Sample records for energy security implications

  1. 10 CFR 709.13 - Implications of refusal to take a polygraph examination.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Implications of refusal to take a polygraph examination. 709.13 Section 709.13 Energy DEPARTMENT OF ENERGY COUNTERINTELLIGENCE EVALUATION PROGRAM CI Evaluation Protocols and Protection of National Security § 709.13 Implications of refusal to take a polygraph...

  2. Threats to US energy security: the challenge of Arab oil

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Phillips, J.

    1979-08-13

    Assured access to foreign oil supplies is a vital national interest of the United States which has been repeatedly jeopardized in the 1970s and one that will face additional critical challenges in the 1980s. This paper identifies and analyzes various threats to US energy security both in terms of their past use and future usability. Since the most ominous threat to US energy security is posed in connection with the Arab-Israeli conflict, the paper focuses on the Arab oil weapon, although the energy-security implications of the Iranian revolution are also assessed.

  3. German Energy Security and Its Implications on Regional Security

    DTIC Science & Technology

    2016-12-01

    Daniel Moran THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this...280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. 239-18 ii THIS PAGE INTENTIONALLY LEFT BLANK iii Approved for public...independence.17 In the 1980s and 1990s, Esakova points out that energy security took a more economic form , with countries focusing on protecting their

  4. Fueling the dragon: Alternative Chinese oil futures and their implications for the United States

    NASA Astrophysics Data System (ADS)

    Eberling, George G.

    This study examines how Chinese oil energy will likely shape future Sino-American relations under conditions of dependency and non-dependency. The study will list and describe three possible Chinese oil energy futures or scenarios (Competitive Dependency, Competitive Surplus and Cooperative Surplus) using Scenario Analysis to subsequently estimate their associated likelihoods using the PRINCE forecasting system and discuss and evaluate their strategic implications for the United States. Further, this study will determine the most likely oil energy future or scenario. Finally, the study will list and describe the most likely United States political, economic and/or military policy responses for each future or scenario. The study contributes to the literature on Chinese and United States energy security, foreign policy, political economy and political risk analysis by showing how China will most likely address its growing oil energy dependence and by determining what will be the most likely U.S. foreign policy consequences based on the most current literature available on energy security and foreign policy.

  5. Public views on multiple dimensions of security : nuclear waepons, terrorism, energy, and the environment : 2007.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.

    2008-01-01

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support formore » domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.« less

  6. A lightweight security scheme for wireless body area networks: design, energy evaluation and proposed microprocessor design.

    PubMed

    Selimis, Georgios; Huang, Li; Massé, Fabien; Tsekoura, Ioanna; Ashouei, Maryam; Catthoor, Francky; Huisken, Jos; Stuyt, Jan; Dolmans, Guido; Penders, Julien; De Groot, Harmke

    2011-10-01

    In order for wireless body area networks to meet widespread adoption, a number of security implications must be explored to promote and maintain fundamental medical ethical principles and social expectations. As a result, integration of security functionality to sensor nodes is required. Integrating security functionality to a wireless sensor node increases the size of the stored software program in program memory, the required time that the sensor's microprocessor needs to process the data and the wireless network traffic which is exchanged among sensors. This security overhead has dominant impact on the energy dissipation which is strongly related to the lifetime of the sensor, a critical aspect in wireless sensor network (WSN) technology. Strict definition of the security functionality, complete hardware model (microprocessor and radio), WBAN topology and the structure of the medium access control (MAC) frame are required for an accurate estimation of the energy that security introduces into the WBAN. In this work, we define a lightweight security scheme for WBAN, we estimate the additional energy consumption that the security scheme introduces to WBAN based on commercial available off-the-shelf hardware components (microprocessor and radio), the network topology and the MAC frame. Furthermore, we propose a new microcontroller design in order to reduce the energy consumption of the system. Experimental results and comparisons with other works are given.

  7. Climate Change and Poor Water Resource Management Will Have Serious Security Implications in the Balkan Peninsula

    DTIC Science & Technology

    2015-06-12

    develop in the following order: Water Security, Rivers, Agreements, Population, Water Resource Management, Deforestation, History , Threats , and Climate...and political stability. To achieve peace , solutions can be developed through the use of international institutions, signing agreements...influences population, economy, energy, peace , and political stability. Achieveing peaceful solutions must come through the use of international

  8. Hacking the Bell test using classical light in energy-time entanglement-based quantum key distribution.

    PubMed

    Jogenfors, Jonathan; Elhassan, Ashraf Mohamed; Ahrens, Johan; Bourennane, Mohamed; Larsson, Jan-Åke

    2015-12-01

    Photonic systems based on energy-time entanglement have been proposed to test local realism using the Bell inequality. A violation of this inequality normally also certifies security of device-independent quantum key distribution (QKD) so that an attacker cannot eavesdrop or control the system. We show how this security test can be circumvented in energy-time entangled systems when using standard avalanche photodetectors, allowing an attacker to compromise the system without leaving a trace. We reach Bell values up to 3.63 at 97.6% faked detector efficiency using tailored pulses of classical light, which exceeds even the quantum prediction. This is the first demonstration of a violation-faking source that gives both tunable violation and high faked detector efficiency. The implications are severe: the standard Clauser-Horne-Shimony-Holt inequality cannot be used to show device-independent security for energy-time entanglement setups based on Franson's configuration. However, device-independent security can be reestablished, and we conclude by listing a number of improved tests and experimental setups that would protect against all current and future attacks of this type.

  9. Distributed Energy Systems: Security Implications of the Grid of the Future

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stamber, Kevin L.; Kelic, Andjelka; Taylor, Robert A.

    2017-01-01

    Distributed Energy Resources (DER) are being added to the nation's electric grid, and as penetration of these resources increases, they have the potential to displace or offset large-scale, capital-intensive, centralized generation. Integration of DER into operation of the traditional electric grid requires automated operational control and communication of DER elements, from system measurement to control hardware and software, in conjunction with a utility's existing automated and human-directed control of other portions of the system. Implementation of DER technologies suggests a number of gaps from both a security and a policy perspective. This page intentionally left blank.

  10. Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar

    NASA Astrophysics Data System (ADS)

    Botel, Gabriel

    This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive literature in human security rarely applied in this context. This includes a brief review of human security and Sino-Myanmar relations, and is grounded in an empirical analysis of Chinese investment in Myanmar's hydropower and oil and gas sectors. Ultimately, this thesis argues that, while insightful, many traditional interpretations of Sino-Myanmar energy cooperation overlook the security interests of those worst affected. Furthermore, that the worst excesses of Chinese companies in Myanmar are not unique to China, but common across all investors in the regime, Western or otherwise.

  11. Policy Challenges of Accelerating Technological Change: Security Policy and Strategy Implications of Parallel Scientific Revolutions

    DTIC Science & Technology

    2014-09-01

    generation, exotic storage technologies, smart power grid management, and better power sources for directed-energy weapons (DEW). Accessible partner nation...near term will help to mitigate risks and improve outcomes. 2 Forecasting typically extrapolates predictions based...eventually, diminished national power . Within this context, this paper examines policy, legal, ethical, and strategy implications for DoD from the impact

  12. Nuclear and Solar Energy: Implications for Homeland Security

    DTIC Science & Technology

    2008-12-01

    of New Nuclear Plants?" Nuclear Engineering International, March 31, 2004, 14. 10 Gwyneth Cravens, Power to Save the World: The Truth about...Pueblo West, CO: Vales Lake Pub, 2004), 98. 12 Cravens, Power to Save the World: The Truth about Nuclear Energy, 249. 13 Jerry Taylor, "Powering...Cravens, Power to Save the World: The Truth about Nuclear Energy, 152. 30 William Langewiesche, The Atomic Bazaar: Dispatches from the Underground World

  13. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Onyeji, Ijeoma; Bazilian, Morgan; Bronk, Chris

    Both the number and security implications of sophisticated cyber attacks on companies providing critical energy infrastructures are increasing. As power networks and, to a certain extent, oil and gas infrastructure both upstream and downstream, are becoming increasingly integrated with information communication technology systems, they are growing more susceptible to cyber attacks.

  14. Current and future greenhouse gas emissions associated with electricity generation in China: implications for electric vehicles.

    PubMed

    Shen, Wei; Han, Weijian; Wallington, Timothy J

    2014-06-17

    China's oil imports and greenhouse gas (GHG) emissions have grown rapidly over the past decade. Addressing energy security and GHG emissions is a national priority. Replacing conventional vehicles with electric vehicles (EVs) offers a potential solution to both issues. While the reduction in petroleum use and hence the energy security benefits of switching to EVs are obvious, the GHG benefits are less obvious. We examine the current Chinese electric grid and its evolution and discuss the implications for EVs. China's electric grid will be dominated by coal for the next few decades. In 2015 in Beijing, Shanghai, and Guangzhou, EVs will need to use less than 14, 19, and 23 kWh/100 km, respectively, to match the 183 gCO2/km WTW emissions for energy saving vehicles. In 2020, in Beijing, Shanghai, and Guangzhou EVs will need to use less than 13, 18, and 20 kWh/100 km, respectively, to match the 137 gCO2/km WTW emissions for energy saving vehicles. EVs currently demonstrated in China use 24-32 kWh/100 km. Electrification will reduce petroleum imports; however, it will be very challenging for EVs to contribute to government targets for GHGs emissions reduction.

  15. The Hour of Truth: The Conflict in Ukraine - Implications for Europe’s Energy Security and the Lessons for the U.S. Army

    DTIC Science & Technology

    2015-11-01

    energy efficiency.25 The rules are scheduled to go into effect in 2016. One of the toughest components for coal power plants to meet will be the NOx...coal power plants out of business by the early-2020s.30 High Cost and Other Challenges of Renewables. Renewable energy has been a focus of the envi...will be explained later in detail. Coal: An Environmentally Problematic Energy Source. Besides CO2 emissions, burning coal pollutes the environment

  16. Do biofuel blending mandates reduce gasoline consumption? Implications of state-level renewable fuel standards for energy security

    NASA Astrophysics Data System (ADS)

    Lim, Shinling

    In an effort to keep America's addiction to oil under control, federal and state governments have implemented a variety of policy measures including those that determine the composition of motor gasoline sold at the pump. Biofuel blending mandates known as Renewable Fuel Standards (RFS) are designed to reduce the amount of foreign crude oil needed to be imported as well as to boost the local ethanol and corn industry. Yet beyond looking at changes in gasoline prices associated with increased ethanol production, there have been no empirical studies that examine effects of state-level RFS implementation on gasoline consumption. I estimate a Generalized Least Squares model for the gasoline demand for the 1993 to 2010 period with state and time fixed effects controlling for RFS. States with active RFS are Minnesota, Hawaii, Missouri, Florida, Washington, and Oregon. I find that, despite the onset of federal biofuel mandates across states in 2007 and the lower energy content of blended gasoline, being in a state that has implemented RFS is associated with 1.5% decrease in gasoline consumption (including blended gasoline). This is encouraging evidence for efforts to lessen dependence on gasoline and has positive implications for energy security.

  17. Implications of Postharvest Food Loss/Waste Prevention to Energy and Resources Conservation

    NASA Astrophysics Data System (ADS)

    Cai, X.; Shafiee-Jood, M.

    2015-12-01

    World's growing demand for food is driven by population and income growth, dietary changes, and the ever-increasing competition between food, feed and bioenergy challenges food security; meanwhile agricultural expansion and intensification threats the environment by the various detrimental impacts. Researchers have attempted to explore strategies to overcome this grand challenge. One of the promising solutions that have attracted considerable attention recently is to increase the efficiency of food supply chain by reducing food loss and waste (FLW). According to recent studies conducted by Food and Agriculture Organization (FAO), United Nation, almost one third of the food produced for human consumption globally is lost or wasted along the food supply chain. This amount of food discarded manifests a missing, yet potential, opportunity to sustainably enhance both food security and environmental sustainability. However, implementing the strategies and technologies for tackling FLW does not come up as an easy solution since it requires economic incentives, benefit and cost analysis, infrastructure development, and appropriate market mechanism. In this presentation I will provide a synthesis of knowledge on the implications of postharvest food loss/waste prevention to energy and resource conservation, environmental protection, as well as food security. I will also discuss how traditional civil and environmental engineering can contribute to the reduction of postharvest food loss, an important issue of sustainable agriculture.

  18. Transportation infrastructure implications of development of a cellulose ethanol industry for Indiana.

    DOT National Transportation Integrated Search

    2010-10-15

    The 2007 Energy Independence and Security Act calls for the US to produce 36 billion gallons of biofuels by 2022 of which no more than 15 billion would come from corn and 1 billion of biodiesel. Thus, the legislation envisions moving from no cellulos...

  19. Variation in beliefs about ‘fracking’ between the UK and US

    NASA Astrophysics Data System (ADS)

    Evensen, Darrick; Stedman, Richard; O'Hara, Sarah; Humphrey, Mathew; Andersson-Hudson, Jessica

    2017-12-01

    In decision-making on the politically-contentious issue of unconventional gas development, the UK Government and European Commission are attempting to learn from the US experience. Although economic, environmental, and health impacts and regulatory contexts have been compared cross-nationally, public perceptions and their antecedents have not. We conducted similar online panel surveys of national samples of UK and US residents simultaneously in September 2014 to compare public perceptions and beliefs affecting such perceptions. The US sample was more likely to associate positive impacts with development (i.e. production of clean energy, cheap energy, and advancing national energy security). The UK sample was more likely to associate negative impacts (i.e. water contamination, higher carbon emissions, and earthquakes). Multivariate analyses reveal divergence cross-nationally in the relationship between beliefs about impacts and support/opposition—especially for beliefs about energy security. People who associated shale gas development with increased energy security in the UK were over three times more likely to support development than people in the US with this same belief. We conclude with implications for policy and communication, discussing communication approaches that could be successful cross-nationally and policy foci to which the UK might need to afford more attention in its continually evolving regulatory environment.

  20. Regional water implications of reducing oil imports with liquid transportation fuel alternatives in the United States.

    PubMed

    Jordaan, Sarah M; Diaz Anadon, Laura; Mielke, Erik; Schrag, Daniel P

    2013-01-01

    The Renewable Fuel Standard (RFS) is among the cornerstone policies created to increase U.S. energy independence by using biofuels. Although greenhouse gas emissions have played a role in shaping the RFS, water implications are less understood. We demonstrate a spatial, life cycle approach to estimate water consumption of transportation fuel scenarios, including a comparison to current water withdrawals and drought incidence by state. The water consumption and land footprint of six scenarios are compared to the RFS, including shale oil, coal-to-liquids, shale gas-to-liquids, corn ethanol, and cellulosic ethanol from switchgrass. The corn scenario is the most water and land intense option and is weighted toward drought-prone states. Fossil options and cellulosic ethanol require significantly less water and are weighted toward less drought-prone states. Coal-to-liquids is an exception, where water consumption is partially weighted toward drought-prone states. Results suggest that there may be considerable water and land impacts associated with meeting energy security goals through using only biofuels. Ultimately, water and land requirements may constrain energy security goals without careful planning, indicating that there is a need to better balance trade-offs. Our approach provides policymakers with a method to integrate federal policies with regional planning over various temporal and spatial scales.

  1. Biofuels and Food Security. A report by the High Level Panel of Experts on Food Security and Nutrition

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    In October 2011, the UN Committee on World Food Security (CFS) recommended a ''review of biofuels policies -- where applicable and if necessary -- according to balanced science-based assessments of the opportunities and challenges that they may represent for food security so that biofuels can be produced where it is socially, economically and environmentally feasible to do so''. In line with this, the CFS requested the HLPE (High Level Panel of Experts) to ''conduct a science-based comparative literature analysis taking into consideration the work produced by the FAO and Global Bioenergy Partnership (GBEP) of the positive and negative effects ofmore » biofuels on food security''. Recommendations from the report include the following. Food security policies and biofuel policies cannot be separated because they mutually interact. Food security and the right to food should be priority concerns in the design of any biofuel policy. Governments should adopt the principle: biofuels shall not compromise food security and therefore should be managed so that food access or the resources necessary for the production of food, principally land, biodiversity, water and labour are not put at risk. The CFS should undertake action to ensure that this principle is operable in the very varied contexts in which all countries find themselves. Given the trend to the emergence of a global biofuels market, and a context moving from policy-driven to market-driven biofuels, there is an urgent need for close and pro-active coordination of food security, biofuel/bioenergy policies and energy policies, at national and international levels, as well as rapid response mechanisms in case of crisis. There is also an urgent need to create an enabling, responsible climate for food and non-food investments compatible with food security. The HLPE recommends that governments adopt a coordinated food security and energy security strategy, which would require articulation around the following five axes/dimensions: Adapt to the change to global, market-driven dynamics; Address the land, water and resource implications of biofuel policies; Foster the transition from biofuels to comprehensive food-energy policies; Promote research and development; and, Develop methods and guidelines for coordinated food, Biofuels, and bio-energy policies at national and international levels.« less

  2. US public perspectives on security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.; Silva, Carol L.

    2012-02-01

    We report findings from a national Internet survey and a subset of questions administered by telephone in mid-2011 on public assessments of contemporary and emerging interstate nuclear threats, support for strategic arms control, and preferences for responding to limited nuclear attacks on the United States. Additionally, we analyze public views of the threat of terrorism, including cyber attacks, assessments of progress in the struggle against terrorism, and preferences for responding to an act of radiological terrorism against the United States. Also, we report findings from an Internet survey and a subset of questions administered by telephone among the American publicmore » in mid-2011 on US energy and environmental security. Key areas of investigation include public views on energy requirements, preferences for energy sources, energy conservation versus development, energy independence, implications of events at Fukushima, Japan, for US public support of nuclear generation, preferences for managing used nuclear fuel, and trust in nuclear risk assessments from government and other public sources. Where possible, findings from each survey are compared with previous surveys in this series for analyses of trends.« less

  3. New Realities: Energy Security in the 2010s and Implications for the U.S. Military

    DTIC Science & Technology

    2014-01-01

    a small hydroelectric plant on a tributary of the Hudson...amount to a strong headwind for the viability of the U.S. nuclear industry. Several factors are contributing to this situation. First among...are: (1) A shift in the center of gravity of world oil consumption from the older industrialized nations of the Organization for Economic

  4. Global energy, sustainability, and the conventional development paradigm

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Raskin, P.D.; Margolis, R.M.

    1998-05-01

    The conventional development paradigm assumes that the values, consumption patterns, and dynamics of the western industrial system will be progressively played out on a global scale. In this inquiry, the authors explore the implications of the conventional paradigm for the evolution of global energy patterns, and the compatibility with notions of sustainability. They present a global long-range conventional development scenario to the year 2050, and identify major environmental, resource, and social pressures and uncertainties. These include the economic and geopolitical consequences of fossil fuel depletion, the environmental and security implications of increased nuclear generation, the risk of significant climatic change,more » and the threats to social cohesion of distributional inequities. Such potential problems could negate the basic scenario assumption of steady economic and social development. By clarifying the stress points in a conventional picture of energy development, the scenario provides a useful point of departure for examining alternative long-range scenarios for sustainable energy development.« less

  5. International University Research Ventures: Implications for U.S. Economic Competitiveness National Security

    DTIC Science & Technology

    2018-03-31

    NTERNATIONAL UNIVERSITY RESEARCH VENTURES: IMPLICATIONS FOR US ECONOMIC COMPETITIVENESS AND NATIONAL SECURITY The views, opinions and/or findings...UNIVERSITY RESEARCH VENTURES: IMPLICATIONS FOR US ECONOMIC COMPETITIVENESS AND NATIONAL SECURITY Report Term: 0-Other Email: mzak@gatech.edu...expected to inform political and economic theories about technology transfer, innovation, economic competitiveness, and democratization/civil

  6. Nuclear security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dingell, J.D.

    1991-02-01

    The Department of Energy's (DOE) Lawrence Livermore National Laboratory, located in Livermore, California, generates and controls large numbers of classified documents associated with the research and testing of nuclear weapons. Concern has been raised about the potential for espionage at the laboratory and the national security implications of classified documents being stolen. This paper determines the extent of missing classified documents at the laboratory and assesses the adequacy of accountability over classified documents in the laboratory's custody. Audit coverage was limited to the approximately 600,000 secret documents in the laboratory's custody. The adequacy of DOE's oversight of the laboratory's secretmore » document control program was also assessed.« less

  7. Central Asia: Regional Developments and Implications for U.S. Interests

    DTIC Science & Technology

    2012-05-18

    Representatives, Committee on International Relations, Subcommittee on the Middle East and Central Asia, Assessing Energy and Security Issues in Central Asia...Akiner, Violence in Andijon, 13 May 2005: An Independent Assessment , Central Asia-Caucasus Institute, July 2005; AbduMannob Polat, Reassessing Andijan...observers warn that Islamic extremism could increase dramatically in the region, others discount the risk that the existing secular governments soon

  8. Science and Strategic - Climate Implications

    NASA Astrophysics Data System (ADS)

    Tindall, J. A.; Moran, E. H.

    2008-12-01

    Energy of weather systems greatly exceeds energy produced and used by humans. Variation in this energy causes climate variability potentially resulting in local, national, and/or global catastrophes beyond our ability to deter the loss of life and economic destabilization. Large scale natural disasters routinely result in shortages of water, disruption of energy supplies, and destruction of infrastructure. The resulting unforeseen and disastrous events occurring beyond national emergency preparation, as related to climate variability, could insight civil unrest due to dwindling and/or inaccessible resources necessary for survival. Lack of these necessary resources in impacted countries often leads to wars. Climate change coupled with population growth, which exposes more of the population to potential risks associated with climate and environmental change, demands faster technological response. Understanding climate/associated environmental changes, the relation to human activity and behavior, and including this in national and international emergency/security management plans would alleviate shortcomings in our present and future technological status. The scale of environmental change will determine the potential magnitude of civil unrest at the local, national, and/or global level along with security issues at each level. Commonly, security issues related to possible civil unrest owing to temporal environmental change is not part of a short and/or long-term strategy, yet recent large-scale disasters are reminders that system failures (as in hurricane Katrina) include acknowledged breaches to individual, community, and infrastructure security. Without advance planning and management concerning environmental change, oncoming and climate related events will intensify the level of devastation and human catastrophe. Depending upon the magnitude and period of catastrophic events and/or environmental changes, destabilization of agricultural systems, energy supplies, and other lines of commodities often results in severely unbalanced supply and demand ratios, which eventually affect the entire global community. National economies potentially risk destabilization, which is especially important since economics plays a major role in strategic planning. This presentation will address these issues and the role that science can play in human sustainability and local, national, and international security.

  9. Satellite power system (SPS) military implications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bain, C.N.

    1978-10-01

    This study was conducted to examine military implications of the NASA Reference SPS and to identify important military related study tasks that could be completed during fiscal year 1979. Primary areas of investigation were the potential of the SPS as a weapon, for supporting U.S. military preparedness and for affecting international relations. In addition, the SPS's relative vulnerability to overt military action, terrorist attacks, and sabotage was considered. The SPS could act as an electronic warfare weapon and, with modification, as a marginally effective energy-beaming weapon. The system could support military preparedness by providing energy for a strong and stablemore » U.S. economy and by providing a powered platform for military systems, system segments, and operations. The SPS would be vulnerable to military action, terrorism and sabotage unless hardened against these attacks by design, security, and a self-defense system. Tasks identified for completion in fiscal year 1979 include (a) a detailed vulnerability study, (b) evaluation of an SPS self-defense system concept, (c) determination of the effect of SPS flexibility to deliver different sized electrical loads on the ability to gain SPS support from individual nations, and (d) investigation of the effect of SPS deployment schedule on obtaining needed agreements, providing security, and controlling risks of armed conflict. A fifth and long-term task would consist of a worldwide survey identifiying military implications of the SPS that result from the specific requirements of potential SPS power customers.« less

  10. Conference on Nuclear Energy and Science for the 21st Century: Atoms for Peace Plus Fifty - Washington, D.C., October 2003

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pfaltzgraff, Robert L

    2006-10-22

    This conference's focus was the peaceful uses of the atom and their implications for nuclear science, energy security, nuclear medicine and national security. The conference also provided the setting for the presentation of the prestigious Enrico Fermi Prize, a Presidential Award which recognizes the contributions of distinguished members of the scientific community for a lifetime of exceptional achievement in the science and technology of nuclear, atomic, molecular, and particle interactions and effects. An impressive group of distinguished speakers addressed various issues that included: the impact and legacy of the Eisenhower Administration’s “Atoms for Peace” concept, the current and future rolemore » of nuclear power as an energy source, the challenges of controlling and accounting for existing fissile material, and the horizons of discovery for particle or high-energy physics. The basic goal of the conference was to examine what has been accomplished over the past fifty years as well as to peer into the future to gain insights into what may occur in the fields of nuclear energy, nuclear science, nuclear medicine, and the control of nuclear materials.« less

  11. Locally Appropriate Energy Strategies for the Developing World: A focus on Clean Energy Opportunities in Borneo

    NASA Astrophysics Data System (ADS)

    Shirley, Rebekah Grace

    This dissertation focuses on an integration of energy modeling tools to explore energy transition pathways for emerging economies. The spate of growth in the global South has led to a global energy transition, evidenced in part by a surge in the development of large scale energy infrastructure projects for the provision of reliable electricity service. The rational of energy security and exigency often usher these large scale projects through to implementation with minimal analysis of costs: social and environmental impact, ecological risk, or opportunity costs of alternative energy transition pathways foregone. Furthermore, development of energy infrastructure is inherently characterized by the involvement of a number of state and non-state actors, with varying interests, objectives and access to authority. Being woven through and into social institutions necessarily impacts the design, control and functionality of infrastructure. In this dissertation I therefore conceptualize energy infrastructure as lying at the intersection, or nexus, of people, the environment and energy security. I argue that energy infrastructure plans and policy should, and can, be informed by each of these fields of influence in order to appropriately satisfy local development needs. This case study explores the socio-techno-environmental context of contemporary mega-dam development in northern Borneo. I describe the key actors of an ongoing mega-dam debate and the constellation of their interaction. This highlights the role that information may play in public discourse and lends insight into how inertia in the established system may stymie technological evolution. I then use a combination of power system simulation, ecological modeling and spatial analysis to analyze the potential for, and costs and tradeoffs of, future energy scenarios. In this way I demonstrate reproducible methods that can support energy infrastructure decision making by directly addressing data limitation barriers. I offer a platform for integrated analysis that considers cost perspectives across the nexus. The management of energy transitions is a growing field, critically important to low carbon futures. With the broader implications of my study I hope to contribute to a paradigm shift away from the dominant large-scale energy infrastructure as a means of energy security discourse, to a more encompassing security agenda that considers distributed and localized solutions.

  12. Implication of Emotional Labor, Cognitive Flexibility, and Relational Energy among Cabin Crew: A Review.

    PubMed

    Baruah, Rithi; Reddy, K Jayasankara

    2018-01-01

    The primary aim of the civil aviation industry is to provide a secured and comfortable service to their customers and clients. This review concentrates on the cabin crew members, who are the frontline employees of the aviation industry and are salaried to smile. The objective of this review article is to analyze the variables of emotional labor, cognitive flexibility, and relational energy using the biopsychosocial model and identify organizational implications among cabin crew. Online databases such as EBSCOhost, JSTOR, Springerlink, and PubMed were used to gather articles for the review. The authors analyzed 17 articles from 2001 to 2016 and presented a comprehensive review. The review presented an integrative approach and suggested a hypothetical model that can prove to be a signitficant contribution to the avaition industry in particular and to research findings of aviation psychology.

  13. Social Security reform: implications for women.

    PubMed

    Williamson, J B; Rix, S E

    2000-01-01

    Despite recent economic gains for women, a substantial gender gap in financial security during old age remains, making women more dependent than men upon Social Security. Social Security plays an important role in providing for women's economic security. The implications for women of several proposed changes in Social Security policy, including the call for the partial privatization of Social Security via the introduction of individual accounts, are analyzed. Many of the proposals would have the effect of asking women, particularly low-income women, to shoulder a disproportionate share of the risks and burdens associated with the changes.

  14. Central Asia: Regional Developments and Implications for U.S. Interests

    DTIC Science & Technology

    2012-01-03

    Central Asia, Assessing Energy and Security Issues in Central Asia, Testimony of Steven Mann, Principal Deputy Assistant Secretary for South and...Akiner, Violence in Andijon, 13 May 2005: An Independent Assessment , Central Asia-Caucasus Institute, July 2005; AbduMannob Polat, Reassessing Andijan...dramatically in the region, others discount the risk that the existing secular governments soon will be overthrown by Islamic extremists.57 In the case

  15. Parental Influences on Children's Self-Regulation of Energy Intake: Insights from Developmental Literature on Emotion Regulation

    PubMed Central

    Frankel, Leslie A.; Hughes, Sheryl O.; O'Connor, Teresia M.; Power, Thomas G.; Fisher, Jennifer O.; Hazen, Nancy L.

    2012-01-01

    The following article examines the role of parents in the development of children's self-regulation of energy intake. Various paths of parental influence are offered based on the literature on parental influences on children's emotion self-regulation. The parental paths include modeling, responses to children's behavior, assistance in helping children self-regulate, and motivating children through rewards and punishments. Additionally, sources of variation in parental influences on regulation are examined, including parenting style, child temperament, and child-parent attachment security. Parallels in the nature of parents' role in socializing children's regulation of emotions and energy intake are examined. Implications for future research are discussed. PMID:22545206

  16. Implication of Emotional Labor, Cognitive Flexibility, and Relational Energy among Cabin Crew: A Review

    PubMed Central

    Baruah, Rithi; Reddy, K. Jayasankara

    2018-01-01

    The primary aim of the civil aviation industry is to provide a secured and comfortable service to their customers and clients. This review concentrates on the cabin crew members, who are the frontline employees of the aviation industry and are salaried to smile. The objective of this review article is to analyze the variables of emotional labor, cognitive flexibility, and relational energy using the biopsychosocial model and identify organizational implications among cabin crew. Online databases such as EBSCOhost, JSTOR, Springerlink, and PubMed were used to gather articles for the review. The authors analyzed 17 articles from 2001 to 2016 and presented a comprehensive review. The review presented an integrative approach and suggested a hypothetical model that can prove to be a signitficant contribution to the avaition industry in particular and to research findings of aviation psychology. PMID:29743777

  17. Security Implications of ISAF Exit from Afghanistan on South Asia

    DTIC Science & Technology

    2014-12-12

    Afghanistan for their security interests. Cindy A. Hurst and Robert Mathers , discussed the implications of US withdrawal with reference to the presence...... Mathers , “Strategic Implications of the Afghan Mother Lode.” 42 CHAPTER 5 ANALYSIS OF EXTERNAL FACTORS Afghanistan’s future will be determined by

  18. The Energy-Water Nexus: Managing the Links between Energy and Water for a Sustainable Future

    NASA Astrophysics Data System (ADS)

    Hussey, Karen; Petit, Carine

    2010-05-01

    Water and energy are both indispensable inputs to modern economies but currently both resources are under threat owing to the impacts of an ever-increasing population and associated demand, unsustainable practices in agriculture and manufacturing, and the implications of a changing climate. However, it is where water and energy rely on each other that pose the most complex challenges for policy-makers. Water is needed for mining coal, drilling oil, refining gasoline, and generating and distributing electricity; and, conversely, vast amounts of energy are needed to pump, transport, treat and distribute water, particularly in the production of potable water through the use of desalination plants and waste water treatment plants. Despite the links, and the urgency in both sectors for security of supply, in existing policy frameworks energy and water policies are developed largely in isolation from one another. Worse still, some policies designed to encourage alternative energy supplies give little thought to the resultant consequences on water resources, and, similarly, policies designed to secure water supplies pay little attention to the resultant consequences on energy use. The development of new technologies presents both opportunities and challenges for managing the energy-water nexus but a better understanding of the links between energy and water is essential in any attempt to formulate policies for more resilient and adaptable societies. The energy-water nexus must be adequately integrated into policy and decision-making or governments run the risk of contradicting their efforts, and therefore failing in their objectives, in both sectors. A series of COST Exploratory Workshops, drawing on on-going research in the energy-water nexus from a number of international teams, identified the implications of the energy-water nexus on the development of (i) energy policies (ii) water resource management policies and (iii) climate adaptation and mitigation policies. A preliminary list of recommendations on how best to account for and integrate these impacts into policy and decision-making processes at various institutional levels was prepared and future research needs in the energy-water nexus were suggested as main outcomes. This presentation draws on the contributions to the COST water-energy-links exploratory workshops and the development of 12 case studies undertaken by researchers from Europe, the United States, Australia and China, which will be published in a Special Feature of Ecology and Society, mid-2010.

  19. Exploring the Application of Shared Ledger Technology to Safeguards and other National Security Topics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Frazar, Sarah L.; Winters, Samuel T.; Kreyling, Sean J.

    In 2016, the Office of International Nuclear Safeguards at the National Nuclear Security Administration (NNSA) within the Department of Energy (DOE) commissioned the Pacific Northwest National Laboratory (PNNL) to explore the potential implications of the digital currency bitcoin and its underlying technologies on the safeguards system. The authors found that one category of technologies referred to as Shared Ledger Technology (SLT) offers a spectrum of benefits to the safeguards system. While further research is needed to validate assumptions and findings in the paper, preliminary analysis suggests that both the International Atomic Energy Agency (IAEA) and Member States can use SLTmore » to promote efficient, effective, accurate, and timely reporting, and increase transparency in the safeguards system without sacrificing confidentiality of safeguards data. This increased transparency and involvement of Member States in certain safeguards transactions could lead to increased trust and cooperation among States and the public, which generates a number of benefits. This paper describes these benefits and the analytical framework for assessing SLT applications for specific safeguards problems. The paper will also describe other national security areas where SLT could provide benefits.« less

  20. Sustainable Biofuel Crops Project, Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Juhn, Daniel; Grantham, Hedley

    2014-05-28

    Over the last six years, the Food and Agriculture Organization of the United Nations (FAO) has developed the Bioenergy and Food Security (BEFS) Approach to help countries design and implement sustainable bioenergy policies and strategies. The BEFS Approach consists of two sets of multidisciplinary and integrated tools and guidance (the BEFS Rapid Appraisal and the BEFS Detailed Analysis) to facilitate better decision on bioenergy development which should foster both food and energy security, and contribute to agricultural and rural development. The development of the BEFS Approach was for the most part funded by the German Federal Ministry of Food andmore » Agriculture. Recognizing the need to provide support to countries that wanted an initial assessment of their sustainable bioenergy potential, and of the associated opportunities, risks and trade offs, FAO began developing the BEFS-RA (Rapid Appraisal). The BEFS RA is a spreadsheet–based assessment and analysis tool designed to outline the country's basic energy, agriculture and food security context, the natural resources potential, the bioenergy end use options, including initial financial and economic implications, and the identification of issues that might require fuller investigation with the BEFS Detailed Analysis.« less

  1. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    NASA Astrophysics Data System (ADS)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  2. Drivers and Effects of Virtual Water Cycling

    NASA Astrophysics Data System (ADS)

    D'Odorico, P.

    2016-12-01

    The increasing global demand for farmland products by the growing and increasingly burgeoning human population is placing unprecedented pressure on the global agricultural system and its water resources. Many regions of the world that are not self-sufficient because of their chronic water scarcity or lack of suitable agricultural land strongly depend on the importation of agricultural commodities and associated embodied (or "virtual") water. International trade, however, may become unreliable when the supplies in the international food market are scarce. As a result, transboundary investments in agricultural land have become a priority for a number of governments and corporations that are trying to expand their agricultural production while securing good profits. This global "land rush" is often driven by the need for a secure access to water resources for agriculture. The globalization of water and land through trade and foreign land acquisitions is leading to a displacement of land use and a disconnection between human populations and the water resources they rely on. Despite the recognized importance of these phenomena in reshaping the patterns of water dependency through teleconnections between consumer behavior and production areas, their effect on global and regional food security, remains poorly quantified. New teleconnections are also emerging from the increasing water use for energy production. Competition in water use for food and energy security constitutes the core of an emerging debate that is generating new questions on the environmental, ethical, economic, and policy implications of human appropriation of water resources. This lecture will examine the ways societies virtually modify their access to water through trade and foreign land acquisitions to meet their growing food and energy needs.

  3. 75 FR 43944 - Defense Science Board; Task Force on Trends and Implications of Climate Change for National and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-27

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Science Board; Task Force on Trends and Implications of Climate Change for National and International Security AGENCY: Department of Defense (DoD... and Implications of Climate Change for National and International Security will meet in closed session...

  4. 75 FR 34438 - Defense Science Board Task Force on Trends and Implications of Climate Change for National and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-17

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Science Board Task Force on Trends and Implications of Climate Change for National and International Security AGENCY: Department of Defense (DoD... and Implications of Climate Change for National and International Security will meet in closed session...

  5. Quantitative analysis of Indonesia's reserves and energy security as an evaluation by the nation in facing global competition

    NASA Astrophysics Data System (ADS)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede

    2015-12-01

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy proposed in this study, Indonesia energy security for 2025 could be improved to ranked 8 of 11 countries, better than Malaysia, Thailand and Singapore.

  6. Quantitative analysis of Indonesia’s reserves and energy security as an evaluation by the nation in facing global competition

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Selfmore » Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy proposed in this study, Indonesia energy security for 2025 could be improved to ranked 8 of 11 countries, better than Malaysia, Thailand and Singapore.« less

  7. The strategic security officer.

    PubMed

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  8. Energy System Integration Facility Secure Data Center | Energy Systems

    Science.gov Websites

    Integration Facility | NREL Energy System Integration Facility Secure Data Center Energy System Integration Facility Secure Data Center The Energy Systems Integration Facility's Secure Data Center provides

  9. Africa’s Booming Oil and Natural Gas Exploration and Production: National Security Implications for the United States and China

    DTIC Science & Technology

    2013-12-01

    Sinopec’s subsidiary Addax), India (ONGC), Indo- nesia (Pertamina), Korea (KNOC and its subsidiary 35 Dana Petroleum), Malaysia (Petronas), and...water contamination , the greater use of natural gas for power generation has displaced the use of heavily pollution coal. 2. See en.wikipedia.org/wiki...Gazprom, Lukoil, Rosneft), India (Oil India, ONGC), Malaysia (Petronas), and most recently, Indonesia (Pertamina and Med- coEnergi), Thailand (PTTEP

  10. Environmental Degradation: Implications for National Security

    DTIC Science & Technology

    1990-03-30

    national interests, one can readily determine the points of confluencP. When the major security implications have been identified. realistic security...planning can be accomplished effectivelv. The major potential threat of East-West confrontation. characterized by massive conventional and nuclear arsenals...degradation. Economic infrastructures, the relative scarcity of resources, and surging population qrowth can combine to create a world not far removed from

  11. Agriculture and Energy: Implications for Food Security, Water, and Land Use

    NASA Astrophysics Data System (ADS)

    Tokgoz, S.; Zhang, W.; Msangi, S.; Bhandary, P.

    2011-12-01

    Sustainable production of agricultural commodities and growth of international trade in these goods are challenged as never before by supply-side constraints (such as climate change, water and land scarcity, and environmental degradation) and by demand-side dynamics (volatility in food and energy markets, the strengthening food-energy linkage, population growth, and income growth). On the one hand, the rapidly expanding demand can potentially create new market opportunities for agriculture. On the other hand, there are many threats to a sufficient response by the supply side to meet this growing and changing demand. Agricultural production systems in many countries are neither resource-efficient, nor producing according to their full potential. The stock of natural resources such as land, water, nutrients, energy, and genetic diversity is shrinking relative to demand, and their use must become increasingly efficient in order to reduce environmental impacts and preserve the planet's productive capacity. World energy prices have increased rapidly in recent years. At the same time, agriculture has become more energy-intensive. Higher energy costs have pushed up the cost of producing, transporting and processing agricultural commodities, driving up commodity prices. Higher energy costs have also affected water use and availability through increased costs of water extraction, conveyance and desalinization, higher demand for hydroelectric power, and increased cost of subsidizing water services. In the meantime, the development of biofuels has diverted increasing amounts of agricultural land and water resources to the production of biomass-based renewable energy. This more "intensified" linkage between agriculture and energy comes at a time when there are other pressures on the world's limited resources. The related high food prices, especially those in the developing countries, have led to setbacks in the poverty alleviation effort among the global community with more population under hunger and poverty. In light of these threats and opportunities facing the global food system, the proposed study takes a long-term perspective and addresses the main medium and long- term drivers of agricultural markets using the International Model for Policy Analysis of Agricultural Commodities and Trade developed by the Environment and Production Technology Division of IFPRI to project future production, consumption, and trade of key agricultural commodities. The main objective of the study is to analyze the link between energy and agricultural markets, focusing on the "new" role of agriculture as a supplier of energy for transportation through biofuels, and the subsequent impact on land use and demand for water from the agricultural sector. In this context, this study incorporates various scenarios of future energy demand and energy price impacts on global agricultural markets (food prices and food security), water use implications (irrigation water consumption by agricultural sector), and land use implications (changes in national and global crop area). The scenarios are designed to understand the impact of energy prices on biofuel production, cost of production for agricultural crops, conversion of rainfed area to irrigated area, and necessary levels of crop productivity growth to counter these effects.

  12. Smart Buildings: An Introduction to the Library of the Future.

    PubMed

    Hoy, Matthew B

    2016-01-01

    Advances in building technologies are combining energy efficiency, networked sensors, and data recording in exciting ways. Modern facilities can adjust lighting, heating, and cooling outputs to maximize efficiency, provide better physical security, improve wayfinding for occupants, and provide detailed reports of building use. This column will briefly explore the idea of "smart buildings," describe some of the technologies that are being developed for these buildings, and explore their implications for libraries. A brief listing of selected smart building technologies is also provided.

  13. New Realities: Energy Security in the 2010s and Implications for the U.S. Military

    DTIC Science & Technology

    2015-02-01

    public expen- ditures. Reported as far back as December 2012, Libya 54 is paying significant risk premiums on its imports of staple foods , which in...injuries and deaths as well as long-term health hazards due to soil and water contamination . Parties to the conflict are vying for control of oil. Most...with some of the world’s largest firms ( Malaysia Petronas, Russia Lukoil, and Royal Dutch Shell) have borne fruit. Iraq is now the Organization of

  14. Trading Off Global Fuel Supply, CO2 Emissions and Sustainable Development.

    PubMed

    Wagner, Liam; Ross, Ian; Foster, John; Hankamer, Ben

    2016-01-01

    The United Nations Conference on Climate Change (Paris 2015) reached an international agreement to keep the rise in global average temperature 'well below 2°C' and to 'aim to limit the increase to 1.5°C'. These reductions will have to be made in the face of rising global energy demand. Here a thoroughly validated dynamic econometric model (Eq 1) is used to forecast global energy demand growth (International Energy Agency and BP), which is driven by an increase of the global population (UN), energy use per person and real GDP (World Bank and Maddison). Even relatively conservative assumptions put a severe upward pressure on forecast global energy demand and highlight three areas of concern. First, is the potential for an exponential increase of fossil fuel consumption, if renewable energy systems are not rapidly scaled up. Second, implementation of internationally mandated CO2 emission controls are forecast to place serious constraints on fossil fuel use from ~2030 onward, raising energy security implications. Third is the challenge of maintaining the international 'pro-growth' strategy being used to meet poverty alleviation targets, while reducing CO2 emissions. Our findings place global economists and environmentalists on the same side as they indicate that the scale up of CO2 neutral renewable energy systems is not only important to protect against climate change, but to enhance global energy security by reducing our dependence of fossil fuels and to provide a sustainable basis for economic development and poverty alleviation. Very hard choices will have to be made to achieve 'sustainable development' goals.

  15. Trading Off Global Fuel Supply, CO2 Emissions and Sustainable Development

    PubMed Central

    Wagner, Liam; Ross, Ian; Foster, John; Hankamer, Ben

    2016-01-01

    The United Nations Conference on Climate Change (Paris 2015) reached an international agreement to keep the rise in global average temperature ‘well below 2°C’ and to ‘aim to limit the increase to 1.5°C’. These reductions will have to be made in the face of rising global energy demand. Here a thoroughly validated dynamic econometric model (Eq 1) is used to forecast global energy demand growth (International Energy Agency and BP), which is driven by an increase of the global population (UN), energy use per person and real GDP (World Bank and Maddison). Even relatively conservative assumptions put a severe upward pressure on forecast global energy demand and highlight three areas of concern. First, is the potential for an exponential increase of fossil fuel consumption, if renewable energy systems are not rapidly scaled up. Second, implementation of internationally mandated CO2 emission controls are forecast to place serious constraints on fossil fuel use from ~2030 onward, raising energy security implications. Third is the challenge of maintaining the international ‘pro-growth’ strategy being used to meet poverty alleviation targets, while reducing CO2 emissions. Our findings place global economists and environmentalists on the same side as they indicate that the scale up of CO2 neutral renewable energy systems is not only important to protect against climate change, but to enhance global energy security by reducing our dependence of fossil fuels and to provide a sustainable basis for economic development and poverty alleviation. Very hard choices will have to be made to achieve ‘sustainable development’ goals. PMID:26959977

  16. Updating energy security and environmental policy: Energy security theories revisited.

    PubMed

    Proskuryakova, L

    2018-06-18

    The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  17. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yarnall, C.A.; Caruthers, J.R.

    This study was performed under FUTURE LOOK, a joint Defense Nuclear Agency/Department of Energy (DNA/DOE) sponsored study. The intent of FUTURE LOOK is to identify and develop means of providing requisite security and survivability to the Non-Strategic Nuclear Forces (NSNF) in the Twenty-First Century. Our current thinking about the future world in Europe is summarized. In this report we develop four scenarios/stockpile cases to cover the spectrum of potential happenings in Europe; we also develop general security and survivability implications and recommendations for each case. The four cases are: (1) a substantially reduced (factor of 2--10) European stockpile; (2) amore » near-zero stockpile, with no Army weapons remaining in Europe; (3) current stockpile in Europe remains; and (4) current stockpile numbers remain, but aggressive modernization is allowed. We plan to use the information in this report to assist in developing detailed security and survivability options as part of our follow-on to FUTURE LOOK studies. 8 refs., 6 tabs.« less

  18. Sandia National Laboratories: Directed-energy tech receives funding to

    Science.gov Websites

    Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research

  19. 10 CFR 1016.12 - Termination of security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Termination of security facility approval. 1016.12 Section 1016.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.12 Termination of security facility approval. Security facility approval will be terminated...

  20. 10 CFR 1016.12 - Termination of security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Termination of security facility approval. 1016.12 Section 1016.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.12 Termination of security facility approval. Security facility approval will be terminated...

  1. Illegal Immigration in the United States: Implications for Rule of Law and National Security

    DTIC Science & Technology

    2012-02-15

    AIR WAR COLLEGE AIR UNIVERSITY ILLEGAL IMMIGRATION IN THE UNITED STATES: IMPLICATIONS FOR RULE OF LAW AND NATIONAL SECURITY By Paul A...government’s failure to strictly enforce immigration laws presents national security vulnerabilities and is subversive to the rule of law . Without...the rule of law , serious social tensions will occur that impel states and localities to fill the void left by the lack of immigration enforcement. In

  2. Blood and Treasure: The U.S. Debt and Its Implications for National Defense and Security

    DTIC Science & Technology

    2012-12-01

    Reserve Board, “Major Foreign Holders of Treasury Securities ,” 15 May 2012. http://www.treasury.gov/resource-center/ data -chart- center/tic/Documents...Coupled with numerous cyber -attacks and theft of intelligence, China could be performing dry runs and gaining intelligence on every occasion for the...THE U.S. DEBT AND ITS IMPLICATIONS FOR NATIONAL DEFENSE AND SECURITY by Nicholas C. Malokofsky December 2012 Thesis Advisor: Carolyn

  3. Energy Security: Emerging Challenges and Opportunities

    DTIC Science & Technology

    2010-08-01

    46 Appendix A: Electrical Capacity Margins...options........................................................................................ 21 6 Net electrical capacity compared to the North...Energy Security The Army Energy and Water Campaign Plan for Installations defines energy security as: the capacity to avoid adverse impact of energy

  4. A brief indicator of household energy security: associations with food security, child health, and child development in US infants and toddlers.

    PubMed

    Cook, John T; Frank, Deborah A; Casey, Patrick H; Rose-Jacobs, Ruth; Black, Maureen M; Chilton, Mariana; Ettinger de Cuba, Stephanie; Appugliese, Danielle; Coleman, Sharon; Heeren, Timothy; Berkowitz, Carol; Cutts, Diana B

    2008-10-01

    Household energy security has not been measured empirically or related to child health and development but is an emerging concern for clinicians and researchers as energy costs increase. The objectives of this study were to develop a clinical indicator of household energy security and assess associations with food security, health, and developmental risk in children <36 months of age. A cross-sectional study that used household survey and surveillance data was conducted. Caregivers were interviewed in emergency departments and primary care clinics form January 2001 through December 2006 on demographics, public assistance, food security, experience with heating/cooling and utilities, Parents Evaluation of Developmental Status, and child health. The household energy security indicator includes energy-secure, no energy problems; moderate energy insecurity, utility shutoff threatened in past year; and severe energy insecurity, heated with cooking stove, utility shutoff, or >or=1 day without heat/cooling in past year. The main outcome measures were household and child food security, child reported health status, Parents Evaluation of Developmental Status concerns, and hospitalizations. Of 9721 children, 11% (n = 1043) and 23% (n = 2293) experienced moderate and severe energy insecurity, respectively. Versus children with energy security, children with moderate energy insecurity had greater odds of household food insecurity, child food insecurity, hospitalization since birth, and caregiver report of child fair/poor health, adjusted for research site and mother, child, and household characteristics. Children with severe energy insecurity had greater adjusted odds of household food insecurity, child food insecurity, caregivers reporting significant developmental concerns on the Parents Evaluation of Developmental Status scale, and report of child fair/poor health. No significant association was found between energy security and child weight for age or weight for length. As household energy insecurity increases, infants and toddlers experienced increased odds of household and child food insecurity and of reported poor health, hospitalizations, and developmental risks.

  5. Energy Independence and Security Act of 2007

    EPA Pesticide Factsheets

    This page provides an overview of the Energy Independence and Security Act (EISA) of 2007, which aims to increase U.S. energy security, develop renewable energy production, and improve vehicle fuel economy.

  6. [Household food security: comparing an alternative method to a classical one].

    PubMed

    Herrán, Oscar F; Quintero, Doris C; Prada, Gloria E

    2010-08-01

    Establishing the performance of the US Environmental Protection Agency (EPA) household food security scale (EPSA) which is being used in Latin-America and the Caribbean, compared to a traditionally-used method (food insecurity scale) which has led to establishing food security at individual and population level. The performance of the household food security scale (EPSA) was evaluated during 2007-2008 and compared to that of the food insecurity (FI) scale based on the energy usually consumed. Two hundred and eleven household participated in the study. The person responsible for preparing food in the home answered the EPSA questionnaire. Another household member filled in a form recording the last twenty-four hours' household consumption (R24H) (on two different occasions). The study was validated by food insecurity from R24H and supposed food security from the EPSA questionnaire. Food insecurity by R24H was 48.8 % and 19.4 % on the EPSA. The EPSA had 16.5 % sensitivity and 77.8 % specificity. Agreement between both methods according to Cohen's Kappa was -0.06 (-0.20-0.03 CI). Assuming equivalence of methods, the EPSA greatly underestimated household food insecurity. The EPSA results compared to those arising from the R24H were not very coherent. Some implications are discussed regarding related public policy.

  7. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov Websites

    Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers

  8. Evaluating options for balancing the water-electricity nexus in California: part 1--securing water availability.

    PubMed

    Tarroja, Brian; AghaKouchak, Amir; Sobhani, Reza; Feldman, David; Jiang, Sunny; Samuelsen, Scott

    2014-11-01

    The technical potential and effectiveness of different water supply options for securing water availability in a large-scale, interconnected water supply system under historical and climate-change augmented inflow and demand conditions were compared. Part 1 of the study focused on determining the scale of the options required to secure water availability and compared the effectiveness of different options. A spatially and temporally resolved model of California's major surface reservoirs was developed, and its sensitivity to urban water conservation, desalination, and water reuse was examined. Potential capacities of the different options were determined. Under historical (baseline) hydrology conditions, many individual options were found to be capable of securing water availability alone. Under climate change augment conditions, a portfolio approach was necessary. The water savings from many individual options other than desalination were insufficient in the latter, however, relying on seawater desalination alone requires extreme capacity installations which have energy, brine disposal, management, and cost implications. The importance of identifying and utilizing points of leverage in the system for choosing where to deploy different options is also demonstrated. Copyright © 2014 Elsevier B.V. All rights reserved.

  9. 10 CFR 780.8 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...

  10. 10 CFR 780.8 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...

  11. 10 CFR 780.8 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...

  12. 10 CFR 780.8 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...

  13. 10 CFR 780.8 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...

  14. Interdependence of the Electricity Generation System and the Natural Gas System and Implications for Energy Security

    DTIC Science & Technology

    2013-05-15

    rates, but conservatively, two weeks to several months), firm delivery contracts (which are based on the capacity of the transmission pipelines and...gas is not guaranteed as it is not part of the capacity planning process). 0 20 40 60 80 100 120 0 2 4 6 8 10 12 D ur at io n of st or ag e su pp...military installations. For example, Tinker AFB, Robins AFB, and MCAGCC Twentynine Palms all have natural gas-fired generation or cogeneration on site

  15. A Shift in the International Security Environment: Potential Implications for Defense - Issues for Congress

    DTIC Science & Technology

    2016-06-08

    Affairs June 8, 2016 Congressional Research Service 7-5700 www.crs.gov R43838 A Shift in the International Security Environment: Potential...Implications for Defense Congressional Research Service Summary World events have led some observers, starting in late 2013, to conclude that the...Defense Congressional Research Service Contents Introduction

  16. Information security of power enterprises of North-Arctic region

    NASA Astrophysics Data System (ADS)

    Sushko, O. P.

    2018-05-01

    The role of information technologies in providing technological security for energy enterprises is a component of the economic security for the northern Arctic region in general. Applying instruments and methods of information protection modelling of the energy enterprises' business process in the northern Arctic region (such as Arkhenergo and Komienergo), the authors analysed and identified most frequent risks of information security. With the analytic hierarchy process based on weighting factor estimations, information risks of energy enterprises' technological processes were ranked. The economic estimation of the information security within an energy enterprise considers weighting factor-adjusted variables (risks). Investments in information security systems of energy enterprises in the northern Arctic region are related to necessary security elements installation; current operating expenses on business process protection systems become materialized economic damage.

  17. Economic Evaluation of the Information Security Levels Achieved by Electric Energy Providers in North Arctic Region

    NASA Astrophysics Data System (ADS)

    Sushko, O. P.; Kaznin, A. A.; Babkin, A. V.; Bogdanov, D. A.

    2017-10-01

    The study we are conducting involves the analysis of information security levels achieved by energy providers operating in the North Arctic Region. We look into whether the energy providers’ current information security levels meet reliability standards and determine what further actions may be needed for upgrading information security in the context of the digital transformation that the world community is undergoing. When developing the information security systems for electric energy providers or selecting the protection means for them, we are governed by the fact that the assets to be protected are process technologies. While information security risk can be assessed using different methods, the evaluation of the economic damage from these risks appears to be a difficult task. The most probable and harmful risks we have identified when evaluating the electric energy providers’ information security will be used by us as variables. To provide the evaluation, it is necessary to calculate the costs relating to elimination of the risks identified. The final stage of the study will involve the development of an operation algorithm for the North Arctic Region’s energy provider’s business information protection security system - a set of information security services, and security software and hardware.

  18. 10 CFR 1016.11 - Cancellation of requests for security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Cancellation of requests for security facility approval. 1016.11 Section 1016.11 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.11 Cancellation of requests for security facility approval. When a...

  19. 10 CFR 1016.11 - Cancellation of requests for security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Cancellation of requests for security facility approval. 1016.11 Section 1016.11 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.11 Cancellation of requests for security facility approval. When a...

  20. 10 CFR 1016.10 - Grant, denial, or suspension of security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Grant, denial, or suspension of security facility approval. 1016.10 Section 1016.10 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.10 Grant, denial, or suspension of security facility approval...

  1. 10 CFR 1016.10 - Grant, denial, or suspension of security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Grant, denial, or suspension of security facility approval. 1016.10 Section 1016.10 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.10 Grant, denial, or suspension of security facility approval...

  2. 10 CFR 1016.10 - Grant, denial, or suspension of security facility approval.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Grant, denial, or suspension of security facility approval. 1016.10 Section 1016.10 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.10 Grant, denial, or suspension of security facility approval...

  3. Toward an SEC-FERC memorandum of understanding. [SEC-FERC (Securities and Exchange Commission-Federal Energy Regulatory Commission)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moeller, J.W.

    1994-01-01

    The Securities and Exchange Commission (SEC) is under fire. For the past year, Congress has criticized its administration of the Public Utility Holding Company Act of 1935 (PUHCA). The criticism might persuade Congress to transfer the administration of PUHCA from the SEC to the Federal Energy Regulatory Commission (FERC). Section I of this article briefly describes the events of the past year and the implications of transfer of PUHCA from the SEC to the FERC. Section II of this article discusses the background relationship of PUHCA, under which the SEC regulates the securities transactions of public utilities, to the Federalmore » Power Act, under which the FERC regulates the rates of public utilities. Section III discusses the case involving the Ohio Power Company, which resulted in a November 1990 decision of the Supreme Court, that recently has highlighted the conflict in jurisdiction between the SEC and the FERC relative to the regulation of public utilities. Section IV discusses the immediate responses to that conflict--a proposed amendment to a FERC regulation and S. 544--and the reasons that neither response is an ideal solution. Section V proposes an alternative to those immediate responses--the Memorandum of Understanding. An Appendix is provided which proposes a draft Memorandum of Understanding between the SEC and the FERC.« less

  4. Sex-Specific Relationships among Attachment Security, Social Values, and Sensation Seeking in Early Adolescence: Implications for Adolescents' Externalizing Problem Behaviour

    ERIC Educational Resources Information Center

    Sarracino, Diego; Presaghi, Fabio; Degni, Silvia; Innamorati, Marco

    2011-01-01

    In early adolescence, attachment security reflects not only the quality of ongoing relationships with parents, but also how adolescents process social relationships with "others"--that is, their "social value orientation"--with possible implications for adolescents' risk-taking. In this study, a sample of Italian early…

  5. 22 CFR 9a.1 - Security of certain information and material related to the International Energy Program.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...

  6. 76 FR 65508 - Extension of the Public Comment Period for the Draft Site-Wide Environmental Impact Statement for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-21

    ... DEPARTMENT OF ENERGY National Nuclear Security Administration Extension of the Public Comment... Department of Energy/National Nuclear Security Administration Nevada National Security Site and Off-Site Locations in the State of Nevada AGENCY: National Nuclear Security Administration, U.S. Department of Energy...

  7. 10 CFR 1016.8 - Approval for processing access permittees for security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security facility...

  8. 10 CFR 1016.8 - Approval for processing access permittees for security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security facility...

  9. 22 CFR 9a.1 - Security of certain information and material related to the International Energy Program.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gerald Hill; Kenneth Nemeth; Gary Garrett

    The Southern States Energy Board's (SSEB) 'Regional Effort to Deploy Clean Coal Technologies' program began on June 1, 2003, and was completed on January 31, 2009. The project proved beneficial in providing state decision-makers with information that assisted them in removing barriers or implementing incentives to deploy clean coal technologies. This was accomplished through two specific tasks: (1) domestic energy security and diversity; and (2) the energy-water interface. Milestones accomplished during the project period are: (1) Presentations to Annual Meetings of SSEB Members, Associate Member Meetings, and the Gasification Technologies Council. (2) Energy: Water reports - (A) Regional Efforts tomore » Deploy Clean Coal Technologies: Impacts and Implications for Water Supply and Quality. June 2004. (B) Energy-Water Interface Challenges: Coal Bed Methane and Mine Pool Water Characterization in the Southern States Region. 2004. (C) Freshwater Availability and Constraints on Thermoelectric Power Generation in the Southeast U.S. June 2008. (3) Blackwater Interactive Tabletop Exercise - Decatur, Georgia April 2007. (4) Blackwater Report: Blackwater: Energy and Water Interdependency Issues: Best Practices and Lessons Learned. August 2007. (5) Blackwater Report: BLACKWATER: Energy Water Interdependency Issues REPORT SUMMARY. April 2008.« less

  11. Security: Progress and Challenges

    ERIC Educational Resources Information Center

    Luker, Mark A.

    2004-01-01

    The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…

  12. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  13. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  14. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  15. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  16. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  17. National Security Implications of Virtual Currency: Examining the Potential for Non-state Actor Deployment

    DTIC Science & Technology

    2015-02-01

    Centralization . . . . . . . . . . . . . . . . . . . . . . 43 “Anonymity”: A Bitcoin Case Study...been a case of x National Security Implications of Virtual Currency such a non-state actor deployment; in this report, we aim to high- light...development of VCs may advance, including a gen- eral increased sophistication in cryptographic applications. More gen- erally, we make the case that the main

  18. Cooperative monitoring and its role in regional security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Biringer, K.; Olsen, J.; Lincoln, R.

    1997-03-01

    Cooperative monitoring systems can play an important part in promoting the implementation of regional cooperative security agreements. These agreements advance the national security interests of the United States in a post Cold War environment. Regional issues as widely varying as nuclear nonproliferation, trade and environmental pollution can be the source of tensions which may escalate to armed conflict which could have global implications. The Office of National Security Policy Analysis at the US Department of Energy (DOE) has an interest in seeking ways to promote regional cooperation that can reduce the threats posed by regional conflict. DOE technologies and technicalmore » expertise can contribute to developing solutions to a wide variety of these international problems. Much of this DOE expertise has been developed in support of the US nuclear weapons and arms control missions. It is now being made available to other agencies and foreign governments in their search for regional security and cooperation. This report presents two examples of interest to DOE in which monitoring technologies could be employed to promote cooperation through experimentation. The two scenarios include nuclear transparency in Northeast Asia and environmental restoration in the Black Sea. Both offer the potential for the use of technology to promote regional cooperation. The issues associated with both of these monitoring applications are presented along with examples of appropriate monitoring technologies, potential experiments and potential DOE contributions to the scenarios.« less

  19. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  20. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  1. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  2. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  3. Spectral unfolding of fast neutron energy distributions

    NASA Astrophysics Data System (ADS)

    Mosby, Michelle; Jackman, Kevin; Engle, Jonathan

    2015-10-01

    The characterization of the energy distribution of a neutron flux is difficult in experiments with constrained geometry where techniques such as time of flight cannot be used to resolve the distribution. The measurement of neutron fluxes in reactors, which often present similar challenges, has been accomplished using radioactivation foils as an indirect probe. Spectral unfolding codes use statistical methods to adjust MCNP predictions of neutron energy distributions using quantified radioactive residuals produced in these foils. We have applied a modification of this established neutron flux characterization technique to experimentally characterize the neutron flux in the critical assemblies at the Nevada National Security Site (NNSS) and the spallation neutron flux at the Isotope Production Facility (IPF) at Los Alamos National Laboratory (LANL). Results of the unfolding procedure are presented and compared with a priori MCNP predictions, and the implications for measurements using the neutron fluxes at these facilities are discussed.

  4. P.L. 110-140, "Energy Independence and Security Act of 2007", 2007

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2007-12-19

    The Energy Independence and Security Act of 2007 (EISA), signed into law on December 19, 2007, set forth an agenda for improving U.S. energy security across the entire economy. While industrial energy efficiency is specifically called out in Title IV, Subtitle D, other EISA provisions also apply to AMO activities.

  5. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... providing security education and training. A licensee or other entity subject to part 95 may obtain...

  6. 10 CFR 95.49 - Security of automatic data processing (ADP) systems.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security of automatic data processing (ADP) systems. 95.49 Section 95.49 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.49 Security of...

  7. Leading by Example: The Case for IT Security in Academia

    ERIC Educational Resources Information Center

    Davidson, Mary Ann

    2005-01-01

    Leadership in IT security is needed. Security matters: the ethics, the economics, and the social implications. There is much the academic community can do to help ensure cybersecurity. This document discusses steps academia can take to help ensure cybersecurity.

  8. A Review of the American Recovery and Reinvestment Act Smart Grid Projects and Their Implications for China

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Liu, Xu; Marnay, Chris; Feng, Wei

    The Chinese government has paid growing attention to renewable energy development and has set ambitious goals for carbon dioxide (CO2) emissions reduction and energy savings. Smart grid (SG) technologies have been regarded as emerging ways to integrate renewable energy and to help achieve these climate and energy goals. This report first reviews completed SG demonstrations under the U.S. American Recovery and Reinvestment Act (ARRA); especially two key programs: the SG Investment Grant (SGIG) and the SG Demonstration Project (SGDP). Under the SGIG, the larger of the two programs, over $3.4 billion was used to help industry deploy existing advanced SGmore » technologies and tools to improve grid performance and reduce costs. Including industry investment, a total of $8 billion was spent on 99 cost-shared projects, which involved more than 200 participating electric utilities and other organizations. These projects aimed to modernize the electric grid, strengthen cyber security, improve interoperability, and collect comprehensive data on SG operations and benefits.« less

  9. Sandia National Laboratories: Hydrogen Risk Assessment Models toolkit now

    Science.gov Websites

    Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers

  10. Sandia National Laboratories: 100 Resilient Cities: Sandia Challenge:

    Science.gov Websites

    Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bazillian, Morgan; Pedersen, Ascha Lychett; Pless, Jacuelyn

    Shale gas resource potential in China is assessed to be large, and its development could have wide-ranging economic, environmental, and energy security implications. Although commercial scale shale gas development has not yet begun in China, it holds the potential to change the global energy landscape. Chinese decision-makers are wrestling with the challenges associated with bringing the potential to reality: geologic complexity; infrastructure and logistical difficulties; technological, institutional, social and market development issues; and environmental impacts, including greenhouse gas emissions, impacts on water availability and quality, and air pollution. This paper briefly examines the current situation and outlook for shale gasmore » in China, and explores existing and potential avenues for international cooperation. We find that despite some barriers to large-scale development, Chinese shale gas production has the potential to grow rapidly over the medium-term.« less

  12. Developing Water Resource Security in a Greenhouse Gas Constrained Context - A Case Study in California

    NASA Astrophysics Data System (ADS)

    Tarroja, B.; Aghakouchak, A.; Samuelsen, S.

    2015-12-01

    The onset of drought conditions in regions such as California due to shortfalls in precipitation has brought refreshed attention to the vulnerability of our water supply paradigm to changes in climate patterns. In the face of a changing climate which can exacerbate drought conditions in already dry areas, building resiliency into our water supply infrastructure requires some decoupling of water supply availability from climate behavior through conservation, efficiency, and alternative water supply measures such as desalination and water reuse. The installation of these measures requires varying degrees of direct energy inputs and/or impacts the energy usage of the water supply infrastructure (conveyance, treatment, distribution, wastewater treatment). These impacts have implications for greenhouse gas emissions from direct fuel usage or impacts on the emissions from the electric grid. At the scale that these measures may need to be deployed to secure water supply availability, especially under climate change impacted hydrology, they can potentially pose obstacles for meeting greenhouse gas emissions reduction and renewable utilization goals. Therefore, the portfolio of these measures must be such that detrimental impacts on greenhouse gas emissions are minimized. This study combines climate data with a water reservoir network model and an electric grid dispatch model for the water-energy system of California to evaluate 1) the different pathways and scale of alternative water resource measures needed to secure water supply availability and 2) the impacts of following these pathways on the ability to meet greenhouse gas and renewable utilization goals. It was discovered that depending on the water supply measure portfolio implemented, impacts on greenhouse gas emissions and renewable utilization can either be beneficial or detrimental, and optimizing the portfolio is more important under climate change conditions due to the scale of measures required.

  13. Sino-African Relationship: Its Implications on U.S. National Security Interests

    DTIC Science & Technology

    2017-03-20

    AIR WAR COLLEGE AIR UNIVERSITY SINO-AFRICAN RELATIONSHIP : ITS IMPLICATIONS ON U.S. NATIONAL SECURITY INTERESTS by Kimberly S. Vinson... Management Apprentice after graduating from tech school, but converted to a Personnel Apprentice in 1998. Chief Vinson has been assigned to bases in...Maryland, South Korea, Germany, Nevada, Italy, New Mexico, Ohio, South Dakota, and Texas. iv Abstract The Sino-African relationship has

  14. Job security at isfahan university of medical sciences: implications on employees and types of contracts.

    PubMed

    Alavi, Seyyed Salman; Alaghemandan, Hamed; Jannatifard, Fereshte

    2013-01-01

    Medical universities are of those organizations that serve many individuals. As a result, the employees who work at medical universities should have adequate job qualifications and requisite conditions for work. Job security is one of these needed conditions. The current study aims to determine the main components of job security among the employees of Isfahan University of Medical Sciences (IUMS). The study had a cross-sectional design. The sample included 300 employees which were selected from the faculties of IUMS. The sample was recruited using quota sampling. First, demographic and Job security questionnaires were completed by each employee. Then, data was analyzed by descriptive methods and ANOVA in SPSS16. The study results showed that there was no significant difference among five subscales of Job security questionnaire and as a result, job security among the employees of IUMS but there was a significant difference in job security among male and female employees and a significant difference in job security based on type of job contract. Lower rate of job security among female employees with temporary job contracts has professional and psychological implication for both females and IUMS which should be considered in designing professional programs of IUMS.

  15. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  16. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  17. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  18. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  19. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  20. China’s Energy Security: The Grand Hedging Strategy

    DTIC Science & Technology

    2010-05-01

    spotlight. The key to sustaining this dynamic economic growth is access to petroleum resources. The central question of this monograph is as follows...Is China’s energy security strategy liberal-institutionalist or realist-mercantilist? Using a qualitative case study methodology that explores the...dependent variable -- energy security -- using three independent variables (cost of supply, reliability of supply, and security of supply), China’s

  1. Sandia National Laboratories: National Security Missions: International

    Science.gov Websites

    Transportation Energy Energy Research Global Security WMD Counterterrorism & Response Global Threat Reduction Homeland Defense & Force Protection Homeland Security Cyber & Infrastructure Security Global Business Procurement Technical Assistance Program (PTAP) Current Suppliers iSupplier Account Accounts

  2. Social Security and Part-Time Employment.

    ERIC Educational Resources Information Center

    Euzeby, Alain

    1988-01-01

    Discusses rules governing social security and their implications for part-time employees in various countries. Topics include (1) methods of financing social security, (2) benefits, (3) measures concerning the unemployed, (4) a floor for employers' contributions, (5) graduated contribution rates, and (6) financial incentives. (CH)

  3. A model of security monitoring

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1990-01-01

    A model of security monitoring is presented that distinguishes between two types of logging and auditing. Implications for the design and use of security monitoring mechanisms are drawn from this model. The usefulness of the model is then demonstrated by analyzing several different monitoring mechanisms.

  4. A model of security monitoring

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1989-01-01

    A model of security monitoring is presented that distinguishes between two types of logging and auditing. Implications for the design and use of security monitoring mechanisms are drawn from this model. The usefulness of the model is then demonstrated by analyzing several different monitoring mechanisms.

  5. The security energy encryption in wireless power transfer

    NASA Astrophysics Data System (ADS)

    Sadzali, M. N.; Ali, A.; Azizan, M. M.; Albreem, M. A. M.

    2017-09-01

    This paper presents a concept of security in wireless power transfer (WPT) by applying chaos theory. Chaos theory is applied as a security system in order to safeguard the transfer of energy from a transmitter to the intended receiver. The energy encryption of the wireless power transfer utilizes chaos theory to generate the possibility of a logistic map for the chaotic security key. The simulation for energy encryption wireless power transfer system was conducted by using MATLAB and Simulink. By employing chaos theory, the chaotic key ensures the transmission of energy from transmitter to its intended receiver.

  6. Energy Structure and Energy Security under Climate Mitigation Scenarios in China

    PubMed Central

    Matsumoto, Ken’ichi

    2015-01-01

    This study investigates how energy structure and energy security in China will change in the future under climate mitigation policy scenarios using Representative Concentration Pathways in a computable general equilibrium model. The findings suggest that to reduce greenhouse gas emissions, China needs to shift its energy structure from fossil fuel dominance to renewables and nuclear. The lower the allowable emissions, the larger the shifts required. Among fossil fuels, coal use particularly must significantly decrease. Such structural shifts will improve energy self-sufficiency, thus enhancing energy security. Under the policy scenarios, energy-source diversity as measured by the Herfindahl Index improves until 2050, after which diversity declines because of high dependence on a specific energy source (nuclear and biomass). Overall, however, it is revealed that energy security improves along with progress in climate mitigation. These improvements will also contribute to the economy by reducing energy procurement risks. PMID:26660094

  7. 10 CFR 712.16 - DOE security review.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false DOE security review. 712.16 Section 712.16 Energy DEPARTMENT OF ENERGY HUMAN RELIABILITY PROGRAM Establishment of and Procedures for the Human Reliability... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file...

  8. Printing Insecurity? The Security Implications of 3D-Printing of Weapons.

    PubMed

    Walther, Gerald

    2015-12-01

    In 2013, the first gun printed out of plastic by a 3D-printer was successfully fired in the U.S. This event caused a major media hype about the dangers of being able to print a gun. Law enforcement agencies worldwide were concerned about this development and the potentially huge security implications of these functional plastic guns. As a result, politicians called for a ban of these weapons and a control of 3D-printing technology. This paper reviews the security implications of 3D-printing technology and 3D guns. It argues that current arms control and transfer policies are adequate to cover 3D-printed guns as well. However, while this analysis may hold up currently, progress in printing technology needs to be monitored to deal with future dangers pre-emptively.

  9. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.

    PubMed

    Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae

    2015-06-26

    The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

  10. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation

    PubMed Central

    Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae

    2015-01-01

    The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both. PMID:26131669

  11. Consolidating Our Country’s Biometric Resources and the Possible Implications

    DTIC Science & Technology

    2008-03-02

    passenger’s quick access through airport security by pre-clearing travelers. The Fly Clear smart cards store the passenger’s personal information...Fly Through Airport Security , undated); “Fly Through Airport Security ,”; available from http://flyclear.com/about/clear _howclearworks.html

  12. E-Commerce and Security Governance in Developing Countries

    NASA Astrophysics Data System (ADS)

    Sanayei, Ali.; Rajabion, Lila

    Security is very often mentioned as one of the preconditions for the faster growth of e-commerce. Without a secure and reliable internet, customer will continue to be reluctant to provide confidential information online, such as credit card number. Moreover, organizations of all types and sizes around the world rely heavily on technologies of electronic commerce (e-commerce) for conducting their day-to-day business transaction. Providing organizations with a secure e-commerce environment is a major issue and challenging one especially in Middle Eastern countries. Without secure e-commerce, it is almost impossible to take advantage of the opportunities offered by e-commerce technologies. E-commerce can create opportunities for small entrepreneurs in Middle Eastern countries. This requires removing infrastructure blockages in telecommunications and logistics alongside the governance of e-commerce with policies on consumer protection, security of transactions, privacy of records and intellectual property. In this paper, we will explore the legal implications of e-commerce security governance by establishing who is responsible for ensuring compliance with this discipline, demonstrating the value to be derived from information security governance, the methodology of applying information security governance, and liability for non-compliance with this discipline. Our main focus will be on analyzing the importance and implication of e-commerce security governance in developing countries.

  13. 78 FR 8160 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-05

    ... matters related to national security and emergency preparedness telecommunications policy. Agenda: The... and Emergency Preparedness Implications of a Nationwide Public Safety Broadband Network. The report...

  14. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  15. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  16. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  17. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  18. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  19. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  20. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  1. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  2. 10 CFR 1016.23 - Establishment of security areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Establishment of security areas. 1016.23 Section 1016.23 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016... safeguard documents and material containing Restricted Data in accordance with the provisions of §§ 1016.21...

  3. 10 CFR 1016.39 - Termination, suspension, or revocation of security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Termination, suspension, or revocation of security facility approval. 1016.39 Section 1016.39 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Control of Information § 1016.39 Termination, suspension, or revocation of security facility...

  4. 10 CFR 1016.39 - Termination, suspension, or revocation of security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Termination, suspension, or revocation of security facility approval. 1016.39 Section 1016.39 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Control of Information § 1016.39 Termination, suspension, or revocation of security facility...

  5. 10 CFR 1016.23 - Establishment of security areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Establishment of security areas. 1016.23 Section 1016.23 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016... safeguard documents and material containing Restricted Data in accordance with the provisions of §§ 1016.21...

  6. 75 FR 39273 - Energy Independence and Security Act (Pub. L. 110-140)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    ... DEPARTMENT OF THE INTERIOR U.S. Geological Survey Energy Independence and Security Act (Pub. L... Resource Assessment Methodology. SUMMARY: In 2007, the Energy Independence and Security Act (Pub. L. 110... provide important information to evaluate the potential for CO 2 storage as a mitigation option for global...

  7. Women’s Role in Disaster Management and Implications for National Security

    DTIC Science & Technology

    2017-07-11

    management policies, plans and decision making processes,” available at http://www.unisdr.org/we/ inform /publications/1037. Beijing Agenda for Global...1 WOMEN’S ROLE IN DISASTER MANAGEMENT AND IMPLICATIONS FOR NATIONAL SECURITY By Jessica Ear Introduction Disasters are increasing in...frequency and intensity. For those lacking control and access to services and resources such as education and information , disaster risks are even

  8. Implications of the Budgeting Process on State-of-the-Art (SOA) Extensions.

    DTIC Science & Technology

    1987-12-01

    CLASSIFICATION AUTHORITY 3 DISTRIBUTION /AVAILABILITY OF REPORT Approved for public release; Zb DECLASSiFICATION1DOWNGRADING SCHEDULE Distribution is...PROGRAM PROJECT TASK WORK UNIT ELEMENT NO. NO NO ACCESSION NO 11. TITLE (Include Security Classification ) IMPLICATIONS OF THE BUDGETING PROCESS ON STATE...20 DISTRIBUTIONAVAILABILITY OF ABSTRACT 21 ABSTRACT SECURITY CLASSIFICATION 0 UNCLASSIFIED,UNLIMI"ED 0 SAME AS RPT QJ DTIC USERS UNCLASSIFIED 22a

  9. 10 CFR 110.44 - Physical security standards.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Physical security standards. 110.44 Section 110.44 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) EXPORT AND IMPORT OF NUCLEAR EQUIPMENT AND MATERIAL Review of License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient...

  10. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...

  11. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...

  12. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...

  13. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  14. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  15. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  16. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  17. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  18. Security Implications Of Italian Nationalism

    DTIC Science & Technology

    2016-03-01

    NATO enlargement, and the ongoing immigration crisis. This thesis also examines Italy’s role in the major Euro-Atlantic security institutions and...immigration crisis. This thesis also examines Italy’s role in the major Euro- Atlantic security institutions and assesses how nationalist movements may...79 B. ITALY’S ROLE IN EU SECURITY COOPERATION ......................82 C. THE EFFECT OF EURO-ATLANTIC INSTITUTIONS ON ITALIAN

  19. An Energy Efficient Protocol For The Internet Of Things

    NASA Astrophysics Data System (ADS)

    Venčkauskas, Algimantas; Jusas, Nerijus; Kazanavičius, Egidijus; Štuikys, Vytautas

    2015-01-01

    The Internet of Things (IoT) is a technological revolution that represents the future of computing and communications. One of the most important challenges of IoT is security: protection of data and privacy. The SSL protocol is the de-facto standard for secure Internet communications. The extra energy cost of encrypting and authenticating of the application data with SSL is around 15%. For IoT devices, where energy resources are limited, the increase in the cost of energy is a very significant factor. In this paper we present the energy efficient SSL protocol which ensures the maximum bandwidth and the required level of security with minimum energy consumption. The proper selection of the security level and CPU multiplier, can save up to 85% of the energy required for data encryption.

  20. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Freund, M.T.; Wise, J.A.; Ulibarri, C.A.

    This paper addresses US energy security in the post-Cold War era for a conference on energy security jointly sponsored by the Department of Energy and the National Defense University. It examines the evolving nature of energy security based on analysis of past crisis-inducing events and-discusses potentially important geopolitical, environmental, regulatory, and economic developments during the next twenty-five years. The paper steps beyond the traditional economic focus of energy security issues to examine the interplay between fundamental economic and technical drivers on the one hand, and political, environmental, and perceptual phenomena, on the other hand, that can combine to create crisesmore » where none were expected. The paper expands on the premise that the recent demise of the Soviet Union and other changing world conditions have created a new set of energy dynamics, and that it is imperative that the United States revise its energy security perspective accordingly. It proceeds by reviewing key factors that comprise the concepts of ``energy security`` and ``energy crisis`` and how they may fit into the new world energy security equation. The study also presents a series of crisis scenarios that could develop during the next twenty-five years, paying particular attention to mechanisms and linked crisis causes and responses. It concludes with a discussion of factors that may serve to warn analysts and decision makers of impending future crises conditions. The crisis scenarios contained in this report should be viewed only as a representative sample of the types of situations that could occur. They serve to illustrate the variety of factors that can coalesce to produce a ``crisis.``« less

  1. 10 CFR 110.44 - Physical security standards.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...

  2. 10 CFR 110.44 - Physical security standards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...

  3. 10 CFR 110.44 - Physical security standards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...

  4. 10 CFR 110.44 - Physical security standards.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...

  5. 18 CFR 3a.51 - Designation of security officers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 18 Conservation of Power and Water Resources 1 2013-04-01 2013-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...

  6. 18 CFR 3a.51 - Designation of security officers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...

  7. 18 CFR 3a.51 - Designation of security officers.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...

  8. 18 CFR 3a.51 - Designation of security officers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 18 Conservation of Power and Water Resources 1 2014-04-01 2014-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...

  9. 3 CFR - The Energy Independence and Security Act of 2007

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false The Energy Independence and Security Act of 2007 Presidential Documents Other Presidential Documents Memorandum of January 26, 2009 The Energy Independence and Security Act of 2007 Memorandum for the Secretary of Transportation [and] the Administrator of the National Highway Traffic Safety...

  10. The pivotal and paradoxical role of phosphorus in a resilient water-energy-food security nexus

    USDA-ARS?s Scientific Manuscript database

    We make the case that phosphorus (P) is inextricably linked to an increasingly fragile, interconnected and interdependent ‘nexus’ of water, energy, and food security. While there are many other drivers that influence water, energy, and food security, P plays a unique and under-recognized role within...

  11. Superstorm Sandy: Implications For Designing A PostCyber Attack Power Restoration System

    DTIC Science & Technology

    2016-03-31

    for such progress. Phillip Allison, “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems: Building Security into Your Industrial...TechSvcs/Multi-stateFleetResponseWorkshopReport-02-21-13.pdf. Allison, Phillip. “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems

  12. Job Security at Isfahan University of Medical Sciences: Implications on Employees and Types of Contracts

    PubMed Central

    Alavi, Seyyed Salman; Alaghemandan, Hamed; Jannatifard, Fereshte

    2013-01-01

    Introduction: Medical universities are of those organizations that serve many individuals. As a result, the employees who work at medical universities should have adequate job qualifications and requisite conditions for work. Job security is one of these needed conditions. The current study aims to determine the main components of job security among the employees of Isfahan University of Medical Sciences (IUMS). Method and materials: The study had a cross-sectional design. The sample included 300 employees which were selected from the faculties of IUMS. The sample was recruited using quota sampling. First, demographic and Job security questionnaires were completed by each employee. Then, data was analyzed by descriptive methods and ANOVA in SPSS16. Results: The study results showed that there was no significant difference among five subscales of Job security questionnaire and as a result, job security among the employees of IUMS but there was a significant difference in job security among male and female employees and a significant difference in job security based on type of job contract. Discussion: Lower rate of job security among female employees with temporary job contracts has professional and psychological implication for both females and IUMS which should be considered in designing professional programs of IUMS. PMID:23687464

  13. Assessment of Food Waste Prevention and Recycling Strategies Using a Multilayer Systems Approach.

    PubMed

    Hamilton, Helen A; Peverill, M Samantha; Müller, Daniel B; Brattebø, Helge

    2015-12-15

    Food waste (FW) generates large upstream and downstream emissions to the environment and unnecessarily consumes natural resources, potentially affecting future food security. The ecological impacts of FW can be addressed by the upstream strategies of FW prevention or by downstream strategies of FW recycling, including energy and nutrient recovery. While FW recycling is often prioritized in practice, the ecological implications of the two strategies remain poorly understood from a quantitative systems perspective. Here, we develop a multilayer systems framework and scenarios to quantify the implications of food waste strategies on national biomass, energy, and phosphorus (P) cycles, using Norway as a case study. We found that (i) avoidable food waste in Norway accounts for 17% of sold food; (ii) 10% of the avoidable food waste occurs at the consumption stage, while industry and retailers account for only 7%; (iii) the theoretical potential for systems-wide net process energy savings is 16% for FW prevention and 8% for FW recycling; (iv) the theoretical potential for systems-wide P savings is 21% for FW prevention and 9% for FW recycling; (v) while FW recycling results in exclusively domestic nutrient and energy savings, FW prevention leads to domestic and international savings due to large food imports; (vi) most effective is a combination of prevention and recycling, however, FW prevention reduces the potential for FW recycling and therefore needs to be prioritized to avoid potential overcapacities for FW recycling.

  14. Information Security: Governmentwide Guidance Needed to Assist Agencies in Implementing Cloud Computing

    DTIC Science & Technology

    2010-07-01

    Cloud computing , an emerging form of computing in which users have access to scalable, on-demand capabilities that are provided through Internet... cloud computing , (2) the information security implications of using cloud computing services in the Federal Government, and (3) federal guidance and...efforts to address information security when using cloud computing . The complete report is titled Information Security: Federal Guidance Needed to

  15. System security in the space flight operations center

    NASA Technical Reports Server (NTRS)

    Wagner, David A.

    1988-01-01

    The Space Flight Operations Center is a networked system of workstation-class computers that will provide ground support for NASA's next generation of deep-space missions. The author recounts the development of the SFOC system security policy and discusses the various management and technology issues involved. Particular attention is given to risk assessment, security plan development, security implications of design requirements, automatic safeguards, and procedural safeguards.

  16. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND... National Security Information § 2.911 Admissibility of restricted data or other national security...

  17. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND... National Security Information § 2.911 Admissibility of restricted data or other national security...

  18. 10 CFR 76.111 - Physical security, material control and accounting, and protection of certain information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...

  19. 10 CFR 76.111 - Physical security, material control and accounting, and protection of certain information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...

  20. 10 CFR 76.111 - Physical security, material control and accounting, and protection of certain information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...

  1. 10 CFR 76.111 - Physical security, material control and accounting, and protection of certain information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...

  2. NREL: News - New Energy Systems Enhance National Security

    Science.gov Websites

    resources, bioenergy and bio-based products, zero energy buildings, wind energy, geothermal energy, solar Energy Systems Enhance National Security Washington D.C., March 14, 2002 Experts from the U.S . Department of Energy's National Renewable Energy Laboratory (NREL) have identified key renewable energy

  3. Urbanization, Extreme Climate Hazards and Food, Energy Water Security

    NASA Astrophysics Data System (ADS)

    Romero-Lankao, P.; Davidson, D.; McPhearson, T.

    2016-12-01

    Research is urgently needed that incorporates the interconnected nature of three critical resources supporting our cities: food, energy and water. Cities are increasing demands for food, water and energy resources that in turn stress resource supplies, creating risks of negative impacts to human and ecological wellbeing. Simultaneously, shifts in climatic conditions, including extremes such as floods, heat, and droughts, threaten the sustainable availability of adequate quantities and qualities of food, energy and water (FEW) resources needed for resilient cities and ecosystems. These resource flows cannot be treated in isolation simply because they are interconnected: shifts in food, energy or water dynamics in turn affect the others, affecting the security of the whole - i.e., FEW nexus security. We present a framework to examine the dynamic interactions of urbanization, FEW nexus security and extreme hazard risks, with two overarching research questions: Do existing and emerging actions intended to enhance a population's food, water and energy security have the capacity to ensure FEW nexus security in the face of changing climate and urban development conditions? Can we identify a common set of social, ecological and technological conditions across a diversity of urban-regions that support the emergence of innovations that can lead to structural transformations for FEW nexus security?

  4. Less waste corn, more land in soybeans, and the switch to genetically modified crops: Trends with important implications for wildlife management

    USGS Publications Warehouse

    Krapu, G.L.; Brandt, D.A.; Cox, R.R.

    2004-01-01

    American agriculture has provided abundant high-energy foods for migratory and resident wildlife populations since the onset of modern wildlife management. Responding to anecdotal evidence that corn residues are declining in cropland, we remeasured waste corn post-harvest in the Central Platte River Valley (CPRV) of Nebraska during 1997 and 1998 to compare with 1978. Post-harvest waste corn averaged 2.6% and 1.8% of yield in 1997 and 1998, respectively. After accounting for a 20% increase in yield, waste corn in 1997 and 1998 was reduced 24% and 47% from 1978. We also evaluated use of soybeans by spring-staging sandhill cranes (Crus canadensis) and waterfowl during spring 1998 and 1999. Despite being widely available in the CPRV, soybeans did not occur in esophageal contents of sandhill cranes (n=174), northern pintails (Anas acuta, n=139), greater white-fronted geese (Anser albifrons, n=198), or lesser snow geese (Chen caerulescens, n=208) collected with food in their esophagi. Lack of soybean consumption by cranes and waterfowl in Nebraska in early spring builds upon previously published findings, suggesting that soybeans are poorly suited for meeting nutrient needs of wildlife requiring a high-energy diet. Given evidence that high-energy food and numerous populations of seed-eating species found on farmland are declining, and the enormous potential risk to game and nongame wildlife populations if high-energy foods were to become scarce, a comprehensive research effort to study the problem appears warranted. Provisions under the Conservation Security subtitle of The Farm Security and Rural Investment Act of 2002 offer a potential mechanism to encourage producers to manage cropland in ways that would replace part of the high-energy foods that have been lost to increasing efficiency of production agriculture.

  5. Powering America’s Economy: Energy Innovation at the Crossroads of National Security Challenges

    DTIC Science & Technology

    2010-07-01

    the United States? • How can DOD contribute to America’s eco - nomic and national security while addressing its own energy challenges? Our findings and...recommendations follow. Findings Finding 1: America’s energy choices are inextricably linked to national and eco - nomic security. America’s...tegic environment. By taking bold leadership actions now, the nation can turn the growing energy and eco - nomic challenges into great opportunity

  6. An integrated water-energy-food-livelihoods approach for assessing environmental livelihood security

    NASA Astrophysics Data System (ADS)

    Biggs, E. M.; Duncan, J.; Boruff, B.; Bruce, E.; Neef, A.; McNeill, K.; van Ogtrop, F. F.; Haworth, B.; Duce, S.; Horsley, J.; Pauli, N.; Curnow, J.; Imanari, Y.

    2015-12-01

    Environmental livelihood security refers to the challenges of maintaining global food security and universal access to freshwater and energy to sustain livelihoods and promote inclusive economic growth, whilst sustaining key environmental systems' functionality, particularly under variable climatic regimes. Environmental security is a concept complementary to sustainable development, and considers the increased vulnerability people have to certain environmental stresses, such as climatic change. Bridging links between the core component concepts of environmental security is integral to future human security, and in an attempt to create this bridge, the nexus approach to human protection has been created, where water resource availability underpins food, water and energy security. The water-energy-food nexus has an influential role in attaining human security, yet little research has made the link between the nexus and livelihoods. In this research we provide a critical appraisal of the synergies between water-energy-food nexus framings and sustainable livelihoods approaches, both of which aim to promote sustainable development. In regions where livelihoods are dependent on environmental conditions, the concept of sustainable development is critical for ensuring future environmental and human security. Given our appraisal we go on to develop an integrated framework for assessing environmental livelihood security of multiscale and multi-level systems. This framework provides a tangible approach for assessing changes in the water-energy-food-livelihood indicators of a system. Examples of where system applications may occur are discussed for the Southeast Asia and Oceania region. Our approach will be particularly useful for policy-makers to inform evidence-based decision-making, especially in localities where climate change increases the vulnerability of impoverished communities and extenuates environmental livelihood insecurity.

  7. Long-term energy security in a national scale using LEAP. Application to de-carbonization scenarios in Andorra

    NASA Astrophysics Data System (ADS)

    Travesset-Baro, Oriol; Jover, Eric; Rosas-Casals, Marti

    2016-04-01

    This paper analyses the long-term energy security in a national scale using Long-range Energy Alternatives Planning System (LEAP) modelling tool. It builds the LEAP Andorra model, which forecasts energy demand and supply for the Principality of Andorra by 2050. It has a general bottom-up structure, where energy demand is driven by the technological composition of the sectors of the economy. The technological model is combined with a top-down econometric model to take into account macroeconomic trends. The model presented in this paper provides an initial estimate of energy demand in Andorra segregated into all sectors (residential, transport, secondary, tertiary and public administration) and charts a baseline scenario based on historical trends. Additional scenarios representing different policy strategies are built to explore the country's potential energy savings and the feasibility to achieve the Intended Nationally Determined Contribution (INDC) submitted in April 2015 to UN. In this climatic agreement Andorra intends to reduce net greenhouse gas emissions (GHG) by 37% as compared to a business-as-usual scenario by 2030. In addition, current and future energy security is analysed in this paper under baseline and de-carbonization scenarios. Energy security issues are assessed in LEAP with an integrated vision, going beyond the classic perspective of security of supply, and being closer to the sustainability's integrative vision. Results of scenarios show the benefits of climate policies in terms of national energy security and the difficulties for Andorra to achieving the de-carbonization target by 2030.

  8. The Legal Implications of Surveillance Cameras

    ERIC Educational Resources Information Center

    Steketee, Amy M.

    2012-01-01

    The nature of school security has changed dramatically over the last decade. Schools employ various measures, from metal detectors to identification badges to drug testing, to promote the safety and security of staff and students. One of the increasingly prevalent measures is the use of security cameras. In fact, the U.S. Department of Education…

  9. Information Systems Security Job Advertisement Analysis: Skills Review and Implications for Information Systems Curriculum

    ERIC Educational Resources Information Center

    Brooks, Nita G.; Greer, Timothy H.; Morris, Steven A.

    2018-01-01

    The authors' focus was the assessment of skill requirements for information systems security positions to understand expectations for security jobs and to highlight issues relevant to curriculum management. The analysis of 798 job advertisements involved the exploration of domain-related and soft skills as well as degree and certification…

  10. Migrants, refugees and insecurity. Current threats to peace?

    PubMed

    Lohrmann, R

    2000-01-01

    Since the early 1980s, international migration has moved beyond humanitarian, economic development, labor market and societal integration concerns, raising complex interactive security implications for governments of migrant sending, receiving and transit countries, as well as for multilateral bodies. This article examines the effects of international migration on varied understandings and perceptions of international security. It discusses why international migration has come to be perceived as a security issue, both in industrialized and developing countries. Questions are raised on the migration-security nexus and the way in which the concepts "security" and "migration" are used. The real and perceived impacts of international migration upon national and regional security, both in industrialized and developing countries, are analyzed. The policies developed by governments and multilateral agencies since the mid-1980s to mitigate the destabilizing effects of certain kinds of international population movement and human displacement are examined. The conclusions stress the need for the establishment of a comprehensive framework of international cooperation among origin and receiving countries and international organizations to address the destabilizing implications of international migration.

  11. Sex-specific relationships among attachment security, social values, and sensation seeking in early adolescence: implications for adolescents' externalizing problem behaviour.

    PubMed

    Sarracino, Diego; Presaghi, Fabio; Degni, Silvia; Innamorati, Marco

    2011-06-01

    In early adolescence, attachment security reflects not only the quality of ongoing relationships with parents, but also how adolescents process social relationships with "others" - that is, their "social value orientation" - with possible implications for adolescents' risk-taking. In this study, a sample of Italian early adolescents were administered self-report measures in order to examine the relationships (a) between early adolescents' perceived attachment security to mothers and fathers, social values (related to family and the socio-cultural context), and sensation seeking (as a temperamental predisposition to risk-taking), and (b) between these variables and adolescents' externalizing problem behaviour. Adolescents were more securely attached to the same-sexed parent. Further, attachment security with the opposite-sexed parent predicted more conservative social value orientations, and lower levels of problem behaviour. In contrast, sensation seeking predicted self-enhancement and openness-to-change values to a greater extent, and, in girls, lower levels of attachment security to mothers and fathers. Copyright © 2010 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  12. Energy Transfer Between Coherently Delocalized States in Thin Films of the Explosive Pentaerythritol Tetranitrate (PETN) Revealed by Two-Dimensional Infrared Spectroscopy

    NASA Astrophysics Data System (ADS)

    Ostrander, Joshua; Knepper, Robert; Tappan, Alexander; Kay, Jeffery; Zanni, Martin; Farrow, Darcie

    2017-06-01

    Pentaerythritol tetranitrate (PETN) is a common secondary explosive and has been used extensively to study shock initiation and energy propagation in energetic materials. We report 2D IR measurements of PETN thin films that resolve vibrational energy transfer and relaxation mechanisms. Ultrafast anisotropy measurements reveal a sub-500 fs reorientation of transition dipoles in thin films of vapor-deposited PETN that is absent in solution measurements, consistent with intermolecular energy transfer. The anisotropy is frequency dependent, suggesting spectrally heterogeneous vibrational relaxation. Cross peaks are observed in 2D IR spectra that resolve a specific energy transfer pathway with a 2 ps time scale. Measurements of the transition dipole strength indicate that these vibrational modes are coherently delocalized over at least 15-30 molecules. We discuss the implications of vibrational relaxation between coherently delocalized eigenstates for mechanisms relevant to explosives. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.

  13. Global Warming: Its Implications for U.S. National Security Policy

    DTIC Science & Technology

    2009-03-19

    The approach to this topic will be to look at the science behind anthropogenic global warming . Is man largely responsible for causing global warming due...paper will then investigate the nexus between global warming and U.S. national security policy. It will address the challenges facing U.S. leaders and...policy makers as they tackle the issue of global warming and its implications for U.S. policy. Finally it will conclude with recommendations for those

  14. 75 FR 63867 - DTE Energy; Enrico Fermi Atomic Power Plant Unit 1, Exemption From Certain Security Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-18

    ... procedures, physical security plan, guard training and qualification plan, or cyber security plan for the... Power Plant Unit 1, Exemption From Certain Security Requirements 1.0 Background DTE Energy (DTE) is the... atmospheric pressure. In November 1972, the Power Reactor Development Company (PRDC), the licensee at that...

  15. 75 FR 36128 - Green Energy Resources, Inc.; Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-24

    ... Suspension of Trading June 22, 2010. It appears to the Securities and Exchange Commission that there is a... a suspension of trading in the securities of Green Energy. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in the securities of the above-listed...

  16. Energy and National Security

    ERIC Educational Resources Information Center

    Abelson, Philip H.

    1973-01-01

    Discussed in this editorial is the need for a broad and detailed government policy on energy use. Oil companies can not be given complete responsibility to demonstrate usage of different energy sources. The government should construct plants because energy is connected with national security. (PS)

  17. 76 FR 37343 - Proposed Subsequent Arrangement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-27

    ... International Security, National Nuclear Security Administration, Department of Energy. ACTION: Proposed... arrangement under the Agreement for Cooperation Concerning Civil Uses of Nuclear Energy Between the Government... Peaceful Uses of Nuclear Energy Between the United States of America and the European Atomic Energy...

  18. Interface of Science, Technology and Security: Areas of Most Concern, Now and Ahead

    DTIC Science & Technology

    2017-03-28

    connectivity is creating new forms of security threats and exploitable instabilities. There is a need to develop secure software to reduce vulnerabilities...implications in the light of global population growth, industrialization and limited fossil fuel supplies. The continued improvement of generation, storage...national strategic concern is when the S&T-security nexus creates opportunities for misunderstanding. These opportunities assume two forms , rooted in

  19. Nuclear energy: Between global electricity demand, worldwide decarbonisation imperativeness, and planetary environmental implications.

    PubMed

    Prăvălie, Remus; Bandoc, Georgeta

    2018-03-01

    For decades, nuclear energy has been considered an important option for ensuring global energy security, and it has recently started being promoted as a solution for climate change mitigation. However, nuclear power remains highly controversial due to its associated risks - nuclear accidents and problematic radioactive waste management. This review aims to assess the viability of global nuclear energy economically (energy-wise), climatically and environmentally. To this end, the nuclear sector's energy- and climate-related advantages were explored alongside the downsides that mainly relate to radioactive pollution. Economically, it was found that nuclear energy is still an important power source in many countries around the world. Climatically, nuclear power is a low-carbon technology and can therefore be a viable option for the decarbonization of the world's major economies over the following decades, if coupled with other large-scale strategies such as renewable energies. These benefits are however outweighed by the radioactive danger associated to nuclear power plants, either in the context of the nuclear accidents that have already occurred or in that of the large amounts of long-lived nuclear waste that have been growing for decades and that represent a significant environmental and societal threat. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. Application of Multipurpose Cadastre to Evaluate Energy Security of Land Parcel (Case Study: Gedung A and Gedung B, Institut Teknologi Sumatra)

    NASA Astrophysics Data System (ADS)

    Alif, S. M.; Nugroho, A. P.; Leksono, B. E.

    2018-03-01

    Energy security has one of its dimensions: Short-term energy security which focuses on the ability of the energy system to react promptly to sudden changes within the supply-demand balance. Non-energy components (such as land parcel) that comprise an energy system are analysed comprehensively with other component to measure energy security related to energy supply. Multipurpose cadastre which is an integrated land information system containing legal, physical, and cultural is used to evaluate energy (electrical energy) security of land parcel. The fundamental component of multipurpose cadastre used to evaluate energy security is attribute data which is the value of land parcel facilities. Other fundamental components (geographic control data, base map data, cadastral data) are used as position information and provide weight in room (part of land parcel) valuation. High value-room means the room is comfortable and/or used productively by its occupant. The method of valuation is by comparing one facility to other facilities. Facilities included in room valuation are relatively static items (such as chair, desk, and cabinet) except lamps and other electronic devices. The room value and number of electronic devices which consume electrical energy are correlated with each other. Consumption of electrical energy of electronic devices in the room with average value remains constant while consumption in other room needs to be evaluated to save the energy. The result of this research shows that room value correlate weakly with number of electronic device in corresponding room. It shows excess energy consumed in low-value room. Although numbers of electronic devices do not always mean the consumption of electrical energy and there are plenty electronic devices, it is recommended for occupant to be careful in utilizing electronic devices in low-value room to minimize energy consumption.

  1. Energy Security Strategies: An Analysis of Tanzania and Mozambique

    DTIC Science & Technology

    2016-06-01

    prioritizes domestic consumption or export of energy resources. The strategy a government chooses affects the overall energy security of that country...This thesis seeks to explain why countries pursue energy strategies that focus on domestic consumption of indigenous energy resources instead of...energy strategy that either prioritizes domestic consumption or export of energy resources. The strategy a government chooses affects the overall

  2. The energy and emissions footprint of water supply for Southern California

    NASA Astrophysics Data System (ADS)

    Fang, A. J.; Newell, Joshua P.; Cousins, Joshua J.

    2015-11-01

    Due to climate change and ongoing drought, California and much of the American West face critical water supply challenges. California’s water supply infrastructure sprawls for thousands of miles, from the Colorado River to the Sacramento Delta. Bringing water to growing urban centers in Southern California is especially energy intensive, pushing local utilities to balance water security with factors such as the cost and carbon footprint of the various supply sources. To enhance water security, cities are expanding efforts to increase local water supply. But do these local sources have a smaller carbon footprint than imported sources? To answer this question and others related to the urban water-energy nexus, this study uses spatially explicit life cycle assessment to estimate the energy and emissions intensity of water supply for two utilities in Southern California: Los Angeles Department of Water and Power, which serves Los Angeles, and the Inland Empire Utility Agency, which serves the San Bernardino region. This study differs from previous research in two significant ways: (1) emissions factors are based not on regional averages but on the specific electric utility and generation sources supplying energy throughout transport, treatment, and distribution phases of the water supply chain; (2) upstream (non-combustion) emissions associated with the energy sources are included. This approach reveals that in case of water supply to Los Angeles, local recycled water has a higher carbon footprint than water imported from the Colorado River. In addition, by excluding upstream emissions, the carbon footprint of water supply is potentially underestimated by up to 30%. These results have wide-ranging implications for how carbon footprints are traditionally calculated at local and regional levels. Reducing the emissions intensity of local water supply hinges on transitioning the energy used to treat and distribute water away from fossil fuel, sources such as coal.

  3. Understanding the Influence of Mental Health Diagnosis and Gender on Placement Decisions for Justice-Involved Youth.

    PubMed

    Kempker, Samantha M; Schmidt, Adam T; Espinosa, Erin M

    2017-07-01

    Justice-involved youth have high rates of psychiatric diagnoses, and these youth are often placed out-of-home, although evidence identifies several negative implications of juvenile confinement, especially for youth with psychopathology. Furthermore, youth in the justice system may be processed differently based on gender. As males and females tend to manifest symptoms differently, the psychopathology of youth may act to moderate the relationship between gender and placement in the juvenile justice system. The present study used a large, diverse sample (n = 9 851, 19.8 % female) to examine whether youth placed in various types of out-of-home facilities differed in terms of externalizing, internalizing, substance use, or comorbid disorders, and to determine the predictive value of mental health diagnoses in placement decisions. The moderation effect of psychopathology and substance use on the relationship between gender and placement also was explored. The results indicated that each type of disorder differed across placements, with internalizing being most prevalent in non-secure, and externalizing, comorbid, and substance use being most prevalent in secure settings. Mental health diagnoses improved the prediction of placement in each out-of-home placement beyond legal and demographic factors such that externalizing and substance use disorders decreased the likelihood of placement in non-secure settings, and internalizing, externalizing, and substance use disorders increased the likelihood of placement in secure and state-secure facilities. The relationship between internalizing pathology and placement in more secure facilities was moderated by externalizing pathology. The relationship between gender and placement was significantly moderated by mental health such that females with mental health diagnoses receive less secure placements. Implications for policymakers and practitioners are discussed, as well as implications for reforming juvenile justice within a developmental approach.

  4. Global renewable energy-based electricity generation and smart grid system for energy security.

    PubMed

    Islam, M A; Hasanuzzaman, M; Rahim, N A; Nahar, A; Hosenuzzaman, M

    2014-01-01

    Energy is an indispensable factor for the economic growth and development of a country. Energy consumption is rapidly increasing worldwide. To fulfill this energy demand, alternative energy sources and efficient utilization are being explored. Various sources of renewable energy and their efficient utilization are comprehensively reviewed and presented in this paper. Also the trend in research and development for the technological advancement of energy utilization and smart grid system for future energy security is presented. Results show that renewable energy resources are becoming more prevalent as more electricity generation becomes necessary and could provide half of the total energy demands by 2050. To satisfy the future energy demand, the smart grid system can be used as an efficient system for energy security. The smart grid also delivers significant environmental benefits by conservation and renewable generation integration.

  5. Global Renewable Energy-Based Electricity Generation and Smart Grid System for Energy Security

    PubMed Central

    Islam, M. A.; Hasanuzzaman, M.; Rahim, N. A.; Nahar, A.; Hosenuzzaman, M.

    2014-01-01

    Energy is an indispensable factor for the economic growth and development of a country. Energy consumption is rapidly increasing worldwide. To fulfill this energy demand, alternative energy sources and efficient utilization are being explored. Various sources of renewable energy and their efficient utilization are comprehensively reviewed and presented in this paper. Also the trend in research and development for the technological advancement of energy utilization and smart grid system for future energy security is presented. Results show that renewable energy resources are becoming more prevalent as more electricity generation becomes necessary and could provide half of the total energy demands by 2050. To satisfy the future energy demand, the smart grid system can be used as an efficient system for energy security. The smart grid also delivers significant environmental benefits by conservation and renewable generation integration. PMID:25243201

  6. Water-Energy-Food Nexus in Asia-Pacific Ring of Fire

    NASA Astrophysics Data System (ADS)

    Taniguchi, M.; Endo, A.; Gurdak, J. J.; Allen, D. M.; Siringan, F.; Delinom, R.; Shoji, J.; Fujii, M.; Baba, K.

    2013-12-01

    Climate change and economic development are causing increased pressure on water, energy and food resources, presenting communities with increased levels of tradeoffs and potential conflicts among these resources. Therefore, the water-energy-food nexus is one of the most important and fundamental global environmental issues facing the world. For the purposes of this research project, we define human-environmental security as the joint optimization between human and environmental security as well as the water-energy-food nexus. To optimize the governance and management within these inter-connected needs, it is desirable to increase human-environmental security by improving social managements for the water-energy-food nexus. In this research project, we intend to establish a method to manage and optimize the human-environmental security of the water-energy-food nexus by using integrated models, indices, and maps as well as social and natural investigations with stakeholder analyses. We base our approach on the viewpoint that it is important for a sustainable society to increase human-environmental security with decreasing risk and increasing resilience by optimizing the connections within the critical water-energy and water-food clusters. We will take a regional perspective to address these global environmental problems. The geological and geomorphological conditions in our proposed study area are heavily influenced by the so-called 'Ring of Fire,' around the Pacific Ocean. Within these areas including Japan and Southeast Asia, the hydro-meteorological conditions are dominated by the Asia monsoon. The populations that live under these natural conditions face elevated risk and potential disaster as negative impacts, while also benefitting from positive ecological goods and services. There are therefore tradeoffs and conflicts within the water-energy-food nexus, as well as among various stakeholders in the region. The objective of this project is to maximize human-environmental security (minimize the risk) by choosing management structures and policies that optimize both the water-food-energy nexus in Asia-Pacific coastal regions. We define joint security approach as optimized policy. Optimal policies will develop joint security approaches for human-environmental security in the coastal region of the Ring of Fire, including stakeholders and decision-makers.

  7. A Study on the Commercialization of Space-Based Remote Sensing in the Twenty-First Century and Its Implications to United States National Security

    DTIC Science & Technology

    2011-06-01

    Remote sensing from space provides critical data for many commercial space applications. Due to global market demand, it has undergone tremendous...commercial space imaging capability in the future, remote sensing policy makers, systems engineers, and industry analysts must be aware of the implications to United States National Security....available dissemination and accessibility. The analysis results, together with the findings from a review of commercial programs, initiatives, and remote

  8. Renditions: Constraints Imposed by Laws on Torture

    DTIC Science & Technology

    2009-01-22

    AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY ...suspended after the Italian government said testimony could reveal state secrets threatening Italy’s national security . “CIA-Linked Kidnapping Trial...raised against U.S. officials implicated national security and foreign policy considerations, and assessing the propriety of those considerations was

  9. 78 FR 57922 - American Energy Production, Inc., Best Energy Services, Inc., Community Central Bank Corporation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-20

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] American Energy Production, Inc., Best Energy Services, Inc., Community Central Bank Corporation, Explortex Energy, Inc., HemoBioTech, Inc., Larrea... securities of HemoBioTech, Inc. because it has not filed any periodic reports since the period ended December...

  10. Sandia National Laboratories: National Security Programs

    Science.gov Websites

    policy. Topics About Nuclear Weapons Safety & Security Science & Technology Defense Systems & science and technology to help defend and protect the United States. Topics About Defense Systems & . Topics Stationary Power Earth Science Transportation Energy Energy Research Global Security Birc We

  11. 10 CFR 1015.210 - Liquidation of collateral.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... States. Collection from other sources, including liquidation of security or collateral, is not a... Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) COLLECTION OF CLAIMS OWED THE UNITED STATES Standards... liquidate security or collateral through the exercise of a power of sale in the security instrument or a...

  12. 3 CFR - Blue Ribbon Commission on America's Nuclear Future

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... America's Nuclear Future Memorandum for the Secretary of Energy Expanding our Nation's capacity to generate clean nuclear energy is crucial to our ability to combat climate change, enhance energy security... safe, secure, and responsible use of nuclear energy. These efforts are critical to accomplishing many...

  13. Relevance of Clean Coal Technology for India’s Energy Security: A Policy Perspective

    NASA Astrophysics Data System (ADS)

    Garg, Amit; Tiwari, Vineet; Vishwanathan, Saritha

    2017-07-01

    Climate change mitigation regimes are expected to impose constraints on the future use of fossil fuels in order to reduce greenhouse gas (GHG) emissions. In 2015, 41% of total final energy consumption and 64% of power generation in India came from coal. Although almost a sixth of the total coal based thermal power generation is now super critical pulverized coal technology, the average CO2 emissions from the Indian power sector are 0.82 kg-CO2/kWh, mainly driven by coal. India has large domestic coal reserves which give it adequate energy security. There is a need to find options that allow the continued use of coal while considering the need for GHG mitigation. This paper explores options of linking GHG emission mitigation and energy security from 2000 to 2050 using the AIM/Enduse model under Business-as-Usual scenario. Our simulation analysis suggests that advanced clean coal technologies options could provide promising solutions for reducing CO2 emissions by improving energy efficiencies. This paper concludes that integrating climate change security and energy security for India is possible with a large scale deployment of advanced coal combustion technologies in Indian energy systems along with other measures.

  14. From jhum to broom: Agricultural land-use change and food security implications on the Meghalaya Plateau, India.

    PubMed

    Behera, Rabi Narayan; Nayak, Debendra Kumar; Andersen, Peter; Måren, Inger Elisabeth

    2016-02-01

    Human population growth in the developing world drives land-use changes, impacting food security. In India, the dramatic change in demographic dynamics over the past century has reduced traditional agricultural land-use through increasing commercialization. Here, we analyze the magnitude and implications for the farming system by the introduction of cash-cropping, replacing the traditional slash and burn rotations (jhum), of the tribal people on the Meghalaya Plateau, northeast India, by means of agricultural census data and field surveys conducted in seven villages. Land-use change has brought major alterations in hill agricultural practices, enhanced cash-cropping, promoted mono-cropping, changed food consumption patterns, underpinned the emergence of a new food system, and exposed farmers and consumers to the precariousness of the market, all of which have both long- and short-term food security implications. We found dietary diversity to be higher under jhum compared to any of the cash-crop systems, and higher under traditional cash-cropping than under modern cash-cropping.

  15. USGS world petroleum assessment 2000; new estimates of undiscovered oil and natural gas, including reserve growth, outside the United States

    USGS Publications Warehouse

    ,

    2000-01-01

    Oil and natural gas account for approximately 63 percent of the world’s total energy consumption. The U.S. Geological Survey periodically estimates the amount of oil and gas remaining to be found in the world. Since 1981, each of the last four of these assessments has shown a slight increase in the combined volume of identified reserves and undiscovered resources. The latest assessment estimates the volume of technically recoverable conventional oil and gas that may be added to the world's reserves, exclusive of the United States, in the next 30 years. The USGS World Petroleum Assessment 2000 reports an increase in global petroleum resources, including a 20-percent increase in undiscovered oil and a 14-percent decrease in undiscovered natural gas compared to the previous assessment (table 1). These results have important implications for energy prices, policy, security, and the global resource balance.

  16. Suprathermal Ion Populations in ICF Plasmas - Implications for Diagnostics and Ignition

    NASA Astrophysics Data System (ADS)

    Knapp, Patrick; Schmit, Paul; Sinars, Daniel

    2013-10-01

    We report on investigations into the effects of suprathermal ion populations on neutron production in Inertial Confinement and Magneto-Inertial Fusion plasmas. In a recent article we showed that a suprathermal population taking the form of a power-law in energy will significantly modify the shape and width of the neutron spectrum and can dramatically increase the fusion reactivity compared to the Maxwellian case. Specific diagnostic signatures are discussed in detail. We build on this work to include the effect of an applied magnetic field on the neutron spectra, isotropy and production rate. Finally, the impact that these modifications have on the ability to reach high fusion yields and ignition is discussed. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration.

  17. Electronic and Magnetic Properties of Cd-Doped PuRhIn5

    NASA Astrophysics Data System (ADS)

    Zhu, Jian-Xin

    Since their discovery nearly a decade ago, plutonium-based superconductors have attracted considerable interest, which is now heightened by the latest discovery of superconductivity in other Pu-115 compounds. Within the generalized gradient approximation (GGA) of density functional theory and its combination with the dynamical mean-field theory, we present a study of electronic structure in the paramagnetic state of Cd-doped PuRhIn5. A doping-induced delocalization-localization transition is identified. In addition, the spin-polarized GGA-based total energy calculations are performed to determine the magnetic exchange interactions in the pristine PuRhIn5. The implication to the nature of quantum criticality is discussed. This work was carried out under the auspices of the National Nuclear Security Administration of the U.S. Department of Energy at LANL under Contract No. DE-AC52-06NA25396, and was supported by the LANL ASC Program.

  18. Implications of climate change mitigation for sustainable development

    NASA Astrophysics Data System (ADS)

    Jakob, Michael; Steckel, Jan Christoph

    2016-10-01

    Evaluating the trade-offs between the risks related to climate change, climate change mitigation as well as co-benefits requires an integrated scenarios approach to sustainable development. We outline a conceptual multi-objective framework to assess climate policies that takes into account climate impacts, mitigation costs, water and food availability, technological risks of nuclear energy and carbon capture and sequestration as well as co-benefits of reducing local air pollution and increasing energy security. This framework is then employed as an example to different climate change mitigation scenarios generated with integrated assessment models. Even though some scenarios encompass considerable challenges for sustainability, no scenario performs better or worse than others in all dimensions, pointing to trade-offs between different dimensions of sustainable development. For this reason, we argue that these trade-offs need to be evaluated in a process of public deliberation that includes all relevant social actors.

  19. Energy Security is National Security

    DTIC Science & Technology

    2011-03-11

    made to resur~ect Cantrell in early 2000 with some success. A newer technique using nitrogen injection was used on the mammoth field. For four years...related to economic survival. Addiction to fossil f-uels enslaves foreign policy, ensures trade deficits and destroys the · enviro ~ent. Energy security

  20. 10 CFR 39.31 - Labels, security, and transportation precautions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...

  1. 10 CFR 39.31 - Labels, security, and transportation precautions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...

  2. 10 CFR 39.31 - Labels, security, and transportation precautions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...

  3. Modeling Laser-Plasma Interactions at Direct-Drive Ignition-Relevant Plasma Conditions at the National Ignition Facility

    NASA Astrophysics Data System (ADS)

    Solodov, A. A.; Rosenberg, M. J.; Myatt, J. F.; Epstein, R.; Seka, W.; Hohenberger, M.; Short, R. W.; Shaw, J. G.; Regan, S. P.; Froula, D. H.; Radha, P. B.; Bates, J. W.; Schmitt, A. J.; Michel, P.; Moody, J. D.; Ralph, J. E.; Turnbull, D. P.; Barrios, M. A.

    2016-10-01

    Laser-plasma interaction instabilities, such as two-plasmon decay (TPD) and stimulated Raman scattering (SRS), can be detrimental for direct-drive inertial confinement fusion because of target preheat by generated high-energy electrons. The radiation-hydrodynamics code DRACO has been used to design planar-target experiments that generate plasma and interaction conditions relevant to direct-drive-ignition designs (IL 1015 W / cm 2 , Te > 3 KeV density gradient scale lengths of Ln 600 μm) . The hot-electron temperature of 40to50keV and the fraction of laser energy converted to hot electrons of 0.5to were inferred based on comparing the simulated and experimentally observed x-ray emission when the laser intensity at the quarter-critical surface increased from 6 to 15 ×1014 W / cm 2 . The measured SRS energy was sufficient to explain the observed total energy in hot electrons. Implications for ignition-scale direct-drive experiments and hot-electron preheat mitigation using mid- Z ablators will be discussed. This material is based upon work supported by the Department of Energy National Nuclear Security Administration under Award Number DE-NA0001944.

  4. Strategic Pivot Toward the Asia-Pacific: Implications for USMC

    DTIC Science & Technology

    2013-03-01

    S) AND ADDRESS(ES) Dr. Gabriel Marcella Department of National Security and Strategy 8. PERFORMING ORGANIZATION REPORT NUMBER 9...Gabriel Marcella Department of National Security and Strategy Project Adviser This manuscript is submitted in partial fulfillment of the

  5. 78 FR 31997 - Greatmat Technology Corp., Kentucky USA Energy, Inc., Solar Energy Ltd., and Visiphor Corp...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-28

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Greatmat Technology Corp., Kentucky USA Energy, Inc., Solar Energy Ltd., and Visiphor Corp., Order of Suspension of Trading May 23, 2013. It appears... concerning the securities of Solar Energy Ltd. because it has not filed any periodic reports since the period...

  6. Cautious but committed: moving toward adaptive planning and operation strategies for renewable energy's wildlife implications.

    PubMed

    Köppel, Johann; Dahmen, Marie; Helfrich, Jennifer; Schuster, Eva; Bulling, Lea

    2014-10-01

    Wildlife planning for renewable energy must cope with the uncertainties of potential wildlife impacts. Unfortunately, the environmental policies which instigate renewable energy and those which protect wildlife are not coherently aligned-creating a green versus green dilemma. Thus, climate mitigation efforts trigger renewable energy development, but then face substantial barriers from biodiversity protection instruments and practices. This article briefly reviews wind energy and wildlife interactions, highlighting the lively debated effects on bats. Today, planning and siting of renewable energy are guided by the precautionary principle in an attempt to carefully address wildlife challenges. However, this planning attitude creates limitations as it struggles to negotiate the aforementioned green versus green dilemma. More adaptive planning and management strategies and practices hold the potential to reconcile these discrepancies to some degree. This adaptive approach is discussed using facets of case studies from policy, planning, siting, and operational stages of wind energy in Germany and the United States, with one case showing adaptive planning in action for solar energy as well. This article attempts to highlight the benefits of more adaptive approaches as well as the possible shortcomings, such as reduced planning security for renewable energy developers. In conclusion, these studies show that adaptive planning and operation strategies can be designed to supplement and enhance the precautionary principle in wildlife planning for green energy.

  7. Cautious but Committed: Moving Toward Adaptive Planning and Operation Strategies for Renewable Energy's Wildlife Implications

    NASA Astrophysics Data System (ADS)

    Köppel, Johann; Dahmen, Marie; Helfrich, Jennifer; Schuster, Eva; Bulling, Lea

    2014-10-01

    Wildlife planning for renewable energy must cope with the uncertainties of potential wildlife impacts. Unfortunately, the environmental policies which instigate renewable energy and those which protect wildlife are not coherently aligned—creating a green versus green dilemma. Thus, climate mitigation efforts trigger renewable energy development, but then face substantial barriers from biodiversity protection instruments and practices. This article briefly reviews wind energy and wildlife interactions, highlighting the lively debated effects on bats. Today, planning and siting of renewable energy are guided by the precautionary principle in an attempt to carefully address wildlife challenges. However, this planning attitude creates limitations as it struggles to negotiate the aforementioned green versus green dilemma. More adaptive planning and management strategies and practices hold the potential to reconcile these discrepancies to some degree. This adaptive approach is discussed using facets of case studies from policy, planning, siting, and operational stages of wind energy in Germany and the United States, with one case showing adaptive planning in action for solar energy as well. This article attempts to highlight the benefits of more adaptive approaches as well as the possible shortcomings, such as reduced planning security for renewable energy developers. In conclusion, these studies show that adaptive planning and operation strategies can be designed to supplement and enhance the precautionary principle in wildlife planning for green energy.

  8. 76 FR 30326 - Proposed Subsequent Arrangement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-25

    ... International Security, National Nuclear Security Administration, Department of Energy. ACTION: Proposed... United States of America and the Government of Japan Concerning Peaceful Uses of Nuclear Energy. DATES... Energy. Anne M. Harrington, Deputy Administrator, Defense Nuclear Nonproliferation. [FR Doc. 2011-12919...

  9. Transportation Energy Security and Climate Change Mitigation Act of 2007

    DOT National Transportation Integrated Search

    2008-09-29

    The Committee on Transportation and Infrastructure, to whom was referred the bill (H.R. 2701) to strengthen our Nations energy security and mitigate the effects of climate change by promoting energy efficient transportation and public buildings, c...

  10. Fortresses and Icebergs: The Evolution of the Transatlantic Defense Market and the Implications for U.S. National Security Policy. Volume 1: Study Findings and Recommendations

    DTIC Science & Technology

    2009-01-01

    The United States needs a new model of “globalized” national security for this changing world: we must realign longstanding policies away from go...at the center of our approach to ensuring our future security. … Now, when we most need to re-examine our Transatlantic security model, this new two...address the globalized threats we face, our gov- ernment is already reorienting the capabilities of our national security forces to a new bal- ance

  11. Common Operating Picture: UAV Security Study

    NASA Technical Reports Server (NTRS)

    2004-01-01

    This initial communication security study is a top-level assessment of basic security issues related to the operation of Unmanned Aerial Vehicles (UAVs) in the National Airspace System (NAS). Security considerations will include information relating to the use of International Civil Aviation Organization (ICAO) Aeronautical Telecommunications Network (ATN) protocols and applications identifying their maturity, as well as the use of IPV4 and a version of mobile IPV6. The purpose of this assessment is to provide an initial analysis of the security implications of introducing UAVs into the NAS.

  12. Advanced Micro Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy Security, and Power Quality at DoD Installations

    DTIC Science & Technology

    2016-10-28

    assumptions. List of Assumptions: Price of electrical energy : $0.07/kWh flat rate for energy at the base Price of peak power: $15/MW peak power...EW-201147) Advanced Micro-Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy Security, and...12-C-0002 5b. GRANT NUMBER Advanced Micro-Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy

  13. Biosecurity in the age of Big Data: a conversation with the FBI

    PubMed Central

    Kozminski, Keith G.

    2015-01-01

    New scientific frontiers and emerging technologies within the life sciences pose many global challenges to society. Big Data is a premier example, especially with respect to individual, national, and international security. Here a Special Agent of the Federal Bureau of Investigation discusses the security implications of Big Data and the need for security in the life sciences. PMID:26543195

  14. National Security and Global Climate Change

    DTIC Science & Technology

    2008-01-01

    The uncertainty, confusion, and speculation about the causes, effects, and implications of global climate change (GCC) often paralyze serious...against scientific indications of global climate change , but to consider how it would pose challenges to national security, explore options for facing...generals and admirals, released a report concluding that projected climate change poses a serious threat to America’s national security. This article

  15. 10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...

  16. 10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...

  17. 10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...

  18. 10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...

  19. 10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...

  20. 10 CFR 76.111 - Physical security, material control and accounting, and protection of certain information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... significance (Category III), and for protection of Restricted Data, National Security Information, Safeguards... 10 Energy 2 2010-01-01 2010-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED...

  1. Cyber Security Audit and Attack Detection Toolkit

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  2. Strategic Response to Energy-Related Security Threats in the US Department of Defense

    DTIC Science & Technology

    2014-10-15

    generation in the United States are fossil fuels . These include coal, natural gas, and oil . In some cases solar, wind, geothermal, and hydroelectric...and findings. The research addressed engagement on climate change and energy security issues by DoD across various tiers and sectors of the...on climate change and energy security issues by DoD across various tiers and sectors of the organization. Specifically, a tripartite analysis

  3. 78 FR 40131 - Proposed Subsequent Arrangement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-03

    ... Concerning Peaceful Uses of Nuclear Energy and the Agreement Between the Government of the United States of America and Australia Concerning Peaceful Uses of Nuclear Energy. DATES: This subsequent arrangement will... Nonproliferation and International Security, National Nuclear Security Administration, Department of Energy...

  4. 77 FR 35366 - Proposed Subsequent Arrangement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-13

    ... Uses of Nuclear Energy and the Agreement for Cooperation Between the United States of America and the Republic of Kazakhstan Concerning Peaceful Uses of Nuclear Energy. DATES: This subsequent arrangement will... Nonproliferation and International Security, National Nuclear Security Administration, Department of Energy...

  5. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks.

    PubMed

    Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa

    2017-05-16

    In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks.

  6. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks

    PubMed Central

    Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa

    2017-01-01

    In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks. PMID:28509841

  7. 10 CFR 824.9 - Hearing Counsel.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Hearing Counsel. 824.9 Section 824.9 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... consistent with the objectives of the Act and DOE security requirements. ...

  8. 10 CFR 824.9 - Hearing Counsel.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Hearing Counsel. 824.9 Section 824.9 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... consistent with the objectives of the Act and DOE security requirements. ...

  9. How strong is the Social Security safety net? Using the Elder Index to assess gaps in economic security.

    PubMed

    Mutchler, Jan E; Li, Yang; Xu, Ping

    2018-04-16

    Older Americans rely heavily on Social Security benefits (SSBs) to support independent lifestyles, and many have few or no additional sources of income. We establish the extent to which SSBs adequately support economic security, benchmarked by the Elder Economic Security Standard Index. We document variability across U.S. counties in the adequacy levels of SSBs among older adults. We find that the average SSBs fall short of what is required for economic security in every county in the United States, but the level of shortfall varies considerably by location. Policy implications relating to strengthening Social Security and other forms of retirement income are discussed.

  10. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted...

  11. 10 CFR 10.32 - Recommendation of the NRC Personnel Security Review Panel.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Recommendation of the NRC Personnel Security Review Panel. 10.32 Section 10.32 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING... Procedures § 10.32 Recommendation of the NRC Personnel Security Review Panel. (a) The Deputy Executive...

  12. 10 CFR 10.32 - Recommendation of the NRC Personnel Security Review Panel.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Recommendation of the NRC Personnel Security Review Panel. 10.32 Section 10.32 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING... Procedures § 10.32 Recommendation of the NRC Personnel Security Review Panel. (a) The Deputy Executive...

  13. 10 CFR 10.32 - Recommendation of the NRC Personnel Security Review Panel.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Recommendation of the NRC Personnel Security Review Panel. 10.32 Section 10.32 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING... Procedures § 10.32 Recommendation of the NRC Personnel Security Review Panel. (a) The Deputy Executive...

  14. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  15. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  16. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  17. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  18. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  19. Changing man-land interrelations in China's farming area under urbanization and its implications for food security.

    PubMed

    Long, Hualou; Ge, Dazhuan; Zhang, Yingnan; Tu, Shuangshuang; Qu, Yi; Ma, Li

    2018-03-01

    The Huang-Huai-Hai Plain (HHH) is typical of China's farming area, and was predicted as one of the fastest growing areas of urbanization in the world. Since the turn of the new millennium, construction land and farmland transitions in this region driven by rapid urbanization have resulted in dramatic loss of farmland, which triggered a serious threat to regional even national food security. In this paper, the coupling relationships between per capita construction land transition (PCCT) and per capita farmland transition (PCFT) in the HHH and their implications for regional food security are analyzed. During 2000-2015, the farmland decreased by 8.59%, 72.25% of which were occupied by construction land. There are two major coupling types between PCCT and PCFT, one is the double increasing of per capita construction land area (PCCA) and per capita farmland area (PCFA); another is the increasing of PCCA and the decreasing of PCFA. The fluctuant increasing of PCCT and decreasing of PCFT coexisted and presented symmetrical coupling characteristics in space. Physical, location, transportation and socio-economic factors play significantly different roles in driving PCCT and PCFT. The implications for ensuring food security involve promoting the reclamation and redevelopment of inefficient and unused urban-rural construction land, reducing inefficient occupation of farmland resources, developing appropriate scale management of agriculture, and establishing a better social security system to smoothly settle down the floating rural population in the city. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. Assurance of energy efficiency and data security for ECG transmission in BASNs.

    PubMed

    Ma, Tao; Shrestha, Pradhumna Lal; Hempel, Michael; Peng, Dongming; Sharif, Hamid; Chen, Hsiao-Hwa

    2012-04-01

    With the technological advancement in body area sensor networks (BASNs), low cost high quality electrocardiographic (ECG) diagnosis systems have become important equipment for healthcare service providers. However, energy consumption and data security with ECG systems in BASNs are still two major challenges to tackle. In this study, we investigate the properties of compressed ECG data for energy saving as an effort to devise a selective encryption mechanism and a two-rate unequal error protection (UEP) scheme. The proposed selective encryption mechanism provides a simple and yet effective security solution for an ECG sensor-based communication platform, where only one percent of data is encrypted without compromising ECG data security. This part of the encrypted data is essential to ECG data quality due to its unequally important contribution to distortion reduction. The two-rate UEP scheme achieves a significant additional energy saving due to its unequal investment of communication energy to the outcomes of the selective encryption, and thus, it maintains a high ECG data transmission quality. Our results show the improvements in communication energy saving of about 40%, and demonstrate a higher transmission quality and security measured in terms of wavelet-based weighted percent root-mean-squared difference.

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Halbgewachs, Ronald D.; Chavez, Adrian R.

    Process Control System (PCS) and Industrial Control System (ICS) security is critical to our national security. But there are a number of technological, economic, and educational impediments to PCS owners implementing effective security on their systems. Sandia National Laboratories has performed the research and development of the OPSAID (Open PCS Security Architecture for Interoperable Design), a project sponsored by the US Department of Energy Office of Electricity Delivery and Energy Reliability (DOE/OE), to address this issue. OPSAID is an open-source architecture for PCS/ICS security that provides a design basis for vendors to build add-on security devices for legacy systems, whilemore » providing a path forward for the development of inherently-secure PCS elements in the future. Using standardized hardware, a proof-of-concept prototype system was also developed. This report describes the improvements and capabilities that have been added to OPSAID since an initial report was released. Testing and validation of this architecture has been conducted in another project, Lemnos Interoperable Security Project, sponsored by DOE/OE and managed by the National Energy Technology Laboratory (NETL).« less

  2. Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry.

    PubMed

    Zhang, Zheshen; Mower, Jacob; Englund, Dirk; Wong, Franco N C; Shapiro, Jeffrey H

    2014-03-28

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down-conversion and show that it is secure against collective attacks. Its security rests upon visibility data-obtained from Franson and conjugate-Franson interferometers-that probe photon-pair frequency correlations and arrival-time correlations. From these measurements, an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over a 200-km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700-bit/sec secure-key rate and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with a 15% system efficiency.

  3. The Balloon Effect and Mexican Homeland Security: What it Means to be the Weakest Link in the Americas’ Security Chain

    DTIC Science & Technology

    2011-12-01

    in the Social Sciences (George & Bennett, 2005), the main challenges of this thesis are: 9  To test the hypothesis of whether the implications of...Americas´ security chain;  To test whether the new concept of balloon-effect counter-pressure coming from the Mexican strategy is influencing latent...balloon effects against U.S. homeland security;  To test whether those balloon effects created by the Mexican strategy inside Mexico are a

  4. Instrumentation, Control, and Intelligent Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    2005-09-01

    Abundant and affordable energy is required for U.S. economic stability and national security. Advanced nuclear power plants offer the best near-term potential to generate abundant, affordable, and sustainable electricity and hydrogen without appreciable generation of greenhouse gases. To that end, Idaho National Laboratory (INL) has been charged with leading the revitalization of nuclear power in the U.S. The INL vision is to become the preeminent nuclear energy laboratory with synergistic, world-class, multi-program capabilities and partnerships by 2015. The vision focuses on four essential destinations: (1) Be the preeminent internationally-recognized nuclear energy research, development, and demonstration laboratory; (2) Be a majormore » center for national security technology development and demonstration; (3) Be a multi-program national laboratory with world-class capabilities; (4) Foster academic, industry, government, and international collaborations to produce the needed investment, programs, and expertise. Crucial to that effort is the inclusion of research in advanced instrumentation, control, and intelligent systems (ICIS) for use in current and advanced power and energy security systems to enable increased performance, reliability, security, and safety. For nuclear energy plants, ICIS will extend the lifetime of power plant systems, increase performance and power output, and ensure reliable operation within the system's safety margin; for national security applications, ICIS will enable increased protection of our nation's critical infrastructure. In general, ICIS will cost-effectively increase performance for all energy security systems.« less

  5. Tribal Militias: An Effective Tool to Counter Al-Qaida and Its Affiliates?

    DTIC Science & Technology

    2014-11-01

    Army issues affecting the national security community . The Peacekeeping and Stability Operations Institute provides subject matter expertise...implications for the Army, the Department of Defense, and the larger national security community . In addition to its studies, SSI publishes special reports on...newsletter to update the national security community on the research of our analysts, recent and forthcoming publications, and upcoming confer- ences

  6. Earnings Sharing in the U.S. Social Security System: A Microsimulation Analysis of Future Female Retirees

    ERIC Educational Resources Information Center

    Iams, Howard M.; Reznik, Gayle L.; Tamborini, Christopher R.

    2010-01-01

    Purpose: As part of an ongoing effort to analyze the distributional implications of potential policy reforms to the U.S. Social Security system, we consider the widely discussed reform of earnings sharing. Such an approach has been viewed as a way to "update" Social Security's family benefits based on marital status and as a means to…

  7. Soviet Interests in Afghanistan and Implications upon Withdrawal

    DTIC Science & Technology

    1990-06-01

    Causes of the Invasion ................ 87 Protection of Long -Standing Soviet Investments in Afghanistan .......... 88 Security Concerns...its denial to the West, if necessary, have always remained a priority long -range economic interest.L0 SECURITY OF FRONTIERS From Czarist times, the...territory, perhaps with a long -range goal of securing a warm water port. With the passage of time, Russian interests additionally included balancing

  8. Protecting intellectual property in space; Proceedings of the Aerospace Computer Security Conference, McLean, VA, March 20, 1985

    NASA Technical Reports Server (NTRS)

    1985-01-01

    The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.

  9. 10 CFR 706.12 - Administrative Law Judges.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Administrative Law Judges. 706.12 Section 706.12 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies... hearings and to facilitate preparation of an unclassified record. The assignment of individual...

  10. 10 CFR 706.12 - Administrative Law Judges.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Administrative Law Judges. 706.12 Section 706.12 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies... hearings and to facilitate preparation of an unclassified record. The assignment of individual...

  11. 10 CFR 706.12 - Administrative Law Judges.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Administrative Law Judges. 706.12 Section 706.12 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies... hearings and to facilitate preparation of an unclassified record. The assignment of individual...

  12. 10 CFR 706.12 - Administrative Law Judges.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Administrative Law Judges. 706.12 Section 706.12 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies... hearings and to facilitate preparation of an unclassified record. The assignment of individual...

  13. 10 CFR 706.12 - Administrative Law Judges.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Administrative Law Judges. 706.12 Section 706.12 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies... hearings and to facilitate preparation of an unclassified record. The assignment of individual...

  14. The Energy and Security Nexus: A Strategic Dilemma

    DTIC Science & Technology

    2011-07-15

    substantial natural gas reserves which can be exploited if we solve problems associated with hydraulic fracturing and competition over water. Other parts of...between energy, water, and security. Sometimes water is diverted to produce energy as in the case of hydropower, hydraulic fracturing , irrigation of

  15. 77 FR 65602 - Chimera Energy Corporation; Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-29

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Chimera Energy Corporation; Order of... lack of current and accurate information concerning the securities of Chimera Energy Corporation (``Chimera'') because of questions regarding the accuracy of statements by Chimera in press releases to...

  16. Assessing national nutrition security: The UK reliance on imports to meet population energy and nutrient recommendations

    PubMed Central

    Clark, Heather; Whybrow, Stephen; de Ruiter, Henri; McNeill, Geraldine

    2018-01-01

    Nutrition security describes the adequacy of the food supply to meet not only energy but also macronutrient and micronutrient requirements for the population. The aim of this study was to develop a method to assess trends in national nutrition security and the contribution of imports to nutrition security, using the UK as a case study. Food supply data from FAO food balance sheets and national food composition tables were used to estimate the nutrient content of domestically produced food, imported food and exported food. Nutrition security was defined as the total nutrient supply (domestic production, minus exports, plus imports) to meet population-level nutrient requirements. The results showed that the UK was nutrition secure over the period 1961–2011 for energy, macronutrients and key micronutrients, with the exception of total carbohydrates and fibre, which may be due to the loss of fibre incurred by processing cereals into refined products. The supply of protein exceeded population requirements and could be met with domestic production alone. Even excluding all meat there was sufficient protein for population requirements. The supply of total fat, saturated fat and sugar considerably exceeded the current dietary recommendation. As regards nutrition security in 2010, the UK was reliant on imported foods to meet energy, fibre, total carbohydrate, iron, zinc and vitamin A requirements. This analysis demonstrates the importance of including nutrients other than energy to determine the adequacy of the food supply. The methodology also provides an alternative perspective on food security and self-sufficiency by assessing the dependency on imports to meet population level nutritional requirements. PMID:29489830

  17. Assessing national nutrition security: The UK reliance on imports to meet population energy and nutrient recommendations.

    PubMed

    Macdiarmid, Jennie I; Clark, Heather; Whybrow, Stephen; de Ruiter, Henri; McNeill, Geraldine

    2018-01-01

    Nutrition security describes the adequacy of the food supply to meet not only energy but also macronutrient and micronutrient requirements for the population. The aim of this study was to develop a method to assess trends in national nutrition security and the contribution of imports to nutrition security, using the UK as a case study. Food supply data from FAO food balance sheets and national food composition tables were used to estimate the nutrient content of domestically produced food, imported food and exported food. Nutrition security was defined as the total nutrient supply (domestic production, minus exports, plus imports) to meet population-level nutrient requirements. The results showed that the UK was nutrition secure over the period 1961-2011 for energy, macronutrients and key micronutrients, with the exception of total carbohydrates and fibre, which may be due to the loss of fibre incurred by processing cereals into refined products. The supply of protein exceeded population requirements and could be met with domestic production alone. Even excluding all meat there was sufficient protein for population requirements. The supply of total fat, saturated fat and sugar considerably exceeded the current dietary recommendation. As regards nutrition security in 2010, the UK was reliant on imported foods to meet energy, fibre, total carbohydrate, iron, zinc and vitamin A requirements. This analysis demonstrates the importance of including nutrients other than energy to determine the adequacy of the food supply. The methodology also provides an alternative perspective on food security and self-sufficiency by assessing the dependency on imports to meet population level nutritional requirements.

  18. 76 FR 30325 - Proposed Subsequent Arrangement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-25

    ..., 2011. For the Department of Energy. Anne M. Harrington, Deputy Administrator, Defense Nuclear... International Security, National Nuclear Security Administration, Department of Energy. ACTION: Proposed... arrangement under the Agreement for [[Page 30326

  19. Survey of cyber security issues in smart grids

    NASA Astrophysics Data System (ADS)

    Chen, Thomas M.

    2010-04-01

    The future smart grid will enable cost savings and lower energy use by means of smart appliances and smart meters which support dynamic load management and real-time monitoring of energy use and distribution. The introduction of two-way communications and control into power grid introduces security and privacy concerns. This talk will survey the security and privacy issues in smart grids using the NIST reference model, and relate these issues to cyber security in the Internet.

  20. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  1. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  2. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  3. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  4. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  5. 76 FR 45548 - Draft Site-Wide Environmental Impact Statement for the Continued Operation of the Department of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-29

    ... geothermal energy demonstration project and research center. Reduced Operations Alternative The Reduced... DEPARTMENT OF ENERGY National Nuclear Security Administration Draft Site-Wide Environmental Impact Statement for the Continued Operation of the Department of Energy/National Nuclear Security Administration...

  6. 10 CFR 1046.12 - Physical fitness training program.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Physical fitness training program. 1046.12 Section 1046.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF SECURITY INTERESTS Protective Force Personnel § 1046.12 Physical fitness training program. (a) Each incumbent security police officer...

  7. 10 CFR 1046.12 - Physical fitness training program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Physical fitness training program. 1046.12 Section 1046.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF SECURITY INTERESTS Protective Force Personnel § 1046.12 Physical fitness training program. (a) Each incumbent security police officer...

  8. July 2015

    Science.gov Websites

    Science Programs Applied Energy Programs Civilian Nuclear Energy Programs Laboratory Directed Research Energy United States of America National Nuclear Security Administration Visit Blogger Join Us on key role in national security and nuclear deterrence in an increasingly dangerous and unstable world

  9. Financial Fraud and Child Abuse

    ERIC Educational Resources Information Center

    Little, Allison Dare

    2014-01-01

    A modern form of abuse of children by parents and foster parents is to use the identity of children in their care for their own financial benefit, such as accessing their unused social security numbers to secure credit. This article reviews examples and implications of this identity theft.

  10. IT Security on Campus: A Fragile Equilibrium.

    ERIC Educational Resources Information Center

    Wada, Kent

    2003-01-01

    Considers how to provide appropriate levels of information technology (IT) security in the higher education environment. Discusses implications of the Digital Millennium Copyright Act, the USA Patriot Act, the Health Insurance Portability and Accountability Act of 1996, California Information Practices Act, VISA USA Cardholder Information Security…

  11. 32 CFR 154.10 - Limitations and restrictions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... necessary for a proper personnel security determination. Questions concerning personal and domestic affairs... question is relevant to the criteria of § 154.7. Similarly, the probing of a person's thoughts or beliefs and questions about conduct that have no personnel security implications are unwarranted. When...

  12. 32 CFR 154.10 - Limitations and restrictions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... necessary for a proper personnel security determination. Questions concerning personal and domestic affairs... question is relevant to the criteria of § 154.7. Similarly, the probing of a person's thoughts or beliefs and questions about conduct that have no personnel security implications are unwarranted. When...

  13. Sea Piracy in Southeast Asia: Implications for Countering Maritime Terrorism in the United States

    DTIC Science & Technology

    2006-06-01

    least ten agencies that have some involvement in maritime security management with nine authorized to conduct law enforcement operations at sea...exercises, cooperating on consequence management , and sustaining capacity building operations .173 The United States has important bilateral security...Overview and Evaluation,” Journal of Homeland Security and Emergency Management 2, no. 4 (2005). 221 Frittelli, “Terminal Operators ,” 2006, 3

  14. Arab Threat Perceptions and the Future of the U.S. Military Presence in the Middle East

    DTIC Science & Technology

    2015-10-01

    knowledge, and provides solutions to strategic Army issues affecting the national security community . The Peacekeeping and Stability Operations...analysts concern topics having strategic implications for the Army, the Department of Defense, and the larger national security community . In addition...update the national security community on the research of our analysts, recent and forthcoming publications, and upcoming confer- ences sponsored by

  15. Renditions: Constraints Imposed by Laws on Torture

    DTIC Science & Technology

    2007-10-12

    14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 30 19a...limit or bar U.S. participation in renditions, including S. 1876, the National Security with Justice Act of 2007, and H.R. 1352, the Torture...civil case on a number of grounds, including that certain claims raised against U.S. officials implicated national security and foreign policy

  16. Russia and NATO Enlargement: The Assurances in 1990 and Their Implications

    DTIC Science & Technology

    2009-06-01

    to achieve “an agreement on the final legal settlement of the German question, which would serve our security interests and the cause of stability... intrinsically coupled to new security structures in Europe with no dominant player, particularly not the Soviet Union’s rival, the United States...main European security issues and would unconditionally acknowledge the CIS [Commonwealth of Independent States] as a sphere of vital interest to

  17. Energy Relations in Russia: Administration, Politics and Security

    ERIC Educational Resources Information Center

    Makarychev, Andrey

    2005-01-01

    This chapter analyses energy relations through a prism of three interlinked concepts: administration, politics and security. This triad describes the basic approaches to questions about technical, politicised and securitised energy. These three concepts are logically linked to one another and represent an elementary matrix; a prism through which…

  18. 10 CFR 824.1 - Purpose and scope.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Purpose and scope. 824.1 Section 824.1 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... Act relating to the security or safeguarding of Restricted Data or other classified information, shall...

  19. 10 CFR 824.5 - Investigations.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Investigations. 824.5 Section 824.5 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... scope, nature and extent of compliance by a person with DOE security requirements specified in § 824.4(a...

  20. 10 CFR 706.10 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Policy. 706.10 Section 706.10 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies and Procedures in National Labor Relations Board Proceedings § 706.10 Policy. It is policy of DOE that NLRB cases falling...

  1. 10 CFR 824.5 - Investigations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Investigations. 824.5 Section 824.5 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... scope, nature and extent of compliance by a person with DOE security requirements specified in § 824.4(a...

  2. 77 FR 3257 - Transfer of Land Tracts Located at Los Alamos National Laboratory, New Mexico

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-23

    ... DEPARTMENT OF ENERGY Transfer of Land Tracts Located at Los Alamos National Laboratory, New Mexico AGENCY: National Nuclear Security Administration, U.S. Department of Energy. ACTION: Amended Record of Decision. SUMMARY: The U.S. Department of Energy's National Nuclear Security Administration (DOE/NNSA) is...

  3. 10 CFR 706.10 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Policy. 706.10 Section 706.10 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies and Procedures in National Labor Relations Board Proceedings § 706.10 Policy. It is policy of DOE that NLRB cases falling...

  4. 78 FR 8682 - Americas Energy Company-AECo; Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-06

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Americas Energy Company--AECo; Order of... lack of current and accurate information concerning the securities of Americas Energy Company-AECo (``Americas'') because Americas has not filed any periodic reports since the period ended September 30, 2011...

  5. Hydrogen Production from Nuclear Energy

    NASA Astrophysics Data System (ADS)

    Walters, Leon; Wade, Dave

    2003-07-01

    During the past decade the interest in hydrogen as transportation fuel has greatly escalated. This heighten interest is partly related to concerns surrounding local and regional air pollution from the combustion of fossil fuels along with carbon dioxide emissions adding to the enhanced greenhouse effect. More recently there has been a great sensitivity to the vulnerability of our oil supply. Thus, energy security and environmental concerns have driven the interest in hydrogen as the clean and secure alternative to fossil fuels. Remarkable advances in fuel-cell technology have made hydrogen fueled transportation a near-term possibility. However, copious quantities of hydrogen must be generated in a manner independent of fossil fuels if environmental benefits and energy security are to be achieved. The renewable technologies, wind, solar, and geothermal, although important contributors, simply do not comprise the energy density required to deliver enough hydrogen to displace much of the fossil transportation fuels. Nuclear energy is the only primary energy source that can generate enough hydrogen in an energy secure and environmentally benign fashion. Methods of production of hydrogen from nuclear energy, the relative cost of hydrogen, and possible transition schemes to a nuclear-hydrogen economy will be presented.

  6. Detection of weapons of mass destruction

    NASA Astrophysics Data System (ADS)

    Bjorkholm, Paul J.

    2003-07-01

    High Energy X-ray cargo screening is a mature technology that has proven its value in the detection of contraband material hidden within cargo including fully loaded sea containers. To date high energy screening has been largely applied to manifest verification and to drug detection. However, the dramatic change in world terrorism has altered the application. Now it is essential that weapons of mass destruction (WMD"s) be interdicted with incredibly high accuracy. The implication of a missed detection has gone from loss of revenue or the lowering of the street price of drugs to potentially stopping, at least for some significant time, most world commerce. Screening containers with high energy x-rays (~250+ mm of steel penetration) is capable of detecting all nuclear threats at a fraction of the strategically important mass. The screening operation can be automated so that no human decisions are required with very low false alarms. Finally, the goal of 100% inspection of cargo inbound to the United States from the twenty largest international ports is an achievable goal with hardware costs in the area of that already spent on airport security.

  7. Sustainable Solution for Crude Oil and Natural Gas Separation using Concentrated Solar Power Technology

    NASA Astrophysics Data System (ADS)

    Choudhary, Piyush; Srivastava, Rakesh K.; Nath Mahendra, Som; Motahhir, Saad

    2017-08-01

    In today’s scenario to combat with climate change effects, there are a lot of reasons why we all should use renewable energy sources instead of fossil fuels. Solar energy is one of the best options based on features like good for the environment, independent of electricity prices, underutilized land, grid security, sustainable growth, etc. This concept paper is oriented primarily focused on the use of Solar Energy for the crude oil heating purpose besides other many prospective industrial applications to reduce cost, carbon footprint and moving towards a sustainable and ecologically friendly Oil & Gas Industry. Concentrated Solar Power technology based prototype system is proposed to substitute the presently used system based on natural gas burning method. The hybrid system which utilizes the solar energy in the oil and gas industry would strengthen the overall field working conditions, safety measures and environmental ecology. 40% reduction on natural gas with this hybrid system is estimated. A positive implication for an environment, working conditions and safety precautions is the additive advantage. There could also decrease air venting of CO2, CH4 and N2O by an average of 30-35%.

  8. 15 CFR 700.20 - Use of priority ratings.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS DEFENSE PRIORITIES AND ALLOCATIONS SYSTEM Industrial Priorities for Energy Programs § 700.20 Use of... maintenance of energy facilities. ...

  9. Fuel Cycle Technologies 2014 Achievement Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hong, Bonnie C.

    2015-01-01

    The Fuel Cycle Technologies (FCT) program supports the Department of Energy’s (DOE’s) mission to: “Enhance U.S. security and economic growth through transformative science, technology innovation, and market solutions to meet our energy, nuclear security, and environmental challenges.” Goal 1 of DOE’s Strategic Plan is to innovate energy technologies that enhance U.S. economic growth and job creation, energy security, and environmental quality. FCT does this by investing in advanced technologies that could transform the nuclear fuel cycle in the decades to come. Goal 2 of DOE’s Strategic Plan is to strengthen national security by strengthening key science, technology, and engineering capabilities.more » FCT does this by working closely with the National Nuclear Security Administration and the U.S Department of State to develop advanced technologies that support the Nation’s nuclear nonproliferation goals.« less

  10. Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks.

    PubMed

    Zhang, Guomei; Sun, Hao

    2016-12-16

    We study the secure distributed detection problems under energy constraint for IoT-oriented sensor networks. The conventional channel-aware encryption (CAE) is an efficient physical-layer secure distributed detection scheme in light of its energy efficiency, good scalability and robustness over diverse eavesdropping scenarios. However, in the CAE scheme, it remains an open problem of how to optimize the key thresholds for the estimated channel gain, which are used to determine the sensor's reporting action. Moreover, the CAE scheme does not jointly consider the accuracy of local detection results in determining whether to stay dormant for a sensor. To solve these problems, we first analyze the error probability and derive the optimal thresholds in the CAE scheme under a specified energy constraint. These results build a convenient mathematic framework for our further innovative design. Under this framework, we propose a hybrid secure distributed detection scheme. Our proposal can satisfy the energy constraint by keeping some sensors inactive according to the local detection confidence level, which is characterized by likelihood ratio. In the meanwhile, the security is guaranteed through randomly flipping the local decisions forwarded to the fusion center based on the channel amplitude. We further optimize the key parameters of our hybrid scheme, including two local decision thresholds and one channel comparison threshold. Performance evaluation results demonstrate that our hybrid scheme outperforms the CAE under stringent energy constraints, especially in the high signal-to-noise ratio scenario, while the security is still assured.

  11. Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks

    PubMed Central

    Zhang, Guomei; Sun, Hao

    2016-01-01

    We study the secure distributed detection problems under energy constraint for IoT-oriented sensor networks. The conventional channel-aware encryption (CAE) is an efficient physical-layer secure distributed detection scheme in light of its energy efficiency, good scalability and robustness over diverse eavesdropping scenarios. However, in the CAE scheme, it remains an open problem of how to optimize the key thresholds for the estimated channel gain, which are used to determine the sensor’s reporting action. Moreover, the CAE scheme does not jointly consider the accuracy of local detection results in determining whether to stay dormant for a sensor. To solve these problems, we first analyze the error probability and derive the optimal thresholds in the CAE scheme under a specified energy constraint. These results build a convenient mathematic framework for our further innovative design. Under this framework, we propose a hybrid secure distributed detection scheme. Our proposal can satisfy the energy constraint by keeping some sensors inactive according to the local detection confidence level, which is characterized by likelihood ratio. In the meanwhile, the security is guaranteed through randomly flipping the local decisions forwarded to the fusion center based on the channel amplitude. We further optimize the key parameters of our hybrid scheme, including two local decision thresholds and one channel comparison threshold. Performance evaluation results demonstrate that our hybrid scheme outperforms the CAE under stringent energy constraints, especially in the high signal-to-noise ratio scenario, while the security is still assured. PMID:27999282

  12. Transportation Secure Data Center Publications | Transportation Secure Data

    Science.gov Websites

    : Emerging Technologies, June 2015 Pavement Performance Evaluation Using Connected Vehicles Author: R Research Procedia, 2015 Quantification of Temperature Implications and Investigation of Battery Design Design, and Consumer Usage Authors: E. Wood, J. Neubauer, A. Brooker, J. Gonder, and K. Smith Conference

  13. Social Security's Surpluses: An Update.

    ERIC Educational Resources Information Center

    Dattalo, Patrick

    1992-01-01

    Notes that deliberation over how to manage social security's large trust fund balances is expected to continue. Urges social workers to participate in this debate because surpluses have implications for increasing quality of life of low- and moderate-income families. Continues earlier discussion (Dattalo, 1990) by assessing two recent proposals…

  14. The Accident at TEPCO's Fukushima-Daiichi Nuclear Power Plant: Technical Description of What Happened and Lessons Learned for the Future

    NASA Astrophysics Data System (ADS)

    Omoto, Akira

    2012-02-01

    Tsunami that followed M9.0 earthquake on March 11^th left the Fukushima-Daiichi Nuclear Power Plants without power and heat sink. While water makeup continued by AC-independent systems to keep the fuel core covered by coolant, operating team tried to depressurize and enable low pressure injection to the reactor to avoid overheating but was not successful enough primarily due to limited available resources. This resulted in core melt, hydrogen explosion and release of radioactivity to the environment. Key lessons learned are; 1) safety regulation and safety culture, 2) workable/executable severe accident management procedure, 3) crisis management and 4) design. Implications on security include revealed vulnerability and the nexus of safety and security. Given the scale of damage to the environmental, attention must be paid to defense against it and to societal safety goal of nuclear power by considering offsite remedial costs, compensation to damage, energy replacement cost etc. A sort of root cause analysis first by asking ``Why nuclear community failed to prevent this accident?'' was initiated by the University of Tokyo.

  15. Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay

    PubMed Central

    Hu, Hequn; Liao, Xuewen

    2017-01-01

    The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device’s messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission (PSST), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. PSST is analyzed for the proposed secure schemes, and the closed form expressions of PSST for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better PSST than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar PSST, the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations. PMID:28869540

  16. Whole system analysis of second generation bioenergy production and Ecosystem Services in Europe

    NASA Astrophysics Data System (ADS)

    Henner, Dagmar; Smith, Pete; Davies, Christian; McNamara, Niall

    2017-04-01

    Bioenergy crops are an important source of renewable energy and are a possible mechanism to mitigate global climate warming, by replacing fossil fuel energy that has higher greenhouse gas emissions. There is, however, uncertainty about the impacts of the growth of bioenergy crops on ecosystem services. This uncertainty is further enhanced by current climate change. It is important to establish how second generation bioenergy crops (Miscanthus, SRC willow and poplar) can contribute by closing the gap between reducing fossil fuel use and increasing the use of other renewable sources in a sustainable way. The project builds on models of energy crop production, biodiversity, soil impacts, greenhouse gas emissions and other ecosystem services, and on work undertaken in the UK on the ETI-funded ELUM project (www.elum.ac.uk). We will present estimated yields for the above named crops in Europe using the ECOSSE, DayCent, SalixFor and MiscanFor models. These yields will be brought into context with a whole system analysis, detailing trade-offs and synergies for land use change, food security, GHG emissions and soil and water security. Methods like water footprint tools, tourism value maps and ecosystem valuation tools and models (e.g. InVest, TEEB database, GREET LCA Model, World Business Council for Sustainable Development corporate ecosystem valuation, Millennium Ecosystem Assessment and the Ecosystem Services Framework) will be used to estimate and visualise the impacts of increased use of second generation bioenergy crops on the above named ecosystem services. The results will be linked to potential yields to generate "inclusion or exclusion areas" in Europe in order to establish suitable areas for bioenergy crop production and the extent of use possible. Policy is an important factor for using second generation bioenergy crops in a sustainable way. We will present how whole system analysis can be used to create scenarios for countries or on a continental scale. As an example, we will present two scenarios for the whole system on a country basis, based on current renewable energy policy, to visualise the impact of changing policy on the use of bioenergy crops. This will include the economic implications which are directly linked to renewable energy policy, best practice management recommendations, impacts on land use change and food security as well as synergies and trade-offs on other ecosystem services (GHG emission, soil C, nitrogen, water and air security). The aim is to show how second generation bioenergy crops can be used sustainably and what is needed to do this successfully on a large scale. The results can form a basis for future policy development in order to reach the goals of the Paris 2015 agreement.

  17. The climate change and energy security nexus

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    King, Marcus Dubois; Gulledge, Jay

    2013-01-01

    The study of the impacts of climate change on national and interna-tional security has grown as a research field, particularly in the last five years. Within this broad field, academic scholarship has concentrated primarily on whether climate change is, or may become, a driver of violent conflict. This relationship remains highly contested. However, national security policy and many non-governmental organizations have identified climate change as a threat multiplier in conflict situations. The U.S. Department of Defense and the United Kingdom's Ministry of Defense have incorporated these findings into strategic planning documents such as the Quadrennial Defense Review and the Strategicmore » Defence and Security Review. In contrast to the climate-conflict nexus, our analysis found that academic scholarship on the climate change and energy security nexus is small and more disciplinarily focused. In fact, a search of social science litera-ture found few sources, with a significant percentage of these works attribut-able to a single journal. Assuming that policymakers are more likely to rely on broader social science literature than technical or scientific journals, this leaves a limited foundation. This then begged the question: what are these sources? We identified a body of grey literature on the nexus of climate change and energy security of a greater size than the body of peer-reviewed social science literature. We reviewed fifty-eight recent reports, issue briefs, and transcripts to better understand the nexus of climate change and energy security, as well as to gain insight about the questions policymakers need answered by those undertaking the research. In this article, we describe the nature of the sources reviewed, highlight possible climate change and energy security linkages found within those sources, identify emerging risks, and offer conclusions that can guide further research.« less

  18. Security and privacy issues of personal health.

    PubMed

    Blobel, Bernd; Pharow, Peter

    2007-01-01

    While health systems in developed countries and increasingly also in developing countries are moving from organisation-centred to person-centred health service delivery, the supporting communication and information technology is faced with new risks regarding security and privacy of stakeholders involved. The comprehensively distributed environment puts special burden on guaranteeing communication security services, but even more on guaranteeing application security services dealing with privilege management, access control and audit regarding social implication and connected sensitivity of personal information recorded, processed, communicated and stored in an even internationally distributed environment.

  19. Systematic implementation of spectral CT with a photon counting detector for liquid security inspection

    NASA Astrophysics Data System (ADS)

    Xu, Xiaofei; Xing, Yuxiang; Wang, Sen; Zhang, Li

    2018-06-01

    X-ray liquid security inspection system plays an important role in homeland security, while the conventional dual-energy CT (DECT) system may have a big deviation in extracting the atomic number and the electron density of materials in various conditions. Photon counting detectors (PCDs) have the capability of discriminating the incident photons of different energy. The technique becomes more and more mature in nowadays. In this work, we explore the performance of a multi-energy CT imaging system with a PCD for liquid security inspection in material discrimination. We used a maximum-likelihood (ML) decomposition method with scatter correction based on a cross-energy response model (CERM) for PCDs so that to improve the accuracy of atomic number and electronic density imaging. Experimental study was carried to examine the effectiveness and robustness of the proposed system. Our results show that the concentration of different solutions in physical phantoms can be reconstructed accurately, which could improve the material identification compared to current available dual-energy liquid security inspection systems. The CERM-base decomposition and reconstruction method can be easily used to different applications such as medical diagnosis.

  20. From sniffer dogs to emerging sniffer devices for airport security: an opportunity to rethink privacy implications?

    PubMed

    Bonfanti, Matteo E

    2014-09-01

    Dogs are known for their incredible ability to detect odours, extracting them from a "complex" environment and recognising them. This makes sniffer dogs precious assets in a broad variety of security applications. However, their use is subject to some intrinsic restrictions. Dogs can only be trained to a limited set of applications, get tired after a relatively short period, and thus require a high turnover. This has sparked a drive over the past decade to develop artificial sniffer devices-generally known as "chemical sniffers" or "electronic noses"-able to complement and possibly replace dogs for some security applications. Such devices have been already deployed, or are intended to be deployed, at borders, airports and other critical installation security checkpoints. Similarly to dogs, they are adopted for detecting residual traces that indicate either the presence of, or recent contact with, substances like drugs and explosives. It goes without saying that, as with sniffer dogs, the use of artificial sniffer devices raises many sensitive issues. Adopting an ethical and legal perspective, the present paper discusses the privacy and data protection implications of the possible deployment of a hand-held body scanning sniffer for screening passengers at EU airport security checkpoints.

  1. Attachment in middle childhood: predictors, correlates, and implications for adaptation.

    PubMed

    Boldt, Lea J; Kochanska, Grazyna; Grekin, Rebecca; Brock, Rebecca L

    2016-01-01

    Middle childhood is a relative lacuna in behavioral attachment research. We examined antecedents, correlates, and implications of parent-child attachment at age 10 in a longitudinal study of community families from a Midwestern US state (N = 102, mothers, fathers, and children). Dimensions of security, avoidance, ambivalence, and disorganization of children's attachment to each parent were observed in lengthy naturalistic interactions and assessed using Iowa Attachment Behavioral Coding (IABC). IABC scores were meaningfully associated with history of parental responsiveness (7-80 months) and with earlier and concurrent attachment security, assessed with other established instruments (parent- and observer-rated Attachment Q-Set at 25 months, children's reports at age 8 and 10). Structural equation modeling analyses revealed that the overall history of responsive care was meaningfully associated with Security, Avoidance, and Disorganization at age 10, in both mother-child and father-child relationships, and that most recent care uniquely predicted Security. IABC scores were also meaningfully related to a broad range of measures of child adaptation at ages 10-12. Cumulative history of children's security from infancy to middle childhood, integrating measures across relationships and methodologies, also predicted child adaptation at ages 10-12.

  2. Attachment in Middle Childhood: Predictors, Correlates, and Implications for Adaptation

    PubMed Central

    Boldt, Lea J.; Kochanska, Grazyna; Grekin, Rebecca; Brock, Rebecca L.

    2016-01-01

    Middle childhood is a relative lacuna in behavioral attachment research. We examined antecedents, correlates, and implications of parent-child attachment at age 10 in a longitudinal study of community families from a Midwestern US state (N=102, mothers, fathers, and children). Dimensions of security, avoidance, ambivalence, and disorganization of children’s attachment to each parent were observed in lengthy naturalistic interactions and assessed using Iowa Attachment Behavioral Coding (IABC). IABC scores were meaningfully associated with history of parental responsiveness (7–80 months) and with earlier and concurrent attachment security, assessed with other established instruments (parent- and observer-rated Attachment Q-Set at 25 months, children’s reports at age 8 and 10). Structural equation modeling analyses revealed that the overall history of responsive care was meaningfully associated with Security, Avoidance, and Disorganization at age 10, in both mother-child and father-child relationships, and that most recent care uniquely predicted Security. IABC scores were also meaningfully related to a broad range of measures of child adaptation at ages 10–12. Cumulative history of children’s security from infancy to middle childhood, integrating measures across relationships and methodologies, also predicted child adaptation at ages 10–12. PMID:26673686

  3. Energy technology evaluation report: Energy security

    NASA Astrophysics Data System (ADS)

    Koopman, R.; Lamont, A.; Schock, R.

    1992-09-01

    Energy security was identified in the National Energy Strategy (NES) as a major issue for the Department of Energy (DOE). As part of a process designed by the DOE to identify technologies important to implementing the NES, an expert working group was convened to consider which technologies can best contribute to reducing the nation's economic vulnerability to future disruptions of world oil supplies, the working definition of energy security. Other working groups were established to deal with economic growth, environmental quality, and technical foundations. Energy Security working group members were chosen to represent as broad a spectrum of energy supply and end-use technologies as possible and were selected for their established reputations as experienced experts with an ability to be objective. The time available for this evaluation was very short. The group evaluated technologies using criteria taken from the NES which can be summarized for energy security as follows: diversifying sources of world oil supply so as to decrease the increasing monopoly status of the Persian Gulf region; reducing the importance of oil use in the US economy to diminish the impact of future disruptions in oil supply; and increasing the preparedness of the US to deal with oil supply disruptions by having alternatives available at a known price. The result of the first phase of the evaluation process was the identification of technology groups determined to be clearly important for reducing US vulnerability to oil supply disruptions. The important technologies were mostly within the high leverage areas of oil and gas supply and transportation demand but also included hydrogen utilization, biomass, diversion resistant nuclear power, and substitute industrial feedstocks.

  4. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Access to restricted data and national security... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access...

  5. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Access to restricted data and national security... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access...

  6. German Foreign and Security Policy: Trends and Transatlantic Implications

    DTIC Science & Technology

    2009-05-20

    October 3, 2006, http://www.germany.info/relaunch/politics/speeches/ 100306_Bush.html; see also Ulrike Guerot, “Germany and Europe: new Deal or Deja ... Vu ?” Notre Europe, Studies and Research No. 55, November 2006, http://www.notre-europe.eu. German Foreign and Security Policy: Trends and

  7. Students and Social Security Benefits.

    ERIC Educational Resources Information Center

    Stephens, Mark

    1990-01-01

    Since publication of the British government's white paper, "Top-up Loans for Students" in November 1988, public debate has been confined to loan proposal merits. A proposal to exclude full-time college students from the social security system has been neglected. This article examines the proposal's rationale and its implications for…

  8. Greek Military Strategy: The Doctrine of Deterrence and Its Implications on Greek-Turkish Relations

    DTIC Science & Technology

    2001-06-01

    34 issue to Greece’s security 1 George Prevelakis, Geopolitiki tis Elladas (Geopolitics of Greece), Libro , 1998. In his book, Prevelakis describes the...Between the World Wars, Cornell Studies in security affairs, 1984. Prevelakis, George. Geopolitiki tis Elladas (Geopolitics of Greece), Libro , 1998

  9. 76 FR 77578 - In the Matter of: Brendan Technologies, Inc., CenterStaging Corp., PGMI, Inc., Thermal Energy...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-13

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of: Brendan Technologies, Inc., CenterStaging Corp., PGMI, Inc., Thermal Energy Storage, Inc., and Trinity3 Corporation; Order of... there is a lack of current and accurate information concerning the securities of Thermal Energy Storage...

  10. 77 FR 5865 - American Unity Investments, Inc., China Display Technologies, Inc., China Wind Energy, Inc., Fuda...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-06

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] American Unity Investments, Inc., China Display Technologies, Inc., China Wind Energy, Inc., Fuda Faucet Works, Inc., Greater China Media... concerning the securities of China Wind Energy, Inc. because it has not filed any periodic reports since the...

  11. U.S. Energy Security -- The Campaign We Must Win

    DTIC Science & Technology

    2009-03-23

    population.2 Our industry, commerce, transportation and economic livelihood require the uninterrupted supply of energy. In all its forms, energy underpins...mitigate our vulnerability to unstable oil prices. Rising global demand and competition threatens our ability to secure long term economical access... economically while strengthening our enemies. This research paper addresses the effectiveness of U.S. energy policy and proposes a new approach that seeks to

  12. India’s Evolving Nuclear Force and Its Implications for U.S. Strategy in the Asia-Pacific

    DTIC Science & Technology

    2016-06-01

    concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor Soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S...Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on geostrategic

  13. Functional Interactions Between c-Src and HER1 Potentiate Neoplastic Transformation: Implications for the Etiology of Human Breast Cancer

    DTIC Science & Technology

    2000-07-01

    receptor 120 16. PRICE CODE 17. SECURITY CLASSIFICATION 18 . SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF...THIS PAGE OF ABSTRACT Unclassified Unclassified Unclassified Unlimited NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. Z39- 18 ... 18 -26 Appended Manuscripts 3 INTRODUCTION Recent work in our laboratory has established the importance of a

  14. Does the PCEHR mean a new paradigm for information security? Implications for health information management.

    PubMed

    Williams, Patricia A H

    Australia is stepping up to the new e-health environment. With this comes new legislation and new demands on information security. The expanded functionality of e-health and the increased legislative requirements, coupled with new uses of technology, means that enhancement of existing security practice will be necessary. This paperanalyses the new operating environment for Australian healthcare and the legislation governing it, and highlights the changes that are required to meet this new context. Individuals are now more responsible for security and organisations should be prompted to review their security measures in light of the new demands of legislative compliance.

  15. Prospective Relations among Low-Income African American Adolescents’ Maternal Attachment Security, Self-Worth, and Risk Behaviors

    PubMed Central

    Lockhart, Ginger; Phillips, Samantha; Bolland, Anneliese; Delgado, Melissa; Tietjen, Juliet; Bolland, John

    2017-01-01

    This study examined prospective mediating relations among mother-adolescent attachment security, self-worth, and risk behaviors, including substance use and violence, across ages 13–17 in a sample of 901 low-income African American adolescents. Path analyses revealed that self-worth was a significant mediator between attachment security and risk behaviors, such that earlier attachment security predicted self-worth 1 year later, which in turn, predicted substance use, weapon carrying, and fighting in the 3rd year. Implications for the role of the secure base concept within the context of urban poverty are discussed. PMID:28174548

  16. Final Technical Report. Project Boeing SGS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bell, Thomas E.

    Boeing and its partner, PJM Interconnection, teamed to bring advanced “defense-grade” technologies for cyber security to the US regional power grid through demonstration in PJM’s energy management environment. Under this cooperative project with the Department of Energy, Boeing and PJM have developed and demonstrated a host of technologies specifically tailored to the needs of PJM and the electric sector as a whole. The team has demonstrated to the energy industry a combination of processes, techniques and technologies that have been successfully implemented in the commercial, defense, and intelligence communities to identify, mitigate and continuously monitor the cyber security of criticalmore » systems. Guided by the results of a Cyber Security Risk-Based Assessment completed in Phase I, the Boeing-PJM team has completed multiple iterations through the Phase II Development and Phase III Deployment phases. Multiple cyber security solutions have been completed across a variety of controls including: Application Security, Enhanced Malware Detection, Security Incident and Event Management (SIEM) Optimization, Continuous Vulnerability Monitoring, SCADA Monitoring/Intrusion Detection, Operational Resiliency, Cyber Range simulations and hands on cyber security personnel training. All of the developed and demonstrated solutions are suitable for replication across the electric sector and/or the energy sector as a whole. Benefits identified include; Improved malware and intrusion detection capability on critical SCADA networks including behavioral-based alerts resulting in improved zero-day threat protection; Improved Security Incident and Event Management system resulting in better threat visibility, thus increasing the likelihood of detecting a serious event; Improved malware detection and zero-day threat response capability; Improved ability to systematically evaluate and secure in house and vendor sourced software applications; Improved ability to continuously monitor and maintain secure configuration of network devices resulting in reduced vulnerabilities for potential exploitation; Improved overall cyber security situational awareness through the integration of multiple discrete security technologies into a single cyber security reporting console; Improved ability to maintain the resiliency of critical systems in the face of a targeted cyber attack of other significant event; Improved ability to model complex networks for penetration testing and advanced training of cyber security personnel« less

  17. Department of the Navy Transformation Plan FY 2014-2016

    DTIC Science & Technology

    2014-01-01

    SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF...with the competing realities of shrinking defense budgets and rising maritime security challenges. Throughout our history, the Navy and Marine...DON continues to support alternative energy efforts, realizing that energy independence is vital to our national security and the safety of our

  18. 78 FR 5438 - Proposed Agency Information Collection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-25

    ... DEPARTMENT OF ENERGY National Nuclear Security Administration Proposed Agency Information Collection AGENCY: National Nuclear Security Administration, U.S. Department of Energy. ACTION: Notice and... techniques or other forms of information technology. DATES: Comments regarding this proposed information...

  19. Prospective Effects of Interparental Conflict on Child Attachment Security and the Moderating Role of Parents' Romantic Attachment

    PubMed Central

    Laurent, Heidemarie K.; Kim, Hyoun K.; Capaldi, Deborah M.

    2009-01-01

    This study investigated the impact of parents' observed conflict behavior on subsequent child attachment security, both as a main effect and as moderated by parents' romantic attachment. Participants were 80 heterosexual couples involving men from the Oregon Youth Study and their first-born children. We used hierarchical linear modeling to predict child security with each parent. Interparental psychological aggression predicted lower child security with father, regardless of romantic attachment. If the father was insecure, interparental positive engagement predicted lower child security with him. If either the mother or father was avoidant, interparental withdrawal did not predict lower child security, though it did for more secure parents. Results are discussed in terms of implications of attachment-(in)congruent behavior for parents' emotional availability. PMID:18540766

  20. An Integrative Behavioral Model of Information Security Policy Compliance

    PubMed Central

    Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung

    2014-01-01

    The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing members' neutralization intention to violate information security policy should be emphasized. PMID:24971373

  1. An integrative behavioral model of information security policy compliance.

    PubMed

    Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung

    2014-01-01

    The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing members' neutralization intention to violate information security policy should be emphasized.

  2. Engage States on Energy Assurance and Energy Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kara Colton; John Ratliff; Sue Gander

    2008-09-30

    The NGA Center's 'Engaging States on Energy Security and Energy Assurance' has been successful in achieving the stated project purposes and objectives both in the initial proposal as well as in subsequent revisions to it. Our activities, which involve the NGA Center for Best Practices (The NGA Center) Homeland Security and Technology Division, included conducting tabletop exercises to help federal and state homeland security and energy officials determine roles and actions for various emergency scenarios. This included efforts to education state official on developing an energy assurance plan, harmonizing approaches to controlling price volatility, implementing reliability standards, understanding short andmore » long-term energy outlooks and fuel diversification, and capitalizing on DOE's research and development activities. Regarding our work on energy efficiency and renewable energy, the NGA Center's Environment, Energy and Natural Resources Division hosted three workshops which engaged states on the clean energy and alternative transportation fuel and also produced several reports on related topics. In addition, we convened 18 meetings, via conference call, of the Energy Working Group. Finally, through the NGA Center's Front and Center newsletter articles, the NGA Center disseminated promising practices to a wide audience of state policymakers. The NGA Center also hosted a number of workshops and web conferences designed to directly engage states on the deliverables under this Cooperative Agreement. Through the NGA Center's written products and newsletter articles, the NGA Center was able to disseminate promising practices to a wide audience of state policymakers.« less

  3. 10 CFR 1046.15 - Training and qualification for security skills and knowledge.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Training and qualification for security skills and... SECURITY INTERESTS Protective Force Personnel § 1046.15 Training and qualification for security skills and... and Qualification for Security Skills and Knowledge,” to this subpart. The DOE contractor shall...

  4. High tonnage forest biomass production systems from southern pine energy plantations

    Treesearch

    P. Jernigan; T. Gallagher; Dana Mitchell; L. Teeter

    2011-01-01

    The topic of declining fossil fuels and the absolute need for renewable energy sources is very evident in today’s society. The utilization of bio-fuels is necessary to meet goals set forth in the Energy Independence and Security Act of 2007. Included in the act are standards in which bio-fuels will play a major role in ensuring national energy security and the...

  5. The European Union’s Energy Security Challenges

    DTIC Science & Technology

    2007-01-26

    NATO’s summit in Riga, Latvia in November 2006. Members of the Democratic Leadership in the 110th Congress have signaled their intention to introduce...cooperation through the development of international energy partnerships. Members of the Democratic Leadership in the 110th Congress have signaled their...surrounding global energy supply and demand persist, energy security issues are likely to gain importance in the 110th Congress. Members of the Democratic

  6. 76 FR 65768 - ADS Media Group, Inc., American Enterprise Development Corp., and Arcland Energy Corp.; Order of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-24

    ... Development Corp., and Arcland Energy Corp.; Order of Suspension of Trading October 20, 2011. It appears to... current and accurate information concerning the securities of American Enterprise Development Corp... securities of Arcland Energy Corp. because it has not filed any periodic reports since the period ended April...

  7. Increasing homogeneity in global food supplies and the implications for food security

    PubMed Central

    Khoury, Colin K.; Bjorkman, Anne D.; Dempewolf, Hannes; Ramirez-Villegas, Julian; Guarino, Luigi; Jarvis, Andy; Rieseberg, Loren H.; Struik, Paul C.

    2014-01-01

    The narrowing of diversity in crop species contributing to the world’s food supplies has been considered a potential threat to food security. However, changes in this diversity have not been quantified globally. We assess trends over the past 50 y in the richness, abundance, and composition of crop species in national food supplies worldwide. Over this period, national per capita food supplies expanded in total quantities of food calories, protein, fat, and weight, with increased proportions of those quantities sourcing from energy-dense foods. At the same time the number of measured crop commodities contributing to national food supplies increased, the relative contribution of these commodities within these supplies became more even, and the dominance of the most significant commodities decreased. As a consequence, national food supplies worldwide became more similar in composition, correlated particularly with an increased supply of a number of globally important cereal and oil crops, and a decline of other cereal, oil, and starchy root species. The increase in homogeneity worldwide portends the establishment of a global standard food supply, which is relatively species-rich in regard to measured crops at the national level, but species-poor globally. These changes in food supplies heighten interdependence among countries in regard to availability and access to these food sources and the genetic resources supporting their production, and give further urgency to nutrition development priorities aimed at bolstering food security. PMID:24591623

  8. Food security and nutrition in the Russian Federation - a health policy analysis.

    PubMed

    Lunze, Karsten; Yurasova, Elena; Idrisov, Bulat; Gnatienko, Natalia; Migliorini, Luigi

    2015-01-01

    In the Russian Federation (Russia), an elevated burden of premature mortality attributable to non-communicable diseases (NCDs) has been observed since the country's economic transition. NCDs are largely related to preventable risk factors such as unhealthy diets. This health policy study's aim was to analyze past and current food production and nutritional trends in Russia and their policy implications for Russia's NCD burden. We examined food security and nutrition in Russia using an analytical framework of food availability, access to food, and consumption. Agricultural production declined during the period of economic transition, and nutritional habits changed from high-fat animal products to starches. However, per-capita energy consumption remained stable due to increased private expenditures on food and use of private land. Paradoxically, the prevalence of obesity still increased because of an excess consumption of unsaturated fat, sugar, and salt on one side, and insufficient intake of fruit and vegetables on the other. Policy and economic reforms in Russia were not accompanied by a food security crisis or macronutrient deprivation of the population. Yet, unhealthy diets in contemporary Russia contribute to the burden of NCDs and related avoidable mortality. Food and nutrition policies in Russia need to specifically address nutritional shortcomings and food-insecure vulnerable populations. Appropriate, evidence-informed food and nutrition policies might help address Russia's burden of NCDs on a population level.

  9. Food security and nutrition in the Russian Federation – a health policy analysis

    PubMed Central

    Lunze, Karsten; Yurasova, Elena; Idrisov, Bulat; Gnatienko, Natalia; Migliorini, Luigi

    2015-01-01

    Background In the Russian Federation (Russia), an elevated burden of premature mortality attributable to non-communicable diseases (NCDs) has been observed since the country's economic transition. NCDs are largely related to preventable risk factors such as unhealthy diets. Objective This health policy study's aim was to analyze past and current food production and nutritional trends in Russia and their policy implications for Russia's NCD burden. Design We examined food security and nutrition in Russia using an analytical framework of food availability, access to food, and consumption. Results Agricultural production declined during the period of economic transition, and nutritional habits changed from high-fat animal products to starches. However, per-capita energy consumption remained stable due to increased private expenditures on food and use of private land. Paradoxically, the prevalence of obesity still increased because of an excess consumption of unsaturated fat, sugar, and salt on one side, and insufficient intake of fruit and vegetables on the other. Conclusions Policy and economic reforms in Russia were not accompanied by a food security crisis or macronutrient deprivation of the population. Yet, unhealthy diets in contemporary Russia contribute to the burden of NCDs and related avoidable mortality. Food and nutrition policies in Russia need to specifically address nutritional shortcomings and food-insecure vulnerable populations. Appropriate, evidence-informed food and nutrition policies might help address Russia's burden of NCDs on a population level. PMID:26112143

  10. Energy for the new millennium.

    PubMed

    Goldemberg, J; Johansson, T B; Reddy, A K; Williams, R H

    2001-09-01

    The evolution of thinking about energy is discussed. When the authors began collaborating 20 years ago, energy was typically considered from a growth-oriented, supply-side perspective, with a focus on consumption trends and how to expand supplies to meet rising demand. They were deeply troubled by the environmental, security and equity implications of that approach. For instance, about two billion people lack access to affordable modern energy, seriously limiting their opportunities for a better life. And energy is a significant contributor to environmental problems, including indoor air pollution, urban air pollution, acidification, and global warming. The authors saw the need to evolve a different perspective in which energy is provided in ways that help solve such serious problems. They argued that energy must become an instrument for advancing sustainable development--economically viable, need-oriented, self-reliant and environmentally sound development--and that the focus should be on the end uses of energy and the services that energy provides. Energy technological options that can help meet sustainable development goals are discussed. The necessity of developing and employing innovative technological solutions is stressed. The possibilities of technological leap-frogging that could enable developing countries to avoid repeating the mistakes of the industrialized countries is illustrated with a discussion of ethanol in Brazil. The role foreign direct investment might play in bringing advanced technologies to developing countries is highlighted. Near- and long-term strategies for rural energy are discussed. Finally, policy issues are considered for evolving the energy system so that it will be consistent with and supportive of sustainable development.

  11. REVIEWS OF TOPICAL PROBLEMS: Millisecond solar radio spikes

    NASA Astrophysics Data System (ADS)

    Fleishman, G. D.; Mel'nikov, V. F.

    1998-12-01

    Currently available models of one of the most intriguing types of unsteady rf solar emission, millisecond solar radio spikes, are discussed. A comparative analysis of the models' implications and of the body of existing data yields an outline of the most realistic radio spike model possible. The spikes are produced by the cyclotron maser mechanism. The cyclotron cone instability is caused by fast electrons distributed over energies according to a (piecewise) power law. The angular part of the distribution function (whose exact form is, as yet, undetermined) suffers fluctuations due to the magnetic field inhomogeneities that arise in the burst loop as a consequence of the original energy release. In some portions of the loop the distribution is not anisotropic enough to secure the development of a cyclotron instability; it is in these 'microtraps' where individual spikes form. Key areas of future theoretical and experimental research are suggested with a view to verifying the adequacy and realizing the diagnostic potential of the model.

  12. A Qualitative Meta-Analysis of the Diffusion of Mandated and Subsidized Technology: United States Energy Security and Independence

    ERIC Educational Resources Information Center

    Noah, Philip D., Jr.

    2013-01-01

    The purpose of this research project was to explore what the core factors are that play a role in the development of the smart-grid. This research study examined The Energy Independence and Security Act (EISA) of 2007 as it pertains to the smart-grid, the economic and security effects of the smart grid, and key factors for its success. The…

  13. China’s Military Support Facility in Djibouti: The Economic and Security Dimensions of China’s First Overseas Base

    DTIC Science & Technology

    2017-07-01

    Cleared for Public Release China’s Military Support Facility in Djibouti: The Economic and Security Dimensions of China’s...paper provides a preliminary look at the origins of China’s military support facility in Djibouti. It explores the evolution of the economic and security...military facilities abroad. It also assesses the implications of the growing economic and military ties between the two countries for the United

  14. China’s Holdings of U.S. Securities: Implications for the U.S. Economy

    DTIC Science & Technology

    2008-05-19

    billion as of June 2007) and Macao ($2.0 billion). These entities , though part of China, are reported separately by Treasury. 11 In comparison, Japan’s...term U.S. Treasury securities (excluding nonmarketable Treasury bonds), as reported by banks, securities brokers and dealers, and other entities in the...Division Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour

  15. A Lightweight Protocol for Secure Video Streaming

    PubMed Central

    Morkevicius, Nerijus; Bagdonas, Kazimieras

    2018-01-01

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988

  16. A Lightweight Protocol for Secure Video Streaming.

    PubMed

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  17. Violent Extremism, National Security and Prevention. Institutional Discourses and Their Implications for Schooling

    ERIC Educational Resources Information Center

    Mattsson, Christer; Säljö, Roger

    2018-01-01

    Currently, threats to societal security from extremist groups are high on the political agenda in many countries. Politicians, policymakers at various levels and communities are searching for methods to counteract recruitment to violent organizations. These efforts are often referred to as Prevention of Violent Extremism (PVE-programmes). One of…

  18. 78 FR 11133 - Notice of Public Meetings of Committees of the Administrative Conference of the United States

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-15

    ... issues implicated by agency use of social media to support rulemaking. The Conference's consultant for... Committee on Adjudication will meet to consider a draft report and recommendations on social security... and recommendations based on legal and empirical analysis of the Social Security Administration's...

  19. Positive Socialization Mechanisms in Secure and Insecure Parent-Child Dyads: Two Longitudinal Studies

    ERIC Educational Resources Information Center

    Kochanska, Grazyna; Woodard, Jarilyn; Kim, Sanghag; Koenig, Jamie L.; Yoon, Jeung Eun; Barry, Robin A.

    2010-01-01

    Background: Implications of early attachment have been extensively studied, but little is known about its long-term indirect sequelae, where early security organization moderates future parent-child relationships, serving as a catalyst for adaptive and maladaptive processes. Two longitudinal multi-trait multi-method studies examined whether early…

  20. An Analysis of China’s Information Technology Strategies and their Implication for US National Security

    DTIC Science & Technology

    2006-06-01

    environment of Web-enabled database searches, online shopping , e-business, and daily credit-card use, which are very common in the United States. Cyberspace...establishing credibility for data exchange such as online shopping . Present regulations stipulate that security chips used by the Chinese government and

  1. Security Implications of Electronic Commerce: A Survey of Consumers and Businesses.

    ERIC Educational Resources Information Center

    Furnell, S. M.; Karweni, T.

    1999-01-01

    Examines general requirement for security technologies that provide a basis for trust in the electronic commerce environment. Discusses the results of two surveys that included general Internet users who are potential customers as well as commercial businesses, that considered attitudes to electronic commerce in general and options relating to…

  2. Energy and Environmental Insecurity (Joint Force Quarterly, Issue 55, 4th Quarter 2009)

    DTIC Science & Technology

    2009-01-01

    Energy and Environmental Insecurity By r i c h a r D B . a n D r e s Dr. Richard B. Andres is Energy and Environment Security and Policy Chair in...security, they are as likely referring to carbon emissions as to energy self -reliance and affordable oil. Moreover, the solutions that the international...2009 4. TITLE AND SUBTITLE Energy and Environmental Insecurity 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d

  3. Bush encroachment dynamics and rangeland management implications in the Horn of Africa

    USDA-ARS?s Scientific Manuscript database

    Rangelands in the Horn of Africa have been undergoing a rapid shift from herbaceous to woody plant dominance in the past decades, threatening subsistence livestock herding and pastoral food security. Despite of significant rangeland management implications, quantification of the spatial extent of en...

  4. Assessing the Impact of Energy Access on Households in Kyrgyzstan: Government Rhetoric Versus Daily Realities

    NASA Astrophysics Data System (ADS)

    Meyer, Alyssa

    While significant literature enumerates the impacts of electrification on development, the impact of energy insecurity on daily life and governance is comparatively poorly understood. In post-Soviet Kyrgyzstan, I will argue that this question is of critical importance for two reasons. First, if one were to only study state rhetoric on the subject, one might believe it to be self-evident that Kyrgyzstan is energy secure and even exporting excess hydroelectric production to its neighbors. In actuality, as I will illustrate by comparing household accounts of the impact of energy supply intermittencies on daily life to government rhetoric on energy, the sector's exports are only indicative of the government's lack of concern for domestic demand and desperate need for revenue. Yet, given that a similar mismatch in the resource allocation priorities of Kyrgyzstani citizens and those of their government created context for revolution in 2010, this finding has serious implications for the political stability of the country. Second, with the progression of global climate change, the population's struggle to access already restricted resource bases will only be further complicated by climate-induced vulnerabilities and resource degradation. Particularly in the short-term, while such a mismatch persists, consumer-driven, community-level interventions must play a key role in improving the energy access, capacity to adapt to climate change, and economic well-being of Kyrgyzstani citizens.

  5. 10 CFR 2.904 - Classification assistance.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Classification assistance. 2.904 Section 2.904 Energy... Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.904 Classification... security classification of information and the safeguards to be observed. ...

  6. 10 CFR 2.904 - Classification assistance.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Classification assistance. 2.904 Section 2.904 Energy... Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.904 Classification... security classification of information and the safeguards to be observed. ...

  7. Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay.

    PubMed

    Hu, Hequn; Gao, Zhenzhen; Liao, Xuewen; Leung, Victor C M

    2017-09-04

    The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device's messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission ( P S S T ), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. P S S T is analyzed for the proposed secure schemes, and the closed form expressions of P S S T for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better P S S T than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar P S S T , the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations.

  8. ADVANCED CERAMIC MATERIALS FOR NEXT-GENERATION NUCLEAR APPLICATIONS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Marra, J.

    2010-09-29

    Rising global energy demands coupled with increased environmental concerns point to one solution; they must reduce their dependence on fossil fuels that emit greenhouse gases. As the global community faces the challenge of maintaining sovereign nation security, reducing greenhouse gases, and addressing climate change nuclear power will play a significant and likely growing role. In the US, nuclear energy already provides approximately one-fifth of the electricity used to power factories, offices, homes, and schools with 104 operating nuclear power plants, located at 65 sites in 31 states. Additionally, 19 utilities have applied to the US Nuclear Regulatory Commission (NRC) formore » construction and operating licenses for 26 new reactors at 17 sites. This planned growth of nuclear power is occurring worldwide and has been termed the 'nuclear renaissance.' As major industrial nations craft their energy future, there are several important factors that must be considered about nuclear energy: (1) it has been proven over the last 40 years to be safe, reliable and affordable (good for Economic Security); (2) its technology and fuel can be domestically produced or obtained from allied nations (good for Energy Security); and (3) it is nearly free of greenhouse gas emissions (good for Environmental Security). Already an important part of worldwide energy security via electricity generation, nuclear energy can also potentially play an important role in industrial processes and supporting the nation's transportation sector. Coal-to-liquid processes, the generation of hydrogen and supporting the growing potential for a greatly increased electric transportation system (i.e. cars and trains) mean that nuclear energy could see dramatic growth in the near future as we seek to meet our growing demand for energy in cleaner, more secure ways. In order to address some of the prominent issues associated with nuclear power generation (i.e., high capital costs, waste management, and proliferation), the worldwide community is working to develop and deploy new nuclear energy systems and advanced fuel cycles. These new nuclear systems address the key challenges and include: (1) extracting the full energy value of the nuclear fuel; (2) creating waste solutions with improved long term safety; (3) minimizing the potential for the misuse of the technology and materials for weapons; (4) continually improving the safety of nuclear energy systems; and (5) keeping the cost of energy affordable.« less

  9. A Hybrid Secure Scheme for Wireless Sensor Networks against Timing Attacks Using Continuous-Time Markov Chain and Queueing Model.

    PubMed

    Meng, Tianhui; Li, Xiaofan; Zhang, Sha; Zhao, Yubin

    2016-09-28

    Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of applications. Monitoring tasks can be performed in various environments. This may be beneficial in many scenarios, but it certainly exhibits new challenges in terms of security due to increased data transmission over the wireless channel with potentially unknown threats. Among possible security issues are timing attacks, which are not prevented by traditional cryptographic security. Moreover, the limited energy and memory resources prohibit the use of complex security mechanisms in such systems. Therefore, balancing between security and the associated energy consumption becomes a crucial challenge. This paper proposes a secure scheme for WSNs while maintaining the requirement of the security-performance tradeoff. In order to proceed to a quantitative treatment of this problem, a hybrid continuous-time Markov chain (CTMC) and queueing model are put forward, and the tradeoff analysis of the security and performance attributes is carried out. By extending and transforming this model, the mean time to security attributes failure is evaluated. Through tradeoff analysis, we show that our scheme can enhance the security of WSNs, and the optimal rekeying rate of the performance and security tradeoff can be obtained.

  10. A Hybrid Secure Scheme for Wireless Sensor Networks against Timing Attacks Using Continuous-Time Markov Chain and Queueing Model

    PubMed Central

    Meng, Tianhui; Li, Xiaofan; Zhang, Sha; Zhao, Yubin

    2016-01-01

    Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of applications. Monitoring tasks can be performed in various environments. This may be beneficial in many scenarios, but it certainly exhibits new challenges in terms of security due to increased data transmission over the wireless channel with potentially unknown threats. Among possible security issues are timing attacks, which are not prevented by traditional cryptographic security. Moreover, the limited energy and memory resources prohibit the use of complex security mechanisms in such systems. Therefore, balancing between security and the associated energy consumption becomes a crucial challenge. This paper proposes a secure scheme for WSNs while maintaining the requirement of the security-performance tradeoff. In order to proceed to a quantitative treatment of this problem, a hybrid continuous-time Markov chain (CTMC) and queueing model are put forward, and the tradeoff analysis of the security and performance attributes is carried out. By extending and transforming this model, the mean time to security attributes failure is evaluated. Through tradeoff analysis, we show that our scheme can enhance the security of WSNs, and the optimal rekeying rate of the performance and security tradeoff can be obtained. PMID:27690042

  11. 17 CFR 229.308 - (Item 308) Internal control over financial reporting.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...

  12. 17 CFR 229.308 - (Item 308) Internal control over financial reporting.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...

  13. 17 CFR 229.308 - (Item 308) Internal control over financial reporting.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...

  14. 17 CFR 229.308 - (Item 308) Internal control over financial reporting.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...

  15. American Security and the International Energy Situation. Volume 1. Introduction and Summary

    DTIC Science & Technology

    1975-04-15

    Financial Security 28 Timely Energy Supply Enhancement 31 Prospects for a Price Break M Concluding Remarks ’♦S II. World Energy Interdependence...likely to experience as the level of social and political chaos rises under the pressures of economic contraction, financial hemorrhage, and pervasive...and Consolidated Edison’s punned storage facility planned for Storm King). Often, energy projects are delayed from the very beginning by vocal

  16. Measuring relational security in forensic mental health services

    PubMed Central

    Chester, Verity; Alexander, Regi T.; Morgan, Wendy

    2017-01-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment. PMID:29234515

  17. Measuring relational security in forensic mental health services.

    PubMed

    Chester, Verity; Alexander, Regi T; Morgan, Wendy

    2017-12-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment.

  18. 32 CFR 216.2 - Applicability.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... with the Department of Homeland Security (DHS), to the Coast Guard at all times, including when it is a service in the Department of Homeland Security. The policies herein also affect the Departments of Transportation, Homeland Security, Energy (National Nuclear Security Administration), the Central Intelligence...

  19. 32 CFR 216.2 - Applicability.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... with the Department of Homeland Security (DHS), to the Coast Guard at all times, including when it is a service in the Department of Homeland Security. The policies herein also affect the Departments of Transportation, Homeland Security, Energy (National Nuclear Security Administration), the Central Intelligence...

  20. 32 CFR 216.2 - Applicability.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... with the Department of Homeland Security (DHS), to the Coast Guard at all times, including when it is a service in the Department of Homeland Security. The policies herein also affect the Departments of Transportation, Homeland Security, Energy (National Nuclear Security Administration), the Central Intelligence...

  1. P.L. 110-140, "Energy Independence and Security Act of 2007" (2007)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2007-12-13

    An act to move the United States toward greater energy independence and security, to increase the production of clean renewable fuels, to protect consumers, to increase the efficiency of products, buildings, and vehicles, to promote research on and deploy greenhouse gas capture and storage options, and to improve the energy performance of the Federal Government, and for other purposes.

  2. 78 FR 56264 - Big Bear Mining Corp., Four Rivers BioEnergy, Inc., Mainland Resources, Inc., QI Systems Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-12

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Big Bear Mining Corp., Four Rivers BioEnergy, Inc., Mainland Resources, Inc., QI Systems Inc., South Texas Oil Co., and Synova Healthcare Group, Inc... concerning the securities of Four Rivers BioEnergy, Inc. because it has not filed any periodic reports since...

  3. Transportation's oil dependence and energy security in the 21st century

    DOT National Transportation Integrated Search

    1997-10-01

    The persistent and in many parts of the world rapid motorization of transport is intensifying global dependence on petroleum. Transportation's global oil dependence poses real energy security risks for the first few decades of the 21st century, at le...

  4. Understanding High Incidence of Severe Obesity and Very Low Food Security in Food Pantry Clients: Implications For Social Work.

    PubMed

    Kaiser, Michelle L; Cafer, Anne

    2018-01-01

    The United States is facing two interconnected social and public health crises of severe obesity and food insecurity within the social-ecological environment. Marginalized groups experience the highest rates and the greatest impacts in terms of morbidity, mortality, and financial burdens. Consequences include experiencing multimorbidities, mental health issues, and decreased quality of life. Food pantries have served as spaces to obtain food to meet household needs, but for some, food pantries have become long-term solutions. We surveyed 2,634 people who accessed pantries in 2005, 2010, and 2013 across 32 counties in a Midwest state. The authors sought to understand to what extent does length of time using a food pantry, food security status, income sources, use of federal food benefits, visiting a doctor, and demographic variables increase odds of severe obesity. More than 14% were severely obese; those who were long-term food pantry users and very low food secure were 1.732 times more likely to be severely obese. Receiving Disability/Supplemental Security Income, seeing a doctor in the last year, being female, and older age reduced the odds of severe obesity. Discussion includes implications for social workers who interact with groups likely to experience very low food security and severe obesity at different systems levels.

  5. Five Models for European Security: Implications for the United States

    DTIC Science & Technology

    1992-01-01

    tripolar concept of security. It is the product of Europeans’ search for a third way between the United States and the former Soviet Union-in part to...distinguish the five systems from each other are reasonably clear (ad hoc, bipolar, tripolar , multi-polar collective, and overlapping), there is room...based on a tripolar concept of security. It is the product of Europeans’ search for a third way between the United States and the former Soviet Union-in

  6. Eliciting Responsivity: Exploring Programming Interests of Federal Inmates as a Function of Security Classification.

    PubMed

    Neller, Daniel J; Vitacco, Michael J; Magaletta, Philip R; Phillips-Boyles, A Brooke

    2016-03-01

    Research supports the effectiveness of the Risk-Needs-Responsivity model for reducing criminal recidivism. Yet programming interests of inmates--one facet of responsivity--remain an understudied phenomenon. In the present study, we explored the programming interests of 753 federal inmates housed across three levels of security. Results suggest that inmates, as a group, prefer specific programs over others, and that some of their interests may differ by security level. We discuss possible implications of these findings. © The Author(s) 2014.

  7. Global Security Sciences Home - Global Security Sciences

    Science.gov Websites

    Us About Our Research Global Security Sciences Leadership Strategic Initiatives Research Centers Center for Strategic Security Overview Leadership Risk and Infrastructure Science Center Overview Leadership Strategic Alliance for Global Energy Solutions Overview Leadership Systems Science Center Overview

  8. Smart Grid Communications Security Project, U.S. Department of Energy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barnes, Frank

    There were four groups that worked on this project in different areas related to Smart Girds and Security. They included faculty and students from electric computer and energy engineering, law, business and sociology. The results of the work are summarized in a verity of reports, papers and thesis. A major report to the Governor of Colorado’s energy office with contributions from all the groups working on this project is given bellow. Smart Grid Deployment in Colorado: Challenges and Opportunities, Report to Colorado Governor’s Energy Office and Colorado Smart Grid Task Force(2010) (Kevin Doran, Frank Barnes, and Puneet Pasrich, eds.) Thismore » report includes information on the state of the grid cyber security, privacy, energy storage and grid stability, workforce development, consumer behavior with respect to the smart grid and safety issues.« less

  9. Looking beyond maternal sensitivity: mother-child correlates of attachment security among children with intellectual disabilities in urban India.

    PubMed

    John, Aesha; Morris, Amanda Sheffield; Halliburton, Amy L

    2012-11-01

    This study examined correlates of attachment security among children with intellectual disabilities in urban India. Survey and observational data were gathered from 47 children, mothers, and teachers on children's attachment security, adaptive functioning, and mother-child emotional availability. The data were analyzed to examine whether child emotional availability mediates the links between maternal emotional availability and child attachment security, and between child functioning and attachment security. The results supported full mediation, indicating that children's emotional availability was a primary mechanism through which maternal emotional availability and child functioning were linked to attachment security among children in our sample. The study findings are discussed in the context of implications for family interventions and research on socio-emotional development among children with intellectual disabilities.

  10. Correlates of Food Security among Low-Resource Young People: An Assessment of Community Protective Factors within Public Housing Neighborhoods.

    PubMed

    Nebbitt, Von E; Lombe, Margaret; Chu, Yoosun; Sinha, Aakanksha; Tirmazi, Tagi

    2016-01-01

    This paper assesses how and/or whether household and community factors are associated with self-reported food security among young people living in public housing (N=151). Results suggest that food security was negatively related to age, particularly to older youth. Also, household size-have many people in the household, household hardships, and household conflict were negatively related to food security. On the contrary, food security was positively related to community cohesion and the presence of the extended family within the public housing neighborhood. Findings seem to suggest that non-specialty food previsions (e.g., community cohesion and family networks) may be important in understanding food security among families living in public housing. A number of program and policy implications are presented.

  11. Energy Security: From Deal Killers to Game Changers

    NASA Astrophysics Data System (ADS)

    Cooke, Charlie

    2010-03-01

    Five energy security ``deal killers" are identified: 1) Global warming and CO2 emissions from fossil fuel combustion; 2) Intermittent energy sources (wind, solar) and the presence and stability of the grid; 3) Penetration of plant defenses to produce transportation fuels from biomass; 4) Mimicking nature: artificial photosynthesis for solar energy to fuels; and 5) Spent fuel from nuclear power reactors. Transformational basic research is required to successfully change the ground rules, to transform these ``deal killers" into ``game changers." T hey are: 1) Offsetting carbon capture and storage costs through enhanced oil recovery and methane generation from high temperature geothermal saline aquifers; 2) Electrical energy storage, through batteries and super-capacitors; 3) Genetic modification of plant cell walls, and catalytic methods for transforming plant sugars into fuels; 4) Separation of solar-induced electrons from holes, and catalysis to produce fuels; and 5) Closing the nuclear fuel cycle. Basic research can revolutionize our approach to carbon-free energy by enhancing nature to achieve energy security.

  12. Science and the Energy Security Challenge: The Example of Solid-State Lighting

    ScienceCinema

    Philips, Julia [Sandia

    2017-12-09

    Securing a viable, carbon neutral energy future for humankind will require an effort of gargantuan proportions. As outlined clearly in a series of workshops sponsored by the DOE Office of Basic Energy Sciences (http://www.sc.doe.gov/bes/reports/list.html), fundamental advances in scientific understanding are needed to broadly implement many of the technologies that are held out as promising options to meet future energy needs, ranging from solar energy, to nuclear energy, to approaches to clean combustion. Using solid state lighting based on inorganic materials as an example, I will discuss some recent results and new directions, emphasizing the multidisciplinary, team nature of the endeavor. I will also offer some thoughts about how to encourage translation of the science into attractive, widely available products – a significant challenge that cannot be ignored. This case study offers insight into approaches that are likely to be beneficial for addressing other aspects of the energy security challenge.

  13. Moving toward energy security and sustainability in 2050 by reconfiguring biofuel production

    USDA-ARS?s Scientific Manuscript database

    To achieve energy security and sustainability by 2050 requires reconfiguring biofuel production both by building on current infrastructure and existing technology and also by making substantial improvements and changes in the feedstocks used, the process technologies applied, and the fuels produced....

  14. Security in Wireless Sensor Networks Employing MACGSP6

    ERIC Educational Resources Information Center

    Nitipaichit, Yuttasart

    2010-01-01

    Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…

  15. Spatially Explicit Life Cycle Assessment of Biofuel Feedstock Production

    EPA Science Inventory

    Biofuels derived from renewable resources have gained increased research and development priority due to increasing energy demand and national security concerns. In the US, the Energy Independence and Security Act (EISA) of 2007 mandated the annual production of 56.8 billion L of...

  16. Applying Acquisition Lessons Learned to Operational Energy Initiatives

    DTIC Science & Technology

    2013-03-01

    current and future platforms to meet the demands of Energy-Informed Operations. Endnotes 1 Charles F. Wald , and Tom Captain, Energy Security America’s...2013); Wald and Captain, Energy Security America’s Best Defense, 1. 3 The Army’s agile process involves seven phases and three decision points to...https://acc.dau.mil/adl/en- US/329976/file/47235/EVM_Report_to_Congress.pdf (accessed January 14, 2013). 22 Lisa Pracchia, “The AV-8B Team Learns Synergy

  17. The Great Game redux: Energy security and the emergence of tripolarity in Eurasia

    NASA Astrophysics Data System (ADS)

    Ozdamar, Ibrahim Ozgur

    Securing energy resources has become a key aspect of foreign policy-making since the 1970s. States have used military and economic foreign policy tools to secure the supply of energy to their domestic markets. With the fall of the USSR in 1991, political and economic competition for penetration into energy-rich regions spread through Eurasia. Inspired from the nineteenth century term to describe Russian-British rivalry in the region, the current rivalry among great powers and their allies is called the "New Great Game". This project analyzes three political conflicts that are shaped by such rivalry that can threaten global energy security. Empirical results from the expected utility model (Bueno de Mesquita 1985) suggest the rivalry among the Western (i.e. EU, US) and Eastern (i.e. Russia, China) powers about the Iranian nuclear program, Nagorno-Karabakh and South Ossetia conflicts is likely to continue and shows some Cold War characteristics. I have also found out the expected outcomes of these conflicts and foreign policy tools and obvious and unseen strategic moves available to actors. The major conclusion of the study is that the EU and US should pursue a coordinated foreign policy and balance the Russian and Chinese influence in the region to secure access to energy resources. Most effective foreign policy tools to achieve such aim appear to be the use of economic relations as leverage against Russia and China and support economic and democratic developments of the newly established republics in Eurasia.

  18. After the Spring: Reforming Arab Armies

    DTIC Science & Technology

    2014-09-01

    Arab region, and intercultural communication . She was previously assigned to the North Atlantic Treaty Organization (NATO) Defence College and the...and provides solutions to strategic Army issues affecting the national security community . The Peacekeeping and Stability Operations Institute...concern topics having strategic implications for the Army, the Department of Defense, and the larger national security community . In addition to its

  19. The National Security Language Initiative and the Teaching of Hindi

    ERIC Educational Resources Information Center

    Shinge, Manjula

    2008-01-01

    This article discusses the teaching of Hindi in the USA, with special reference to the National Security Language Initiative (NSLI). Asian Indian languages are briefly described, as are the growth and diversification of the Asian Indian population in the USA. The inclusion of Hindi in the NSLI, and the implications of this decision for the…

  20. Specific-Token Effects in Screening Tasks: Possible Implications for Aviation Security

    ERIC Educational Resources Information Center

    Smith, J. David; Redford, Joshua S.; Washburn, David A.; Taglialatela, Lauren A.

    2005-01-01

    Screeners at airport security checkpoints perform an important categorization task in which they search for threat items in complex x-ray images. But little is known about how the processes of categorization stand up to visual complexity. The authors filled this research gap with screening tasks in which participants searched for members of target…

  1. Science and Its Discontents: An Evolutionary Tale. Research & Occasional Papers Series. CSHE.11.2008

    ERIC Educational Resources Information Center

    Kennedy, Donald

    2008-01-01

    This paper analyzes the roots and implications of conflict between the conduct of science and government predilections in the United States, including the security state and neoconservative control of Washington. Three major conflicts are discussed: the emergence of new security and secrecy regimes that seek control of science; religiously derived…

  2. The Development and Recognition of Homeland Security Law

    DTIC Science & Technology

    2007-03-01

    Facilitation” (CTPAT)90; “ AML / CFT compliance91”; Bioshield92; two votes for Legislative and/or Government relations; “Implications for Intellectual...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited THE DEVELOPMENT AND...RECOGNITION OF HOMELAND SECURITY LAW by Michael C. McDaniel March 2007 Thesis Advisor: Chris Bellavita Second Reader

  3. Speech and Language Disorders in Children: Implications for the Social Security Administration's Supplemental Security Income Program

    ERIC Educational Resources Information Center

    Rosenbaum, Sara, Ed.; Simon, Patti, Ed.

    2016-01-01

    Speech and language are central to the human experience; they are the vital means by which people convey and receive knowledge, thoughts, feelings, and other internal experiences. Acquisition of communication skills begins early in childhood and is foundational to the ability to gain access to culturally transmitted knowledge, organize and share…

  4. Nuclear Security Futures Scenarios.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Keller, Elizabeth James Kistin; Warren, Drake Edward; Hayden, Nancy Kay

    This report provides an overview of the scenarios used in strategic futures workshops conducted at Sandia on September 21 and 29, 2016. The workshops, designed and facilitated by analysts in Center 100, used scenarios to enable thought leaders to think collectively about the changing aspects of global nuclear security and the potential implications for the US Government and Sandia National Laboratories.

  5. 76 FR 36951 - In the Matter of Animal Cloning Sciences, Inc. (n/k/a Bancorp Energy, Inc.): Order of Suspension...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-23

    .... (n/k/a Bancorp Energy, Inc.): Order of Suspension of Trading June 21, 2011. It appears to the... securities of Animal Cloning Sciences, Inc. (n/k/a Bancorp Energy, Inc.) because it has not filed any... above-listed company. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act...

  6. 76 FR 18587 - In the Matter of Corestream Energy, Inc. (f/k/a Zealous, Inc.); Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-04

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Corestream Energy, Inc. (f/k... Corestream Energy, Inc. (``Corestream'') (f/k/a Zealous, Inc.) because it has failed to file certain periodic.... Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in...

  7. Nevada National Security Site Environmental Report 2013

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmentalmore » Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.« less

  8. Unraveling the nexus between water and food security in Latin America and the Caribbean: regional and global implications

    NASA Astrophysics Data System (ADS)

    Willaarts, Barbara; Garrido, Alberto; Soriano, Barbara; De Stefano, Lucia; López Gunn, Elena; Aldaya, Maite; Martínez-Santos, Pedro; Llamas, Ramon

    2014-05-01

    Latin American and the Caribbean (LAC) is a water and land abundant region, and plays a key role in meeting global food and water security. During the last decade, LAC has experience a rapid socio-economic growth, largely sustained by its competitive advantage in the production and exports of agricultural and mining products and by the high commodity prices in the global market. This study seeks to quantify the contribution of LAC's agriculture to global food and water security, i.e. virtual water trade, and evaluate the environmental and societal implications for regional development. Results show that between 2000 and 2011, LAC has increase its agricultural production 27%, and it now accounts for nearly 18% of the global agricultural market. As a result, the agricultural water footprint (WF) of LAC was augmented 65%; and yet, nearly 19% to 44% of the actual agricultural WF - depending on the countries - is virtual water exported to third countries. In fact, almost 50% of the increase in global virtual water trade during the last decade, corresponds to LAC. Such global contribution has significant implications for regional water and food security. From an environmental perspective, crop expansion (mostly rain-fed) resulted in the deforestation of nearly 1 million km2, turning this region into the second most important deforestation hotspots worldwide. This land clearing is having large impacts of ecosystem services, e.g. carbon sequestration, water quality or biodiversity conservation. From a socio-economic perspective, increasing agricultural production has improved regional food security indicators, although one every seven children is still stunted in LAC and nearly 10% of the population remains undernourished. Dietary shifts and socio-cultural factors also lag behind the growing problem of malnutrition in the region, i.e. overweight and obesity. Improvements of water access and sanitation, have had a positive impact on food security indicators, especially among the high-income LAC countries. We conclude that despite the large contribution of LAC's agriculture to global water and food security, this goal is at present intensively tapping into LAC's natural capital. Also, regional improvements in water security have improved, but important goals remain and new challenges are emerging. Water governance in LAC is evolving to address the challenges posed by rapid socio-economic changes, however, as is often the case, the implementation of reforms lags behind.

  9. Matching food security analysis to context: the experience of the Somalia food security assessment unit.

    PubMed

    Hemrich, Günter

    2005-06-01

    This case study reviews the experience of the Somalia Food Security Assessment Unit (FSAU) of operating a food security information system in the context of a complex emergency. In particular, it explores the linkages between selected features of the protracted crisis environment in Somalia and conceptual and operational aspects of food security information work. The paper specifically examines the implications of context characteristics for the establishment and operations of the FSAU field monitoring component and for the interface with information users and their diverse information needs. It also analyses the scope for linking food security and nutrition analysis and looks at the role of conflict and gender analysis in food security assessment work. Background data on the food security situation in Somalia and an overview of some key features of the FSAU set the scene for the case study. The paper is targeted at those involved in designing, operating and funding food security information activities.

  10. Evaluation of Large Volume SrI2(Eu) Scintillator Detectors

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sturm, B W; Cherepy, N J; Drury, O B

    2010-11-18

    There is an ever increasing demand for gamma-ray detectors which can achieve good energy resolution, high detection efficiency, and room-temperature operation. We are working to address each of these requirements through the development of large volume SrI{sub 2}(Eu) scintillator detectors. In this work, we have evaluated a variety of SrI{sub 2} crystals with volumes >10 cm{sup 3}. The goal of this research was to examine the causes of energy resolution degradation for larger detectors and to determine what can be done to mitigate these effects. Testing both packaged and unpackaged detectors, we have consistently achieved better resolution with the packagedmore » detectors. Using a collimated gamma-ray source, it was determined that better energy resolution for the packaged detectors is correlated with better light collection uniformity. A number of packaged detectors were fabricated and tested and the best spectroscopic performance was achieved for a 3% Eu doped crystal with an energy resolution of 2.93% FWHM at 662keV. Simulations of SrI{sub 2}(Eu) crystals were also performed to better understand the light transport physics in scintillators and are reported. This study has important implications for the development of SrI{sub 2}(Eu) detectors for national security purposes.« less

  11. European Energy Policy and Its Effects on Gas Security

    NASA Astrophysics Data System (ADS)

    Radu, Victorita Stefana Anda

    The goal of this study is to examine the effects of the energy policies of the European Union (EU) on its gas security in the period 2006 to 2016. While energy security is often given a broad meaning, this paper focuses on its external dimension: the EU?s relations with external gas suppliers. It is grounded on four pillars drawing from the compounded institutionalist and liberal theoretical frameworks: regulatory state, rational-choice, external governance, and regime effectiveness. The research question was investigated through a qualitative methodology with two main components: a legislative analysis and four case studies representing the main gas supply options--Russia, North African exporting countries, Norway, and liquefied natural gas (LNG). They highlighted that the EU framed the need for gas security mainly in the context of political risks associated with Russian gas supply, but it almost never took into account other equally important risks. Moreover, the research revealed two main issues. First, that the deeper and the more numerous EU?s energy policies were, the bigger was the magnitude of the effect. Specifically, competitiveness and infrastructure policies had the largest magnitude, while the sustainability and security of supply policies had the smallest effect. Second, EU energy policies only partially diminished the economic and political risks in relation to foreign gas suppliers. To conclude, to a certain extent the EU?s efforts made a positive contribution to the external dimension of the EU?s gas security, but the distinguishing trait remains that there is no consistency in terms of the magnitude of the effect and its nature.

  12. 10 CFR 70.5 - Communications.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... milling, the Agreement States of Colorado, Utah, Texas and Washington should be contacted. [48 FR 16032... 10 Energy 2 2012-01-01 2012-01-01 false Communications. 70.5 Section 70.5 Energy NUCLEAR... Director, Division of Security Policy, Office of Nuclear Security and Incident Response, U.S. Nuclear...

  13. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted Data...

  14. 10 CFR 10.32 - Recommendation of the NRC Personnel Security Review Panel.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Director for Corporate Managementand Chief Information Officer shall designate an NRC Personnel Security... 10 Energy 1 2014-01-01 2014-01-01 false Recommendation of the NRC Personnel Security Review Panel... ELIGIBILITY FOR ACCESS TO RESTRICTED DATA OR NATIONAL SECURITY INFORMATION OR AN EMPLOYMENT CLEARANCE...

  15. 10 CFR 10.32 - Recommendation of the NRC Personnel Security Review Panel.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Director for Corporate Managementand Chief Information Officer shall designate an NRC Personnel Security... 10 Energy 1 2013-01-01 2013-01-01 false Recommendation of the NRC Personnel Security Review Panel... ELIGIBILITY FOR ACCESS TO RESTRICTED DATA OR NATIONAL SECURITY INFORMATION OR AN EMPLOYMENT CLEARANCE...

  16. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted data or other national security information. A presiding officer shall not receive any Restricted Data...

  17. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Information and Restricted Data. 95.35 Section 95.35 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a...

  18. Laser-Plasma Interaction Experiments at Direct-Drive Ignition-Relevant Plasma Conditions at the National Ignition Facility

    NASA Astrophysics Data System (ADS)

    Solodov, A. A.; Rosenberg, M. J.; Myatt, J. F.; Shaw, J. G.; Seka, W.; Epstein, R.; Short, R. W.; Follett, R. K.; Regan, S. P.; Froula, D. H.; Radha, P. B.; Michel, P.; Chapman, T.; Hohenberger, M.

    2017-10-01

    Laser-plasma interaction (LPI) instabilities, such as stimulated Raman scattering (SRS) and two-plasmon decay, can be detrimental for direct-drive inertial confinement fusion because of target preheat by the high-energy electrons they generate. The radiation-hydrodynamic code DRACO was used to design planar-target experiments at the National Ignition Facility that generated plasma and interaction conditions relevant to ignition direct-drive designs (IL 1015W/cm2 , Te > 3 keV, density gradient scale lengths of Ln 600 μm). Laser-energy conversion efficiency to hot electrons of 0.5% to 2.5% with temperature of 45 to 60 keV was inferred from the experiment when the laser intensity at the quarter-critical surface increased from 6 to 15 ×1014W/cm2 . LPI was dominated by SRS, as indicated by the measured scattered-light spectra. Simulations of SRS using the LPI code LPSE have been performed and compared with predictions of theoretical models. Implications for ignition-scale direct-drive experiments will be discussed. This material is based upon work supported by the Department of Energy National Nuclear Security Administration under Award Number DE-NA0001944.

  19. Maternal Resolution of Grief After Preterm Birth: Implications for Infant Attachment Security

    PubMed Central

    Clements, Melissa; Poehlmann, Julie

    2011-01-01

    OBJECTIVE: This study explored the association between mothers' unresolved grief regarding their infant's preterm birth and infant-mother attachment security. We hypothesized that mothers with unresolved grief would be more likely to have insecurely attached infants at 16 months and that this association would be partially mediated by maternal interaction quality. METHODS: This longitudinal study focused on 74 preterm infants (age of <36 weeks) and their mothers who were part of a larger study of high-risk infants. The present analysis included assessment of neonatal and socioeconomic risks at NICU discharge; maternal depression, Reaction to Preterm Birth Interview findings, and quality of parenting at a postterm age of 9 months; and infant-mother attachment at postterm age of 16 months. Associations among findings of grief resolution with the Reaction to Preterm Birth Interview, quality of parenting interactions, and attachment security were explored by using relative risk ratios and logistic and multivariate regression models. RESULTS: The relative risk of developing insecure attachment when mothers had unresolved grief was 1.59 (95% confidence interval: 1.03–2.44). Controlling for covariates (adjusted odds ratio: 2.94), maternal feelings of resolved grief regarding the preterm birth experience were associated with secure infant-mother attachment at 16 months. Maternal grief resolution and interaction quality were independent predictors of attachment security. CONCLUSION: Maternal grief resolution regarding the experience of preterm birth and the quality of maternal interactions have important implications for emerging attachment security for infants born prematurely. PMID:21242223

  20. Maternal resolution of grief after preterm birth: implications for infant attachment security.

    PubMed

    Shah, Prachi E; Clements, Melissa; Poehlmann, Julie

    2011-02-01

    This study explored the association between mothers' unresolved grief regarding their infant's preterm birth and infant-mother attachment security. We hypothesized that mothers with unresolved grief would be more likely to have insecurely attached infants at 16 months and that this association would be partially mediated by maternal interaction quality. This longitudinal study focused on 74 preterm infants (age of <36 weeks) and their mothers who were part of a larger study of high-risk infants. The present analysis included assessment of neonatal and socioeconomic risks at NICU discharge; maternal depression, Reaction to Preterm Birth Interview findings, and quality of parenting at a postterm age of 9 months; and infant-mother attachment at postterm age of 16 months. Associations among findings of grief resolution with the Reaction to Preterm Birth Interview, quality of parenting interactions, and attachment security were explored by using relative risk ratios and logistic and multivariate regression models. The relative risk of developing insecure attachment when mothers had unresolved grief was 1.59 (95% confidence interval: 1.03-2.44). Controlling for covariates (adjusted odds ratio: 2.94), maternal feelings of resolved grief regarding the preterm birth experience were associated with secure infant-mother attachment at 16 months. Maternal grief resolution and interaction quality were independent predictors of attachment security. Maternal grief resolution regarding the experience of preterm birth and the quality of maternal interactions have important implications for emerging attachment security for infants born prematurely.

  1. SPIDERS Bi-Directional Charging Station Interconnection Testing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Simpson, M.

    2013-09-01

    The Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS) program is a multi-year Department of Defense-Department of Energy (DOE) collaborative effort that will demonstrate integration of renewables into island-able microgrids using on-site generation control, demand response, and energy storage with robust security features at multiple installations. Fort Carson, Colorado, will be the initial development and demonstration site for use of plug-in electric vehicles as energy storage (also known as vehicle-to-grid or V2G).

  2. Attachment security, personality, and adjustment of elementary school children.

    PubMed

    Goldner, Limor; Scharf, Miri

    2013-01-01

    Children's development is assumed to be closely related to their attachment security and their personality. The authors' aim was to examine the joint contribution of attachment security and personality traits to children's adjustment by examining diverse children's outcomes (emotional symptoms, social functioning, and behavioral problems) and using various perspectives (children, parents, and teachers). The sample comprised 247 8-12-year-old children from low socioeconomic status neighborhoods. Personality and attachment contribute to the different domains of adjustment. In cases of moderation, attachment security moderates the implications of personality traits on children's adjustment. The findings highlight the contribution of positive personality tendencies in playing down the difficulties of insecurely attached children.

  3. Medicare privatization and the erosion of retirement security.

    PubMed

    Polivka, Larry; Kwak, Jung

    2008-01-01

    This paper describes initiatives to privatize the Medicare program over the last 10 years and the implications of these initiatives for the future of retirement security. Our analysis focuses on the privatization provisions of the Medicare Modernization Act, which is largely designed to benefit the corporate health care sector without containing costs or significantly reducing the threat of rising health care costs to the economic security of current and future retirees. In fact, as designed, the Medicare Modernization Act is likely to increase the threat to retirement security in the years ahead. We conclude with a series of policy alternatives to the neoliberal agenda for the privatization of Medicare.

  4. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lee, Hsien-Hsin S

    The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniquesmore » and system software for achieving a robust, secure, and reliable computing system toward our goal.« less

  5. The existential cost of economic insecurity: Threatened financial security undercuts meaning.

    PubMed

    Abeyta, Andrew A; Routledge, Clay; Kersten, Michael; Cox, Cathy R

    2017-01-01

    Financial security (i.e., a person's sense that they can afford the things they need now and in the foreseeable future) contributes to psychological health and well-being. In the present research, we explored the implications of financial security for perceptions of meaning in life. In Study 1, we found that perceptions of financial insecurity predicted perceptions of meaning in life above and beyond income. Further, income only predicted perceptions of meaning to the extent that it was associated with reduced financial insecurity. In Studies 2 and 3, we found that financial security threats undermined perceptions of meaning in life. Taken together, these studies suggest that maintaining financial security is important for a sense of meaning in life.

  6. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 2

    ScienceCinema

    Thomas D'Agostino

    2017-12-09

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  7. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 1

    ScienceCinema

    Thomas D'Agostino

    2017-12-09

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  8. Nuclear energy related capabilities at Sandia National Laboratories

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pickering, Susan Y.

    2014-02-01

    Sandia National Laboratories' technology solutions are depended on to solve national and global threats to peace and freedom. Through science and technology, people, infrastructure, and partnerships, part of Sandia's mission is to meet the national needs in the areas of energy, climate and infrastructure security. Within this mission to ensure clean, abundant, and affordable energy and water is the Nuclear Energy and Fuel Cycle Programs. The Nuclear Energy and Fuel Cycle Programs have a broad range of capabilities, with both physical facilities and intellectual expertise. These resources are brought to bear upon the key scientific and engineering challenges facing themore » nation and can be made available to address the research needs of others. Sandia can support the safe, secure, reliable, and sustainable use of nuclear power worldwide by incorporating state-of-the-art technologies in safety, security, nonproliferation, transportation, modeling, repository science, and system demonstrations.« less

  9. Implications of Multi-Core Architectures on the Development of Multiple Independent Levels of Security (MILS) Compliant Systems

    DTIC Science & Technology

    2012-10-01

    REPORT 3. DATES COVERED (From - To) MAR 2010 – APR 2012 4 . TITLE AND SUBTITLE IMPLICATIONS OF MULT-CORE ARCHITECTURES ON THE DEVELOPMENT OF...Framework for Multicore Information Flow Analysis ...................................... 23 4 4.1 A Hypothetical Reference Architecture... 4 Figure 2: Pentium II Block Diagram

  10. 10 CFR 2.904 - Classification assistance.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Classification assistance. 2.904 Section 2.904 Energy... Security Information § 2.904 Classification assistance. On request of any party to a proceeding or of the... and the parties with respect to security classification of information and the safeguards to be...

  11. Energy and technology review

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Quirk, W.J.; Canada, J.; de Vore, L.

    1994-04-01

    This issue highlights the Lawrence Livermore National Laboratory`s 1993 accomplishments in our mission areas and core programs: economic competitiveness, national security, energy, the environment, lasers, biology and biotechnology, engineering, physics, chemistry, materials science, computers and computing, and science and math education. Secondary topics include: nonproliferation, arms control, international security, environmental remediation, and waste management.

  12. 78 FR 73915 - Community Alliance, Inc., Defi Global, Inc., Easy Energy, Inc., Industry Concept Holdings, Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-09

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Community Alliance, Inc., Defi Global, Inc., Easy Energy, Inc., Industry Concept Holdings, Inc., and Transworld Benefits International, Inc.; Order... that there is a lack of current and accurate information concerning the securities of Industry Concept...

  13. 78 FR 56977 - Axcess International, Inc., Gamma Pharmaceuticals, Inc., Innovex, Inc, Knight Energy Corp...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-16

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Axcess International, Inc., Gamma Pharmaceuticals, Inc., Innovex, Inc, Knight Energy Corp., Komodo, Inc., Uphonia, Inc., and Wilson Brothers USA, Inc., Order of Suspension of Trading September 12, 2013. It appears to the Securities and Exchange...

  14. 77 FR 54908 - Extension of the Public Review and Comment Period and Announcement of an Additional Public...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-06

    ... DEPARTMENT OF ENERGY National Nuclear Security Administration Extension of the Public Review and... Disposition Supplemental Environmental Impact Statement AGENCY: National Nuclear Security Administration, U.S. Department of Energy. ACTION: Extension of the public review and comment period and announcement of an...

  15. 10 CFR 2.904 - Classification assistance.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Classification assistance. 2.904 Section 2.904 Energy... Security Information § 2.904 Classification assistance. On request of any party to a proceeding or of the... and the parties with respect to security classification of information and the safeguards to be...

  16. 10 CFR 2.904 - Classification assistance.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Classification assistance. 2.904 Section 2.904 Energy... Security Information § 2.904 Classification assistance. On request of any party to a proceeding or of the... and the parties with respect to security classification of information and the safeguards to be...

  17. 10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...

  18. 10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...

  19. 10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...

  20. 10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...

  1. 10 CFR 73.58 - Safety/security interface requirements for nuclear power reactors.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Safety/security interface requirements for nuclear power reactors. 73.58 Section 73.58 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF... requirements for nuclear power reactors. (a) Each operating nuclear power reactor licensee with a license...

  2. 10 CFR 1046.15 - Training and qualification for security skills and knowledge.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... knowledge. 1046.15 Section 1046.15 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF... knowledge. (a) DOE contractors shall only employ as protective force personnel individuals who successfully... and Qualification for Security Skills and Knowledge,” to this subpart. The DOE contractor shall...

  3. 10 CFR 11.5 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Policy. 11.5 Section 11.5 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR... concepts of justice, a personnel security program in the interests of the common defense and security for...

  4. 10 CFR 11.5 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Policy. 11.5 Section 11.5 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR... concepts of justice, a personnel security program in the interests of the common defense and security for...

  5. Impacts of a 25% Renewable Electricity Standard as Proposed in the American Clean Energy and Security Act Discussion Draft

    EIA Publications

    2009-01-01

    This report responds to requests from Chairman Edward Markey, for an analysis of a 25% federal renewable electricity standard (RES). The RES proposal analyzed in this report is included in the discussion draft of broader legislation, the American Clean Energy and Security Act (ACESA) of 2009, issued on the Energy and Commerce Committee website at the end of March 2009.

  6. Turkey as an Emerging Energy Hub

    DTIC Science & Technology

    2010-06-01

    respecting environment concerns.”27 It has two dimensions; one of them is the view of the importing country, the other the view of the exporting ...country. For an importing country (consumer), energy security refers primarily to access to the sources and security of supplies,28 for an exporting ...production is insufficient for the country’s needs. Turkey is a developing country and needs energy to sustain its economic growth . To sustain that

  7. Political and Military Challenges of the Republic of Moldova in the Context of Security in the Black Sea Basin

    DTIC Science & Technology

    2014-12-01

    which requires close attention to political, econornic, social , cultw·al, diplomatic, ethnic, and energy factors. The new geopolitical configmation in...closely connected to regional security, which requires close attention to political, economic, social , cultural, diplomatic, ethnic, and energy factors...requires close attention to political, economic, social , cultural, diplomatic, environmental, ethnical, and energy factors. Such an approach to

  8. Impacts of industrial transition on water use intensity and energy-related carbon intensity in China: A spatio-temporal analysis during 2003-2012

    NASA Astrophysics Data System (ADS)

    Cai, J.; Yin, H.; Varis, O.

    2016-12-01

    China faces a complicated puzzle in balancing the country's trade-offs among water and energy security, economic competitiveness, and environmental sustainability. It is therefore of prime importance to comprehend China's water and energy security under the effect of its economic structural changes. Analyses on this entity still remain few and far between though, and a comprehensive picture has not been available that would help understand China's recent development in economic structure as well as its spatial features and links to water and energy security, and policy-making. Consequently, we addressed this information gap by performing an integrated and quantitative spatio-temporal analysis of the impacts of China's industrial transition on water use intensity (WUI) and energy-related carbon intensity (ERCI). Those two factors serve as the national targets of its water and energy security. Our results for the first time quantitatively demonstrated the following significant and novel information: 1) the primary industry (PI) appeared to dominate the WUI although its relative share decreased, and PI's WUI continued to be far higher than that of secondary and tertiary industries (SI and TI); 2) SI dominated in affecting the total ERCI at both national and provincial scales; 3) the total WUI and ERCI had a significant positive correlation.

  9. Modelling the energy future of Switzerland after the phase out of nuclear power plants

    NASA Astrophysics Data System (ADS)

    Diaz, Paula; Van Vliet, Oscar

    2015-04-01

    In September 2013, the Swiss Federal Office of Energy (SFOE) published the final report of the proposed measures in the context of the Energy Strategy 2050 (ES2050). The ES2050 draws an energy scenario where the nuclear must be substituted by alternative sources. This implies a fundamental change in the energy system that has already been questioned by experts, e.g. [Piot, 2014]. Therefore, we must analyse in depth the technical implications of change in the Swiss energy mix from a robust baseload power such as nuclear, to an electricity mix where intermittent sources account for higher rates. Accomplishing the ES2050 imply difficult challenges, since nowadays nuclear power is the second most consumed energy source in Switzerland. According to the SFOE, nuclear accounts for a 23.3% of the gross production, only surpassed by crude oil products (43.3%). Hydropower is the third source more consumed, representing approximately the half of the nuclear (12.2%). Considering that Switzerland has almost reached the maximum of its hydropower capacity, renewables are more likely to be the alternative when the nuclear phase out takes place. Hence, solar and wind power will play an important role in the future Swiss energy mix, even though currently new renewables account for only 1.9% of the gross energy consumption. In this study we look for realistic and efficient combinations of energy resources to substitute nuclear power. Energy modelling is a powerful tool to design an energy system with high energy security that avoids problems of intermittency [Mathiesen & Lund, 2009]. In Switzerland, energy modelling has been used by the government [Abt et. al., 2012] and also has significant relevance in academia [Mathys, 2012]. Nevertheless, we detected a gap in the study of the security in energy scenarios [Busser, 2013]. This study examines the future electricity production of Switzerland using Calliope, a multi-scale energy systems model, developed at Imperial College, London and HES [Pfenninger, 2015]. It has been specifically design to represent high shares of renewable energy, allowing for the estimation of the Swiss energy transition with high level of detail. Calliope includes topology characteristics of the electricity system, and variability of radiation and wind, which enables the analysis of intermittency in renewable electricity sources, in order to fulfil the electricity demand at all hours. Three energy scenarios are modelled; first, the higher energy production of renewables in Switzerland and the import of natural gas to supply the demand; second, imports of wind power from North Sea with high level of intermittency; and third, imports of solar power from North Africa, with less intermittency but with higher risk of internal turmoil. To summarise, we analyse in detail the energy scenarios of Switzerland when the nuclear power plants will be ceased. A gap currently present in academia, such as the future energy security in Switzerland, is covered by our Calliope modelling. References: Abt, M.; E. Bernhard, A. Kolliker, T. Roth, M. Spicher, L. Stieger, Volkswirtschaftliche Massnahmenanalyse zur Energiestrategie 2050: Tiel I: Gesamtergebnisse und Empfehlungen, Staatssekretariat fur Wirtschaft SECO, Bern, CH, 2012. Busser, M; T. Kaiser, E. Wassermann, K. Ammon, S. Reichen, A. Gunzinger, et al., Energiestrategie 2050 aus Sicht des Energie Trialogs, Energie Trialog Schweiz, 2013. Mathiesen, B. V. and Lund, H. Comparative analyses of seven technologies to facilitate the integration of fluctuating renewable energy sources. IET Renew. Power Gen. 3, 190-204 (2009). Mathys, N. 2012. Modelling contributions to the Swiss energy and environmental challenge. Special issue on energy modelling_introductory article.Swiss journal of economics and statistics. Pfenninger, Stefan. 2015. Calliope: a multi-scale energy systems (MUSES) modeling framework. Available at: http://www.callio.pe/ Piot, M. Energiestrategie 2050 der Schweiz, in: 13. Symp. Energieinnovation, Graz, AT, 2014: p. 28.

  10. 10 CFR 824.3 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... disclosure pursuant to the Act and National Security Information that has been determined pursuant to... et seq.). Administrator means the Administrator of the National Nuclear Security Administration...

  11. 10 CFR 824.3 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... disclosure pursuant to the Act and National Security Information that has been determined pursuant to... et seq.). Administrator means the Administrator of the National Nuclear Security Administration...

  12. Relational antecedents and social implications of the emotion of empathy: Evidence from three studies.

    PubMed

    Kim, Sanghag; Kochanska, Grazyna

    2017-09-01

    Despite emotion researchers' strong interest in empathy and its implications for prosocial functioning, surprisingly few studies have examined parent-child attachment as a context for early origins of empathy in young children. Consequently, empirical evidence on links among children's attachment, empathy, and prosociality is thin and inconsistent. We examined such links in 2 longitudinal studies of community families (Family Study, N = 101 mothers, fathers, and children, 14 to 80 months; Parent-Child Study, mothers and children, N = 108, 15 to 45 months) and a study of low-income, diverse mothers and toddlers (Play Study, N = 186, 30 months). Children's security was assessed in Strange Situation in infancy and rated by observers and mothers using Attachment Q-Set at toddler age. Children's empathy was observed in scripted probes that involved parental simulated distress. Children's prosociality was rated by parents (Family Study, Play Study). Security with mothers related to higher empathy. For mother- and father-child dyads, security moderated the path from empathy to prosociality. For insecure children, but not secure ones, variations in empathy related to prosociality. Insecure and unempathic children were particularly low in prosociality. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  13. Alternative caregiving figures and their role on adult attachment representations.

    PubMed

    Zaccagnino, Maria; Cussino, Martina; Saunders, Rachel; Jacobvitz, Deborah; Veglia, Fabio

    2014-01-01

    The present work represents the first Italian study investigating whether and how mothers who describe unloving experiences with both parents during childhood could become more secure as adults (termed earned-secures). The sample consisted of 94 women from northern Italy. All the subjects were administered the Adult Attachment Interview (AAI) and fill in a screening test evaluating depressive symptoms. No significative differences were found regarding depressive symptomatology across the different attachment classifications. The majority of the samples (84%) remember an important alternative support figure during childhood (before 12 years old). Earned-secures significantly differ from continuous-secure and insecure groups (F = 27.202; p ≤ 0.01) on the amount of the emotional support from the main alternative support figure and on the average amount of emotional support across alternative support figures (F = 10.44; p ≤ 0.01). The majority of alternative support figures (80%) were grandparents. A corrective emotional experience allows the subject to work through his negative childhood experiences and acquire modalities of interaction that enable him/her to function more effectively in the world. The clinical implications of this study will be discussed. Attachment theory. Clinical implications of attachment experiences. Corrective emotional experience. Copyright © 2012 John Wiley & Sons, Ltd.

  14. 10 CFR 1008.22 - Use and collection of social security numbers.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Use and collection of social security numbers. 1008.22... (PRIVACY ACT) Maintenance and Establishment of Systems of Records § 1008.22 Use and collection of social security numbers. (a) The System Manager of each system of records which utilizes social security numbers...

  15. 10 CFR 2.906 - Obligation of parties to avoid introduction of restricted data or national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... data or national security information. 2.906 Section 2.906 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.906 Obligation of parties to avoid introduction of restricted data or national security information. It is the...

  16. 10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... security information. 2.907 Section 2.907 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.907 Notice of intent to introduce restricted data or national security information. (a) If, at the time of publication of a notice...

  17. 10 CFR 2.908 - Contents of notice of intent to introduce restricted data or other national security information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... or other national security information. 2.908 Section 2.908 Energy NUCLEAR REGULATORY COMMISSION... Applicable to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.908 Contents of notice of intent to introduce restricted data or other national security information. (a) A...

  18. 17 CFR 229.1013 - (Item 1013) Purposes, alternatives, reasons and effects in a going-private transaction.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...

  19. 17 CFR 229.908 - (Item 908) Reasons for and alternatives to the roll-up transaction.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... alternatives to the roll-up transaction. 229.908 Section 229.908 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975-REGULATION S-K Roll-Up...

  20. 17 CFR 229.908 - (Item 908) Reasons for and alternatives to the roll-up transaction.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... alternatives to the roll-up transaction. 229.908 Section 229.908 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975-REGULATION S-K Roll-Up...

  1. 17 CFR 229.1013 - (Item 1013) Purposes, alternatives, reasons and effects in a going-private transaction.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...

  2. 17 CFR 229.1013 - (Item 1013) Purposes, alternatives, reasons and effects in a going-private transaction.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...

  3. 17 CFR 229.1013 - (Item 1013) Purposes, alternatives, reasons and effects in a going-private transaction.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...

  4. 17 CFR 229.1013 - (Item 1013) Purposes, alternatives, reasons and effects in a going-private transaction.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...

  5. 17 CFR 229.908 - (Item 908) Reasons for and alternatives to the roll-up transaction.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... alternatives to the roll-up transaction. 229.908 Section 229.908 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975-REGULATION S-K Roll-Up...

  6. 17 CFR 229.908 - (Item 908) Reasons for and alternatives to the roll-up transaction.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... alternatives to the roll-up transaction. 229.908 Section 229.908 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975-REGULATION S-K Roll-Up...

  7. 10 CFR 2.908 - Contents of notice of intent to introduce restricted data or other national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... or other national security information. 2.908 Section 2.908 Energy NUCLEAR REGULATORY COMMISSION... Applicable to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.908 Contents of notice of intent to introduce restricted data or other national security information. (a) A...

  8. 10 CFR 2.906 - Obligation of parties to avoid introduction of restricted data or national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... data or national security information. 2.906 Section 2.906 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.906 Obligation of parties to avoid introduction of restricted data or national security information. It is the...

  9. 10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... security information. 2.907 Section 2.907 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.907 Notice of intent to introduce restricted data or national security information. (a) If, at the time of publication of a notice...

  10. 10 CFR 2.903 - Protection of restricted data and national security information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data or...

  11. 10 CFR 1008.22 - Use and collection of social security numbers.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Use and collection of social security numbers. 1008.22... (PRIVACY ACT) Maintenance and Establishment of Systems of Records § 1008.22 Use and collection of social security numbers. (a) The System Manager of each system of records which utilizes social security numbers...

  12. 10 CFR 1008.22 - Use and collection of social security numbers.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Use and collection of social security numbers. 1008.22... (PRIVACY ACT) Maintenance and Establishment of Systems of Records § 1008.22 Use and collection of social security numbers. (a) The System Manager of each system of records which utilizes social security numbers...

  13. 10 CFR 1008.22 - Use and collection of social security numbers.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Use and collection of social security numbers. 1008.22... (PRIVACY ACT) Maintenance and Establishment of Systems of Records § 1008.22 Use and collection of social security numbers. (a) The System Manager of each system of records which utilizes social security numbers...

  14. 10 CFR 1008.22 - Use and collection of social security numbers.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Use and collection of social security numbers. 1008.22... (PRIVACY ACT) Maintenance and Establishment of Systems of Records § 1008.22 Use and collection of social security numbers. (a) The System Manager of each system of records which utilizes social security numbers...

  15. Scenario and multiple criteria decision analysis for energy and environmental security of military and industrial installations.

    PubMed

    Karvetski, Christopher W; Lambert, James H; Linkov, Igor

    2011-04-01

    Military and industrial facilities need secure and reliable power generation. Grid outages can result in cascading infrastructure failures as well as security breaches and should be avoided. Adding redundancy and increasing reliability can require additional environmental, financial, logistical, and other considerations and resources. Uncertain scenarios consisting of emergent environmental conditions, regulatory changes, growth of regional energy demands, and other concerns result in further complications. Decisions on selecting energy alternatives are made on an ad hoc basis. The present work integrates scenario analysis and multiple criteria decision analysis (MCDA) to identify combinations of impactful emergent conditions and to perform a preliminary benefits analysis of energy and environmental security investments for industrial and military installations. Application of a traditional MCDA approach would require significant stakeholder elicitations under multiple uncertain scenarios. The approach proposed in this study develops and iteratively adjusts a scoring function for investment alternatives to find the scenarios with the most significant impacts on installation security. A robust prioritization of investment alternatives can be achieved by integrating stakeholder preferences and focusing modeling and decision-analytical tools on a few key emergent conditions and scenarios. The approach is described and demonstrated for a campus of several dozen interconnected industrial buildings within a major installation. Copyright © 2010 SETAC.

  16. Russia’s National Interests in the Transcaucasus and the U.S. Policy: Implications for Armenian National Security

    DTIC Science & Technology

    2006-03-01

    Transition, 156. 106 Quoted in Jacob W. Kipp, “War Scare in the Caucasus: Redefining the Threat and the War on Terrorism,” in Russian Military Reform , ed...Garden, 232. 109 Marcel de Haas, “The Development of Russia’s Security Policy,” in Russian Military Reform , ed. Anne C. Aldis and Roger N. McDermott...2003). de Haas, Marcel. “The Development of Russia’s Security Policy,” in Russian Military Reform , ed. Anne C. Aldis and Roger N. McDermott, 3-21

  17. Employment of individuals in the Social Security disability programs.

    PubMed

    O'Leary, Paul; Livermore, Gina A; Stapleton, David C

    2011-01-01

    The articles in this special issue present findings from research on the employment and work-related activities of individuals receiving benefits through the Social Security Disability Insurance and Supplemental Security Income programs, and on the factors that hinder their efforts to work at levels that lead to exiting the disability rolls. This article introduces the other articles, highlights their important findings, and discusses the implications for ongoing efforts to increase the earnings and self-sufficiency of these beneficiaries, such as the Ticket to Work program and the Benefit Offset National Demonstration.

  18. The management, privacy and medico-legal issues of electronic CPAP data in Australia and New Zealand: Electronic CPAP data management in Australia and New Zealand.

    PubMed

    Swieca, John; Hamilton, Garun S; Meaklim, Hailey

    2017-08-01

    Continuous Positive Airway Pressure (CPAP) is considered to be the gold standard treatment for obstructive sleep apnoea (OSA). CPAP monitoring systems allow tracking of patient CPAP adherence and treatment efficacy, by measuring residual sleep-disordered breathing, hours of CPAP use, and mask leak etc. The American Thoracic Society (ATS) published a position paper in 2013 highlighting issues of interpreting CPAP data such as a lack of consistency between CPAP manufacturers data algorithms, legal implications of CPAP data and implications for CPAP adherence. This paper extends on this work by investigating these issues in an Australasian context. A review of current literature on CPAP monitoring systems, privacy and security of CPAP data for major Australasian CPAP providers, and CPAP adherence was undertaken. A legal review was also commissioned for issues related to privacy and security of CPAP data. CPAP manufacturers' utilize different algorithms for respiratory event detection and clinicians need to be aware the implications for interpreting CPAP data. Australasian CPAP manufacturers have created security/privacy policies with the intent to follow relevant legislation to protect patients' CPAP data, however they do need to be constantly reviewed and updated to avoid data breaches and changes to agreements. No guarantees can be provided by the Australasian Sleep Association on CPAP manufacturers' compliance with these policies and there is the potential for some degree of liability for physicians and CPAP providers associated with CPAP data. Lastly, providing patients with feedback on their CPAP usage and OSA management appears to have positive influence CPAP adherence. CPAP data provides many opportunities to increase OSA patient care and to help patients self-manage this chronic condition. However, issues relating to lack of standardization of CPAP parameters, privacy, security, and legal implications will need to be managed in this changing technologic and clinical environment. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. Food security in an era of economic volatility.

    PubMed

    Naylor, Rosamond L; Falcon, Walter P

    2010-01-01

    This article analyzes international commodity price movements, assesses food policies in response to price fluctuations, and explores the food security implications of price volatility on low-income groups. It focuses specifically on measurements, causes, and consequences of recent food price trends, variability around those trends, and price spikes. Combining these three components of price dynamics shows that the variation in real prices post-2000 was substantially greater than that in the 1980s and 1990s, and was approximately equal to the extreme volatility in commodity prices that was experienced in the 1970s. Macro policy, exchange rates, and petroleum prices were important determinants of price variability over 2005–2010, highlighting the new linkages between the agriculture-energy and agriculture-finance markets that affect the world food economy today. These linkages contributed in large part to misguided expectations and uncertainty that drove prices to their peak in 2008. The article also argues that there is a long-lasting effect of price spikes on food policy around the world, often resulting in self-sufficiency policies that create even more volatility in international markets. The efforts by governments to stabilize prices frequently contribute to even greater food insecurity among poor households, most of which are in rural areas and survive on the margin of net consumption and net production. Events of 2008—and more recently in 2010—underscore the impact of price variability for food security and the need for refocused policy approaches to prevent and mitigate price spikes.

  20. Is more always better? The nonlinear relationship between energy consumption and wellbeing

    NASA Astrophysics Data System (ADS)

    Vaughan Winfrey, Elise Marie

    Policymakers today face rapidly expanding world populations, increasing evidence of environmental degradation and climate change, and mounting economic crises. In this context, they are grappling with the challenge of balancing environmental concerns, economic viability, and the wellbeing of their citizens. Because energy consumption has both positive and negative wellbeing implications, it is unclear whether societal goals to raise standards of living through energy-intensive lifestyles conflict with the social, economic, environmental, and health dimensions of broader wellbeing aspirations. Though there has been a significant amount of research on the long-run environmental consequences of increasing aggregate world energy demand, there is a lack of direct evidence on the relationship between energy consumption and wellbeing. This paper attempts to improve our understanding of the net wellbeing consequences of energy consumption. Specifically, it examines whether there is a nonlinear relationship between per capita energy consumption, as measured alternatively by CO2 emissions (metric tons per capita), electricity consumption (kWh per capita), and total energy consumption (kg of oil equivalent per capita), and wellbeing, as measured by individual life satisfaction aggregated at the country level. Panel and cross-sectional regression analyses are conducted using data from the Gallup World Poll (GWP), integrated European and World Values Surveys (WVS-EVS), and the World Bank DataBank (WBDB). Despite the classic economic assumption that more is always better, this analysis indicates that increasing energy consumption is not always associated with wellbeing improvements. The empirical results provide some suggestive evidence that life satisfaction gains associated with energy consumption may eventually be counterbalanced by the related human and environmental costs. This is valuable information for policymakers trying to balance environmental, energy-security, and citizen-wellbeing concerns.

  1. Applications Using High Flux LCS gamma-ray Beams: Nuclear Security and Contributions to Fukushima

    NASA Astrophysics Data System (ADS)

    Fujiwara, Mamoru

    2014-09-01

    Nuclear nonproliferation and security are an important issue for the peaceful use of nuclear energy. Many countries now collaborate together for preventing serious accidents from nuclear terrorism. Detection of hidden long-lived radioisotopes and fissionable nuclides in a non-destructive manner is useful for nuclear safeguards and management of nuclear wastes as well as nuclear security. After introducing the present situation concerning the nuclear nonproliferation and security in Japan, we plan to show the present activities of JAEA to detect the hidden nuclear materials by means of the nuclear resonance fluorescence with energy-tunable, monochromatic gamma-rays generated by Laser Compton Scattering (LCS) with an electron beam. The energy recovery linac (ERL) machine is now under development with the KEK-JAEA collaboration for realizing the new generation of gamma-ray sources. The detection technologies of nuclear materials are currently developed using the existing electron beam facilities at Duke University and at NewSubaru. These developments in Japan will contribute to the nuclear security program in Japan and to the assay of melted nuclear fuels in the Fukushima Daiichi nuclear power plants.

  2. Research on energy strategy and Chinese energy investment in the middle east

    NASA Astrophysics Data System (ADS)

    Huang, Yiling

    2017-08-01

    The Middle East is a key node of “One Belt and One Road strategy”. Energy investment is an important part of Chinese investment in the Middle East. The political turmoil in the Middle East has brought the political risks to Chinese investors. In the future, with the globalization of Chinese resource distribution and the expansion of Chinese outward investment, it is significant for China to ensure its energy security. Based on the analysis of the situation of Chinese energy strategy in the Middle East, this paper tries to put forward some suggestion about Chinese energy investment in the Middle East in order to protect Chinese energy security effectively.

  3. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tidwell, Vincent

    The nexus between thermoelectric power production and water use is not uniform across the U.S., but rather differs according to regional physiography, demography, power plant fleet composition, and the transmission network. That is, in some regions water demand for thermoelectric production is relatively small while in other regions it represents the dominate use. The later is the case for the Great Lakes region, which has important implications for the water resources and aquatic ecology of the Great Lakes watershed. This is today, but what about the future? Projected demographic trends, shifting lifestyles, and economic growth coupled with the threat ofmore » global climate change and mounting pressure for greater U.S. energy security could have profound effects on the region's energy future. Planning for such an uncertain future is further complicated by the fact that energy and environmental planning and regulatory decision-making is largely bifurcated in the region, with environmental and water resource concerns generally taken into account after new energy facilities and technologies have been proposed, or practices are already in place. Based on these confounding needs, the objective of this effort is to develop Great Lakes-specific methods and tools to integrate energy and water resource planning and thereby support the dual goals of smarter energy planning and development, and protection of Great Lakes water resources. Guiding policies for this planning are the Great Lakes and St. Lawrence River Basin Water Resources Compact and the Great Lakes Water Quality Agreement. The desired outcome of integrated energy-water-aquatic resource planning is a more sustainable regional energy mix for the Great Lakes basin ecosystem.« less

  4. Energy Market and Economic Impacts of H.R. 2454, the American Clean Energy and Security Act of 2009

    EIA Publications

    2009-01-01

    This report responds to a request from Chairman Henry Waxman and Chairman Edward Markey for an analysis of H.R. 2454, the American Clean Energy and Security Act of 2009 (ACESA). ACESA, as passed by the House of Representatives on June 26, 2009, is a complex bill that regulates emissions of greenhouse gases through market-based mechanisms, efficiency programs, and economic incentives.

  5. Clean and Secure Energy from Coal

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith, Philip; Davies, Lincoln; Kelly, Kerry

    2014-08-31

    The University of Utah, through their Institute for Clean and Secure Energy (ICSE), performed research to utilize the vast energy stored in our domestic coal resources and to do so in a manner that will capture CO 2 from combustion from stationary power generation. The research was organized around the theme of validation and uncertainty quantification (V/UQ) through tightly coupled simulation and experimental designs and through the integration of legal, environment, economics and policy issues.

  6. The British Nuclear Deterrent After the Cold War,

    DTIC Science & Technology

    1995-01-01

    Scope for Further Franco-British Cooperation 86 Attitudes of Friends and Allies 9° 7 . SOME POLICY IMPLICATIONS 94 A " Blessing in Disguise" for...on French decision, and French decision alone." 94 SOME POLICY IMPLICATIONS A " BLESSING IN DISGUISE" FOR EUROPEAN SECURITY It is time to take...but those disposing of any form of "weapon of mass i:LVictor A. Utgoff, "The Biotechnology Revolution and Its Potential Military Implications ," in

  7. Energy Market and Economic Impacts of S.2191, the Lieberman-Warner Climate Security Act of 2007

    EIA Publications

    2008-01-01

    This report responds to a request from Senators Lieberman and Warner for an analysis of S.2191, the Lieberman-Warner Climate Security Act of 2007. S.2191 is a complex bill regulating emissions of greenhouse gases through market- based mechanisms, energy efficiency programs, and economic incentives.

  8. 76 FR 52377 - Consolidated Energy, Inc., Diamond Home Services, Inc., Goran Capital Inc., Kingsley Coach, Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-22

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Consolidated Energy, Inc., Diamond Home Services, Inc., Goran Capital Inc., Kingsley Coach, Inc. (The), Knockout Holdings, Inc., and Kuhlman Co... securities of Kingsley Coach, Inc. (The) because it has not filed any periodic reports since the period ended...

  9. 10 CFR 10.31 - Actions on the recommendations.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Actions on the recommendations. 10.31 Section 10.31 Energy... DATA OR NATIONAL SECURITY INFORMATION OR AN EMPLOYMENT CLEARANCE Procedures § 10.31 Actions on the... NRC Personnel Security Review Panel not later than 10 days after receipt of the notice. (2) In the...

  10. Entropy of the Universe

    NASA Astrophysics Data System (ADS)

    Sato, Humitaka

    2010-06-01

    Charles Darwin's calculation of a life of Earth had ignited Kelvin's insight on a life of Sun, which had eventually inherited to the physical study of stellar structure and energy source. Nuclear energy had secured a longevity of the universe and the goal of the cosmic evolution has been secured by the entropy of black holes.

  11. 76 FR 48908 - Biweekly Notice; Applications and Amendments to Facility Operating Licenses Involving No...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-09

    .... Therefore, pursuant to 10 CFR 51.22(b), no environmental impact statement or environmental assessment need... provisions of the NRC-approved Cyber Security Plan. The proposed change is consistent with Nuclear Energy...-approved Cyber Security Plan. The proposed change is consistent with Nuclear Energy Institute (NEI) 08-09...

  12. The Nuclear Renaissance — Implications on Quantitative Nondestructive Evaluations

    NASA Astrophysics Data System (ADS)

    Matzie, Regis A.

    2007-03-01

    The world demand for energy is growing rapidly, particularly in developing countries that are trying to raise the standard of living for billions of people, many of whom do not even have access to electricity. With this increased energy demand and the high and volatile price of fossil fuels, nuclear energy is experiencing resurgence. This so-called nuclear renaissance is broad based, reaching across Asia, the United States, Europe, as well as selected countries in Africa and South America. Some countries, such as Italy, that have actually turned away from nuclear energy are reconsidering the advisability of this design. This renaissance provides the opportunity to deploy more advanced reactor designs that are operating today, with improved safety, economy, and operations. In this keynote address, I will briefly present three such advanced reactor designs in whose development Westinghouse is participating. These designs include the advanced passive PWR, AP1000, which recently received design certification for the US Nuclear Regulatory Commission; the Pebble Bed Modular reactor (PBMR) which is being demonstrated in South Africa; and the International Reactor Innovative and Secure (IRIS), which was showcased in the US Department of Energy's recently announced Global Nuclear Energy Partnership (GNEP), program. The salient features of these designs that impact future requirements on quantitative nondestructive evaluations will be discussed. Such features as reactor vessel materials, operating temperature regimes, and new geometric configurations will be described, and mention will be made of the impact on quantitative nondestructive evaluation (NDE) approaches.

  13. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET

    PubMed Central

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-01-01

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV’s research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV. PMID:28629142

  14. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    PubMed

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  15. Three Essays Examining Household Energy Demand and Behavior

    NASA Astrophysics Data System (ADS)

    Murray, Anthony G.

    This dissertation consists of three essays examining household energy decisions and behavior. The first essay examines the adoption of energy efficient Energy Star home appliances by U.S. households. Program effectiveness requires that consumers be aware of the labeling scheme and also change their purchase decisions based on label information. The first essay examines the factors associated with consumer awareness of the Energy Star label of recently purchased major appliances and the factors associated with the choice of Energy Star labeled appliances. The findings suggest that eliminating identified gaps in Energy Star appliance adoption would result in house electricity cost savings of $164 million per year and associated carbon emission reductions of about 1.1 million metric tons per year. The second essay evaluates household energy security and the effectiveness of the Low-Income Home Energy Assistance Program (LIHEAP), the single largest energy assistance program available to poor households within the United States. Energy security is conceptually akin to the well-known concept of food security. Rasch models and household responses to energy security questions in the 2005 Residential Energy Consumption Survey are used to generate an energy insecurity index that is consistent with those found in the food insecurity literature. Participating in LIHEAP is found to significantly reduce household energy insecurity score in the index. Further, simulations show that the elimination of the energy assistance safety net currently available to households increases the number of energy insecure house- holds by over 16 percent. The third essay develops a five equation demand system to estimate household own-price, cross-price and income elasticities between electricity, natural gas, food at home, food away from home, and non-durable commodity groups. Household cross-price elasticities between energy and food commodities are of particular importance. Energy price shocks reduce food expenditures for low-income households, as indicated by negative cross-price elasticity estimates for food and energy commodities. Additionally, low-income households reduce energy expenditures more than other households, further indicating "heat or eat" behavior. Results from all three essays provide policy makers with helpful information to shape future federal energy programs.

  16. 48 CFR 908.7106 - Security cabinets.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ....7106 Section 908.7106 Federal Acquisition Regulations System DEPARTMENT OF ENERGY COMPETITION ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Acquisition of Special Items 908.7106 Security...) Fixed-price prime contractors and lower tier subcontractors may use GSA acquisition sources for security...

  17. Education and Strategic Research Collaborations

    Science.gov Websites

    Los Alamos National Laboratory National Security Education Center Image Search Site submit LaboratoryNational Security Education Center Menu Program Offices Energy Security Council New Mexico Consortium Geophysics, Planetary Physics, Signatures Events Collaborations for education and strategic research, student

  18. The Role of the DOE Weapons Laboratories in a Changing National Security Environment: CNSS Papers No. 8, April 1988

    DOE R&D Accomplishments Database

    Hecker, S. S.

    1988-04-01

    The contributions of the Department of Energy (DOE) nuclear weapons laboratories to the nation's security are reviewed in testimony before the Subcommittee on Procurement and Military Nuclear Systems of the House Armed Services Committee. Also presented are contributions that technology will make in maintaining the strategic balance through deterrence, treaty verification, and a sound nuclear weapons complex as the nation prepares for significant arms control initiatives. The DOE nuclear weapons laboratories can contribute to the broader context of national security, one that recognizes that military strength can be maintained over the long term only if it is built upon the foundations of economic strength and energy security.

  19. Balancing Energy, Food Security, and Critical Ecosystems: Dam Siting, Design and Operations in the Mekong River Basin

    NASA Astrophysics Data System (ADS)

    Wild, T. B.; Reed, P. M.; Loucks, D.

    2016-12-01

    The Mekong River basin in Southeast Asia is one of several river basins with exceptionally high biodiversity value where intensive hydropower dam development is anticipated. In the Mekong basin, over 100 dams are planned to be constructed in the next 20-30 years. As planned, these dams will alter the river's natural water, sediment and nutrient flows, and will fragment fish migration pathways. In doing so, they will degrade one of the world's most productive freshwater fish habitats, upon which some 60 million people depend for food and income security. For those dams that have not yet been constructed, there still exist opportunities to modify their siting, design and operation (SDO) to achieve a more balanced set of tradeoffs among hydropower production, sediment/nutrient passage and adult fish/larvae passage. We present a successful case study wherein we explored such alternative SDO opportunities in partnership with the Government of Cambodia for Sambor Dam, planned to be built on the main stem of the Mekong. Sambor would be one of the world's longest dams, spanning 18 km across the river just upstream of (1) Tonle Sap Lake, which supplies 70% of Cambodians' protein, and (2) the Mekong Delta in Vietnam, responsible for 50% of Vietnam's rice production. We will describe key dam siting and design modifications required to mitigate ecological impacts. We will then focus on the most promising alternative dam siting/design concept, exploring the reservoir operations space to demonstrate that a complex set of tradeoffs exist among a diverse set of energy and ecosystem objectives. Results indicate that even for a hydrologically small reservoir, a wide array of potential reservoir operating policies exist that have vastly different food-energy implications. While some policies would significantly mitigate ecological impacts, many policies exist that would pose a severe threat to the sustainability of the fishery. Failure to sample the reservoir operations space at appropriate resolution could result in failure to accurately identify tradeoffs and vulnerabilities. We explore energy-ecosystem tradeoffs while demonstrating to stakeholders the impacts of transitioning from their initial deterministic analysis that largely focused on energy revenue to broader many-objective stochastic problem formulations.

  20. Swiss Strategic Communication in the Defense Sector and Its Implications for Swiss Security Policy

    DTIC Science & Technology

    2017-12-01

    rejected because of its projected higher costs compared to buying the fighter jets.392 Through a public -private partnership, the needed Gripens would...necessary military strategies, overall efficiency and coherence can be augmented to the benefit of national security, the public finances, and the...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. SWISS STRATEGIC

Top