CFR
2011-04-01
... securities of power supply companies from section 9(a)(2) of the Act. 250.14 Section 250.14 Commodity and... of securities of power supply companies from section 9(a)(2) of the Act. (a) An electric utility... exempt from section 9(a)(2) of the Act with respect to the acquisition of any security of a power supply...
Code of Federal Regulations, 2010 CFR
2010-04-01
... securities of power supply companies from section 9(a)(2) of the Act. 250.14 Section 250.14 Commodity and... of securities of power supply companies from section 9(a)(2) of the Act. (a) An electric utility... exempt from section 9(a)(2) of the Act with respect to the acquisition of any security of a power supply...
The Slow Control System of the Auger Fluorescence Detectors
NASA Astrophysics Data System (ADS)
Barenthien, N.; Bethge, C.; Daumiller, K.; Gemmeke, H.; Kampert, K.-H.; Wiebusch, C.
2003-07-01
The fluorescence detector (FD) of the Pierre Auger experiment [1] comprises 24 telescopes that will be situated in 4 remote buildings in the Pampa Amarilla. It is planned to run the fluorescence detectors in absence of operators on site. Therefore, the main task of the Slow Control System (SCS) is to ensure a secure remote operation of the FD system. The Slow Control System works autonomously and continuously monitors those parameters which may disturb a secure operation. Commands from the data-acquisition system or the remote operator are accepted only if they do not violate safety rules that depend on the actual experimental conditions (e.g. high-voltage, wind-sp eed, light, etc.). In case of malfunctions (power failure, communication breakdown, ...) the SCS performs an orderly shutdown and subsequent startup of the fluorescence detector system. The concept and the implementation of the Slow Control System are presented.
Westbury, Becky
2015-06-01
In Ten tips for normal birth, the Royal College of Midwives (RCM) (2014) advocates the building of nests; creating an environment that helps women to feel safe and secure during birth, as this can improve women's experiences and likelihood of normal birth. Furthermore, a private, undisturbed and dark environment, where women feel calm and safe can promote the release of oxytocin, the hormone responsible for uterine contractions and thought to promote the release of the pain relieving hormones endorphins (Uvnas Moberg 2003). When this is not achieved, women can experience fear-tension-pain syndrome, impeding labour progress and causing increased levels of pain (Dick-Read 2013). In addition, birth space has the potential to encourage the promotion of normality through providing space to mobilise, and alternative furniture to enable upright birth positions. Midwives should help women to create a birth space in which they feel safe, calm and secure, to promote normality and increase the incidence of normal birth (RCM 2014).
Evaluation of power system security and development of transmission pricing method
NASA Astrophysics Data System (ADS)
Kim, Hyungchul
The electric power utility industry is presently undergoing a change towards the deregulated environment. This has resulted in unbundling of generation, transmission and distribution services. The introduction of competition into unbundled electricity services may lead system operation closer to its security boundaries resulting in smaller operating safety margins. The competitive environment is expected to lead to lower price rates for customers and higher efficiency for power suppliers in the long run. Under this deregulated environment, security assessment and pricing of transmission services have become important issues in power systems. This dissertation provides new methods for power system security assessment and transmission pricing. In power system security assessment, the following issues are discussed (1) The description of probabilistic methods for power system security assessment; (2) The computation time of simulation methods; (3) on-line security assessment for operation. A probabilistic method using Monte-Carlo simulation is proposed for power system security assessment. This method takes into account dynamic and static effects corresponding to contingencies. Two different Kohonen networks, Self-Organizing Maps and Learning Vector Quantization, are employed to speed up the probabilistic method. The combination of Kohonen networks and Monte-Carlo simulation can reduce computation time in comparison with straight Monte-Carlo simulation. A technique for security assessment employing Bayes classifier is also proposed. This method can be useful for system operators to make security decisions during on-line power system operation. This dissertation also suggests an approach for allocating transmission transaction costs based on reliability benefits in transmission services. The proposed method shows the transmission transaction cost of reliability benefits when transmission line capacities are considered. The ratio between allocation by transmission line capacity-use and allocation by reliability benefits is computed using the probability of system failure.
Fiber-optic security monitoring sensor
NASA Astrophysics Data System (ADS)
Englund, Marja; Ipatti, Ari; Karioja, Pentti
1997-09-01
In security monitoring, fiber-optic sensors are advantageous because strong and rugged optical fibers are thin, light, flexible and immune to electromagnetic interference. Optical fibers packaged into cables, such as, building and underground cables, can be used to detect even slightest disturbances, movements, vibrations, pressure changes and impacts along their entire length. When running an optical cable around a structure, and when using speckle pattern recognition technique for alarm monitoring, the distributed monitoring of the structure is possible. The sensing cable can be strung along fences, buried underground, embedded into concrete, mounted on walls, floors and ceilings, or wrapped around the specific components. In this paper, a fiber-optic security monitoring sensor based on speckle pattern monitoring is described. The description of the measuring method and the results of the experimental fiber installations are given. The applicability of embedded and surface mounted fibers to monitor the pressure and impact induced vibrations of fences and concrete structures as well as the loosening of critical parts in a power plant machinery were demonstrated in field and laboratory conditions. The experiences related to the applications and optical cable types are also discussed.
Fiber optic security monitoring sensor
NASA Astrophysics Data System (ADS)
Englund, Marja; Ipatti, Ari; Karioja, Pentti
1997-09-01
In security monitoring, fiber-optic sensors are advantageous because strong and rugged optical fibers are thin, light, flexible and immune to electromagnetic interference. Optical fibers packaged into cables, such as, building and underground cables, can be used to detect even slightest disturbances, movements, vibrations, pressure changes and impacts along their entire length. When running an optical cable around a structure, and when using speckle pattern recognition technique for alarm monitoring, the distributed monitoring of the structure is possible. The sensing cable can be strung along fences, buried underground, embedded into concrete, mounted on walls, floors and ceilings, or wrapped around the specific components. In this paper, a fiber-optic security monitoring sensor based on speckle pattern monitoring is described. The description of the measuring method and the results of the experimental fiber installations are given. The applicability of embedded and surface mounted fibers to monitor the pressure and impact induced vibrations of fences and concrete structures as well as the loosening of critical parts in a power plant machinery were demonstrated in field and laboratory conditions. The experiences related to the applications and optical cable types are also discussed.
Federation of UML models for cyber physical use cases
DOE Office of Scientific and Technical Information (OSTI.GOV)
This method employs the concept of federation, which is defined as the use of existing models that represent aspects of a system in specific domains (such as physical and cyber security domains) and building interfaces to link all of domain models. Federation seeks to build on existing bodies of work. Some examples include the Common Information Models (CIM) maintained by the International Electrotechnical Commission Technical Committee 57 (IEC TC 57) for the electric power industry. Another relevant model is the CIM maintained by the Distributed Management Task Force (DMTF)? this CIM defines a representation of the managed elements in anmore » Information Technology (IT) environment. The power system is an example of a cyber-physical system, where the cyber systems, consisting of computing infrastructure such as networks and devices, play a critical role in the operation of the underlying physical electricity delivery system. Measurements from remote field devices are relayed to control centers through computer networks, and the data is processed to determine suitable control actions. Control decisions are then relayed back to field devices. It has been observed that threat actors may be able to successfully compromise this cyber layer in order to impact power system operation. Therefore, future control center applications must be wary of potentially compromised measurements coming from field devices. In order to ensure the integrity of the field measurements, these applications could make use of compromise indicators from alternate sources of information such as cyber security. Thus, modern control applications may require access to data from sources that are not defined in the local information model. In such cases, software application interfaces will require integration of data objects from cross-domain data models. When incorporating or federating different domains, it is important to have subject matter experts work together, recognizing that not everyone has the same knowledge, responsibilities, focus, or skill set.« less
SAFETY AND SECURITY BUILDING, TRA614. FLOOR, ROOF, AND FOUNDATION PLANS. ...
SAFETY AND SECURITY BUILDING, TRA-614. FLOOR, ROOF, AND FOUNDATION PLANS. ROOM FUNCTIONS. DOOR AND ROOM FINISH SCHEDULE. BLAW-KNOX 3150-814-1, 3/1950. INL INDEX NO. 531-0614-00-098-100702, REV. 6. - Idaho National Engineering Laboratory, Test Reactor Area, Materials & Engineering Test Reactors, Scoville, Butte County, ID
Wireless structural monitoring for homeland security applications
NASA Astrophysics Data System (ADS)
Kiremidjian, Garo K.; Kiremidjian, Anne S.; Lynch, Jerome P.
2004-07-01
This paper addresses the development of a robust, low-cost, low power, and high performance autonomous wireless monitoring system for civil assets such as large facilities, new construction, bridges, dams, commercial buildings, etc. The role of the system is to identify the onset, development, location and severity of structural vulnerability and damage. The proposed system represents an enabling infrastructure for addressing structural vulnerabilities specifically associated with homeland security. The system concept is based on dense networks of "intelligent" wireless sensing units. The fundamental properties of a wireless sensing unit include: (a) interfaces to multiple sensors for measuring structural and environmental data (such as acceleration, displacements, pressure, strain, material degradation, temperature, gas agents, biological agents, humidity, corrosion, etc.); (b) processing of sensor data with embedded algorithms for assessing damage and environmental conditions; (c) peer-to-peer wireless communications for information exchange among units(thus enabling joint "intelligent" processing coordination) and storage of data and processed information in servers for information fusion; (d) ultra low power operation; (e) cost-effectiveness and compact size through the use of low-cost small-size off-the-shelf components. An integral component of the overall system concept is a decision support environment for interpretation and dissemination of information to various decision makers.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-18
... procedures, physical security plan, guard training and qualification plan, or cyber security plan for the... Power Plant Unit 1, Exemption From Certain Security Requirements 1.0 Background DTE Energy (DTE) is the... atmospheric pressure. In November 1972, the Power Reactor Development Company (PRDC), the licensee at that...
ToHajiilee Economic Development, Inc.(TEDI) Feasibility Study for Utility-Scale Solar
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burpo, Rob
2012-02-29
To Hajiilee Economic Development, Inc. (TEDI) is the economic development entity representing the ToHajiilee Chapter of the Navajo Nation, also known as the Caoncito Band of Navajo (CBN). Using DOE funding, TEDI assembled a team of qualified advisors to conduct a feasibility study for a utility-scale 30 MW Photovoltaic (PV) solar power generation facility on TEDI trust lands. The goal for this project has been to gather information and practical business commitments to successfully complete the feasibility analysis. The TEDI approach was to successively make informed decisions to select an appropriate technology best suited to the site, determine environmental viabilitymore » of the site, secure options for the sale of generated power, determine practicality of transmission and interconnection of power to the local grid, and secure preliminary commitments on project financing. The feasibility study has been completed and provides TEDI with a practical understanding of its business options in moving forward with developing a solar project on CBN tribal lands. Funding from DOE has allowed TEDI and its team of professional advisors to carefully select technology and business partners and build a business model to develop this utility-scale solar project. As a result of the positive feasibility findings, TEDI is moving forward with finalizing all pre-construction activities for its major renewable energy project.« less
24. CONTEXT VIEW OF BUILDING 220 (ENTRY CONTROL BUILDING) LOOKING ...
24. CONTEXT VIEW OF BUILDING 220 (ENTRY CONTROL BUILDING) LOOKING NORTH THROUGH SECURITY GATES. - Loring Air Force Base, Weapons Storage Area, Northeastern corner of base at northern end of Maine Road, Limestone, Aroostook County, ME
2015-07-09
Page ii GAO-15-700 Diplomatic Security Figure 2: Time Frames for Updates to Overseas Security Policy Board Residential Security...Standards since 2005 14 Abbreviations ARB Accountability Review Board DS Bureau of Diplomatic Security DS/C DS Directorate...Overseas Buildings Operations OSPB Overseas Security Policy Board RSO Regional Security Officer State Department of State This is a work of
How Homeland Security Affects Spatial Information
ERIC Educational Resources Information Center
Zellmer, Linda
2004-01-01
A recent article in Security-Focus described the fact that several U.S. government buildings in Washington DC could no longer be clearly seen by people using MapQuest's aerial photo database. In addition, the photos of these buildings were altered at the Web sites wherein they are posted at the request of the U.S. Secret Service. This is an…
Ferdinand, Jason
The concept of cyber resilience has emerged in recent years in response to the recognition that cyber security is more than just risk management. Cyber resilience is the goal of organisations, institutions and governments across the world and yet the emerging literature is somewhat fragmented due to the lack of a common approach to the subject. This limits the possibility of effective collaboration across public, private and governmental actors in their efforts to build and maintain cyber resilience. In response to this limitation, and to calls for a more strategically focused approach, this paper offers a knowledge-based view of cyber security management that explains how an organisation can build, assess, and maintain cyber resilience.
ADVANCED SEISMIC BASE ISOLATION METHODS FOR MODULAR REACTORS
DOE Office of Scientific and Technical Information (OSTI.GOV)
E. Blanford; E. Keldrauk; M. Laufer
2010-09-20
Advanced technologies for structural design and construction have the potential for major impact not only on nuclear power plant construction time and cost, but also on the design process and on the safety, security and reliability of next generation of nuclear power plants. In future Generation IV (Gen IV) reactors, structural and seismic design should be much more closely integrated with the design of nuclear and industrial safety systems, physical security systems, and international safeguards systems. Overall reliability will be increased, through the use of replaceable and modular equipment, and through design to facilitate on-line monitoring, in-service inspection, maintenance, replacement,more » and decommissioning. Economics will also receive high design priority, through integrated engineering efforts to optimize building arrangements to minimize building heights and footprints. Finally, the licensing approach will be transformed by becoming increasingly performance based and technology neutral, using best-estimate simulation methods with uncertainty and margin quantification. In this context, two structural engineering technologies, seismic base isolation and modular steel-plate/concrete composite structural walls, are investigated. These technologies have major potential to (1) enable standardized reactor designs to be deployed across a wider range of sites, (2) reduce the impact of uncertainties related to site-specific seismic conditions, and (3) alleviate reactor equipment qualification requirements. For Gen IV reactors the potential for deliberate crashes of large aircraft must also be considered in design. This report concludes that base-isolated structures should be decoupled from the reactor external event exclusion system. As an example, a scoping analysis is performed for a rectangular, decoupled external event shell designed as a grillage. This report also reviews modular construction technology, particularly steel-plate/concrete construction using factory prefabricated structural modules, for application to external event shell and base isolated structures.« less
Focusing America’s National Powers
2006-04-14
governments with market economies. 15. SUBJECT TERMS National Security, National Powers, Sources of Power, National Security Council, National Security... Strategy , Six-phased Campaign Plan, JIACG, DIME 16. SECURITY CLASSIFICATION OF: Unclassified 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME...satisfaction of the requirements of a Master of Science Degree in Joint Campaign Planning and Strategy . The contents of this paper reflect my own
BUILDING 122 CONTAINS THREE GENERAL AREAS: OFFICE AREAS, INTERNAL DOSIMETRY, ...
BUILDING 122 CONTAINS THREE GENERAL AREAS: OFFICE AREAS, INTERNAL DOSIMETRY, AND MEDICAL/HEALTH. BUILDING 122 SHARES A COMMON WALL WITH BUILDING 121, THE PLANT SECURITY BUILDING. THE TWO-STORY BUILDING IN THE BACKGROUND IS BUILDING 111. (9/26/52) - Rocky Flats Plant, Emergency Medical Services Facility, Southwest corner of Central & Third Avenues, Golden, Jefferson County, CO
75 FR 43609 - Agency Information Collection Activities: Emergency Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-26
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Emergency Request The Social Security Administration (SSA) publishes a list of information collection packages requiring...) Social Security Administration, DCBFM, Attn: Reports Clearance Officer, 1340 Annex Building, 6401...
78 FR 62931 - China Ritar Power Corp., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-22
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China Ritar Power Corp., Order of Suspension of Trading October 4, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China Ritar Power Corp. because China Ritar Power Corp. has not filed any periodic...
Data-Centric Situational Awareness and Management in Intelligent Power Systems
NASA Astrophysics Data System (ADS)
Dai, Xiaoxiao
The rapid development of technology and society has made the current power system a much more complicated system than ever. The request for big data based situation awareness and management becomes urgent today. In this dissertation, to respond to the grand challenge, two data-centric power system situation awareness and management approaches are proposed to address the security problems in the transmission/distribution grids and social benefits augmentation problem at the distribution-customer lever, respectively. To address the security problem in the transmission/distribution grids utilizing big data, the first approach provides a fault analysis solution based on characterization and analytics of the synchrophasor measurements. Specically, the optimal synchrophasor measurement devices selection algorithm (OSMDSA) and matching pursuit decomposition (MPD) based spatial-temporal synchrophasor data characterization method was developed to reduce data volume while preserving comprehensive information for the big data analyses. And the weighted Granger causality (WGC) method was investigated to conduct fault impact causal analysis during system disturbance for fault localization. Numerical results and comparison with other methods demonstrate the effectiveness and robustness of this analytic approach. As more social effects are becoming important considerations in power system management, the goal of situation awareness should be expanded to also include achievements in social benefits. The second approach investigates the concept and application of social energy upon the University of Denver campus grid to provide management improvement solutions for optimizing social cost. Social element--human working productivity cost, and economic element--electricity consumption cost, are both considered in the evaluation of overall social cost. Moreover, power system simulation, numerical experiments for smart building modeling, distribution level real-time pricing and social response to the pricing signals are studied for implementing the interactive artificial-physical management scheme.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-14
... title V of the Riegle Community Development and Regulatory Improvement Act,\\2\\ the National Flood... renewing a loan secured by a building or a mobile home located in a special flood hazard area to advise the... transferring a loan secured by a building or a mobile home located in a special flood hazard area to notify...
DOE Office of Scientific and Technical Information (OSTI.GOV)
O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.
The Secure Power Systems Professional Phase III final report was released last year which an appendix of Job Profiles. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.
Code of Federal Regulations, 2010 CFR
2010-04-01
...' Benefits SOCIAL SECURITY ADMINISTRATION TESTIMONY BY EMPLOYEES AND THE PRODUCTION OF RECORDS AND... Security Administration, 300 Altmeyer Building, 6401 Security Blvd., Baltimore, MD 21235-6401. ...
The Proposed 2009 War Powers Consultation Act
2009-03-19
both political branches of government participate in matters of national security. 15. SUBJECT TERMS Separation of Powers , National Security Law...Strategy Research Project DATE: 19 March 2009 WORD COUNT: 8,090 PAGES: 46 KEY TERMS: Separation of Powers , National Security Law, Constitution...Arthur Bestor, “ Separation of Powers in the Domain of Foreign Affairs: The Intent of the Constitution Historically Examined,” Seton Hall L. Rev. 5 (1974
University building safety index measurement using risk and implementation matrix
NASA Astrophysics Data System (ADS)
Rahman, A.; Arumsari, F.; Maryani, A.
2018-04-01
Many high rise building constructed in several universities in Indonesia. The high-rise building management must provide the safety planning and proper safety equipment in each part of the building. Unfortunately, most of the university in Indonesia have not been applying safety policy yet and less awareness on treating safety facilities. Several fire accidents in university showed that some significant risk should be managed by the building management. This research developed a framework for measuring the high rise building safety index in university The framework is not only assessed the risk magnitude but also designed modular building safety checklist for measuring the safety implementation level. The safety checklist has been developed for 8 types of the university rooms, i.e.: office, classroom, 4 type of laboratories, canteen, and library. University building safety index determined using risk-implementation matrix by measuring the risk magnitude and assessing the safety implementation level. Building Safety Index measurement has been applied in 4 high rise buildings in ITS Campus. The building assessment showed that the rectorate building in secure condition and chemical department building in beware condition. While the library and administration center building was in less secure condition.
NASA Astrophysics Data System (ADS)
Jiang, Huaiguang
With the evolution of energy and power systems, the emerging Smart Grid (SG) is mainly featured by distributed renewable energy generations, demand-response control and huge amount of heterogeneous data sources. Widely distributed synchrophasor sensors, such as phasor measurement units (PMUs) and fault disturbance recorders (FDRs), can record multi-modal signals, for power system situational awareness and renewable energy integration. An effective and economical approach is proposed for wide-area security assessment. This approach is based on wavelet analysis for detecting and locating the short-term and long-term faults in SG, using voltage signals collected by distributed synchrophasor sensors. A data-driven approach for fault detection, identification and location is proposed and studied. This approach is based on matching pursuit decomposition (MPD) using Gaussian atom dictionary, hidden Markov model (HMM) of real-time frequency and voltage variation features, and fault contour maps generated by machine learning algorithms in SG systems. In addition, considering the economic issues, the placement optimization of distributed synchrophasor sensors is studied to reduce the number of the sensors without affecting the accuracy and effectiveness of the proposed approach. Furthermore, because the natural hazards is a critical issue for power system security, this approach is studied under different types of faults caused by natural hazards. A fast steady-state approach is proposed for voltage security of power systems with a wind power plant connected. The impedance matrix can be calculated by the voltage and current information collected by the PMUs. Based on the impedance matrix, locations in SG can be identified, where cause the greatest impact on the voltage at the wind power plants point of interconnection. Furthermore, because this dynamic voltage security assessment method relies on time-domain simulations of faults at different locations, the proposed approach is feasible, convenient and effective. Conventionally, wind energy is highly location-dependent. Many desirable wind resources are located in rural areas without direct access to the transmission grid. By connecting MW-scale wind turbines or wind farms to the distributions system of SG, the cost of building long transmission facilities can be avoid and wind power supplied to consumers can be greatly increased. After the effective wide area monitoring (WAM) approach is built, an event-driven control strategy is proposed for renewable energy integration. This approach is based on support vector machine (SVM) predictor and multiple-input and multiple-output (MIMO) model predictive control (MPC) on linear time-invariant (LTI) and linear time-variant (LTV) systems. The voltage condition of the distribution system is predicted by the SVM classifier using synchrophasor measurement data. The controllers equipped with wind turbine generators are triggered by the prediction results. Both transmission level and distribution level are designed based on this proposed approach. Considering economic issues in the power system, a statistical scheduling approach to economic dispatch and energy reserves is proposed. The proposed approach focuses on minimizing the overall power operating cost with considerations of renewable energy uncertainty and power system security. The hybrid power system scheduling is formulated as a convex programming problem to minimize power operating cost, taking considerations of renewable energy generation, power generation-consumption balance and power system security. A genetic algorithm based approach is used for solving the minimization of the power operating cost. In addition, with technology development, it can be predicted that the renewable energy such as wind turbine generators and PV panels will be pervasively located in distribution systems. The distribution system is an unbalanced system, which contains single-phase, two-phase and three-phase loads, and distribution lines. The complex configuration brings a challenge to power flow calculation. A topology analysis based iterative approach is used to solve this problem. In this approach, a self-adaptive topology recognition method is used to analyze the distribution system, and the backward/forward sweep algorithm is used to generate the power flow results. Finally, for the numerical simulations, the IEEE 14-bus, 30-bus, 39-bus and 118-bus systems are studied for fault detection, identification and location. Both transmission level and distribution level models are employed with the proposed control strategy for voltage stability of renewable energy integration. The simulation results demonstrate the effectiveness of the proposed methods. The IEEE 24-bus reliability test system (IEEE-RTS), which is commonly used for evaluating the price stability and reliability of power system, is used as the test bench for verifying and evaluating system performance of the proposed scheduling approach.
NASA's Kilopower Reactor Development and the Path to Higher Power Missions
NASA Technical Reports Server (NTRS)
Gibson, Marc A.; Oleson, Steven R.; Poston, David I.; McClure, Patrick
2017-01-01
The development of NASAs Kilopower fission reactor is taking large strides toward flight development with several successful tests completed during its technology demonstration trials. The Kilopower reactors are designed to provide 1-10 kW of electrical power to a spacecraft which could be used for additional science instruments as well as the ability to power electric propulsion systems. Power rich nuclear missions have been excluded from NASA proposals because of the lack of radioisotope fuel and the absence of a flight qualified fission system. NASA has partnered with the Department of Energy's National Nuclear Security Administration to develop the Kilopower reactor using existing facilities and infrastructure to determine if the design is ready for flight development. The 3-year Kilopower project started in 2015 with a challenging goal of building and testing a full-scale flight prototypic nuclear reactor by the end of 2017. As the date approaches, the engineering team shares information on the progress of the technology as well as the enabling capabilities it provides for science and human exploration.
NASA's Kilopower Reactor Development and the Path to Higher Power Missions
NASA Technical Reports Server (NTRS)
Gibson, Marc A.; Oleson, Steven R.; Poston, Dave I.; McClure, Patrick
2017-01-01
The development of NASA's Kilopower fission reactor is taking large strides toward flight development with several successful tests completed during its technology demonstration trials. The Kilopower reactors are designed to provide 1-10 kW of electrical power to a spacecraft which could be used for additional science instruments as well as the ability to power electric propulsion systems. Power rich nuclear missions have been excluded from NASA proposals because of the lack of radioisotope fuel and the absence of a flight qualified fission system. NASA has partnered with the Department of Energy's National Nuclear Security Administration to develop the Kilopower reactor using existing facilities and infrastructure to determine if the design is ready for flight development. The 3-year Kilopower project started in 2015 with a challenging goal of building and testing a full-scale flight prototypic nuclear reactor by the end of 2017. As the date approaches, the engineering team shares information on the progress of the technology as well as the enabling capabilities it provides for science and human exploration.
Brief analysis of Jiangsu grid security and stability based on multi-infeed DC index in power system
NASA Astrophysics Data System (ADS)
Zhang, Wenjia; Wang, Quanquan; Ge, Yi; Huang, Junhui; Chen, Zhengfang
2018-02-01
The impact of Multi-infeed HVDC has gradually increased to security and stability operating in Jiangsu power grid. In this paper, an appraisal method of Multi-infeed HVDC power grid security and stability is raised with Multi-Infeed Effective Short Circuit Ratio, Multi-Infeed Interaction Factor and Commutation Failure Immunity Index. These indices are adopted in security and stability simulating calculation of Jiangsu Multi-infeed HVDC system. The simulation results indicate that Jiangsu power grid is operating with a strong DC system. It has high level of power grid security and stability, and meet the safety running requirements. Jinpin-Suzhou DC system is located in the receiving end with huge capacity, which is easily leading to commutation failure of the transmission line. In order to resolve this problem, dynamic reactive power compensation can be applied in power grid near Jinpin-Suzhou DC system. Simulation result shows this method is feasible to commutation failure.
35. SITE BUILDING 004 ELECTRIC POWER STATION CONTROL ...
35. SITE BUILDING 004 - ELECTRIC POWER STATION - CONTROL ROOM OF ELECTRIC POWER STATION WITH DIESEL ENGINE POWERED ELECTRIC GENERATION EQUIPMENT IN BACKGROUND. - Cape Cod Air Station, Technical Facility-Scanner Building & Power Plant, Massachusetts Military Reservation, Sandwich, Barnstable County, MA
Building Community Resilience to Disasters: A Way Forward to Enhance National Health Security.
Chandra, Anita; Acosta, Joie; Howard, Stefanie; Uscher-Pines, Lori; Williams, Malcolm; Yeung, Douglas; Garnett, Jeffrey; Meredith, Lisa S
2011-01-01
Community resilience, or the sustained ability of a community to withstand and recover from adversity, has become a key policy issue at federal, state, and local levels, including in the National Health Security Strategy. Because resources are limited in the wake of an emergency, it is increasingly recognized that resilience is critical to a community's ability to reduce long recovery periods after an emergency. This article shares details of a report that provides a roadmap for federal, state, and local leaders who are developing plans to enhance community resilience for health security threats and describes options for building community resilience in key areas. Based on findings from a literature review and a series of community and regional focus groups, the authors provide a definition of community resilience in the context of national health security and a set of eight levers and five core components for building resilience. They then describe suggested activities that communities are pursuing and may want to strengthen for community resilience, and they identify challenges to implementation.
DOE Office of Scientific and Technical Information (OSTI.GOV)
LeMar, P.
Integrated Energy Systems (IES) combine on-site power or distributed generation technologies with thermally activated technologies to provide cooling, heating, humidity control, energy storage and/or other process functions using thermal energy normally wasted in the production of electricity/power. IES produce electricity and byproduct thermal energy onsite, with the potential of converting 80 percent or more of the fuel into useable energy. IES have the potential to offer the nation the benefits of unprecedented energy efficiency gains, consumer choice and energy security. It may also dramatically reduce industrial and commercial building sector carbon and air pollutant emissions and increase source energy efficiency.more » Applications of distributed energy and Combined heat and power (CHP) in ''Commercial and Institutional Buildings'' have, however, been historically limited due to insufficient use of byproduct thermal energy, particularly during summer months when heating is at a minimum. In recent years, custom engineered systems have evolved incorporating potentially high-value services from Thermally Activated Technologies (TAT) like cooling and humidity control. Such TAT equipment can be integrated into a CHP system to utilize the byproduct heat output effectively to provide absorption cooling or desiccant humidity control for the building during these summer months. IES can therefore expand the potential thermal energy services and thereby extend the conventional CHP market into building sector applications that could not be economically served by CHP alone. Now more than ever, these combined cooling, heating and humidity control systems (IES) can potentially decrease carbon and air pollutant emissions, while improving source energy efficiency in the buildings sector. Even with these improvements over conventional CHP systems, IES face significant technological and economic hurdles. Of crucial importance to the success of IES is the ability to treat the heating, ventilation, air conditioning, water heating, lighting, and power systems loads as parts of an integrated system, serving the majority of these loads either directly or indirectly from the CHP output. The CHP Technology Roadmaps (Buildings and Industry) have focused research and development on a comprehensive integration approach: component integration, equipment integration, packaged and modular system development, system integration with the grid, and system integration with building and process loads. This marked change in technology research and development has led to the creation of a new acronym to better reflect the nature of development in this important area of energy efficiency: Integrated Energy Systems (IES). Throughout this report, the terms ''CHP'' and ''IES'' will sometimes be used interchangeably, with CHP generally reserved for the electricity and heat generating technology subsystem portion of an IES. The focus of this study is to examine the potential for IES in buildings when the system perspective is taken, and the IES is employed as a dynamic system, not just as conventional CHP. This effort is designed to determine market potential by analyzing IES performance on an hour-by-hour basis, examining the full range of building types, their loads and timing, and assessing how these loads can be technically and economically met by IES.« less
Building-in-Briefcase: A Rapidly-Deployable Environmental Sensor Suite for the Smart Building.
Weekly, Kevin; Jin, Ming; Zou, Han; Hsu, Christopher; Soyza, Chris; Bayen, Alexandre; Spanos, Costas
2018-04-29
A building’s environment has profound influence on occupant comfort and health. Continuous monitoring of building occupancy and environment is essential to fault detection, intelligent control, and building commissioning. Though many solutions for environmental measuring based on wireless sensor networks exist, they are not easily accessible to households and building owners who may lack time or technical expertise needed to set up a system and get quick and detailed overview of environmental conditions. Building-in-Briefcase (BiB) is a portable sensor network platform that is trivially easy to deploy in any building environment. Once the sensors are distributed, the environmental data is collected and communicated to the BiB router via the Transmission Control Protocol/Internet Protocol (TCP/IP) and WiFi technology, which then forwards the data to the central database securely over the internet through a 3G radio. The user, with minimal effort, can access the aggregated data and visualize the trends in real time on the BiB web portal. Paramount to the adoption and continued operation of an indoor sensing platform is battery lifetime. This design has achieved a multi-year lifespan by careful selection of components, an efficient binary communications protocol and data compression. Our BiB sensor is capable of collecting a rich set of environmental parameters, and is expandable to measure others, such as CO 2 . This paper describes the power characteristics of BiB sensors and their occupancy estimation and activity recognition functionality. We have demonstrated large-scale deployment of BiB throughout Singapore. Our vision is that, by monitoring thousands of buildings through BiB, it would provide ample research opportunities and opportunities to identify ways to improve the building environment and energy efficiency.
Protecting and securing networked medical devices.
Riha, Chris
2004-01-01
Designing, building, and maintaining a secure environment for medical devices is a critical component in health care technology management. This article will address several avenues to harden a health care information network to provide a secure enclave for medical devices.
77 FR 58903 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-24
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection... . (SSA), Social Security Administration, DCRDP, Attn: Reports Clearance Director, 107 Altmeyer Building...
78 FR 22935 - Agency Information Collection Activities; Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-17
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities; Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection... . (SSA) Social Security Administration, DCRDP, Attn: Reports Clearance Director, 107 Altmeyer Building...
77 FR 37728 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-22
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...), Social Security Administration, DCRDP, Attn: Reports Clearance Director, 107 Altmeyer Building, 6401...
CMOS-compatible photonic devices for single-photon generation
NASA Astrophysics Data System (ADS)
Xiong, Chunle; Bell, Bryn; Eggleton, Benjamin J.
2016-09-01
Sources of single photons are one of the key building blocks for quantum photonic technologies such as quantum secure communication and powerful quantum computing. To bring the proof-of-principle demonstration of these technologies from the laboratory to the real world, complementary metal-oxide-semiconductor (CMOS)-compatible photonic chips are highly desirable for photon generation, manipulation, processing and even detection because of their compactness, scalability, robustness, and the potential for integration with electronics. In this paper, we review the development of photonic devices made from materials (e.g., silicon) and processes that are compatible with CMOS fabrication facilities for the generation of single photons.
7 CFR 1717.857 - Refinancing of existing secured debt-distribution and power supply borrowers.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 11 2011-01-01 2011-01-01 false Refinancing of existing secured debt-distribution and power supply borrowers. 1717.857 Section 1717.857 Agriculture Regulations of the Department of... Private Financing § 1717.857 Refinancing of existing secured debt—distribution and power supply borrowers...
18 CFR 1314.6 - Obligations of TVA.
Code of Federal Regulations, 2011 CFR
2011-04-01
... PROCEDURES FOR TVA POWER SECURITIES ISSUED THROUGH THE FEDERAL RESERVE BANKS § 1314.6 Obligations of TVA. (a... or disposition of a Book-entry TVA Power Security by a Reserve Bank pursuant to a transfer message... Participant. (2) Book-entry TVA Power Securities are redeemed in accordance with their terms by a Reserve Bank...
33 CFR 165.115 - Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts. 165.115 Section 165.115 Navigation and Navigable... Coast Guard District § 165.115 Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth...
33 CFR 165.115 - Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts. 165.115 Section 165.115 Navigation and Navigable... Coast Guard District § 165.115 Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth...
33 CFR 165.115 - Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts. 165.115 Section 165.115 Navigation and Navigable... Coast Guard District § 165.115 Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth...
33 CFR 165.115 - Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts. 165.115 Section 165.115 Navigation and Navigable... Coast Guard District § 165.115 Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth...
33 CFR 165.115 - Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts. 165.115 Section 165.115 Navigation and Navigable... Coast Guard District § 165.115 Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth...
27 CFR 19.271 - Construction of buildings
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Construction of buildings..., DEPARTMENT OF THE TREASURY LIQUORS DISTILLED SPIRITS PLANTS Construction, Equipment and Security § 19.271 Construction of buildings Buildings in which spirits, denatured spirits, articles, or wines are produced...
Bourdeaux, Margaret; Kerry, Vanessa; Haggenmiller, Christian; Nickel, Karlheinz
2015-01-01
Destruction of health systems in fragile and conflict-affected states increases civilian mortality. Despite the size, scope, scale and political influence of international security forces intervening in fragile states, little attention has been paid to array of ways they may impact health systems beyond their effects on short-term humanitarian health aid delivery. Using case studies we published on international security forces' impacts on health systems in Haiti, Kosovo, Afghanistan and Libya, we conducted a comparative analysis that examined three questions: What aspects, or building blocks, of health systems did security forces impact across the cases and what was the nature of these impacts? What forums or mechanisms did international security forces use to interact with health system actors? What policies facilitated or hindered security forces from supporting health systems? We found international security forces impacted health system governance, information systems and indigenous health delivery organizations. Positive impacts included bolstering the authority, transparency and capability of health system leadership. Negative impacts included undermining the impartial nature of indigenous health institutions by using health projects to achieve security objectives. Interactions between security and health actors were primarily ad hoc, often to the detriment of health system support efforts. When international security forces were engaged in health system support activities, the most helpful communication and consultative mechanisms to manage their involvement were ones that could address a wide array of problems, were nimble enough to accommodate rapidly changing circumstances, leveraged the power of personal relationships, and were able to address the tensions that arose between security and health system supporting strategies. Policy barriers to international security organizations participating in health system support included lack of mandate, conflicts between security strategies and health system preservation, and lack of interoperability between security and indigenous health organizations with respect to logistics and sharing information. The cases demonstrate both the opportunities and risks of international security organizations involvement in health sector protection, recovery and reconstruction. We discuss two potential approaches to engaging these organizations in health system support that may increase the chances of realizing these opportunities while mitigating risks.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 7 2014-10-01 2014-10-01 false Authority for one-step turn-key design-build contracting for the United States Coast Guard (USCG). 3036.104-90 Section 3036.104-90 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) SPECIAL CATEGORIES OF...
19. VIEW OF INTERIOR OF BUILDING 220 SECOND FLOOR, FROM ...
19. VIEW OF INTERIOR OF BUILDING 220 SECOND FLOOR, FROM THE FEMALE MEDIUM SECURITY AREA FACING THE FEMALE MEDIUM SECURITY SLEEPING AREA. THE FEMALE CELL BLOCK DOOR IN SHOWN ON THE RIGHT OF PHOTO. THE SLEEPING AREA IS IN THE CENTER OF PHOTO. - U.S. Naval Base, Pearl Harbor, Brig, Neville Way near Ninth Street at Marine Barracks, Pearl City, Honolulu County, HI
A&M. Radioactive parts security storage warehouses: TAN648 on left, and ...
A&M. Radioactive parts security storage warehouses: TAN-648 on left, and dolly storage building, TAN-647, on right. Camera facing south. This was the front entry for the warehouse and the rear of the dolly storage building. Date: August 6, 2003. INEEL negative no. HD-36-2-2 - Idaho National Engineering Laboratory, Test Area North, Scoville, Butte County, ID
Security Assistance Dependence - Wielding American Power
2002-12-09
national security objectives. One vehicle of this power brokering is the well-developed international security assistance program – oftentimes...incorrectly referred to exclusively as foreign military sales. There is nothing simple about the security assistance program as it has developed today...For the USG, there are many agencies influencing today’s security assistance program to execute complex, integrated tasks directly impacting U.S
DOE Office of Scientific and Technical Information (OSTI.GOV)
Happenny, Sean F.
The United States’ power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power distribution networks utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Demonstrating security in embedded systems is another research area PNNL ismore » tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the networks protecting them are becoming easier to breach. Providing a virtual power substation network to each student team at the National Collegiate Cyber Defense Competition, thereby supporting the education of future cyber security professionals, is another way PNNL is helping to strengthen the security of the nation’s power infrastructure.« less
Increasing the resilience and security of the United States' power infrastructure
DOE Office of Scientific and Technical Information (OSTI.GOV)
Happenny, Sean F.
2015-08-01
The United States' power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power infrastructure control and distribution paradigms by utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Understanding how these systems behave in real-worldmore » conditions will lead to new ways to make our power infrastructure more resilient and secure. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the aging networks protecting them are becoming easier to attack.« less
18 CFR 3a.51 - Designation of security officers.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 18 Conservation of Power and Water Resources 1 2013-04-01 2013-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...
18 CFR 3a.51 - Designation of security officers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...
18 CFR 3a.51 - Designation of security officers.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...
18 CFR 3a.51 - Designation of security officers.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 18 Conservation of Power and Water Resources 1 2014-04-01 2014-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...
The security energy encryption in wireless power transfer
NASA Astrophysics Data System (ADS)
Sadzali, M. N.; Ali, A.; Azizan, M. M.; Albreem, M. A. M.
2017-09-01
This paper presents a concept of security in wireless power transfer (WPT) by applying chaos theory. Chaos theory is applied as a security system in order to safeguard the transfer of energy from a transmitter to the intended receiver. The energy encryption of the wireless power transfer utilizes chaos theory to generate the possibility of a logistic map for the chaotic security key. The simulation for energy encryption wireless power transfer system was conducted by using MATLAB and Simulink. By employing chaos theory, the chaotic key ensures the transmission of energy from transmitter to its intended receiver.
ERIC Educational Resources Information Center
Bracy, Nicole L.
2009-01-01
Public schools have transformed significantly over the past several decades in response to broad concerns about rising school violence. Today's public schools are high security environments employing tactics commonly found in jails and prisons such as police officers, security cameras, identification systems, and secure building strategies.…
Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community
2012-01-13
unintrusive solutions that boost security. For example, gamers are even buying hardware tokens to protect their World of Warcraft accounts [5]. Build...security technology. http://www. vmware.com/technology/security/vmsafe.html. [4] VNC. http://en.wikipedia.org/wiki/VNC. [5] World of warcraft to sell
Building Assured Systems Framework
2010-09-01
of standards such as ISO 27001 as frameworks [NASCIO 2009]. In this context, a framework is a standard intended to assist in auditing and compliance...Information Security ISO /IEC 27004 Information technology – Security techniques - Information security management measurement ISO /IEC 15939, System and
Calibrating Parameters of Power System Stability Models using Advanced Ensemble Kalman Filter
DOE Office of Scientific and Technical Information (OSTI.GOV)
Huang, Renke; Diao, Ruisheng; Li, Yuanyuan
With the ever increasing penetration of renewable energy, smart loads, energy storage, and new market behavior, today’s power grid becomes more dynamic and stochastic, which may invalidate traditional study assumptions and pose great operational challenges. Thus, it is of critical importance to maintain good-quality models for secure and economic planning and real-time operation. Following the 1996 Western Systems Coordinating Council (WSCC) system blackout, North American Electric Reliability Corporation (NERC) and Western Electricity Coordinating Council (WECC) in North America enforced a number of policies and standards to guide the power industry to periodically validate power grid models and calibrate poor parametersmore » with the goal of building sufficient confidence in model quality. The PMU-based approach using online measurements without interfering with the operation of generators provides a low-cost alternative to meet NERC standards. This paper presents an innovative procedure and tool suites to validate and calibrate models based on a trajectory sensitivity analysis method and an advanced ensemble Kalman filter algorithm. The developed prototype demonstrates excellent performance in identifying and calibrating bad parameters of a realistic hydro power plant against multiple system events.« less
Blue steps Blue steps Indoor Environment Department Advice for Safeguarding Buildings Against Chemical building operators. It contains our current advice for dealing with a biological or chemical release in a protecting buildings and occupants from chemical or biological attack. Click on the title bar, above, for
Protecting Buildings from People
ERIC Educational Resources Information Center
Progressive Architecture, 1978
1978-01-01
Security in buildings ranges from simple locks to elaborate electronic systems. Most buildings do not need the level of sophistication it is possible to achieve. A survey of these products, however, is appropriate to appreciate their potential and variety. (Author/MLF)
DOE Office of Scientific and Technical Information (OSTI.GOV)
O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.
The Secure Power Systems Professional Phase III final report was released last year which an appendix of Behavioral Interview Guidelines by Job Roles. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.
33 CFR 165.106 - Security Zone: Seabrook Nuclear Power Plant, Seabrook, New Hampshire.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security Zone: Seabrook Nuclear... Guard District § 165.106 Security Zone: Seabrook Nuclear Power Plant, Seabrook, New Hampshire. (a... property boundary of Seabrook Nuclear Power Plant identified as follows: beginning at position 42°53′58″ N...
33 CFR 165.106 - Security Zone: Seabrook Nuclear Power Plant, Seabrook, New Hampshire.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Security Zone: Seabrook Nuclear... Guard District § 165.106 Security Zone: Seabrook Nuclear Power Plant, Seabrook, New Hampshire. (a... property boundary of Seabrook Nuclear Power Plant identified as follows: beginning at position 42°53′58″ N...
33 CFR 165.106 - Security Zone: Seabrook Nuclear Power Plant, Seabrook, New Hampshire.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Security Zone: Seabrook Nuclear... Guard District § 165.106 Security Zone: Seabrook Nuclear Power Plant, Seabrook, New Hampshire. (a... property boundary of Seabrook Nuclear Power Plant identified as follows: beginning at position 42°53′58″ N...
33 CFR 165.106 - Security Zone: Seabrook Nuclear Power Plant, Seabrook, New Hampshire.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Security Zone: Seabrook Nuclear... Guard District § 165.106 Security Zone: Seabrook Nuclear Power Plant, Seabrook, New Hampshire. (a... property boundary of Seabrook Nuclear Power Plant identified as follows: beginning at position 42°53′58″ N...
33 CFR 165.106 - Security Zone: Seabrook Nuclear Power Plant, Seabrook, New Hampshire.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone: Seabrook Nuclear... Guard District § 165.106 Security Zone: Seabrook Nuclear Power Plant, Seabrook, New Hampshire. (a... property boundary of Seabrook Nuclear Power Plant identified as follows: beginning at position 42°53′58″ N...
DOE Office of Scientific and Technical Information (OSTI.GOV)
O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.
The Secure Power Systems Professional Phase III final report was released last year which an appendix of Individual and Team Performance Guidelines. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.
NASA Astrophysics Data System (ADS)
Pettit, Sandra L.
Designing and constructing safe, secure and cost-effective buildings has always been the goal of architects, engineers, developers and community officials. However, in light of recent tragic events, urban security design has become a major concern for both public and private building owners as the threat of terrorism attacks becomes more evident. Modern research and technology have provided a means to counter some of these threats, but there is little doubt that the need for physical security design will continue to increase as long as there are conflicting social, religious, and political agendas in the world. Parallel to this trend, the desire for aesthetically pleasing structures and architecture which pushes the envelope of typical building design make designing a secure, blast and fire resistant building a challenge, as many protective measures clash with the desires of architects. As a result, development of construction materials and technologies with respect to security is on the rise and there is a need for comprehensive solutions. Research into the behavior of stainless steel may prove it to be an elegant and efficient solution to a secure structural design which does not compromise a building's architecture. As a material that is often chosen for its aesthetic appeal, it also exhibits excellent ductility and high stress-strain rates, allowing it to absorb large amounts of energy from blasts before fracturing, compared to carbon steel. Stainless steel also exhibits superior fire-resisting qualities and can perform similarly to carbon steels without unsightly added fire protection. Using stainless steel for elements which have been identified as vulnerable to attack, such as a major column or transfer girder, or elements which can protect the rest of structure from a blast, such as a blast wall, can be an efficient component of a comprehensive urban security design. The challenges associated with the use of stainless steel, which has kept its use in structural design to a minimum, such as higher costs, availability, or special welding procedures, are minimal and will be easily overcome as the use of stainless steel in structure increases and designers and fabricators become more familiar with the material.
NASA Astrophysics Data System (ADS)
Wang, Yu-Wei; Tesdahl, Curtis; Owens, Jim; Dorn, David
2012-06-01
Advancements in uncooled microbolometer technology over the last several years have opened up many commercial applications which had been previously cost prohibitive. Thermal technology is no longer limited to the military and government market segments. One type of thermal sensor with low NETD which is available in the commercial market segment is the uncooled amorphous silicon (α-Si) microbolometer image sensor. Typical thermal security cameras focus on providing the best image quality by auto tonemaping (contrast enhancing) the image, which provides the best contrast depending on the temperature range of the scene. While this may provide enough information to detect objects and activities, there are further benefits of being able to estimate the actual object temperatures in a scene. This thermographic ability can provide functionality beyond typical security cameras by being able to monitor processes. Example applications of thermography[2] with thermal camera include: monitoring electrical circuits, industrial machinery, building thermal leaks, oil/gas pipelines, power substations, etc...[3][5] This paper discusses the methodology of estimating object temperatures by characterizing/calibrating different components inside a thermal camera utilizing an uncooled amorphous silicon microbolometer image sensor. Plots of system performance across camera operating temperatures will be shown.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kumar, Dinesh; Thapliyal, Himanshu; Mohammad, Azhar
Differential Power Analysis (DPA) attack is considered to be a main threat while designing cryptographic processors. In cryptographic algorithms like DES and AES, S-Box is used to indeterminate the relationship between the keys and the cipher texts. However, S-box is prone to DPA attack due to its high power consumption. In this paper, we are implementing an energy-efficient 8-bit S-Box circuit using our proposed Symmetric Pass Gate Adiabatic Logic (SPGAL). SPGAL is energy-efficient as compared to the existing DPAresistant adiabatic and non-adiabatic logic families. SPGAL is energy-efficient due to reduction of non-adiabatic loss during the evaluate phase of the outputs.more » Further, the S-Box circuit implemented using SPGAL is resistant to DPA attacks. The results are verified through SPICE simulations in 180nm technology. SPICE simulations show that the SPGAL based S-Box circuit saves upto 92% and 67% of energy as compared to the conventional CMOS and Secured Quasi-Adiabatic Logic (SQAL) based S-Box circuit. From the simulation results, it is evident that the SPGAL based circuits are energy-efficient as compared to the existing DPAresistant adiabatic and non-adiabatic logic families. In nutshell, SPGAL based gates can be used to build secure hardware for lowpower portable electronic devices and Internet-of-Things (IoT) based electronic devices.« less
36. SITE BUILDING 004 ELECTRIC POWER STATION CLOSE ...
36. SITE BUILDING 004 - ELECTRIC POWER STATION - CLOSE UP VIEW OF 1200 HORSEPOWER STANDBY POWER DIESEL ENGINE/GENERATOR SETS. - Cape Cod Air Station, Technical Facility-Scanner Building & Power Plant, Massachusetts Military Reservation, Sandwich, Barnstable County, MA
37. SITE BUILDING 004 ELECTRIC POWER STATION ELEVATED ...
37. SITE BUILDING 004 - ELECTRIC POWER STATION - ELEVATED VIEW OF FIVE (5) 1200 HORSEPOWER STANDBY - POWER DIESEL ENGINE/GENERATOR SETS. - Cape Cod Air Station, Technical Facility-Scanner Building & Power Plant, Massachusetts Military Reservation, Sandwich, Barnstable County, MA
Power system security enhancement through direct non-disruptive load control
NASA Astrophysics Data System (ADS)
Ramanathan, Badri Narayanan
The transition to a competitive market structure raises significant concerns regarding reliability of the power grid. A need to build tools for security assessment that produce operating limit boundaries for both static and dynamic contingencies is recognized. Besides, an increase in overall uncertainty in operating conditions makes corrective actions at times ineffective leaving the system vulnerable to instability. The tools that are in place for stability enhancement are mostly corrective and suffer from lack of robustness to operating condition changes. They often pose serious coordination challenges. With deregulation, there have also been ownership and responsibility issues associated with stability controls. However, the changing utility business model and the developments in enabling technologies such as two-way communication, metering, and control open up several new possibilities for power system security enhancement. This research proposes preventive modulation of selected loads through direct control for power system security enhancement. Two main contributions of this research are the following: development of an analysis framework and two conceptually different analysis approaches for load modulation to enhance oscillatory stability, and the development and study of algorithms for real-time modulation of thermostatic loads. The underlying analysis framework is based on the Structured Singular Value (SSV or mu) theory. Based on the above framework, two fundamentally different approaches towards analysis of the amount of load modulation for desired stability performance have been developed. Both the approaches have been tested on two different test systems: CIGRE Nordic test system and an equivalent of the Western Electric Coordinating Council test system. This research also develops algorithms for real-time modulation of thermostatic loads that use the results of the analysis. In line with some recent load management programs executed by utilities, two different algorithms based on dynamic programming are proposed for air-conditioner loads, while a decision-tree based algorithm is proposed for water-heater loads. An optimization framework has been developed employing the above algorithms. Monte Carlo simulations have been performed using this framework with the objective of studying the impact of different parameters and constraints on the effectiveness as well as the effect of control. The conclusions drawn from this research strongly advocate direct load control for stability enhancement from the perspectives of robustness and coordination, as well as economic viability and the developments towards availability of the institutional framework for load participation in providing system reliability services.
Building-in-Briefcase: A Rapidly-Deployable Environmental Sensor Suite for the Smart Building
Weekly, Kevin; Jin, Ming; Zou, Han; Hsu, Christopher; Soyza, Chris; Bayen, Alexandre; Spanos, Costas
2018-01-01
A building’s environment has profound influence on occupant comfort and health. Continuous monitoring of building occupancy and environment is essential to fault detection, intelligent control, and building commissioning. Though many solutions for environmental measuring based on wireless sensor networks exist, they are not easily accessible to households and building owners who may lack time or technical expertise needed to set up a system and get quick and detailed overview of environmental conditions. Building-in-Briefcase (BiB) is a portable sensor network platform that is trivially easy to deploy in any building environment. Once the sensors are distributed, the environmental data is collected and communicated to the BiB router via the Transmission Control Protocol/Internet Protocol (TCP/IP) and WiFi technology, which then forwards the data to the central database securely over the internet through a 3G radio. The user, with minimal effort, can access the aggregated data and visualize the trends in real time on the BiB web portal. Paramount to the adoption and continued operation of an indoor sensing platform is battery lifetime. This design has achieved a multi-year lifespan by careful selection of components, an efficient binary communications protocol and data compression. Our BiB sensor is capable of collecting a rich set of environmental parameters, and is expandable to measure others, such as CO2. This paper describes the power characteristics of BiB sensors and their occupancy estimation and activity recognition functionality. We have demonstrated large-scale deployment of BiB throughout Singapore. Our vision is that, by monitoring thousands of buildings through BiB, it would provide ample research opportunities and opportunities to identify ways to improve the building environment and energy efficiency. PMID:29710839
ERIC Educational Resources Information Center
Sturgeon, Julie
2002-01-01
Explains why campus security officials consider locker rooms and restrooms the bane of their jobs, and offers a formula for protecting property and privacy at the same time: first secure the entire building, then zero in on specifics. Describes various security options for these campus areas. (EV)
The Security Factor in School Renovations.
ERIC Educational Resources Information Center
Fickes, Michael
1998-01-01
Discusses how one Indiana high school used its renovation as an opportunity to reevaluate the school's security design. Security considerations in the building's external and internal environment include lighting, directional signage, parking, access control technology, and issues regarding the use of closed circuit television. (GR)
What Are the Security Threats to Further Development of Nuclear Power Plants in the U.S.
2010-03-01
as-a-secure- fuel -alternative &catid=94:0409content&itemid=342. (accessed May 2009). Bush, President George W. “Expand the Circle of Development by...SECURITY THREATS TO FURTHER DEVELOPMENT OF NUCLEAR POWER PLANTS IN THE U.S.? by Tammie L. Nottestad March 2010 Thesis Advisor: Robert Looney...Master’s Thesis 4. TITLE AND SUBTITLE What Are the Security Threats to Further Development of Nuclear Power Plants in the U.S.? 6. AUTHOR(S
Organizational Culture for Safety, Security, and Safeguards in New Nuclear Power Countries
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kovacic, Donald N
2015-01-01
This chapter will contain the following sections: Existing international norms and standards for developing the infrastructure to support new nuclear power programs The role of organizational culture and how it supports the safe, secure, and peaceful application of nuclear power Identifying effective and efficient strategies for implementing safety, security and safeguards in nuclear operations Challenges identified in the implementation of safety, security and safeguards Potential areas for future collaboration between countries in order to support nonproliferation culture
1. VIEW, LOOKING SOUTH, OF THE NORTH ELEVATION OF BUILDING ...
1. VIEW, LOOKING SOUTH, OF THE NORTH ELEVATION OF BUILDING 888. BUILDING 888 IS ONE OF SEVEN GUARDHOUSES USED TO CONTROL ACCESS TO DESIGNATED SECURITY AREAS WITHIN THE INDUSTRIAL AREA. - Rocky Flats Plant, Guardhouse, Northwest of Building 886, south of Central Avenue, Golden, Jefferson County, CO
Ontology for Life-Cycle Modeling of Electrical Distribution Systems: Model View Definition
2013-06-01
building information models ( BIM ) at the coordinated design stage of building construction. 1.3 Approach To...standard for exchanging Building Information Modeling ( BIM ) data, which defines hundreds of classes for common use in software, currently supported by...specifications, Construction Operations Building in- formation exchange (COBie), Building Information Modeling ( BIM ) 16. SECURITY CLASSIFICATION OF:
77 FR 13114 - Combined Notice of Filings #1
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-05
... following electric securities filings: Docket Numbers: ES12-23-000 Applicants: Wolverine Power Supply... and the Issuance of Securities under Section 204 of the Federal Power Act of Wolverine Power Supply... Power Pool, Inc. Description: 1166R15 Oklahoma Municipal Power Authority NITSA NOA to be effective 2/1...
2009-11-01
Amb G (Ambassador-Italy)10. Mrs. G (ISAF Political Advisor)11. Amb K (Amb-Japan)12. Mr. K (ISAF PolAd)13. Mrs. M (Chargé-Netherlands)14. Mr. M ...DCM-Japan)15. BG M (Senior Military Advisor-Finland)16. Amb N (Amb-UK)17. Mr. S (DCM-Germany)18. Lt Col S (MilAd-GE)19. Amb T (Donor Asst-U.S...Building, Year One: From Bonn to Kabul.” Antonio Donini , Norah Niland, and Karin Wermester, eds., Nation Building Unraveled, pp. 39-60. Bloomfield, CT
NASA Astrophysics Data System (ADS)
Major, Maciej; Kosiń, Mariusz
2017-12-01
The paper analyses the effect of steel framing used to secure drywall panels on thermal and humidity properties of outer walls. In the practice of building a light structure, the most popular components are steel and wood studs. They are used to obtain framing for building a wall (an outer wall in this study). Analysis presented in this study concerned the corner of the outer wall build using the technology of light steel framing. Computer simulation was used to perform thermal and humidity analysis for the joint of the outer wall.
8. DETAIL OF FOLDING DOORS ON NORTH ELEVATION OF BUILDING ...
8. DETAIL OF FOLDING DOORS ON NORTH ELEVATION OF BUILDING 8965 (SECURITY POLICE ENTRY CONTROL BUILDING). - Loring Air Force Base, Alert Area, Southeastern portion of base, east of southern end of runway, Limestone, Aroostook County, ME
USING TIME VARIANT VOLTAGE TO CALCULATE ENERGY CONSUMPTION AND POWER USE OF BUILDING SYSTEMS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Makhmalbaf, Atefe; Augenbroe , Godfried
2015-12-09
Buildings are the main consumers of electricity across the world. However, in the research and studies related to building performance assessment, the focus has been on evaluating the energy efficiency of buildings whereas the instantaneous power efficiency has been overlooked as an important aspect of total energy consumption. As a result, we never developed adequate models that capture both thermal and electrical characteristics (e.g., voltage) of building systems to assess the impact of variations in the power system and emerging technologies of the smart grid on buildings energy and power performance and vice versa. This paper argues that the powermore » performance of buildings as a function of electrical parameters should be evaluated in addition to systems’ mechanical and thermal behavior. The main advantage of capturing electrical behavior of building load is to better understand instantaneous power consumption and more importantly to control it. Voltage is one of the electrical parameters that can be used to describe load. Hence, voltage dependent power models are constructed in this work and they are coupled with existing thermal energy models. Lack of models that describe electrical behavior of systems also adds to the uncertainty of energy consumption calculations carried out in building energy simulation tools such as EnergyPlus, a common building energy modeling and simulation tool. To integrate voltage-dependent power models with thermal models, the thermal cycle (operation mode) of each system was fed into the voltage-based electrical model. Energy consumption of systems used in this study were simulated using EnergyPlus. Simulated results were then compared with estimated and measured power data. The mean square error (MSE) between simulated, estimated, and measured values were calculated. Results indicate that estimated power has lower MSE when compared with measured data than simulated results. Results discussed in this paper will illustrate the significance of enhancing building energy models with electrical characteristics. This would support different studies such as those related to modernization of the power system that require micro scale building-grid interaction, evaluating building energy efficiency with power efficiency considerations, and also design and control decisions that rely on accuracy of building energy simulation results.« less
Report #12-P-0879, September 26, 2012. The security posture and in-place environmental control review of the computer rooms in the Ariel Rios and Potomac Yard buildings revealed numerous security and environmental control deficiencies.
Integrated homeland security system with passive thermal imaging and advanced video analytics
NASA Astrophysics Data System (ADS)
Francisco, Glen; Tillman, Jennifer; Hanna, Keith; Heubusch, Jeff; Ayers, Robert
2007-04-01
A complete detection, management, and control security system is absolutely essential to preempting criminal and terrorist assaults on key assets and critical infrastructure. According to Tom Ridge, former Secretary of the US Department of Homeland Security, "Voluntary efforts alone are not sufficient to provide the level of assurance Americans deserve and they must take steps to improve security." Further, it is expected that Congress will mandate private sector investment of over $20 billion in infrastructure protection between 2007 and 2015, which is incremental to funds currently being allocated to key sites by the department of Homeland Security. Nearly 500,000 individual sites have been identified by the US Department of Homeland Security as critical infrastructure sites that would suffer severe and extensive damage if a security breach should occur. In fact, one major breach in any of 7,000 critical infrastructure facilities threatens more than 10,000 people. And one major breach in any of 123 facilities-identified as "most critical" among the 500,000-threatens more than 1,000,000 people. Current visible, nightvision or near infrared imaging technology alone has limited foul-weather viewing capability, poor nighttime performance, and limited nighttime range. And many systems today yield excessive false alarms, are managed by fatigued operators, are unable to manage the voluminous data captured, or lack the ability to pinpoint where an intrusion occurred. In our 2006 paper, "Critical Infrastructure Security Confidence Through Automated Thermal Imaging", we showed how a highly effective security solution can be developed by integrating what are now available "next-generation technologies" which include: Thermal imaging for the highly effective detection of intruders in the dark of night and in challenging weather conditions at the sensor imaging level - we refer to this as the passive thermal sensor level detection building block Automated software detection for creating initial alerts - we refer to this as software level detection, the next level building block Immersive 3D visual assessment for situational awareness and to manage the reaction process - we refer to this as automated intelligent situational awareness, a third building block Wide area command and control capabilities to allow control from a remote location - we refer to this as the management and process control building block integrating together the lower level building elements. In addition, this paper describes three live installations of complete, total systems that incorporate visible and thermal cameras as well as advanced video analytics. Discussion of both system elements and design is extensive.
A demonstration of a low cost approach to security at shipping facilities and ports
NASA Astrophysics Data System (ADS)
Huck, Robert C.; Al Akkoumi, Mouhammad K.; Herath, Ruchira W.; Sluss, James J., Jr.; Radhakrishnan, Sridhar; Landers, Thomas L.
2010-04-01
Government funding for the security at shipping facilities and ports is limited so there is a need for low cost scalable security systems. With over 20 million sea, truck, and rail containers entering the United States every year, these facilities pose a large risk to security. Securing these facilities and monitoring the variety of traffic that enter and leave is a major task. To accomplish this, the authors have developed and fielded a low cost fully distributed building block approach to port security at the inland Port of Catoosa in Oklahoma. Based on prior work accomplished in the design and fielding of an intelligent transportation system in the United States, functional building blocks, (e.g. Network, Camera, Sensor, Display, and Operator Console blocks) can be assembled, mixed and matched, and scaled to provide a comprehensive security system. The following functions are demonstrated and scaled through analysis and demonstration: Barge tracking, credential checking, container inventory, vehicle tracking, and situational awareness. The concept behind this research is "any operator on any console can control any device at any time."
Security evaluation and assurance of electronic health records.
Weber-Jahnke, Jens H
2009-01-01
Electronic Health Records (EHRs) maintain information of sensitive nature. Security requirements in this context are typically multilateral, encompassing the viewpoints of multiple stakeholders. Two main research questions arise from a security assurance point of view, namely how to demonstrate the internal correctness of EHRs and how to demonstrate their conformance in relation to multilateral security regulations. The above notions of correctness and conformance directly relate to the general concept of system verification, which asks the question "are we building the system right?" This should not be confused with the concept of system validation, which asks the question "are we building the right system?" Much of the research in the medical informatics community has been concerned with the latter aspect (validation). However, trustworthy security requires assurances that standards are followed and specifications are met. The objective of this paper is to contribute to filling this gap. We give an introduction to fundamentals of security assurance, summarize current assurance standards, and report on experiences with using security assurance methodology applied to the EHR domain, specifically focusing on case studies in the Canadian context.
Kang, Jungho; Kim, Mansik; Park, Jong Hyuk
2016-01-01
With the ICT technology making great progress in the smart home environment, the ubiquitous environment is rapidly emerging all over the world, but problems are also increasing proportionally to the rapid growth of the smart home market such as multiplatform heterogeneity and new security threats. In addition, the smart home sensors have so low computing resources that they cannot process complicated computation tasks, which is required to create a proper security environment. A service provider also faces overhead in processing data from a rapidly increasing number of sensors. This paper aimed to propose a scheme to build infrastructure in which communication entities can securely authenticate and design security channel with physically unclonable PUFs and the TTP that smart home communication entities can rely on. In addition, we analyze and evaluate the proposed scheme for security and performance and prove that it can build secure channels with low resources. Finally, we expect that the proposed scheme can be helpful for secure communication with low resources in future smart home multiplatforms. PMID:27399699
Kang, Jungho; Kim, Mansik; Park, Jong Hyuk
2016-07-05
With the ICT technology making great progress in the smart home environment, the ubiquitous environment is rapidly emerging all over the world, but problems are also increasing proportionally to the rapid growth of the smart home market such as multiplatform heterogeneity and new security threats. In addition, the smart home sensors have so low computing resources that they cannot process complicated computation tasks, which is required to create a proper security environment. A service provider also faces overhead in processing data from a rapidly increasing number of sensors. This paper aimed to propose a scheme to build infrastructure in which communication entities can securely authenticate and design security channel with physically unclonable PUFs and the TTP that smart home communication entities can rely on. In addition, we analyze and evaluate the proposed scheme for security and performance and prove that it can build secure channels with low resources. Finally, we expect that the proposed scheme can be helpful for secure communication with low resources in future smart home multiplatforms.
Demonstration of a Submillimeter-Wave HEMT Oscillator Module at 330 GHz
NASA Technical Reports Server (NTRS)
Radisic, Vesna; Deal, W. R.; Mei, X. B.; Yoshida, Wayne; Liu, P. H.; Uyeda, Jansen; Lai, Richard; Samoska, Lorene; Fung, King Man; Gaier, Todd;
2010-01-01
In this work, radial transitions have been successfully mated with a HEMT-based MMIC (high-electron-mobility-transistor-based monolithic microwave integrated circuit) oscillator circuit. The chip has been assembled into a WR2.2 waveguide module for the basic implementation with radial E-plane probe transitions to convert the waveguide mode to the MMIC coplanar waveguide mode. The E-plane transitions have been directly integrated onto the InP substrate to couple the submillimeter-wave energy directly to the waveguides, thus avoiding wire-bonds in the RF path. The oscillator demonstrates a measured 1.7 percent DC-RF efficiency at the module level. The oscillator chip uses 35-nm-gate-length HEMT devices, which enable the high frequency of oscillation, creating the first demonstration of a packaged waveguide oscillator that operates over 300 GHz and is based on InP HEMT technology. The oscillator chip is extremely compact, with dimensions of only 1.085 x 320 sq mm for a total die size of 0.35 sq mm. This fully integrated, waveguide oscillator module, with an output power of 0.27 mW at 330 GHz, can provide low-mass, low DC-power-consumption alternatives to existing local oscillator schemes, which require high DC power consumption and large mass. This oscillator module can be easily integrated with mixers, multipliers, and amplifiers for building high-frequency transmit and receive systems at submillimeter wave frequencies. Because it requires only a DC bias to enable submillimeter wave output power, it is a simple and reliable technique for generating power at these frequencies. Future work will be directed to further improving the applicability of HEMT transistors to submillimeter wave and terahertz applications. Commercial applications include submillimeter-wave imaging systems for hidden weapons detection, airport security, homeland security, and portable low-mass, low-power imaging systems
1. VIEW, LOOKING SOUTH, OF THE NORTH ELEVATION OF BUILDING ...
1. VIEW, LOOKING SOUTH, OF THE NORTH ELEVATION OF BUILDING 792A. BUILDING 792A, AT PORTAL 3, IS ONE OF THREE PEDESTRIAN ACCESS POINTS THROUGH THE PERIMETER SECURITY ZONE INTO THE PROTECTED AREA. - Rocky Flats Plant, Access Control Building, North of building 771, in parking area 71, just south of North Perimeter Road, Golden, Jefferson County, CO
A Healthy Approach to Fitness Center Security.
ERIC Educational Resources Information Center
Sturgeon, Julie
2000-01-01
Examines techniques for keeping college fitness centers secure while maintaining an inviting atmosphere. Building access control, preventing locker room theft, and suppressing causes for physical violence are discussed. (GR)
Technology's Role in Security.
ERIC Educational Resources Information Center
Day, C. William
1999-01-01
Examines the use of technology to bolster the school security system, tips on selecting a security consultant, and several basic strategies to make buildings and grounds safer. Technological ideas discussed include the use of telephones in classrooms to expedite care in emergency situations, surveillance cameras to reduce crime, and metal…
Security and Stability Analysis of Wind Farms Integration into Distribution Network
NASA Astrophysics Data System (ADS)
Guan-yang, Li; Hongzhao, Wang; Guanglei, Li; Yamei, Cheng; Hong-zheng, Liu; Yi, Sun
2017-05-01
With the increasing share of the wind power in the power system, wind power fluctuations will cause obvious negative impacts on weak local grid. This paper firstly establish electromechanical transient simulation model for doubly fed induction wind turbine, then use Matlab/Simulink to achieve power flow calculation and transient simulation of power system including wind farms, the local synchronous generator, load, etc, finally analyze wind power on the impact of the local power grid under typical circumstances. The actual calculated results indicate that wind mutation causes little effect on the power grid, but when the three-phase short circuit fault happens, active power of wind power decreases sharply and the voltage of location of wind power into the grid also drop sharply, finally wind farm split from power system. This situation is not conducive to security and stability of the local power grid. It is necessary to develop security and stability measures in the future.
Harnessing Post-Conflict Transitions: A Conceptual Primer
2010-09-01
aid community uses transition as a key indi- cator of success for development and aid programs (Cliffe et al., 2003; Crane et al., 2009; Crichton ...3, pp. 345-365. Barnett, M ., (2006), “Building a republican peace: Stabilizing states after war,” International Security, Vol. 30, No. 4, pp. 87-112...Security, Vol. 29, No. 4, pp. 157-195. Berdal, M . R., (2009), Building Peace After War, Abingdon, UK; New York; London, UK: Routledge: International
Securing Volunteers to Fix up the School. Research Brief
ERIC Educational Resources Information Center
Johnston, Howard
2011-01-01
How can schools secure volunteers to help fix up the building and grounds? There isn't much research on how to secure volunteers to participate in school clean-ups and fix-ups, but some key ideas can be found in anecdotal examples from many communities around the nation. The first recommendation is that securing volunteers is easier when the…
NASA Astrophysics Data System (ADS)
Nair, Nirmal-Kumar
As open access market principles are applied to power systems, significant changes are happening in their planning, operation and control. In the emerging marketplace, systems are operating under higher loading conditions as markets focus greater attention to operating costs than stability and security margins. Since operating stability is a basic requirement for any power system, there is need for newer tools to ensure stability and security margins being strictly enforced in the competitive marketplace. This dissertation investigates issues associated with incorporating voltage security into the unbundled operating environment of electricity markets. It includes addressing voltage security in the monitoring, operational and planning horizons of restructured power system. This dissertation presents a new decomposition procedure to estimate voltage security usage by transactions. The procedure follows physical law and uses an index that can be monitored knowing the state of the system. The expression derived is based on composite market coordination models that have both PoolCo and OpCo transactions, in a shared stressed transmission grid. Our procedure is able to equitably distinguish the impacts of individual transactions on voltage stability, at load buses, in a simple and fast manner. This dissertation formulates a new voltage stability constrained optimal power flow (VSCOPF) using a simple voltage security index. In modern planning, composite power system reliability analysis that encompasses both adequacy and security issues is being developed. We have illustrated the applicability of our VSCOPF into composite reliability analysis. This dissertation also delves into the various applications of voltage security index. Increasingly, FACT devices are being used in restructured markets to mitigate a variety of operational problems. Their control effects on voltage security would be demonstrated using our VSCOPF procedure. Further, this dissertation investigates the application of steady state voltage stability index to detect potential dynamic voltage collapse. Finally, this dissertation examines developments in representation, standardization, communication and exchange of power system data. Power system data is the key input to all analytical engines for system operation, monitoring and control. Data exchange and dissemination could impact voltage security evaluation and therefore needs to be critically examined.
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids
Zhang, Liping; Tang, Shanyu; Luo, He
2016-01-01
In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham- Yahalom logic. PMID:27007951
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids.
Zhang, Liping; Tang, Shanyu; Luo, He
2016-01-01
In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham-Yahalom logic.
The role of space related non-governmental organizations (NGOs) in capacity building
NASA Astrophysics Data System (ADS)
Lukaszczyk, A.; Williamson, R.
2010-02-01
Non-governmental organizations (NGOs) play a unique role in international affairs, providing access to resources, expertise, and assistance to supplement State resources. Sometimes the diplomatic skills and unofficial access of NGOs to policymakers through Track Two diplomacy can move a previously stalled critical issue forward and assist policymakers from different countries to find common ground outside official channels. Because they work outside of official channels, they are not bound by State policy that may inhibit negotiations between States. Some also have a convening power that sometimes makes it possible for State representatives to meet discipline experts and each other for informal discussions on issues of mutual interest. Finally, NGOs can draw attention to issues that may be overlooked or avoided by State organizations. This paper examines the ways in which NGOs can assist in building scientific, technical, educational, and legal and policy expertise related to space and Earth science, technology and governance of space activities. In particular, it will explore and analyze the ways in which organizations such as the Space Generation Advisory Council, EURISY, the Planetary Society and Secure World Foundation contribute to building capacity in developing countries.
10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...
10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...
10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...
10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...
10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...
New Technology's Surprising Security Threats. Building Digital Libraries
ERIC Educational Resources Information Center
Huwe, Terence
2005-01-01
In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…
The Building Blocks of School Security.
ERIC Educational Resources Information Center
Funck, Gary
1999-01-01
Few schools command the funding to shift from zero security to updated closed-circuit TV systems. Cost-effective school security identification cards, which provide a rapid means of identifying those belonging on campus, can be integrated with administrative systems to track attendance, age, subject studied, and other vital statistics. (MLH)
2010-03-17
the sole "superpower" and once again changed the international security paradigm. Finally, on September 11, 2001, a terrorist attack on the U.S. by...be employed in the near term in order to improve operations in today’s security environment. Cooperative security is intended to change how militruy...default. However, the changing world security environment has dictated that the U.S. avoids any actions that could be perceived as heavy-handed
Building a Practical Framework for Enterprise-Wide Security Management
2004-04-28
management. They have found that current efforts to manage security vulnerabilities and security risks only take an enterprise so far, with results...analyzed reports to determine the cause of the increase. Slide 5 © 2004 by Carnegie Mellon University Version 1.0 Secure IT 2004 - page 5 Attack...Nearly 1 in 5 of those surveyed reported that none of their IT staff have any formal security training. [A survey of 896 Computing Technology
Hyett, Nerida; Kenny, Amanda; Dickson-Swift, Virginia
2017-10-01
There is increasing opportunity and support for occupational therapists to expand their scope of practice in community settings. However, evidence is needed to increase occupational therapists' knowledge, confidence, and capacity with building community participation and adopting community-centered practice roles. The purpose of this study is to improve occupational therapists' understanding of an approach to building community participation, through case study of a network of Canadian food security programs. Qualitative case study was utilized. Data were semistructured interviews, field observations, documents, and online social media. Thematic analysis was used to identify and describe four themes that relate to processes used to build community participation. The four themes were use of multiple methods, good leaders are fundamental, growing participation via social media, and leveraging outcomes. Occupational therapists can utilize an approach for building community participation that incorporates resource mobilization. Challenges of sustainability and social exclusion must be addressed.
A Trusted Portable Computing Device
NASA Astrophysics Data System (ADS)
Ming-wei, Fang; Jun-jun, Wu; Peng-fei, Yu; Xin-fang, Zhang
A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a trusted portable security base, virtualization to create a secure virtual execution environment, two-factor authentication mechanism to identify legitimate users, and dynamic encryption to protect data privacy. The security environment described in this paper is characteristic of portability, security and reliability. It can meet the security requirement of mobile office.
Consolidation of a WSN and Minimax Method to Rapidly Neutralise Intruders in Strategic Installations
Conesa-Muñoz, Jesus; Ribeiro, Angela
2012-01-01
Due to the sensitive international situation caused by still-recent terrorist attacks, there is a common need to protect the safety of large spaces such as government buildings, airports and power stations. To address this problem, developments in several research fields, such as video and cognitive audio, decision support systems, human interface, computer architecture, communications networks and communications security, should be integrated with the goal of achieving advanced security systems capable of checking all of the specified requirements and spanning the gap that presently exists in the current market. This paper describes the implementation of a decision system for crisis management in infrastructural building security. Specifically, it describes the implementation of a decision system in the management of building intrusions. The positions of the unidentified persons are reported with the help of a Wireless Sensor Network (WSN). The goal is to achieve an intelligent system capable of making the best decision in real time in order to quickly neutralise one or more intruders who threaten strategic installations. It is assumed that the intruders’ behaviour is inferred through sequences of sensors’ activations and their fusion. This article presents a general approach to selecting the optimum operation from the available neutralisation strategies based on a Minimax algorithm. The distances among different scenario elements will be used to measure the risk of the scene, so a path planning technique will be integrated in order to attain a good performance. Different actions to be executed over the elements of the scene such as moving a guard, blocking a door or turning on an alarm will be used to neutralise the crisis. This set of actions executed to stop the crisis is known as the neutralisation strategy. Finally, the system has been tested in simulations of real situations, and the results have been evaluated according to the final state of the intruders. In 86.5% of the cases, the system achieved the capture of the intruders, and in 59.25% of the cases, they were intercepted before they reached their objective. PMID:22737008
Building to Make a Difference: Advanced Practice Nurses' Experience of Power.
Schoales, Catherine A; Bourbonnais, Frances Fothergill; Rashotte, Judy
2018-02-01
Power is necessary for nurses to affect change in patient care and to move the nursing profession forward. Despite the evolving body of nursing research on power, there have been no studies that have investigated the nature of advanced practice nurses' (APNs') power. The purpose of this study was to explore the APNs' lived experience of power. Interpretive phenomenology guided the method and analysis. Eight APNs employed in a single Canadian tertiary care teaching health-care organization engaged in in-depth interviews. The overarching theme, building to make a difference, reflected the APNs' perception of power in their practice, which involved a passion to facilitate change in practice to improve patient care. Building to make a difference involved three themes: building on, building with, and building for. The APNs experienced more power-a process they described as power creep-when they used soft power that was shared with others to affect positive change in health care. These findings contribute to our understanding of how power is perceived and manifested in the APN role, thus further enabling organizations to create working conditions to support the APNs' endeavors to empower others.
VIEW LOOKING SOUTHEAST AT BUILDING 121. THE BUILDING HOUSES OFFICES, ...
VIEW LOOKING SOUTHEAST AT BUILDING 121. THE BUILDING HOUSES OFFICES, THE ROCKY FLATS PLANT CENTRAL ALARM STATION, ALARM CONSOLES, THE ARMORY, THE LOCK AND KEY SECTION, A COMPUTER ROOM, A UTILITY ROOM, AND LOCKER ROOMS WITH SHOWERS. (1/98) - Rocky Flats Plant, Security & Armory, West of Third Street, south of Central Avenue, Golden, Jefferson County, CO
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rubinstein, Francis M.
Specific recommendations are made to improve the lighting quality and energy efficiency of the lighting system at the Social Security Administration Frank Hagel Building in Richmond, CA. The main recommendation is to replace the recessed fluorescent lighting system in the general office area with indirect lighting. Indirect lighting will improve lighting quality, will provide an energy efficient solution and will be about the same cost as the direct lighting system originally proposed.
The Role of Schools and their Capabilities to Ensure Safe Sheltering During a Storm
2017-03-01
and security aspects include establishing a safe environment in a confined space. While absent from Florida’s 2016 Statewide Emergency Shelter Plan...offer a safe environment for sheltering, and new building codes have been created for this purpose. The northern school districts in Texas sit in...Special Feature 2: Building a Safe and Secure Educational Environment ,” accessed January 15, 2017, http://www.mext.go.jp/b_menu/hakusho/html/hpab201201
Code of Federal Regulations, 2011 CFR
2011-01-01
..., laboratory, office building or other area utilized by the DOE or its contractors or subcontractors for the..., previously referred to as a “security inspector.” Special response team member. A security police officer who...
Code of Federal Regulations, 2012 CFR
2012-01-01
..., laboratory, office building or other area utilized by the DOE or its contractors or subcontractors for the..., previously referred to as a “security inspector.” Special response team member. A security police officer who...
Code of Federal Regulations, 2013 CFR
2013-01-01
..., laboratory, office building or other area utilized by the DOE or its contractors or subcontractors for the..., previously referred to as a “security inspector.” Special response team member. A security police officer who...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-24
... Power Station, Unit 1; Exemption From Certain Security Requirements 1.0 Background Exelon Nuclear is the licensee and holder of Facility Operating License No. DPR-2 issued for Dresden Nuclear Power Station (DNPS... protection of licensed activities in nuclear power reactors against radiological sabotage,'' paragraph (b)(1...
33 CFR 165.1155 - Security Zone; Diablo Canyon Nuclear Power Plant, Avila Beach, California.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Nuclear Power Plant, Avila Beach, California. 165.1155 Section 165.1155 Navigation and Navigable Waters... Coast Guard District § 165.1155 Security Zone; Diablo Canyon Nuclear Power Plant, Avila Beach... surface to bottom, within a 2,000 yard radius of Diablo Canyon Nuclear Power Plant centered at position 35...
33 CFR 165.1155 - Security Zone; Diablo Canyon Nuclear Power Plant, Avila Beach, California.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Nuclear Power Plant, Avila Beach, California. 165.1155 Section 165.1155 Navigation and Navigable Waters... Coast Guard District § 165.1155 Security Zone; Diablo Canyon Nuclear Power Plant, Avila Beach... surface to bottom, within a 2,000 yard radius of Diablo Canyon Nuclear Power Plant centered at position 35...
33 CFR 165.1155 - Security Zone; Diablo Canyon Nuclear Power Plant, Avila Beach, California.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Nuclear Power Plant, Avila Beach, California. 165.1155 Section 165.1155 Navigation and Navigable Waters... Coast Guard District § 165.1155 Security Zone; Diablo Canyon Nuclear Power Plant, Avila Beach... surface to bottom, within a 2,000 yard radius of Diablo Canyon Nuclear Power Plant centered at position 35...
33 CFR 165.1155 - Security Zone; Diablo Canyon Nuclear Power Plant, Avila Beach, California.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Nuclear Power Plant, Avila Beach, California. 165.1155 Section 165.1155 Navigation and Navigable Waters... Coast Guard District § 165.1155 Security Zone; Diablo Canyon Nuclear Power Plant, Avila Beach... surface to bottom, within a 2,000 yard radius of Diablo Canyon Nuclear Power Plant centered at position 35...
33 CFR 165.1155 - Security Zone; Diablo Canyon Nuclear Power Plant, Avila Beach, California.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Nuclear Power Plant, Avila Beach, California. 165.1155 Section 165.1155 Navigation and Navigable Waters... Coast Guard District § 165.1155 Security Zone; Diablo Canyon Nuclear Power Plant, Avila Beach... surface to bottom, within a 2,000 yard radius of Diablo Canyon Nuclear Power Plant centered at position 35...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-07
...] Standard on Powered Platforms for Building Maintenance; Extension of the Office of Management and Budget's... specified in its Standard on Powered Platforms for Building Maintenance (29 CFR 1910.66). DATES: Comments... Building Maintenance (29 CFR 1910.66). The Agency is requesting to retain its current burden hour total of...
38. SITE BUILDING 004 ELECTRIC POWER STATION AT INTERIOR ...
38. SITE BUILDING 004 - ELECTRIC POWER STATION AT INTERIOR - OBLIQUE VIEW AT FLOOR LEVEL SHOWING DIESEL ENGINE/GENERATOR SET NUMBER 5. - Cape Cod Air Station, Technical Facility-Scanner Building & Power Plant, Massachusetts Military Reservation, Sandwich, Barnstable County, MA
Risk Assessment of Power System considering the CPS of Transformers
NASA Astrophysics Data System (ADS)
Zhou, Long; Peng, Zewu; Liu, Xindong; Li, Canbing; Chen, Can
2018-02-01
This paper constructs a risk assessment framework of power system for device-level information security, analyzes the typical protection configuration of power transformers, and takes transformer gas protection and differential protection as examples to put forward a method that analyzes the cyber security in electric power system, which targets transformer protection parameters. We estimate the risk of power system accounting for the cyber security of transformer through utilizing Monte Carlo method and two indexes, which are the loss of load probability and the expected demand not supplied. The proposed approach is tested with IEEE 9 bus system and IEEE 118 bus system.
18 CFR 1314.3 - Authority of Reserve Banks.
Code of Federal Regulations, 2010 CFR
2010-04-01
... functions with respect to the issuance of Book-entry TVA Power Securities offered and sold by TVA to which this part 1314 applies, in accordance with the Securities Documentation, Reserve Bank Operating...-ENTRY PROCEDURES FOR TVA POWER SECURITIES ISSUED THROUGH THE FEDERAL RESERVE BANKS § 1314.3 Authority of...
Malware Mimics for Network Security Assessment
2011-03-01
Master’s Thesis 4 . TITLE AND SUBTITLE Malware Mimics for Network Security Assessment 6. AUTHOR(S) Taff, William R and Salevski, Paul M. 5...Communication Protocol .......................41 viii 4 . Graphical User Interface for MM-Server .......43 C. BUILDING THE TEST PLATFORM...Extension ...............71 2. More Advanced Modules ........................72 3. Increase Scale of Test Bed ...................73 4 . Security
Building Partner Capacity and Strengthening Security Through Medical Security Force Assistance
2013-06-01
Combatants,” The American Journal of Bioethics 8, no.2 (2008): 13–14. 71 emergencies will decrease the requirement for U.S. forces to engage in...Just Healthcare for Combatants.” The American Journal of Bioethics 8. no.2. 2008: 13–14. Joint Center for International Security Force Assistance
Building Multilevel Secure Web Services-Based Components for the Global Information Grid
2006-05-01
unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 Transforming: Business , Security ,Warfighting 16 CROSSTALK The Journal of Defense...A Single Step of the BAC Table 1: A Single Step of the Block Access Controller Transforming: Business , Security ,Warfighting 18 CROSSTALK The Journal
Biomedical devices and systems security.
Arney, David; Venkatasubramanian, Krishna K; Sokolsky, Oleg; Lee, Insup
2011-01-01
Medical devices have been changing in revolutionary ways in recent years. One is in their form-factor. Increasing miniaturization of medical devices has made them wearable, light-weight, and ubiquitous; they are available for continuous care and not restricted to clinical settings. Further, devices are increasingly becoming connected to external entities through both wired and wireless channels. These two developments have tremendous potential to make healthcare accessible to everyone and reduce costs. However, they also provide increased opportunity for technology savvy criminals to exploit them for fun and profit. Consequently, it is essential to consider medical device security issues. In this paper, we focused on the challenges involved in securing networked medical devices. We provide an overview of a generic networked medical device system model, a comprehensive attack and adversary model, and describe some of the challenges present in building security solutions to manage the attacks. Finally, we provide an overview of two areas of research that we believe will be crucial for making medical device system security solutions more viable in the long run: forensic data logging, and building security assurance cases.
15. SITE BUILDING 004 ELECTRIC POWER STATION VIEW ...
15. SITE BUILDING 004 - ELECTRIC POWER STATION - VIEW IS LOOKING SOUTH 55° EAST AT FIVE DIESEL ENGINE/ GENERATOR SILENCER SYSTEM EXHAUST STACKS. - Cape Cod Air Station, Technical Facility-Scanner Building & Power Plant, Massachusetts Military Reservation, Sandwich, Barnstable County, MA
North Base hangars as seen from the edge of Rogers ...
North Base hangars as seen from the edge of Rogers Dry Lake, looking north northwest (338°). The security fence surrounding the hangars and aircraft apron appears in the foreground. From left to right appear Building 4305 (Unicon Portable Hangar), Building 4401 (Hangar No. 1), Building 4400 (warehouse), Building 4402 (Hangar No. 2) and Building 4505. - Edwards Air Force Base, North Base, North Base Road, Boron, Kern County, CA
2013-06-01
Building in- formation exchange (COBie), Building Information Modeling ( BIM ) 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF...to develop a life-cycle building model have resulted in the definition of a “core” building information model that contains general information de...develop an information -exchange Model View Definition (MVD) for building electrical systems. The objective of the current work was to document the
Fast Computation and Assessment Methods in Power System Analysis
NASA Astrophysics Data System (ADS)
Nagata, Masaki
Power system analysis is essential for efficient and reliable power system operation and control. Recently, online security assessment system has become of importance, as more efficient use of power networks is eagerly required. In this article, fast power system analysis techniques such as contingency screening, parallel processing and intelligent systems application are briefly surveyed from the view point of their application to online dynamic security assessment.
The DISAM Journal of International Security Assistance Management. Volume 3, Number 4
2010-03-01
enough to help create jobs and build up the UAE industry . Still, for the near term, the United States stands to benefi t from several major projects ... PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Defense Institute of Security Assistance...it was amazing to see what industry brought to the table as far as platforms and capabilities. Industry has made it clear that they can build the
6. Interior, rear offices: operations assistant office looking north toward ...
6. Interior, rear offices: operations assistant office looking north toward security operations officer's office. - Ellsworth Air Force Base, Rushmore Air Force Station, Security Central Control Building, Quesada Drive, Blackhawk, Meade County, SD
18. Photocopy of architectural drawing, September 1942 (original on file ...
18. Photocopy of architectural drawing, September 1942 (original on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). OPERATIONS BUILDING 'A', ARLINGTON HALL STATION. OFFICE BUILDING -- FOUNDATION PLAN -- HEATING. DRAWING M-24-161-24. - Arlington Hall Station, Building No. 401, 4000 Arlington Boulevard, Arlington, Arlington County, VA
77 FR 59900 - North Pacific Fishery Management Council (NPFMC); Public Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-01
... Building at 700 West 9th Street, Juneau, AK. Council address: North Pacific Fishery Management Council, 605... Building in Juneau. Foreign nationals wishing to attend this meeting in person should contact the Council as soon as possible to expedite security clearance at the Federal Building in Juneau. Additional...
Code of Federal Regulations, 2012 CFR
2012-07-01
... political subdivision of a State that has zoning and building code jurisdiction over a particular area having special flood hazards. (e) Designated loan means a loan secured by a building or mobile home that... of Veterans Affairs. (c) Building means a walled and roofed structure, other than a gas or liquid...
Code of Federal Regulations, 2011 CFR
2011-07-01
... political subdivision of a State that has zoning and building code jurisdiction over a particular area having special flood hazards. (e) Designated loan means a loan secured by a building or mobile home that... of Veterans Affairs. (c) Building means a walled and roofed structure, other than a gas or liquid...
Code of Federal Regulations, 2014 CFR
2014-07-01
... political subdivision of a State that has zoning and building code jurisdiction over a particular area having special flood hazards. (e) Designated loan means a loan secured by a building or mobile home that... of Veterans Affairs. (c) Building means a walled and roofed structure, other than a gas or liquid...
Code of Federal Regulations, 2013 CFR
2013-07-01
... political subdivision of a State that has zoning and building code jurisdiction over a particular area having special flood hazards. (e) Designated loan means a loan secured by a building or mobile home that... of Veterans Affairs. (c) Building means a walled and roofed structure, other than a gas or liquid...
Code of Federal Regulations, 2014 CFR
2014-01-01
... zoning and building code jurisdiction over a particular area having special flood hazards. (e) Designated loan means a loan secured by a building or mobile home that is located or to be located in a special...) Building means a walled and roofed structure, other than a gas or liquid storage tank, that is principally...
Research and development targeted at identifying and mitigating Internet security threats require current network data. To fulfill this need... researchers working for the Center for Applied Internet Data Analysis (CAIDA), a program at the San Diego Supercomputer Center (SDSC) which is based at the...vetted network and security researchers using the PREDICT/IMPACT portal and legal framework. We have also contributed to community building efforts that
Assessing Grant Allocation Methods for Federal Homeland Security Urban Area Assistance Funding
2015-12-01
ALLOCATION METHODS FOR FEDERAL HOMELAND SECURITY URBAN AREA ASSISTANCE FUNDING by Craig Mohar December 2015 Thesis Co-Advisors: Kathleen...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE ASSESSING GRANT ALLOCATION METHODS FOR FEDERAL HOMELAND SECURITY URBAN AREA...the Department of Homeland Security (DHS) is critical for building and sustaining preparedness in urban areas. According to the 9/11 Commission Report
Modeling Security Bridge Certificate Authority Architecture
NASA Astrophysics Data System (ADS)
Ren, Yizhi; Li, Mingchu; Sakurai, Kouichi
Current Public Key Infrastructures suffer from a scaling problem, and some may have security problems, even given the topological simplification of bridge certification authorities. This paper analyzes the security problems in Bridge Certificate Authorities (BCA) model by using the concept of “impersonation risk, ” and proposes a new modified BCA model, which enhances its security, but is a bit more complex incertification path building and implementation than the existing one.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-21
...; Zion Nuclear Power Station, Units 1 and 2; Exemption From Certain Security Requirements 1.0 Background Zion Nuclear Power Station (ZNPS or Zion), Unit 1, is a Westinghouse 3250 MWt Pressurized Water Reactor... activities in nuclear power reactors against radiological sabotage,'' paragraph (b)(1) states, ``The licensee...
Secure Multiparty Quantum Computation for Summation and Multiplication.
Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
2016-01-21
As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics.
Secure Multiparty Quantum Computation for Summation and Multiplication
Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
2016-01-01
As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics. PMID:26792197
Building a highly available and intrusion tolerant Database Security and Protection System (DSPS).
Cai, Liang; Yang, Xiao-Hu; Dong, Jin-Xiang
2003-01-01
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.
Homeland security in the USA: past, present, and future.
Kemp, Roger L
2012-01-01
This paper examines the evolving and dynamic field of homeland security in the USA. Included in this analysis is the evolution of the creation of the Department of Homeland Security, an overview of the National Warning System, a summary of citizen support groups, and how the field of homeland security has had an impact on the location and architecture of public buildings and facilities. Also included are website directories of citizen support groups and federal agencies related to the field of homeland security.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-14
... involves important physical modifications to the HNP, Unit 1 security system. There are several issues... in which some important security modifications are planned. A direct outside access route to the... implementation deadline, the licensee currently maintains a security system acceptable to the NRC and that will...
Mechanisms of Power within a Community-Based Food Security Planning Process
ERIC Educational Resources Information Center
McCullum, Christine; Pelletier, David; Barr, Donald; Wilkins, Jennifer; Habicht, Jean-Pierre
2004-01-01
A community food security movement has begun to address problems of hunger and food insecurity by utilizing a community-based approach. Although various models have been implemented, little empirical research has assessed how power operates within community-based food security initiatives. The purpose of this research was to determine how power…
Disruptive Ideas for Power Grid Security and Resilience With DER
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ibrahim, Erfan
This presentation by Erfan Ibrahim was prepared for NREL's 2017 Cybersecurity and Reslience Workshop on distributed energy resource (DER) best practices. The presentation provides an overview of NREL's Cyber-Physical Systems Security and Resilience R&D Center, the Center's approach to cybersecurity, and disruptive ideas for power grid security and resilience with DER.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Karthik, Rajasekar; Patlolla, Dilip Reddy; Sorokine, Alexandre
Managing a wide variety of mobile devices across multiple mobile operating systems is a security challenge for any organization [1, 2]. With the wide adoption of mobile devices to access work-related apps, there is an increase in third-party apps that might either misuse or improperly handle user s personal or sensitive data [3]. HTML5 has been receiving wide attention for developing cross-platform mobile apps. According to International Data Corporation (IDC), by 2015, 80% of all mobile apps will be based in part or wholly upon HTML5 [4]. Though HTML5 provides a rich set of features for building an app, itmore » is a challenge for organizations to deploy and manage HTML5 apps on wide variety of devices while keeping security policies intact. In this paper, we will describe an upcoming secure mobile environment for HTML5 apps, called Sencha Space that addresses these issues and discuss how it will be used to design and build a secure and cross-platform mobile mapping service app. We will also describe how HTML5 and a new set of related technologies such as Geolocation API, WebGL, Open Layers 3, and Local Storage, can be used to provide a high end and high performance experience for users of the mapping service app.« less
Building Community Resilience to Disasters
Chandra, Anita; Acosta, Joie; Howard, Stefanie; Uscher-Pines, Lori; Williams, Malcolm; Yeung, Douglas; Garnett, Jeffrey; Meredith, Lisa S.
2011-01-01
Abstract Community resilience, or the sustained ability of a community to withstand and recover from adversity, has become a key policy issue at federal, state, and local levels, including in the National Health Security Strategy. Because resources are limited in the wake of an emergency, it is increasingly recognized that resilience is critical to a community's ability to reduce long recovery periods after an emergency. This article shares details of a report that provides a roadmap for federal, state, and local leaders who are developing plans to enhance community resilience for health security threats and describes options for building community resilience in key areas. Based on findings from a literature review and a series of community and regional focus groups, the authors provide a definition of community resilience in the context of national health security and a set of eight levers and five core components for building resilience. They then describe suggested activities that communities are pursuing and may want to strengthen for community resilience, and they identify challenges to implementation. PMID:28083162
8. Photocopy of engineering drawing. SECURITY UPGRADES, SLC17: ELEVATIONS AND ...
8. Photocopy of engineering drawing. SECURITY UPGRADES, SLC17: ELEVATIONS AND BUILDING SECTION, JULY 1992. - Cape Canaveral Air Station, Launch Complex 17, Facility 28425, East end of Lighthouse Road, Cape Canaveral, Brevard County, FL
Walk the Talk: Progress in Building a Supply Chain Security Culture
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hund, Gretchen
Pacific Northwest National Laboratory (PNNL) has engaged industry to “go beyond compliance” for over a decade in controlling and securing their supply chains to ensure their goods are not diverted to nuclear weapons programs. This work has focused on dual-use industries that manufacture products that can be used in both commercial applications and in the development of a nuclear weapon. The team encourages industry to self-regulate to reduce proliferation risks. As part of that work, PNNL interviewed numerous companies about their compliance practices to understand their business and to build awareness around best practices to ensure security of goods, technology,more » and information along their supply chains. From conducting this work, PNNL identified indicators that a company can adopt as part of its commitment to nonproliferation ideals with a focus on supply chain security.« less
An authentication infrastructure for today and tomorrow
DOE Office of Scientific and Technical Information (OSTI.GOV)
Engert, D.E.
1996-06-01
The Open Software Foundation`s Distributed Computing Environment (OSF/DCE) was originally designed to provide a secure environment for distributed applications. By combining it with Kerberos Version 5 from MIT, it can be extended to provide network security as well. This combination can be used to build both an inter and intra organizational infrastructure while providing single sign-on for the user with overall improved security. The ESnet community of the Department of Energy is building just such an infrastructure. ESnet has modified these systems to improve their interoperability, while encouraging the developers to incorporate these changes and work more closely together tomore » continue to improve the interoperability. The success of this infrastructure depends on its flexibility to meet the needs of many applications and network security requirements. The open nature of Kerberos, combined with the vendor support of OSF/DCE, provides the infrastructure for today and tomorrow.« less
Beyond Boundaries: A Promising New Model for Security and Global Development. Carnegie Results
ERIC Educational Resources Information Center
Theroux, Karen
2013-01-01
In 2007, a team of international security experts and researchers at the Henry L. Stimson Center launched an initiative to build an effective model for sustainable nonproliferation of biological, chemical, and nuclear weapons. The project represented an exciting and innovative way of thinking about security: a dual-use approach that operated at…
Learner Centric in M-Learning: Integration of Security, Dependability and Trust
ERIC Educational Resources Information Center
Mahalingam, Sheila; Abdollah, Faizal Mohd; Sahib, Shahrin
2014-01-01
The paper focus on learner centric attributes in a m-learning environment encounters the security measurements. In order to build up a systematic threat and countermeasure for protecting the learners as well as providing awareness and satisfaction in utilizing the mobile learning system, a security model need to be overhauled. The brief literature…
Security Meets Real-World Computing. Building Digital Libraries
ERIC Educational Resources Information Center
Huwe, Terence K.
2005-01-01
The author of this column describes several instances in which secure data on computers were compromised. In each of these instances, a different route was involved in gaining access to the secure data--one by office-based theft, one by hacking, and one by burglary. Is is proposed that the most difficult factor to guarantee in the protection of…
Smart Buildings: An Introduction to the Library of the Future.
Hoy, Matthew B
2016-01-01
Advances in building technologies are combining energy efficiency, networked sensors, and data recording in exciting ways. Modern facilities can adjust lighting, heating, and cooling outputs to maximize efficiency, provide better physical security, improve wayfinding for occupants, and provide detailed reports of building use. This column will briefly explore the idea of "smart buildings," describe some of the technologies that are being developed for these buildings, and explore their implications for libraries. A brief listing of selected smart building technologies is also provided.
2017-06-01
processes. Rothkopf, David J. 2006. Running the World: The Inside Story of The National Security Council and The Architects of American Power . 1st ed...recognized Soviet aims. They aimed to gain power , spread communism, and counter the West. Eisenhower’s belief in American physical and ideological...The Architects of American Power . 1st ed. New York: Public Affairs: 322-324. 22 Burke, Honest Broker?, 341. 23 U.N. Ambassador Albright, Treasury
NASA Astrophysics Data System (ADS)
Ghenai, C.; Bettayeb, M.
2017-11-01
Modelling, simulation, optimization and control strategies are used in this study to design a stand-alone solar PV/Fuel Cell/Battery/Generator hybrid power system to serve the electrical load of a commercial building. The main objective is to design an off grid energy system to meet the desired electric load of the commercial building with high renewable fraction, low emissions and low cost of energy. The goal is to manage the energy consumption of the building, reduce the associate cost and to switch from grid-tied fossil fuel power system to an off grid renewable and cleaner power system. Energy audit was performed in this study to determine the energy consumption of the building. Hourly simulations, modelling and optimization were performed to determine the performance and cost of the hybrid power configurations using different control strategies. The results show that the hybrid off grid solar PV/Fuel Cell/Generator/Battery/Inverter power system offers the best performance for the tested system architectures. From the total energy generated from the off grid hybrid power system, 73% is produced from the solar PV, 24% from the fuel cell and 3% from the backup Diesel generator. The produced power is used to meet all the AC load of the building without power shortage (<0.1%). The hybrid power system produces 18.2% excess power that can be used to serve the thermal load of the building. The proposed hybrid power system is sustainable, economically viable and environmentally friendly: High renewable fraction (66.1%), low levelized cost of energy (92 /MWh), and low carbon dioxide emissions (24 kg CO2/MWh) are achieved.
Limits of Military Power for National Security.
ERIC Educational Resources Information Center
Melman, Seymour
1981-01-01
Reviews the post World War II nuclear-military arms race and claims that it is possible to define significant limits of military power for national security. Topics discussed include public opinion regarding the arms race, constraints on military power, conventional forces, checkmating conventional strategy, and the seriousness of nuclear false…
Building Partner Country Capacity for Stability Operations
2011-01-01
international aFFairs law and Business national seCurity population and aging puBliC saFety sCienCe and teChnology terrorism and homeland seCurity this... Quantic Thurston, MG-942-A, 2010 (available at http://www.rand.org/pubs/monographs/MG942.html). This research brief was written by Kristin J. Leuschner...AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY TERRORISM AND HOMELAND SECURITY
Securing your financial future.
Kachalia, Parag R
2009-04-01
Securing one's financial future requires dedication and planning. A clear plan must be implemented and continually re-examined to assure an individual remains on track to achieve this security. True success of the plan will be dependent upon taking the appropriate steps to protecting one's assets against unfortunate events along with building assets with a clear end goal in mind. This article will cover the fundamental steps an individual can take to secure their financial future.
20. Photocopy of architectural drawing, September 1942 (original on file ...
20. Photocopy of architectural drawing, September 1942 (original on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). OPERATIONS BUILDING 'A', ARLINGTON HALL STATION. OFFICE BUILDING -- SECOND FLOOR PLAN -- HEATING. DRAWING M-24-161-26. - Arlington Hall Station, Building No. 401, 4000 Arlington Boulevard, Arlington, Arlington County, VA
19. Photocopy of architectural drawing, September 1942 (original on file ...
19. Photocopy of architectural drawing, September 1942 (original on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). OPERATIONS BUILDING 'A', ARLINGTON HALL STATION. OFFICE BUILDING -- FIRST FLOOR PLAN -- HEATING. DRAWING M-24-161-25. - Arlington Hall Station, Building No. 401, 4000 Arlington Boulevard, Arlington, Arlington County, VA
Storytelling Dramas as a Community Building Activity in an Early Childhood Classroom
ERIC Educational Resources Information Center
Wright, Cheryl; Diener, Marissa L.; Kemp, Jacqueline Lindsay
2013-01-01
Healthy social-emotional development is promoted by building a safe, secure and respectful environment in an early childhood setting with positive and consistent relationships among adults, children, and their peers. This study explored storytelling dramas as an opportunity to build community within the context of one early childhood classroom.…
Dickmann, Petra; Sheeley, Heather; Lightfoot, Nigel
2015-01-01
Laboratory capacity building is characterized by a paradox between endemicity and resources: countries with high endemicity of pathogenic agents often have low and intermittent resources (water, electricity) and capacities (laboratories, trained staff, adequate regulations). Meanwhile, countries with low endemicity of pathogenic agents often have high-containment facilities with costly infrastructure and maintenance governed by regulations. The common practice of exporting high biocontainment facilities and standards is not sustainable and concerns about biosafety and biosecurity require careful consideration. A group at Chatham House developed a draft conceptual framework for safer, more secure, and sustainable laboratory capacity building. The draft generic framework is guided by the phrase "LOCAL - PEOPLE - MAKE SENSE" that represents three major principles: capacity building according to local needs (local) with an emphasis on relationship and trust building (people) and continuous outcome and impact measurement (make sense). This draft generic framework can serve as a blueprint for international policy decision-making on improving biosafety and biosecurity in laboratory capacity building, but requires more testing and detailing development.
Optimisation of Critical Infrastructure Protection: The SiVe Project on Airport Security
NASA Astrophysics Data System (ADS)
Breiing, Marcus; Cole, Mara; D'Avanzo, John; Geiger, Gebhard; Goldner, Sascha; Kuhlmann, Andreas; Lorenz, Claudia; Papproth, Alf; Petzel, Erhard; Schwetje, Oliver
This paper outlines the scientific goals, ongoing work and first results of the SiVe research project on critical infrastructure security. The methodology is generic while pilot studies are chosen from airport security. The outline proceeds in three major steps, (1) building a threat scenario, (2) development of simulation models as scenario refinements, and (3) assessment of alternatives. Advanced techniques of systems analysis and simulation are employed to model relevant airport structures and processes as well as offences. Computer experiments are carried out to compare and optimise alternative solutions. The optimality analyses draw on approaches to quantitative risk assessment recently developed in the operational sciences. To exploit the advantages of the various techniques, an integrated simulation workbench is build up in the project.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-27
...; Zion Nuclear Power Station, Units 1 and 2; Exemption From Certain Physical Security Requirements 1.0... the ZNPS Physical Security Plan (PSP) for the protection of the nuclear material while in transit to... the new physical security requirements in 10 CFR 73.55. The December 2, 2010, letter included...
Code of Federal Regulations, 2010 CFR
2010-07-01
...) Persons desiring to transit the area of the security zone may contact the Captain of the Port at telephone... REGULATED NAVIGATION AREAS AND LIMITED ACCESS AREAS Specific Regulated Navigation Areas and Limited Access Areas Fifth Coast Guard District § 165.505 Security Zone; Calvert Cliffs Nuclear Power Plant, Chesapeake...
Defining the Role of the Professional Security Consultant.
ERIC Educational Resources Information Center
Webster, Jim
2002-01-01
Discusses the skill set that should be available in security consultants to higher education, including the ability to work with mechanical, architectural, electrical, landscaping, and telecommunications systems. Addresses the need to bring consultants into the building design phase. (EV)
Transportation Energy Security and Climate Change Mitigation Act of 2007
DOT National Transportation Integrated Search
2008-09-29
The Committee on Transportation and Infrastructure, to whom was referred the bill (H.R. 2701) to strengthen our Nations energy security and mitigate the effects of climate change by promoting energy efficient transportation and public buildings, c...
Load Composition Model Workflow (BPA TIP-371 Deliverable 1A)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chassin, David P.; Cezar, Gustavo V.
This project is funded under Bonneville Power Administration (BPA) Strategic Partnership Project (SPP) 17-005 between BPA and SLAC National Accelerator Laboratory. The project in a BPA Technology Improvement Project (TIP) that builds on and validates the Composite Load Model developed by the Western Electric Coordinating Council's (WECC) Load Modeling Task Force (LMTF). The composite load model is used by the WECC Modeling and Validation Work Group to study the stability and security of the western electricity interconnection. The work includes development of load composition data sets, collection of load disturbance data, and model development and validation. This work supports reliablemore » and economic operation of the power system. This report was produced for Deliverable 1A of the BPA TIP-371 Project entitled \\TIP 371: Advancing the Load Composition Model". The deliverable documents the proposed work ow for the Composite Load Model, which provides the basis for the instrumentation, data acquisition, analysis and data dissemination activities addressed by later phases of the project.« less
Stakeholder analysis in the management of irrigation in Kampili area
NASA Astrophysics Data System (ADS)
Jumiati; Ali, M. S. S.; Fahmid, I. M.; Mahyuddin
2018-05-01
Irrigation has appreciable contribution in building food security, particularly rice crops. This study aims to analyze the role of stakeholders involved in distributing of irrigation water. The study was conducted in the Kampili Irrigation Area in South Sulawesi Province Indonesia, the data were obtained through observation and interviews with stakeholders involved, and analysed by stakeholder analysis, based on the interests and power held by the actors. This analysis is intended to provide an optimal picture of the expected role of each stakeholder in the management of irrigation resources. The results show that there were many stakeholders involved in irrigation management. In the arrangement of irrigation distribution there was overlapping authority of the stakeholders to its management, every stakeholder had different interests and power between each other. The existence have given positive and negative values in distributing irrigation water management, then in the stakeholder collaboration there was contestation between them. This contestation took place between the agriculture department, PSDA province, the Jeneberang River Region Hall, the Farmers Group and the P3A.
LCS Content Document Application
NASA Technical Reports Server (NTRS)
Hochstadt, Jake
2011-01-01
My project at KSC during my spring 2011 internship was to develop a Ruby on Rails application to manage Content Documents..A Content Document is a collection of documents and information that describes what software is installed on a Launch Control System Computer. It's important for us to make sure the tools we use everyday are secure, up-to-date, and properly licensed. Previously, keeping track of the information was done by Excel and Word files between different personnel. The goal of the new application is to be able to manage and access the Content Documents through a single database backed web application. Our LCS team will benefit greatly with this app. Admin's will be able to login securely to keep track and update the software installed on each computer in a timely manner. We also included exportability such as attaching additional documents that can be downloaded from the web application. The finished application will ease the process of managing Content Documents while streamlining the procedure. Ruby on Rails is a very powerful programming language and I am grateful to have the opportunity to build this application.
SAFER vehicle inspection: a multimodal robotic sensing platform
NASA Astrophysics Data System (ADS)
Page, David L.; Fougerolle, Yohan; Koschan, Andreas F.; Gribok, Andrei; Abidi, Mongi A.; Gorsich, David J.; Gerhart, Grant R.
2004-09-01
The current threats to U.S. security both military and civilian have led to an increased interest in the development of technologies to safeguard national facilities such as military bases, federal buildings, nuclear power plants, and national laboratories. As a result, the Imaging, Robotics, and Intelligent Systems (IRIS) Laboratory at The University of Tennessee (UT) has established a research consortium, known as SAFER (Security Automation and Future Electromotive Robotics), to develop, test, and deploy sensing and imaging systems for unmanned ground vehicles (UGV). The targeted missions for these UGV systems include -- but are not limited to --under vehicle threat assessment, stand-off check-point inspections, scout surveillance, intruder detection, obstacle-breach situations, and render-safe scenarios. This paper presents a general overview of the SAFER project. Beyond this general overview, we further focus on a specific problem where we collect 3D range scans of under vehicle carriages. These scans require appropriate segmentation and representation algorithms to facilitate the vehicle inspection process. We discuss the theory for these algorithms and present results from applying them to actual vehicle scans.
3. WALL PAPER MILL, POWER HOUSE, AND MERCHANDISE BUILDING IN ...
3. WALL PAPER MILL, POWER HOUSE, AND MERCHANDISE BUILDING IN DISTANCE, PRINTING AND ADVERTISING BUILDING, AND ALLSTATE BUILDING, VIEW TO NORTHWEST - Sears Roebuck & Company Mail Order Plant, Bounded by Lexington & Grenshaw Streets, Kedzie Avenue & Independence Boulevard, Chicago, Cook County, IL
Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa
2017-05-16
In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks.
Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa
2017-01-01
In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks. PMID:28509841
Center for Corporate Climate Leadership Building Internal Support in Supply Chain Management
Organizations build support for addressing GHG emissions by developing key allies in business units, leveraging one business unit to drive change across the organization, and securing executive support while communicating resource needs.
17. VIEW OF INTERIOR OF BUILDING 220 SECOND FLOOR, MALE ...
17. VIEW OF INTERIOR OF BUILDING 220 SECOND FLOOR, MALE MEDIUM SECURITY SLEEPING AREA. - U.S. Naval Base, Pearl Harbor, Brig, Neville Way near Ninth Street at Marine Barracks, Pearl City, Honolulu County, HI
NASA Technical Reports Server (NTRS)
Chow, Edward; Spence, Matthew Chew; Pell, Barney; Stewart, Helen; Korsmeyer, David; Liu, Joseph; Chang, Hsin-Ping; Viernes, Conan; Gogorth, Andre
2003-01-01
This paper discusses the challenges and security issues inherent in building complex cross-organizational collaborative projects and software systems within NASA. By applying the design principles of compartmentalization, organizational hierarchy and inter-organizational federation, the Secured Advanced Federated Environment (SAFE) is laying the foundation for a collaborative virtual infrastructure for the NASA community. A key element of SAFE is the Micro Security Domain (MSD) concept, which balances the need to collaborate and the need to enforce enterprise and local security rules. With the SAFE approach, security is an integral component of enterprise software and network design, not an afterthought.
Resonant Inductive Power Transfer for Noncontact Launcher-Missile Interface
2016-08-01
implementation of a wireless power transfer system based on the concept of non-radiating inductive coupling. 14. SUBJECT TERMS Resonant Inductive Coupling... Wireless Power Transfer 15. NUMBER OF PAGES 18 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY...2 In contrast to the ideal transformer, wireless inductive power transfer assumes that the coils are no longer physically connected by an iron core
Quantum cryptography to satellites for global secure key distribution
NASA Astrophysics Data System (ADS)
Rarity, John G.; Gorman, Philip M.; Knight, Paul; Wallace, Kotska; Tapster, Paul R.
2017-11-01
We have designed and built a free space secure key exchange system using weak laser pulses with polarisation modulation by acousto-optic switching. We have used this system to exchange keys over a 1.2km ground range with absolute security. Building from this initial result we analyse the feasibility of exchanging keys to a low earth orbit satellite.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-18
... Docket Management Facility (M-30), U.S. Department of Transportation, West Building Ground Floor, Room.... The security zone will encompass an area of the Detroit River beginning at a point of origin on land... shoreline to connect back to the point of origin. Vessels in close proximity to the security zone will be...
49 CFR 393.118 - What are the rules for securing dressed lumber or similar building products?
Code of Federal Regulations, 2010 CFR
2010-10-01
... Shifting and Falling Cargo Specific Securement Requirements by Commodity Type § 393.118 What are the rules... transported using no more than one tier. Bundles carried on one tier must be secured in accordance with the... one tier. Bundles carried in more than one tier must be either: (1) Blocked against lateral movement...
A study on an information security system of a regional collaborative medical platform.
Zhao, Junping; Peng, Kun; Leng, Jinchang; Sun, Xiaowei; Zhang, Zhenjiang; Xue, Wanguo; Ren, Lianzhong
2010-01-01
The objective of this study was to share the experience of building an information security system for a regional collaborative medical platform (RCMP) and discuss the lessons learned from practical projects. Safety measures are analyzed from the perspective of system engineering. We present the essential requirements, critical architectures, and policies for system security of regional collaborative medical platforms.
18 CFR 1314.2 - Definition of terms.
Code of Federal Regulations, 2011 CFR
2011-04-01
... PROCEDURES FOR TVA POWER SECURITIES ISSUED THROUGH THE FEDERAL RESERVE BANKS § 1314.2 Definition of terms... name of a Participant at a Reserve Bank to which Book-entry TVA Power Securities held for a Participant... 18 Conservation of Power and Water Resources 2 2011-04-01 2011-04-01 false Definition of terms...
PMU-Aided Voltage Security Assessment for a Wind Power Plant
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jiang, Huaiguang; Zhang, Yingchen; Zhang, Jun Jason
2015-10-05
Because wind power penetration levels in electric power systems are continuously increasing, voltage stability is a critical issue for maintaining power system security and operation. The traditional methods to analyze voltage stability can be classified into two categories: dynamic and steady-state. Dynamic analysis relies on time-domain simulations of faults at different locations; however, this method needs to exhaust faults at all locations to find the security region for voltage at a single bus. With the widely located phasor measurement units (PMUs), the Thevenin equivalent matrix can be calculated by the voltage and current information collected by the PMUs. This papermore » proposes a method based on a Thevenin equivalent matrix to identify system locations that will have the greatest impact on the voltage at the wind power plant's point of interconnection. The number of dynamic voltage stability analysis runs is greatly reduced by using the proposed method. The numerical results demonstrate the feasibility, effectiveness, and robustness of the proposed approach for voltage security assessment for a wind power plant.« less
Real time test bed development for power system operation, control and cyber security
NASA Astrophysics Data System (ADS)
Reddi, Ram Mohan
The operation and control of the power system in an efficient way is important in order to keep the system secure, reliable and economical. With advancements in smart grid, several new algorithms have been developed for improved operation and control. These algorithms need to be extensively tested and validated in real time before applying to the real electric power grid. This work focuses on the development of a real time test bed for testing and validating power system control algorithms, hardware devices and cyber security vulnerability. The test bed developed utilizes several hardware components including relays, phasor measurement units, phasor data concentrator, programmable logic controllers and several software tools. Current work also integrates historian for power system monitoring and data archiving. Finally, two different power system test cases are simulated to demonstrate the applications of developed test bed. The developed test bed can also be used for power system education.
78 FR 27472 - Notice of Passenger Facility Charge (PFC) Approvals and Disapprovals
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-10
... Approved For Collection And Use: Airfield lighting and vault. Runway 21 extension--preliminary design...--80 facility modification design and build-out. Access control enhancements. Security fence replacement. Airfield pavement survey. Jet bridge refurbishment. Security checkpoint modification. Friction...
Facility Decontamination and Decommissioning Program Surveillance and Maintenance Plan, Revision 2
DOE Office of Scientific and Technical Information (OSTI.GOV)
Poderis, Reed J.; King, Rebecca A.
This Surveillance and Maintenance (S&M) Plan describes the activities performed between deactivation and final decommissioning of the following facilities located on the Nevada National Security Site, as documented in the Federal Facility Agreement and Consent Order under the Industrial Sites program as decontamination and decommissioning sites: ? Engine Maintenance, Assembly, and Disassembly (EMAD) Facility: o EMAD Building (Building 25-3900) o Locomotive Storage Shed (Building 25-3901) ? Test Cell C (TCC) Facility: o Equipment Building (Building 25-3220) o Motor Drive Building (Building 25-3230) o Pump Shop (Building 25-3231) o Cryogenic Lab (Building 25-3232) o Ancillary Structures (e.g., dewars, water tower, piping,more » tanks) These facilities have been declared excess and are in various stages of deactivation (low-risk, long-term stewardship disposition state). This S&M Plan establishes and implements a solid, cost-effective, and balanced S&M program consistent with federal, state, and regulatory requirements. A graded approach is used to plan and conduct S&M activities. The goal is to maintain the facilities in a safe condition in a cost-effective manner until their final end state is achieved. This plan accomplishes the following: ? Establishes S&M objectives and framework ? Identifies programmatic guidance for S&M activities to be conducted by National Security Technologies, LLC, for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) ? Provides present facility condition information and identifies hazards ? Identifies facility-specific S&M activities to be performed and their frequency ? Identifies regulatory drivers, NNSA/NFO policies and procedures, and best management practices that necessitate implementation of S&M activities ? Provides criteria and frequencies for revisions and updates ? Establishes the process for identifying and dispositioning a condition that has not been previously identified or documented ? Provides instructions for implementing annual S&M inspections and activities The following facilities that were included in Revision 1 of this plan have reached final disposition and are no longer in the S&M program: ? Reactor Maintenance, Assembly, and Disassembly Facility, Building 25-3110 ? Test Cell A Facility, Building 25-3113 ? TCC Facility, Building 25-3210 ? Pluto Disassembly Facility, Building 26-2201 ? Super Kukla Facility, Building 27-5400« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-15
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Aqua Society, Inc., Centurion Gold Holdings, Inc., and PowerRaise, Inc.; Order of Suspension of Trading July 13, 2011. It appears to the Securities... securities of Aqua Society, Inc. because it has not filed any periodic reports since the period ended June 30...
PROCESS WATER BUILDING, TRA605. CONTEXTUAL VIEW, CAMERA FACING SOUTHEAST. PROCESS ...
PROCESS WATER BUILDING, TRA-605. CONTEXTUAL VIEW, CAMERA FACING SOUTHEAST. PROCESS WATER BUILDING AND ETR STACK ARE IN LEFT HALF OF VIEW. TRA-666 IS NEAR CENTER, ABUTTED BY SECURITY BUILDING; TRA-626, AT RIGHT EDGE OF VIEW BEHIND BUS. INL NEGATIVE NO. HD46-34-1. Mike Crane, Photographer, 4/2005 - Idaho National Engineering Laboratory, Test Reactor Area, Materials & Engineering Test Reactors, Scoville, Butte County, ID
2012-11-01
Abbreviations BPC building partner capacity DOD Department of Defense DSCA Defense Security Cooperation Agency EFTS Enhanced Freight Tracking System...SCOs are ready to receive a planned delivery. For both FMS and pseudo-FMS processes, DOD uses the Enhanced Freight Tracking System ( EFTS ), a secure...providing data for this system. The Security Assistance Management Manual recommends that SCOs use the EFTS to maintain awareness of incoming shipments
Automating security monitoring and analysis for Space Station Freedom's electric power system
NASA Technical Reports Server (NTRS)
Dolce, James L.; Sobajic, Dejan J.; Pao, Yoh-Han
1990-01-01
Operating a large, space power system requires classifying the system's status and analyzing its security. Conventional algorithms are used by terrestrial electric utilities to provide such information to their dispatchers, but their application aboard Space Station Freedom will consume too much processing time. A new approach for monitoring and analysis using adaptive pattern techniques is presented. This approach yields an on-line security monitoring and analysis algorithm that is accurate and fast; and thus, it can free the Space Station Freedom's power control computers for other tasks.
Automating security monitoring and analysis for Space Station Freedom's electric power system
NASA Technical Reports Server (NTRS)
Dolce, James L.; Sobajic, Dejan J.; Pao, Yoh-Han
1990-01-01
Operating a large, space power system requires classifying the system's status and analyzing its security. Conventional algorithms are used by terrestrial electric utilities to provide such information to their dispatchers, but their application aboard Space Station Freedom will consume too much processing time. A novel approach for monitoring and analysis using adaptive pattern techniques is presented. This approach yields an on-line security monitoring and analysis algorithm that is accurate and fast; and thus, it can free the Space Station Freedom's power control computers for other tasks.
Whole Building Design Objectives for Campus Safety and Security: A System Dynamics Approach
ERIC Educational Resources Information Center
Oakes, Charles G.
2010-01-01
The May/June 2009 issue of "Facilities Manager" introduced APPA readers to the Whole Building Design Guide (WBDG)--today's most comprehensive Internet-based depository of resources contributing to a systems approach for everything of a building nature. The emphasis in that article was on Operations and Maintenance (O&M) issues and procedures. In…
Instrumentation, Control, and Intelligent Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
2005-09-01
Abundant and affordable energy is required for U.S. economic stability and national security. Advanced nuclear power plants offer the best near-term potential to generate abundant, affordable, and sustainable electricity and hydrogen without appreciable generation of greenhouse gases. To that end, Idaho National Laboratory (INL) has been charged with leading the revitalization of nuclear power in the U.S. The INL vision is to become the preeminent nuclear energy laboratory with synergistic, world-class, multi-program capabilities and partnerships by 2015. The vision focuses on four essential destinations: (1) Be the preeminent internationally-recognized nuclear energy research, development, and demonstration laboratory; (2) Be a majormore » center for national security technology development and demonstration; (3) Be a multi-program national laboratory with world-class capabilities; (4) Foster academic, industry, government, and international collaborations to produce the needed investment, programs, and expertise. Crucial to that effort is the inclusion of research in advanced instrumentation, control, and intelligent systems (ICIS) for use in current and advanced power and energy security systems to enable increased performance, reliability, security, and safety. For nuclear energy plants, ICIS will extend the lifetime of power plant systems, increase performance and power output, and ensure reliable operation within the system's safety margin; for national security applications, ICIS will enable increased protection of our nation's critical infrastructure. In general, ICIS will cost-effectively increase performance for all energy security systems.« less
14. Inner double blast door entrance to perimeter acquisition radar ...
14. Inner double blast door entrance to perimeter acquisition radar building security area - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
DSCOVR Spacecraft Arrival, Offload, & Unpacking
2014-11-20
NOAA’s Deep Space Climate Observatory spacecraft, or DSCOVR, wrapped in plastic and secured onto a portable work stand, makes a short trek from the airlock of Building 2 to the high bay of Building 1 at the Astrotech payload processing facility.
Zhou, Ming; Zheng, Xiliang; Wang, Jin; Dong, Shaojun
2011-02-01
Biofuel cells (BFCs) based on enzymes and microbes are the promising future alternative sources of sustainable electrical energy under mild conditions (i.e. ambient temperature and neutral pH). By combining the adaptive behavior of BFCs self-regulating energy release with the versatility of biocomputing, we construct a novel gas-controlled biocomputing security system, which could be used as the potential implantable self-powered and 'smart' medical system with the logic diagnosis aim. We have demonstrated a biocomputing security system based on BFCs. Due to the unique 'RESET' reagent of N(2) applied in this work, the prepared biocomputing security system can be reset and cycled for a large number of times with no 'RESET' reagent-based 'waste'. This would be advantageous for the potential practical applications of such keypad lock as well as the development of biocomputing security devices. In order to validate the universality of the system and also to harvest energy directly from biofuels with enhanced power output, we replace the glucose with orange juice as the biofuel to operate BFCs-based biocomputing system, which also possesses the function of keypad lock. In addition, by introducing BFCs into the biocomputing security system, the adaptive behavior of the BFCs self-regulating the power release would be an immense advantage of such security keypad lock devices in potential self-powered implantable medical systems. The designed sequence gives the maximum power output and discriminate itself from the rest of the sequences. From this, we find that maximizing the dimensionless ratio of gap versus SD of the power output spectrum (a funnel in power outputs) gives the quantitative optimal design criterion. Therefore, our construction here may also provide a practical example and microscopic structural basis for mimicking the real biological network systems and bridge the gaps between the theoretical concepts and experiments important for biomolecular systems and synthetic biology.
Issues in electric power in India: Challenges and opportunities
NASA Astrophysics Data System (ADS)
Tongia, Rahul
This dissertation provides an examination of three facets of the Indian power program. The first issue we analyze is the current regulatory environment and guidelines in place for independent power producers and other generators, focusing on possible tradeoffs between prices and investor returns. The analysis shows that investor rates of return are significantly higher than the nominal 16% as stipulated by the Central Electricity Authority guidelines, and an uncertainty analysis reveals the relative importance of various input and project parameters. We discuss problems with the existing guidelines, and provide options for changes in policy. Adoption of modified guidelines that are more transparent and do not focus on project capital structures are likely to result in more affordable tariffs, less delays in project completion and yet provide adequate rates of return for investors. India's nuclear power program is based on indigenous materials and technology, with the potential for providing energy security for many decades. We examine the technical validity of this plan, especially the role of fast breeder reactors for extending the domestic uranium supplies. The analysis shows that breeding is unlikely to occur at anywhere near the rates envisioned, leading to a slow growth of fast breeder reactors. In addition, domestic uranium reserves restrict growth of Pressurized Heavy Water Reactors, which are likely to be the main contributors to nuclear capacity in the short term. To increase the share of nuclear power in the coming decades, India should consider the construction of a number of large thermal reactors based on indigenous and imported uranium. We also present policy options for such changes to India's nuclear power program. This dissertation examines in detail the policy, technology, and economics of an overland pipeline supplying natural gas to India and Pakistan. Such a pipeline would be shared by both countries, and would be a strong confidence building measure, offering a unique opportunity for cooperation. As natural gas pipelines exhibit significant economies of scale, a shared pipeline would also offer the lowest price natural gas for both countries. This study addresses some of the potential concerns, suggesting options for overcoming security of supply worries. (Abstract shortened by UMI.)
The Acceptance Strategy for Nuclear Power Plant In Indonesia
DOE Office of Scientific and Technical Information (OSTI.GOV)
Suhaemi, Tjipta; Syaukat, Achmad
2010-06-22
Indonesia has planned to build nuclear power plants. Some feasibility studies have been conducted intensively. However, the processes of NPP introduction are still uncertain. National Energy Plan in Indonesia, which has been made by some governmental agencies, does not yet give positive impact to the government decision to construct the nuclear power plant (NPP). This paper discusses the process of NPP introduction in Indonesia, which has been colored with debate of stakeholder and has delayed decision for go-nuclear. The technology paradigm is used to promote NPP as an alternative of reliable energy resources. This paradigm should be complemented with internationalmore » politic-economic point of view. The international politic-economic point of view shows that structural powers, consisting of security, production, finance, and knowledge structures, within which the NPP is introduced, have dynamic characteristics. The process of NPP introduction in Indonesia contains some infrastructure development (R and D, legislation, regulation, energy planning, site study, public acceptance efforts, etc), but they need a better coherent NPP implementation program and NPP Acceptance Program. Strategic patterns for NPP acceptance described in this paper are made by considering nuclear regulation development and the interest of basic domestic participation. The first NPP program in Indonesia having proven technology and basic domestic participation is and important milestone toward and optimal national energy-mix.« less
Impact of Clean Energy R&D on the U.S. Power Sector
DOE Office of Scientific and Technical Information (OSTI.GOV)
Donohoo-Vallett, Paul; Mai, Trieu; Mowers, Matthew
The U.S. government, along with other governments, private corporations and organizations, invests significantly in research, development, demonstration and deployment (RDD&D) activities in clean energy technologies, in part to achieve the goal of a clean, secure, and reliable energy system. While specific outcomes and breakthroughs resulting from RDD&D investment are unpredictable, it can be instructive to explore the potential impacts of clean energy RDD&D activities in the power sector and to place those impacts in the context of current and anticipated market trends. This analysis builds on and leverages analysis by the U.S. Department of Energy (DOE) titled “Energy CO 2more » Emissions Impacts of Clean Energy Technology Innovation and Policy” (DOE 2017). Similar to DOE (2017), we explore how additional improvements in cost and performance of clean energy technologies could impact the future U.S. energy system; however, unlike the economy-wide modeling used in DOE (2017) our analysis is focused solely on the electricity sector and applies a different and more highly spatially-resolved electric sector model. More specifically, we apply a scenario analysis approach to explore how assumed further advancements in clean electricity technologies would impact power sector generation mix, electricity system costs, and power sector carbon dioxide (CO 2) emissions.« less
Automatic Learning of Fine Operating Rules for Online Power System Security Control.
Sun, Hongbin; Zhao, Feng; Wang, Hao; Wang, Kang; Jiang, Weiyong; Guo, Qinglai; Zhang, Boming; Wehenkel, Louis
2016-08-01
Fine operating rules for security control and an automatic system for their online discovery were developed to adapt to the development of smart grids. The automatic system uses the real-time system state to determine critical flowgates, and then a continuation power flow-based security analysis is used to compute the initial transfer capability of critical flowgates. Next, the system applies the Monte Carlo simulations to expected short-term operating condition changes, feature selection, and a linear least squares fitting of the fine operating rules. The proposed system was validated both on an academic test system and on a provincial power system in China. The results indicated that the derived rules provide accuracy and good interpretability and are suitable for real-time power system security control. The use of high-performance computing systems enables these fine operating rules to be refreshed online every 15 min.
Within compound, from Gate House, looking northwest, Power Plant (Building ...
Within compound, from Gate House, looking northwest, Power Plant (Building 5761) to left, Electrical Substation (Building 5770) and Supply Warehouse (Building 5768) center, Satellite Communications Terminal (Building 5771) to far left - Beale Air Force Base, Perimeter Acquisition Vehicle Entry Phased-Array Warning System, End of Spencer Paul Road, north of Warren Shingle Road (14th Street), Marysville, Yuba County, CA
DOE Office of Scientific and Technical Information (OSTI.GOV)
Knipper, W.
This presentation builds on our response to events that pose, or have the potential to pose, a serious security or law enforcement risk and must be responded to and controlled in a clear a decisive fashion. We will examine some common concepts in the command and control of security-centric events.
Safeguarding Databases Basic Concepts Revisited.
ERIC Educational Resources Information Center
Cardinali, Richard
1995-01-01
Discusses issues of database security and integrity, including computer crime and vandalism, human error, computer viruses, employee and user access, and personnel policies. Suggests some precautions to minimize system vulnerability such as careful personnel screening, audit systems, passwords, and building and software security systems. (JKP)
2014-10-01
CRm CAL FA~WR£S Q I • Software Engineering Institute I Ccamt>gw l\\~llon Lniwndty 34 Basic attack tree Destroy Building Generate Sufficient...by computer-security company marketing literature that touts 11hacker proof software,11 11triple-DES security,11 and the like. In truth, unbreakable
75 FR 75187 - Sunshine Act Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-02
... SECURITIES AND EXCHANGE COMMISSION Sunshine Act Meeting Notice is hereby given, pursuant to the provisions of the Government in the Sunshine Act, Public Law 94-409, that the Securities and Exchange... liquidity, investor impact, self-regulation, accounting and Build America Bonds. The panel discussion and...
Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay
Hu, Hequn; Liao, Xuewen
2017-01-01
The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device’s messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission (PSST), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. PSST is analyzed for the proposed secure schemes, and the closed form expressions of PSST for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better PSST than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar PSST, the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations. PMID:28869540
A Real-Time Decision Support System for Voltage Collapse Avoidance in Power Supply Networks
NASA Astrophysics Data System (ADS)
Chang, Chen-Sung
This paper presents a real-time decision support system (RDSS) based on artificial intelligence (AI) for voltage collapse avoidance (VCA) in power supply networks. The RDSS scheme employs a fuzzy hyperrectangular composite neural network (FHRCNN) to carry out voltage risk identification (VRI). In the event that a threat to the security of the power supply network is detected, an evolutionary programming (EP)-based algorithm is triggered to determine the operational settings required to restore the power supply network to a secure condition. The effectiveness of the RDSS methodology is demonstrated through its application to the American Electric Power Provider System (AEP, 30-bus system) under various heavy load conditions and contingency scenarios. In general, the numerical results confirm the ability of the RDSS scheme to minimize the risk of voltage collapse in power supply networks. In other words, RDSS provides Power Provider Enterprises (PPEs) with a viable tool for performing on-line voltage risk assessment and power system security enhancement functions.
Reforming The U.S. Security Assistance Export Process To Build Existing Capabilities
2015-12-01
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA JOINT APPLIED PROJECT REFORMING THE U.S. SECURITY ASSISTANCE EXPORT PROCESS TO...December 2015 3. REPORT TYPE AND DATES COVERED Joint applied project 4. TITLE AND SUBTITLE REFORMING THE U.S. SECURITY ASSISTANCE EXPORT PROCESS TO...the programs. While acknowledging the expanding role of the programs, the findings indicate a need for reforms in the export -control mechanisms
Closing the Security Gap: Building Irregular Security Forces
2012-06-08
had mutinied against the British during the Second Sikh War. Lawrence had the Punjabi regiments disarmed and then demobilized. The British initially...contributed to the security problem.118 The British were primarily concerned with control of the Punjabi plains because its economic and agricultural...classes were allowed to carry arms. The British recruited the following tribes from within India: Rajput, Hindustani and Punjabi Brahman, Punjabi
The Acceptance Strategy for Nuclear Power Plant In Indonesia
NASA Astrophysics Data System (ADS)
Suhaemi, Tjipta; Syaukat, Achmad
2010-06-01
THE ACCEPTANCE STRATEGY FOR NUCLEAR POWER PLANT IN INDONESIA. Indonesia has planned to build nuclear power plants. Some feasibility studies have been conducted intensively. However, the processes of NPP introduction are still uncertain. National Energy Plan in Indonesia, which has been made by some governmental agencies, does not yet give positive impact to the government decision to construct the nuclear power plant (NPP). This paper discusses the process of NPP introduction in Indonesia, which has been colored with debate of stakeholder and has delayed decision for go-nuclear. The technology paradigm is used to promote NPP as an alternative of reliable energy resources. This paradigm should be complemented with international politic-economic point of view. The international politic-economic point of view shows that structural powers, consisting of security, production, finance, and knowledge structures, within which the NPP is introduced, have dynamic characteristics. The process of NPP introduction in Indonesia contains some infrastructure development (R&D, legislation, regulation, energy planning, site study, public acceptance efforts, etc), but they need a better coherent NPP implementation program and NPP Acceptance Program. Strategic patterns for NPP acceptance described in this paper are made by considering nuclear regulation development and the interest of basic domestic participation. The first NPP program in Indonesia having proven technology and basic domestic participation is and important milestone toward and optimal national energy-mix.
Unlocking User-Centered Design Methods for Building Cyber Security Visualizations
2015-10-03
a final, deployed tool. Goodall et al. interviewed analysts to derive requirements for a network security tool [14], while Stoll et al. explain the...4673-7599-3/15/$31.00 c©2015 IEEE 2015 IEEE SYMPOSIUM ON VISUALIZATION FOR CYBER SECURITY (VIZSEC) [14] J. R. Goodall , A. A. Ozok, W. G. Lutters, P...Visualization for Cyber Security, pages 91–98. IEEE, 2005. [19] A. Komlodi, P. Rheingans, U. Ayachit, J. Goodall , and A. Joshi. A user- centered look at
Multipath Routing of Fragmented Data Transfer in a Smart Grid Environment
NASA Astrophysics Data System (ADS)
Borgohain, Tuhin; Borgohain, Amardeep; Borgohain, Rajdeep; Sanyal, Sugata
2015-02-01
The purpose of this paper is to do a general survey on the existing communication modes inside a smart grid, the existing security loopholes and their countermeasures. Then we suggest a detailed countermeasure, building upon the Jigsaw based secure data transfer [8] for enhanced security of the data flow inside the communication system of a smart grid. The paper has been written without the consideration of any factor of inoperability between the various security techniques inside a smart grid
1988-03-31
MARCI 1988 iAm U m WI 4EUnclT CLSIIAION OF THIS PAGE REPORT DOCUMENTATION PAGE is REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS 2.. SECUR ...logistics system of the future more capable of supporting the full spectrumn of war 20 OISTRIaSUTION.’AVAILAeILiTY 0" ABSTRACT 21 ABSTRACT SECURITY ... SECURITY CLASSIFICATION OT: THIS PAGF Unclas ’SCUFUTY Cý= I!FICATION OF THIS PAGE 1,Qwcont.) scenarios. Today’s logistics processes assume wartime
16. Photocopy of photograph, 1942 (original print on file at ...
16. Photocopy of photograph, 1942 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). VIEW OF CONSTRUCTION OF BUILDING 401. - Arlington Hall Station, Building No. 401, 4000 Arlington Boulevard, Arlington, Arlington County, VA
DSCOVR Spacecraft Arrival, Offload, & Unpacking
2014-11-20
A forklift is enlisted to move NOAA’s Deep Space Climate Observatory spacecraft, or DSCOVR, wrapped in plastic and secured onto a portable work stand, from the airlock of Building 2 to the high bay of Building 1 at the Astrotech payload processing facility.
19 CFR 149.5 - Eligibility to file an Importer Security Filing, authorized agents.
Code of Federal Regulations, 2010 CFR
2010-04-01
... data interchange system. If the Importer Security Filing and entry or entry summary are provided via a... must retain powers of attorney in English until revoked. Revoked powers of attorney and letters of...
Deep Bore Storage of Nuclear Waste Using MMW (Millimeter Wave) Technology. Full Project Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Oglesby, Kenneth D.; Woskov, Paul; Einstein, Herbert
This DOE Nuclear STTR project DE-SC001238 investigated the use of MMW directed energy to form rock melt and steel plugs in deep wellbores to further isolate highly radioactive nuclear waste in ultra-deep basement rocks for long term storage. This current project builds upon a prior DOE project, DE-EE0005504, which developed the basic low power, low 28 GHz frequency waveguide setup, process and instruments. This research adds to our understanding of using MMW power to melt and vaporize rocks and steel/ metals and laid plans for future higher power field prototype testing. This technology also has potential for deep well drillingmore » for nuclear storage, geothermal and oil and gas industries. It also has the potential for simultaneously sealing and securing the wellbore with a thick rock melt liner as the wellbore is drilled, called 'mono-bore drilling'. This allows for higher levels of safety and protection of the environment during deep drilling operations while providing vast cost savings. The larger purpose of this project was to find answers to key questions in developing MMW technology for its many subsurface applications.« less
Novel Power Electronics Three-Dimensional Heat Exchanger: Preprint
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bennion, K.; Cousineau, J.; Lustbader, J.
2014-08-01
Electric drive systems for vehicle propulsion enable technologies critical to meeting challenges for energy, environmental, and economic security. Enabling cost-effective electric drive systems requires reductions in inverter power semiconductor area. As critical components of the electric drive system are made smaller, heat removal becomes an increasing challenge. In this paper, we demonstrate an integrated approach to the design of thermal management systems for power semiconductors that matches the passive thermal resistance of the packaging with the active convective cooling performance of the heat exchanger. The heat exchanger concept builds on existing semiconductor thermal management improvements described in literature and patents,more » which include improved bonded interface materials, direct cooling of the semiconductor packages, and double-sided cooling. The key difference in the described concept is the achievement of high heat transfer performance with less aggressive cooling techniques by optimizing the passive and active heat transfer paths. An extruded aluminum design was selected because of its lower tooling cost, higher performance, and scalability in comparison to cast aluminum. Results demonstrated a heat flux improvement of a factor of two, and a package heat density improvement over 30%, which achieved the thermal performance targets.« less
2014-09-18
the power plant and mechanical systems, the “Noisy” building, and the “Quiet” building...6040 m² Garage (buried): 835 m² Cargo Arch (buried) : 1640 m² Power Plant (buried) : 600 m² Fuel Arch (buried) : 1325 m² Habitat: 1640 m...Laboratory: 210 m² Garage: 2623 m² Total: 4473 m² Main Bldgs.: 1612 m² Power plant : 188 m² Population Summer: 52 Winter: 16 Summer (3 mo.): 150
Modeling and Analysis of Remote, Off-grid Microgrids
NASA Astrophysics Data System (ADS)
Madathil, Sreenath Chalil
Over the past century the electric power industry has evolved to support the delivery of power over long distances with highly interconnected transmission systems. Despite this evolution, some remote communities are not connected to these systems. These communities rely on small, disconnected distribution systems, i.e., microgrids, to deliver power. Power distribution in most of these remote communities often depend on a type of microgrid called "off-grid microgrids". However, as microgrids often are not held to the same reliability standards as transmission grids, remote communities can be at risk to experience extended blackouts. Recent trends have also shown an increased use of renewable energy resources in power systems for remote communities. The increased penetration of renewable resources in power generation will require complex decision making when designing a resilient power system. This is mainly due to the stochastic nature of renewable resources that can lead to loss of load or line overload during their operations. In the first part of this thesis, we develop an optimization model and accompanying solution algorithm for capacity planning and operating microgrids that include N-1 security and other practical modeling features (e.g., AC power flow physics, component efficiencies and thermal limits). We demonstrate the effectiveness of our model and solution approach on two test systems: a modified version of the IEEE 13 node test feeder and a model of a distribution system in a remote Alaskan community. Once a tractable algorithm was identified to solve the above problem, we develop a mathematical model that includes topology design of microgrids. The topology design includes building new lines, making redundant lines, and analyzing N-1 contingencies on generators and lines. We develop a rolling horizon algorithm to efficiently analyze the model and demonstrate the strength of our algorithm in the same network. Finally, we develop a stochastic model that considers generation uncertainties along with N-1 security on generation assets. We develop a chance-constrained model to analyze the efficacy of the problem under consideration and present a case study on an adapted IEEE-13 node network. A successful implementation of this research could help remote communities around the world to enhance their quality of life by providing them with cost-effective, reliable electricity.
David J. Nowak; Nathaniel Appleton; Alexis Ellis; Eric Greenfield
2017-01-01
Urban trees and forests alter building energy use and associated emissions from power plants by shading buildings, cooling air temperatures and altering wind speeds around buildings. Field data on urban trees were combined with local urban/community tree and land cover maps, modeling of tree effects on building energy use and pollutant emissions, and state energy and...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-30
..., June 4, 2013--1:00 p.m. Until 5:00 p.m. The Subcommittee will review and discuss all cyber security... Flint North building, 11555 Rockville Pike, Rockville, MD. After registering with security, please...
Moving toward energy security and sustainability in 2050 by reconfiguring biofuel production
USDA-ARS?s Scientific Manuscript database
To achieve energy security and sustainability by 2050 requires reconfiguring biofuel production both by building on current infrastructure and existing technology and also by making substantial improvements and changes in the feedstocks used, the process technologies applied, and the fuels produced....
75 FR 27863 - Notice of Open Public Hearing
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-18
... U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION Notice of Open Public Hearing AGENCY: U.S.-China Economic and Security Review Commission. ACTION: Update to notice of open public hearing--May 20, 2010, Washington, DC. Room changed to 562 Dirksen Senate Office Building. [[Page 27864
ERIC Educational Resources Information Center
Spoor, Dana L.
1996-01-01
School districts are integrating security and life-safety systems into school buildings to protect students and property. This proactive approach includes sprinkler systems, fire alarms, and security systems that monitor door movement. Some school districts that are incorporating the latest life-safety technology are in Missouri, Ohio, California,…
26 CFR 1.141-4 - Private security or payment test.
Code of Federal Regulations, 2014 CFR
2014-04-01
... the property (for example, records of costs of a building that was built 30 years before the... proceeds of $10 million. B uses $9.7 million of the proceeds to construct a 10-story office building. B... leases 1 floor of the building for the term of the bonds. Under all of the facts and circumstances, it is...
26 CFR 1.141-4 - Private security or payment test.
Code of Federal Regulations, 2013 CFR
2013-04-01
... the property (for example, records of costs of a building that was built 30 years before the... proceeds of $10 million. B uses $9.7 million of the proceeds to construct a 10-story office building. B... leases 1 floor of the building for the term of the bonds. Under all of the facts and circumstances, it is...
26 CFR 1.141-4 - Private security or payment test.
Code of Federal Regulations, 2012 CFR
2012-04-01
... the property (for example, records of costs of a building that was built 30 years before the... proceeds of $10 million. B uses $9.7 million of the proceeds to construct a 10-story office building. B... leases 1 floor of the building for the term of the bonds. Under all of the facts and circumstances, it is...
26 CFR 1.141-4 - Private security or payment test.
Code of Federal Regulations, 2011 CFR
2011-04-01
... the property (for example, records of costs of a building that was built 30 years before the... proceeds of $10 million. B uses $9.7 million of the proceeds to construct a 10-story office building. B... leases 1 floor of the building for the term of the bonds. Under all of the facts and circumstances, it is...
DOE Office of Scientific and Technical Information (OSTI.GOV)
O'Neil, Lori Ross; Assante, Michael; Tobey, D. H.
2013-07-01
This document is a summarization of the report, Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs, the final report for phase 2 of the SPSP (DOE workforce study) project.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-17
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Griffin Mining, Inc., Power Sports Factory, Inc., Star Energy Corp., TransNet Corp., Valcom, Inc., and Vibe Records, Inc.; Order of... information concerning the securities of Power Sports Factory, Inc. because it has not filed any periodic...
Foundational Security Principles for Medical Application Platforms* (Extended Abstract)
Vasserman, Eugene Y.; Hatcliff, John
2014-01-01
We describe a preliminary set of security requirements for safe and secure next-generation medical systems, consisting of dynamically composable units, tied together through a real-time safety-critical middleware. We note that this requirement set is not the same for individual (stand-alone) devices or for electronic health record systems, and we must take care to define system-level requirements rather than security goals for components. The requirements themselves build on each other such that it is difficult or impossible to eliminate any one of the requirements and still achieve high-level security goals. PMID:25599096
1989-01-01
Center, Panama City 314 Diver Training Building Addition 4,300 4 ,300 50 180 Subtotal 4,300 4,300 Navy Experimental Diving Unit 182 Panama City 347 ...Air Force 001 Security Training Center 4,500 4,500 100 345 Subtotal .4,500 4,500 TOTAL FOR TAS 28,220 28,220 Virginia Naval SecuritY Goui Activity 347 ...Building Addition 4,300 C NEDU Panama City, FL 347 Underwater Equipment Support Complex 2,900 C NPWC Pensacola, FL 109 Wastewater Transfer System 2,100 C
Low-power secure body area network for vital sensors toward IEEE802.15.6.
Kuroda, Masahiro; Qiu, Shuye; Tochikubo, Osamu
2009-01-01
Many healthcare/medical services have started using personal area networks, such as Bluetooth and ZigBee; these networks consist of various types of vital sensors. These works focus on generalized functions for sensor networks that expect enough battery capacity and low-power CPU/RF (Radio Frequency) modules, but less attention to easy-to-use privacy protection. In this paper, we propose a commercially-deployable secure body area network (S-BAN) with reduced computational burden on a real sensor that has limited RAM/ROM sizes and CPU/RF power consumption under a light-weight battery. Our proposed S-BAN provides vital data ordering among sensors that are involved in an S-BAN and also provides low-power networking with zero-administration security by automatic private key generation. We design and implement the power-efficient media access control (MAC) with resource-constraint security in sensors. Then, we evaluate the power efficiency of the S-BAN consisting of small sensors, such as an accessory type ECG and ring-type SpO2. The evaluation of power efficiency of the S-BAN using real sensors convinces us in deploying S-BAN and will also help us in providing feedbacks to the IEEE802.15.6 MAC, which will be the standard for BANs.
11. EAST WALL OF POWER PLANT BUILDING LOOKING WEST. ...
11. EAST WALL OF POWER PLANT BUILDING LOOKING WEST. - Potomac Power Plant, On West Virginia Shore of Potomac River, about 1 mile upriver from confluence with Shenandoah River, Harpers Ferry, Jefferson County, WV
All Optical Solution for Free Space Optics Point to Point Links
NASA Astrophysics Data System (ADS)
Hirayama, Daigo
Optical network systems are quickly replacing electrical network systems. Optical systems provide better bandwidth, faster data rates, better security to networks, and are less susceptible to noise. Free Space Optics (systems) still rely on numerous electrical systems such as the modulation and demodulation systems to convert optical signals to electrical signals for the transmitting laser. As the concept of the entirely optical network becomes more realizable, the electrical components of the FSO system will become a hindrance to communications. The focus of this thesis is to eliminate the electrical devices for the FSO point to point links by replacing them with optical devices. The concept is similar to an extended beam connector. However, where an extended beam connector deals with a gap of a few millimeters, my focus looks at distances from 100 meters to one kilometer. The aim is to achieve a detectable signal of 1nW at a distance of 500 meters at a wavelength of 1500-1600nm. This leads to application in building to building links and mobile networks. The research examines the design of the system in terms of generating the wave, the properties of the fiber feeding the wave, and the power necessary to achieve a usable distance. The simulation is executed in Code V by Synopsys, which is an industry standard to analyze optical systems. A usable device with a range of around 500m was achieved with an input power of 1mW. The approximations of the phase function resulted in some aberrations to the profile of the beam, but were not very detrimental to the function of the device. The removal of electrical devices from a FSO point to point link decreased the power used to establish the link and decreased the cost.
Energy and Cost Optimized Technology Options to Meet Energy Needs of Food Processors
DOE Office of Scientific and Technical Information (OSTI.GOV)
Makhmalbaf, Atefe; Srivastava, Viraj; Hoffman, Michael G.
ABSTRACT Combined cooling, heating and electric power (CCHP) distributed generation (DG) systems can provide electricity, heat, and cooling power to buildings and industrial processes directly onsite, while significantly increasing energy efficiency, security of energy supply, and grid independence. Fruit, vegetable, dairy and meat processing industries with simultaneous requirements for heat, steam, chilling and electricity, are well suited for the use of such systems to supply base-load electrical demand or as peak reducing generators with heat recovery in the forms of hot water, steam and/or chilled water. This paper documents results and analysis from a pilot project to evaluate opportunities formore » energy, emission, and cost for CCHP-DG and energy storage systems installed onsite at food processing facilities. It was found that a dairy processing plant purchasing 15,000 MWh of electricity will need to purchase 450 MWh with the integration of a 1.1 MW CCHP system. Here, the natural gas to be purchased increased from 190,000 MMBtu to 255,000 MMBtu given the fuel requirements of the CCHP system. CCHP systems lower emissions, however, in the Pacific Northwest the high percentage of hydro-power results in CO2 emissions from CCHP were higher than that attributed to the electric utility/regional energy mix. The value of this paper is in promoting and educating financial decision makers to seriously consider CCHP systems when building or upgrading facilities. The distributed generation aspect can reduce utility costs for industrial facilities and show non-wires solution benefits to delay or eliminate the need for upgrades to local electric transmission and distribution systems.« less
2015-05-21
lie outside their span of control. This monograph therefore assumes no significant changes to whole-of- government collaboration, legislated ...with several other military and whole-of-government BPC efforts. Security cooperation and security assistance (SA) are legislated portfolios of...Plan Colombia, the campaign proposed in 1999 by the Colombian President to reduce internal conflict, led to increased US confidence and support for
Developing Ministerial Collaborative Planning Capacity
2012-03-14
1204, Arlington, VA 22202- 4302. Respondents should be aware that notwithstanding any other provision of law , no person shall be subject to any...to build capacity and legitimacy within a host nation’s security sector. Providing a safe and secure environment founded on the rule of law is the...6 Vision: A highly efficient ministry capable of providing security and stability for all components of society, applying the rule of law and
Private Military and Security Companies - Counterinsurgency and Nation Building Strategy
2013-04-25
cans, and bought war bonds is long gone. One advantage that the private sector brings to public wars is capacity. Companies like Kellogg and Brown...1 Anne-Marie Buzatu, and Benjamin S . Buckland, “Private Military & Security Companies : Future Challenges in...From -‐ To) September 2012 - April 2013 4. TITLE AND SUBTITLE Private Military and Security Companies - Counterinsurgency and
Fortress America: The Aesthetics of Homeland Security in the Public Realm
2017-09-01
people in a bombing attack on a federal building in Oklahoma City. Americans were stunned by this first modern domestic terrorist attack. The bombing ...Order 12977, signed by President Clinton six months after the bombing , created the Interagency Security Committee (ISC) to address physical security...barricades installed shortly after the Oklahoma City bombing . Later in the article, Brown quotes Stephen Kliment, editor of the Architectural Record
Sea Piracy in Southeast Asia: Implications for Countering Maritime Terrorism in the United States
2006-06-01
least ten agencies that have some involvement in maritime security management with nine authorized to conduct law enforcement operations at sea...exercises, cooperating on consequence management , and sustaining capacity building operations .173 The United States has important bilateral security...Overview and Evaluation,” Journal of Homeland Security and Emergency Management 2, no. 4 (2005). 221 Frittelli, “Terminal Operators ,” 2006, 3
It’s Not New: Historical U.S. Army Security Forces Assistance Efforts
2012-12-06
obligation.30 In a recent article published by Small Wars Journal, Kip Whittington , a research associate at the National Defense University...operations in Afghanistan, Whittington believes that building capable indigenous national security institutions meets U.S. and international security...29Ibid., 11. 30Ibid. 31Kip Whittington , “An Afghanistan Without Institutions: A World Without Rest,” Small Wars Journal 8, no. 2 (February 2012
Code of Federal Regulations, 2010 CFR
2010-04-01
... tanks containing spirits, denatured spirits, or wine shall be individually locked or locked within an... wines or the rooms or buildings in which they are housed, shall be equipped so that they may be secured... lights, alarm systems, guard services) or changes in construction, arrangement, or equipment shall be...
78 FR 19278 - Federal Property Suitable as Facilities To Assist the Homeless
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-29
... Kirtland AFB Kirtland AFB NM 87117 Landholding Agency: Air Force Property Number: 18201220011 Status... SE Kirtland AFB NM 87117 Landholding Agency: Air Force Property Number: 18201220012 Status.../out comprising nat'l security. Reasons: Secured Area 6 Buildings Kirtland AFB Kirtland AFB NM 87117...
12 CFR 1250.2 - Procedural requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... requirements. (a) Procedures. An Enterprise shall implement procedures reasonably designed to ensure for any loan that is secured by improved real estate or a mobile home located in an area that has been... amended and purchased by the Enterprise, the building or mobile home and any personal property securing...
Requirements, model and prototype for a multi-utility locational and security information hub.
DOT National Transportation Integrated Search
2015-11-01
This project lays the foundation for building an exchange hub for locational and security data and risk assessment of potential excavation work. It acts primarily at 2 stages: upstream of the mark-out process, as a decision support tool to help strea...
Cloud-Based Virtual Laboratory for Network Security Education
ERIC Educational Resources Information Center
Xu, Le; Huang, Dijiang; Tsai, Wei-Tek
2014-01-01
Hands-on experiments are essential for computer network security education. Existing laboratory solutions usually require significant effort to build, configure, and maintain and often do not support reconfigurability, flexibility, and scalability. This paper presents a cloud-based virtual laboratory education platform called V-Lab that provides a…
DOT National Transportation Integrated Search
2001-08-01
This study assesses how to manage the effects or outcomes of organizational change on job security and employee commitment in transit systems using trust-building, empowerment, employee reassurance, and job redesign strategies. The major findings are...
78 FR 56953 - Sunshine Act Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-16
... SECURITIES AND EXCHANGE COMMISSION Sunshine Act Meeting Notice is hereby given, pursuant to the provisions of the Government in the Sunshine Act, Public Law 94-409, that the Securities and Exchange... headquarters building, to hear oral argument in an appeal by Montford and Company, Inc., d/b/a Montford...
32 CFR 228.13 - Disturbances on protected property.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 2 2014-07-01 2014-07-01 false Disturbances on protected property. 228.13... (CONTINUED) MISCELLANEOUS SECURITY PROTECTIVE FORCE § 228.13 Disturbances on protected property. Any conduct which impedes or threatens the security of protected property, or any buildings or persons thereon, or...
32 CFR 228.13 - Disturbances on protected property.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 2 2013-07-01 2013-07-01 false Disturbances on protected property. 228.13... (CONTINUED) MISCELLANEOUS SECURITY PROTECTIVE FORCE § 228.13 Disturbances on protected property. Any conduct which impedes or threatens the security of protected property, or any buildings or persons thereon, or...
32 CFR 228.13 - Disturbances on protected property.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 2 2012-07-01 2012-07-01 false Disturbances on protected property. 228.13... (CONTINUED) MISCELLANEOUS SECURITY PROTECTIVE FORCE § 228.13 Disturbances on protected property. Any conduct which impedes or threatens the security of protected property, or any buildings or persons thereon, or...
32 CFR 228.13 - Disturbances on protected property.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 2 2011-07-01 2011-07-01 false Disturbances on protected property. 228.13... (CONTINUED) MISCELLANEOUS SECURITY PROTECTIVE FORCE § 228.13 Disturbances on protected property. Any conduct which impedes or threatens the security of protected property, or any buildings or persons thereon, or...
32 CFR 228.13 - Disturbances on protected property.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 2 2010-07-01 2010-07-01 false Disturbances on protected property. 228.13... (CONTINUED) MISCELLANEOUS SECURITY PROTECTIVE FORCE § 228.13 Disturbances on protected property. Any conduct which impedes or threatens the security of protected property, or any buildings or persons thereon, or...
75 FR 55370 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-10
... Securities and Exchange Commission (``Commission'') has submitted to the Office of Management and Budget a... Affairs, Office of Management and Budget, Room 10102, New Executive Office Building, Washington, DC 20503... settlement price for each cash-settled security futures product fairly reflect the opening price of the...
77 FR 66351 - Establishing the White House Homeland Security Partnership Council
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-02
... resources more efficiently, build on one another's expertise, drive innovation, engage in collective action... utilizing diverse perspectives, skills, tools, and resources. The National Security Strategy emphasizes the importance of partnerships, underscoring that to keep our Nation safe ``we must tap the ingenuity outside...
77 FR 73464 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-10
..., grantees, volunteers, interns, and others performing or working on a contract, service, grant, cooperative... tape records are stored in locked file rooms, locked file cabinets, or locked safes. RETRIEVABILITY... safeguarded in a secured environment. Buildings where records are stored have security cameras and 24-hour...
Building a gateway with open source software for secure-DICOM communication over insecure networks
NASA Astrophysics Data System (ADS)
Emmel, Dirk; Ricke, Jens; Stohlmann, Lutz; Haderer, Alexander; Felix, Roland
2002-05-01
For Teleradiology the exchange of DICOM-images is needed for several purposes. Existing solutions often don't consider about the needs for data security and data privacy. Communication is done without any encryption over insecure networks or with encryption using proprietary solutions, which reduces the data communication possibilities to partners with the same equipment. Our goal was to build a gateway, which offers a transparent solution for secure DICOM-communication in a heterogeneous environment We developed a PC-based gateway system with DICOM-communication to the in-house network and secure DICOM communication for the communication over the insecure network. One gateway installed at each location is responsible for encryption/decryption. The sender just transfers the image data over the DICOM protocol to the local gateway. The gateway forwards the data to the gateway on the destination site using the secure DICOM protocol, which is part of the DICOM standard. The receiving gateway forwards the image data to the final destination again using the DICOM-Protocol. The gateway is based on Open Source software and runs under several operating systems. Our experience shows a reliable solution, which solves security issues for DICOM communication of image data and integrates seamless into a heterogeneous DICOM environment.
2013-10-01
exchange (COBie), Building Information Modeling ( BIM ), value-added analysis, business processes, project management 16. SECURITY CLASSIFICATION OF: 17...equipment. The innovative aspect of Building In- formation Modeling ( BIM ) is that it creates a computable building descrip- tion. The ability to use a...interoperability. In order for the building information to be interoperable, it must also con- form to a common data model , or schema, that defines the class
Kochanska, Grazyna; Barry, Robin A.; Stellern, Sarah A.; O’Bleness, Jessica J.
2009-01-01
This multi-method study of 101 mothers, fathers, and children elucidates poorly understood role of children’s attachment security as moderating a common maladaptive trajectory: from parental power assertion, to child resentful opposition, to child antisocial conduct. Children’s security was assessed at 15 months, parents’ power assertion observed at 25 and 38 months, children’s resentful opposition to parents observed at 52 months, and antisocial conduct rated by parents at 67 months. Moderated mediation analyses indicated that in insecure dyads, parental power assertion predicted children’s resentful opposition, which then predicted antisocial conduct. This mechanism was absent in secure dyads. Early insecurity acts as a catalyst for a dyad embarking on mutually adversarial path toward antisocial outcomes, whereas early security defuses this maladaptive trajectory. PMID:19630909
DOE Office of Scientific and Technical Information (OSTI.GOV)
Duran, Felicia Angelica; Waymire, Russell L.
2013-10-01
Sandia National Laboratories (SNL) is providing training and consultation activities on security planning and design for the Korea Hydro and Nuclear Power Central Research Institute (KHNPCRI). As part of this effort, SNL performed a literature review on computer security requirements, guidance and best practices that are applicable to an advanced nuclear power plant. This report documents the review of reports generated by SNL and other organizations [U.S. Nuclear Regulatory Commission, Nuclear Energy Institute, and International Atomic Energy Agency] related to protection of information technology resources, primarily digital controls and computer resources and their data networks. Copies of the key documentsmore » have also been provided to KHNP-CRI.« less
McCutchan, E. A.; Brown, D. A.; Sonzogni, A. A.
2017-03-30
Databases of evaluated nuclear data form a cornerstone on which we build academic nuclear structure physics, reaction physics, astrophysics, and many applied nuclear technologies. In basic research, nuclear data are essential for selecting, designing and conducting experiments, and for the development and testing of theoretical models to understand the fundamental properties of atomic nuclei. Likewise, the applied fields of nuclear power, homeland security, stockpile stewardship and nuclear medicine, all have deep roots requiring evaluated nuclear data. Each of these fields requires rapid and easy access to up-to-date, comprehensive and reliable databases. The DOE-funded US Nuclear Data Program is a specificmore » and coordinated effort tasked to compile, evaluate and disseminate nuclear structure and reaction data such that it can be used by the world-wide nuclear physics community.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
McCutchan, E. A.; Brown, D. A.; Sonzogni, A. A.
Databases of evaluated nuclear data form a cornerstone on which we build academic nuclear structure physics, reaction physics, astrophysics, and many applied nuclear technologies. In basic research, nuclear data are essential for selecting, designing and conducting experiments, and for the development and testing of theoretical models to understand the fundamental properties of atomic nuclei. Likewise, the applied fields of nuclear power, homeland security, stockpile stewardship and nuclear medicine, all have deep roots requiring evaluated nuclear data. Each of these fields requires rapid and easy access to up-to-date, comprehensive and reliable databases. The DOE-funded US Nuclear Data Program is a specificmore » and coordinated effort tasked to compile, evaluate and disseminate nuclear structure and reaction data such that it can be used by the world-wide nuclear physics community.« less
Within compound, from Guard Tower, looking southeast, Power Plant (Building ...
Within compound, from Guard Tower, looking southeast, Power Plant (Building 5761) to left, Satellite Communications Terminal (Building 5771) center, Supply Warehouse (Building 5768) to left - Beale Air Force Base, Perimeter Acquisition Vehicle Entry Phased-Array Warning System, End of Spencer Paul Road, north of Warren Shingle Road (14th Street), Marysville, Yuba County, CA
Security Assessment Of A Turbo-Gas Power Plant
NASA Astrophysics Data System (ADS)
Masera, Marcelo; Fovino, Igor Nai; Leszczyna, Rafal
Critical infrastructures are exposed to new threats due to the large number of vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies. This paper presents the results of an exhaustive security assessment for a turbo-gas power plant.
Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ashok, Aditya; Govindarasu, Manimaran; Wang, Jianhui
Cyber security and resiliency of Wide-Area Monitoring, Protection and Control (WAMPAC) applications is critically important to ensure secure, reliable, and economic operation of the bulk power system. WAMPAC relies heavily on the security of measurements and control commands transmitted over wide-area communication networks for real-time operational, protection, and control functions. Also, the current “N-1 security criteria” for grid operation is inadequate to address malicious cyber events and therefore it is important to fundamentally redesign WAMPAC and to enhance Energy Management System (EMS) applications to make them attack-resilient. In this paper, we propose an end-to-end defense-in-depth architecture for attack-resilient WAMPAC thatmore » addresses resilience at both the infrastructure layer and the application layers. Also, we propose an attack-resilient cyber-physical security framework that encompasses the entire security life cycle including risk assessment, attack prevention, attack detection, attack mitigation, and attack resilience. The overarching objective of this paper is to provide a broad scope that comprehensively describes most of the major research issues and potential solutions in the context of cyber-physical security of WAMPAC for the power grid.« less
Nuclear Power Plant Cyber Security Discrete Dynamic Event Tree Analysis (LDRD 17-0958) FY17 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wheeler, Timothy A.; Denman, Matthew R.; Williams, R. A.
Instrumentation and control of nuclear power is transforming from analog to modern digital assets. These control systems perform key safety and security functions. This transformation is occurring in new plant designs as well as in the existing fleet of plants as the operation of those plants is extended to 60 years. This transformation introduces new and unknown issues involving both digital asset induced safety issues and security issues. Traditional nuclear power risk assessment tools and cyber security assessment methods have not been modified or developed to address the unique nature of cyber failure modes and of cyber security threat vulnerabilities.more » iii This Lab-Directed Research and Development project has developed a dynamic cyber-risk in- formed tool to facilitate the analysis of unique cyber failure modes and the time sequencing of cyber faults, both malicious and non-malicious, and impose those cyber exploits and cyber faults onto a nuclear power plant accident sequence simulator code to assess how cyber exploits and cyber faults could interact with a plants digital instrumentation and control (DI&C) system and defeat or circumvent a plants cyber security controls. This was achieved by coupling an existing Sandia National Laboratories nuclear accident dynamic simulator code with a cyber emulytics code to demonstrate real-time simulation of cyber exploits and their impact on automatic DI&C responses. Studying such potential time-sequenced cyber-attacks and their risks (i.e., the associated impact and the associated degree of difficulty to achieve the attack vector) on accident management establishes a technical risk informed framework for developing effective cyber security controls for nuclear power.« less
8 CFR 103.34 - Security of records systems.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Security of records systems. 103.34 Section 103.34 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS POWERS AND DUTIES; AVAILABILITY OF RECORDS § 103.34 Security of records systems. The security of records systems...
10. WEST WALL OF POWER PLANT BUILDING LOOKING EAST SOUTHEAST. ...
10. WEST WALL OF POWER PLANT BUILDING LOOKING EAST SOUTHEAST. - Potomac Power Plant, On West Virginia Shore of Potomac River, about 1 mile upriver from confluence with Shenandoah River, Harpers Ferry, Jefferson County, WV
Operational Management of Area Environment.
ERIC Educational Resources Information Center
Sprague, George W.
Three phases leading to the automation of the mechanical building systems on the Harvard campus are described. The systems allow a single operator to monitor and control all the mechanical systems, plus fire, flood, and security alarms, for all buildings in a large area of the campus. (JT)
15. Photocopy of photograph, 1942 (original print on file at ...
15. Photocopy of photograph, 1942 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). VIEW OF CONSTRUCTION OF BUILDING 401. NOTE PLATFORM-TYPE CONSTRUCTION. - Arlington Hall Station, Building No. 401, 4000 Arlington Boulevard, Arlington, Arlington County, VA
29. Photocopy of photograph, ca. 1930 (original print on file ...
29. Photocopy of photograph, ca. 1930 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). VIEW TO SOUTHEAST OF MAIN BUILDING OF ARLINGTON HALL JUNIOR COLLEGE. - Arlington Hall Station, Main Building, 4000 Arlington Boulevard, Arlington, Arlington County, VA
17. Photocopy of photograph, 1942 (original print on file at ...
17. Photocopy of photograph, 1942 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). VIEW TO SOUTH OF INTERIOR OF ONE OF BUILDING'S WINGS. - Arlington Hall Station, Building No. 401, 4000 Arlington Boulevard, Arlington, Arlington County, VA
2016-03-09
building human capital and institutions. As such countries as Colombia, Georgia, Romania, and South Korea improved their own governance, for example...institution-building and human capital investments, Congress might consider ways to encourage DoD to consistently prioritize activities that strengthen a
UNDERSTANDING POLLUTANT DISPERSION IN AN URBAN NEIGHBORHOOD
Work has been focused on urban air quality and homeland security issues, modeling the complex airflow patterns in cities and around buildings (e.g. the World Trade Center site in Lower Manhattan, and the Pentagon building in Washington, D.C.). These experimental studies have con...
77 FR 15003 - Passive Activity Losses and Credits Limited; Hearing
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-14
... Service Building, 1111 Constitution Avenue NW., Washington, DC 20224. Due to building security procedures, visitors must enter at the Constitution Avenue entrance. In addition, all visitors must present photo..., Internal Revenue Service, 1111 Constitution Avenue NW., Washington, DC or sent electronically via the...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Branch, Kristi M.; Baker, Kathryn A.
A technical letter report to the NRC summarizing the findings of a benchmarking study, literature review, and workshop with experts on current industry standards and expert judgments about needs for security during the construction phase of critical infrastructure facilities in the post-September 11 U.S. context, with a special focus on the construction phase of nuclear power plants and personnel security measures.
Credit BG. View looking north northeast at Guard House and ...
Credit BG. View looking north northeast at Guard House and entrance to Building 4505 complex. This Guard House was built in 1993 as a portable unit; it replaced an older structure. The Building 4505 complex is surrounded by a security fence. Building 4496 appears to immediate right of view - Edwards Air Force Base, North Base, Guard House, Northeast of A Street, Boron, Kern County, CA
ERIC Educational Resources Information Center
Chipley, Michael; Lyon, Wesley; Smilowitz, Robert; Williams, Pax; Arnold, Christopher; Blewett, William; Hazen, Lee; Krimgold, Fred
2012-01-01
This publication, part of the new Building and Infrastructure Protection Series (BIPS) published by the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) Infrastructure Protection and Disaster Management Division (IDD), serves to advance high performance and integrated design for buildings and infrastructure. This…
Spring Ankle with Regenerative Kinetics to Build a New Generation of Transtibial Prostheses
2008-07-31
form factor that is portable to the wearer. The objective is to build a transtibial prosthesis that will support a Military amputee’s return to...active duty. 15. SUBJECT TERMS Transtibial Prosthesis , regenerative, spring, wearable robot 16. SECURITY CLASSIFICATION OF: 17. LIMITATION...Regenerative Kinetics” to build a new generation of transtibial prostheses Keywords: Transtibial Prosthesis , regenerative, spring, wearable robot
Oil market power and United States national security
Stern, Roger
2006-01-01
It is widely believed that an oil weapon could impose scarcity upon the United States. Impending resource exhaustion is thought to exacerbate this threat. However, threat seems implausible when we consider strategic deficits of prospective weapon users and the improbability of impending resource exhaustion. Here, we explore a hypothesis relating oil to national security under a different assumption, abundance. We suggest that an oil cartel exerts market power to keep abundance at bay, commanding monopoly rents [or wealth transfers (wt)] that underwrite security threats. We then compare security threats attributed to the oil weapon to those that may arise from market power. We first reexamine whether oil is abundant or scarce by reviewing current development data, then we estimate a competitive price for oil. From this, we derive wt2004 collections by Persian Gulf states ≈ $132-178 × 109. We find that wt and the behavior of states collecting it interact to actuate security threats. Threats underwritten by wt are (i) the potential for emergence of a Persian Gulf superpower and (ii) terrorism. It is therefore oil market power, not oil per se, that actuates threats. We also describe a paradox in the relation of market power to the United States' defense doctrine of force projection to preempt a Gulf superpower. Because the superpower threat derives from wt, force alone cannot preempt it. A further paradox is that because foreign policy is premised on oil weapon fear, market power is appeased. Threats thereby grow unimpeded. PMID:16428291
78 FR 29147 - Federal Property Suitable as Facilities To Assist the Homeless
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-17
...: Excess Comments: off-site removal only; 9,822 sf.; BDE HQ; repairs needed; asbestos; secured area....; Admin.; repairs needed; asbestos; secured area; contact Army for access/removal requirements Building...: Excess Comments: off-site removal only; 15,484 sf.; Admin.; 4 months vacant; repairs needed; asbestos...
77 FR 12353 - Shipping Coordinating Committee; Notice of Committee Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-29
...); Provision of financial security in cases of abandonment, personal injury to, or death of seafarers related to entry into force of the International Labour Organization Maritime Labour Convention, 2006; Fair... to the seating capacity of the room. To facilitate the building security process, and to request...
Is Your Center Burglar/Vandal Proofed? Guidelines for Protecting Your Center.
ERIC Educational Resources Information Center
Adams, Shawn
1998-01-01
Identifies specific steps that child care centers can take to reduce the chances of burglary and vandalism. Differentiates loss prevention, loss control, and risk financing. Includes discussion of layering defenses, perimeter protection, security lighting, building surface security, locks, and alarm systems. Discusses the importance of reducing…
49 CFR 178.75 - Specifications for MEGCs.
Code of Federal Regulations, 2010 CFR
2010-10-01
... be designed and constructed with supports to provide a secure base during transport and with lifting... pressure build-up. (iv) The main isolation valves on a MEGC must be clearly marked to indicate their... constructed with a support structure to provide a secure base during transport. MEGCs must be protected...
49 CFR 178.75 - Specifications for MEGCs.
Code of Federal Regulations, 2011 CFR
2011-10-01
... be designed and constructed with supports to provide a secure base during transport and with lifting... pressure build-up. (iv) The main isolation valves on a MEGC must be clearly marked to indicate their... constructed with a support structure to provide a secure base during transport. MEGCs must be protected...
Moving Secure Software Assurance into Higher Education: A Roadmap for Change
2011-06-02
Summarized: The Issue: 6/2/20118 Software defects are currently a fact of life Software defects are avenues of security vulnerabilities that cyber ... criminals , terrorists, or hostile nations can exploit. We (THE ENTIRE INDUSTY) need to change the way we build systems Decrease the number of defects
7 CFR 3560.103 - Maintaining housing projects.
Code of Federal Regulations, 2011 CFR
2011-01-01
... common areas, must be free of trash, litter, and debris. Public walkways, walls of buildings and common... lighting and functional interior lighting in common areas which permits safe access and security. (ix... coverings that are intact, securely attached, and in good condition. Brick veneers must be free of missing...
75 FR 6416 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-09
... Securities and Exchange Commission (``Commission'') has submitted to the Office of Management and Budget this... Regulatory Affairs, Office of Management and Budget, Room 10102, New Executive Office Building, Washington... to register securities that are offered for cash upon the exercise of rights that are granted to a...
Central Libraries in Uncertain Times.
ERIC Educational Resources Information Center
Kenney, Brian J.
2001-01-01
Discusses security and safety issues for public libraries, especially high-profile central facilities, in light of the September 11 terrorist attacks. Highlights include inspecting bags as patrons enter as well as exit; the need for security guidelines for any type of disaster or emergency; building design; and the importance of communication.…
NASA Technical Reports Server (NTRS)
Barnett, Traci M.
2004-01-01
Safety and security is very important at NASA. The Security Management and Safeguards Office goal is ensure safety and security for all NASA Lewis and Plum Brook Station visitors and workers. The office protects against theft, sabotage, malicious damage, espionage, and other threats or acts of violence. There are three types of security at NASA: physical, IT, and personnel. IT is concerned with sensitive and classified information and computers. Physical security includes the officers who check visitors and workers in and patrol the facility. Personnel security is concerned with background checks during hiring. During my internship, I met people from and gained knowledge about all three types of security. I primarily worked with Dr. Richard Soppet in physical security. During my experience with physical security, I observed and worked with many aspects of it. I attended various security meetings at both NASA Lewis and Plum Brook. The meetings were about homeland security and other improvements that will be made to both facilities. I also spent time with a locksmith. The locksmith makes copies of keys and unlocks doors for people who need them. I rode around in a security vehicle with an officer as he patrolled. I also observed the officer make a search of a visitor s vehicle. All visitors vehicles are searched upon entering NASA. I spent time and observed in the dispatch office. The officer answers calls and sends out officers when needed. The officer also monitors the security cameras. My primary task was completing an emergency response manual. This manual would assist local law enforcement and fire agencies in case of an emergency. The manual has pictures and descriptions of the buildings. It also contains the information about hazards inside of the buildings. This information will be very helpul to law enforcement so that when called upon during an emergency, they will not create an even bigger problem with collateral damage.
8. VIEW OF WESTERN END OF THE POWER PLANT BUILDING ...
8. VIEW OF WESTERN END OF THE POWER PLANT BUILDING LOOKING NORTH. - Potomac Power Plant, On West Virginia Shore of Potomac River, about 1 mile upriver from confluence with Shenandoah River, Harpers Ferry, Jefferson County, WV
Secure provision of reactive power ancillary services in competitive electricity markets
NASA Astrophysics Data System (ADS)
El-Samahy, Ismael
The research work presented in this thesis discusses various complex issues associated with reactive power management and pricing in the context of new operating paradigms in deregulated power systems, proposing appropriate policy solutions. An integrated two-level framework for reactive power management is set forth, which is both suitable for a competitive market and ensures a secure and reliable operation of the associated power system. The framework is generic in nature and can be adopted for any electricity market structure. The proposed hierarchical reactive power market structure comprises two stages: procurement of reactive power resources on a seasonal basis, and real-time reactive power dispatch. The main objective of the proposed framework is to provide appropriate reactive power support from service providers at least cost, while ensuring a secure operation of the power system. The proposed procurement procedure is based on a two-step optimization model. First, the marginal benefits of reactive power supply from each provider, with respect to system security, are obtained by solving a loadability-maximization problem subject to transmission security constraints imposed by voltage and thermal limits. Second, the selected set of generators is determined by solving an optimal power flow (OPF)-based auction. This auction maximizes a societal advantage function comprising generators' offers and their corresponding marginal benefits with respect to system security, and considering all transmission system constraints. The proposed procedure yields the selected set of generators and zonal price components, which would form the basis for seasonal contracts between the system operator and the selected reactive power service providers. The main objective of the proposed reactive power dispatch model is to minimize the total payment burden on the Independent System Operator (ISO), which is associated with reactive power dispatch. The real power generation is decoupled and assumed to be fixed during the reactive power dispatch procedures; however, the effect of reactive power on real power is considered in the model by calculating the required reduction in real power output of a generator due to an increase in its reactive power supply. In this case, real power generation is allowed to be rescheduled, within given limits, from the already dispatched levels obtained from the energy market clearing process. The proposed dispatch model achieves the main objective of an ISO in a competitive electricity market, which is to provide the required reactive power support from generators at least cost while ensuring a secure operation of the power system. The proposed reactive power procurement and dispatch models capture both the technical and economic aspects of power system operation in competitive electricity markets; however, from an optimization point of view, these models represent non-convex mixed integer non-linear programming (MINLP) problems due to the presence of binary variables associated with the different regions of reactive power operation in a synchronous generator. Such MINLP optimization problems are difficult to solve, especially for an actual power system. A novel Generator Reactive Power Classification (GRPC) algorithm is proposed in this thesis to address this issue, with the advantage of iteratively solving the optimization models as a series of non-linear programming (NLP) sub-problems. The proposed reactive power procurement and dispatch models are implemented and tested on the CIGRE 32-bus system, with several case studies that represent different practical operating scenarios. The developed models are also compared with other approaches for reactive power provision, and the results demonstrate the robustness and effectiveness of the proposed model. The results clearly reveal the main features of the proposed models for optimal provision of reactive power ancillary service, in order to suit the requirements of an ISO under today's stressed system conditions in a competitive market environment.
Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay.
Hu, Hequn; Gao, Zhenzhen; Liao, Xuewen; Leung, Victor C M
2017-09-04
The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device's messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission ( P S S T ), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. P S S T is analyzed for the proposed secure schemes, and the closed form expressions of P S S T for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better P S S T than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar P S S T , the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations.
25. Perimeter acquisition radar building room #2M4, (mezzanine), power supply ...
25. Perimeter acquisition radar building room #2M4, (mezzanine), power supply room; computer power supply on left and water flow on right. This room is directly below data processing area (room #318). Sign on right reads: High purity water digital rack - Stanley R. Mickelsen Safeguard Complex, Perimeter Acquisition Radar Building, Limited Access Area, between Limited Access Patrol Road & Service Road A, Nekoma, Cavalier County, ND
NASA Astrophysics Data System (ADS)
Wang, Qiang
2017-09-01
As an important part of software engineering, the software process decides the success or failure of software product. The design and development feature of security software process is discussed, so is the necessity and the present significance of using such process. Coordinating the function software, the process for security software and its testing are deeply discussed. The process includes requirement analysis, design, coding, debug and testing, submission and maintenance. In each process, the paper proposed the subprocesses to support software security. As an example, the paper introduces the above process into the power information platform.
SYNAISTHISI: an IoT-powered smart visitor management and cognitive recommendations system
NASA Astrophysics Data System (ADS)
Thanos, Giorgos Konstandinos; Karafylli, Christina; Karafylli, Maria; Zacharakis, Dimitris; Papadimitriou, Apostolis; Dimitros, Kostantinos; Kanellopoulou, Konstantina; Kyriazanos, Dimitris M.; Thomopoulos, Stelios C. A.
2016-05-01
Location-based and navigation services are really needed to help visitors and audience of big events, complex buildings, shopping malls, airports and large companies. However, the lack of GPS and proper mapping indoors usually renders location-based applications and services useless or simply not applicable in such environments. SYNAISTHISI introduces a mobile application for smartphones which offers navigation capabilities outside and inside buildings and through multiple floor levels. The application comes together with a suite of helpful services, including personalized recommendations, visit/event management and a helpful search functionality in order to navigate to a specific location, event or person. As the user finds his way towards his destination, NFC-enabled checkpoints and bluetooth beacons assist him, while offering re-routing, check-in/out capabilities and useful information about ongoing meetings and nearby events. The application is supported by a back-end GIS system which can provide a broad and clear view to event organizers, campus managers and field personnel for purposes of event logistics, safety and security. SYNAISTHISI system comes with plenty competitive advantages including (a) Seamless Navigation as users move between outdoor and indoor areas and different floor levels by using innovative routing algorithms, (b) connection to and powered by IoT platform, for localization and real-time information feedback, (c) dynamic personalized recommendations based on user profile, location and real-time information provided by the IoT platform and (d) Indoor localization without the need for expensive infrastructure and installations.
28. CONTEXT VIEW OF BUILDING 229 (ELECTRIC POWER STATION) IN ...
28. CONTEXT VIEW OF BUILDING 229 (ELECTRIC POWER STATION) IN ASSEMBLY AREA WITH BUILDING 227 (FIRE STATION) IMMEDIATELY TO THE LEFT. - Loring Air Force Base, Weapons Storage Area, Northeastern corner of base at northern end of Maine Road, Limestone, Aroostook County, ME
2013-01-01
We introduce a protocol with a reconfigurable filter system to create non-overlapping single loops in the smart power grid for the realization of the Kirchhoff-Law-Johnson-(like)-Noise secure key distribution system. The protocol is valid for one-dimensional radial networks (chain-like power line) which are typical of the electricity distribution network between the utility and the customer. The speed of the protocol (the number of steps needed) versus grid size is analyzed. When properly generalized, such a system has the potential to achieve unconditionally secure key distribution over the smart power grid of arbitrary geometrical dimensions. PMID:23936164
Gonzalez, Elias; Kish, Laszlo B; Balog, Robert S; Enjeti, Prasad
2013-01-01
We introduce a protocol with a reconfigurable filter system to create non-overlapping single loops in the smart power grid for the realization of the Kirchhoff-Law-Johnson-(like)-Noise secure key distribution system. The protocol is valid for one-dimensional radial networks (chain-like power line) which are typical of the electricity distribution network between the utility and the customer. The speed of the protocol (the number of steps needed) versus grid size is analyzed. When properly generalized, such a system has the potential to achieve unconditionally secure key distribution over the smart power grid of arbitrary geometrical dimensions.
2007-12-01
Media Issues in Combating Terrorism • International Approaches • Ethics and Combating Terrorism • Restructuring the Security Sector for...Terrorism • Organized Crime and Terrorism • Civil-Military Cooperation and Terrorism • Ethics and Combating Terrorism • Border Control • Consequence...Simon. “Confl ict, Ecology and the Politics of Envrionmental Security.” Global Environmental Politics 2, No. 4 (November 2002): pp 25-130. 28
Governance: The Mission Ingredient in Security Cooperation
2017-06-09
assistance guiding principle of “do-no-harm,” should be included in the future DOS guidance. Seven do-no-harm lessons include: (1) norms and... principle of “do-no-harm.” 15. SUBJECT TERMS Security cooperation, security assistance, defense institution building, USAID, best practices...foreign assistance guiding principle of “do-no-harm,” should be included in the future DOS guidance. Seven do-no-harm lessons include: (1) norms and
Chemistry in a Large, Multidisciplinary Laboratory.
ERIC Educational Resources Information Center
Lingren, Wesley E.; Hughson, Robert C.
1982-01-01
Describes a science facility built at Seattle Pacific University for approximately 70 percent of the capital cost of a conventional science building. The building serves seven disciplines on a regular basis. The operation of the multidisciplinary laboratory, special features, laboratory security, and student experience/reactions are highlighted.…
Improving School Access Control
ERIC Educational Resources Information Center
National Clearinghouse for Educational Facilities, 2008
2008-01-01
Few things are more important for school safety and security than controlling access to buildings and grounds. It is relatively easy to incorporate effective access control measures in new school designs but more difficult in existing schools, where most building and site features cannot be readily altered or reconfigured. The National…
Europe’s Role in Nation-Building: From the Balkans to the Congo
2008-01-01
for nonmilitary international actors; thus, Con- cordia was primarily a confidence-building and liaison mission.22 As the EU’s first military mission...for security-sector reform. Con- cordia field teams collected intelligence from several sources, supported the police retraining and integration
27 CFR 19.189 - Identification of structures, areas, apparatus, and equipment.
Code of Federal Regulations, 2011 CFR
2011-04-01
... structures, areas, apparatus, and equipment. 19.189 Section 19.189 Alcohol, Tobacco Products and Firearms... Construction, Equipment, and Security Requirements Other Plant Requirements § 19.189 Identification of structures, areas, apparatus, and equipment. (a) Buildings. The proprietor must mark each building at a...
A study of operational cycle of terminal distributed power supply based on Big-data
NASA Astrophysics Data System (ADS)
Nie, Erbao; Liu, Zhoubin; He, Jinhong; Li, Chao
2018-01-01
In China, the distributed power supply industry enjoys a rapid development trend. For the users’ side of the distributed power mode of operation, there are various types. This paper, take rural as an example, mainly studies the all round life cycle operation mode of rural distributed solar power plant, including the feasibility study plan and investment suggestion of the initial construction of the rural power station, and the operation and maintenance in the middle period. China’s vast rural areas, areas per capita is large, average households have independent housing and courtyards, available building area is no problem. Compared with the urban areas, the return rate of investment is low, the investment options is rare, the collective is strong, the risk tolerance is weak and so on. Aiming at the characteristics of the rural areas in the above rural areas, three kinds of investment schemes of rural distributed photovoltaic power plants are put forward, and their concrete implementation plans are analyzed in detail. Especially the second option, for the farmers to consider the risk of investment, given their principal security, which greatly reduces the farmers into the power plant loss of funds risk. At the same time, according to the respective risk of farmers, given the corresponding investment advice. Rural income is generally low, the expected benefits of distributed photovoltaic power plant can significantly improve the income of farmers, improve the quality of life of farmers, coupled with the strong rural collective farmers, rural distributed photovoltaic power plants will mushroom, which On China’s photovoltaic construction and even the supply of clean energy is of great significance, so as to truly benefit the national energy strategy and rural construction.
Sandia National Laboratories: National Security Missions: Defense Systems
Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
Steady state security assessment in deregulated power systems
NASA Astrophysics Data System (ADS)
Manjure, Durgesh Padmakar
Power system operations are undergoing changes, brought about primarily due to deregulation and subsequent restructuring of the power industry. The primary intention of the introduction of deregulation in power systems was to bring about competition and improved customer focus. The underlying motive was increased economic benefit. Present day power system analysis is much different than what it was earlier, essentially due to the transformation of the power industry from being cost-based to one that is price-based and due to open access of transmission networks to the various market participants. Power is now treated as a commodity and is traded in an open market. The resultant interdependence of the technical criteria and the economic considerations has only accentuated the need for accurate analysis in power systems. The main impetus in security analysis studies is on efficient assessment of the post-contingency status of the system, accuracy being of secondary consideration. In most cases, given the time frame involved, it is not feasible to run a complete AC load flow for determining the post-contingency state of the system. Quite often, it is not warranted as well, as an indication of the state of the system is desired rather than the exact quantification of the various state variables. With the inception of deregulation, transmission networks are subjected to a host of multilateral transactions, which would influence physical system quantities like real power flows, security margins and voltage levels. For efficient asset utilization and maximization of the revenue, more often than not, transmission networks are operated under stressed conditions, close to security limits. Therefore, a quantitative assessment of the extent to which each transaction adversely affects the transmission network is required. This needs to be done accurately as the feasibility of the power transactions and subsequent decisions (execution, curtailment, pricing) would depend upon the outcome of the analysis. Also considering the large number of transactions occurring in the power market, and the massive sizes of transmission networks, the need for efficient analysis techniques is further highlighted. Thus on the whole, for present-day power systems, security assessment has acquired predominant importance. The primary emphasis of the work done in this dissertation is on development of techniques for fast assessment of the state of the transmission network following credible contingencies in traditional and deregulated power systems. In addition, methodologies for optimal correction strategies in the event of violation of security limits are also proposed. The work done can be enumerated as: (1) development of fast methods to assess the state of the transmission network from the point of view of loading margin and power flows, following increased loading conditions and line outages; (2) development of a comprehensive scheme to assess the impact of bilateral transactions on the operating state of the network; (3) optimal rescheduling of generation and curtailable loads for relieving the system of congestion and simultaneously maximizing the security margins.
Transboundary natural area protection: Broadening the definition of national security
Haven B. Cook
2007-01-01
This paper looks at the definition and concept of national security, and examines how the environment is linked with national security. The traditional, state view of national security that guides most foreign policy includes the concepts of military power, sovereignty and geopolitical stability. This paper advocates broadening the definition of security to include...
6. VIEW OF POWER PLANT BUILDING LOOKING NORTHWEST. DRY CANAL ...
6. VIEW OF POWER PLANT BUILDING LOOKING NORTHWEST. DRY CANAL BED TO THE LEFT. - Potomac Power Plant, On West Virginia Shore of Potomac River, about 1 mile upriver from confluence with Shenandoah River, Harpers Ferry, Jefferson County, WV
9. EXTERIOR PERSPECTIVE OF POWER PLANT BUILDING LOOKING NORTHEAST. DRY ...
9. EXTERIOR PERSPECTIVE OF POWER PLANT BUILDING LOOKING NORTHEAST. DRY CANAL BED IN FOREGROUND. - Potomac Power Plant, On West Virginia Shore of Potomac River, about 1 mile upriver from confluence with Shenandoah River, Harpers Ferry, Jefferson County, WV
7. EXTERIOR OF POWER PLANT BUILDING LOOKING NORTHWEST. DETAIL OF ...
7. EXTERIOR OF POWER PLANT BUILDING LOOKING NORTHWEST. DETAIL OF TRASH RACK IN FOREGROUND. - Potomac Power Plant, On West Virginia Shore of Potomac River, about 1 mile upriver from confluence with Shenandoah River, Harpers Ferry, Jefferson County, WV
Within compound, looking southeast Power Plant (Building 5761) to left, ...
Within compound, looking southeast Power Plant (Building 5761) to left, Satellite Communications Terminal (Building 5771), center - Beale Air Force Base, Perimeter Acquisition Vehicle Entry Phased-Array Warning System, End of Spencer Paul Road, north of Warren Shingle Road (14th Street), Marysville, Yuba County, CA
Science and Technology Review October/November 2009
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bearinger, J P
2009-08-21
This month's issue has the following articles: (1) Award-Winning Collaborations Provide Solutions--Commentary by Steven D. Liedle; (2) Light-Speed Spectral Analysis of a Laser Pulse--An optical device inspects and stops potentially damaging laser pulses; (3) Capturing Waveforms in a Quadrillionth of a Second--The femtoscope, a time microscope, improves the temporal resolution and dynamic range of conventional recording instruments; (4) Gamma-Ray Spectroscopy in the Palm of Your Hand--A miniature gamma-ray spectrometer provides increased resolution at a reduced cost; (5) Building Fusion Targets with Precision Robotics--A robotic system assembles tiny fusion targets with nanometer precision; (6) ROSE: Making Compiler Technology More Accessible--An open-sourcemore » software infrastructure makes powerful compiler techniques available to all programmers; (7) Restoring Sight to the Blind with an Artificial Retina--A retinal prosthesis could restore vision to people suffering from eye diseases; (8) Eradicating the Aftermath of War--A remotely operated system precisely locates buried land mines; (9) Compact Alignment for Diagnostic Laser Beams--A smaller, less expensive device aligns diagnostic laser beams onto targets; and (10) Securing Radiological Sources in Africa--Livermore and other national laboratories are helping African countries secure their nuclear materials.« less
RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks
Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon
2009-01-01
The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components. PMID:22412321
RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.
Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon
2009-01-01
The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.
Concentrated Solar Air Conditioning for Buildings Project
NASA Technical Reports Server (NTRS)
McLaughlin, Rusty
2010-01-01
This slide presentation reviews project to implement the use of solar power to provide air conditioning for NASA buildings. Included is an overall conceptual schematic, and an diagram of the plumbing and instrumentation for the project. The use of solar power to power air conditioning in buildings, particularly in the Southwest, could save a significant amount of money. DOD studies have concluded that air conditioning accounts for 30-60% of total energy expenditures.
NASA Technical Reports Server (NTRS)
Crabb, Michele D.; Woodrow, Thomas S. (Technical Monitor)
1995-01-01
With the fast growing popularity of the Internet, many organizations are racing to get onto the on-ramp to the Information Superhighway. However, with frequent headlines such as 'Hackers' break in at General Electric raises questions about the Net's Security', 'Internet Security Imperiled - Hackers steal data that could threaten computers world-wide' and 'Stanford Computer system infiltrated; Security fears grow', organizations find themselves rethinking their approach to the on-ramp. Is the Internet safe? What do I need to do to protect my organization? Will hackers try to break into my systems? These are questions many organizations are asking themselves today. In order to safely travel along the Information Superhighway, organizations need a strong security framework. Developing such a framework for a computer site, whether it be just a few dozen hosts or several thousand hosts is not an easy task. The security infrastructure for a site is often developed piece-by-piece in response to security incidents which have affected that site over time. Or worse yet, no coordinated effort has been dedicated toward security. The end result is that many sites are still poorly prepared to handle the security dangers of the Internet. This paper presents guidelines for building a successful security infrastructure. The problem is addressed in a cookbook style method. First is a discussion on how to identify your assets and evaluate the threats to those assets; next are suggestions and tips for identifying the weak areas in your security armor. Armed with this information we can begin to think about what you really need for your site and what you can afford. In this stage of the process we examine the different categories of security tools and products that are available and then present some tips for deciding what is best for your site.
2009-01-01
surfaces in buildings following a terrorist attack using CB agents. Vaporized hydrogen peroxide ( VHP ) and Cl02 are decontamination technologies that...decontaminant. The focus of this technical report is the evaluation of the building interior materials and the Steris VHP technology. 15. SUBJECT...TERMS Material Compatibility VHP vaporized hydrogen peroxide 16. SECURITY CLASSIFICATION OF: a. REPORT U b. ABSTRACT U c. THIS PAGE U 17
Human Security in the Asia-Pacific: In Australia’s National Interests?
2011-12-16
Australian doctrine does not clearly define instruments of national power, this research uses the U.S. military definition. In accordance with U.S. 9...military doctrine , the instruments of national power are diplomatic, informational, military, and economic.16 Australia has been a very secure...
5 CFR 9701.510 - Powers and duties of the Federal Labor Relations Authority.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Powers and duties of the Federal Labor Relations Authority. 9701.510 Section 9701.510 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY...) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.510...
Capacity building in indigenous men's groups and sheds across Australia.
Southcombe, Amie; Cavanagh, Jillian; Bartram, Timothy
2015-09-01
This article presents an investigation into capacity building, at the community level, in Aboriginal and Torres Strait Islander Men's Groups and Sheds. As safe men's spaces, Men's Groups and Sheds represent an ever-growing social, and health and well-being community service across Australia. The study is qualitative and employs 'yarning circles' (focus groups), semi-structured interviews and observations to gather data from 15 Groups/Sheds involving 45 men from urban, regional and remote communities. We found that capacity building is primarily about securing relationships between Group Leaders/Shed Co-ordinators and Government services. Capacity building establishes links to services such as Centrelink, Medicare, Department of Housing, Probation and Control, and positive outcomes such as Indigenous men securing housing and Centrelink payments. Capacity building results in better health outcomes and, educates and empowers men to improve their social, cultural, emotional and economic well-being. It helps men to better connect with family and community. The current research paves the way for countries worldwide to explore the conceptual and empirical approach of capacity building applicable to other Indigenous [and non-Indigenous] Men's Groups/Sheds. We recommend feasibilities studies, on approaches to capacity building in Indigenous Groups/Sheds, be carried out within urban, regional and remote regions across the country. © The Author (2014). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
Transaction-based building controls framework, Volume 2: Platform descriptive model and requirements
DOE Office of Scientific and Technical Information (OSTI.GOV)
Akyol, Bora A.; Haack, Jereme N.; Carpenter, Brandon J.
Transaction-based Building Controls (TBC) offer a control systems platform that provides an agent execution environment that meets the growing requirements for security, resource utilization, and reliability. This report outlines the requirements for a platform to meet these needs and describes an illustrative/exemplary implementation.
50 CFR 86.20 - What activities are eligible for funding?
Code of Federal Regulations, 2011 CFR
2011-10-01
... or privately owned boating infrastructure tie-up facilities. To be eligible you must: (1) Build these... nontrailerable recreational vessels; (3) Build these tie-up facilities in water deep enough for nontrailerable... fluctuation); (4) Provide security, safety, and service for these boats; and, (5) Install a pumpout station...
50 CFR 86.20 - What activities are eligible for funding?
Code of Federal Regulations, 2012 CFR
2012-10-01
... or privately owned boating infrastructure tie-up facilities. To be eligible you must: (1) Build these... nontrailerable recreational vessels; (3) Build these tie-up facilities in water deep enough for nontrailerable... fluctuation); (4) Provide security, safety, and service for these boats; and, (5) Install a pumpout station...
50 CFR 86.20 - What activities are eligible for funding?
Code of Federal Regulations, 2013 CFR
2013-10-01
... publicly or privately owned boating infrastructure tie-up facilities. To be eligible you must: (1) Build... transient nontrailerable recreational vessels; (3) Build these tie-up facilities in water deep enough for... of lowest fluctuation); (4) Provide security, safety, and service for these boats; and, (5) Install a...
12. Interior view of reception and secretarial space for legal ...
12. Interior view of reception and secretarial space for legal offices; showing wall mounted shelving and exterior window; center and south side of main section of building on top floor; view to southwest. - Ellsworth Air Force Base, Group Administration & Secure Storage Building, 2372 Westover Avenue, Blackhawk, Meade County, SD
12. Photocopy of photograph, 1932 (original print on file at ...
12. Photocopy of photograph, 1932 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). WIDE ANGLE OVERALL VIEW TO SOUTHWEST OF ARLINGTON HALL JUNIOR COLLEGE SHOWING MAIN BUILDING (BUILDING 1) AND POND. - Arlington Hall Station, 4000 Arlington Boulevard, Arlington, Arlington County, VA
31. Photocopy of photograph, ca. 1930 (original print on file ...
31. Photocopy of photograph, ca. 1930 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). VIEW TO NORTH OF SOUTH REAR OF MAIN BUILDING OF ARLINGTON HALL JUNIOR COLLEGE. - Arlington Hall Station, Main Building, 4000 Arlington Boulevard, Arlington, Arlington County, VA
11. Photocopy of photograph, ca. 1928 (original print on file ...
11. Photocopy of photograph, ca. 1928 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). OVERALL VIEW TO SOUTHWEST OF ARLINGTON HALL JUNIOR COLLEGE SHOWING POND AND MAIN BUILDING (BUILDING 1). - Arlington Hall Station, 4000 Arlington Boulevard, Arlington, Arlington County, VA
77 FR 67342 - North Pacific Fishery Management Council; Public Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-09
... . Please note that State or Federal ID will be required to enter the Federal Building in Juneau. Foreign... expedite security clearance at the Federal Building in Juneau. Additional information is posted on the.... Thompson, Acting Deputy Director, Office of Sustainable Fisheries, National Marine Fisheries Service. [FR...
77 FR 49781 - North Pacific Fishery Management Council; Public Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-17
.... AST. ADDRESSES: The meeting will be held in the 4th floor conference room at the Federal Building at... expedite security clearance at the Federal Building in Juneau. This public meeting will occur during the... 14, 2012. Tracey L. Thompson, Acting Deputy Director, Office of Sustainable Fisheries, National...
ERIC Educational Resources Information Center
Schwartz, Edward
The purpose of this eight-unit course is to explore the values and issues of modern urban neighborhoods. It focuses on how community leaders can apply the broad principle of justice to problems of security, reciprocity, and fellowship that face most neighborhoods today. The course is intended for use by community leaders in building community…
3 CFR 8672 - Proclamation 8672 of May 9, 2011. National Building Safety Month, 2011
Code of Federal Regulations, 2012 CFR
2012-01-01
... public and private sectors—to implement effective standards and codes that sustain safe and resilient structures. We need innovation and partnerships at all levels of society to develop transformative... Proclamation Building safety is a critical component of our homeland security, our personal and public safety...
23. Interior view of entrance corridor looking towards main stairway; ...
23. Interior view of entrance corridor looking towards main stairway; showing unoccupied corner office space and encased bulletin boards; center of main section of building on main floor; view to northeast. - Ellsworth Air Force Base, Group Administration & Secure Storage Building, 2372 Westover Avenue, Blackhawk, Meade County, SD
78 FR 26217 - National Building Safety Month, 2013
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-03
... Building Safety Month, 2013 By the President of the United States of America A Proclamation When natural.... This month, as we pay tribute to professionals who design, construct, and secure our infrastructure... standards. This month, we take up those tasks once more and recommit to safety in the year ahead. NOW...
Positive Approaches to Preventing School Violence: Peace Building in Schools and Communities.
ERIC Educational Resources Information Center
Plucker, Jonathan A.
2000-01-01
Violence-prevention measures at railroad crossings may not work at schools! This special issue highlights three approaches to dealing with youth violence: prevention (peace building); intervention (peace making); and security (peace keeping). The problem stems from incivility, lack of respect, and unconstructive communication. Diverse perspectives…
19 CFR 10.602 - Packing materials and containers for shipment.
Code of Federal Regulations, 2010 CFR
2010-04-01
...-Central America-United States Free Trade Agreement Rules of Origin § 10.602 Packing materials and....602 Section 10.602 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... into the United States. Accordingly, in applying the build-down, build-up, or net cost method for...
Protection of electronic health records (EHRs) in cloud.
Alabdulatif, Abdulatif; Khalil, Ibrahim; Mai, Vu
2013-01-01
EHR technology has come into widespread use and has attracted attention in healthcare institutions as well as in research. Cloud services are used to build efficient EHR systems and obtain the greatest benefits of EHR implementation. Many issues relating to building an ideal EHR system in the cloud, especially the tradeoff between flexibility and security, have recently surfaced. The privacy of patient records in cloud platforms is still a point of contention. In this research, we are going to improve the management of access control by restricting participants' access through the use of distinct encrypted parameters for each participant in the cloud-based database. Also, we implement and improve an existing secure index search algorithm to enhance the efficiency of information control and flow through a cloud-based EHR system. At the final stage, we contribute to the design of reliable, flexible and secure access control, enabling quick access to EHR information.
Building a strategic security organisation.
Howard, Mike
2016-01-01
In everyone's day-to-day jobs there is constant need to deal with current and newly detected matters. This is now a world of immediacy, driven by the cadence of the business and its needs. These concerns should not be ignored, as failing to deal with these issues would not bode well for the future. It is essential that the gears are kept spinning. The challenge for any security organisation is to identify its short-term tactical requirements, while developing longer-term strategic needs. Once done, the differences can be accounted for and strides can be made toward a desired future state. This paper highlights several steps that the author and his team have taken in their own journey. There is no magic answer, each organisation will have its own unique challenges. Nevertheless, some of the approaches to building a strategic security organisation described in this paper are applicable to all organisations, irrespective of their size.
Tappero, Jordan W; Cassell, Cynthia H; Bunnell, Rebecca E; Angulo, Frederick J; Craig, Allen; Pesik, Nicki; Dahl, Benjamin A; Ijaz, Kashef; Jafari, Hamid; Martin, Rebecca
2017-12-01
To achieve compliance with the revised World Health Organization International Health Regulations (IHR 2005), countries must be able to rapidly prevent, detect, and respond to public health threats. Most nations, however, remain unprepared to manage and control complex health emergencies, whether due to natural disasters, emerging infectious disease outbreaks, or the inadvertent or intentional release of highly pathogenic organisms. The US Centers for Disease Control and Prevention (CDC) works with countries and partners to build and strengthen global health security preparedness so they can quickly respond to public health crises. This report highlights selected CDC global health protection platform accomplishments that help mitigate global health threats and build core, cross-cutting capacity to identify and contain disease outbreaks at their source. CDC contributions support country efforts to achieve IHR 2005 compliance, contribute to the international framework for countering infectious disease crises, and enhance health security for Americans and populations around the world.
A Survey on Next-generation Power Grid Data Architecture
DOE Office of Scientific and Technical Information (OSTI.GOV)
You, Shutang; Zhu, Dr. Lin; Liu, Yong
2015-01-01
The operation and control of power grids will increasingly rely on data. A high-speed, reliable, flexible and secure data architecture is the prerequisite of the next-generation power grid. This paper summarizes the challenges in collecting and utilizing power grid data, and then provides reference data architecture for future power grids. Based on the data architecture deployment, related research on data architecture is reviewed and summarized in several categories including data measurement/actuation, data transmission, data service layer, data utilization, as well as two cross-cutting issues, interoperability and cyber security. Research gaps and future work are also presented.
The spatial frequencies influence the aesthetic judgment of buildings transculturally.
Vannucci, Manila; Gori, Simone; Kojima, Haruyuki
2014-01-01
Recent evidence has shown that buildings designed to be high-ranking, according to the Western architectural decorum, have more impact on the minds of their beholders than low-ranking buildings. Here we investigated whether and how the aesthetic judgment for high- and low-ranking buildings was affected by differences in cultural expertise and by power spectrum differences. A group of Italian and Japanese participants performed aesthetic judgment tasks, with line drawings of high- and low-ranking buildings and with their random-phase versions (an image with the exact power spectrum of the original one but non-recognizable anymore). Irrespective of cultural expertise, high-ranking buildings and their relative random-phase versions received higher aesthetic judgments than low-ranking buildings and their random-phase versions. These findings indicate that high- and low-ranking buildings are differentiated for their aesthetic value and they show that low-level visual processes influence the aesthetic judgment based on differences in the stimuli power spectrum, irrespective of the influence of cultural expertise.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-06
... and Control building (PC&C); (6) a PC&C building; (7) an approximately 460-foot-long, 3.3-kilovolt (kV) power cable bringing power from the PC&C building to the 12-kV Puget Sound Energy grid; and (8...
School Building Design: The Building as an Instructional Tool.
ERIC Educational Resources Information Center
Rakestraw, William E.
1979-01-01
Concepts used in the design of a Dallas school make the building an integral part of the instructional program. These concepts include instrumented resource consumption, wind powered electrical generating capabilities, solar powered domestic hot water system, grey water cycling and sampling capabilities, and mechanical systems monitoring.…
Within compound, looking northwest, Power Plant (Building 5761) and Guard ...
Within compound, looking northwest, Power Plant (Building 5761) and Guard Tower (Building 5762) to left, Electrical Substation to right - Beale Air Force Base, Perimeter Acquisition Vehicle Entry Phased-Array Warning System, End of Spencer Paul Road, north of Warren Shingle Road (14th Street), Marysville, Yuba County, CA
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kovacic, Don N.; Stewart, Scott; Erickson, Alexa R.
There is increasing global discourse on how the elements of nuclear safety, security, and safeguards can be most effectively implemented in nuclear power programs. While each element is separate and unique, they must nevertheless all be addressed in a country’s laws and implemented via regulations and in facility operations. This topic is of particular interest to countries that are currently developing the infrastructure to support nuclear power programs. These countries want to better understand what is required by these elements and how they can manage the interfaces between them and take advantages of any synergies that may exist. They needmore » practical examples and guidance in this area in order to develop better organizational strategies and technical capacities. This could simplify their legal, regulatory, and management structures and avoid inefficient approaches and costly mistakes that may not be apparent to them at this early stage of development. From the perspective of IAEA International Safeguards, supporting Member States in exploring such interfaces and synergies provides a benefit to them because it acknowledges that domestic safeguards in a country do not exist in a vacuum. Instead, it relies on a strong State System of Accounting and Control that is in turn dependent on a capable and independent regulatory body as well as a competent operator and technical staff. These organizations must account for and control nuclear material, communicate effectively, and manage and transmit complete and correct information to the IAEA in a timely manner. This, while in most cases also being responsible for the safety and security of their facilities. Seeking efficiencies in this process benefits international safeguards and nonproliferation. This paper will present the results of a global survey of current and anticipated approaches and practices by countries and organizations with current or future nuclear power programs on how they are implementing, or planning to implement, safety, security, and safeguards in their programs. The idea is to capture current knowledge and thinking on this topic and to identify common themes in organizations and management. It will also document the most commonly held ideas and perception (and misperceptions) of what it means to manage interfaces and take advantage of synergies for operating nuclear facilities and those that are building their infrastructures. It is desired that the results of this paper will inform the current discourse on this topic with some quantitative data and identify any general trends in understanding.« less
Shao, Chaofeng; Tian, Xiaogang; Guan, Yang; Ju, Meiting; Xie, Qiang
2013-05-21
Selecting indicators based on the characteristics and development trends of a given study area is essential for building a framework for assessing urban ecological security. However, few studies have focused on how to select the representative indicators systematically, and quantitative research is lacking. We developed an innovative quantitative modeling approach called the grey dynamic hierarchy analytic system (GDHAS) for both the procedures of indicator selection and quantitative assessment of urban ecological security. Next, a systematic methodology based on the GDHAS is developed to assess urban ecological security comprehensively and dynamically. This assessment includes indicator selection, driving force-pressure-state-impact-response (DPSIR) framework building, and quantitative evaluation. We applied this systematic methodology to assess the urban ecological security of Tianjin, which is a typical coastal super megalopolis and the industry base in China. This case study highlights the key features of our approach. First, 39 representative indicators are selected for the evaluation index system from 62 alternative ones available through the GDHAS. Second, the DPSIR framework is established based on the indicators selected, and the quantitative assessment of the eco-security of Tianjin is conducted. The results illustrate the following: urban ecological security of Tianjin in 2008 was in alert level but not very stable; the driving force and pressure subsystems were in good condition, but the eco-security levels of the remainder of the subsystems were relatively low; the pressure subsystem was the key to urban ecological security; and 10 indicators are defined as the key indicators for five subsystems. These results can be used as the basis for urban eco-environmental management.
Shao, Chaofeng; Tian, Xiaogang; Guan, Yang; Ju, Meiting; Xie, Qiang
2013-01-01
Selecting indicators based on the characteristics and development trends of a given study area is essential for building a framework for assessing urban ecological security. However, few studies have focused on how to select the representative indicators systematically, and quantitative research is lacking. We developed an innovative quantitative modeling approach called the grey dynamic hierarchy analytic system (GDHAS) for both the procedures of indicator selection and quantitative assessment of urban ecological security. Next, a systematic methodology based on the GDHAS is developed to assess urban ecological security comprehensively and dynamically. This assessment includes indicator selection, driving force-pressure-state-impact-response (DPSIR) framework building, and quantitative evaluation. We applied this systematic methodology to assess the urban ecological security of Tianjin, which is a typical coastal super megalopolis and the industry base in China. This case study highlights the key features of our approach. First, 39 representative indicators are selected for the evaluation index system from 62 alternative ones available through the GDHAS. Second, the DPSIR framework is established based on the indicators selected, and the quantitative assessment of the eco-security of Tianjin is conducted. The results illustrate the following: urban ecological security of Tianjin in 2008 was in alert level but not very stable; the driving force and pressure subsystems were in good condition, but the eco-security levels of the remainder of the subsystems were relatively low; the pressure subsystem was the key to urban ecological security; and 10 indicators are defined as the key indicators for five subsystems. These results can be used as the basis for urban eco-environmental management. PMID:23698700
2014-05-22
capacity of several Oil Coast nations through building accountable institutions, 56William Brownfield , Assistant Security of State for International...Maturation of a New U.S. Combatant Command. Carlisle, PA: Strategic Studies Institute, 2013. Brownfield , William. Assistant Security of State for
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-21
... DEPARTMENT OF COMMERCE Bureau of Industry and Security President's Export Council; Subcommittee on... Administration (PECSEA) will meet on June 4, 2013, 9:30 a.m. (pacific daylight time), at Boeing Defense, Space and Security, Space and Intelligence Systems, Building S24, Conference Center, 2020 East Imperial...
Cybersecurity Education: Bridging the Gap between Hardware and Software Domains
ERIC Educational Resources Information Center
Lukowiak, Marcin; Radziszowski, Stanislaw; Vallino, James; Wood, Christopher
2014-01-01
With the continuous growth of cyberinfrastructure throughout modern society, the need for secure computing and communication is more important than ever before. As a result, there is also an increasing need for entry-level developers who are capable of designing and building practical solutions for systems with stringent security requirements.…
16 CFR 802.64 - Acquisitions of voting securities by certain institutional investors.
Code of Federal Regulations, 2010 CFR
2010-01-01
... building and loan company or association; (4) Trust company; (5) Insurance company; (6) Investment company registered with the U.S. Securities and Exchange Commission under the Investment Company Act of 1940 (15 U.S...) or (a)(5); (9) Small Business Investment Company or Minority Enterprise Small Business Investment...
16 CFR 802.64 - Acquisitions of voting securities by certain institutional investors.
Code of Federal Regulations, 2011 CFR
2011-01-01
... building and loan company or association; (4) Trust company; (5) Insurance company; (6) Investment company registered with the U.S. Securities and Exchange Commission under the Investment Company Act of 1940 (15 U.S...) or (a)(5); (9) Small Business Investment Company or Minority Enterprise Small Business Investment...
Well Played: The Origins and Future of Playfulness
ERIC Educational Resources Information Center
Gordon, Gwen
2014-01-01
In this article, the author synthesizes research from several disciplines to shed light on play's central role in healthy development. Gordon builds on research in attachment theory that correlates secure attachment in infancy with adult well-being to demonstrate how playfulness might be a lifelong outcome of secure attachment and a primary…
Design and Emergence of a Pedagogical Online Infosec Laboratory as an Ensemble Artefact
ERIC Educational Resources Information Center
Iqbal, Sarfraz
2016-01-01
Information security (InfoSec) education becomes increasingly important. Building hands-on capabilities to tackle challenges is a precondition to mitigate and eliminate cyber threats. Existing studies, however, show that the field lacks pedagogically founded information security laboratories that can be used flexibly to educate both on-campus and…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-24
... focuses on the unique aspects of nuclear safety and security and highlights the Commission's expectations... safety culture and (2) high level descriptions or traits of areas important to safety culture. The... NRC headquarters. Please allow time at both locations to register with building security upon entering...