Sample records for energy security issues

  1. Survey of cyber security issues in smart grids

    NASA Astrophysics Data System (ADS)

    Chen, Thomas M.

    2010-04-01

    The future smart grid will enable cost savings and lower energy use by means of smart appliances and smart meters which support dynamic load management and real-time monitoring of energy use and distribution. The introduction of two-way communications and control into power grid introduces security and privacy concerns. This talk will survey the security and privacy issues in smart grids using the NIST reference model, and relate these issues to cyber security in the Internet.

  2. Strategic Response to Energy-Related Security Threats in the US Department of Defense

    DTIC Science & Technology

    2014-10-15

    generation in the United States are fossil fuels . These include coal, natural gas, and oil . In some cases solar, wind, geothermal, and hydroelectric...and findings. The research addressed engagement on climate change and energy security issues by DoD across various tiers and sectors of the...on climate change and energy security issues by DoD across various tiers and sectors of the organization. Specifically, a tripartite analysis

  3. Public views on multiple dimensions of security : nuclear waepons, terrorism, energy, and the environment : 2007.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.

    2008-01-01

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support formore » domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.« less

  4. 10 CFR 712.16 - DOE security review.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false DOE security review. 712.16 Section 712.16 Energy DEPARTMENT OF ENERGY HUMAN RELIABILITY PROGRAM Establishment of and Procedures for the Human Reliability... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file...

  5. Network Computing Infrastructure to Share Tools and Data in Global Nuclear Energy Partnership

    NASA Astrophysics Data System (ADS)

    Kim, Guehee; Suzuki, Yoshio; Teshima, Naoya

    CCSE/JAEA (Center for Computational Science and e-Systems/Japan Atomic Energy Agency) integrated a prototype system of a network computing infrastructure for sharing tools and data to support the U.S. and Japan collaboration in GNEP (Global Nuclear Energy Partnership). We focused on three technical issues to apply our information process infrastructure, which are accessibility, security, and usability. In designing the prototype system, we integrated and improved both network and Web technologies. For the accessibility issue, we adopted SSL-VPN (Security Socket Layer-Virtual Private Network) technology for the access beyond firewalls. For the security issue, we developed an authentication gateway based on the PKI (Public Key Infrastructure) authentication mechanism to strengthen the security. Also, we set fine access control policy to shared tools and data and used shared key based encryption method to protect tools and data against leakage to third parties. For the usability issue, we chose Web browsers as user interface and developed Web application to provide functions to support sharing tools and data. By using WebDAV (Web-based Distributed Authoring and Versioning) function, users can manipulate shared tools and data through the Windows-like folder environment. We implemented the prototype system in Grid infrastructure for atomic energy research: AEGIS (Atomic Energy Grid Infrastructure) developed by CCSE/JAEA. The prototype system was applied for the trial use in the first period of GNEP.

  6. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System.more » Selected papers were processed separately for inclusion in the Energy Science and Technology Database.« less

  7. Energy and technology review

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Quirk, W.J.; Canada, J.; de Vore, L.

    1994-04-01

    This issue highlights the Lawrence Livermore National Laboratory`s 1993 accomplishments in our mission areas and core programs: economic competitiveness, national security, energy, the environment, lasers, biology and biotechnology, engineering, physics, chemistry, materials science, computers and computing, and science and math education. Secondary topics include: nonproliferation, arms control, international security, environmental remediation, and waste management.

  8. The European Union’s Energy Security Challenges

    DTIC Science & Technology

    2007-01-26

    NATO’s summit in Riga, Latvia in November 2006. Members of the Democratic Leadership in the 110th Congress have signaled their intention to introduce...cooperation through the development of international energy partnerships. Members of the Democratic Leadership in the 110th Congress have signaled their...surrounding global energy supply and demand persist, energy security issues are likely to gain importance in the 110th Congress. Members of the Democratic

  9. Security issues in healthcare applications using wireless medical sensor networks: a survey.

    PubMed

    Kumar, Pardeep; Lee, Hoon-Jae

    2012-01-01

    Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs.

  10. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey

    PubMed Central

    Kumar, Pardeep; Lee, Hoon-Jae

    2012-01-01

    Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs. PMID:22368458

  11. Energy and Environmental Insecurity (Joint Force Quarterly, Issue 55, 4th Quarter 2009)

    DTIC Science & Technology

    2009-01-01

    Energy and Environmental Insecurity By r i c h a r D B . a n D r e s Dr. Richard B. Andres is Energy and Environment Security and Policy Chair in...security, they are as likely referring to carbon emissions as to energy self -reliance and affordable oil. Moreover, the solutions that the international...2009 4. TITLE AND SUBTITLE Energy and Environmental Insecurity 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d

  12. 77 FR 64800 - Secretary of Energy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... reestablished to provide advice and recommendations to the Secretary on the Department's basic and applied research, economic and national security policy, educational issues, operational issues and other...

  13. Impacts of a 25% Renewable Electricity Standard as Proposed in the American Clean Energy and Security Act Discussion Draft

    EIA Publications

    2009-01-01

    This report responds to requests from Chairman Edward Markey, for an analysis of a 25% federal renewable electricity standard (RES). The RES proposal analyzed in this report is included in the discussion draft of broader legislation, the American Clean Energy and Security Act (ACESA) of 2009, issued on the Energy and Commerce Committee website at the end of March 2009.

  14. Overview of Climate Confluence Security Issues

    NASA Astrophysics Data System (ADS)

    Reisman, J. P.

    2011-12-01

    Presentation will focus on an overview of the security perspectives based on the confluence considerations including energy, economics and climate change. This will include perspectives from reports generated by the Quadrennial Defense Review, Joint Forces Command, the Center for Strategic International Studies, MIT, the Inter-agency Climate Change Adaptation Task Force, the Central Intelligence Agency, the Center for Naval Analysis, and other relevant reports. The presentation will highlight the connections between resource issues and climate change which can be interpreted into security concerns. General discussion of global issues, contextual review of AR4 WGII may be included and any other report updates as applicable. The purpose of this presentation is to give a rounded view of the general qualitative and quantitative perspectives regarding climate related security considerations.

  15. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    PubMed Central

    Paramasivan, B.; Kaliappan, M.

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP. PMID:25143986

  16. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    PubMed

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  17. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    NASA Astrophysics Data System (ADS)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  18. Clean and Secure Energy from Coal

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith, Philip; Davies, Lincoln; Kelly, Kerry

    2014-08-31

    The University of Utah, through their Institute for Clean and Secure Energy (ICSE), performed research to utilize the vast energy stored in our domestic coal resources and to do so in a manner that will capture CO 2 from combustion from stationary power generation. The research was organized around the theme of validation and uncertainty quantification (V/UQ) through tightly coupled simulation and experimental designs and through the integration of legal, environment, economics and policy issues.

  19. Defining the Issues of a Presidential Election from Televised Political Spot Advertisements.

    ERIC Educational Resources Information Center

    Shyles, Leonard C.

    1983-01-01

    Discerns issues of the 1980 presidential primary campaigns through content analysis of issues presented in televised political spot advertisements created for nine presidential primary candidates. Results indicate Democrats were most concerned with the economy, energy, foreign policy, and national security, while Republicans focused on federalism…

  20. 10 CFR 824.7 - Final notice of violation.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... whether the person violated or is continuing to violate a classified information security requirement. (b... classified information security requirement, the Director may issue to the person a final notice of violation... DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION...

  1. 10 CFR 824.7 - Final notice of violation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... whether the person violated or is continuing to violate a classified information security requirement. (b... classified information security requirement, the Director may issue to the person a final notice of violation... DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION...

  2. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  3. 10 CFR 860.1 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Purpose. 860.1 Section 860.1 Energy DEPARTMENT OF ENERGY TRESPASSING ON DEPARTMENT OF ENERGY PROPERTY § 860.1 Purpose. The regulations in this part are issued for the protection and security of facilities, installations and real property subject to the jurisdiction or...

  4. 10 CFR 860.1 - Purpose.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Purpose. 860.1 Section 860.1 Energy DEPARTMENT OF ENERGY TRESPASSING ON DEPARTMENT OF ENERGY PROPERTY § 860.1 Purpose. The regulations in this part are issued for the protection and security of facilities, installations and real property subject to the jurisdiction or...

  5. 10 CFR 860.1 - Purpose.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Purpose. 860.1 Section 860.1 Energy DEPARTMENT OF ENERGY TRESPASSING ON DEPARTMENT OF ENERGY PROPERTY § 860.1 Purpose. The regulations in this part are issued for the protection and security of facilities, installations and real property subject to the jurisdiction or...

  6. 10 CFR 860.1 - Purpose.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Purpose. 860.1 Section 860.1 Energy DEPARTMENT OF ENERGY TRESPASSING ON DEPARTMENT OF ENERGY PROPERTY § 860.1 Purpose. The regulations in this part are issued for the protection and security of facilities, installations and real property subject to the jurisdiction or...

  7. 10 CFR 860.1 - Purpose.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Purpose. 860.1 Section 860.1 Energy DEPARTMENT OF ENERGY TRESPASSING ON DEPARTMENT OF ENERGY PROPERTY § 860.1 Purpose. The regulations in this part are issued for the protection and security of facilities, installations and real property subject to the jurisdiction or...

  8. Science and Strategic - Climate Implications

    NASA Astrophysics Data System (ADS)

    Tindall, J. A.; Moran, E. H.

    2008-12-01

    Energy of weather systems greatly exceeds energy produced and used by humans. Variation in this energy causes climate variability potentially resulting in local, national, and/or global catastrophes beyond our ability to deter the loss of life and economic destabilization. Large scale natural disasters routinely result in shortages of water, disruption of energy supplies, and destruction of infrastructure. The resulting unforeseen and disastrous events occurring beyond national emergency preparation, as related to climate variability, could insight civil unrest due to dwindling and/or inaccessible resources necessary for survival. Lack of these necessary resources in impacted countries often leads to wars. Climate change coupled with population growth, which exposes more of the population to potential risks associated with climate and environmental change, demands faster technological response. Understanding climate/associated environmental changes, the relation to human activity and behavior, and including this in national and international emergency/security management plans would alleviate shortcomings in our present and future technological status. The scale of environmental change will determine the potential magnitude of civil unrest at the local, national, and/or global level along with security issues at each level. Commonly, security issues related to possible civil unrest owing to temporal environmental change is not part of a short and/or long-term strategy, yet recent large-scale disasters are reminders that system failures (as in hurricane Katrina) include acknowledged breaches to individual, community, and infrastructure security. Without advance planning and management concerning environmental change, oncoming and climate related events will intensify the level of devastation and human catastrophe. Depending upon the magnitude and period of catastrophic events and/or environmental changes, destabilization of agricultural systems, energy supplies, and other lines of commodities often results in severely unbalanced supply and demand ratios, which eventually affect the entire global community. National economies potentially risk destabilization, which is especially important since economics plays a major role in strategic planning. This presentation will address these issues and the role that science can play in human sustainability and local, national, and international security.

  9. 10 CFR 611.1 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Purpose. 611.1 Section 611.1 Energy DEPARTMENT OF ENERGY....1 Purpose. This part is issued by the Department of Energy (DOE) pursuant to section 136 of the Energy Independence and Security Act of 2007, Public Law 110-140, as amended by section 129 of Public Law...

  10. Renewable Energy Education in India

    ERIC Educational Resources Information Center

    Bajpai, Shrish; Kidwai, Naimur Rahman

    2017-01-01

    The issue of renewable energy sources that have great potential to give solutions to the longstanding energy problems of India has been considered. It has been stated that renewable energy sources are an important part of India's plan to increase energy security and provide new generation with ample job opportunities. India's plans to move towards…

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Halbgewachs, Ronald D.; Chavez, Adrian R.

    Process Control System (PCS) and Industrial Control System (ICS) security is critical to our national security. But there are a number of technological, economic, and educational impediments to PCS owners implementing effective security on their systems. Sandia National Laboratories has performed the research and development of the OPSAID (Open PCS Security Architecture for Interoperable Design), a project sponsored by the US Department of Energy Office of Electricity Delivery and Energy Reliability (DOE/OE), to address this issue. OPSAID is an open-source architecture for PCS/ICS security that provides a design basis for vendors to build add-on security devices for legacy systems, whilemore » providing a path forward for the development of inherently-secure PCS elements in the future. Using standardized hardware, a proof-of-concept prototype system was also developed. This report describes the improvements and capabilities that have been added to OPSAID since an initial report was released. Testing and validation of this architecture has been conducted in another project, Lemnos Interoperable Security Project, sponsored by DOE/OE and managed by the National Energy Technology Laboratory (NETL).« less

  12. Securing the Data Storage and Processing in Cloud Computing Environment

    ERIC Educational Resources Information Center

    Owens, Rodney

    2013-01-01

    Organizations increasingly utilize cloud computing architectures to reduce costs and energy consumption both in the data warehouse and on mobile devices by better utilizing the computing resources available. However, the security and privacy issues with publicly available cloud computing infrastructures have not been studied to a sufficient depth…

  13. Smart Grid Communications Security Project, U.S. Department of Energy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barnes, Frank

    There were four groups that worked on this project in different areas related to Smart Girds and Security. They included faculty and students from electric computer and energy engineering, law, business and sociology. The results of the work are summarized in a verity of reports, papers and thesis. A major report to the Governor of Colorado’s energy office with contributions from all the groups working on this project is given bellow. Smart Grid Deployment in Colorado: Challenges and Opportunities, Report to Colorado Governor’s Energy Office and Colorado Smart Grid Task Force(2010) (Kevin Doran, Frank Barnes, and Puneet Pasrich, eds.) Thismore » report includes information on the state of the grid cyber security, privacy, energy storage and grid stability, workforce development, consumer behavior with respect to the smart grid and safety issues.« less

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Freund, M.T.; Wise, J.A.; Ulibarri, C.A.

    This paper addresses US energy security in the post-Cold War era for a conference on energy security jointly sponsored by the Department of Energy and the National Defense University. It examines the evolving nature of energy security based on analysis of past crisis-inducing events and-discusses potentially important geopolitical, environmental, regulatory, and economic developments during the next twenty-five years. The paper steps beyond the traditional economic focus of energy security issues to examine the interplay between fundamental economic and technical drivers on the one hand, and political, environmental, and perceptual phenomena, on the other hand, that can combine to create crisesmore » where none were expected. The paper expands on the premise that the recent demise of the Soviet Union and other changing world conditions have created a new set of energy dynamics, and that it is imperative that the United States revise its energy security perspective accordingly. It proceeds by reviewing key factors that comprise the concepts of ``energy security`` and ``energy crisis`` and how they may fit into the new world energy security equation. The study also presents a series of crisis scenarios that could develop during the next twenty-five years, paying particular attention to mechanisms and linked crisis causes and responses. It concludes with a discussion of factors that may serve to warn analysts and decision makers of impending future crises conditions. The crisis scenarios contained in this report should be viewed only as a representative sample of the types of situations that could occur. They serve to illustrate the variety of factors that can coalesce to produce a ``crisis.``« less

  15. U.S. Strategic Nuclear Forces: Background, Developments, and Issues

    DTIC Science & Technology

    2017-02-10

    Department of Energy questioned the management practices at the National Nuclear Security Administration (NNSA), which is responsible for the LEP, arguing...U.S. Strategic Nuclear Forces: Background, Developments, and Issues Amy F. Woolf Specialist in Nuclear Weapons Policy February 10, 2017...

  16. Long-term energy security in a national scale using LEAP. Application to de-carbonization scenarios in Andorra

    NASA Astrophysics Data System (ADS)

    Travesset-Baro, Oriol; Jover, Eric; Rosas-Casals, Marti

    2016-04-01

    This paper analyses the long-term energy security in a national scale using Long-range Energy Alternatives Planning System (LEAP) modelling tool. It builds the LEAP Andorra model, which forecasts energy demand and supply for the Principality of Andorra by 2050. It has a general bottom-up structure, where energy demand is driven by the technological composition of the sectors of the economy. The technological model is combined with a top-down econometric model to take into account macroeconomic trends. The model presented in this paper provides an initial estimate of energy demand in Andorra segregated into all sectors (residential, transport, secondary, tertiary and public administration) and charts a baseline scenario based on historical trends. Additional scenarios representing different policy strategies are built to explore the country's potential energy savings and the feasibility to achieve the Intended Nationally Determined Contribution (INDC) submitted in April 2015 to UN. In this climatic agreement Andorra intends to reduce net greenhouse gas emissions (GHG) by 37% as compared to a business-as-usual scenario by 2030. In addition, current and future energy security is analysed in this paper under baseline and de-carbonization scenarios. Energy security issues are assessed in LEAP with an integrated vision, going beyond the classic perspective of security of supply, and being closer to the sustainability's integrative vision. Results of scenarios show the benefits of climate policies in terms of national energy security and the difficulties for Andorra to achieving the de-carbonization target by 2030.

  17. 10 CFR 824.13 - Initial decision.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Initial decision. 824.13 Section 824.13 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.13 Initial decision. (a) The Hearing Officer shall issue an initial decision as soon as...

  18. 10 CFR 1048.1 - Purpose.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Purpose. 1048.1 Section 1048.1 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) TRESPASSING ON STRATEGIC PETROLEUM RESERVE FACILITIES AND OTHER PROPERTY § 1048.1 Purpose. The regulations in this part are issued for the protection and security of: (a) The Strategic...

  19. 10 CFR 1048.1 - Purpose.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Purpose. 1048.1 Section 1048.1 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) TRESPASSING ON STRATEGIC PETROLEUM RESERVE FACILITIES AND OTHER PROPERTY § 1048.1 Purpose. The regulations in this part are issued for the protection and security of: (a) The Strategic...

  20. 10 CFR 1048.1 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Purpose. 1048.1 Section 1048.1 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) TRESPASSING ON STRATEGIC PETROLEUM RESERVE FACILITIES AND OTHER PROPERTY § 1048.1 Purpose. The regulations in this part are issued for the protection and security of: (a) The Strategic...

  1. 10 CFR 1048.1 - Purpose.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Purpose. 1048.1 Section 1048.1 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) TRESPASSING ON STRATEGIC PETROLEUM RESERVE FACILITIES AND OTHER PROPERTY § 1048.1 Purpose. The regulations in this part are issued for the protection and security of: (a) The Strategic...

  2. 10 CFR 1048.1 - Purpose.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Purpose. 1048.1 Section 1048.1 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) TRESPASSING ON STRATEGIC PETROLEUM RESERVE FACILITIES AND OTHER PROPERTY § 1048.1 Purpose. The regulations in this part are issued for the protection and security of: (a) The Strategic...

  3. Formulation of US international energy policies

    NASA Astrophysics Data System (ADS)

    1980-09-01

    To find out how the United States develops international energy policy, GAO reviewed five major energy issues covering the period from early 1977 through 1979. The issues are: vulnerabilities to petroleum supply interruptions; long term national security strategy on imported oil prices; export of U.S. oil and gas production equipment and technology to the Soviety Union; World Bank initiatives to assist in financing oil and gas exploration and development in oil-importing developing countries; and the role of gas imports relative to the nation's future sources of gas.

  4. 75 FR 80734 - Chronic Beryllium Disease Prevention Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... Disease Prevention Program AGENCY: Office of Health, Safety and Security, Department of Energy. ACTION... and comments on issues related to its current chronic beryllium disease prevention program. The... disease prevention program. DATES: All comments on the issues presented in this document must be received...

  5. US Clean Energy Sector and the Opportunity for Modeling and Simulation

    NASA Technical Reports Server (NTRS)

    Inge, Carole Cameron

    2011-01-01

    The following paper sets forth the current understanding of the US clean energy demand and opportunity. As clean energy systems come online and technology is developed, modeling and simulation of these complex energy programs provides an untapped business opportunity. The US Department of Defense provides a great venue for developing new technology in the energy sector because it is demanding lower fuel costs, more energy efficiencies in its buildings and bases, and overall improvements in its carbon footprint. These issues coupled with the security issues faced by foreign dependence on oil will soon bring more clean energy innovations to the forefront (lighter batteries for soldiers, alternative fuel for jets, energy storage systems for ships, etc).

  6. LANL Safeguards and Security Assurance Program. Revision 6

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1995-04-03

    The Safeguards and Security (S and S) Assurance Program provides a continuous quality improvement approach to ensure effective, compliant S and S program implementation throughout the Los Alamos National Laboratory. Any issues identified through the various internal and external assessments are documented, tracked and closed using the Safeguards and Security Issue Management Program. The Laboratory utilizes an integrated S and S systems approach to protect US Department of Energy (DOE) interests from theft or diversion of special nuclear material (SNM), sabotage, espionage, loss or theft of classified/controlled matter or government property, and other hostile acts that may cause unacceptable impactsmore » on national security, health and safety of employees and the public, and the environment. This document explains the basis, scope, and conduct of the S and S process to include: self-assessments, issue management, risk assessment, and root cause analysis. It also provides a discussion of S and S topical areas, roles and responsibilities, process flow charts, minimum requirements, methodology, terms, and forms.« less

  7. Study on Introduction of CO2 Free Energy to Japan with Liquid Hydrogen

    NASA Astrophysics Data System (ADS)

    Kamiya, Shoji; Nishimura, Motohiko; Harada, Eichi

    In Japan, both CO2(Carbon dioxide) emission reduction and energy security are the very important social issues after Fukushima Daiichi accident. On the other hand, FCV (Fuel Cell Vehicle)using hydrogen will be on the market in 2015. Introducing large mass hydrogen energy is being expected as expanding hydrogen applications, or solution to energy issues of Japan.And then,the Japanese government announced the road map for introducing hydrogen energy supply chain in this June,2014. Under these circumstances, imported CO2 free hydrogen will be one of the solutions for energy security and CO2 reduction, if the hydrogen price is affordable. To achieve this, Kawasaki Heavy Industries, Ltd. (KHI) performed a feasibility studyon CO2-free hydrogen energy supply chainfrom Australian brown coal linked with CCS (Carbon dioxide Capture and Storage) to Japan. In the study, hydrogen production systems utilizing brown coal gasificationandLH2 (liquid hydrogen)systems as storing and transporting hydrogen are examined.This paper shows the possibilityof realizingthe CO2 free hydrogen supply chain, the cost breakdown of imported hydrogen cost, its cost competitiveness with conventionalfossil, andLH2systems as key technologies of the hydrogen energy chain.

  8. Robust Networking Architecture and Secure Communication Scheme for Heterogeneous Wireless Sensor Networks

    ERIC Educational Resources Information Center

    McNeal, McKenzie, III.

    2012-01-01

    Current networking architectures and communication protocols used for Wireless Sensor Networks (WSNs) have been designed to be energy efficient, low latency, and long network lifetime. One major issue that must be addressed is the security in data communication. Due to the limited capabilities of low cost and small sized sensor nodes, designing…

  9. Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium.

    PubMed

    Somasundaram, M; Sivakumar, R

    2015-01-01

    Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient's life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body function records. Most of the systems on the Wireless Body Area Network are not effective in facing the security deployment issues. To access the patient's information with higher security on WBAN, Game Theory with Stackelberg Security Equilibrium (GTSSE) is proposed in this paper. GTSSE mechanism takes all the players into account. The patients are monitored by placing the power position authority initially. The position authority in GTSSE is the organizer and all the other players react to the organizer decision. Based on our proposed approach, experiment has been conducted on factors such as security ratio based on patient's health information, system flexibility level, energy consumption rate, and information loss rate. Stackelberg Security considerably improves the strength of solution with higher security.

  10. Bio-mimic optimization strategies in wireless sensor networks: a survey.

    PubMed

    Adnan, Md Akhtaruzzaman; Abdur Razzaque, Mohammd; Ahmed, Ishtiaque; Isnin, Ismail Fauzi

    2013-12-24

    For the past 20 years, many authors have focused their investigations on wireless sensor networks. Various issues related to wireless sensor networks such as energy minimization (optimization), compression schemes, self-organizing network algorithms, routing protocols, quality of service management, security, energy harvesting, etc., have been extensively explored. The three most important issues among these are energy efficiency, quality of service and security management. To get the best possible results in one or more of these issues in wireless sensor networks optimization is necessary. Furthermore, in number of applications (e.g., body area sensor networks, vehicular ad hoc networks) these issues might conflict and require a trade-off amongst them. Due to the high energy consumption and data processing requirements, the use of classical algorithms has historically been disregarded. In this context contemporary researchers started using bio-mimetic strategy-based optimization techniques in the field of wireless sensor networks. These techniques are diverse and involve many different optimization algorithms. As far as we know, most existing works tend to focus only on optimization of one specific issue of the three mentioned above. It is high time that these individual efforts are put into perspective and a more holistic view is taken. In this paper we take a step in that direction by presenting a survey of the literature in the area of wireless sensor network optimization concentrating especially on the three most widely used bio-mimetic algorithms, namely, particle swarm optimization, ant colony optimization and genetic algorithm. In addition, to stimulate new research and development interests in this field, open research issues, challenges and future research directions are highlighted.

  11. 10 CFR 160.1 - Purpose.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Purpose. 160.1 Section 160.1 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) TRESPASSING ON COMMISSION PROPERTY § 160.1 Purpose. The regulations in this part are issued for the protection and security of facilities, installations and real property subject to the...

  12. 10 CFR 160.1 - Purpose.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Purpose. 160.1 Section 160.1 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) TRESPASSING ON COMMISSION PROPERTY § 160.1 Purpose. The regulations in this part are issued for the protection and security of facilities, installations and real property subject to the...

  13. 10 CFR 160.1 - Purpose.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Purpose. 160.1 Section 160.1 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) TRESPASSING ON COMMISSION PROPERTY § 160.1 Purpose. The regulations in this part are issued for the protection and security of facilities, installations and real property subject to the...

  14. 10 CFR 160.1 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Purpose. 160.1 Section 160.1 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) TRESPASSING ON COMMISSION PROPERTY § 160.1 Purpose. The regulations in this part are issued for the protection and security of facilities, installations and real property subject to the...

  15. Carbon sequestration potential of poplar energy crops in the Midwest, USA

    Treesearch

    R.S. Jr. Zalesny; W.L. Headlee; R.B. Hall; D.R. Coyle

    2010-01-01

    Energy use and climate change mitigation are closely linked via ecological, social, and economic factors, including carbon management. Energy supply is a key 21st century National security issue for the United States; identifying and developing woody feedstocks for transportation fuels and combined heat and power operations are a crucial component of the future...

  16. A Hybrid Secure Scheme for Wireless Sensor Networks against Timing Attacks Using Continuous-Time Markov Chain and Queueing Model.

    PubMed

    Meng, Tianhui; Li, Xiaofan; Zhang, Sha; Zhao, Yubin

    2016-09-28

    Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of applications. Monitoring tasks can be performed in various environments. This may be beneficial in many scenarios, but it certainly exhibits new challenges in terms of security due to increased data transmission over the wireless channel with potentially unknown threats. Among possible security issues are timing attacks, which are not prevented by traditional cryptographic security. Moreover, the limited energy and memory resources prohibit the use of complex security mechanisms in such systems. Therefore, balancing between security and the associated energy consumption becomes a crucial challenge. This paper proposes a secure scheme for WSNs while maintaining the requirement of the security-performance tradeoff. In order to proceed to a quantitative treatment of this problem, a hybrid continuous-time Markov chain (CTMC) and queueing model are put forward, and the tradeoff analysis of the security and performance attributes is carried out. By extending and transforming this model, the mean time to security attributes failure is evaluated. Through tradeoff analysis, we show that our scheme can enhance the security of WSNs, and the optimal rekeying rate of the performance and security tradeoff can be obtained.

  17. A Hybrid Secure Scheme for Wireless Sensor Networks against Timing Attacks Using Continuous-Time Markov Chain and Queueing Model

    PubMed Central

    Meng, Tianhui; Li, Xiaofan; Zhang, Sha; Zhao, Yubin

    2016-01-01

    Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of applications. Monitoring tasks can be performed in various environments. This may be beneficial in many scenarios, but it certainly exhibits new challenges in terms of security due to increased data transmission over the wireless channel with potentially unknown threats. Among possible security issues are timing attacks, which are not prevented by traditional cryptographic security. Moreover, the limited energy and memory resources prohibit the use of complex security mechanisms in such systems. Therefore, balancing between security and the associated energy consumption becomes a crucial challenge. This paper proposes a secure scheme for WSNs while maintaining the requirement of the security-performance tradeoff. In order to proceed to a quantitative treatment of this problem, a hybrid continuous-time Markov chain (CTMC) and queueing model are put forward, and the tradeoff analysis of the security and performance attributes is carried out. By extending and transforming this model, the mean time to security attributes failure is evaluated. Through tradeoff analysis, we show that our scheme can enhance the security of WSNs, and the optimal rekeying rate of the performance and security tradeoff can be obtained. PMID:27690042

  18. Global CLEWs model - A novel application of OSeMOSYS

    NASA Astrophysics Data System (ADS)

    Avgerinopoulos, Georgios; Pereira Ramos, Eunice; Howells, Mark

    2017-04-01

    Over the past years, studies that analyse Nexus issues from a holistic point of view and not energy, land or water separately have been gaining momentum. This project aims at giving insights into global issues through the application and the analysis of a global scale OSeMOSYS model. The latter -which is based on a fully open and amendable code- has been used successfully in the latest years as it has been the producing fully accessible energy models suitable for capacity building and policy making suggestions. This study develops a CLEWs (climate, land, energy and water) model with the objective of interrogating global challenges (e.g. increasing food demand) and international trade features, with policy priorities on food security, resource efficiency, low-carbon energy and climate change mitigation, water availability and vulnerability to water stress and floods, water quality, biodiversity and ecosystem services. It will for instance assess (i) the impact of water constraints on food security and human development (clean water for human use; industrial and energy water demands), as well as (ii) the impact of climate change on aggravating or relieving water problems.

  19. 76 FR 38550 - Technical Standard DOE-STD-1095-2011, Department of Energy Laboratory Accreditation for External...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... Laboratory Accreditation for External Dosimetry AGENCY: Office of Health, Safety and Security, Department of... Department) is issuing Technical Standard DOE-STD-1095-2011, Department of Energy Laboratory Accreditation... part, to determine whether to accredit dosimetry programs in accordance with the DOE Laboratory...

  20. Power, Profits, and Politics: Energy Security and Cooperation in Eurasia

    NASA Astrophysics Data System (ADS)

    Svyatets, Ekaterina

    This study explores varying outcomes of energy cooperation, defined as diplomatic relations, bilateral trade, and investment in oil and natural gas. Tests of theories pertinent to energy security - broadly speaking, realism, liberalism, and domestic politics---reveal that they alone can offer only a narrow and one-sided explanation, not embracing the complexity of energy issues. Nevertheless, using them as a starting point, this study outlined a structured framework that incorporates three variables---economic potential, geopolitical rivalry, and domestic interest groups---that are applied to the cases of U.S.-Russia, U.S.-Azerbaijan, and Russia-Germany energy ties. This study concludes that if the economic potential (defined by geographic proximity and resource availability) is very high, such as in the case of Russia-Germany, states can overcome geopolitical rivalries and historical enmities in favor of energy cooperation. However, if the economic potential is relatively low (because of geographic obstacles or easily available alternative suppliers, as in the cases of U.S.-Russia and U.S.-Azerbaijan), then geopolitics prevails---for example, to bypass Russia or to limit American access to contracts in Russia when U.S.-Russian relations are strained. In all the cases explored here, domestic interest groups have mixed influence: if they are united along energy issues, they usually successfully achieve their energy policy goals, although the impact of these groups often becomes intertwined with state interests. In other situations, when powerful interest groups are divided or focused on non-energy-related issues (such as ethnic priorities), their influence over energy deals is much lower.

  1. Biofuels in China.

    PubMed

    Tan, Tianwei; Yu, Jianliang; Lu, Jike; Zhang, Tao

    2010-01-01

    The Chinese government is stimulating the biofuels development to replace partially fossil fuels in the transport sector, which can enhance energy security, reduce greenhouse gas emissions, and stimulate rural development. Bioethanol, biodiesel, biobutanol, biogas, and biohydrogen are the main biofuels developed in China. In this chapter, we mainly present the current status of biofuel development in China, and illustrate the issues of feedstocks, food security and conversion processes.

  2. 78 FR 4879 - Nine Mile Point 3 Nuclear Project, LLC and UniStar Nuclear Operating Services, LLC Combined...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-23

    ... Analysis Report (FSAR). On December 1, 2009, UniStar Nuclear Energy (UNE), acting on behalf of the COL... Exclusion From Environmental Review With respect to the exemption's impact on the quality of the human... relation to security issues. Therefore, the common defense and security is not impacted by this exemption...

  3. Sustainable agricultural practices: energy inputs and outputs, pesticide, fertilizer and greenhouse gas management.

    PubMed

    Wang, Yue-Wen

    2009-01-01

    The food security issue was addressed by the development of "modern agriculture" in the last century. But food safety issues and environment degradation were the consequences suffered as a result. Climate change has been recognized as the result of release of stored energy in fossil fuel into the atmosphere. Homogeneous crop varieties, machinery, pesticides and fertilizers are the foundation of uniform commodities in modern agriculture. Fossil fuels are used to manufacture fertilizers and pesticides as well as the energy source for agricultural machinery, thus characterizes modern agriculture. Bio-fuel production and the possibility of the agriculture system as a form of energy input are discussed.

  4. Applications Using High Flux LCS gamma-ray Beams: Nuclear Security and Contributions to Fukushima

    NASA Astrophysics Data System (ADS)

    Fujiwara, Mamoru

    2014-09-01

    Nuclear nonproliferation and security are an important issue for the peaceful use of nuclear energy. Many countries now collaborate together for preventing serious accidents from nuclear terrorism. Detection of hidden long-lived radioisotopes and fissionable nuclides in a non-destructive manner is useful for nuclear safeguards and management of nuclear wastes as well as nuclear security. After introducing the present situation concerning the nuclear nonproliferation and security in Japan, we plan to show the present activities of JAEA to detect the hidden nuclear materials by means of the nuclear resonance fluorescence with energy-tunable, monochromatic gamma-rays generated by Laser Compton Scattering (LCS) with an electron beam. The energy recovery linac (ERL) machine is now under development with the KEK-JAEA collaboration for realizing the new generation of gamma-ray sources. The detection technologies of nuclear materials are currently developed using the existing electron beam facilities at Duke University and at NewSubaru. These developments in Japan will contribute to the nuclear security program in Japan and to the assay of melted nuclear fuels in the Fukushima Daiichi nuclear power plants.

  5. Dual mode vehicle and infrastructure alternatives analysis

    DOT National Transportation Integrated Search

    2008-04-01

    The United States has a transportation challenge that requires addressing four issues simultaneously: traffic congestion, environmental pollution, safety, and energy security. A potential solution to these transportation challenges is the concept of ...

  6. An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Simmhan, Yogesh; Kumbhare, Alok; Cao, Baohua

    2011-07-09

    Power utilities globally are increasingly upgrading to Smart Grids that use bi-directional communication with the consumer to enable an information-driven approach to distributed energy management. Clouds offer features well suited for Smart Grid software platforms and applications, such as elastic resources and shared services. However, the security and privacy concerns inherent in an information rich Smart Grid environment are further exacerbated by their deployment on Clouds. Here, we present an analysis of security and privacy issues in a Smart Grids software architecture operating on different Cloud environments, in the form of a taxonomy. We use the Los Angeles Smart Gridmore » Project that is underway in the largest U.S. municipal utility to drive this analysis that will benefit both Cloud practitioners targeting Smart Grid applications, and Cloud researchers investigating security and privacy.« less

  7. Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar

    NASA Astrophysics Data System (ADS)

    Botel, Gabriel

    This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive literature in human security rarely applied in this context. This includes a brief review of human security and Sino-Myanmar relations, and is grounded in an empirical analysis of Chinese investment in Myanmar's hydropower and oil and gas sectors. Ultimately, this thesis argues that, while insightful, many traditional interpretations of Sino-Myanmar energy cooperation overlook the security interests of those worst affected. Furthermore, that the worst excesses of Chinese companies in Myanmar are not unique to China, but common across all investors in the regime, Western or otherwise.

  8. Bio-Mimic Optimization Strategies in Wireless Sensor Networks: A Survey

    PubMed Central

    Adnan, Md. Akhtaruzzaman; Razzaque, Mohammd Abdur; Ahmed, Ishtiaque; Isnin, Ismail Fauzi

    2014-01-01

    For the past 20 years, many authors have focused their investigations on wireless sensor networks. Various issues related to wireless sensor networks such as energy minimization (optimization), compression schemes, self-organizing network algorithms, routing protocols, quality of service management, security, energy harvesting, etc., have been extensively explored. The three most important issues among these are energy efficiency, quality of service and security management. To get the best possible results in one or more of these issues in wireless sensor networks optimization is necessary. Furthermore, in number of applications (e.g., body area sensor networks, vehicular ad hoc networks) these issues might conflict and require a trade-off amongst them. Due to the high energy consumption and data processing requirements, the use of classical algorithms has historically been disregarded. In this context contemporary researchers started using bio-mimetic strategy-based optimization techniques in the field of wireless sensor networks. These techniques are diverse and involve many different optimization algorithms. As far as we know, most existing works tend to focus only on optimization of one specific issue of the three mentioned above. It is high time that these individual efforts are put into perspective and a more holistic view is taken. In this paper we take a step in that direction by presenting a survey of the literature in the area of wireless sensor network optimization concentrating especially on the three most widely used bio-mimetic algorithms, namely, particle swarm optimization, ant colony optimization and genetic algorithm. In addition, to stimulate new research and development interests in this field, open research issues, challenges and future research directions are highlighted. PMID:24368702

  9. Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium

    PubMed Central

    Somasundaram, M.; Sivakumar, R.

    2015-01-01

    Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient's life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body function records. Most of the systems on the Wireless Body Area Network are not effective in facing the security deployment issues. To access the patient's information with higher security on WBAN, Game Theory with Stackelberg Security Equilibrium (GTSSE) is proposed in this paper. GTSSE mechanism takes all the players into account. The patients are monitored by placing the power position authority initially. The position authority in GTSSE is the organizer and all the other players react to the organizer decision. Based on our proposed approach, experiment has been conducted on factors such as security ratio based on patient's health information, system flexibility level, energy consumption rate, and information loss rate. Stackelberg Security considerably improves the strength of solution with higher security. PMID:26759829

  10. Water-Energy-Food Nexus in Asia-Pacific Ring of Fire

    NASA Astrophysics Data System (ADS)

    Taniguchi, M.; Endo, A.; Gurdak, J. J.; Allen, D. M.; Siringan, F.; Delinom, R.; Shoji, J.; Fujii, M.; Baba, K.

    2013-12-01

    Climate change and economic development are causing increased pressure on water, energy and food resources, presenting communities with increased levels of tradeoffs and potential conflicts among these resources. Therefore, the water-energy-food nexus is one of the most important and fundamental global environmental issues facing the world. For the purposes of this research project, we define human-environmental security as the joint optimization between human and environmental security as well as the water-energy-food nexus. To optimize the governance and management within these inter-connected needs, it is desirable to increase human-environmental security by improving social managements for the water-energy-food nexus. In this research project, we intend to establish a method to manage and optimize the human-environmental security of the water-energy-food nexus by using integrated models, indices, and maps as well as social and natural investigations with stakeholder analyses. We base our approach on the viewpoint that it is important for a sustainable society to increase human-environmental security with decreasing risk and increasing resilience by optimizing the connections within the critical water-energy and water-food clusters. We will take a regional perspective to address these global environmental problems. The geological and geomorphological conditions in our proposed study area are heavily influenced by the so-called 'Ring of Fire,' around the Pacific Ocean. Within these areas including Japan and Southeast Asia, the hydro-meteorological conditions are dominated by the Asia monsoon. The populations that live under these natural conditions face elevated risk and potential disaster as negative impacts, while also benefitting from positive ecological goods and services. There are therefore tradeoffs and conflicts within the water-energy-food nexus, as well as among various stakeholders in the region. The objective of this project is to maximize human-environmental security (minimize the risk) by choosing management structures and policies that optimize both the water-food-energy nexus in Asia-Pacific coastal regions. We define joint security approach as optimized policy. Optimal policies will develop joint security approaches for human-environmental security in the coastal region of the Ring of Fire, including stakeholders and decision-makers.

  11. Energy technology evaluation report: Energy security

    NASA Astrophysics Data System (ADS)

    Koopman, R.; Lamont, A.; Schock, R.

    1992-09-01

    Energy security was identified in the National Energy Strategy (NES) as a major issue for the Department of Energy (DOE). As part of a process designed by the DOE to identify technologies important to implementing the NES, an expert working group was convened to consider which technologies can best contribute to reducing the nation's economic vulnerability to future disruptions of world oil supplies, the working definition of energy security. Other working groups were established to deal with economic growth, environmental quality, and technical foundations. Energy Security working group members were chosen to represent as broad a spectrum of energy supply and end-use technologies as possible and were selected for their established reputations as experienced experts with an ability to be objective. The time available for this evaluation was very short. The group evaluated technologies using criteria taken from the NES which can be summarized for energy security as follows: diversifying sources of world oil supply so as to decrease the increasing monopoly status of the Persian Gulf region; reducing the importance of oil use in the US economy to diminish the impact of future disruptions in oil supply; and increasing the preparedness of the US to deal with oil supply disruptions by having alternatives available at a known price. The result of the first phase of the evaluation process was the identification of technology groups determined to be clearly important for reducing US vulnerability to oil supply disruptions. The important technologies were mostly within the high leverage areas of oil and gas supply and transportation demand but also included hydrogen utilization, biomass, diversion resistant nuclear power, and substitute industrial feedstocks.

  12. The climate change and energy security nexus

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    King, Marcus Dubois; Gulledge, Jay

    2013-01-01

    The study of the impacts of climate change on national and interna-tional security has grown as a research field, particularly in the last five years. Within this broad field, academic scholarship has concentrated primarily on whether climate change is, or may become, a driver of violent conflict. This relationship remains highly contested. However, national security policy and many non-governmental organizations have identified climate change as a threat multiplier in conflict situations. The U.S. Department of Defense and the United Kingdom's Ministry of Defense have incorporated these findings into strategic planning documents such as the Quadrennial Defense Review and the Strategicmore » Defence and Security Review. In contrast to the climate-conflict nexus, our analysis found that academic scholarship on the climate change and energy security nexus is small and more disciplinarily focused. In fact, a search of social science litera-ture found few sources, with a significant percentage of these works attribut-able to a single journal. Assuming that policymakers are more likely to rely on broader social science literature than technical or scientific journals, this leaves a limited foundation. This then begged the question: what are these sources? We identified a body of grey literature on the nexus of climate change and energy security of a greater size than the body of peer-reviewed social science literature. We reviewed fifty-eight recent reports, issue briefs, and transcripts to better understand the nexus of climate change and energy security, as well as to gain insight about the questions policymakers need answered by those undertaking the research. In this article, we describe the nature of the sources reviewed, highlight possible climate change and energy security linkages found within those sources, identify emerging risks, and offer conclusions that can guide further research.« less

  13. The Eastring gas pipeline in the context of the Central and Eastern European gas supply challenge

    NASA Astrophysics Data System (ADS)

    Mišík, Matúš; Nosko, Andrej

    2017-11-01

    Ever since the 2009 natural gas crisis, energy security has been a crucial priority for countries of Central and Eastern Europe. Escalating in 2014, the conflict between Ukraine and Russia further fuelled negative expectations about the future development of energy relations for the region predominantly supplied by Russia. As a response to the planned cessation of gas transit through the Brotherhood pipeline, which brings Russian gas to Europe via Ukraine and Slovakia, the Slovak transmission system operator Eustream proposed the Eastring pipeline. This Perspective analyses this proposal and argues that neither the perceived decrease in Slovak energy security nor the loss of economic rent from the international gas transit should be the main policy driver behind such a major infrastructure project. Although marketed as an answer to current Central and Eastern European gas supply security challenges, the Eastring pipeline is actually mainly focused on issues connected to the Slovak gas transit.

  14. Rising India: The Political and Economic Effects on the Future of Nepal

    DTIC Science & Technology

    2010-06-11

    the international system. 36 33Namita Bhandare, ed., India: The Next Global Power? (New Delhi: Lotus ...an invasion of Nepal would inevitably threaten the safety of India. 60 58Prithvi Narayan Shah...settled issues on water rights, environmental issues, energy and food security.99 By working through SAARC, India hopes to retain its status as an

  15. 76 FR 40593 - Competitive and Noncompetitive Non-Formula Federal Assistance Programs-Administrative Provisions...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-11

    ...;Prices of new books are listed in the first FEDERAL REGISTER issue of each #0;week. #0; #0; #0; #0;#0... gasification research priorities of USDA and the Department of Energy at the State and regional levels. With... Economics. Purpose The objectives of the Sun Grant Program are to enhance national energy security through...

  16. Energy Security: Reducing Vulnerabilities to Global Energy Networks

    DTIC Science & Technology

    2009-03-01

    plug-in hybrid vehicles, promote renewable energy sources, invest in low- emission coal plants , advance technologies in bio-fuels, and begin the...Zhongyuan Petroleum Prospecting, a subsidiary of the China Petrochemical Corporation, is the primary oil firm operating in Gambella. Nigeria is the...of the global warming issues and the burning of oil, in particular, is blamed for about 42 percent of the CO2 emissions . 31 Left unchecked, the

  17. The International Atomic Energy Agency's activities in radiation medicine and cancer: promoting global health through diplomacy.

    PubMed

    Deatsch-Kratochvil, Amanda N; Pascual, Thomas Neil; Kesner, Adam; Rosenblatt, Eduardo; Chhem, Rethy K

    2013-02-01

    Global health has been an issue of seemingly low political importance in comparison with issues that have direct bearing on countries' national security. Recently, health has experienced a "political revolution" or a rise in political importance. Today, we face substantial global health challenges, from the spread of infectious disease, gaps in basic maternal and child health care, to the globalization of cancer. A recent estimate states that the "overall lifetime risk of developing cancer (both sexes) is expected to rise from more than one in three to one in two by 2015." These issues pose significant threats to international health security. To successfully combat these grave challenges, the international community must embrace and engage in global health diplomacy, defined by scholars Thomas Novotny and Vicanne Adams as a political activity aimed at improving global health, while at the same time maintaining and strengthening international relations. The IAEA (International Atomic Energy Agency) is an international organization with a unique mandate to "accelerate and enlarge the contribution of atomic energy to peace, health, and prosperity throughout the world." This article discusses global health diplomacy, reviews the IAEA's program activities in human health by focusing on radiation medicine and cancer, and the peaceful applications of atomic energy within the context of global health diplomacy. Copyright © 2013 Canadian Association of Radiologists. Published by Elsevier Inc. All rights reserved.

  18. Basic research needs to assure a secure energy future. A report from the Basic Energy Sciences Advisory Committee

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    This report has highlighted many of the possible fundamental research areas that will help our country avoid a future energy crisis. The report may not have adequately captured the atmosphere of concern that permeated the discussions at the workshop. The difficulties facing our nation and the world in meeting our energy needs over the next several decades are very challenging. It was generally felt that traditional solutions and approaches will not solve the total energy problem. Knowledge that does not exist must be obtained to address both the quantity of energy needed to increase the standard of living world-wide andmore » the quality of energy generation needed to preserve the environment. In terms of investments, it was clear that there is no single research area that will secure the future energy supply. A diverse range of economic energy sources will be required--and a broad range of fundamental research is needed to enable these. Many of the issues fall into the traditional materials and chemical sciences research areas, but with specific emphasis on understanding mechanisms, energy related phenomena, and pursuing novel directions in, for example, nanoscience and integrated modeling. An important result from the discussions, which is hopefully apparent from the brief presentations above, is that the problems that must be dealt with are truly multidisciplinary. This means that they require the participation of investigators with different skill sets. Basic science skills have to be complemented by awareness of the overall nature of the problem in a national and world context, and with knowledge of the engineering, design, and control issues in any eventual solution. It is necessary to find ways in which this can be done while still preserving the ability to do first-class basic science. The traditional structure of research, with specific disciplinary groupings, will not be sufficient. This presents great challenges and opportunities for the funders of the research that must be done. For example, the applied research programs in the DOE need a greater awareness of the user facilities and an understanding of how to use them to solve their unique problems. The discussions reinforced what all of the participants already knew: the issue of energy security is of major importance both for the U.S. and for the world. Furthermore, it is clear that major changes in the primary energy sources, in energy conversion, and in energy use, must be achieved within the next fifty years. This time scale is determined by two drivers: increasing world population and increasing expectations of that population. Much of the research and development currently being done are concerned with incremental improvements in what has been done in the immediate past; and it is necessary to take this path because improvements will be needed across the board. These advances extend the period before the radical changes have to be made; however, they will not solve the underlying, long-range problem. The Subpanel recommends that a major program be funded to conduct a multidisciplinary research program to address the issues to ensure a secure energy future for the U.S. It is necessary to recognize that this program must be ensured of a long-term stability. It is also necessary that a management and funding structure appropriate for such an approach be developed. The Department of Energy's Office of Basic Energy Sciences is well positioned to support this initiative by enhancement of their already world-class scientific research programs and user facilities.« less

  19. European Energy Policy and Its Effects on Gas Security

    NASA Astrophysics Data System (ADS)

    Radu, Victorita Stefana Anda

    The goal of this study is to examine the effects of the energy policies of the European Union (EU) on its gas security in the period 2006 to 2016. While energy security is often given a broad meaning, this paper focuses on its external dimension: the EU?s relations with external gas suppliers. It is grounded on four pillars drawing from the compounded institutionalist and liberal theoretical frameworks: regulatory state, rational-choice, external governance, and regime effectiveness. The research question was investigated through a qualitative methodology with two main components: a legislative analysis and four case studies representing the main gas supply options--Russia, North African exporting countries, Norway, and liquefied natural gas (LNG). They highlighted that the EU framed the need for gas security mainly in the context of political risks associated with Russian gas supply, but it almost never took into account other equally important risks. Moreover, the research revealed two main issues. First, that the deeper and the more numerous EU?s energy policies were, the bigger was the magnitude of the effect. Specifically, competitiveness and infrastructure policies had the largest magnitude, while the sustainability and security of supply policies had the smallest effect. Second, EU energy policies only partially diminished the economic and political risks in relation to foreign gas suppliers. To conclude, to a certain extent the EU?s efforts made a positive contribution to the external dimension of the EU?s gas security, but the distinguishing trait remains that there is no consistency in terms of the magnitude of the effect and its nature.

  20. ASEAN Standby Force: Taking Southeast Asia Security to the Next Level

    DTIC Science & Technology

    2013-03-01

    official policy or position of the Department of the Army, Department of Defense, or the U.S. Government . U.S. Army War College CARLISLE BARRACKS...regional community environment. These forums have addressed issues including the Asian financial crisis, food and energy security, human trafficking ...its policies toward China, in light of its growing economic might and military power in the Pacific.35 In China, the government welcomed Mr. Obama’s

  1. Training and information technology issue, 2005

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Agnihotri, Newal

    The focus of the May-June issue is on training and information technology. Major articles/reports in this issue include: Communicating effectively, by Alain Bucaille, AREVA; Reputation management, by Susan Brisset, Bruce Power; Contol room and HSI modernization guidance, by Joseph Naser, EPRI; How far are we from public acceptance, by Jennifer A. Biedscheid and Murthy Devarakonda, Washington TRU Solutions LLC; Spent fuel management options, by Brent W. Dixon and Steven J. Piet, Idaho National Laboratory; Industry Awards; A secure energy future for America, by George W. Bush, President, United States of America; Vision of the future of nuclear energy, by Annemore » Lauvergeon, AREVA; and, Plant profile: strategy for transition to digital, TXU Power.« less

  2. Ukraine’s Defense Dilemma

    DTIC Science & Technology

    1992-08-25

    Ukraine has made environmental issues a top priority in any national security equation. The Chernobyl disaster of April 1986 is estimated to have...investment in Ukraine and in other former Soviet republics may be jeopardized by another environmental disaster of Chernobyl proportions. As an energy...adequate nuclear plants nor ailternative energy sources beyond coal to substitute for nuclear generated electricity. Some 16 Chernobyl -type graphite

  3. Tooth-to-Tail Greening: Energy and Climate Leadership and Policy Change at the Department of Defense

    DTIC Science & Technology

    2016-10-24

    66 Tooth-to-Tail Greening Energy and Climate Leadership and Policy Change at the Department of Defense Rebecca Pincus Abstract: For decades, the...awareness of climate change emerged at the end of the twentieth century, this environmental concern was added to such longstanding issues as...therefore more likely to effect institutional change . Keywords: climate , energy, carbon footprint, security, military, green fleet, or- ganizational culture

  4. Metering Best Practices, A Guide to Achieving Utility Resource Efficiency, Release 2.0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sullivan, Greg; Hunt, W. D.; Pugh, Ray

    2011-08-31

    This release is an update and expansion of the information provided in Release 1.0 of the Metering Best Practice Guide that was issued in October 2007. This release, as was the previous release, was developed under the direction of the U.S. Department of Energy's Federal Energy Management Program (FEMP). The mission of FEMP is to facilitate the Federal Government's implementation of sound cost-effective energy management and investment practices to enhance the nation's energy security and environmental stewardship. Each of these activities is directly related to achieving requirements set forth in the Energy Policy Acts of 1992 and 2005, the Energymore » Independence and Security Act (EISA) of 2007, and the goals that have been established in Executive Orders 13423 and 13514 - and also those practices that are inherent in sound management of Federal financial and personnel resources.« less

  5. 10 CFR 709.15 - Processing counterintelligence evaluation results.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Processing counterintelligence evaluation results. 709.15... and Protection of National Security § 709.15 Processing counterintelligence evaluation results. (a) If... are significant unresolved issues, not exclusively related to polygraph examination results...

  6. 10 CFR 709.15 - Processing counterintelligence evaluation results.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Processing counterintelligence evaluation results. 709.15... and Protection of National Security § 709.15 Processing counterintelligence evaluation results. (a) If... are significant unresolved issues, not exclusively related to polygraph examination results...

  7. 10 CFR 709.15 - Processing counterintelligence evaluation results.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Processing counterintelligence evaluation results. 709.15... and Protection of National Security § 709.15 Processing counterintelligence evaluation results. (a) If... are significant unresolved issues, not exclusively related to polygraph examination results...

  8. Engineering cyanobacteria for fuels and chemicals production.

    PubMed

    Zhou, Jie; Li, Yin

    2010-03-01

    The world's energy and global warming crises call for sustainable, renewable, carbon-neutral alternatives to replace fossil fuel resources. Currently, most biofuels are produced from agricultural crops and residues, which lead to concerns about food security and land shortage. Compared to the current biofuel production system, cyanobacteria, as autotrophic prokaryotes, do not require arable land and can grow to high densities by efficiently using solar energy, CO(2), water, and inorganic nutrients. Moreover, powerful genetic techniques of cyanobacteria have been developed. For these reasons, cyanobacteria, which carry out oxygenic photosynthesis, are attractive hosts for production of fuels and chemicals. Recently, several chemicals including ethanol, isobutanol and isoprene have been produced by engineered cyanobacteria directly using solar energy, CO(2), and water. Cyanobacterium is therefore a potential novel cell factory for fuels and chemicals production to address global energy security and climate change issues.

  9. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greenberg, Raymond; Wright, Kyle A.; McCaw, Erica E.

    The Global Threat Reduction Initiative (GTRI) reduces and protects vulnerable nuclear and radiological material located at civilian sites worldwide. Internationally, over 40 countries are cooperating with GTRI to enhance the security of these materials. The GTRI program has worked successfully with foreign countries to remove and protect nuclear and radioactive materials, including orphaned and disused high-activity sources. GTRI began cooperation with the Republic of Colombia in April 2004. This cooperation has been a resounding success by securing forty high-risk sites, consolidating disused/orphan sources at an interim secure national storage facility, and developing a comprehensive approach to security, training, and sustainability.more » In 2005 the Colombian Ministry of Mines and Energy requested the Department of Energy’s support in the construction of a new Central Storage Facility (CSF). In December 2005, the Ministry selected to construct this facility at the Institute of Geology and Mining (Ingeominas) site in Bogota. This site already served as Colombia’s national repository, where disused sources were housed in various buildings around the complex. The CSF project was placed under contract in May 2006, but environmental issues and public protests, which led to a class action lawsuit against the Colombian Government, forced the Ministry to quickly suspend activities, thereby placing the project in jeopardy. Despite these challenges, however, the Ministry of Mines and Energy worked closely with public and environmental authorities to resolve these issues, and continued to be a strong advocate of the GTRI program. In June 2008, the Ministry of Mines and Energy was granted the construction and environmental licenses. As a result, construction immediately resumed and the CSF was completed by December 2008. A commissioning ceremony was held for the new facility in January 2009, which was attended by representatives from the Department of Energy, U.S. Embassy, and the Ministry of Mines and Energy, including the Minister and Vice Minister.« less

  10. Multilateral, regional and bilateral energy trade governance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leal-Arcas, Rafael; Grasso, Costantino; Rios, Juan Alemany

    The current international energy trade governance system is fragmented and multi-layered. Streamlining it for greater legal cohesiveness and international political and economic cooperation would promote global energy security. The current article explores three levels of energy trade governance: multilateral, regional and bilateral. Most energy-rich countries are part of the multilateral trading system, which is institutionalized by the World Trade Organization (WTO). The article analyzes the multilateral energy trade governance system by focusing on the WTO and energy transportation issues. Regionally, the article focuses on five major regional agreements and their energy-related aspects and examines the various causes that explain themore » proliferation of regional trade agreements, their compatibility with WTO law, and then provides several examples of regional energy trade governance throughout the world. When it comes to bilateral energy trade governance, this article only addresses the European Union’s (EU) bilateral energy trade relations. The article explores ways in which gaps could be filled and overlaps eliminated whilst remaining true to the high-level normative framework, concentrating on those measures that would enhance EU energy security.« less

  11. Security Vulnerability Profiles of NASA Mission Software: Empirical Analysis of Security Related Bug Reports

    NASA Technical Reports Server (NTRS)

    Goseva-Popstojanova, Katerina; Tyo, Jacob P.; Sizemore, Brian

    2017-01-01

    NASA develops, runs, and maintains software systems for which security is of vital importance. Therefore, it is becoming an imperative to develop secure systems and extend the current software assurance capabilities to cover information assurance and cybersecurity concerns of NASA missions. The results presented in this report are based on the information provided in the issue tracking systems of one ground mission and one flight mission. The extracted data were used to create three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified the software bugs that are security related and classified them in specific security classes. This information was then used to create the security vulnerability profiles (i.e., to determine how, why, where, and when the security vulnerabilities were introduced) and explore the existence of common trends. The main findings of our work include:- Code related security issues dominated both the Ground and Flight mission IVV security issues, with 95 and 92, respectively. Therefore, enforcing secure coding practices and verification and validation focused on coding errors would be cost effective ways to improve mission's security. (Flight mission Developers issues dataset did not contain data in the Issue Category.)- In both the Ground and Flight mission IVV issues datasets, the majority of security issues (i.e., 91 and 85, respectively) were introduced in the Implementation phase. In most cases, the phase in which the issues were found was the same as the phase in which they were introduced. The most security related issues of the Flight mission Developers issues dataset were found during Code Implementation, Build Integration, and Build Verification; the data on the phase in which these issues were introduced were not available for this dataset.- The location of security related issues, as the location of software issues in general, followed the Pareto principle. Specifically, for all three datasets, from 86 to 88 the security related issues were located in two to four subsystems.- The severity levels of most security issues were moderate, in all three datasets.- Out of 21 primary security classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, these classes contributed from around 80 to 90 of all security issues in each dataset. This again proves the Pareto principle of uneven distribution of security issues, in this case across CWE classes, and supports the fact that addressing these dominant security classes provides the most cost efficient way to improve missions' security. The findings presented in this report uncovered the security vulnerability profiles and identified the common trends and dominant classes of security issues, which in turn can be used to select the most efficient secure design and coding best practices compiled by the part of the SARP project team associated with the NASA's Johnson Space Center. In addition, these findings provide valuable input to the NASA IVV initiative aimed at identification of the two 25 CWEs of ground and flight missions.

  12. A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network.

    PubMed

    Pirbhulal, Sandeep; Zhang, Heye; E Alahi, Md Eshrat; Ghayvat, Hemant; Mukhopadhyay, Subhas Chandra; Zhang, Yuan-Ting; Wu, Wanqing

    2016-12-30

    Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods.

  13. A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network

    PubMed Central

    Pirbhulal, Sandeep; Zhang, Heye; E Alahi, Md Eshrat; Ghayvat, Hemant; Mukhopadhyay, Subhas Chandra; Zhang, Yuan-Ting; Wu, Wanqing

    2016-01-01

    Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods. PMID:28042831

  14. Development of national standards related to the integrated safety and security of high-rise buildings

    NASA Astrophysics Data System (ADS)

    Voskresenskaya, Elena; Vorona-Slivinskaya, Lubov

    2018-03-01

    The article considers the issues of developing national standards for high-rise construction. The system of standards should provide industrial, operational, economic and terrorist safety of high-rise buildings and facilities. Modern standards of high-rise construction should set the rules for designing engineering systems of high-rise buildings, which will ensure the integrated security of buildings, increase their energy efficiency and reduce the consumption of resources in construction and operation.

  15. The 21st Century Challenges and the Food-Energy-Water-Security (FEWS) Nexus in the Middle East Region

    NASA Astrophysics Data System (ADS)

    Moradkhani, H.; Hameed, M.

    2017-12-01

    Developing countries have experienced crucial conditions in meeting the needs for food, energy, and water security. This paper presents a country-level quantitative assessment of the current issues associated with the Food-Energy-Water-Security (FEWS) Nexus in the Middle East region. In this study, sixteen countries in the Middle East region are chosen, namely, Arabian Peninsula, Iran, Syria, Lebanon, Israel, Palestine, Egypt, and Turkey. The most recent datasets are used to study and analyze the factors that have emerged the demand to understand and manage the linkage of FEW systems in the region. Water scarcity, extreme events, population growth, urbanization, economic growth, poverty, and political stability are found to be the key drivers of the current challenges in the Middle East region. Additionally, the results suggest that these factors have created a subsequent stress on FEW resources specifically on water sector in the region. Therefore, more attention is required to sustain the FEW resources and cope with the socio-economic development.

  16. Sandia National Laboratories focus issue: introduction.

    PubMed

    Boye, Robert

    2014-08-20

    For more than six decades, Sandia has provided the critical science and technology to address the nation's most challenging issues. Our original nuclear weapons mission has been complemented with work in defense systems, energy and climate, as well as international and homeland security. Our vision is to be a premier science and engineering laboratory for technology solutions to the most challenging problems that threaten peace and freedom for our nation and the globe.

  17. Russian Political, Economic, and Security Issues and U.S. Interests

    DTIC Science & Technology

    2014-03-05

    tourism , health resorts, energy and mining, and light industry. It also calls for encouraging ethnic Russians to resettle in the area. The strategy... tourism industry, terrorist designations, and preparations for the Sochi Olympics. Additional BPC activity in counter- terrorism included several joint...recognize Kosovo’s independence; cut off or reduced energy supplies in disputes with Ukraine and Belarus; boosted ties with Cuba and Venezuela; and

  18. A secure cluster-based multipath routing protocol for WMSNs.

    PubMed

    Almalkawi, Islam T; Zapata, Manel Guerrero; Al-Karaki, Jamal N

    2011-01-01

    The new characteristics of Wireless Multimedia Sensor Network (WMSN) and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images) as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature) in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption.

  19. A Secure Cluster-Based Multipath Routing Protocol for WMSNs

    PubMed Central

    Almalkawi, Islam T.; Zapata, Manel Guerrero; Al-Karaki, Jamal N.

    2011-01-01

    The new characteristics of Wireless Multimedia Sensor Network (WMSN) and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images) as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature) in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption. PMID:22163854

  20. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  1. Virtual special issue on catalysis at the U.S. Department of Energy's National Laboratories

    DOE PAGES

    Pruski, Marek; Sadow, Aaron D.; Slowing, Igor I.; ...

    2016-04-21

    Here the catalysis research at the U.S. Department of Energy's (DOE's) National Laboratories covers a wide range of research topics in heterogeneous catalysis, homogeneous/molecular catalysis, biocatalysis, electrocatalysis, and surface science. Since much of the work at National Laboratories is funded by DOE, the research is largely focused on addressing DOE's mission to ensure America's security and prosperity by addressing its energy, environmental, and nuclear challenges through transformative science and technology solutions.

  2. Global drivers, sustainable manufacturing and systems ergonomics.

    PubMed

    Siemieniuch, C E; Sinclair, M A; Henshaw, M J deC

    2015-11-01

    This paper briefly explores the expected impact of the 'Global Drivers' (such as population demographics, food security; energy security; community security and safety), and the role of sustainability engineering in mitigating the potential effects of these Global Drivers. The message of the paper is that sustainability requires a significant input from Ergonomics/Human Factors, but the profession needs some expansion in its thinking in order to make this contribution. Creating a future sustainable world in which people experience an acceptable way of life will not happen without a large input from manufacturing industry into all the Global Drivers, both in delivering products that meet sustainability criteria (such as durability, reliability, minimised material requirement and low energy consumption), and in developing sustainable processes to deliver products for sustainability (such as minimum waste, minimum emissions and low energy consumption). Appropriate changes are already being implemented in manufacturing industry, including new business models, new jobs and new skills. Considerable high-level planning around the world is in progress and is bringing about these changes; for example, there is the US 'Advanced Manufacturing National Program' (AMNP)', the German 'Industrie 4.0' plan, the French plan 'la nouvelle France industrielle' and the UK Foresight publications on the 'Future of Manufacturing'. All of these activities recognise the central part that humans will continue to play in the new manufacturing paradigms; however, they do not discuss many of the issues that systems ergonomics professionals acknowledge. This paper discusses a number of these issues, highlighting the need for some new thinking and knowledge capture by systems ergonomics professionals. Among these are ethical issues, job content and skills issues. Towards the end, there is a summary of knowledge extensions considered necessary in order that systems ergonomists can be fully effective in this new environment, together with suggestions for the means to acquire and disseminate the knowledge extensions. Copyright © 2015 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  3. A framework for the analysis of the security of supply of utilising carbon dioxide as a chemical feedstock.

    PubMed

    Fraga, Eric S; Ng, Melvin

    2015-01-01

    Recent developments in catalysts have enhanced the potential for the utilisation of carbon dioxide as a chemical feedstock. Using the appropriate energy efficient catalyst enables a range of chemical pathways leading to desirable products. In doing so, CO2 provides an economically and environmentally beneficial source of C1 feedstock, while improving the issues relating to security of supply that are associated with fossil-based feedstocks. However, the dependence on catalysts brings other supply chains into consideration, supply chains that may also have security of supply issues. The choice of chemical pathways for specific products will therefore entail an assessment not only of economic factors but also the security of supply issues for the catalysts. This is a multi-criteria decision making problem. In this paper, we present a modified 4A framework based on the framework suggested by the Asian Pacific Energy Research centre for macro-economic applications. The 4A methodology is named after the criteria used to compare alternatives: availability, acceptability, applicability and affordability. We have adapted this framework for the consideration of alternative chemical reaction processes using a micro-economic outlook. Data from a number of sources were collected and used to quantify each of the 4A criteria. A graphical representation of the assessments is used to support the decision maker in comparing alternatives. The framework not only allows for the comparison of processes but also highlights current limitations in the CCU processes. The framework presented can be used by a variety of stakeholders, including regulators, investors, and process industries, with the aim of identifying promising routes within a broader multi-criteria decision making process.

  4. Biofuels: Report to Congress

    EPA Science Inventory

    Section 204 of the Energy Independence and Security Act of 2007 (EISA 2007) requires EPA to assess and report to Congress on the impacts to date and likely future impacts of the increased use of biofuels as required by the Clean Air Act, section 211(0). Environmental issues (...

  5. Security and health research databases: the stakeholders and questions to be addressed.

    PubMed

    Stewart, Sara

    2006-01-01

    Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding security methods and technologies.

  6. Secure and Time-Aware Communication of Wireless Sensors Monitoring Overhead Transmission Lines.

    PubMed

    Mazur, Katarzyna; Wydra, Michal; Ksiezopolski, Bogdan

    2017-07-11

    Existing transmission power grids suffer from high maintenance costs and scalability issues along with a lack of effective and secure system monitoring. To address these problems, we propose to use Wireless Sensor Networks (WSNs) as a technology to achieve energy efficient, reliable, and low-cost remote monitoring of transmission grids. With WSNs, smart grid enables both utilities and customers to monitor, predict and manage energy usage effectively and react to possible power grid disturbances in a timely manner. However, the increased application of WSNs also introduces new security challenges, especially related to privacy, connectivity, and security management, repeatedly causing unpredicted expenditures. Monitoring the status of the power system, a large amount of sensors generates massive amount of sensitive data. In order to build an effective Wireless Sensor Network (WSN) for a smart grid, we focus on designing a methodology of efficient and secure delivery of the data measured on transmission lines. We perform a set of simulations, in which we examine different routing algorithms, security mechanisms and WSN deployments in order to select the parameters that will not affect the delivery time but fulfill their role and ensure security at the same time. Furthermore, we analyze the optimal placement of direct wireless links, aiming at minimizing time delays, balancing network performance and decreasing deployment costs.

  7. Secure and Time-Aware Communication of Wireless Sensors Monitoring Overhead Transmission Lines

    PubMed Central

    Mazur, Katarzyna; Wydra, Michal; Ksiezopolski, Bogdan

    2017-01-01

    Existing transmission power grids suffer from high maintenance costs and scalability issues along with a lack of effective and secure system monitoring. To address these problems, we propose to use Wireless Sensor Networks (WSNs)as a technology to achieve energy efficient, reliable, and low-cost remote monitoring of transmission grids. With WSNs, smart grid enables both utilities and customers to monitor, predict and manage energy usage effectively and react to possible power grid disturbances in a timely manner. However, the increased application of WSNs also introduces new security challenges, especially related to privacy, connectivity, and security management, repeatedly causing unpredicted expenditures. Monitoring the status of the power system, a large amount of sensors generates massive amount of sensitive data. In order to build an effective Wireless Sensor Networks (WSNs) for a smart grid, we focus on designing a methodology of efficient and secure delivery of the data measured on transmission lines. We perform a set of simulations, in which we examine different routing algorithms, security mechanisms and WSN deployments in order to select the parameters that will not affect the delivery time but fulfill their role and ensure security at the same time. Furthermore, we analyze the optimal placement of direct wireless links, aiming at minimizing time delays, balancing network performance and decreasing deployment costs. PMID:28696390

  8. Medicaid Issues in Family Welfare and Nursing Home Reform. Including H.R. 2270, a Bill To Amend Title XIX of the Social Security Act To Change the Medicaid Requirements for Nursing Facilities Based on Recommendations of the Institute of Medicine of the National Academy of Sciences. Hearings before the Subcommittee on Health and the Environment of the Committee on Energy and Commerce, House of Representatives, One Hundredth Congress, First Session (April 24 and May 12, 1987).

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. House Committee on Energy and Commerce.

    Two hearings held a month apart examine major issues concerning Medicaid benefits in family welfare and nursing home reform. The first set of hearings discusses the proposed Family Welfare Reform Act of 1987 (H.R. 1720), which is intended to replace the Aid to Families with Dependent Children (AFDC) program of the Social Security Act Title IV.…

  9. Price-Based Acquisition. Issues and Challenges for Defense Department Procurement of Weapon Systems

    DTIC Science & Technology

    2005-01-01

    government without excess non- value -added work. Again, however, the central issue is how can DoD determine whether the price is fair and reasonable without a...document THE ARTS CHILD POLICY CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND...contracting and to providing incentives for contractors so as to achieve the best value in defense procurement. iv Price-Based Acquisition This

  10. Access to primary energy sources - the basis of national energy security

    NASA Astrophysics Data System (ADS)

    Szlązak, Jan; Szlązak, Rafał A.

    2017-11-01

    National energy security is of fundamental importance for economic development of a country. To ensure such safety energy raw material, also called primary energy sources, are necessary. Currently in Poland primary energy sources include mainly fossil fuels, such as hard coal, brown coal, natural gas and crude oil. Other sources, e.g. renewable energy sources account for c. 15% in the energy mix. Primary energy sources are used to produce mainly electricity, which is considered as the cleanest form of energy. Poland does not have, unfortunately, sufficient energy sources and is forced to import some of them, mainly natural gas and crude oil. The article presents an insightful analysis of energy raw material reserves possessed by Poland and their structure taking account of the requirements applicable in the European Union, in particular, those related to environmental protection. The article also describes demand for electricity now and in the perspective of 2030. Primary energy sources necessary for its production have also been given. The article also includes the possibilities for the use of renewable energy sources in Poland, however, climatic conditions there are not are not particularly favourable to it. All the issues addressed in the article are summed up and ended with conclusions.

  11. 78 FR 78338 - Japan-U.S. Decommissioning and Remediation Fukushima Recovery Forum Tokyo, Japan February 18-19...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-26

    ... nuclear energy research and development, the decommissioning of the Fukushima Dai-ichi Nuclear Power Station, environmental management, emergency management, nuclear security, and safety and regulatory issues. The Decommissioning and Environmental Management Working Group (DEMWG) under the Bilateral...

  12. 6 CFR 27.203 - Calculating the screening threshold quantity by security issue.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE... the screening threshold quantity by security issue. (a) General. In calculating whether a facility...

  13. Report on the first Quadrennial Technology Review (QTR)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2011-09-30

    Access to clean, affordable, secure, and reliable energy has been a cornerstone of America’s economic growth. The Nation’s systems that produce, store, transmit, and use energy are falling short of U.S. needs. Maintaining energy security, bolstering U.S. competitiveness, and mitigating the environmental impacts of energy are long-­standing challenges. Governments, consumers, and the private sector have worked for decades to address these challenges, yet they remain among the Nation’s most pressing issues. President Obama has articulated broad national energy goals for reducing U.S. dependence on oil, reducing pollution, and investing in research and development (R&D) for clean-­energy technologies in the Unitedmore » States to create jobs. These include: Reducing oil imports by one-third by 2025; Supporting the deployment of 1 million electric vehicles on the road by 2015; Making non-residential buildings 20% more energy efficient by 2020; Deriving 80% of America's electricity from clean-energy sources by 2035; and Reducing greenhouse gas emissions by 175 by 2020 and 83% of 2050, from a 2005 baseline.« less

  14. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.

    PubMed

    Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang

    2015-09-25

    Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  15. ADVANCED CERAMIC MATERIALS FOR NEXT-GENERATION NUCLEAR APPLICATIONS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Marra, J.

    2010-09-29

    Rising global energy demands coupled with increased environmental concerns point to one solution; they must reduce their dependence on fossil fuels that emit greenhouse gases. As the global community faces the challenge of maintaining sovereign nation security, reducing greenhouse gases, and addressing climate change nuclear power will play a significant and likely growing role. In the US, nuclear energy already provides approximately one-fifth of the electricity used to power factories, offices, homes, and schools with 104 operating nuclear power plants, located at 65 sites in 31 states. Additionally, 19 utilities have applied to the US Nuclear Regulatory Commission (NRC) formore » construction and operating licenses for 26 new reactors at 17 sites. This planned growth of nuclear power is occurring worldwide and has been termed the 'nuclear renaissance.' As major industrial nations craft their energy future, there are several important factors that must be considered about nuclear energy: (1) it has been proven over the last 40 years to be safe, reliable and affordable (good for Economic Security); (2) its technology and fuel can be domestically produced or obtained from allied nations (good for Energy Security); and (3) it is nearly free of greenhouse gas emissions (good for Environmental Security). Already an important part of worldwide energy security via electricity generation, nuclear energy can also potentially play an important role in industrial processes and supporting the nation's transportation sector. Coal-to-liquid processes, the generation of hydrogen and supporting the growing potential for a greatly increased electric transportation system (i.e. cars and trains) mean that nuclear energy could see dramatic growth in the near future as we seek to meet our growing demand for energy in cleaner, more secure ways. In order to address some of the prominent issues associated with nuclear power generation (i.e., high capital costs, waste management, and proliferation), the worldwide community is working to develop and deploy new nuclear energy systems and advanced fuel cycles. These new nuclear systems address the key challenges and include: (1) extracting the full energy value of the nuclear fuel; (2) creating waste solutions with improved long term safety; (3) minimizing the potential for the misuse of the technology and materials for weapons; (4) continually improving the safety of nuclear energy systems; and (5) keeping the cost of energy affordable.« less

  16. Energy Conversion in Natural and Artificial Photosynthesis

    PubMed Central

    McConnell, Iain; Li, Gonghu; Brudvig, Gary W.

    2010-01-01

    Summary Modern civilization is dependent upon fossil fuels, a nonrenewable energy source originally provided by the storage of solar energy. Fossil fuel dependence has severe consequences including energy security issues and greenhouse gas emissions. The consequences of fossil fuel dependence could be avoided by fuel-producing artificial systems that mimic natural photosynthesis, directly converting solar energy to fuel. This review describes the three key components of solar energy conversion in photosynthesis: light harvesting, charge separation, and catalysis. These processes are compared in natural and artificial systems. Such a comparison can assist in understanding the general principles of photosynthesis and in developing working devices including photoelectrochemical cells for solar energy conversion. PMID:20534342

  17. 18 CFR 367.1240 - Account 124, Other investments.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... investments. 367.1240 Section 367.1240 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY... ACT Balance Sheet Chart of Accounts Other Property and Investments § 367.1240 Account 124, Other investments. (a) This account must include the book cost of investments in securities issued or assumed by non...

  18. U.S., Soviets Face Common Science Problems.

    ERIC Educational Resources Information Center

    Lepkowski, Wil

    1981-01-01

    Summarizes recent findings reported in a two-volume publication, "Science Policy: USA/USSR," issued by the National Science Foundation. Volumes I and II review U.S. and Soviet science policy in research and development, respectively. Comparisons are made concerning common problems around energy, environment, and the meaning of security.…

  19. Efficient security mechanisms for mHealth applications using wireless body sensor networks.

    PubMed

    Sahoo, Prasan Kumar

    2012-01-01

    Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme.

  20. Efficient Security Mechanisms for mHealth Applications Using Wireless Body Sensor Networks

    PubMed Central

    Sahoo, Prasan Kumar

    2012-01-01

    Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme. PMID:23112734

  1. Maritime security report number 3. September 1996 [U.S. Coast Guard issues passenger vessel and terminal security inspection regulations; international perspectives on maritime security; first Inter-American course on port security

    DOT National Transportation Integrated Search

    1996-09-01

    While most issues of the Maritime Security Report deal with the security situation in geographic area, the articles in this issue deal with publications, training courses, and policy developments which contribute to deterring opportunities for crimin...

  2. Emerging Regional Energy Security Issues China

    DTIC Science & Technology

    2009-09-29

    moving toward European standards and taxation of least efficient vehicles www.csis.org | 7 China’s Energy Strategy - Clean Power Generation...Project Type of Contract Signature Date Estimated Value Contractor(s) Remarks Malaysian Amona (Main Contractor), Chinese COSL and CNOOC The first...infrastructure. List of Upstream Agreements Between Iran and China in Recent Years ** The original buyback contract w as signed betw een Malaysian Amona and

  3. Re-Examining first principles of regulation: NRG power marketing, LLC v. Maine public utilities Commission

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Haskell, Mark R.

    Maine PUC and Morgan Stanley have resolved some of the key issues facing the energy industry. The Supreme Court has plainly and directly in both cases reaffirmed the central role that private contracts play in the energy industry and set terms to balance the need to secure long-term investment with the public interest that lies at the heart of the Federal Power Act. (author)

  4. Preface: photosynthesis and hydrogen energy research for sustainability.

    PubMed

    Tomo, Tatsuya; Allakhverdiev, Suleyman I

    2017-09-01

    Energy supply, climate change, and global food security are among the main chalenges facing humanity in the twenty-first century. Despite global energy demand is continuing to increase, the availability of low cost energy is decreasing. Together with the urgent problem of climate change due to CO 2 release from the combustion of fossil fuels, there is a strong requirement of developing the clean and renewable energy system for the hydrogen production. Solar fuel, biofuel, and hydrogen energy production gained unlimited possibility and feasibility due to understanding of the detailed photosynthetic system structures. This special issue contains selected papers on photosynthetic and biomimetic hydrogen production presented at the International Conference "Photosynthesis Research for Sustainability-2016", that was held in Pushchino (Russia), during June 19-25, 2016, with the sponsorship of the International Society of Photosynthesis Research (ISPR) and of the International Association for Hydrogen Energy (IAHE). This issue is intended to provide recent information on the photosynthetic and biohydrogen production to our readers.

  5. Variation in beliefs about ‘fracking’ between the UK and US

    NASA Astrophysics Data System (ADS)

    Evensen, Darrick; Stedman, Richard; O'Hara, Sarah; Humphrey, Mathew; Andersson-Hudson, Jessica

    2017-12-01

    In decision-making on the politically-contentious issue of unconventional gas development, the UK Government and European Commission are attempting to learn from the US experience. Although economic, environmental, and health impacts and regulatory contexts have been compared cross-nationally, public perceptions and their antecedents have not. We conducted similar online panel surveys of national samples of UK and US residents simultaneously in September 2014 to compare public perceptions and beliefs affecting such perceptions. The US sample was more likely to associate positive impacts with development (i.e. production of clean energy, cheap energy, and advancing national energy security). The UK sample was more likely to associate negative impacts (i.e. water contamination, higher carbon emissions, and earthquakes). Multivariate analyses reveal divergence cross-nationally in the relationship between beliefs about impacts and support/opposition—especially for beliefs about energy security. People who associated shale gas development with increased energy security in the UK were over three times more likely to support development than people in the US with this same belief. We conclude with implications for policy and communication, discussing communication approaches that could be successful cross-nationally and policy foci to which the UK might need to afford more attention in its continually evolving regulatory environment.

  6. Valuating Indonesian upstream oil management scenario through system dynamics modelling

    NASA Astrophysics Data System (ADS)

    Ketut Gunarta, I.; Putri, F. A.

    2018-04-01

    Under the existing regulation in Constitution Number 22 Year 2001 (UU No 22 Tahun 2001), Production Sharing Contract (PSC) continues to be the scenario in conducting oil and gas upstream mining activities as the previous regulation (UU No. 8 Tahun 1971). Because of the high costs and risks in upstream mining activities, the contractors are dominated by foreign companies, meanwhile National Oil Company (NOC) doesn’t act much. The domination of foreign contractor companies also warned Indonesia in several issues addressing to energy independence and energy security. Therefore, to achieve the goals of energy which is independence and security, there need to be a revision in upstream oil activities regulating scenario. The scenarios will be comparing the current scenario, which is PSC, with the “full concession” scenario for National Oil Company (NOC) in managing oil upstream mining activities. Both scenario will be modelled using System Dynamics methodology and assessed furthermore using financial valuation method of income approach. Under the 2 scenarios, the author will compare which scenario is better for upstream oil management in reaching the goals mentioned before and more profitable in financial aspect. From the simulation, it is gathered that concession scenario offers better option than PSC in reaching energy independence and energy security.

  7. Non-proliferation, safeguards, and security for the fissile materials disposition program immobilization alternatives

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Duggan, R.A.; Jaeger, C.D.; Tolk, K.M.

    1996-05-01

    The Department of Energy is analyzing long-term storage and disposition alternatives for surplus weapons-usable fissile materials. A number of different disposition alternatives are being considered. These include facilities for storage, conversion and stabilization of fissile materials, immobilization in glass or ceramic material, fabrication of fissile material into mixed oxide (MOX) fuel for reactors, use of reactor based technologies to convert material into spent fuel, and disposal of fissile material using geologic alternatives. This paper will focus on how the objectives of reducing security and proliferation risks are being considered, and the possible facility impacts. Some of the areas discussed inmore » this paper include: (1) domestic and international safeguards requirements, (2) non-proliferation criteria and measures, (3) the threats, and (4) potential proliferation, safeguards, and security issues and impacts on the facilities. Issues applicable to all of the possible disposition alternatives will be discussed in this paper. However, particular attention is given to the plutonium immobilization alternatives.« less

  8. Incentive Issues in Information Security Management

    ERIC Educational Resources Information Center

    Lee, Chul Ho

    2012-01-01

    This dissertation studies three incentive issues in information security management. The first essay studies contract issues between a firm that outsources security functions and a managed security service provider (MSSP) that provides security functions to the firm. Since MSSP and firms cannot observe each other's actions, both can suffer…

  9. Security, protection, and control of power systems with large-scale wind power penetration

    NASA Astrophysics Data System (ADS)

    Acharya, Naresh

    As the number of wind generation facilities in the utility system is fast increasing, many issues associated with their integration into the power system are beginning to emerge. Of the various issues, this dissertation deals with the development of new concepts and computational methods to handle the transmission issues and voltage issues caused by large-scale integration of wind turbines. This dissertation also formulates a probabilistic framework for the steady-state security assessment of wind power incorporating the forecast uncertainty and correlation. Transmission issues are mainly related to the overloading of transmission lines, when all the wind power generated cannot be delivered in full due to prior outage conditions. To deal with this problem, a method to curtail the wind turbine outputs through Energy Management System facilities in the on-line operational environment is proposed. The proposed method, which is based on linear optimization, sends the calculated control signals via the Supervisory Control and Data Acquisition system to wind farm controllers. The necessary ramping of the wind farm outputs is implemented either by the appropriate blade pitch angle control at the turbine level or by switching a certain number of turbines. The curtailment strategy is tested with an equivalent system model of MidAmerican Energy Company. The results show that the line overload in high wind areas can be alleviated by controlling the outputs of the wind farms step-by-step over an allowable period of time. A low voltage event during a system fault can cause a large number of wind turbines to trip, depending on voltages at the wind turbine terminals during the fault and the under-voltage protection setting of wind turbines. As a result, an N-1 contingency may evolve into an N-(K+1) contingency, where K is the number of wind farms tripped due to low voltage conditions. Losing a large amount of wind power following a line contingency might lead to system instabilities. It is important for the system operator to be aware of such limiting events during system operation and be prepared to take proper control actions. This can be achieved by incorporating the wind farm tripping status for each contingency as part of the static security assessment. A methodology to calculate voltages at the wind farm buses during a worst case line fault is proposed, which, along with the protection settings of wind turbines, can be used to determine the tripping of wind farms. The proposed algorithm is implemented in MATLAB and tested with MidAmerican Energy reduced network. The result shows that a large amount of wind capacity can be tripped due to a fault in the lines. Therefore, the technique will find its application in the static security assessment where each line fault can be associated with the tripping of wind farms as determined from the proposed method. A probabilistic framework to handle the uncertainty in day-ahead forecast error in order to correctly assess the steady-state security of the power system is presented. Stochastic simulations are conducted by means of Latin hypercube sampling along with the consideration of correlations. The correlation is calculated from the historical distribution of wind power forecast errors. The results from the deterministic simulation based on point forecast and the stochastic simulation show that security assessment based solely on deterministic simulations can lead to incorrect assessment of system security. With stochastic simulations, each outcome can be assigned a probability and the decision regarding control actions can be made based on the associated probability.

  10. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-06-08

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  11. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-01-01

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382

  12. Nuclear security and radiological preparedness for the olympic games, athens 2004: lessons learned for organizing major public events.

    PubMed

    Kamenopoulou, Vassiliki; Dimitriou, Panayiotis; Hourdakis, Constantine J; Maltezos, Antonios; Matikas, Theodore; Potiriadis, Constantinos; Camarinopoulos, Leonidas

    2006-10-01

    In light of the exceptional circumstances that arose from hosting the Olympic Games in Athens in 2004 and from recent terrorist events internationally, Greece attributes the highest priority to security issues. According to its statutory role, the Greek Atomic Energy Commission is responsible for emergency preparedness and response in case of nuclear and radiological events, and advises the Government on the measures and interventions necessary to protect the public. In this context, the Commission participated in the Nuclear, Radiological, Biological, and Chemical Threat National Emergency Plan, specially developed for the Olympic Games, and coordinated by the Olympic Games Security Division. The objective of this paper is to share the experience gained during the organization of the Olympic Games and to present the nuclear security program implemented prior to, during, and beyond the Games, in order to prevent, detect, assess, and respond to the threat of nuclear terrorism. This program adopted a multi-area coverage of nuclear security, including physical protection of nuclear and radiological facilities, prevention of smuggling of radioactive materials through borders, prevention of dispersion of these materials into the Olympic venues, enhancement of emergency preparedness and response to radiological events, upgrading of the technical infrastructure, establishment of new procedures for assessing the threat and responding to radiological incidents, and training personnel belonging to several organizations involved in the National Emergency Response Plan. Finally, the close cooperation of Greek Authorities with the International Atomic Energy Agency and the U.S. Department of Energy, under the coordination of the Greek Atomic Energy Commission, is also discussed.

  13. Is Seeing Believing? Training Users on Information Security: Evidence from Java Applets

    ERIC Educational Resources Information Center

    Ayyagari, Ramakrishna; Figueroa, Norilyz

    2017-01-01

    Information Security issues are one of the top concerns of CEOs. Accordingly, information systems education and research have addressed security issues. One of the main areas of research is the behavioral issues in Information Security, primarily focusing on users' compliance to information security policies. We contribute to this literature by…

  14. A Cluster-Based Framework for the Security of Medical Sensor Environments

    NASA Astrophysics Data System (ADS)

    Klaoudatou, Eleni; Konstantinou, Elisavet; Kambourakis, Georgios; Gritzalis, Stefanos

    The adoption of Wireless Sensor Networks (WSNs) in the healthcare sector poses many security issues, mainly because medical information is considered particularly sensitive. The security mechanisms employed are expected to be more efficient in terms of energy consumption and scalability in order to cope with the constrained capabilities of WSNs and patients’ mobility. Towards this goal, cluster-based medical WSNs can substantially improve efficiency and scalability. In this context, we have proposed a general framework for cluster-based medical environments on top of which security mechanisms can rely. This framework fully covers the varying needs of both in-hospital environments and environments formed ad hoc for medical emergencies. In this paper, we further elaborate on the security of our proposed solution. We specifically focus on key establishment mechanisms and investigate the group key agreement protocols that can best fit in our framework.

  15. Information security threats and an easy-to-implement attack detection framework for wireless sensor network-based smart grid applications

    NASA Astrophysics Data System (ADS)

    Tuna, G.; Örenbaş, H.; Daş, R.; Kogias, D.; Baykara, M.; K, K.

    2016-03-01

    Wireless Sensor Networks (WSNs) when combined with various energy harvesting solutions managing to prolong the overall lifetime of the system and enhanced capabilities of the communication protocols used by modern sensor nodes are efficiently used in are efficiently used in Smart Grid (SG), an evolutionary system for the modernization of existing power grids. However, wireless communication technology brings various types of security threats. In this study, firstly the use of WSNs for SG applications is presented. Second, the security related issues and challenges as well as the security threats are presented. In addition, proposed security mechanisms for WSN-based SG applications are discussed. Finally, an easy- to-implement and simple attack detection framework to prevent attacks directed to sink and gateway nodes with web interfaces is proposed and its efficiency is proved using a case study.

  16. The Water-Energy-Food Nexus in Kazakhstan: Trends and Analyses

    NASA Astrophysics Data System (ADS)

    Karatayev, Marat; Rivotti, Pedro; Sobral Mourão, Zenaida; Konadu, D. Dennis; Clarke, Michèle

    2017-04-01

    The concept of the water, energy and food nexus is extremely relevant to Kazakhstan as the country faces population growth, economic progress and environmental challenges such as water scarcity, desertification, and climate change. Furthermore, poor sectoral coordination and institutional fragmentation have caused an unsustainable resource use and threaten the long-term sustainability of water, energy and food security in Kazakhstan. Specifically, low tariffs in the water and electricity sectors have led to under-investment in water and energy efficiency measures, leading to extensive water losses, soil salinity, as well as degradation of agricultural land. Using the nexus approach, this study aims to investigate and map the linkages between water resources, energy production and food security in Kazakhstan, with an emphasis on the current coordination framework. This will enable the identification of critical interdependency issues in the management of these resources. The results will provide a better understanding of the current interconnectedness of the sectors, and support the coordination of decision-making at various levels of governance and research of land, water and energy to meet sustainable development goals.

  17. Energy conversion in natural and artificial photosynthesis.

    PubMed

    McConnell, Iain; Li, Gonghu; Brudvig, Gary W

    2010-05-28

    Modern civilization is dependent upon fossil fuels, a nonrenewable energy source originally provided by the storage of solar energy. Fossil-fuel dependence has severe consequences, including energy security issues and greenhouse gas emissions. The consequences of fossil-fuel dependence could be avoided by fuel-producing artificial systems that mimic natural photosynthesis, directly converting solar energy to fuel. This review describes the three key components of solar energy conversion in photosynthesis: light harvesting, charge separation, and catalysis. These processes are compared in natural and in artificial systems. Such a comparison can assist in understanding the general principles of photosynthesis and in developing working devices, including photoelectrochemical cells, for solar energy conversion. 2010 Elsevier Ltd. All rights reserved.

  18. Editorial "The Interdisciplinary Nature of SOIL"

    NASA Astrophysics Data System (ADS)

    Brevik, E. C.; Cerdá, A.; Mataix-Solera, J.; Pereg, L.; Quinton, J. N.; Six, J.; Van Oost, K.

    2014-09-01

    The holistic study of soils requires an interdisciplinary approach involving biologists, chemists, geologists, and physicists amongst others, something that has been true from the earliest days of the field. This approach has been strengthened and reinforced as current research continues to use experts trained in both soil science and related fields and by the wide array of issues impacting the world's biosphere that require an in-depth understanding of soils. Of fundamental importance amongst these issues are biodiversity, biofuels/energy security, climate change, ecosystem services, food security, human health, land degradation, and water security, each representing a critical challenge for research. In order to establish a benchmark for the type of research we seek to highlight in each issue of SOIL, here in this editorial, we outline the interdisciplinary nature of soil science research that we are seeking for in SOIL, with a focus on the myriad ways soil science can be used to expand investigation into a more holistic and therefore richer approach to soil research. In addition, we provide a selection of invited review papers in the first issue of SOIL that address the study of soils and the ways in which soil investigations are essential to other related fields. We hope that both this editorial and the first issue will serve as examples of the kinds of topics we would like to see published in SOIL and will stimulate excitement among our readers and authors to participate in this new venture.

  19. National Electric Sector Cybersecurity Organization Resource (NESCOR)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    The goal of the National Electric Sector Cybersecurity Organization Resource (NESCOR) project was to address cyber security issues for the electric sector, particularly in the near and mid-term. The following table identifies the strategies from the DOE Roadmap to Achieve Energy Delivery Systems Cybersecurity published in September 2011 that are applicable to the NESCOR project.

  20. 75 FR 65437 - Defense Federal Acquisition Regulation Supplement; Defense Cargo Riding Gang Members (DFARS Case...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... Document issued under 46 U.S.C., chapter 73, or a transportation security card issued under section 70105.... Merchant Mariner's Document issued under 46 U.S.C. chapter 73, or a transportation security card issued... Mariner's Document issued under 46 U.S.C. chapter 73, or a transportation security card issued under...

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kelly, P.L.

    This paper reports that last year's conflict in the Persian Gulf reminded the world of the crucial role energy plays in our civilization and placed the issue of energy back near the center of the political stage. Saddam Hussein's callous destruction of much of Kuwait's oil producing capacity highlighted the dependence of the industrial and developing world on a secure supply of oil and gas. This even gave momentum to policymakers in every nation of the world with significant hydrocarbon potential-except the U.S.-to encourage investment, provide incentives for exploration and development, and in so doing, increase the security of theirmore » own supply of oil and natural gas. As the curtain rises on 1992, the U.S. Congress continues to allow misconceptions, rather than fact, to drive energy policy and Outer Continental Shelf (OCSA) leasing decisions. As a result, domestic production will decline further in 1992, jobs and revenue will be lost, imports will rise, and the nation's energy future will be uncertain, because it relies more than ever on Middle Eastern production.« less

  2. Security and privacy issues in implantable medical devices: A comprehensive survey.

    PubMed

    Camara, Carmen; Peris-Lopez, Pedro; Tapiador, Juan E

    2015-06-01

    Bioengineering is a field in expansion. New technologies are appearing to provide a more efficient treatment of diseases or human deficiencies. Implantable Medical Devices (IMDs) constitute one example, these being devices with more computing, decision making and communication capabilities. Several research works in the computer security field have identified serious security and privacy risks in IMDs that could compromise the implant and even the health of the patient who carries it. This article surveys the main security goals for the next generation of IMDs and analyzes the most relevant protection mechanisms proposed so far. On the one hand, the security proposals must have into consideration the inherent constraints of these small and implanted devices: energy, storage and computing power. On the other hand, proposed solutions must achieve an adequate balance between the safety of the patient and the security level offered, with the battery lifetime being another critical parameter in the design phase. Copyright © 2015 Elsevier Inc. All rights reserved.

  3. 17 CFR 240.3a12-10 - Exemption of certain securities issued by the Resolution Funding Corporation.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... securities issued by the Resolution Funding Corporation. 240.3a12-10 Section 240.3a12-10 Commodity and... Exemptions § 240.3a12-10 Exemption of certain securities issued by the Resolution Funding Corporation. Securities that are issued by the Resolution Funding Corporation pursuant to section 21B(f) of the Federal...

  4. Introduction

    NASA Astrophysics Data System (ADS)

    2014-12-01

    This special issue of Applied Surface Science is a compilation of papers inspired by the symposium on "Surface/Interfaces Characterization and Renewable Energy" held at the 2013 MRS Fall Meeting. Practical uses of renewable energy are one of the greatest technical challenges today. The symposium explored a number of surface and interface-related questions relevant to this overarching theme. Topics from fuel cells to photovoltaics, from water splitting to fundamental and practical issues in charge generation and storage were discussed. The work presented included the use of novel experimental spectroscopic and microscopic analytical techniques, theoretical and computational understanding of interfacial phenomena, characterization of intricate behavior of charged species, as well as molecules and molecular fragments at surfaces and interfaces. It emphasized fundamental understanding of underlying processes, as well as practical devices design and applications of surface and interfacial phenomena related to renewable energy. These subjects are complicated by the transport of photons, electrons, ions, heat, and almost any other form of energy. Given the current concerns of climate change, energy independence and national security, this work is important and of interest to the field of Applied Surface Science. The sixteen papers published in this special issue have all been refereed.

  5. 49 CFR 1554.103 - Security Directives.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... necessary to respond to a threat assessment or to a specific threat against civil aviation, TSA issues a..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT REPAIR STATION SECURITY Security Measures... each Security Directive TSA issues to the repair station within the time prescribed. Each repair...

  6. Secure environment for real-time tele-collaboration on virtual simulation of radiation treatment planning.

    PubMed

    Ntasis, Efthymios; Maniatis, Theofanis A; Nikita, Konstantina S

    2003-01-01

    A secure framework is described for real-time tele-collaboration on Virtual Simulation procedure of Radiation Treatment Planning. An integrated approach is followed clustering the security issues faced by the system into organizational issues, security issues over the LAN and security issues over the LAN-to-LAN connection. The design and the implementation of the security services are performed according to the identified security requirements, along with the need for real time communication between the collaborating health care professionals. A detailed description of the implementation is given, presenting a solution, which can directly be tailored to other tele-collaboration services in the field of health care. The pilot study of the proposed security components proves the feasibility of the secure environment, and the consistency with the high performance demands of the application.

  7. The connection between water and energy in cities: a review.

    PubMed

    Kenway, S J; Lant, P A; Priestley, A; Daniels, P

    2011-01-01

    We have only rudimentary understanding of the complex and pervasive connections between water and energy in cities. As water security now threatens energy and economic security, this is a major omission. Understanding the water-energy nexus is necessary if we want to contribute to solving water and energy issues simultaneously; if we want to stop moving problems from one resource dimension to another. This is particularly relevant in the Australian context where energy use for water supplies is forecast to rapidly escalate, growing around 300% from 2007 levels, by 2030. This paper presents a literature review with an aim of characterising the research to date with a particular focus on cities, the major centres of consumption and growth. It systematically analyses a wide range of papers and summarises the diverse objectives, dimensions, and scale of the research to-date together with knowledge gaps. There are many major gaps. These include energy use associated with water in industrial and commercial operations as well as socio-political perspectives. A major gap is the lack of a unifying theoretical framework and consistent methodology for analysis. This is considered a prerequisite for quantitative trans-city comparisons.

  8. 17 CFR 230.488 - Effective date of registration statements relating to securities to be issued in certain business...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... statements relating to securities to be issued in certain business combination transactions. 230.488 Section... REGULATIONS, SECURITIES ACT OF 1933 Investment Companies; Business Development Companies § 230.488 Effective date of registration statements relating to securities to be issued in certain business combination...

  9. 6 CFR 27.204 - Minimum concentration by security issue.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Minimum concentration by security issue. 27.204 Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by...

  10. 30 CFR 219.415 - How will bonus and royalty credits affect revenues allocated to Gulf producing States?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... revenues allocated to Gulf producing States? 219.415 Section 219.415 Mineral Resources BUREAU OF OCEAN... and royalty credits affect revenues allocated to Gulf producing States? If bonus and royalty credits issued under Section 104(c) of the Gulf of Mexico Energy Security Act are used to pay bonuses or...

  11. Foreign and Domestic Policy Belief Structures in the U.S. and British Publics

    ERIC Educational Resources Information Center

    Jenkins-Smith, Hank C.; Mitchell, Neil J.; Herron, Kerry G.

    2004-01-01

    Scholars have made little progress in exploring the degree to which research on belief structures among Americans may be generalizable to other political systems and geopolitical contexts. The distribution and structure of mass beliefs related to nuclear security, missile defenses, and nuclear energy issues in the United States and Great Britain…

  12. 6 CFR 13.6 - Prerequisites for issuing a Complaint.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Prerequisites for issuing a Complaint. 13.6 Section 13.6 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.6 Prerequisites for issuing a Complaint. (a) The Reviewing Official may issue a...

  13. If nuclear energy is the answer, why doesn't everyone agree?

    NASA Astrophysics Data System (ADS)

    Roberts, J. W.

    2018-03-01

    Nuclear energy produces low carbon, safe and reliable electricity so is it now time for the UK to invest in this proven technology or are the misplaced perceptions regarding its safety, cost and the quantities of radioactive waste produced causing us to overlook nuclear as a major component of our electricity mix? This paper discusses these issues and whether the negative opinion of nuclear energy which could hold back it’s wider development in the UK, is justified in the 21st century. For the safe, secure and economic future of electricity can we afford to ignore the positive contributions nuclear energy can make any longer?

  14. Changing Homeland Security: The Year in Review - 2008

    DTIC Science & Technology

    2009-01-01

    new opportunities for terrorist safe havens. The specter of homegrown terrorism has not abated. Naturalized citizens of Somali descent traveled to...34 • The Nature of Homeland Security: Now a Second Tier Policy Issue? • Organizing for Homeland Security: Possible Futures, Emerging Issues • The...emerging definitions of the homeland security mission space in 2009. The Nature of Homeland Security: Now a Second Tier Policy Issue? Has the bar

  15. Using system-of-systems simulation modeling and analysis to measure energy KPP impacts for brigade combat team missions.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lawton, Craig R.; Welch, Kimberly M.; Kerper, Jessica

    2010-06-01

    The Department of Defense's (DoD) Energy Posture identified dependence of the US Military on fossil fuel energy as a key issue facing the military. Inefficient energy consumption leads to increased costs, effects operational performance and warfighter protection through large and vulnerable logistics support infrastructures. Military's use of energy is a critical national security problem. DoD's proposed metrics Fully Burdened Cost of Fuel and Energy Efficiency Key Performance Parameter (FBCF and Energy KPP) are a positive step to force energy use accountability onto Military programs. The ability to measure impacts of sustainment are required to fully measure Energy KPP. Sandia's workmore » with Army demonstrates the capability to measure performance which includes energy constraint.« less

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gerald Hill; Kenneth Nemeth; Gary Garrett

    The Southern States Energy Board's (SSEB) 'Regional Effort to Deploy Clean Coal Technologies' program began on June 1, 2003, and was completed on January 31, 2009. The project proved beneficial in providing state decision-makers with information that assisted them in removing barriers or implementing incentives to deploy clean coal technologies. This was accomplished through two specific tasks: (1) domestic energy security and diversity; and (2) the energy-water interface. Milestones accomplished during the project period are: (1) Presentations to Annual Meetings of SSEB Members, Associate Member Meetings, and the Gasification Technologies Council. (2) Energy: Water reports - (A) Regional Efforts tomore » Deploy Clean Coal Technologies: Impacts and Implications for Water Supply and Quality. June 2004. (B) Energy-Water Interface Challenges: Coal Bed Methane and Mine Pool Water Characterization in the Southern States Region. 2004. (C) Freshwater Availability and Constraints on Thermoelectric Power Generation in the Southeast U.S. June 2008. (3) Blackwater Interactive Tabletop Exercise - Decatur, Georgia April 2007. (4) Blackwater Report: Blackwater: Energy and Water Interdependency Issues: Best Practices and Lessons Learned. August 2007. (5) Blackwater Report: BLACKWATER: Energy Water Interdependency Issues REPORT SUMMARY. April 2008.« less

  17. Computer Security Awareness Guide for Department of Energy Laboratories, Government Agencies, and others for use with Lawrence Livermore National Laboratory`s (LLNL): Computer security short subjects videos

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    Lonnie Moore, the Computer Security Manager, CSSM/CPPM at Lawrence Livermore National Laboratory (LLNL) and Gale Warshawsky, the Coordinator for Computer Security Education & Awareness at LLNL, wanted to share topics such as computer ethics, software piracy, privacy issues, and protecting information in a format that would capture and hold an audience`s attention. Four Computer Security Short Subject videos were produced which ranged from 1-3 minutes each. These videos are very effective education and awareness tools that can be used to generate discussions about computer security concerns and good computing practices. Leaders may incorporate the Short Subjects into presentations. After talkingmore » about a subject area, one of the Short Subjects may be shown to highlight that subject matter. Another method for sharing them could be to show a Short Subject first and then lead a discussion about its topic. The cast of characters and a bit of information about their personalities in the LLNL Computer Security Short Subjects is included in this report.« less

  18. The unavoidable challenge: US transportation sector's addiction

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1990-09-26

    Driven by two powerful forces, the quest for energy security and the need for cleaner air, the U.S. Department of Energy, various state and local agencies, and business and industry are seeking ways to significantly reduce the dependence on oil as a transportation fuel. This issue of ED features the latest research findings on methanol, compressed natural gas, and electricity, focusing on a just-completed DOE study and report. This issue also presents the following: (1) the ED Refining Netback Data Series for the US Gulf and West Coasts, Rotterdam, and Singapore as of September 7, 1990; and (2) the EDmore » Fuel Price/Tax Series for countries of the Western Hemisphere, September 1990 edition. 5 figs., 5 tabs.« less

  19. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... in which auctioned Treasury securities may be issued? There are three book-entry securities systems... marketable Treasury securities. We maintain and transfer securities in these three book-entry systems at... inflation. Securities may be transferred from one system to the other, unless the securities are not...

  20. International Review of Frameworks for Impact Evaluation of Appliance Standards, Labeling, and Incentives

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhou, Nan; Romankiewicz, John; Vine, Edward

    2012-12-15

    In recent years, the number of energy efficiency policies implemented has grown very rapidly as energy security and climate change have become top policy issues for many governments around the world. Within the sphere of energy efficiency policy, governments (federal and local), electric utilities, and other types of businesses and institutions are implementing a wide variety of programs to spread energy efficiency practices in industry, buildings, transport, and electricity. As programs proliferate, there is an administrative and business imperative to evaluate the savings and processes of these programs to ensure that program funds spent are indeed leading to a moremore » energy-efficient economy.« less

  1. Advanced Micro Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy Security, and Power Quality at DoD Installations

    DTIC Science & Technology

    2016-10-28

    constraints and wire routing issues. • Outside sites have more space, but require outdoor rated equipment (NEMA outdoor rated.. ) and more maintenance...sustainable power, in many different types, sizes and capacities, as follows: • Cogen Plant #1 B1579: 7.2MW gas-fired turbine at Substation “AA...Cogen Plant #2 B1991: (2) 4.6MW gas-fired turbines at “Gillespie” Substation • 300kW fuel cell at Substation “AA” • PPA: 1.015MW solar photovoltaic

  2. From petrochemistry to biotech: a European perspective on the bio-based economy

    PubMed Central

    Landeweerd, Laurens; Surette, Monique; van Driel, Corry

    2011-01-01

    This paper gives an account of the issues at play in Europe with regard to the transition to a bio-based economy. Agricultural crops have always been used for the production of food, feed, fibre and fuel. The Model T Ford—the first mass produced car—originally ran on bioethanol, and wood has been in use as a source for energy ever since the discovery of fire. What is new is that the balance between agricultural uses is changing under the pressure of an increasing need for food and feed, as well as the new need for biofuels and biomaterials. At the basis of this change lie several serious issues related to the current use of bio-based feedstock to secure energy supply, the future depletion of natural resources and global climate change. Innovations in industrial biotechnology are expected to play a crucial role in dealing with these issues in biomass use.

  3. Cooperative monitoring and its role in regional security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Biringer, K.; Olsen, J.; Lincoln, R.

    1997-03-01

    Cooperative monitoring systems can play an important part in promoting the implementation of regional cooperative security agreements. These agreements advance the national security interests of the United States in a post Cold War environment. Regional issues as widely varying as nuclear nonproliferation, trade and environmental pollution can be the source of tensions which may escalate to armed conflict which could have global implications. The Office of National Security Policy Analysis at the US Department of Energy (DOE) has an interest in seeking ways to promote regional cooperation that can reduce the threats posed by regional conflict. DOE technologies and technicalmore » expertise can contribute to developing solutions to a wide variety of these international problems. Much of this DOE expertise has been developed in support of the US nuclear weapons and arms control missions. It is now being made available to other agencies and foreign governments in their search for regional security and cooperation. This report presents two examples of interest to DOE in which monitoring technologies could be employed to promote cooperation through experimentation. The two scenarios include nuclear transparency in Northeast Asia and environmental restoration in the Black Sea. Both offer the potential for the use of technology to promote regional cooperation. The issues associated with both of these monitoring applications are presented along with examples of appropriate monitoring technologies, potential experiments and potential DOE contributions to the scenarios.« less

  4. 77 FR 72278 - Sale and Issue of Marketable Book-Entry Treasury Bills, Notes, and Bonds

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-05

    ... whether it would be more important to issue a new floating rate security each month. Maturities: We intend.... SUMMARY: The Department of the Treasury (``Treasury'') intends to issue a new type of marketable security... security. We also invite other comments relevant to the issuance of this new security. DATES: Submit...

  5. The interdisciplinary nature of SOIL

    NASA Astrophysics Data System (ADS)

    Brevik, E. C.; Cerdà, A.; Mataix-Solera, J.; Pereg, L.; Quinton, J. N.; Six, J.; Van Oost, K.

    2015-01-01

    The holistic study of soils requires an interdisciplinary approach involving biologists, chemists, geologists, and physicists, amongst others, something that has been true from the earliest days of the field. In more recent years this list has grown to include anthropologists, economists, engineers, medical professionals, military professionals, sociologists, and even artists. This approach has been strengthened and reinforced as current research continues to use experts trained in both soil science and related fields and by the wide array of issues impacting the world that require an in-depth understanding of soils. Of fundamental importance amongst these issues are biodiversity, biofuels/energy security, climate change, ecosystem services, food security, human health, land degradation, and water security, each representing a critical challenge for research. In order to establish a benchmark for the type of research that we seek to publish in each issue of SOIL, we have outlined the interdisciplinary nature of soil science research we are looking for. This includes a focus on the myriad ways soil science can be used to expand investigation into a more holistic and therefore richer approach to soil research. In addition, a selection of invited review papers are published in this first issue of SOIL that address the study of soils and the ways in which soil investigations are essential to other related fields. We hope that both this editorial and the papers in the first issue will serve as examples of the kinds of topics we would like to see published in SOIL and will stimulate excitement among our readers and authors to participate in this new venture.

  6. 17 CFR 250.52 - Exemption of issue and sale of certain securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... business of the subsidiary company; and (2) The interest rates and maturity dates of any debt security... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of issue and sale of certain securities. 250.52 Section 250.52 Commodity and Securities Exchanges SECURITIES AND EXCHANGE...

  7. 6 CFR 27.204 - Minimum concentration by security issue.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by security issue. (a) Release Chemicals—(1) Release-Toxic Chemicals. If a release-toxic chemical of interest...

  8. Smart Grid Development Issues for Terrestrial and Space Applications

    NASA Technical Reports Server (NTRS)

    Soeder, James F.

    2011-01-01

    The development of the so called Smart Grid has as many definitions as individuals working in the area. Based on the technology or technologies that are of interest, be it high speed communication, renewable generation, smart meters, energy storage, advanced sensors, etc. they can become the individual defining characteristic of the Smart Grid. In reality the smart grid encompasses all of these items and quite at bit more. This discussion attempts to look at what the needs are for the grid of the future, such as the issues of increased power flow capability, use of renewable energy, increased security and efficiency and common power and data standards. It also shows how many of these issues are common with the needs of NASA for future exploration programs. A common theme to address both terrestrial and space exploration issues is to develop micro-grids that advertise the ability to enable the load leveling of large power generation facilities. However, for microgrids to realize their promise there needs to a holistic systems approach to their development and integration. The overall system integration issues are presented along with potential solution methodologies.

  9. Smart Grid Development Issues for Terrestrial and Space Applications

    NASA Technical Reports Server (NTRS)

    Soeder, James F.

    2014-01-01

    The development of the so called Smart Grid has as many definitions as individuals working in the area. Based on the technology or technologies that are of interest, be it high speed communication, renewable generation, smart meters, energy storage, advanced sensors, etc. they can become the individual defining characteristic of the Smart Grid. In reality the smart grid encompasses all of these items and quite at bit more. This discussion attempts to look at what the needs are for the grid of the future, such as the issues of increased power flow capability, use of renewable energy, increased security and efficiency and common power and data standards. It also shows how many of these issues are common with the needs of NASA for future exploration programs. A common theme to address both terrestrial and space exploration issues is to develop micro-grids that advertise the ability to enable the load leveling of large power generation facilities. However, for microgrids to realize their promise there needs to a holistic systems approach to their development and integration. The overall system integration issues are presented along with potential solution methodologies.

  10. Broad Overview of Energy Efficiency and Renewable Energy Opportunities for Department of Defense Installations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Anderson, E.; Antkowiak, M.; Butt, R.

    The Strategic Environmental Research and Developmental Program (SERDP)/Environmental Security Technology Certification Program (ESTCP) is the Department of Defense?s (DOD) environmental science and technology program focusing on issues related to environment and energy for the military services. The SERDP/ESTCP Office requested that the National Renewable Energy Laboratory (NREL) provide technical assistance with strategic planning by evaluating the potential for several types of renewable energy technologies at DOD installations. NREL was tasked to provide technical expertise and strategic advice for the feasibility of geothermal resources, waste-to-energy technology, photovoltaics (PV), wind, microgrids, and building system technologies on military installations. This technical report ismore » the deliverable for these tasks.« less

  11. International trade and waste and fuel managment issue, 2008

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Agnihotri, Newal

    The focus of the January-February issue is on international trade and waste and fuel managment. Major articles/reports in this issue include: A global solution for clients, by Yves Linz, AREVA NP; A safer, secure and economical plant, by Andy White, GE Hitachi Nuclear; Robust global prospects, by Ken Petrunik, Atomic Energy of Canada Limited; Development of NPPs in China, by Chen Changbing and Li Huiqiang, Huazhong University of Science and Technology; Yucca Mountain update; and, A class of its own, by Tyler Lamberts, Entergy Nuclear. The Industry Innovation articles in this issue are: Fuel assembly inspection program, by Jim Lemons,more » Tennessee Valley Authority; and, Improved in-core fuel shuffle for reduced refueling duration, by James Tusar, Exelon Nuclear.« less

  12. Perceptions of Accounting Practitioners and Educators on E-Business Curriculum and Web Security Issues

    ERIC Educational Resources Information Center

    Ragothaman, Srinivasan; Lavin, Angeline; Davies, Thomas

    2007-01-01

    This research examines, through survey administration, the perceptions of accounting practitioners and educators with respect to the multi-faceted security issues of e-commerce payment systems as well as e-business curriculum issues. Specific security issues explored include misuse/theft of personal and credit card information, spam e-mails,…

  13. Global water risks and national security: Building resilience (Invited)

    NASA Astrophysics Data System (ADS)

    Pulwarty, R. S.

    2013-12-01

    The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere, and (3) Identify preventable risks, public leadership and private innovation needed for developing adaptive water resource management institutions that take advantage of climate and hydrologic information and changes. The presentation will conclude with a preliminary framework for assessing and implementing water security measures given insecure conditions introduced by a changing climate and in the context of national security.

  14. ARPA-E: Accelerating U.S. Energy Innovation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Manser, Joseph S.; Rollin, Joseph A.; Brown, Kristen E.

    ARPA-E is charged with addressing the most pressing issues facing the U.S. energy sector today, as well as those projected to impact national energy security in the future. The agency’s mission is clearly elucidated in its authorizing statute:2 “To overcome long-term and high-risk technological barriers in the development of energy technologies.” The three principal thrusts of the agency’s mission are (i) reducing energy imports, (ii) reducing energy-related emissions and greenhouse gases, and (iii) improving energy efficiency in all sectors of the U.S. economy. Meeting these ambitious challenges requires focused, interdisciplinary effort on a national scale that will help ensure themore » United States maintains a competitive lead in developing and deploying advanced energy technologies.« less

  15. Smart Operations in Distributed Energy Resources System

    NASA Astrophysics Data System (ADS)

    Wei, Li; Jie, Shu; Zhang-XianYong; Qing, Zhou

    Smart grid capabilities are being proposed to help solve the challenges concerning system operations due to that the trade-offs between energy and environmental needs will be constantly negotiated while a reliable supply of electricity needs even greater assurance in case of that threats of disruption have risen. This paper mainly explores models for distributed energy resources system (DG, storage, and load),and also reviews the evolving nature of electricity markets to deal with this complexity and a change of emphasis on signals from these markets to affect power system control. Smart grid capabilities will also impact reliable operations, while cyber security issues must be solved as a culture change that influences all system design, implementation, and maintenance. Lastly, the paper explores significant questions for further research and the need for a simulation environment that supports such investigation and informs deployments to mitigate operational issues as they arise.

  16. 6 CFR 27.203 - Calculating the screening threshold quantity by security issue.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...

  17. 6 CFR 27.203 - Calculating the screening threshold quantity by security issue.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...

  18. 6 CFR 27.203 - Calculating the screening threshold quantity by security issue.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...

  19. 6 CFR 27.203 - Calculating the screening threshold quantity by security issue.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...

  20. 30 CFR 519.415 - How will bonus and royalty credits affect revenues allocated to Gulf producing States?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... revenues allocated to Gulf producing States? 519.415 Section 519.415 Mineral Resources BUREAU OF OCEAN... affect revenues allocated to Gulf producing States? If bonus and royalty credits issued under Section 104(c) of the Gulf of Mexico Energy Security Act are used to pay bonuses or royalties on leases in the...

  1. 30 CFR 519.415 - How will bonus and royalty credits affect revenues allocated to Gulf producing States?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... revenues allocated to Gulf producing States? 519.415 Section 519.415 Mineral Resources BUREAU OF OCEAN... affect revenues allocated to Gulf producing States? If bonus and royalty credits issued under Section 104(c) of the Gulf of Mexico Energy Security Act are used to pay bonuses or royalties on leases in the...

  2. 30 CFR 519.415 - How will bonus and royalty credits affect revenues allocated to Gulf producing States?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... revenues allocated to Gulf producing States? 519.415 Section 519.415 Mineral Resources BUREAU OF OCEAN... affect revenues allocated to Gulf producing States? If bonus and royalty credits issued under Section 104(c) of the Gulf of Mexico Energy Security Act are used to pay bonuses or royalties on leases in the...

  3. The APS Panel on Public Affairs and Federal Science Policy

    NASA Astrophysics Data System (ADS)

    Jaffe, Robert

    2013-03-01

    The Panel on Public Affairs (POPA) is the organ through which the APS seeks to provide high quality input to the Federal Government on issues with significant physics content, ranging from energy and environment to national security. I will describe POPA's evolving mission, some recent efforts and successes, and look at the agenda for the next few years.

  4. 30 CFR 219.415 - How will bonus and royalty credits affect revenues allocated to Gulf producing States?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... revenues allocated to Gulf producing States? 219.415 Section 219.415 Mineral Resources MINERALS MANAGEMENT... allocated to Gulf producing States? If bonus and royalty credits issued under Section 104(c) of the Gulf of Mexico Energy Security Act are used to pay bonuses or royalties on leases in the 181 Area located in the...

  5. Using microgrids to enhance energy security and resilience

    DOE PAGES

    Lu, Xiaonan; Wang, Jianhui; Guo, Liping

    2016-12-05

    Although microgrids are now widely studied, challenges still exist. A reliable control architecture needs to be developed to coordinate different devices. Advanced forecasting and demand response management approaches should be implemented to cope with the intermittence of renewable generation. Furthermore, interconnection issues should be further studied to eliminate the influence of microgrid integration and achieve coordinated operation throughout the system.

  6. 17 CFR 270.2a-7 - Money market funds.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Security) issued by a Special Purpose Entity (as defined in this paragraph), substantially all of the...) Conduit security means a security issued by a Municipal Issuer (as defined in this paragraph) involving an..., which arrangement or agreement provides for or secures repayment of the security. Municipal issuer means...

  7. 17 CFR 270.2a-7 - Money market funds.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Security) issued by a Special Purpose Entity (as defined in this paragraph), substantially all of the...) Conduit security means a security issued by a Municipal Issuer (as defined in this paragraph) involving an..., which arrangement or agreement provides for or secures repayment of the security. Municipal issuer means...

  8. 17 CFR 270.2a-7 - Money market funds.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Security) issued by a Special Purpose Entity (as defined in this paragraph), substantially all of the...) Conduit Security means a security issued by a Municipal Issuer (as defined in this paragraph) involving an..., which arrangement or agreement provides for or secures repayment of the security. Municipal Issuer means...

  9. 17 CFR 270.2a-7 - Money market funds.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Security) issued by a Special Purpose Entity (as defined in this paragraph), substantially all of the...) Conduit security means a security issued by a Municipal Issuer (as defined in this paragraph) involving an..., which arrangement or agreement provides for or secures repayment of the security. Municipal issuer means...

  10. 17 CFR 450.4 - Custodial holdings of government securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... appropriate regulatory agency that expressly govern securities lending practices. (b)(1) Except as otherwise... security (or the amount of each issue of a government security issued in book-entry form) held for the.... (d) Counts of government securities held for customers in both definitive and book-entry form shall...

  11. The future of energy security in the 21st Century

    NASA Astrophysics Data System (ADS)

    Gupta, Rajan

    2006-10-01

    Energy is essential for modern life and is a critical resource that we take for granted. Economies and security of nations depend on reliable and cost-effective access. As the world transitions from conventional oil and natural gas to nuclear, renewables, and unconventional sources we are increasingly confronted by many unsettling questions. Will there be enough cheap oil and gas for preserve the standard of living in the developed world and allow the industrializing world to develop? Will renewable sources provide a significant fraction of our energy needs in the near future? Is global warming already happening as a result of our consumption of fossil fuels? If there is a resource crunch before new sources come on line, will there be conflict or global cooperation? This talk will attempt to answer these questions by examining the global oil and gas resources, geopolitics, and key science and technology issues that need to be addressed by the global community with cooperation and a sense of urgency.

  12. Life cycle evaluation of emerging lignocellulosic ethanol conversion technologies.

    PubMed

    Spatari, Sabrina; Bagley, David M; MacLean, Heather L

    2010-01-01

    Lignocellulosic ethanol holds promise for addressing climate change and energy security issues associated with personal transportation through lowering the fuel mixes' carbon intensity and petroleum demand. We compare the technological features and life cycle environmental impacts of near- and mid-term ethanol bioconversion technologies in the United States. Key uncertainties in the major processes: pre-treatment, hydrolysis, and fermentation are evaluated. The potential to reduce fossil energy use and greenhouse gas (GHG) emissions varies among bioconversion processes, although all options studied are considerably more attractive than gasoline. Anticipated future performance is found to be considerably more attractive than that published in the literature as being achieved to date. Electricity co-product credits are important in characterizing the GHG impacts of different ethanol production pathways; however, in the absence of near-term liquid transportation fuel alternatives to gasoline, optimizing ethanol facilities to produce ethanol (as opposed to co-products) is important for reducing the carbon intensity of the road transportation sector and for energy security.

  13. 17 CFR 270.12d3-1 - Exemption of acquisitions of securities issued by persons engaged in securities related businesses.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... securities issued by persons engaged in securities related businesses. 270.12d3-1 Section 270.12d3-1... in securities related businesses. (a) Notwithstanding section 12(d)(3) of the Act, a registered... securities related business, the determination required by paragraph (b) of this section shall be made as...

  14. Water-energy-food security nexus: the road map

    NASA Astrophysics Data System (ADS)

    Hamdy, Atef

    2015-04-01

    The world's growing population and increased prosperity will increase global demand for energy, as well as food and water supplies in the coming decades. In the arid and semi arid regions as in most of the world water and energy have historically been managed separately, with little consideration of cross sectoral interactions, yet in reality, water and energy are closely interconnected. By addressing water and energy together planners can identify crucial interactions, conflicting demands and potential synergies. For many countries around the world it is needed to establish a road map on: (i) how to implement nexus policies to increase efficiency of natural resources management? (ii) how to bridge science with policy and business? (iii) how governments be inspired by business? (iv) how can be business be inspired by science? (v) how can we learn from each other and how collaborate to address the challenges ahead? Such road map should seek to bring together stakeholders involved in the nexus implementation approach over the coming years to develop nexus tools for decision making to quantify water energy food resources on both national and regional level. However, experiences gained and learned lessons indicate clearly that numerous countries are facing several barriers in putting in action their nexus road map due to the lack of integrated resource management, lack of capacity for research development, lack of knowledge sharing across sectors, and not enough interaction between policy makers and scientists. Those are major challenges to be faced to achieve the water, energy and food security nexus. Furthermore, such goal cannot be reached without building and strengthening the synergy between education, research and innovation for sustainable resource management. Those issues beside others will be fully discussed in this paper. Keywords: water-energy-food security; nexus

  15. The 2015 National Security Strategy: Authorities, Changes, Issues for Congress

    DTIC Science & Technology

    2016-04-05

    Strategy: Authorities, Changes, Issues for Congress Congressional Research Service 3  reverse the spread of nuclear and biological weapons and...secure nuclear materials;  advance peace, security, and opportunity in the greater Middle East;  invest in the capacity of strong and capable...and norms on issues ranging from maritime security to trade and human rights.” 6 On Russia, the document says, “... we will continue to impose

  16. Innovations in Wind and Solar PV Financing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cory, K.; Coughlin, J.; Jenkin, T.

    2008-02-01

    There is growing national interest in renewable energy development based on the economic, environmental, and security benefits that these resources provide. Historically, greater development of our domestic renewable energy resources has faced a number of hurdles, primarily related to cost, regulation, and financing. With the recent sustained increase in the costs and associated volatility of fossil fuels, the economics of renewable energy technologies have become increasingly attractive to investors, both large and small. As a result, new entrants are investing in renewable energy and new business models are emerging. This study surveys some of the current issues related to windmore » and solar photovoltaic (PV) energy project financing in the electric power industry, and identifies both barriers to and opportunities for increased investment.« less

  17. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.

    PubMed

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-03-24

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.

  18. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks

    PubMed Central

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-01-01

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure. PMID:28338632

  19. Conference on Nuclear Energy and Science for the 21st Century: Atoms for Peace Plus Fifty - Washington, D.C., October 2003

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pfaltzgraff, Robert L

    2006-10-22

    This conference's focus was the peaceful uses of the atom and their implications for nuclear science, energy security, nuclear medicine and national security. The conference also provided the setting for the presentation of the prestigious Enrico Fermi Prize, a Presidential Award which recognizes the contributions of distinguished members of the scientific community for a lifetime of exceptional achievement in the science and technology of nuclear, atomic, molecular, and particle interactions and effects. An impressive group of distinguished speakers addressed various issues that included: the impact and legacy of the Eisenhower Administration’s “Atoms for Peace” concept, the current and future rolemore » of nuclear power as an energy source, the challenges of controlling and accounting for existing fissile material, and the horizons of discovery for particle or high-energy physics. The basic goal of the conference was to examine what has been accomplished over the past fifty years as well as to peer into the future to gain insights into what may occur in the fields of nuclear energy, nuclear science, nuclear medicine, and the control of nuclear materials.« less

  20. Synchrophasor Sensing and Processing based Smart Grid Security Assessment for Renewable Energy Integration

    NASA Astrophysics Data System (ADS)

    Jiang, Huaiguang

    With the evolution of energy and power systems, the emerging Smart Grid (SG) is mainly featured by distributed renewable energy generations, demand-response control and huge amount of heterogeneous data sources. Widely distributed synchrophasor sensors, such as phasor measurement units (PMUs) and fault disturbance recorders (FDRs), can record multi-modal signals, for power system situational awareness and renewable energy integration. An effective and economical approach is proposed for wide-area security assessment. This approach is based on wavelet analysis for detecting and locating the short-term and long-term faults in SG, using voltage signals collected by distributed synchrophasor sensors. A data-driven approach for fault detection, identification and location is proposed and studied. This approach is based on matching pursuit decomposition (MPD) using Gaussian atom dictionary, hidden Markov model (HMM) of real-time frequency and voltage variation features, and fault contour maps generated by machine learning algorithms in SG systems. In addition, considering the economic issues, the placement optimization of distributed synchrophasor sensors is studied to reduce the number of the sensors without affecting the accuracy and effectiveness of the proposed approach. Furthermore, because the natural hazards is a critical issue for power system security, this approach is studied under different types of faults caused by natural hazards. A fast steady-state approach is proposed for voltage security of power systems with a wind power plant connected. The impedance matrix can be calculated by the voltage and current information collected by the PMUs. Based on the impedance matrix, locations in SG can be identified, where cause the greatest impact on the voltage at the wind power plants point of interconnection. Furthermore, because this dynamic voltage security assessment method relies on time-domain simulations of faults at different locations, the proposed approach is feasible, convenient and effective. Conventionally, wind energy is highly location-dependent. Many desirable wind resources are located in rural areas without direct access to the transmission grid. By connecting MW-scale wind turbines or wind farms to the distributions system of SG, the cost of building long transmission facilities can be avoid and wind power supplied to consumers can be greatly increased. After the effective wide area monitoring (WAM) approach is built, an event-driven control strategy is proposed for renewable energy integration. This approach is based on support vector machine (SVM) predictor and multiple-input and multiple-output (MIMO) model predictive control (MPC) on linear time-invariant (LTI) and linear time-variant (LTV) systems. The voltage condition of the distribution system is predicted by the SVM classifier using synchrophasor measurement data. The controllers equipped with wind turbine generators are triggered by the prediction results. Both transmission level and distribution level are designed based on this proposed approach. Considering economic issues in the power system, a statistical scheduling approach to economic dispatch and energy reserves is proposed. The proposed approach focuses on minimizing the overall power operating cost with considerations of renewable energy uncertainty and power system security. The hybrid power system scheduling is formulated as a convex programming problem to minimize power operating cost, taking considerations of renewable energy generation, power generation-consumption balance and power system security. A genetic algorithm based approach is used for solving the minimization of the power operating cost. In addition, with technology development, it can be predicted that the renewable energy such as wind turbine generators and PV panels will be pervasively located in distribution systems. The distribution system is an unbalanced system, which contains single-phase, two-phase and three-phase loads, and distribution lines. The complex configuration brings a challenge to power flow calculation. A topology analysis based iterative approach is used to solve this problem. In this approach, a self-adaptive topology recognition method is used to analyze the distribution system, and the backward/forward sweep algorithm is used to generate the power flow results. Finally, for the numerical simulations, the IEEE 14-bus, 30-bus, 39-bus and 118-bus systems are studied for fault detection, identification and location. Both transmission level and distribution level models are employed with the proposed control strategy for voltage stability of renewable energy integration. The simulation results demonstrate the effectiveness of the proposed methods. The IEEE 24-bus reliability test system (IEEE-RTS), which is commonly used for evaluating the price stability and reliability of power system, is used as the test bench for verifying and evaluating system performance of the proposed scheduling approach.

  1. Cyber security issues in online games

    NASA Astrophysics Data System (ADS)

    Zhao, Chen

    2018-04-01

    With the rapid development of the Internet, online gaming has become a way of entertainment for many young people in the modern era. However, in recent years, cyber security issues in online games have emerged in an endless stream, which have also caused great attention of many game operators. Common cyber security problems in the game include information disclosure and cyber-attacks. These problems will directly or indirectly cause economic losses to gamers. Many gaming companies are enhancing the stability and security of their network or gaming systems in order to enhance the gaming user experience. This article has carried out the research of the cyber security issues in online games by introducing the background and some common cyber security threats, and by proposing the latent solution. Finally, it speculates the future research direction of the cyber security issues of online games in the hope of providing feasible solution and useful information for game operators.

  2. A History of Sandia’s Water Decision Modeling and Analysis Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lowry, Thomas Stephen; Pate, Ronald C.

    This document provides a brief narrative, and selected project descriptions, that represent Sandia’s history involving data, modeling, and analysis related to water, energy-water nexus, and energy-water-agriculture nexus within the context of climate change. Sandia National Laboratories has been engaged since the early-1990s with program development involving data, modeling, and analysis projects that address the interdependent issues, risks, and technology-based mitigations associated with increasing demands and stresses being placed on energy, water, and agricultural/food resources, and the related impacts on their security and sustainability in the face of both domestic and global population growth, expanding economic development, and climate change.

  3. Water-energy-food nexus: concepts, questions and methodologies

    NASA Astrophysics Data System (ADS)

    Li, Y.; Chen, X.; Ding, W.; Zhang, C.; Fu, G.

    2017-12-01

    The term of water-energy -food nexus has gained increasing attention in the research and policy making communities as the security of water, energy and food becomes severe under changing environment. Ignorance of their closely interlinkages accompanied by their availability and service may result in unforeseeable, adverse consequences. This paper comprehensively reviews the state-of-the-art in the field of water-energy-food, with a focus on concepts, research questions and methodologies. First, two types of nexus definition are compared and discussed to understand the essence of nexus research issues. Then, three kinds of nexus research questions are presented, including internal relationship analysis, external impact analysis, and evaluation of the nexus system. Five nexus modelling approaches are discussed in terms of their advantages, disadvantages and application, with an aim to identify research gaps in current nexus methods. Finally, future research areas and challenges are discussed, including system boundary, data uncertainty and modelling, underlying mechanism of nexus issues and system performance evaluation. This study helps bring research efforts together to address the challenging questions in the nexus and develop the consensus on building resilient water, energy and food systems.

  4. Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ashok, Aditya; Govindarasu, Manimaran; Wang, Jianhui

    Cyber security and resiliency of Wide-Area Monitoring, Protection and Control (WAMPAC) applications is critically important to ensure secure, reliable, and economic operation of the bulk power system. WAMPAC relies heavily on the security of measurements and control commands transmitted over wide-area communication networks for real-time operational, protection, and control functions. Also, the current “N-1 security criteria” for grid operation is inadequate to address malicious cyber events and therefore it is important to fundamentally redesign WAMPAC and to enhance Energy Management System (EMS) applications to make them attack-resilient. In this paper, we propose an end-to-end defense-in-depth architecture for attack-resilient WAMPAC thatmore » addresses resilience at both the infrastructure layer and the application layers. Also, we propose an attack-resilient cyber-physical security framework that encompasses the entire security life cycle including risk assessment, attack prevention, attack detection, attack mitigation, and attack resilience. The overarching objective of this paper is to provide a broad scope that comprehensively describes most of the major research issues and potential solutions in the context of cyber-physical security of WAMPAC for the power grid.« less

  5. 17 CFR 240.19c-4 - Governing certain listing or authorization determinations by national securities exchanges and...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...

  6. 17 CFR 240.19c-4 - Governing certain listing or authorization determinations by national securities exchanges and...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...

  7. 17 CFR 240.19c-4 - Governing certain listing or authorization determinations by national securities exchanges and...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...

  8. 17 CFR 240.19c-4 - Governing certain listing or authorization determinations by national securities exchanges and...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...

  9. 17 CFR 240.19c-4 - Governing certain listing or authorization determinations by national securities exchanges and...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...

  10. 17 CFR 239.34 - Form F-4, for registration of securities of foreign private issuers issued in certain business...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form F-4, for registration of securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239.34 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORMS PRESCRIBED UNDER THE...

  11. Quantitative analysis of Indonesia's reserves and energy security as an evaluation by the nation in facing global competition

    NASA Astrophysics Data System (ADS)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede

    2015-12-01

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy proposed in this study, Indonesia energy security for 2025 could be improved to ranked 8 of 11 countries, better than Malaysia, Thailand and Singapore.

  12. Quantitative analysis of Indonesia’s reserves and energy security as an evaluation by the nation in facing global competition

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Selfmore » Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy proposed in this study, Indonesia energy security for 2025 could be improved to ranked 8 of 11 countries, better than Malaysia, Thailand and Singapore.« less

  13. Central Asia: Regional Developments and Implications for U.S. Interests

    DTIC Science & Technology

    2012-05-18

    Representatives, Committee on International Relations, Subcommittee on the Middle East and Central Asia, Assessing Energy and Security Issues in Central Asia...Akiner, Violence in Andijon, 13 May 2005: An Independent Assessment , Central Asia-Caucasus Institute, July 2005; AbduMannob Polat, Reassessing Andijan...observers warn that Islamic extremism could increase dramatically in the region, others discount the risk that the existing secular governments soon

  14. Russian Political, Economic, and Security Issues and U.S. Interests

    DTIC Science & Technology

    2008-03-04

    global energy company. Khodorkovski criticized some of Putin’s actions , financed anti-Putin political parties, and hinted that he might enter politics...Yeltsin’s decline. Lukashenko unconstitutionally removed the parliamentary opposition in 1996 and strongly opposes market reform in Belarus, making...government in Tallinn, and called upon the EU to protest Estonia’s actions . This was accompanied by extensive cyber attacks against Estonian government and

  15. Russian Political, Economic, and Security Issues and U.S. Interests

    DTIC Science & Technology

    2008-07-28

    energy company. Khodorkovski criticized some of Putin’s actions , financed anti-Putin political parties, and hinted that he might enter politics in...have hoped for a leading role in a unified state during Yeltsin’s decline. Lukashenko unconstitutionally removed the parliamentary opposition in 1996...Estonia’s actions . This was accompanied by extensive cyber attacks against Estonian government and commercial websites. The Russian state railway

  16. Worldwide Emerging Environmental Issues Affecting the U.S. Military. January 2009

    DTIC Science & Technology

    2009-01-01

    islands as a consequence of climate change effects. Coastal residents of Fiji were instructed to move to higher ground to avoid storms and flooding...environmental matters from energy security to international cooperation for addressing climate change . [See Appendix for more detail]. Military...military environmental programs could receive higher profiles. Since climate change is a new top priority, the military should identify all its resources

  17. 77 FR 63380 - Self-Regulatory Organizations; NYSE Arca, Inc.; Order Granting Approval of Proposed Rule Change...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-16

    ... purchase fixed income securities issued by U.S. or foreign corporations \\6\\ or financial institutions... also may purchase securities issued or guaranteed by the U.S. Government or foreign governments... (``CMOs'').\\8\\ The Fund may purchase or sell securities on a when issued, delayed delivery or forward...

  18. Defining Information Security.

    PubMed

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  19. EU energy policies achievement by industries in decentralized areas

    NASA Astrophysics Data System (ADS)

    Destro, Nicola; Stoppato, Anna; Benato, Alberto; Schiro, Fabio

    2017-11-01

    Energy Roadmap outlined by the European Commission sets out several routes for a more sustainable, competitive and secure energy system in 2050. All the outlined scenarios consider energy efficiency, renewable energy, nuclear energy and carbon capture and storage. In this paper, more attention has been devoted to the energy efficiency issue, by the identification of new micro and small networks opportunity fed by hybrid plants in the North-East of Italy. National energy balance and national transmission system operator data allowed to collect industrial energy consumptions data on the investigated area. Applying industrial statistics to the local energy needs allows to collect a dataset including consumption information by factory and by company structure (size and employees) for each industrial sector highlighting the factory density in the area. Preliminary outcomes from the model address to the exploitation of local by-product for energy purposes.

  20. Energy, Vacuum, Gas Fueling, and Security Systems for the Spherical Tokamak MEDUSA-CR

    NASA Astrophysics Data System (ADS)

    Gonzalez, Jeferson; Soto, Christian; Carvajal, Johan; Ribeiro, Celso

    2013-10-01

    The former spherical tokamak (ST) MEDUSA (Madison EDUcation Small Aspect.ratio tokamak, R < 0.14 m, a < 0.10 m, BT < 0.5 T, Ip < 40 kA, 3 ms pulse) is being recommissioned in Costa Rica Institute of Technology. The main objectives of the MEDUSA-CR project are training and to clarify several issues in relevant physics for conventional and mainly STs, including beta studies in bean-shaped ST plasmas, transport, heating and current drive via Alfvén wave, and natural divertor STs with ergodic magnetic limiter. We present here the energy, vacuum, gas fueling, and security systems for MEDUSA-CR device. The interface with the control and data acquisition systems based on National Instruments (NI) software (LabView) and hardware (on loan to our laboratory via NI-Costa Rica) are also presented. VIE-ITCR, IAEA-CRP contract 17592, National Instruments of Costa Rica.

  1. Science and Technology Resources on the Internet: Computer Security.

    ERIC Educational Resources Information Center

    Kinkus, Jane F.

    2002-01-01

    Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…

  2. School Violence: Physical Security.

    ERIC Educational Resources Information Center

    Utah State Office of Education, Salt Lake City.

    This booklet provides an overview of security technology product areas that might be appropriate and affordable for school applications. Topics cover security concepts and operational issues; security issues when designing for new schools; the role of maintenance; video camera use; walk-through metal detectors; duress alarm devices; and a partial…

  3. Leveraging the water-energy-food nexus for a sustainability transition: Institutional and policy design choices in a fragmented world (Invited)

    NASA Astrophysics Data System (ADS)

    Aggarwal, R.

    2013-12-01

    Given the critical - but often subtle - feedbacks between water, energy, and food security, a nexus approach that integrates management and governance across sectors and scales is increasingly being advocated in research and policy circles. As a first step, such an approach calls for an integrated multi-disciplinary assessment of the externalities across sectors and tradeoffs involved in enhancing security in one sector on the other sectors. Recent research efforts have focused on understanding these tradeoffs, say, through estimating the energy costs of expanding irrigation for greater food security; or estimating the embodied land and water costs in increased energy production. While such efforts have increased awareness about the inter-connectedness of such issues, the fundamental question of how such an understanding influences decision-making and how it can lead to coordinated action towards a transition to more sustainable pathways still remains largely unanswered. The long legacy of sectoral organization of political and bureaucratic structures has led to a fragmentary policy and institutional landscape, on which cross-sectoral public action and coordination poses several challenges. Moreover, poorly defined property rights, imperfect or absent markets, and uncertainty about resource dynamics imply that economic signals about relative scarcity in one sector are not necessarily clear to decision makers in the other sectors. In this study, we examine these issues related to water-energy food nexus in the context of semi-arid groundwater irrigated regions of western and southern India. Using a social-ecological systems framework, we begin by characterizing some of the key inter-dependencies among food, water, and energy at the farm household, village and state level. We then examine the factors that influence decision-making at these levels, and the extent to which these decisions internalize the externalities. Specifically, we examine the role of energy pricing and rationing policy on groundwater withdrawals and type of crops grown. Finally, we examine several emerging examples of innovative policies and institutions that have leveraged the synergies among sectors. Although these examples do not necessarily provide optimal solutions, these provide some clues as to how decision- making within individual sectors can be influenced through institutional and policy design to transition towards more sustainable pathways in a second best world. We conclude by exploring what lessons these cases might hold for navigating these tradeoffs in other contexts.

  4. Energy System Integration Facility Secure Data Center | Energy Systems

    Science.gov Websites

    Integration Facility | NREL Energy System Integration Facility Secure Data Center Energy System Integration Facility Secure Data Center The Energy Systems Integration Facility's Secure Data Center provides

  5. Transportation Security: Issues for the 111th Congress

    DTIC Science & Technology

    2009-05-15

    results of covert testing of airport security checkpoints demonstrating deficiencies in detecting improvised explosives and incendiary devices...34 A key issue in the debate over aviation security immediately following September 11, 2001, was whether airport security screeners should be...intentional wrongdoing on the part of airport security screeners, whether they be federal or private. Nonetheless, while the pilot program airports

  6. Global Security Contingency Fund: Summary and Issue Overview

    DTIC Science & Technology

    2014-04-04

    Diplomacy and Development Review (QDDR), Washington, D.C., December 2010, p. 203; Gordon Adams and Rebecca Williams, A New Way Forward: Rebalancing ...Williams, A New Way Forward: Rebalancing Security Assistance Programs and (continued...) Global Security Contingency Fund: Summary and Issue Overview...a large security assistance portfolio . But others may point to the State Department’s creation of new programs under the Security Assistance

  7. Energy security impacts of a severe drought on the future Finnish energy system.

    PubMed

    Jääskeläinen, Jaakko; Veijalainen, Noora; Syri, Sanna; Marttunen, Mika; Zakeri, Behnam

    2018-07-01

    Finland updated its Energy and Climate Strategy in late 2016 with the aim of increasing the share of renewable energy sources, increasing energy self-sufficiency and reducing greenhouse gas emissions. Concurrently, the issue of generation adequacy has grown more topical, especially since the record-high demand peak in Finland in January 2016. This paper analyses the Finnish energy system in years 2020 and 2030 by using the EnergyPLAN simulation tool to model whether different energy policy scenarios result in a plausible generation inadequacy. Moreover, as the Nordic energy system is so heavily dependent on hydropower production, we model and analyse the impacts of a severe drought on the Finnish energy system. We simulate hydropower availability according to the weather of the worst drought of the last century (in 1939-1942) with Finnish Environment Institute's Watershed Simulation and Forecasting System and we analyse the indirect impacts via reduced availability of electricity imports based on recent realised dry periods. Moreover, we analyse the environmental impacts of hydropower production during the drought and peak demand period and the impacts of climate change on generation adequacy in Finland. The results show that the scenarios of the new Energy and Climate Strategy result in an improved generation adequacy comparing to the current situation. However, a severe drought similar to that experienced in 1940s could cause a serious energy security threat. Copyright © 2018 Elsevier Ltd. All rights reserved.

  8. Current Capabilities at SNL for the Integration of Small Modular Reactors onto Smart Microgrids Using Sandia's Smart Microgrid Technology High Performance Computing and Advanced Manufacturing.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rodriguez, Salvador B.

    Smart grids are a crucial component for enabling the nation’s future energy needs, as part of a modernization effort led by the Department of Energy. Smart grids and smart microgrids are being considered in niche applications, and as part of a comprehensive energy strategy to help manage the nation’s growing energy demands, for critical infrastructures, military installations, small rural communities, and large populations with limited water supplies. As part of a far-reaching strategic initiative, Sandia National Laboratories (SNL) presents herein a unique, three-pronged approach to integrate small modular reactors (SMRs) into microgrids, with the goal of providing economically-competitive, reliable, andmore » secure energy to meet the nation’s needs. SNL’s triad methodology involves an innovative blend of smart microgrid technology, high performance computing (HPC), and advanced manufacturing (AM). In this report, Sandia’s current capabilities in those areas are summarized, as well as paths forward that will enable DOE to achieve its energy goals. In the area of smart grid/microgrid technology, Sandia’s current computational capabilities can model the entire grid, including temporal aspects and cyber security issues. Our tools include system development, integration, testing and evaluation, monitoring, and sustainment.« less

  9. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued or maintained?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... government and international agencies and foreign central banks. In their accounts, depository institutions... BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS... Direct®—into which we issue marketable Treasury securities. We maintain and transfer securities in these...

  10. Web Services Security - Implementation and Evaluation Issues

    NASA Astrophysics Data System (ADS)

    Pimenidis, Elias; Georgiadis, Christos K.; Bako, Peter; Zorkadis, Vassilis

    Web services development is a key theme in the utilization the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and they way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. Being able to evaluate the level of security offered is a desirable feature for any prospective participant. The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.

  11. 17 CFR 239.23 - Form N-14, for the registration of securities issued in business combination transactions by...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... registration of securities issued in business combination transactions by investment companies and business development companies. 239.23 Section 239.23 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... companies and business development companies. This form shall be used by a registered investment company or...

  12. 76 FR 34920 - Exemptions for Security-Based Swaps Issued by Certain Clearing Agencies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-15

    ... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 230, 240 and 260 [Release Nos. 33-9222; 34-64639; 39-2474; File No. S7-22-11] RIN 3235-AL16 Exemptions for Security-Based Swaps Issued by Certain Clearing Agencies AGENCY: Securities and Exchange Commission. ACTION: Proposed rules. SUMMARY: We are...

  13. 78 FR 42989 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-18

    ... Important Notice of the availability of the comparison service for when-issued corporate securities.\\5\\ \\5... scheduled to be implemented for corporate when-issued securities and NSCC would submit a rule filing to the... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69980; File No. SR-NSCC-2013-09] Self...

  14. The Strategic Petroleum Reserve: United States energy security, oil politics, and petroleum reserves policies in the twentieth century

    NASA Astrophysics Data System (ADS)

    Beaubouef, Bruce Andre

    The history of U.S. petroleum reserves policies in the twentieth century, including the Strategic Petroleum Reserve (SPR) program, provides a case study of the economic and political aspects of national security, and shows the ways in which the American political economy influences national security. One key problem plagued federal petroleum reserve programs and proposals throughout the twentieth century. In a political economy which traditionally placed strong emphasis upon the sanctity of private property and free markets, could the government develop an emergency petroleum reserve policy despite opposition from the private sector? Previous literature on the SPR and oil-stockpiling programs has largely disregarded the historical perspective, focusing instead upon econometric models, suggesting future oil-stockpiling policy options. This study will also make conclusions about the future of governmental oil-stockpiling policies, particularly with regard to the SPR program, but it will do so informed by a systematic history of the emergency petroleum reserve impulse in the twentieth century. Through a study of the emergency petroleum reserve impulse, one can see how the American political economy of oil and energy changed over the twentieth century. As petroleum became crucial to the military and then economic security of the United States, the federal government sought to develop emergency petroleum reserves first for the military, then for the civilian economy. But while the American petroleum industry could deliver the energy "goods" to American energy consumers at a reasonable price, the companies reigned supreme in the political equation. While that was true, federal petroleum reserve programs and proposals conflicted with and were overwhelmed by the historic American tradition of individual economic and private property rights. The depletion of American petroleum reserves changed that political equation, and the ensuing energy crises of the 1970s not only brought the issue of national energy autonomy into the realm of national security considerations, but also allowed for an unprecedented level of government intervention into the marketplace of oil and energy in peacetime. The federal government assumed the role of protecting and serving the interests of energy consumers, a role which had previously been the sole purview of the private sector. What resulted was a complex, chaotic, and controversial regulatory nightmare that highlighted the deficiencies of micro-management, and stoked the political momentum for deregulation in the 1980s, which continued into the 1990s. Gradually, government micro-management of the energy economy was abandoned. That left the SPR, a passive, market-conforming policy tool as the government's primary mechanism for combating energy crises. (Abstract shortened by UMI.)

  15. Incorporating voltage security into the planning, operation and monitoring of restructured electric energy markets

    NASA Astrophysics Data System (ADS)

    Nair, Nirmal-Kumar

    As open access market principles are applied to power systems, significant changes are happening in their planning, operation and control. In the emerging marketplace, systems are operating under higher loading conditions as markets focus greater attention to operating costs than stability and security margins. Since operating stability is a basic requirement for any power system, there is need for newer tools to ensure stability and security margins being strictly enforced in the competitive marketplace. This dissertation investigates issues associated with incorporating voltage security into the unbundled operating environment of electricity markets. It includes addressing voltage security in the monitoring, operational and planning horizons of restructured power system. This dissertation presents a new decomposition procedure to estimate voltage security usage by transactions. The procedure follows physical law and uses an index that can be monitored knowing the state of the system. The expression derived is based on composite market coordination models that have both PoolCo and OpCo transactions, in a shared stressed transmission grid. Our procedure is able to equitably distinguish the impacts of individual transactions on voltage stability, at load buses, in a simple and fast manner. This dissertation formulates a new voltage stability constrained optimal power flow (VSCOPF) using a simple voltage security index. In modern planning, composite power system reliability analysis that encompasses both adequacy and security issues is being developed. We have illustrated the applicability of our VSCOPF into composite reliability analysis. This dissertation also delves into the various applications of voltage security index. Increasingly, FACT devices are being used in restructured markets to mitigate a variety of operational problems. Their control effects on voltage security would be demonstrated using our VSCOPF procedure. Further, this dissertation investigates the application of steady state voltage stability index to detect potential dynamic voltage collapse. Finally, this dissertation examines developments in representation, standardization, communication and exchange of power system data. Power system data is the key input to all analytical engines for system operation, monitoring and control. Data exchange and dissemination could impact voltage security evaluation and therefore needs to be critically examined.

  16. INVITED PAPER: Low power cryptography

    NASA Astrophysics Data System (ADS)

    Kitsos, P.; Koufopavlou, O.; Selimis, G.; Sklavos, N.

    2005-01-01

    Today more and more sensitive data is stored digitally. Bank accounts, medical records and personal emails are some categories that data must keep secure. The science of cryptography tries to encounter the lack of security. Data confidentiality, authentication, non-reputation and data integrity are some of the main parts of cryptography. The evolution of cryptography drove in very complex cryptographic models which they could not be implemented before some years. The use of systems with increasing complexity, which usually are more secure, has as result low throughput rate and more energy consumption. However the evolution of cipher has no practical impact, if it has only theoretical background. Every encryption algorithm should exploit as much as possible the conditions of the specific system without omitting the physical, area and timing limitations. This fact requires new ways in design architectures for secure and reliable crypto systems. A main issue in the design of crypto systems is the reduction of power consumption, especially for portable systems as smart cards.

  17. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.

    PubMed

    Nirmal Raja, K; Maraline Beno, M

    2017-07-01

    In the wireless sensor network(WSN) security is a major issue. There are several network security schemes proposed in research. In the network, malicious nodes obstruct the performance of the network. The network can be vulnerable by Sybil attack. When a node illicitly assertions multiple identities or claims fake IDs, the WSN grieves from an attack named Sybil attack. This attack threatens wireless sensor network in data aggregation, synchronizing system, routing, fair resource allocation and misbehavior detection. Henceforth, the research is carried out to prevent the Sybil attack and increase the performance of the network. This paper presents the novel security mechanism and Fujisaki Okamoto algorithm and also application of the work. The Fujisaki-Okamoto (FO) algorithm is ID based cryptographic scheme and gives strong authentication against Sybil attack. By using Network simulator2 (NS2) the scheme is simulated. In this proposed scheme broadcasting key, time taken for different key sizes, energy consumption, Packet delivery ratio, Throughput were analyzed.

  18. China’s Pursuit of Africa’s Natural Resources, (CSL Issue Paper, Volume 1-09, June 2009)

    DTIC Science & Technology

    2009-06-01

    beyond recovery, and mineral exploitation has generated significant pollution that has rendered agricultural land infertile and given rise to social...heard. Then-South African President Thabo Mbeki cautioned China against dumping its low-cost textile and plastics products in Africa, thus denying...energy-security-asem- beijing -financial-crisis (accessed December 5, 2008). African Politics Portal. 2008. Top Ten Misconceptions about Chinese

  19. Central Asia: Regional Developments and Implications for U.S. Interests

    DTIC Science & Technology

    2012-01-03

    Central Asia, Assessing Energy and Security Issues in Central Asia, Testimony of Steven Mann, Principal Deputy Assistant Secretary for South and...Akiner, Violence in Andijon, 13 May 2005: An Independent Assessment , Central Asia-Caucasus Institute, July 2005; AbduMannob Polat, Reassessing Andijan...dramatically in the region, others discount the risk that the existing secular governments soon will be overthrown by Islamic extremists.57 In the case

  20. CTC Sentinel. Volume 9, Issue 3

    DTIC Science & Technology

    2016-03-01

    International Terror Andrew Watkins 19 The Islamic State Threat to Britain: Evidence from Recent Terror Trials Raffaello Pantucci PROFILE 24 The Last...a new beachhead for fostering the Islamic State’s regional extremism.” Andrew Watkins explores why there may be a strong correlation between...offensive Andrew Watkins is an energy and security analyst for the Iraq Oil Report. He spent four years working as a senior lecturer at the American

  1. Russian Political, Economic, and Security Issues and U.S. Interests

    DTIC Science & Technology

    2008-08-26

    concerns and on nuclear non-proliferation in general. Russia’s actions in Georgia, however, could be a turning point in U.S.-Russian relations...Russia’s actions also arouse anxiety in other Soviet successor states, especially those with large Russian minorities, such as Ukraine and Kazakhstan...transforming Yukos into a major global energy company. Khodorkovski criticized some of Putin’s actions , financed anti-Putin political parties, and hinted

  2. Russian Political, Economic, and Security Issues and U.S. Interests

    DTIC Science & Technology

    2008-10-06

    concerns and on nuclear non-proliferation in general. Russia’s actions in Georgia, however, could be a turning point in U.S.-Russian relations. Russia’s... actions also arouse anxiety in other Soviet successor states, especially those with large Russian minorities, such as Ukraine and Kazakhstan...into a major global energy company. Khodorkovski criticized some of Putin’s actions , financed anti-Putin political parties, and hinted that he might

  3. Forging the Solution to the Energy Challenge: The Role of Materials Science and Materials Scientists

    NASA Astrophysics Data System (ADS)

    Wadsworth, Jeffrey

    2010-04-01

    The energy challenge is central to the most important strategic problems facing the United States and the world. It is increasingly clear that even large-scale deployments of the best technologies available today cannot meet the rising energy demands of a growing world population. Achieving a secure and sustainable energy future will require full utilization of, and substantial improvements in, a comprehensive portfolio of energy systems and technologies. This goal is complicated by several factors. First, energy strategies are inextricably linked to national security and health issues. Second, in developing and deploying energy technologies, it is vital to consider not only environmental issues, such as global climate change, but also economic considerations, which strongly influence both public and political views on energy policy. Third, a significant and sustained effort in basic and applied research and development (R&D) will be required to deliver the innovations needed to ensure a desirable energy future. Innovations in materials science and engineering are especially needed to overcome the limits of essentially all energy technologies. A wealth of historical evidence demonstrates that such innovations are also the key to economic prosperity. From the development of the earliest cities around flint-trading centers, to the Industrial Revolution, to today’s silicon-based global economy, the advantage goes to those who lead in exploiting materials. I view our challenge by considering the rate of innovation and the transition of discovery to the marketplace as the relationship among R&D investment, a skilled and talented workforce, business innovations, and the activities of competitors. Most disturbing in analyzing this relationship is the need for trained workers in science, technology, engineering, and mathematics (STEM). To develop the STEM workforce needed for innovation, we need sustainable, positive change in STEM education at all levels from preschool through postgraduate. Materials sciences can be a significant magnet in attracting students to STEM areas, and a focused effort is needed to ensure that it is included in STEM programs. From this effort will come the next generation of materials scientists and the innovations that will enable us to overcome the energy challenge.

  4. Forging the Solution to the Energy Challenge: The Role of Materials Science and Materials Scientists

    NASA Astrophysics Data System (ADS)

    Wadsworth, Jeffrey

    2010-05-01

    The energy challenge is central to the most important strategic problems facing the United States and the world. It is increasingly clear that even large-scale deployments of the best technologies available today cannot meet the rising energy demands of a growing world population. Achieving a secure and sustainable energy future will require full utilization of, and substantial improvements in, a comprehensive portfolio of energy systems and technologies. This goal is complicated by several factors. First, energy strategies are inextricably linked to national security and health issues. Second, in developing and deploying energy technologies, it is vital to consider not only environmental issues, such as global climate change, but also economic considerations, which strongly influence both public and political views on energy policy. Third, a significant and sustained effort in basic and applied research and development (R&D) will be required to deliver the innovations needed to ensure a desirable energy future. Innovations in materials science and engineering are especially needed to overcome the limits of essentially all energy technologies. A wealth of historical evidence demonstrates that such innovations are also the key to economic prosperity. From the development of the earliest cities around flint-trading centers, to the Industrial Revolution, to today’s silicon-based global economy, the advantage goes to those who lead in exploiting materials. I view our challenge by considering the rate of innovation and the transition of discovery to the marketplace as the relationship among R&D investment, a skilled and talented workforce, business innovations, and the activities of competitors. Most disturbing in analyzing this relationship is the need for trained workers in science, technology, engineering, and mathematics (STEM). To develop the STEM workforce needed for innovation, we need sustainable, positive change in STEM education at all levels from preschool through postgraduate. Materials sciences can be a significant magnet in attracting students to STEM areas, and a focused effort is needed to ensure that it is included in STEM programs. From this effort will come the next generation of materials scientists and the innovations that will enable us to overcome the energy challenge.

  5. Brookhaven National Laboratory Institutional Plan FY2001--FY2005

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Davis, S.

    Brookhaven National Laboratory is a multidisciplinary laboratory in the Department of Energy National Laboratory system and plays a lead role in the DOE Science and Technology mission. The Laboratory also contributes to the DOE missions in Energy Resources, Environmental Quality, and National Security. Brookhaven strives for excellence in its science research and in facility operations and manages its activities with particular sensitivity to environmental and community issues. The Laboratory's programs are aligned continuously with the goals and objectives of the DOE through an Integrated Planning Process. This Institutional Plan summarizes the portfolio of research and capabilities that will assure successmore » in the Laboratory's mission in the future. It also sets forth BNL strategies for our programs and for management of the Laboratory. The Department of Energy national laboratory system provides extensive capabilities in both world class research expertise and unique facilities that cannot exist without federal support. Through these national resources, which are available to researchers from industry, universities, other government agencies and other nations, the Department advances the energy, environmental, economic and national security well being of the US, provides for the international advancement of science, and educates future scientists and engineers.« less

  6. Power Hardware-in-the-Loop (PHIL) Testing Facility for Distributed Energy Storage (Poster)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Neubauer.J.; Lundstrom, B.; Simpson, M.

    2014-06-01

    The growing deployment of distributed, variable generation and evolving end-user load profiles presents a unique set of challenges to grid operators responsible for providing reliable and high quality electrical service. Mass deployment of distributed energy storage systems (DESS) has the potential to solve many of the associated integration issues while offering reliability and energy security benefits other solutions cannot. However, tools to develop, optimize, and validate DESS control strategies and hardware are in short supply. To fill this gap, NREL has constructed a power hardware-in-the-loop (PHIL) test facility that connects DESS, grid simulator, and load bank hardware to a distributionmore » feeder simulation.« less

  7. Better Safe than Sorry: Panic Buttons as a Security Measure in an Academic Medical Library

    ERIC Educational Resources Information Center

    McMullen, Karen D.; Kane, Laura Townsend

    2008-01-01

    In the wake of recent tragedies, campus security has become a hot issue nationwide. Campus libraries, as traditional meeting spots for varied groups of people, are particularly vulnerable to security issues. Safety and security problems that can occur at any library generally include theft, vandalism, arson, antisocial behavior, and assaults on…

  8. 17 CFR 239.25 - Form S-4, for the registration of securities issued in business combination transactions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form S-4, for the registration of securities issued in business combination transactions. 239.25 Section 239.25 Commodity and... business combination transactions. This form may be used for registration under the Securities Act of 1933...

  9. Close the Gate, Lock the Windows, Bolt the Doors: Securing Library Computers. Online Treasures

    ERIC Educational Resources Information Center

    Balas, Janet

    2005-01-01

    This article, written by a systems librarian at the Monroeville Public Library, discusses a major issue affecting all computer users, security. It indicates that while, staying up-to-date on the latest security issues has become essential for all computer users, it's more critical for network managers who are responsible for securing computer…

  10. Updating energy security and environmental policy: Energy security theories revisited.

    PubMed

    Proskuryakova, L

    2018-06-18

    The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  11. Policy and effective action for soil security: a need for reframing the soil story

    NASA Astrophysics Data System (ADS)

    Bouma, Johan

    2015-07-01

    Soil science is a vital scientific discipline producing cutting-edge research in its various sub-disciplines. Its role in studying major environmental issues, often defined as food security, water and energy availability, climate change and biodiversity loss, is, however, less obvious to stakeholders, policy makers and the public at large. It deserves better. Reframing the soil story by taking a pro-active interdisciplinary approach in demonstrating the role of soils when studying these issues is advocated in the context of the ten Sustainable Development Goals. Soil change matters not only in a negative way when referring to erosion and degradation but also, and particularly, to soil improvement. But only successfully completed programs in practice will be convincing and that's why an active role of soil researchers and soil scientists, acting as knowledge brokers, is advocated in transdisciplinary programs. This includes more emphasis on preparation and implementation than is allowed in current programs. A case study is presented and a narrative is used to link the five major environmental issues in a logical sequence, showing their interdependence. Current soil research and education programs should reflect demands made by inter- and transdisciplinary approaches and need a new, fresh approach.

  12. Energy—Water Interdependence

    NASA Astrophysics Data System (ADS)

    Moran, E. H.; Tindall, J. A.; Campbell, A. A.

    2010-12-01

    ABSTRACT Energy and water security and sustainability have become a national and global priority. The continued security and economic health of any country depends on a sustainable supply of both energy and water because these two critical natural resources are inexorably linked. The production of energy requires large volumes of water while the treatment and distribution of water is equally dependent upon readily available, low-cost energy. In the U.S. and other countries, irrigated agriculture and thermoelectric generation withdrawals of fresh water are approximately equal however; they are growing due to increasing population. Within the U.S. electricity production requires about 190,000 million gallons of freshwater per day, accounting for over 40 percent of all daily freshwater withdrawals in the U.S. The indirect use of water (home lighting and electric appliances) is approximately equal to its direct use (watering lawns and taking showers). Current trends of water use and availability suggest that meeting future water and energy demands to support continued economic global development will require improved utilization and management of both energy and water resources. Primary concerns include: (1) Increasing populations require more food and energy; this may cause direct competition between the two largest water users for limited water resources (energy and agriculture); (2) Population growth and economic expansion projections indicate the U.S. alone will require an additional 393,000 MW of new generating capacity (equivalent to about 1,000 new 400 MW plants) by the year 2020 - other countries particularly India and China have similar trends; and (3) Potential environmental and ecological restrictions on the use of water for power generation such as the restrictions on cooling water withdrawals and cooling water use for nuclear power plants to protect aquatic species and habitat and the environment may reduce usable supplies. The U.S. and other Nation's abilities to meet the increasing demand for affordable water and energy are being seriously challenged by these emerging issues. This research presents potential solutions for security and sustainability of these systems, which are a pressing global priority.

  13. Sustainable Biofuel Crops Project, Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Juhn, Daniel; Grantham, Hedley

    2014-05-28

    Over the last six years, the Food and Agriculture Organization of the United Nations (FAO) has developed the Bioenergy and Food Security (BEFS) Approach to help countries design and implement sustainable bioenergy policies and strategies. The BEFS Approach consists of two sets of multidisciplinary and integrated tools and guidance (the BEFS Rapid Appraisal and the BEFS Detailed Analysis) to facilitate better decision on bioenergy development which should foster both food and energy security, and contribute to agricultural and rural development. The development of the BEFS Approach was for the most part funded by the German Federal Ministry of Food andmore » Agriculture. Recognizing the need to provide support to countries that wanted an initial assessment of their sustainable bioenergy potential, and of the associated opportunities, risks and trade offs, FAO began developing the BEFS-RA (Rapid Appraisal). The BEFS RA is a spreadsheet–based assessment and analysis tool designed to outline the country's basic energy, agriculture and food security context, the natural resources potential, the bioenergy end use options, including initial financial and economic implications, and the identification of issues that might require fuller investigation with the BEFS Detailed Analysis.« less

  14. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    PubMed Central

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-01

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443

  15. Design and Development of Layered Security: Future Enhancements and Directions in Transmission.

    PubMed

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-06

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.

  16. Computer Security Issues in Online Banking: An Assessment from the Context of Usable Security

    NASA Astrophysics Data System (ADS)

    Mahmadi, FN; Zaaba, ZF; Osman, A.

    2016-11-01

    Today's online banking is a convenient mode of finance management. Despite the ease of doing online banking, there are people that still sceptical in utilizing it due to perception and its security. This paper highlights the subject of online banking security in Malaysia, especially from the perspective of the end-users. The study is done by assessing human computer interaction, usability and security. An online survey utilising 137 participants was previously conducted to gain preliminary insights on security issues of online banking in Malaysia. Following from those results, 37 participants were interviewed to gauge deeper understanding about end-users perception on online banking within the context of usable security. The results suggested that most of the end-users are continuingly experiencing significant difficulties especially in relation to the technical terminologies, security features and other technical issues. Although the security features are provided to provide a shield or protection, users are still incapable to cope with the technical aspects of such implementation.

  17. Security Deposits

    DTIC Science & Technology

    1987-04-01

    security deposit action is described in the regulation as follows: h. Security Deposits (DACF and DACA ). (1) Issue. PCS moves create financial hardships...General Wickham, The Army Chief of Staff, specified a philosophy toward the family in the Army Family White Paper. General Wickham’s action was in...security deposits arose. 1 The Army’s action to the issue of security deposits will be thoroughly discussed in this paper. The Army’s action comes now

  18. Inter-organizational future proof EHR systems. A review of the security and privacy related issues.

    PubMed

    van der Linden, Helma; Kalra, Dipak; Hasman, Arie; Talmon, Jan

    2009-03-01

    Identification and analysis of privacy and security related issues that occur when health information is exchanged between health care organizations. Based on a generic scenario questions were formulated to reveal the occurring issues. Possible answers were verified in literature. Ensuring secure health information exchange across organizations requires a standardization of security measures that goes beyond organizational boundaries, such as global definitions of professional roles, global standards for patient consent and semantic interoperable audit logs. As to be able to fully address the privacy and security issues in interoperable EHRs and the long-life virtual EHR it is necessary to realize a paradigm shift from storing all incoming information in a local system to retrieving information from external systems whenever that information is deemed necessary for the care of the patient.

  19. Measuring the embodied energy in drinking water supply systems: a case study in the Great Lakes region.

    PubMed

    Mo, Weiwei; Nasiri, Fuzhan; Eckelman, Matthew J; Zhang, Qiong; Zimmerman, Julie B

    2010-12-15

    A sustainable supply of both energy and water is critical to long-term national security, effective climate policy, natural resource sustainability, and social wellbeing. These two critical resources are inextricably and reciprocally linked; the production of energy requires large volumes of water, while the treatment and distribution of water is also significantly dependent upon energy. In this paper, a hybrid analysis approach is proposed to estimate embodied energy and to perform a structural path analysis of drinking water supply systems. The applicability of this approach is then tested through a case study of a large municipal water utility (city of Kalamazoo) in the Great Lakes region to provide insights on the issues of water-energy pricing and carbon footprints. Kalamazoo drinking water requires approximately 9.2 MJ/m(3) of energy to produce, 30% of which is associated with indirect inputs such as system construction and treatment chemicals.

  20. 17 CFR 210.3-16 - Financial statements of affiliates whose securities collateralize an issue registered or being...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Financial statements of affiliates whose securities collateralize an issue registered or being registered. 210.3-16 Section 210.3-16... aggregate principal amount, par value, or book value of the securities as carried by the registrant, or the...

  1. 17 CFR 210.3-16 - Financial statements of affiliates whose securities collateralize an issue registered or being...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Financial statements of affiliates whose securities collateralize an issue registered or being registered. 210.3-16 Section 210.3-16... aggregate principal amount, par value, or book value of the securities as carried by the registrant, or the...

  2. Local Area Network (LAN) Compatibility Issues

    DTIC Science & Technology

    1991-09-01

    September, 1991 Thesis Advisor: Dr. Norman Schneidewind Approved for public release; distribution is unlimited 92 303s246 Unclassified SECURITY ...CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE Ia. REPORT SECURITY CLASSIFICATION 1 b. RESTRICTIVE MARKINGS unclassified 2a. SECURITY CLASSIFICATION...Work UiNt ACCeLUOn Number 11. TITLE (Include Security Classification) LOCAL AREA NETWORK (LAN) COMPATIBILITY ISSUES 12. PERSONAL AUTHOR(S) Rita V

  3. Environmental Lessons from China: Finding Promising Policies 
in Unlikely Places

    PubMed Central

    Zhang, Junfeng

    2011-01-01

    Background: Alongside the major health risks posed by environmental pollution in China are recent achievements on several environmental issues that have affluent Western nations racing to catch up. The country has propelled itself to a position of leadership in clean energy and efficiency, for instance, with important consequences for public health. Objectives: We comment on China’s challenges and recent accomplishments in addressing environmental problems from domestic pollution to global climate change. We compare China’s commitment to clean energy technology with that of other leading nations and discuss key achievements in other areas, including vehicle efficiency standards and transportation policy. Discussion: We discuss policy directions that would secure much-needed improvements to environmental quality and health in China, along with actions that could motivate global action on issues of energy conservation and pollution reduction. Conclusions: A comprehensive regulatory and institutional framework for environmental policy is within reach in China but will require addressing major hurdles such as the lack of an independent monitoring mechanism and the need for greater transparency and enforcement in environmental matters. Meanwhile, China can continue to set important examples by investing in renewable energy, improving energy efficiency, and limiting greenhouse gas emissions. PMID:21402514

  4. Iris Cryptography for Security Purpose

    NASA Astrophysics Data System (ADS)

    Ajith, Srighakollapu; Balaji Ganesh Kumar, M.; Latha, S.; Samiappan, Dhanalakshmi; Muthu, P.

    2018-04-01

    In today's world, the security became the major issue to every human being. A major issue is hacking as hackers are everywhere, as the technology was developed still there are many issues where the technology fails to meet the security. Engineers, scientists were discovering the new products for security purpose as biometrics sensors like face recognition, pattern recognition, gesture recognition, voice authentication etcetera. But these devices fail to reach the expected results. In this work, we are going to present an approach to generate a unique secure key using the iris template. Here the iris templates are processed using the well-defined processing techniques. Using the encryption and decryption process they are stored, traversed and utilized. As of the work, we can conclude that the iris cryptography gives us the expected results for securing the data from eavesdroppers.

  5. Sandia National Laboratories: Directed-energy tech receives funding to

    Science.gov Websites

    Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research

  6. The nature of international health security.

    PubMed

    Chiu, Ya-Wen; Weng, Yi-Hao; Su, Yi-Yuan; Huang, Ching-Yi; Chang, Ya-Chen; Kuo, Ken N

    2009-01-01

    Health issues occasionally intersect security issues. Health security has been viewed as an essential part of human security. Policymakers and health professionals, however, do not share a common definition of health security. This article aims to characterize the notions of health security in order to clarify what constitutes the nexus of health and security. The concept of health security has evolved over time so that it encompasses many entities. Analyzing the health reports of four multilateral organizations (the United Nations, World Health Organization, Asia-Pacific Economic Cooperation, and the European Union) produced eight categories of most significant relevance to contemporary health security, allowing comparison of the definitions. The four categories are: emerging diseases; global infectious disease; deliberate release of chemical and biological materials; violence, conflict, and humanitarian emergencies. Two other categories of common concern are natural disasters and environmental change, as well as chemical and radioactive accidents. The final two categories, food insecurity and poverty, are discussed less frequently. Nevertheless, food security is emerging as an increasingly important issue in public health. Health security is the first line of defence against health emergencies. As globalization brings more complexities, dealing with the increased scale and extent of health security will require greater international effort and political support.

  7. Center for Integration of Medicine and Innovative Technology. Addendum

    DTIC Science & Technology

    2009-10-01

    development in biomaterials , endoscopic tools, energy delivery, medical imaging, and other novel technologies. 15. SUBJECT TERMS None provided. 16. SECURITY...below. Issues of Concern We have identified a suitable colla borator to conclude the second an d final phase of this project, namely Dr. Gary...patent application will depend on the results of the second phase of t he project, as well as the ex isting int ellectual property on SEE-fitted

  8. 10 CFR 1016.12 - Termination of security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Termination of security facility approval. 1016.12 Section 1016.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.12 Termination of security facility approval. Security facility approval will be terminated...

  9. 10 CFR 1016.12 - Termination of security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Termination of security facility approval. 1016.12 Section 1016.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.12 Termination of security facility approval. Security facility approval will be terminated...

  10. Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications

    NASA Astrophysics Data System (ADS)

    Meyerstein, Mike; Cha, Inhyok; Shah, Yogendra

    The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh look at mobile networks’ security foundations, resting on smart cards. This paper contributes a security/efficiency analysis to this discussion and highlights the role of trusted platform technology to approach these issues.

  11. Concepts, tools/methods, and practices of water-energy-food NEXUS

    NASA Astrophysics Data System (ADS)

    Endo, A.; Tsurita, I.; Orencio, P. M.; Taniguchi, M.

    2014-12-01

    The needs to consider the NEXUS on food and water were emphasized in international dialogues and publications around the end of the 20th century. In fact, in 1983, the United Nations University already launched a Food-Energy Nexus Programme to fill the gaps between the issues of food and energy. The term "NEXUS" to link water, food, and trade was also used in the World Bank during 1990s. The idea of NEXUS is likely to have further developed under the discussion of "virtual water" and "water footprints". With experiencing several international discussions such as Kyoto World Water Forum 2003, scholars and practitioners around the globe acknowledged the need to include energy for the pillars of NEXUS. Finally, the importance of three NEXUS pillars, "water, energy, and food" was officially announced in the BONN 2011 NEXUS Conference, which is a turning point of NEXUS idea in the international community , in order to contribute to the United Nations Conference on Sustainable Development (Rio+20) in 2012 that highlighted the concept of "green economy". The concept of NEXUS is becoming a requisite to achieve sustainable development due to the global concerns embedded in society, economy, and environment. The concept stresses to promote the cooperation with the sectors such as water, energy, food, and climate change since these complex global issues are dependent and inter-connected, which can no longer be solved by the sectorial approaches. The NEXUS practices are currently shared among different stakeholders through various modes including literatures, conferences, workshops, and research projects. However, since the NEXUS practices are not led by a particular organization, its concept, theory, policy, tools, methods, and applications are diverse and incoherent. In terms of tools/methods, the potential of integrated modeling approach is introduced to avoid pressures and to promote interactions among water, energy and food. This paper explores the concepts, tools/methods, and practices of water-energy-food NEXUS to evaluate human environmental security under the RIHN project on "Human-Environmental Security in the Asia-Pacific Ring of Fire: Water-Energy-Food Nexus".

  12. 75 FR 881 - Meeting of Advisory Committee on International Communications and Information Policy

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-06

    ... development issues, international spectrum requirements and harmonization, cyber-security, and data protection... will discuss key issues of importance to U.S. communications policy interests including future... Bureau of Diplomatic Security to enhance the Department's security by tracking visitor traffic and to...

  13. Energy Security: Emerging Challenges and Opportunities

    DTIC Science & Technology

    2010-08-01

    46 Appendix A: Electrical Capacity Margins...options........................................................................................ 21 6 Net electrical capacity compared to the North...Energy Security The Army Energy and Water Campaign Plan for Installations defines energy security as: the capacity to avoid adverse impact of energy

  14. Conservation: Toward firmer ground

    NASA Technical Reports Server (NTRS)

    1975-01-01

    The following aspects of energy conservation were discussed: conservation history and goals, conservation modes, conservation accounting-criteria, and a method to overcome obstacles. The conservation modes tested fall into one of the following categories: reduced energy consumption, increased efficiency of energy utilization, or substitution of one or more forms of energy for another which is in shorter supply or in some sense thought to be of more value. The conservation accounting criteria include net energy reduction, economic, and technical criteria. A method to overcome obstacles includes (approaches such as: direct personal impact (life style, income, security, aspiration), an element of crisis, large scale involvement of environmental, safety, and health issues, connections to big government, big business, big politics, involvement of known and speculative science and technology, appeal to moral and ethical standards, the transient nature of opportunities to correct the system.

  15. Carbon nanotube nanostructured hybrid materials systems for renewable energy applications

    NASA Astrophysics Data System (ADS)

    Marquis, Fernand D. S.

    2011-01-01

    Global energy demand is growing at an alarming and unsustainable rate, drawing mainly on the use of fossil fuels. These reserves are decreasing rapidly and becoming increasingly expensive. The associated emissions of greenhouse gases and other toxic pollutants are becoming environmentally unacceptable. Energy security has become a major issue as fossil fuels are confined to few areas in the world and their availability is controlled by political, economic, and ecological factors. A global coherent energy strategy that encompasses the entire energy life cycle is required in order to address all the forms of energy harvesting, storage, conversion, transmission, and distribution. Hybrid nanomaterial systems hold the key to fundamental advances in direct renewable energy and energy storage and conversion which are needed to enable renewable energy and meet the general energy challenges and associated environmental effects. This paper presents new approaches and methodologies used to design and develop carbon nanotube nanostructured hybrid nanomaterial systems incorporating structural and light-absorbing electron donor polymers, inorganic semiconductors, metallic and ceramic nanoparticles as energy harvesting and storage systems.

  16. Plant maintenance and advanced reactors, 2005

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Agnihotri, Newal

    2005-09-15

    The focus of the September-October issue is on plant maintenance and advanced reactors. Major articles/reports in this issue include: First U.S. EPRs in 2015, by Ray Ganthner, Framatome ANP; Pursuing several opportunities, by William E. (Ed) Cummins, Westinghouse Electric Company; Vigorous plans to develop advanced reactors, by Yuliang Sun, Tsinghua University, China; Multiple designs, small and large, by Kumiaki Moriya, Hitachi Ltd., Japan; Sealed and embedded for safety and security, by Handa Norihiko, Toshiba Corporation, Japan; Scheduled online in 2010, by Johan Slabber, PMBR (Pty) Ltd., South Africa; Multi-application reactors, by Nikolay G. Kodochigov, OKBM, Russia; Six projects under budgetmore » and on schedule, by David F. Togerson, AECL, Canada; Creating a positive image, by Scott Peterson, Nuclear Energy Institute (NEI); Advanced plans for nuclear power's renaissance, by John Cleveland, International Atomic Energy Agency, Austria; and, Plant profile: last five outages in less than 20 days, by Beth Rapczynski, Exelon Nuclear.« less

  17. Food security: crops for people not for cars.

    PubMed

    Kullander, Sven

    2010-05-01

    Humankind is currently faced with the huge challenge of securing a sustainable energy supply and biofuels constitute one of the major options. However, the commercially traded edible crops are barely sufficient to meet food demand of the present world population. Certain regions, for example EU-27, do not even have a sufficient indigenous crop production. Of this follows that motor biofuels based on edible crops should be avoided. To replace more than some percent of the fossil motor fuels, non-edible biomass-rest products and wastes-should instead be considered for conversion to biofuels. In this way, about 10% of the current fossil fuels can be replaced. Feeding a world population expected to grow by some 50% during the next 50 years will be a major challenge. For environmental reasons it seems that agricultural land cannot be expanded very much, maybe not at all. The solution to the increasing food demand seems therefore to be using the present crop production more efficiently and increasing output from present agricultural land, maintaining biodiversity and climate stability within reasonable limits. In the future, agriculture will need more energy and more water irrigation. Food production is, however, already very energy demanding, requiring several times more externally provided energy than the energy content of the food itself. A sufficient energy supply will be a key issue for the future farming!

  18. The 2015 National Security Strategy: Authorities, Changes, Issues for Congress

    DTIC Science & Technology

    2016-02-26

    climate change ;  ensure access to shared spaces (expanding cyberspace and including outer space and air and maritime security); and  increase global...hand, one could conclude that these, along with confronting climate change , convey both a wider range of national security challenges in terms of...The 2015 National Security Strategy: Authorities, Changes , Issues for Congress Nathan J. Lucas, Coordinator Section Research Manager Kathleen

  19. Operating in the Gray Zone: An Alternative Paradigm for U.S. Military Strategy

    DTIC Science & Technology

    2016-04-01

    labeling, or re-labeling, may have been to draw the attention of busy policymakers to rapidly emerging security issues , it has evolved into something... issues affecting the national security community. The Peacekeeping and Stability Operations Institute provides subject matter expertise, technical...SSI) is part of the U.S. Army War College and is the strategic-level study agent for issues related to national security and military strategy with

  20. A brief indicator of household energy security: associations with food security, child health, and child development in US infants and toddlers.

    PubMed

    Cook, John T; Frank, Deborah A; Casey, Patrick H; Rose-Jacobs, Ruth; Black, Maureen M; Chilton, Mariana; Ettinger de Cuba, Stephanie; Appugliese, Danielle; Coleman, Sharon; Heeren, Timothy; Berkowitz, Carol; Cutts, Diana B

    2008-10-01

    Household energy security has not been measured empirically or related to child health and development but is an emerging concern for clinicians and researchers as energy costs increase. The objectives of this study were to develop a clinical indicator of household energy security and assess associations with food security, health, and developmental risk in children <36 months of age. A cross-sectional study that used household survey and surveillance data was conducted. Caregivers were interviewed in emergency departments and primary care clinics form January 2001 through December 2006 on demographics, public assistance, food security, experience with heating/cooling and utilities, Parents Evaluation of Developmental Status, and child health. The household energy security indicator includes energy-secure, no energy problems; moderate energy insecurity, utility shutoff threatened in past year; and severe energy insecurity, heated with cooking stove, utility shutoff, or >or=1 day without heat/cooling in past year. The main outcome measures were household and child food security, child reported health status, Parents Evaluation of Developmental Status concerns, and hospitalizations. Of 9721 children, 11% (n = 1043) and 23% (n = 2293) experienced moderate and severe energy insecurity, respectively. Versus children with energy security, children with moderate energy insecurity had greater odds of household food insecurity, child food insecurity, hospitalization since birth, and caregiver report of child fair/poor health, adjusted for research site and mother, child, and household characteristics. Children with severe energy insecurity had greater adjusted odds of household food insecurity, child food insecurity, caregivers reporting significant developmental concerns on the Parents Evaluation of Developmental Status scale, and report of child fair/poor health. No significant association was found between energy security and child weight for age or weight for length. As household energy insecurity increases, infants and toddlers experienced increased odds of household and child food insecurity and of reported poor health, hospitalizations, and developmental risks.

  1. Security risks in nuclear waste management: Exceptionalism, opaqueness and vulnerability.

    PubMed

    Vander Beken, Tom; Dorn, Nicholas; Van Daele, Stijn

    2010-01-01

    This paper analyses some potential security risks, concerning terrorism or more mundane forms of crime, such as fraud, in management of nuclear waste using a PEST scan (of political, economic, social and technical issues) and some insights of criminologists on crime prevention. Nuclear waste arises as spent fuel from ongoing energy generation or other nuclear operations, operational contamination or emissions, and decommissioning of obsolescent facilities. In international and EU political contexts, nuclear waste management is a sensitive issue, regulated specifically as part of the nuclear industry as well as in terms of hazardous waste policies. The industry involves state, commercial and mixed public-private bodies. The social and cultural dimensions--risk, uncertainty, and future generations--resonate more deeply here than in any other aspect of waste management. The paper argues that certain tendencies in regulation of the industry, claimed to be justified on security grounds, are decreasing transparency and veracity of reporting, opening up invisible spaces for management frauds, and in doing allowing a culture of impunity in which more serious criminal or terrorist risks could arise. What is needed is analysis of this 'exceptional' industry in terms of the normal cannons of risk assessment - a task that this paper begins. Copyright 2009 Elsevier Ltd. All rights reserved.

  2. The Campus Executive's Role in Security and Liability Issues.

    ERIC Educational Resources Information Center

    Bromley, Max; Territo, Leonard

    1986-01-01

    Executives at institutions of higher education have become increasingly concerned about serious crimes being committed on their campuses. The liability issue, criminal activity information, physical security and design issues, student patrol escorts, crime prevention training, and task force development are discussed. (MLW)

  3. Managing Campus Security: Issues for Police Officers at Public Institutions.

    ERIC Educational Resources Information Center

    Dwyer, William O.; And Others

    1994-01-01

    To maximize the effectiveness of their campus security systems while minimizing the institution's exposure to liability, campus administrators must understand the legal context in which their police or security personnel are operating as agents of authority. Some of these policy and behavior issues are explained. (MSE)

  4. The Superpowers: Nuclear Weapons and National Security. National Issues Forums.

    ERIC Educational Resources Information Center

    Mitchell, Greg; Melville, Keith

    Designed to stimulate thinking about United States-Soviet relationships in terms of nuclear weapons and national security, this document presents ideas and issues that represent differing viewpoints and positions. Chapter 1, "Rethinking the U.S.-Soviet Relationship," considers attempts to achieve true national security, and chapter 2,…

  5. School Security.

    ERIC Educational Resources Information Center

    Bete, Tim, Ed.

    1998-01-01

    Presents the opinions of four security experts on the issue of guns in schools. The experts respond to the following questions: will schools ever be free of weapons; will card access systems become common in public schools; will metal detectors solve school security problems; and will students ever be issued bullet-proof vests along with…

  6. Energy Independence and Security Act of 2007

    EPA Pesticide Factsheets

    This page provides an overview of the Energy Independence and Security Act (EISA) of 2007, which aims to increase U.S. energy security, develop renewable energy production, and improve vehicle fuel economy.

  7. Quality and security - They work together

    NASA Technical Reports Server (NTRS)

    Carr, Richard; Tynan, Marie; Davis, Russell

    1991-01-01

    This paper describes the importance of considering computer security as part of software quality assurance practice. The intended audience is primarily those professionals involved in the design, development, and quality assurance of software. Many issues are raised which point to the need ultimately for integration of quality assurance and computer security disciplines. To address some of the issues raised, the NASA Automated Information Security program is presented as a model which may be used for improving interactions between the quality assurance and computer security community of professionals.

  8. Environmental security in the Czech Republic: Status and concerns in the post Communist era

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Valley, P.J.

    1998-10-01

    The Czech Republic has made great strides toward reconciling its political and economic development with environmental protection and security issues since its recent democratization. Although new technological and legislative efforts continue to work at reducing emissions from automobiles, industries, power plants and coal mining, the Republic is committed to continuing its battle against air and water pollution, poor waste management, and needless destruction of nature. Shifting the structure of primary energy sources to qualitatively better fuels, along with the introduction of less energy-consuming technologies and the activation of new nuclear reactors, would eventually replace most of the output of coalmore » burning power plants. However, the use of nuclear power has been opposed by several political and environmental activists groups. At the international level, Austria`s opposition to the Temelin Nuclear Power plant is of great concern since Austria, as a non-nuclear state, propagates negative information about nuclear power to its citizens and other countries.« less

  9. 12 CFR 1.130 - Type II securities; guidelines for obligations issued for university and housing purposes.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...

  10. 12 CFR 1.130 - Type II securities; guidelines for obligations issued for university and housing purposes.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...

  11. 12 CFR 1.130 - Type II securities; guidelines for obligations issued for university and housing purposes.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...

  12. 12 CFR 1.130 - Type II securities; guidelines for obligations issued for university and housing purposes.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...

  13. Homeland Security

    EPA Pesticide Factsheets

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  14. The Use of BS7799 Information Security Standard to Construct Mechanisms for the Management of Medical Organization Information Security

    NASA Astrophysics Data System (ADS)

    Liu, Shu-Fan; Chueh, Hao-En; Liao, Kuo-Hsiung

    According to surveys, 80 % of security related events threatening information in medical organizations is due to improper management. Most research on information security has focused on information and security technology, such as network security and access control; rarely addressing issues at the management issues. The main purpose of this study is to construct a BS7799 based mechanism for the management of information with regard to security as it applies to medical organizations. This study analyzes and identifies the most common events related to information security in medical organizations and categorizes these events as high-risk, transferable-risk, and controlled-risk to facilitate the management of such risk.

  15. DOD Security Cooperation: An Overview of Authorities and Issues

    DTIC Science & Technology

    2016-08-23

    Cooperation: An Overview of Authorities and Issues Congressional Research Service 13 DOD funds six Regional Centers for Security Studies , which...Expenses Necessary for Theater Security Cooperation.” Another Senate proposal would revamp DOD’s five regional centers for security studies (10 U.S.C...184) by eliminating two that are located in Washington, DC (the Africa Center for Strategic Studies and the Near East South Asia Center for Strategic

  16. Consumer Views on Plug-in Electric Vehicles -- National Benchmark Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Singer, Mark

    2016-01-31

    Vehicle manufacturers, U.S. Department of Energy laboratories, universities, private researchers, and organizations from around the globe are pursuing advanced vehicle technologies that aim to reduce the consumption of petroleum in the form of gasoline and diesel. In order to make these technologies most appealing to the marketplace, they must take consumer sentiment into account. This report details study findings of broad American public sentiments toward issues that surround the advanced vehicle technologies of plug-in electric vehicles and is supported by the U.S. Department of Energy's Vehicle Technology Office in alignment with its mission to develop and deploy these technologies tomore » improve energy security, provide mobility flexibility, reduce transportation costs, and increase environmental sustainability.« less

  17. Fighting detection using interaction energy force

    NASA Astrophysics Data System (ADS)

    Wateosot, Chonthisa; Suvonvorn, Nikom

    2017-02-01

    Fighting detection is an important issue in security aimed to prevent criminal or undesirable events in public places. Many researches on computer vision techniques have studied to detect the specific event in crowded scenes. In this paper we focus on fighting detection using social-based Interaction Energy Force (IEF). The method uses low level features without object extraction and tracking. The interaction force is modeled using the magnitude and direction of optical flows. A fighting factor is developed under this model to detect fighting events using thresholding method. An energy map of interaction force is also presented to identify the corresponding events. The evaluation is performed using NUSHGA and BEHAVE datasets. The results show the efficiency with high accuracy regardless of various conditions.

  18. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is tomore » provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.« less

  19. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov Websites

    Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers

  20. 17 CFR 420.2 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... positions in the specific security issue: (1) Cash/immediate net settled positions; (2) Net when-issued... appropriate for monitoring the impact of concentrations of positions in Treasury securities. (h) “Reportable...

  1. A Semantic Based Policy Management Framework for Cloud Computing Environments

    ERIC Educational Resources Information Center

    Takabi, Hassan

    2013-01-01

    Cloud computing paradigm has gained tremendous momentum and generated intensive interest. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this dissertation, we mainly focus on issues related to policy management and access…

  2. 5 CFR 2640.102 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... is important to note that a mutual fund or employee benefit plan that is diversified for purposes of... 3(3) of the Employee Retirement Income Security Act of 1974, 29 U.S.C. 1002(3), and that has more... means a person who issues or proposes to issue any security, or has any outstanding security which it...

  3. Reviews on Security Issues and Challenges in Cloud Computing

    NASA Astrophysics Data System (ADS)

    An, Y. Z.; Zaaba, Z. F.; Samsudin, N. F.

    2016-11-01

    Cloud computing is an Internet-based computing service provided by the third party allowing share of resources and data among devices. It is widely used in many organizations nowadays and becoming more popular because it changes the way of how the Information Technology (IT) of an organization is organized and managed. It provides lots of benefits such as simplicity and lower costs, almost unlimited storage, least maintenance, easy utilization, backup and recovery, continuous availability, quality of service, automated software integration, scalability, flexibility and reliability, easy access to information, elasticity, quick deployment and lower barrier to entry. While there is increasing use of cloud computing service in this new era, the security issues of the cloud computing become a challenges. Cloud computing must be safe and secure enough to ensure the privacy of the users. This paper firstly lists out the architecture of the cloud computing, then discuss the most common security issues of using cloud and some solutions to the security issues since security is one of the most critical aspect in cloud computing due to the sensitivity of user's data.

  4. Clean and Secure Energy from Domestic Oil Shale and Oil Sands Resources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Spinti, Jennifer; Birgenheier, Lauren; Deo, Milind

    This report summarizes the significant findings from the Clean and Secure Energy from Domestic Oil Shale and Oil Sands Resources program sponsored by the Department of Energy through the National Energy Technology Laboratory. There were four principle areas of research; Environmental, legal, and policy issues related to development of oil shale and oil sands resources; Economic and environmental assessment of domestic unconventional fuels industry; Basin-scale assessment of conventional and unconventional fuel development impacts; and Liquid fuel production by in situ thermal processing of oil shale Multiple research projects were conducted in each area and the results have been communicated viamore » sponsored conferences, conference presentations, invited talks, interviews with the media, numerous topical reports, journal publications, and a book that summarizes much of the oil shale research relating to Utah’s Uinta Basin. In addition, a repository of materials related to oil shale and oil sands has been created within the University of Utah’s Institutional Repository, including the materials generated during this research program. Below is a listing of all topical and progress reports generated by this project and submitted to the Office of Science and Technical Information (OSTI). A listing of all peer-reviewed publications generated as a result of this project is included at the end of this report; Geomechanical and Fluid Transport Properties 1 (December, 2015); Validation Results for Core-Scale Oil Shale Pyrolysis (February, 2015); and Rates and Mechanisms of Oil Shale Pyrolysis: A Chemical Structure Approach (November, 2014); Policy Issues Associated With Using Simulation to Assess Environmental Impacts (November, 2014); Policy Analysis of the Canadian Oil Sands Experience (September, 2013); V-UQ of Generation 1 Simulator with AMSO Experimental Data (August, 2013); Lands with Wilderness Characteristics, Resource Management Plan Constraints, and Land Exchanges (March, 2012); Conjunctive Surface and Groundwater Management in Utah: Implications for Oil Shale and Oil Sands Development (May, 2012); Development of CFD-Based Simulation Tools for In Situ Thermal Processing of Oil Shale/Sands (February, 2012); Core-Based Integrated Sedimentologic, Stratigraphic, and Geochemical Analysis of the Oil Shale Bearing Green River Formation, Uinta Basin, Utah (April, 2011); Atomistic Modeling of Oil Shale Kerogens and Asphaltenes Along with their Interactions with the Inorganic Mineral Matrix (April, 2011); Pore Scale Analysis of Oil Shale/Sands Pyrolysis (March, 2011); Land and Resource Management Issues Relevant to Deploying In-Situ Thermal Technologies (January, 2011); Policy Analysis of Produced Water Issues Associated with In-Situ Thermal Technologies (January, 2011); and Policy Analysis of Water Availability and Use Issues for Domestic Oil Shale and Oil Sands Development (March, 2010)« less

  5. T2AR: trust-aware ad-hoc routing protocol for MANET.

    PubMed

    Dhananjayan, Gayathri; Subbiah, Janakiraman

    2016-01-01

    Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to an insecure data delivery. The increase in malicious attacks causes the excessive energy consumption that leads to a reduction of network lifetime. The lack of positional information update of the nodes in ad-hoc on-demand vector (AODV) protocol during the connection establishment offers less trust level between the nodes. Hence, the trust rate computation using energy and mobility models and its update are the essential tasks for secure data delivery. This paper proposes a trust-aware ad-hoc routing (T2AR) protocol to improve the trust level between the nodes in MANET. The proposed method modifies the traditional AODV routing protocol with the constraints of trust rate, energy, mobility based malicious behavior prediction. The packet sequence ID matching from the log reports of neighbor nodes determine the trust rate that avoids the malicious report generation. Besides, the direct and indirect trust observation schemes utilization increases the trust level. Besides, the received signal strength indicator utilization determines the trusted node is within the communication range or not. The comparative analysis between the proposed T2AR with the existing methods such as TRUNCMAN, RBT, GR, FBR and DICOTIDS regarding the average end-to-end delay, throughput, false positives, packet delivery ratio shows the effectiveness of T2AR in the secure MANET environment design.

  6. 17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...

  7. 17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...

  8. 17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...

  9. 17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...

  10. 17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...

  11. 10 CFR 780.8 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...

  12. 10 CFR 780.8 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...

  13. 10 CFR 780.8 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...

  14. 10 CFR 780.8 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...

  15. 10 CFR 780.8 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...

  16. Current and future greenhouse gas emissions associated with electricity generation in China: implications for electric vehicles.

    PubMed

    Shen, Wei; Han, Weijian; Wallington, Timothy J

    2014-06-17

    China's oil imports and greenhouse gas (GHG) emissions have grown rapidly over the past decade. Addressing energy security and GHG emissions is a national priority. Replacing conventional vehicles with electric vehicles (EVs) offers a potential solution to both issues. While the reduction in petroleum use and hence the energy security benefits of switching to EVs are obvious, the GHG benefits are less obvious. We examine the current Chinese electric grid and its evolution and discuss the implications for EVs. China's electric grid will be dominated by coal for the next few decades. In 2015 in Beijing, Shanghai, and Guangzhou, EVs will need to use less than 14, 19, and 23 kWh/100 km, respectively, to match the 183 gCO2/km WTW emissions for energy saving vehicles. In 2020, in Beijing, Shanghai, and Guangzhou EVs will need to use less than 13, 18, and 20 kWh/100 km, respectively, to match the 137 gCO2/km WTW emissions for energy saving vehicles. EVs currently demonstrated in China use 24-32 kWh/100 km. Electrification will reduce petroleum imports; however, it will be very challenging for EVs to contribute to government targets for GHGs emissions reduction.

  17. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mizner, Jack Harry; Passell, Howard David; Keller, Elizabeth James Kistin

    Sustainability is a critical national security issue for the U.S. and other nations. Sandia National Laboratories (SNL) is already a global leader in sustainability science and technology (SS&T) as documented in this report. This report documents the ongoing work conducted this year as part of the Sustainability Innovation Foundry (SIF). The efforts of the SIF support Sandia's national and international security missions related to sustainability and resilience revolving around energy use, water use, and materials, both on site at Sandia and externally. The SIF leverages existing Sandia research and development (R&D) in sustainability science and technology to support new solutionsmore » to complex problems. The SIF also builds on existing Sandia initiatives to support transformation of Sandia into a fully sustainable entity in terms of materials, energy, and water use. In the long term, the SIF will demonstrate the efficacy of sustainability technology developed at Sandia through prototyping and test bed approaches and will provide a common platform for support of solutions to the complex problems surrounding sustainability. Highlights from this year include the Sustainability Idea Challenge, improvements in facilities energy use, lectures and presentations from relevant experts in sustainability [Dr. Barry Hughes, University of Denver], and significant development of the Institutional Transformation (IX) modeling tools to support evaluation of proposed modifications to the SNL infrastructure to realize energy savings.« less

  18. A Hypertext-Based Computer Architecture for Management of the Joint Command, Control and Communications Curriculum

    DTIC Science & Technology

    1992-06-01

    Boards) Security, Privacy, and Freedom of Speech Issues 4.1.2 Understand the relationships between information processing and collection and...to-many (Mailing and discussion Lists) ... Many-to-Many (Bulletin Boards) Security, Privacy, and Freedom of Speech Issues 69 4.1.3 Understand the...Communication one-to-one (e-mail) °o° one-to-many (Mailing and discussion Lists) ... Many-to-Many (Bulletin Boards) oo Security, Privacy, and Freedom of Speech Issues

  19. Information security of power enterprises of North-Arctic region

    NASA Astrophysics Data System (ADS)

    Sushko, O. P.

    2018-05-01

    The role of information technologies in providing technological security for energy enterprises is a component of the economic security for the northern Arctic region in general. Applying instruments and methods of information protection modelling of the energy enterprises' business process in the northern Arctic region (such as Arkhenergo and Komienergo), the authors analysed and identified most frequent risks of information security. With the analytic hierarchy process based on weighting factor estimations, information risks of energy enterprises' technological processes were ranked. The economic estimation of the information security within an energy enterprise considers weighting factor-adjusted variables (risks). Investments in information security systems of energy enterprises in the northern Arctic region are related to necessary security elements installation; current operating expenses on business process protection systems become materialized economic damage.

  20. Identifying the science and technology dimensions of emerging public policy issues through horizon scanning.

    PubMed

    Parker, Miles; Acland, Andrew; Armstrong, Harry J; Bellingham, Jim R; Bland, Jessica; Bodmer, Helen C; Burall, Simon; Castell, Sarah; Chilvers, Jason; Cleevely, David D; Cope, David; Costanzo, Lucia; Dolan, James A; Doubleday, Robert; Feng, Wai Yi; Godfray, H Charles J; Good, David A; Grant, Jonathan; Green, Nick; Groen, Arnoud J; Guilliams, Tim T; Gupta, Sunjai; Hall, Amanda C; Heathfield, Adam; Hotopp, Ulrike; Kass, Gary; Leeder, Tim; Lickorish, Fiona A; Lueshi, Leila M; Magee, Chris; Mata, Tiago; McBride, Tony; McCarthy, Natasha; Mercer, Alan; Neilson, Ross; Ouchikh, Jackie; Oughton, Edward J; Oxenham, David; Pallett, Helen; Palmer, James; Patmore, Jeff; Petts, Judith; Pinkerton, Jan; Ploszek, Richard; Pratt, Alan; Rocks, Sophie A; Stansfield, Neil; Surkovic, Elizabeth; Tyler, Christopher P; Watkinson, Andrew R; Wentworth, Jonny; Willis, Rebecca; Wollner, Patrick K A; Worts, Kim; Sutherland, William J

    2014-01-01

    Public policy requires public support, which in turn implies a need to enable the public not just to understand policy but also to be engaged in its development. Where complex science and technology issues are involved in policy making, this takes time, so it is important to identify emerging issues of this type and prepare engagement plans. In our horizon scanning exercise, we used a modified Delphi technique. A wide group of people with interests in the science and policy interface (drawn from policy makers, policy adviser, practitioners, the private sector and academics) elicited a long list of emergent policy issues in which science and technology would feature strongly and which would also necessitate public engagement as policies are developed. This was then refined to a short list of top priorities for policy makers. Thirty issues were identified within broad areas of business and technology; energy and environment; government, politics and education; health, healthcare, population and aging; information, communication, infrastructure and transport; and public safety and national security.

  1. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...

  2. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...

  3. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...

  4. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...

  5. Economic Evaluation of the Information Security Levels Achieved by Electric Energy Providers in North Arctic Region

    NASA Astrophysics Data System (ADS)

    Sushko, O. P.; Kaznin, A. A.; Babkin, A. V.; Bogdanov, D. A.

    2017-10-01

    The study we are conducting involves the analysis of information security levels achieved by energy providers operating in the North Arctic Region. We look into whether the energy providers’ current information security levels meet reliability standards and determine what further actions may be needed for upgrading information security in the context of the digital transformation that the world community is undergoing. When developing the information security systems for electric energy providers or selecting the protection means for them, we are governed by the fact that the assets to be protected are process technologies. While information security risk can be assessed using different methods, the evaluation of the economic damage from these risks appears to be a difficult task. The most probable and harmful risks we have identified when evaluating the electric energy providers’ information security will be used by us as variables. To provide the evaluation, it is necessary to calculate the costs relating to elimination of the risks identified. The final stage of the study will involve the development of an operation algorithm for the North Arctic Region’s energy provider’s business information protection security system - a set of information security services, and security software and hardware.

  6. Ohio Advanced Energy Manufacturing Center

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kimberly Gibson; Mark Norfolk

    2012-07-30

    The program goal of the Ohio Advanced Energy Manufacturing Center (OAEMC) is to support advanced energy manufacturing and to create responsive manufacturing clusters that will support the production of advanced energy and energy-efficient products to help ensure the nation's energy and environmental security. This goal cuts across a number of existing industry segments critical to the nation's future. Many of the advanced energy businesses are starting to make the transition from technology development to commercial production. Historically, this transition from laboratory prototypes through initial production for early adopters to full production for mass markets has taken several years. Developing andmore » implementing manufacturing technology to enable production at a price point the market will accept is a key step. Since these start-up operations are configured to advance the technology readiness of the core energy technology, they have neither the expertise nor the resources to address manufacturing readiness issues they encounter as the technology advances toward market entry. Given the economic realities of today's business environment, finding ways to accelerate this transition can make the difference between success and failure for a new product or business. The advanced energy industry touches a wide range of industry segments that are not accustomed to working together in complex supply chains to serve large markets such as automotive and construction. During its first three years, the Center has catalyzed the communication between companies and industry groups that serve the wide range of advanced energy markets. The Center has also found areas of common concern, and worked to help companies address these concerns on a segment or industry basis rather than having each company work to solve common problems individually. EWI worked with three industries through public-private partnerships to sew together disparate segments helping to promote overall industry health. To aid the overall advanced energy industry, EWI developed and launched an Ohio chapter of the non-profit Advanced Energy Economy. In this venture, Ohio joins with six other states including Colorado, Connecticut, Illinois, Maine, Massachusetts, New Hampshire, Rhode Island and Vermont to help promote technologies that deliver energy that is affordable, abundant and secure. In a more specific arena, EWI's advanced energy group collaborated with the EWI-run Nuclear Fabrication Consortium to promote the nuclear supply chain. Through this project EWI has helped bring the supply chain up to date for the upcoming period of construction, and assisted them in understanding the demands for the next generation of facilities now being designed. In a more targeted manner, EWI worked with 115 individual advanced energy companies that are attempting to bring new technology to market. First, these interactions helped EWI develop an awareness of issues common to companies in different advanced energy sectors. By identifying and addressing common issues, EWI helps companies bring technology to market sooner and at a lower cost. These visits also helped EWI develop a picture of industry capability. This helped EWI provide companies with contacts that can supply commercial solutions to their new product development challenges. By providing assistance in developing supply chain partnerships, EWI helped companies bring their technology to market faster and at a lower cost than they might have been able to do by themselves. Finally, at the most granular level EWI performed dedicated research and development on new manufacturing processes for advanced energy. During discussions with companies participating in advanced energy markets, several technology issues that cut across market segments were identified. To address some of these issues, three crosscutting technology development projects were initiated and completed with Center support. This included reversible welds for batteries and high temperature heat exchangers. It also included a novel advanced weld trainer that EWI has recently commercialized.« less

  7. Probabilistic monitoring in intrusion detection module for energy efficiency in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    De Rango, Floriano; Lupia, Andrea

    2016-05-01

    MANETs allow mobile nodes communicating to each other using the wireless medium. A key aspect of these kind of networks is the security, because their setup is done without an infrastructure, so external nodes could interfere in the communication. Mobile nodes could be compromised, misbehaving during the multi-hop transmission of data, or they could have a selfish behavior to save energy, which is another important constraint in MANETs. The detection of these behaviors need a framework that takes into account the latest interactions among nodes, so malicious or selfish nodes could be detected also if their behavior is changed over time. The monitoring activity increases the energy consumption, so our proposal takes into account this issue reducing the energy required by the monitoring system, keeping the effectiveness of the intrusion detection system. The results show an improvement in the saved energy, improving the detection performance too.

  8. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Weldu, Yemane W., E-mail: ywweldem@ucalgary.ca; Assefa, Getachew; Athena Chair in Life Cycle Assessment in Design

    A roadmap for a more sustainable energy strategy is complex, as its development interacts critically with the economic, social, and environmental dimensions of sustainable development. This paper applied an impact matrix method to evaluate the environmental sustainability and to identify the desirable policy objectives of biomass-based energy strategy for the case of Alberta. A matrix with the sustainability domains on one axis and areas of environmental impact on the other was presented to evaluate the nexus effect of policy objectives and bioenergy production. As per to our analysis, economic diversification, technological innovation, and resource conservation came up as the desirablemore » policy objectives of sustainable development for Alberta because they demonstrated environmental benefits in all environmental impact categories, namely climate change, human health, and ecosystem. On the other hand, human health and ecosystem impacts were identified as trade-offs when the policy objectives for sustainability were energy security, job creation, and climate change. Thus, bioenergy can mitigate climate change but may impact human health and ecosystem which then in turn can become issues of concern. Energy strategies may result in shifting of risks from one environmental impact category to another, and from one sustainable domain to another if the technical and policy-related issues are not identified.« less

  9. Children's very low food security is associated with increased dietary intakes in energy, fat, and added sugar among Mexican-origin children (6-11 y) in Texas border Colonias.

    PubMed

    Sharkey, Joseph R; Nalty, Courtney; Johnson, Cassandra M; Dean, Wesley R

    2012-02-20

    Food insecurity among Mexican-origin and Hispanic households is a critical nutritional health issue of national importance. At the same time, nutrition-related health conditions, such as obesity and type 2 diabetes, are increasing in Mexican-origin youth. Risk factors for obesity and type 2 diabetes are more common in Mexican-origin children and include increased intakes of energy-dense and nutrient-poor foods. This study assessed the relationship between children's experience of food insecurity and nutrient intake from food and beverages among Mexican-origin children (age 6-11 y) who resided in Texas border colonias. Baseline data from 50 Mexican-origin children were collected in the home by trained promotora-researchers. All survey (demographics and nine-item child food security measure) and 24-hour dietary recall data were collected in Spanish. Dietary data were collected in person on three occasions using a multiple-pass approach; nutrient intakes were calculated with NDS-R software. Separate multiple regression models were individually fitted for total energy, protein, dietary fiber, calcium, vitamin D, potassium, sodium, Vitamin C, and percentage of calories from fat and added sugars. Thirty-two children (64%) reported low or very low food security. Few children met the recommendations for calcium, dietary fiber, and sodium; and none for potassium or vitamin D. Weekend intake was lower than weekday for calcium, vitamin D, potassium, and vitamin C; and higher for percent of calories from fat. Three-day average dietary intakes of total calories, protein, and percent of calories from added sugars increased with declining food security status. Very low food security was associated with greater intakes of total energy, calcium, and percentage of calories from fat and added sugar. This paper not only emphasizes the alarming rates of food insecurity for this Hispanic subgroup, but describes the associations for food insecurity and diet among this sample of Mexican-origin children. Child-reported food insecurity situations could serve as a screen for nutrition problems in children. Further, the National School Lunch and School Breakfast Programs, which play a major beneficial role in children's weekday intakes, may not be enough to keep pace with the nutritional needs of low and very low food secure Mexican-origin children.

  10. Children's very low food security is associated with increased dietary intakes in energy, fat, and added sugar among Mexican-origin children (6-11 y) in Texas border Colonias

    PubMed Central

    2012-01-01

    Background Food insecurity among Mexican-origin and Hispanic households is a critical nutritional health issue of national importance. At the same time, nutrition-related health conditions, such as obesity and type 2 diabetes, are increasing in Mexican-origin youth. Risk factors for obesity and type 2 diabetes are more common in Mexican-origin children and include increased intakes of energy-dense and nutrient-poor foods. This study assessed the relationship between children's experience of food insecurity and nutrient intake from food and beverages among Mexican-origin children (age 6-11 y) who resided in Texas border colonias. Methods Baseline data from 50 Mexican-origin children were collected in the home by trained promotora-researchers. All survey (demographics and nine-item child food security measure) and 24-hour dietary recall data were collected in Spanish. Dietary data were collected in person on three occasions using a multiple-pass approach; nutrient intakes were calculated with NDS-R software. Separate multiple regression models were individually fitted for total energy, protein, dietary fiber, calcium, vitamin D, potassium, sodium, Vitamin C, and percentage of calories from fat and added sugars. Results Thirty-two children (64%) reported low or very low food security. Few children met the recommendations for calcium, dietary fiber, and sodium; and none for potassium or vitamin D. Weekend intake was lower than weekday for calcium, vitamin D, potassium, and vitamin C; and higher for percent of calories from fat. Three-day average dietary intakes of total calories, protein, and percent of calories from added sugars increased with declining food security status. Very low food security was associated with greater intakes of total energy, calcium, and percentage of calories from fat and added sugar. Conclusions This paper not only emphasizes the alarming rates of food insecurity for this Hispanic subgroup, but describes the associations for food insecurity and diet among this sample of Mexican-origin children. Child-reported food insecurity situations could serve as a screen for nutrition problems in children. Further, the National School Lunch and School Breakfast Programs, which play a major beneficial role in children's weekday intakes, may not be enough to keep pace with the nutritional needs of low and very low food secure Mexican-origin children. PMID:22348599

  11. 17 CFR 210.3-16 - Financial statements of affiliates whose securities collateralize an issue registered or being...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Financial statements of affiliates whose securities collateralize an issue registered or being registered. 210.3-16 Section 210.3-16... constitute a substantial portion of collateral if the aggregate principal amount, par value, or book value of...

  12. 17 CFR 250.47 - Exemption of public utility subsidiaries as to certain securities issued to the Rural...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Electrification Administration. (a) Exemption. Any public utility company which is a subsidiary company of a... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of public utility subsidiaries as to certain securities issued to the Rural Electrification Administration. 250.47 Section 250.47...

  13. Information Security Trends and Issues in the Moodle E-Learning Platform: An Ethnographic Content Analysis

    ERIC Educational Resources Information Center

    Schultz, Christopher

    2012-01-01

    Empirical research on information security trends and practices in e-learning is scarce. Many articles that have been published apply basic information security concepts to e-learning and list potential threats or propose frameworks for classifying threats. The purpose of this research is to identify, categorize and understand trends and issues in…

  14. Issues of Human Security and Educational Development in the Niger Delta Region of Nigeria

    ERIC Educational Resources Information Center

    Ololube, Nwachukwu Prince; Kpolovie, Peter James; Amaele, Samuel

    2013-01-01

    Drawing from documents, observation, interview and questionnaire, we highlighted the role of issues of human security and its impact on the educational development of the Niger Delta region as well as means of enhancing human security in Nigeria. This article is a conceptual and methodological breakthrough in Nigeria's academic landscape where…

  15. 31 CFR 306.25 - Presentation and surrender.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...

  16. 31 CFR 306.25 - Presentation and surrender.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...

  17. 31 CFR 306.25 - Presentation and surrender.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...

  18. 31 CFR 306.25 - Presentation and surrender.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...

  19. 31 CFR 306.25 - Presentation and surrender.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...

  20. 17 CFR 230.416 - Securities to be issued as a result of stock splits, stock dividends and anti-dilution provisions...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... to certain employee benefit plans. 230.416 Section 230.416 Commodity and Securities Exchanges... provisions and interests to be issued pursuant to certain employee benefit plans. (a) If a registration... pursuant to an employee benefit plan, including interests in such plan that constitute separate securities...

  1. 20 CFR 404.1287 - Exceptions to the time limitations on assessments-for wages paid prior to 1987.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... determination; or (iv) The Social Security Administration has not issued to the State a final audit statement on... assessments-for wages paid prior to 1987. 404.1287 Section 404.1287 Employees' Benefits SOCIAL SECURITY... complete; or (iii) The Social Security Administration is developing a coverage or wage issue which was...

  2. 20 CFR 404.1287 - Exceptions to the time limitations on assessments-for wages paid prior to 1987.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... determination; or (iv) The Social Security Administration has not issued to the State a final audit statement on... assessments-for wages paid prior to 1987. 404.1287 Section 404.1287 Employees' Benefits SOCIAL SECURITY... complete; or (iii) The Social Security Administration is developing a coverage or wage issue which was...

  3. Making Our Buildings Safer: Security Management and Equipment Issues.

    ERIC Educational Resources Information Center

    Clark, James H.

    1997-01-01

    Discusses three major components of library security: physical security of the environment; operating procedures for library staff, the public, and security personnel; and a contract security force (or campus security in academic institutions.) Topics include risk management; maintenance; appropriate technology, including security systems and…

  4. 10 CFR 1016.11 - Cancellation of requests for security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Cancellation of requests for security facility approval. 1016.11 Section 1016.11 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.11 Cancellation of requests for security facility approval. When a...

  5. 10 CFR 1016.11 - Cancellation of requests for security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Cancellation of requests for security facility approval. 1016.11 Section 1016.11 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.11 Cancellation of requests for security facility approval. When a...

  6. 10 CFR 1016.10 - Grant, denial, or suspension of security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Grant, denial, or suspension of security facility approval. 1016.10 Section 1016.10 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.10 Grant, denial, or suspension of security facility approval...

  7. 10 CFR 1016.10 - Grant, denial, or suspension of security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Grant, denial, or suspension of security facility approval. 1016.10 Section 1016.10 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.10 Grant, denial, or suspension of security facility approval...

  8. 10 CFR 1016.10 - Grant, denial, or suspension of security facility approval.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Grant, denial, or suspension of security facility approval. 1016.10 Section 1016.10 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.10 Grant, denial, or suspension of security facility approval...

  9. Pilot-Scale Demonstration of a Fully Integrated Commercial Process for Converting Woody Biomass into Clean Biomass Diesel Fuel

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lucero, Andrew; Gale, Tom; Woolcock, Patrick

    The economic recovery of petroleum, like other fossil fuels, is limited. Although the current price of oil has dramatically dropped due to increased production and new production methods, it is not expected to remain low for an extended period of time as demand increases. While new methods of obtaining these fossil energy reserves are constantly being invented and introduced, the cost of production generally continues to increase. New sources of energy such as fracking and oil shale or oil sands recovery can produce enormous amounts of energy, but at a severe cost. The current estimate on energy return for energymore » invested for oil shale for instance is just barely over 1, meaning that for every barrel of energy produced by oil shale there was nearly a barrel of energy invested to recover it. Furthermore, these new technologies are often constantly under attack for environmental concerns (especially given the poor ratio of energy conversion), while conventional oil is regarded as dangerous due to lack of domestic supply and susceptibility to foreign intervention that compromises overall national security. Alternatives to a petroleum-based supply of fuel are a potential route to address these issues, although they must also be economically feasible. The fuels industry is forced to consider these issues in addition to federal mandates intended to gradually diversify our fuel sources.« less

  10. Implications of Postharvest Food Loss/Waste Prevention to Energy and Resources Conservation

    NASA Astrophysics Data System (ADS)

    Cai, X.; Shafiee-Jood, M.

    2015-12-01

    World's growing demand for food is driven by population and income growth, dietary changes, and the ever-increasing competition between food, feed and bioenergy challenges food security; meanwhile agricultural expansion and intensification threats the environment by the various detrimental impacts. Researchers have attempted to explore strategies to overcome this grand challenge. One of the promising solutions that have attracted considerable attention recently is to increase the efficiency of food supply chain by reducing food loss and waste (FLW). According to recent studies conducted by Food and Agriculture Organization (FAO), United Nation, almost one third of the food produced for human consumption globally is lost or wasted along the food supply chain. This amount of food discarded manifests a missing, yet potential, opportunity to sustainably enhance both food security and environmental sustainability. However, implementing the strategies and technologies for tackling FLW does not come up as an easy solution since it requires economic incentives, benefit and cost analysis, infrastructure development, and appropriate market mechanism. In this presentation I will provide a synthesis of knowledge on the implications of postharvest food loss/waste prevention to energy and resource conservation, environmental protection, as well as food security. I will also discuss how traditional civil and environmental engineering can contribute to the reduction of postharvest food loss, an important issue of sustainable agriculture.

  11. Water Resources: the Central Component of the WEF Nexus?

    NASA Astrophysics Data System (ADS)

    Ding, K.; Gunda, T.; Hornberger, G. M.

    2017-12-01

    Increasing population growth, consumption of natural resources, and deterioration of the environment coupled with climate change impacts (such as increased variability in precipitation) will challenge our abilities to provide water, energy and food (WEF) to the global populace. Less developed areas, such as the countries in Sub-Saharan Africa, are particularly vulnerable to such resource issues due to immature governance and management structures and strategies. We introduce an integrated approach to resource security analysis, which traditionally has focused on the WEF components separately and apply the methods to a suite of countries in Sub-Saharan Africa. Specifically, we evaluate the inter-connected nature of WEF securities by considering physical, demographic, socioeconomic, health, and institutional parameters related to each of the resource securities and by analyzing the relationships among the metrics. For example, reported food deficits for countries are strongly correlated with reported levels of access to safe drinking water. Multivariate statistical analyses are applied to identify relationships among resources and to develop indices that robustly and comprehensively capture the WEF nexus. Our results indicate that water plays the central role in the WEF nexus, due to its extensive use for both food and energy production in these countries. This approach provides a framework for analyzing the WEF nexus in other regions of the world.

  12. Role of non-fossil energy in meeting China's energy and climate target for 2020

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhou, Sheng; Tong, Qing; Yu, Sha

    2012-12-01

    China is the largest energy consumer and CO2 emitter in the world. The Chinese government faces growing challenges of ensuring energy security and reducing greenhouse gas emissions. To address these two issues, the Chinese government has announced two ambitious domestic indicative autonomous mitigation targets for 2020: increasing the ratio of non-fossil energy to 15% and reducing carbon dioxide emissions per unit of GDP by 40-45% from 2005 levels. To explore the role of non-fossil energy in achieving these two targets, this paper first provides an overview of current status of non-fossil energy development in China; then gives a brief reviewmore » of GDP and primary energy consumption; next assesses in detail the role of the non fossil energy in 2020, including the installed capacity and electricity generation of non-fossil energy sources, the share and role of non-fossil energy in the electricity structure, emissions reduction resulting from the shift to non-fossil energy, and challenges for accomplishing the mitigation targets in 2020 ; finally, conclusions and policy measures for non-fossil energy development are proposed.« less

  13. Power grid operation risk management: V2G deployment for sustainable development

    NASA Astrophysics Data System (ADS)

    Haddadian, Ghazale J.

    The production, transmission, and delivery of cost--efficient energy to supply ever-increasing peak loads along with a quest for developing a low-carbon economy require significant evolutions in the power grid operations. Lower prices of vast natural gas resources in the United States, Fukushima nuclear disaster, higher and more intense energy consumptions in China and India, issues related to energy security, and recent Middle East conflicts, have urged decisions makers throughout the world to look into other means of generating electricity locally. As the world look to combat climate changes, a shift from carbon-based fuels to non-carbon based fuels is inevitable. However, the variability of distributed generation assets in the electricity grid has introduced major reliability challenges for power grid operators. While spearheading sustainable and reliable power grid operations, this dissertation develops a multi-stakeholder approach to power grid operation design; aiming to address economic, security, and environmental challenges of the constrained electricity generation. It investigates the role of Electric Vehicle (EV) fleets integration, as distributed and mobile storage assets to support high penetrations of renewable energy sources, in the power grid. The vehicle-to-grid (V2G) concept is considered to demonstrate the bidirectional role of EV fleets both as a provider and consumer of energy in securing a sustainable power grid operation. The proposed optimization modeling is the application of Mixed-Integer Linear Programing (MILP) to large-scale systems to solve the hourly security-constrained unit commitment (SCUC) -- an optimal scheduling concept in the economic operation of electric power systems. The Monte Carlo scenario-based approach is utilized to evaluate different scenarios concerning the uncertainties in the operation of power grid system. Further, in order to expedite the real-time solution of the proposed approach for large-scale power systems, it considers a two-stage model using the Benders Decomposition (BD). The numerical simulation demonstrate that the utilization of smart EV fleets in power grid systems would ensure a sustainable grid operation with lower carbon footprints, smoother integration of renewable sources, higher security, and lower power grid operation costs. The results, additionally, illustrate the effectiveness of the proposed MILP approach and its potentials as an optimization tool for sustainable operation of large scale electric power systems.

  14. On determining specifications and selections of alternative technologies for airport checked-baggage security screening.

    PubMed

    Feng, Qianmei

    2007-10-01

    Federal law mandates that every checked bag at all commercial airports be screened by explosive detection systems (EDS), explosive trace detection systems (ETD), or alternative technologies. These technologies serve as critical components of airport security systems that strive to reduce security risks at both national and global levels. To improve the operational efficiency and airport security, emerging image-based technologies have been developed, such as dual-energy X-ray (DX), backscatter X-ray (BX), and multiview tomography (MVT). These technologies differ widely in purchasing cost, maintenance cost, operating cost, processing rate, and accuracy. Based on a mathematical framework that takes into account all these factors, this article investigates two critical issues for operating screening devices: setting specifications for continuous security responses by different technologies; and selecting technology or combination of technologies for efficient 100% baggage screening. For continuous security responses, specifications or thresholds are used for classifying threat items from nonthreat items. By investigating the setting of specifications on system security responses, this article assesses the risk and cost effectiveness of various technologies for both single-device and two-device systems. The findings provide the best selection of image-based technologies for both single-device and two-device systems. Our study suggests that two-device systems outperform single-device systems in terms of both cost effectiveness and accuracy. The model can be readily extended to evaluate risk and cost effectiveness of multiple-device systems for airport checked-baggage security screening.

  15. 78 FR 60998 - Proposed Collection: Information Collection Surrounding the Sale and Issue of Marketable Book...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-02

    ... Collection Surrounding the Sale and Issue of Marketable Book-Entry Securities ACTION: Notice and request for... Department of the Treasury is soliciting comments concerning the Sale and Issue of Marketable Book-Entry... Marketable Book-Entry Securities. OMB Number: 1535-0112. Abstract: The information is requested to ensure...

  16. 24 CFR 320.5 - Securities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 2 2013-04-01 2013-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for payment...

  17. 24 CFR 320.5 - Securities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 2 2011-04-01 2011-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for payment...

  18. 24 CFR 320.5 - Securities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 2 2012-04-01 2012-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for payment...

  19. 24 CFR 320.5 - Securities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 2 2014-04-01 2014-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for payment...

  20. Security Vulnerability Profiles of Mission Critical Software: Empirical Analysis of Security Related Bug Reports

    NASA Technical Reports Server (NTRS)

    Goseva-Popstojanova, Katerina; Tyo, Jacob

    2017-01-01

    While some prior research work exists on characteristics of software faults (i.e., bugs) and failures, very little work has been published on analysis of software applications vulnerabilities. This paper aims to contribute towards filling that gap by presenting an empirical investigation of application vulnerabilities. The results are based on data extracted from issue tracking systems of two NASA missions. These data were organized in three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified security related software bugs and classified them in specific vulnerability classes. Then, we created the security vulnerability profiles, i.e., determined where and when the security vulnerabilities were introduced and what were the dominating vulnerabilities classes. Our main findings include: (1) In IVV issues datasets the majority of vulnerabilities were code related and were introduced in the Implementation phase. (2) For all datasets, around 90 of the vulnerabilities were located in two to four subsystems. (3) Out of 21 primary classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, they contributed from 80 to 90 of vulnerabilities in each dataset.

  1. 22 CFR 9a.1 - Security of certain information and material related to the International Energy Program.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...

  2. 76 FR 65508 - Extension of the Public Comment Period for the Draft Site-Wide Environmental Impact Statement for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-21

    ... DEPARTMENT OF ENERGY National Nuclear Security Administration Extension of the Public Comment... Department of Energy/National Nuclear Security Administration Nevada National Security Site and Off-Site Locations in the State of Nevada AGENCY: National Nuclear Security Administration, U.S. Department of Energy...

  3. 10 CFR 1016.8 - Approval for processing access permittees for security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security facility...

  4. 10 CFR 1016.8 - Approval for processing access permittees for security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security facility...

  5. 22 CFR 9a.1 - Security of certain information and material related to the International Energy Program.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...

  6. Addressing the Economic Security Issues Facing Same-Sex Couples.

    ERIC Educational Resources Information Center

    Dolan, Elizabeth M.; Stum, Marlene S.; Rupured, Michael

    1999-01-01

    Provides educators and researchers with an awareness of the financial security issues faced by same-sex couples and offers suggestions for incorporating the discussion of these ideas into existing curricula and research. (Author/JOW)

  7. Security Encryption Scheme for Communication of Web Based Control Systems

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.

  8. Choices in International Conflict: With a Focus on Security Issues in Asia.

    ERIC Educational Resources Information Center

    Francis, Gregory; Mukai, Gary; Kim, Pearl; Leininger, James

    Many world leaders and scholars feel that the U.S.-Japan Security Alliance is essential for long-term peace, prosperity, and stability in Asia. The purpose of this curriculum unit is to examine this alliance by introducing students to case studies of international conflict, with a focus on security issues in Asia. Through each of the lessons…

  9. 75 FR 50845 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-18

    ... Policy, Department of Homeland Security, Washington, DC 20528. For privacy issues please contact: Mary...;Prices of new books are listed in the first FEDERAL REGISTER issue of each #0;week. #0; #0; #0; #0;#0...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL--027 The History of...

  10. 24 CFR 320.25 - Securities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 2 2014-04-01 2014-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...

  11. 24 CFR 320.25 - Securities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 2 2011-04-01 2011-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...

  12. 24 CFR 320.25 - Securities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 2 2013-04-01 2013-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...

  13. 24 CFR 320.25 - Securities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 2 2012-04-01 2012-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...

  14. 24 CFR 320.25 - Securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...

  15. Strategic Challenges during Changing Times: A Prioritized Research Program, 1994

    DTIC Science & Technology

    1994-04-01

    and planning. 14, SUBJECT T[RMS 15 NUMBER OF PAGES strategic assessments; domestic and global issues and 5 trends; peace operations; political...1994 or which, for a variety of reasons, will riot be published. 3 SECTION I TRANSREGIONAL SECURITY CONCERNS Regional Challenges, Global Issues . When...but global issues . Global security issues derive from three forms of connectivity. The first is economic. Today, there is truly a world economy. Markets

  16. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  17. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  18. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  19. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  20. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  1. The contemporary dynamics of Sino-Indian relations: Examining maritime security, economics, energy and elite dialogue

    NASA Astrophysics Data System (ADS)

    Athwal, Amardeep

    This dissertation examines the modern-day dynamics of the Sino-Indian relationship---with a particular focus on issues relating to maritime security, economics, energy and elite bilateral dialogue. In exploring the contemporary nature of the Sino-Indian relationship, the dissertation also seeks to assess the accuracy of predominant neorealist accounts of the Sino-Indian relationship. Since the 1962 Sino-Indian War, most analysts have continued to emphasize the conflictual and competitive elements within the Sino-Indian relationship. The dissertation first explores the crucial post-independence history of Sino-Indian relations to provide the appropriate contextual background (chapter one). Thereafter, the dissertation explores the geopolitical significance of the Indian Ocean in light of soaring (global) energy demands. This then leads into an analysis of China and India's naval modernization and China's strategic partnership with Pakistan and Myanmar (chapter two). While acknowledging the credibility of neorealist insights in the realm of maritime security by detailing China and India's naval buildup and naval strategy, overall, it is found that the security dilemma argument is overstated. There is both a lack of threat perception and the existence of alternate explanations for both Chinese and Indian activities in Southern Asia. The dissertation then moves on to explore the positive elements within the Sino-Indian relationship---growing economic interdependence, energy convergence and elite consensus. In the economic realm (chapter three) it is found that Sino-Indian bilateral trade is increasingly being framed institutionally and rapidly expanding every year. The areas where the Sino-Indian economic relationship could be fruitfully expanded are traced and the great potential of bilateral trade is discussed. Thereafter, the dissertation highlights how China and India are beginning to coordinate energy policy (chapter four) as well as the growing political will (chapter five) to transform the Sino-Indian relationship from a framework of conflict and competition to cooperation. The dissertation concludes that there are serious mitigating factors in the Sino-Indian relationship and that an exclusively neorealist outlook is impoverished. Theoretical insights from neoliberal institutionalism and constructivism point to how emerging economic interdependence in tandem with the (elite) creation of dependable expectations of peaceful change point towards stability in the Sino-Indian relationship.

  2. A Food in Health Security (FIHS) platform in the Asia-Pacific Region: the way forward.

    PubMed

    Wahlqvist, Mark L; Keatinge, John Donough H; Butler, Colin D; Friel, Sharon; McKay, John; Easdown, Warwick; Kuo, Ken N; Huang, Ching-jang; Pan, Wen-Harn; Yang, Ray-Yu; Lee, Meei-Shyuan; Chang, Hsing-Yi; Chiu, Ya-Wen; Jaron, Dov; Krawinkel, Michael; Barlow, Snow; Walsh, Greg; Chiang, Tung-liang; Huang, Po-Chao; Li, Duo

    2009-01-01

    The advent of multiple global crises, especially those of climate change, economics, energy, water, food and health evident in 2008, is of considerable moment to those who are suffering their consequences and for those with responsibility and interest in the systems affected. A coalition of parties in the Asia Pacific Region who work in the food and health systems met in August, 2009 in Taiwan and instigated a Food in Health Security (FIHS) Network which might join with other like-minded networks in and beyond the region. Sustainable health has many dimensions, among which food and nutrition is often neglected; there is a wide spectrum of nutritionally-related disorders. Malnutrition remains the global concern for agricultural research and development scientists and linkage with the health sector is key to progress. The disconnect between agricultural and health sectors negatively impacts consumer nutrition and health. Ethical and equity affect food and health systems. Food and health security is attainable only when the underlying social inequities are addressed; it is an ethical issue as reflected in the UN Universal declaration of Human Rights which includes the right to food for health and well-being. Food and health security are part of the larger security agenda and merit corresponding attention. Policy recommendations with immediacy are greater investment in combined food and health research; an Asia Pacific security agenda which emphasizes planetary, human, health and food security as relevant to traditional defence security; and community and household security measures which include maternal literacy, communication technology and entrepreneurial opportunity.

  3. China's water, energy and food nexus - an assessment of the sustainability of the "3 Red Lines" water policies in the Haihe Basin

    NASA Astrophysics Data System (ADS)

    Qin, Ying; Allwood, Julian; Richards, Keith

    2016-04-01

    Population growth and economic development continue to put increasing pressures on China's limited resources which are further exacerbated by the country's substantial regional variations in both natural and socioeconomic conditions. China's pursuit of water, energy and food security faces trade-offs and tensions and the Haihe Basin exemplifies these issues. The river basin contains the capital region of Beijing, Hebei and Tianjin which are already experiencing stress and shortfalls of water resources as a result of intense competition for limited resources. To tackle water scarcity and promote more sustainable use of water, the government has implemented national and regional "3 Red Lines" water policies but they are not integrated with energy and food policies. The aim of this analysis is to assess the sustainability of the regional "3 Red Lines" water targets and their compatibility with energy and food security. This study uses a spatially-explicit, integrated resource model which integrates a hydrological model (GWAVA) with energy and food sub-models in order to analyse current and future resource availability and demand. To assess resource futures, different demand and supply scenarios were analysed up to 2030. Results are visualised as maps and connected Sankey diagrams and outputs are compared with the "3 Red Lines" water targets as well as against indicators related to land and energy policies. The results show that under a business-as-usual scenario, total water demands for Beijing, Tianjin and Hebei are unlikely to comply with future water targets. Reducing water use in the industry and agriculture sectors will be critical in this water-scarce region and whilst efficiency improvements are important, technology choices appear to make the most significant impact e.g. irrigation method for agriculture and cooling technology for power generation. However, both these water saving-measures have trade-offs in energy consumption. Proposed water saving plans of changing the cropping system to grow less wheat could also significantly reduce the demand for water but has trade-offs in maintaining national food security. Given the region's limited water availability, growing demands from competing sectors as well as groundwater use restrictions, future supply will become more reliant on other sources i.e. water transfer, desalination and recycled water which are all power intensive. The approach used in this study enables the identification of critical trade-offs between resource security measures and policies. This would allow decision makers to visualise and better understand the inter-dependencies between resources and not be blindsided by unintended consequences in the pursuit of energy, water and food security.

  4. Personal, Electronic, Secure National Library of Medicine Hosts Health Records Conference

    MedlinePlus

    ... Bar Home Current Issue Past Issues EHR Personal, Electronic, Secure: National Library of Medicine Hosts Health Records ... One suggestion for saving money is to implement electronic personal health records. With this in mind, the ...

  5. Laser applications to chemical, security, and environmental analysis: introduction to the feature issue.

    PubMed

    Seeger, Thomas; Dreier, Thomas; Chen, Weidong; Kearny, Sean; Kulatilaka, Waruna

    2017-04-10

    This Applied Optics feature issue on laser applications to chemical, security, and environmental analysis (LACSEA) highlights papers presented at the LACSEA 2016 Fifteenth Topical Meeting sponsored by the Optical Society of America.

  6. One-Day Conference on School Safety & Security and Fair Dismissals Issues (Dayton, Ohio, June 24, 1999).

    ERIC Educational Resources Information Center

    Education Law Association, Dayton, OH.

    This booklet contains five chapters relating to issues in school safety and security, and fair dismissals: (1) "Ohio Legislation and Federal and State Decisions" (Richard J. Dickinson). Items of deliberation include financial matters, school safety issues, administrator and teacher contract matters, Title IX liability, school prayer, drug testing…

  7. Physical security and cyber security issues and human error prevention for 3D printed objects: detecting the use of an incorrect printing material

    NASA Astrophysics Data System (ADS)

    Straub, Jeremy

    2017-06-01

    A wide variety of characteristics of 3D printed objects have been linked to impaired structural integrity and use-efficacy. The printing material can also have a significant impact on the quality, utility and safety characteristics of a 3D printed object. Material issues can be created by vendor issues, physical security issues and human error. This paper presents and evaluates a system that can be used to detect incorrect material use in a 3D printer, using visible light imaging. Specifically, it assesses the ability to ascertain the difference between materials of different color and different types of material with similar coloration.

  8. Effect of fossil fuels on the parameters of CO2 capture.

    PubMed

    Nagy, Tibor; Mizsey, Peter

    2013-08-06

    The carbon dioxide capture is a more and more important issue in the design and operation of boilers and/or power stations because of increasing environmental considerations. Such processes, absorber desorber should be able to cope with flue gases from the use of different fossil primary energy sources, in order to guarantee a flexible, stable, and secure energy supply operation. The changing flue gases have significant influence on the optimal operation of the capture process, that is, where the required heating of the desorber is the minimal. Therefore special considerations are devoted to the proper design and control of such boiler and/or power stations equipped with CO2 capture process.

  9. Consumer Views on Plug-in Electric Vehicles -- National Benchmark Report (Second Edition)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Singer, Mark

    2016-12-01

    Vehicle manufacturers, government agencies, universities, private researchers, and organizations worldwide are pursuing advanced vehicle technologies that aim to reduce the consumption of petroleum in the forms of gasoline and diesel. Plug-in electric vehicles (PEVs) are one such technology. This report, an update to the version published in January 2016, details findings from a study in February 2015 of broad American public sentiments toward issues that surround PEVs. This report is supported by the U.S. Department of Energy's Vehicle Technologies Office in alignment with its mission to develop and deploy these technologies to improve energy security, enhance mobility flexibility, reduce transportationmore » costs, and increase environmental sustainability.« less

  10. The Barriers to Acceptance of Plug-in Electric Vehicles: 2017 Update

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Singer, Mark R.

    Vehicle manufacturers, government agencies, universities, private researchers, and organizations worldwide are pursuing advanced vehicle technologies that aim to reduce the consumption of petroleum in the forms of gasoline and diesel. Plug-in electric vehicles (PEVs) are one such technology. This report, an update to the previous version published in December 2016, details findings from a study in February 2017 of broad American public sentiments toward issues that surround PEVs. This report is supported by the U.S. Department of Energy's Vehicle Technologies Office in alignment with its mission to develop and deploy these technologies to improve energy security, enhance mobility flexibility, reducemore » transportation costs, and increase environmental sustainability.« less

  11. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  12. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  13. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  14. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  15. Medical image security in a HIPAA mandated PACS environment.

    PubMed

    Cao, F; Huang, H K; Zhou, X Q

    2003-01-01

    Medical image security is an important issue when digital images and their pertinent patient information are transmitted across public networks. Mandates for ensuring health data security have been issued by the federal government such as Health Insurance Portability and Accountability Act (HIPAA), where healthcare institutions are obliged to take appropriate measures to ensure that patient information is only provided to people who have a professional need. Guidelines, such as digital imaging and communication in medicine (DICOM) standards that deal with security issues, continue to be published by organizing bodies in healthcare. However, there are many differences in implementation especially for an integrated system like picture archiving and communication system (PACS), and the infrastructure to deploy these security standards is often lacking. Over the past 6 years, members in the Image Processing and Informatics Laboratory, Childrens Hospital, Los Angeles/University of Southern California, have actively researched image security issues related to PACS and teleradiology. The paper summarizes our previous work and presents an approach to further research on the digital envelope (DE) concept that provides image integrity and security assurance in addition to conventional network security protection. The DE, including the digital signature (DS) of the image as well as encrypted patient information from the DICOM image header, can be embedded in the background area of the image as an invisible permanent watermark. The paper outlines the systematic development, evaluation and deployment of the DE method in a PACS environment. We have also proposed a dedicated PACS security server that will act as an image authority to check and certify the image origin and integrity upon request by a user, and meanwhile act also as a secure DICOM gateway to the outside connections and a PACS operation monitor for HIPAA supporting information. Copyright 2002 Elsevier Science Ltd.

  16. Contemporary United States Foreign Policy Towards Indonesia

    DTIC Science & Technology

    2004-01-01

    regard to resolving a number of longstanding territorial disputes, and it has become a cornerstone for the promotion of economic and social development...and stability and security in the region. However, Indonesia is also faced with a variety of social , economic, and internal security issues, most...faced with significant social , economic, and security issues. Thesis Question The thesis question is: Does contemporary US policy promote US national

  17. On the Brink: Instability and the Prospect of State Failure in Pakistan

    DTIC Science & Technology

    2010-04-12

    unpredictable posture. Most importantly, these historical events, coupled with current political , economic, and security related issues, have created a...current political , economic, and security related issues, have created a fragile state with the propensity to fail. Therefore, this monograph highlights...hardships that have affected the state’s political stability, economic performance, and security. These unrelenting problems lie at the foundation

  18. Raw material ‘criticality’—sense or nonsense?

    NASA Astrophysics Data System (ADS)

    Frenzel, M.; Kullik, J.; Reuter, M. A.; Gutzmer, J.

    2017-03-01

    The past decade has seen a resurgence of interest in the supply security of mineral raw materials. A key to the current debate is the concept of ‘criticality’. The present article reviews the criticality concept, as well as the methodologies used in its assessment, including a critical evaluation of their validity in view of classical risk theory. Furthermore, it discusses a number of risks present in global raw materials markets that are not captured by most criticality assessments. Proposed measures for the alleviation of these risks are also presented. We find that current assessments of raw material criticality are fundamentally flawed in several ways. This is mostly due to a lack of adherence to risk theory, and highly limits their applicability. Many of the raw materials generally identified as critical are probably not critical. Still, the flaws of current assessments do not mean that the general issue of supply security can simply be ignored. Rather, it implies that new assessments are required. While the basic theoretical framework for such assessments is outlined in this review, detailed method development will require a major collaborative effort between different disciplines along the raw materials value chain. In the opinion of the authors, the greatest longer-term challenge in the raw materials sector is to stop, or counteract the effects of, the escalation of unit energy costs of production. This issue is particularly pressing due to its close link with the renewable energy transition, requiring more metal and mineral raw materials per unit energy produced. The solution to this problem will require coordinated policy action, as well as the collaboration of scientists from many different fields—with physics, as well as the materials and earth sciences in the lead.

  19. Is the biggest security threat to medical information simply a lack of understanding?

    PubMed

    Williams, Patricia A H

    2011-01-01

    Connecting Australian health services and the e-health initiative is a major focus in the current health environment. Many issues are presented as key to its success including solving issues with confidentiality and privacy. However, the main problem may not be these issues in sharing information but the fact that the point of origin of such records is still relatively insecure. This paper highlights why this may be the case. Research into the security of medical information has shown that many primary healthcare providers are unable to create an environment with effective information security. Numerous factors contribute to this complex situation including a trustful environment, the resultant security culture and the capability of individual healthcare organisations. Further, the growing importance of new directions in the use of patient information is considered. This paper discusses these issues and positions them within the complex environment that is healthcare. In our current health system infrastructure, the points of origin of patient information are our most vulnerable. This entwined with progressively new uses of this information expose additional security concerns, such as re-identification of information, that require attention.

  20. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Contingency Measures § 1542.303 Security Directives and Information Circulars. (a) TSA may issue an... Security Directive by submitting data, views, or arguments in writing to TSA. TSA may amend the Security...

  1. Whither the RMA: Two Perspectives on Tomorrow’s Army

    DTIC Science & Technology

    1994-07-22

    HENRI (ROY) ALCALA heads a consulting firm, Alcala Enterprises, which specializes in national security and foreign policy issues . He retired from the...thinking about national security was too constrained by immediate issues . Downsizing of force structure, budget reductions, Bosnia, and other issues were all...these immediate issues as signposts of the future, even though little evidence existed to support such aI :use. From many years of experience in long

  2. Legal issues of the electronic dental record: security and confidentiality.

    PubMed

    Szekely, D G; Milam, S; Khademi, J A

    1996-01-01

    Computer-based, electronic dental record keeping involves complex issues of patient privacy and the dental practitioner's ethical duty of confidentiality. Federal and state law is responding to the new legal issues presented by computer technology. Authenticating the electronic record in terms of ensuring its reliability and accuracy is essential in order to protect its admissibility as evidence in legal actions. Security systems must be carefully planned to limit access and provide for back-up and storage of dental records. Carefully planned security systems protect the patient from disclosure without the patient's consent and also protect the practitioner from the liability that would arise from such disclosure. Human errors account for the majority of data security problems. Personnel security is assured through pre-employment screening, employment contracts, policies, and staff education. Contracts for health information systems should include provisions for indemnification and ensure the confidentiality of the system by the vendor.

  3. Introduction

    NASA Astrophysics Data System (ADS)

    Thoma, Klaus; Hiller, Daniel

    Security research as a practical discipline has a long-standing history. Faced with myriad hazards throughout its past, mankind has developed sophisticated means to counter such threats. The latter include natural disasters such as earthquakes, floods and fires, but also encompass man-made hazards such as military aggression, terrorist attacks or threats resulting from the malicious application of technological developments. Since the end of the Cold War major armed conflicts between nations of the Western hemisphere have become highly unlikely and genuinely different security issues have become the focus of concern. The terrorist attacks of 2001 against the United States, the train bombings of Madrid in 2004 and the bombings of London in 2005 were horrific embodiments of a new security environment that has evolved on a global scale. One could list numerous other examples of both executed attacks and successfully deterred attempts from around the world. Our modern industrial societies are interlinked with infrastructure networks, providing citizens with mobility, energy and information flows, which also open the door to a whole new dimension of vulnerabilities. Security research, once anything but a practical discipline with a capacity for reacting to short-term demands, has in the span of only a few years evolved into an entirely new scientific discipline uniting various fields of research. Today, security research (in Europe) encompasses a broad community of natural/engineering and social sciences.

  4. P.L. 110-140, "Energy Independence and Security Act of 2007", 2007

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2007-12-19

    The Energy Independence and Security Act of 2007 (EISA), signed into law on December 19, 2007, set forth an agenda for improving U.S. energy security across the entire economy. While industrial energy efficiency is specifically called out in Title IV, Subtitle D, other EISA provisions also apply to AMO activities.

  5. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... providing security education and training. A licensee or other entity subject to part 95 may obtain...

  6. 10 CFR 95.49 - Security of automatic data processing (ADP) systems.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security of automatic data processing (ADP) systems. 95.49 Section 95.49 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.49 Security of...

  7. How Academies use science to enhance global security and well-being.

    NASA Astrophysics Data System (ADS)

    Boright, John

    2017-01-01

    Science academies were originally created to facilitate science communication and later to recognize excellence. But in the last 20 years some 150 academies of science, engineering,and medicine around the world have united to cooperate in contributing to human welfare, by: 1. Providing evidence-based inputs to national, regional, and global policies addressing human needs, and 2. Conducting cooperative programs to increase the capacity of academies to provide such advice, and to better connect academies to publics and to policy makers. Examples: At the global level, 112 academies of science produce brief common statements on major global issues. They have also created an organization to provide in-depth reports on major issues such as a transition to sustainable energy systems, boosting agricultural productivity in Africa, and a guide to responsible conduct in the global research enterprise. Regional networks of those academies, in Africa, the Americas, Asia, and Europe conduct program on topics such as water, energy, engagement of women in science, and science education. They also help and mentor new academies.

  8. Power politics: National energy strategies of the nuclear newly independent states of Armenia, Lithuania and Ukraine

    NASA Astrophysics Data System (ADS)

    Sabonis-Chafee, Theresa Marie

    The successor states of Armenia, Lithuania and Ukraine arrived at independence facing extraordinary challenges in their energy sectors. Each state was a net importer, heavily dependent on cheap energy supplies, mostly from Russia. Each state also inherited a nuclear power complex over which it had not previously exercised full control. In the time period 1991--1996, each state attempted to impose coherence on the energy sector, selecting a new course for the pieces it had inherited from a much larger, highly integrated energy structure. Each state attempted to craft national energy policies in the midst of severe supply shocks and price shocks. Each state developed institutions to govern its nuclear power sector. The states' challenges were made even greater by the fact that they had few political or economic structures necessary for energy management, and sought to create those structures at the same time. This dissertation is a systematic, non-quantitative examination of how each state's energy policies developed during the 1991--1996 time period. The theoretical premise of the analysis (drawn from Statist realism) is that systemic variables---regional climate and energy vulnerability---provide the best explanations for the resulting energy policy decisions. The dependent variable is defined as creation and reform of energy institutions. The independent variables include domestic climate, regional climate, energy vulnerability and transnational assistance. All three states adopted rhetoric and legislation declaring energy a strategic sector. The evidence suggests that two of the states, Armenia and Lithuania, which faced tense regional climates and high levels of energy vulnerability, succeeded in actually treating energy strategically, approaching energy as a matter of national security or "high politics." The third state, Ukraine, failed to do so. The evidence presented suggests that the systemic variables (regional climate and energy vulnerability) provided a more favorable environment for Ukraine, one in which the state attempted reform of the sector, but not as a concerted national security issue.

  9. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aliprantis, Dionysios; El-Sharkawi, Mohamed; Muljadi, Eduard

    The main objective of this special issue is to collect and disseminate publications that highlight recent advances and breakthroughs in the area of renewable energy resources. The use of these resources for production of electricity is increasing rapidly worldwide. As of 2015, a majority of countries have set renewable electricity targets in the 10%-40% range to be achieved by 2020-2030, with a few notable exceptions aiming for 100% generation by renewables. We are experiencing a truly unprecedented transition away from fossil fuels, driven by environmental, energy security, and socio-economic factors.Electric machines can be found in a wide range of renewablemore » energy applications, such as wind turbines, hydropower and hydrokinetic systems, flywheel energy storage devices, and low-power energy harvesting systems. Hence, the design of reliable, efficient, cost-effective, and controllable electric machines is crucial in enabling even higher penetrations of renewable energy systems in the smart grid of the future. In addition, power electronic converter design and control is critical, as they provide essential controllability, flexibility, grid interface, and integration functions.« less

  10. Nuclear Power; Past, present and future

    NASA Astrophysics Data System (ADS)

    Elliott, David

    2017-04-01

    This book looks at the early history of nuclear power, at what happened next, and at its longer-term prospects. The main question is: can nuclear power overcome the problems that have emerged? It was once touted as the ultimate energy source, freeing mankind from reliance on dirty, expensive fossil energy. Sixty years on, nuclear only supplies around 11.5% of global energy and is being challenged by cheaper energy options. While the costs of renewable sources, like wind and solar, are falling rapidly, nuclear costs have remained stubbornly high. Its development has also been slowed by a range of other problems, including a spate of major accidents, security concerns and the as yet unresolved issue of what to do with the wastes that it produces. In response, a new generation of nuclear reactors is being developed, many of them actually revised versions of the ideas first looked at in the earlier phase. Will this new generation of reactors bring nuclear energy to the forefront of energy production in the future?

  11. New software to model energy dispersive X-ray diffraction in polycrystalline materials

    NASA Astrophysics Data System (ADS)

    Ghammraoui, B.; Tabary, J.; Pouget, S.; Paulus, C.; Moulin, V.; Verger, L.; Duvauchelle, Ph.

    2012-02-01

    Detection of illicit materials, such as explosives or drugs, within mixed samples is a major issue, both for general security and as part of forensic analyses. In this paper, we describe a new code simulating energy dispersive X-ray diffraction patterns in polycrystalline materials. This program, SinFullscat, models diffraction of any object in any diffractometer system taking all physical phenomena, including amorphous background, into account. Many system parameters can be tuned: geometry, collimators (slit and cylindrical), sample properties, X-ray source and detector energy resolution. Good agreement between simulations and experimental data was obtained. Simulations using explosive materials indicated that parameters such as the diffraction angle or the energy resolution of the detector have a significant impact on the diffraction signature of the material inspected. This software will be a convenient tool to test many diffractometer configurations, providing information on the one that best restores the spectral diffraction signature of the materials of interest.

  12. IMPACTS Results Summary for CY 2010

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Weakley, Steven A.

    Working in partnership with industry, the U.S. Department of Energy’s (DOE’s) Advanced Manufacturing Office (AMO) is helping reduce industrial energy use, carbon emissions, and waste while boosting productivity and economic competitiveness. Operating within the Office of Energy Efficiency and Renewable Energy (EERE), ITP conducts research, development, and demonstration (RD&D) projects and technology transfer activities that are producing substantial benefits to industry and helping the nation to address some of its biggest challenges in the areas of energy security and environmental performance. This document summarizes some of the impacts of ITP’s programs through 2010. The selection of 2010 as the timeframemore » for this report recognizes the fact that it takes at least two years to gain a full perspective on program performance and to assess the results of commercialization efforts for the technologies and practices at issue.« less

  13. The assessment of global thermo-energy performances of existing district heating systems optimized by harnessing renewable energy sources

    NASA Astrophysics Data System (ADS)

    Şoimoşan, Teodora M.; Danku, Gelu; Felseghi, Raluca A.

    2017-12-01

    Within the thermo-energy optimization process of an existing heating system, the increase of the system's energy efficiency and speeding-up the transition to green energy use are pursued. The concept of multi-energy district heating system, with high harnessing levels of the renewable energy sources (RES) in order to produce heat, is expected to be the key-element in the future urban energy infrastructure, due to the important role it can have in the strategies of optimizing and decarbonizing the existing district heating systems. The issues that arise are related to the efficient integration of different technologies of harnessing renewable energy sources in the energy mix and to the increase of the participation levels of RES, respectively. For the holistic modeling of the district heating system, the concept of the energy hub was used, where the synergy of different primary forms of entered energy provides the system a high degree energy security and flexibility in operation. The optimization of energy flows within the energy hub allows the optimization of the thermo-energy district system in order to approach the dual concept of smart city & smart energy.

  14. A decade of plant proteomics and mass spectrometry: translation of technical advancements to food security and safety issues.

    PubMed

    Agrawal, Ganesh Kumar; Sarkar, Abhijit; Righetti, Pier Giorgio; Pedreschi, Romina; Carpentier, Sebastien; Wang, Tai; Barkla, Bronwyn J; Kohli, Ajay; Ndimba, Bongani Kaiser; Bykova, Natalia V; Rampitsch, Christof; Zolla, Lello; Rafudeen, Mohamed Suhail; Cramer, Rainer; Bindschedler, Laurence Veronique; Tsakirpaloglou, Nikolaos; Ndimba, Roya Janeen; Farrant, Jill M; Renaut, Jenny; Job, Dominique; Kikuchi, Shoshi; Rakwal, Randeep

    2013-01-01

    Tremendous progress in plant proteomics driven by mass spectrometry (MS) techniques has been made since 2000 when few proteomics reports were published and plant proteomics was in its infancy. These achievements include the refinement of existing techniques and the search for new techniques to address food security, safety, and health issues. It is projected that in 2050, the world's population will reach 9-12 billion people demanding a food production increase of 34-70% (FAO, 2009) from today's food production. Provision of food in a sustainable and environmentally committed manner for such a demand without threatening natural resources, requires that agricultural production increases significantly and that postharvest handling and food manufacturing systems become more efficient requiring lower energy expenditure, a decrease in postharvest losses, less waste generation and food with longer shelf life. There is also a need to look for alternative protein sources to animal based (i.e., plant based) to be able to fulfill the increase in protein demands by 2050. Thus, plant biology has a critical role to play as a science capable of addressing such challenges. In this review, we discuss proteomics especially MS, as a platform, being utilized in plant biology research for the past 10 years having the potential to expedite the process of understanding plant biology for human benefits. The increasing application of proteomics technologies in food security, analysis, and safety is emphasized in this review. But, we are aware that no unique approach/technology is capable to address the global food issues. Proteomics-generated information/resources must be integrated and correlated with other omics-based approaches, information, and conventional programs to ensure sufficient food and resources for human development now and in the future. © 2013 Wiley Periodicals, Inc.

  15. Data management issues in mobile ad hoc networks

    PubMed Central

    HARA, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990’s. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000’s have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research. PMID:28496052

  16. Data management issues in mobile ad hoc networks.

    PubMed

    Hara, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990's. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000's have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research.

  17. Sandia National Laboratories: Hydrogen Risk Assessment Models toolkit now

    Science.gov Websites

    Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers

  18. Sandia National Laboratories: 100 Resilient Cities: Sandia Challenge:

    Science.gov Websites

    Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers

  19. Learning to See the Opportunities in Crisis and Catastrophe: A Decision Makers Guide to the Issue-Attention Cycle

    DTIC Science & Technology

    2015-09-01

    riots, Ferguson riots, AIDS, National Security Agency (NSA) leaks, childhood obesity , and social security. Thirteen issues make up this cluster...civil issues with low numbers of fatalities and economic impacts. Issues of this kind include childhood obesity (2.25 hearings per year); riots due...up the 25th to 50th percentile include those having only tangential impact to the public, including among others, global warming, childhood obesity

  20. Secrecy vs. the need for ecological information: challenges to environmental activism in Russia.

    PubMed

    Jandl, T

    1998-01-01

    This article identifies the lessons learned from the Nikitin case study in Russia. The Nikitin case involves the analysis of sources of radioactive contamination in several Russian counties and in the Russian Northern Fleet. Norway was interested in the issue due to proximity to the storage sites. The issue involved national security and environmental protection. It was learned that mixing national security issues with environmental issues offers dangerous and multiple challenges. Environmental groups must build relationships with a wide audience. International security policy must include the issues of globalization of trade and the spread of environmental problems into the global commons (oceans and atmosphere). The risk of an environmentally dangerous accident as a consequence of Cold War activities is greater than the risk of nuclear war. Secrecy in military affairs is not justified when there is inadequate storage of nuclear weapons and contaminated materials. In Russia, the concern is great due to their economic transition and shortages of funds for even the most basic needs, which excludes nuclear waste clean up. The Bellona Foundation studied the extent of nuclear pollution from military nuclear reactors in the Kola peninsula of northwest Russia, in 1994 and 1996. Russian security police arrested one of the report authors for alleged national security violations. A valuable lesson learned was that local Russian environmental groups needed international support. The military nuclear complex poses an enormous hazard. Limiting inspections is an unacceptable national security risk. The new Russian law on state secrets is too broad.

  1. Food and nutrition security in the Hindu Kush Himalayan region.

    PubMed

    Rasul, Golam; Hussain, Abid; Mahapatra, Bidhubhusan; Dangol, Narendra

    2018-01-01

    The status of food and nutrition security and its underlying factors in the Hindu-Kush Himalayan (HKH) region is investigated. In this region, one third to a half of children (<5 years of age) suffer from stunting, with the incidence of wasting and under-weight also being very high. The prevalence of stunting, wasting and under-weight in children is particularly high in some mountain areas such as Meghalaya state in India, the western mountains and far-western hills of Nepal, Balochistan province in Pakistan, eastern Afghanistan, and Chin state in Myanmar. Food habits in the HKH region are changing. This has led to a deterioration in traditional mountain food systems with a decline in agrobiodiversity. Factors such as high poverty and low dietary energy intakes, a lack of hygienic environments, inadequate nutritional knowledge, and climate change and environmental degradation are also influencing food and nutrition security in the HKH region. To achieve sustainable food and nutrition security in the mountains, this study suggests a multi-sectoral integrated approach with consideration of nutritional aspects in all development processes dealing with economic, social, agricultural and public health issues. © 2017 Society of Chemical Industry. © 2017 Society of Chemical Industry.

  2. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  3. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  4. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  5. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  6. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  7. China’s Energy Security: The Grand Hedging Strategy

    DTIC Science & Technology

    2010-05-01

    spotlight. The key to sustaining this dynamic economic growth is access to petroleum resources. The central question of this monograph is as follows...Is China’s energy security strategy liberal-institutionalist or realist-mercantilist? Using a qualitative case study methodology that explores the...dependent variable -- energy security -- using three independent variables (cost of supply, reliability of supply, and security of supply), China’s

  8. 50 CFR 600.240 - Security assurances.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 12 2013-10-01 2013-10-01 false Security assurances. 600.240 Section 600... ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Council Membership § 600.240 Security assurances. (a) DOC Office of Security will issue security assurances to Council members following completion...

  9. 50 CFR 600.240 - Security assurances.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 12 2012-10-01 2012-10-01 false Security assurances. 600.240 Section 600... ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Council Membership § 600.240 Security assurances. (a) DOC Office of Security will issue security assurances to Council members following completion...

  10. 5 CFR 1312.31 - Security violations.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified Information § 1312.31 Security violations. (a) A security violation notice is issued by the United...

  11. 50 CFR 600.240 - Security assurances.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 10 2011-10-01 2011-10-01 false Security assurances. 600.240 Section 600... ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Council Membership § 600.240 Security assurances. (a) DOC Office of Security will issue security assurances to Council members following completion...

  12. Sandia National Laboratories: National Security Missions: International

    Science.gov Websites

    Transportation Energy Energy Research Global Security WMD Counterterrorism & Response Global Threat Reduction Homeland Defense & Force Protection Homeland Security Cyber & Infrastructure Security Global Business Procurement Technical Assistance Program (PTAP) Current Suppliers iSupplier Account Accounts

  13. The security energy encryption in wireless power transfer

    NASA Astrophysics Data System (ADS)

    Sadzali, M. N.; Ali, A.; Azizan, M. M.; Albreem, M. A. M.

    2017-09-01

    This paper presents a concept of security in wireless power transfer (WPT) by applying chaos theory. Chaos theory is applied as a security system in order to safeguard the transfer of energy from a transmitter to the intended receiver. The energy encryption of the wireless power transfer utilizes chaos theory to generate the possibility of a logistic map for the chaotic security key. The simulation for energy encryption wireless power transfer system was conducted by using MATLAB and Simulink. By employing chaos theory, the chaotic key ensures the transmission of energy from transmitter to its intended receiver.

  14. A Survey on Cyber Security awareness among college students in Tamil Nadu

    NASA Astrophysics Data System (ADS)

    Senthilkumar, K.; Easwaramoorthy, Sathishkumar

    2017-11-01

    The aim of the study is to analyse the awareness of cyber security on college students in Tamil Nadu by focusing various security threats in the internet. In recent years cybercrime is an enormous challenge in all areas including national security, public safety and personal privacy. To prevent from a victim of cybercrime everyone must know about their own security and safety measures to protect by themselves. A well-structured questionnaire survey method will be applied to analyse the college student’s awareness in the area of cyber security. This survey will be going to conducted in major cities of Tamil Nadu by focusing various security threats like email, virus, phishing, fake advertisement, popup windows and other attacks in the internet. This survey examines the college students’ awareness and the level of awareness about the security issues and some suggestions are set forth to overcome these issues.

  15. 14 CFR 415.23 - Policy review.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF... license application to determine whether it presents any issues affecting U.S. national security or... presents any issues affecting U.S. national security. (2) The FAA consults with the Department of State to...

  16. 14 CFR 431.55 - Payload reentry review.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ....55 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT... any issues that would adversely affect U.S. national security or foreign policy interests, would... reentry of a proposed payload presents any issues adversely affecting U.S. national security. (c) The FAA...

  17. 14 CFR 431.55 - Payload reentry review.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ....55 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT... any issues that would adversely affect U.S. national security or foreign policy interests, would... reentry of a proposed payload presents any issues adversely affecting U.S. national security. (c) The FAA...

  18. 14 CFR 431.55 - Payload reentry review.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ....55 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT... any issues that would adversely affect U.S. national security or foreign policy interests, would... reentry of a proposed payload presents any issues adversely affecting U.S. national security. (c) The FAA...

  19. 14 CFR 431.55 - Payload reentry review.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ....55 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT... any issues that would adversely affect U.S. national security or foreign policy interests, would... reentry of a proposed payload presents any issues adversely affecting U.S. national security. (c) The FAA...

  20. 14 CFR 415.23 - Policy review.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF... license application to determine whether it presents any issues affecting U.S. national security or... presents any issues affecting U.S. national security. (2) The FAA consults with the Department of State to...

  1. 14 CFR 415.23 - Policy review.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF... license application to determine whether it presents any issues affecting U.S. national security or... presents any issues affecting U.S. national security. (2) The FAA consults with the Department of State to...

  2. Personal health record systems and their security protection.

    PubMed

    Win, Khin Than; Susilo, Willy; Mu, Yi

    2006-08-01

    The objective of this study is to analyze the security protection of personal health record systems. To achieve this we have investigated different personal health record systems, their security functions, and security issues. We have noted that current security mechanisms are not adequate and we have proposed some security mechanisms to tackle these problems.

  3. Enhancing security and improving interoperability in healthcare information systems.

    PubMed

    Gritzalis, D A

    1998-01-01

    Security is a key issue in healthcare information systems, since most aspects of security become of considerable or even critical importance when handling healthcare information. In addition, the intense need for information exchange has revealed interoperability of systems and applications as another key issue. Standardization can play an important role towards both these issues. In this paper, relevant standardization activities are briefly presented, and existing and emerging healthcare information security standards are identified and critically analysed. The analysis is based on a framework which has been developed for this reason. Therefore, the identification of gaps and inconsistencies in current standardization, the description of the conflicts of standards with legislation, and the analysis of implications of these standards to user organizations, are the main results of this paper.

  4. Energy Structure and Energy Security under Climate Mitigation Scenarios in China

    PubMed Central

    Matsumoto, Ken’ichi

    2015-01-01

    This study investigates how energy structure and energy security in China will change in the future under climate mitigation policy scenarios using Representative Concentration Pathways in a computable general equilibrium model. The findings suggest that to reduce greenhouse gas emissions, China needs to shift its energy structure from fossil fuel dominance to renewables and nuclear. The lower the allowable emissions, the larger the shifts required. Among fossil fuels, coal use particularly must significantly decrease. Such structural shifts will improve energy self-sufficiency, thus enhancing energy security. Under the policy scenarios, energy-source diversity as measured by the Herfindahl Index improves until 2050, after which diversity declines because of high dependence on a specific energy source (nuclear and biomass). Overall, however, it is revealed that energy security improves along with progress in climate mitigation. These improvements will also contribute to the economy by reducing energy procurement risks. PMID:26660094

  5. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... privacy issues, please contact: Jonathan Cantor, (202-343-1717), Acting Chief Privacy Officer, Privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  6. Identifying the Science and Technology Dimensions of Emerging Public Policy Issues through Horizon Scanning

    PubMed Central

    Parker, Miles; Acland, Andrew; Armstrong, Harry J.; Bellingham, Jim R.; Bland, Jessica; Bodmer, Helen C.; Burall, Simon; Castell, Sarah; Chilvers, Jason; Cleevely, David D.; Cope, David; Costanzo, Lucia; Dolan, James A.; Doubleday, Robert; Feng, Wai Yi; Godfray, H. Charles J.; Good, David A.; Grant, Jonathan; Green, Nick; Groen, Arnoud J.; Guilliams, Tim T.; Gupta, Sunjai; Hall, Amanda C.; Heathfield, Adam; Hotopp, Ulrike; Kass, Gary; Leeder, Tim; Lickorish, Fiona A.; Lueshi, Leila M.; Magee, Chris; Mata, Tiago; McBride, Tony; McCarthy, Natasha; Mercer, Alan; Neilson, Ross; Ouchikh, Jackie; Oughton, Edward J.; Oxenham, David; Pallett, Helen; Palmer, James; Patmore, Jeff; Petts, Judith; Pinkerton, Jan; Ploszek, Richard; Pratt, Alan; Rocks, Sophie A.; Stansfield, Neil; Surkovic, Elizabeth; Tyler, Christopher P.; Watkinson, Andrew R.; Wentworth, Jonny; Willis, Rebecca; Wollner, Patrick K. A.; Worts, Kim; Sutherland, William J.

    2014-01-01

    Public policy requires public support, which in turn implies a need to enable the public not just to understand policy but also to be engaged in its development. Where complex science and technology issues are involved in policy making, this takes time, so it is important to identify emerging issues of this type and prepare engagement plans. In our horizon scanning exercise, we used a modified Delphi technique [1]. A wide group of people with interests in the science and policy interface (drawn from policy makers, policy adviser, practitioners, the private sector and academics) elicited a long list of emergent policy issues in which science and technology would feature strongly and which would also necessitate public engagement as policies are developed. This was then refined to a short list of top priorities for policy makers. Thirty issues were identified within broad areas of business and technology; energy and environment; government, politics and education; health, healthcare, population and aging; information, communication, infrastructure and transport; and public safety and national security. PMID:24879444

  7. 17 CFR 239.18 - Form S-11, for registration under the Securities Act of 1933 of securities of certain real estate...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... under the Securities Act of 1933 of securities of certain real estate companies. 239.18 Section 239.18... Securities Act of 1933 of securities of certain real estate companies. This form shall be used for registration under the Securities Act of 1933 of (a) securities issued by real estate investment trusts, as...

  8. 17 CFR 239.18 - Form S-11, for registration under the Securities Act of 1933 of securities of certain real estate...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... under the Securities Act of 1933 of securities of certain real estate companies. 239.18 Section 239.18... Securities Act of 1933 of securities of certain real estate companies. This form shall be used for registration under the Securities Act of 1933 of (a) securities issued by real estate investment trusts, as...

  9. Protecting the Ozone Shield: A New Public Policy

    DTIC Science & Technology

    1991-04-01

    Public Policy Issue; Alterna- 11 tives; Risk Management; Clean Air Act; Global Warming 16. PRICE CODE 17. SECURITY CLASSIFICATION 𔄂. SECURITY...pattern of global warming , commonly known as "the greenhouse effect. 1 OVERVIEW OF THE OZONE DEPLETION PUBLIC POLICY ISSUE In 1974, two atmospheric...inhabitants from the harmful effects of increased UVb radiation and global warming . Another dilemma surrounds this public policy issue since the first

  10. 17 CFR 240.11d1-1 - Exemption of certain securities from section 11(d)(1).

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... issued to the customer as a stockholder of the corporation issuing the security upon which credit is to... issued to the customer as a stockholder if he actually owned the stock giving rise to the right when such right accrued, even though such stock was not registered in his name; and in determining such fact the...

  11. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued or maintained?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false What are the book-entry systems in... BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS... book-entry systems in which auctioned Treasury securities may be issued or maintained? There are three...

  12. State of security at US colleges and universities: a national stakeholder assessment and recommendations.

    PubMed

    Greenberg, Sheldon F

    2007-09-01

    In 2004 the US Department of Justice, Office of Community Oriented Policing Services, sponsored a National Summit on Campus Public Safety. The summit brought together various stakeholders including campus police and security officials, local police chiefs, college and university faculty and administrators, federal officials, students and parents, and community leaders to address the issues and complexities of campus safety. Delegates to the summit identified key issues in campus safety and security, which included establishing a national center on campus safety, balancing traditional open environments with the need to secure vulnerable sites, improving coordination with state and local police, reducing internal fragmentation, elevating professionalism, and increasing eligibility of campus police and security agencies to compete for federal law enforcement funds. Focus on "active shooters" on campus, resulting from the Virginia Tech incident, should not diminish attention placed on the broader, more prevalent safety and security issues facing the nation's educational campuses. Recommendations resulting from the summit called for establishing a national agenda on campus safety, formation of a national center on campus public safety, and increased opportunity for campus police and security agencies to compete for federal and state funds.

  13. Evaluating knowledge benefits of automotive lightweighting materials R&D projects.

    PubMed

    Peretz, Jean H; Das, Sujit; Tonn, Bruce E

    2009-08-01

    This paper presents a set of metrics used to evaluate short-run knowledge benefits that accrued from research and development (R&D) projects funded in fiscal years 2000-2004 by automotive lightweighting materials (ALM) of the U.S. Department of Energy (DOE). Although DOE presents to Congress energy, environmental, and security benefits and costs of its R&D efforts under the Government Performance and Results Act, DOE has yet to include knowledge benefits in that report [U.S. Department of Energy. (2007). Projected benefits of federal energy efficiency and renewable energy programs: FY2008 budget request. NREL/TP-640-41347 (March). Washington, DC: National Renewable Energy Laboratory for DOE Energy Efficiency and Renewable Energy. Retrieved February 12, 2007 from http://www1.eere.energy.gov/ba/pba/2008_benefits.html]. ALM focuses on development and validation of advanced technologies that significantly reduce automotive vehicle body and chassis weight without compromising other attributes such as safety, performance, recyclability, and cost [U.S. Department of Energy. (2005a). Automotive lightweighting materials 2004 annual progress report. Washington, DC: DOE Energy Efficiency and Renewable Energy. Retrieved March 30, 2005 from http://www.eere.energy.gov/vehiclesandfuels/resources/fcvt_alm_fy04.shtml]. The ultimate goal of ALM to have lightweighter materials in vehicles hinges on many issues, including the (1) collaborative nature of ALMs R&D with the automobile industry and (2) manufacturing knowledge gained through the R&D effort. The ALM projects evaluated in this paper yielded numerous knowledge benefits in the short run. While these knowledge benefits are impressive, there remains uncertainty about whether the research will lead to incorporation of lightweight materials by the Big Three automakers into their manufacturing process and introduction of lightweight vehicles into the marketplace. The uncertainty illustrates a difference between (1) knowledge benefits and (2) energy, environmental, and security benefits emanating from R&D.

  14. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.

    PubMed

    Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae

    2015-06-26

    The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

  15. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation

    PubMed Central

    Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae

    2015-01-01

    The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both. PMID:26131669

  16. Mobile healthcare applications: system design review, critical issues and challenges.

    PubMed

    Baig, Mirza Mansoor; GholamHosseini, Hamid; Connolly, Martin J

    2015-03-01

    Mobile phones are becoming increasingly important in monitoring and delivery of healthcare interventions. They are often considered as pocket computers, due to their advanced computing features, enhanced preferences and diverse capabilities. Their sophisticated sensors and complex software applications make the mobile healthcare (m-health) based applications more feasible and innovative. In a number of scenarios user-friendliness, convenience and effectiveness of these systems have been acknowledged by both patients as well as healthcare providers. M-health technology employs advanced concepts and techniques from multidisciplinary fields of electrical engineering, computer science, biomedical engineering and medicine which benefit the innovations of these fields towards healthcare systems. This paper deals with two important aspects of current mobile phone based sensor applications in healthcare. Firstly, critical review of advanced applications such as; vital sign monitoring, blood glucose monitoring and in-built camera based smartphone sensor applications. Secondly, investigating challenges and critical issues related to the use of smartphones in healthcare including; reliability, efficiency, mobile phone platform variability, cost effectiveness, energy usage, user interface, quality of medical data, and security and privacy. It was found that the mobile based applications have been widely developed in recent years with fast growing deployment by healthcare professionals and patients. However, despite the advantages of smartphones in patient monitoring, education, and management there are some critical issues and challenges related to security and privacy of data, acceptability, reliability and cost that need to be addressed.

  17. A smart grid simulation testbed using Matlab/Simulink

    NASA Astrophysics Data System (ADS)

    Mallapuram, Sriharsha; Moulema, Paul; Yu, Wei

    2014-06-01

    The smart grid is the integration of computing and communication technologies into a power grid with a goal of enabling real time control, and a reliable, secure, and efficient energy system [1]. With the increased interest of the research community and stakeholders towards the smart grid, a number of solutions and algorithms have been developed and proposed to address issues related to smart grid operations and functions. Those technologies and solutions need to be tested and validated before implementation using software simulators. In this paper, we developed a general smart grid simulation model in the MATLAB/Simulink environment, which integrates renewable energy resources, energy storage technology, load monitoring and control capability. To demonstrate and validate the effectiveness of our simulation model, we created simulation scenarios and performed simulations using a real-world data set provided by the Pecan Street Research Institute.

  18. 77 FR 49048 - Self-Regulatory Organizations; The Depository Trust Company; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-15

    ... to certain issues of securities in DTC's Fast Automated Securities Transfer program (``FAST''). For securities that are part of the FAST program, the transfer agents hold the securities registered in the name...

  19. Review of Congressional Issues. News from Capitol Hill.

    ERIC Educational Resources Information Center

    Heinz, Ann Simeo

    2002-01-01

    Focuses on U.S. congressional issues in two categories: (1) enacted legislation, and (2) proposed legislation. Addresses topics such as the resolution related to Iraq, the Department of Homeland Security, Pledge of Allegiance, social security protection, elder justice, and women's rights. Includes learning activities. (CMK)

  20. 13 CFR 107.1505 - Liquidity requirements for Licensees issuing Participating Securities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Liquidity requirements for Licensees issuing Participating Securities. 107.1505 Section 107.1505 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees...

  1. Cloud Security: Issues and Research Directions

    DTIC Science & Technology

    2014-11-18

    4. Cloud Computing Security: What Changes with Software - Defined Networking ? Maur´ıcio Tsugawa, Andr´ea Matsunaga, and Jos´e A. B. Fortes 5...machine’s memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software - Defined ... Networking ( SDN ) is deployed within and across clouds. Chapters 5-9 are focused on the protection of data stored in the cloud. In Chapter 5, Wang et

  2. The Evolution of the Automated Continuous Evaluation System (ACES) for Personnel Security

    DTIC Science & Technology

    2013-11-12

    information. It applies business rules to the data, produces a report that flags issues of potential security concern, and electronically transmits...Form 86 (SF- 86) to check these data sources, verify what has been submitted, and collect more information. It applies business rules to the data...subject information. It applies business rules to analyze the data returned, produces a report that flags issues of potential security concern, and

  3. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  4. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  5. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  6. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  7. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  8. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  9. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  10. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  11. National Energy Efficiency Evaluation, Measurement and Verification (EM&V) Standard: Scoping Study of Issues and Implementation Requirements

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schiller Consulting, Inc.; Schiller, Steven R.; Goldman, Charles A.

    2011-02-04

    This report is a scoping study that identifies issues associated with developing a national evaluation, measurement and verification (EM&V) standard for end-use, non-transportation, energy efficiency activities. The objectives of this study are to identify the scope of such a standard and define EM&V requirements and issues that will need to be addressed in a standard. To explore these issues, we provide and discuss: (1) a set of definitions applicable to an EM&V standard; (2) a literature review of existing guidelines, standards, and 'initiatives' relating to EM&V standards as well as a review of 'bottom-up' versus 'top-down' evaluation approaches; (3) amore » summary of EM&V related provisions of two recent federal legislative proposals (Congressman Waxman's and Markey's American Clean Energy and Security Act of 2009 and Senator Bingaman's American Clean Energy Leadership Act of 2009) that include national efficiency resource requirements; (4) an annotated list of issues that that are likely to be central to, and need to be considered when, developing a national EM&V standard; and (5) a discussion of the implications of such issues. There are three primary reasons for developing a national efficiency EM&V standard. First, some policy makers, regulators and practitioners believe that a national standard would streamline EM&V implementation, reduce costs and complexity, and improve comparability of results across jurisdictions; although there are benefits associated with each jurisdiction setting its own EM&V requirements based on their specific portfolio and evaluation budgets and objectives. Secondly, if energy efficiency is determined by the US Environmental Protection Agency to be a Best Available Control Technology (BACT) for avoiding criteria pollutant and/or greenhouse gas emissions, then a standard can be required for documenting the emission reductions resulting from efficiency actions. The third reason for a national EM&V standard is that such a standard is likely to be required as a result of future federal energy legislation that includes end-use energy efficiency, either as a stand-alone energy-efficiency resource standard (EERS) or as part of a clean energy or renewable energy standard. This study is focused primarily on this third reason and thus explores issues associated with a national EM&V standard if energy efficiency is a qualifying resource in federal clean energy legislation. Developing a national EM&V standard is likely to be a lengthy process; this study focuses on the critical first step of identifying the issues that must be addressed in a future standard. Perhaps the most fundamental of these issues is 'how good is good enough?' This has always been the fundamental issue of EM&V for energy efficiency and is a result of the counter-factual nature of efficiency. Counter-factual in that savings are not measured, but estimated to varying degrees of accuracy by comparing energy consumption after a project (program) is implemented with what is assumed to have been the consumption of energy in the absence of the project (program). Therefore, the how good is good enough question is a short version of asking how certain does one have to be of the energy savings estimate that results from EM&V activities and is that level of certainty properly balanced against the amount of effort (resources, time, money) that is utilized to obtain that level of certainty. The implication is that not only should energy efficiency investments be cost-effective, but EM&V investments should consider risk management principles and thus also balance the costs and value of information derived from EM&V (EM&V should also be cost-effective).« less

  12. The Impact of Visibility on Teamwork, Collaborative Communication, and Security in Emergency Departments: An Exploratory Study.

    PubMed

    Gharaveis, Arsalan; Hamilton, D Kirk; Pati, Debajyoti; Shepley, Mardelle

    2017-01-01

    The aim of this study was to examine the influence of visibility on teamwork, collaborative communication, and security issues in emergency departments (EDs). This research explored whether with high visibility in EDs, teamwork and collaborative communication can be improved while the security issues will be reduced. Visibility has been regarded as a critical design consideration and can be directly and considerably impacted by ED's physical design. Teamwork is one of the major related operational outcomes of visibility and involves nurses, support staff, and physicians. The collaborative communication in an ED is another important factor in the process of care delivery and affects efficiency and safety. Furthermore, security is a behavioral factor in ED designs, which includes all types of safety including staff safety, patient safety, and the safety of visitors and family members. This qualitative study investigated the impact of visibility on teamwork, collaborative communication, and security issues in the ED. One-on-one interviews and on-site observation sessions were conducted in a community hospital. Corresponding data analysis was implemented by using computer plan analysis, observation and interview content, and theme analyses. The findings of this exploratory study provided a framework to identify visibility as an influential factor in ED design. High levels of visibility impact productivity and efficiency of teamwork and communication and improve the chance of lowering security issues. The findings of this study also contribute to the general body of knowledge about the effect of physical design on teamwork, collaborative communication, and security.

  13. 10 CFR 1016.23 - Establishment of security areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Establishment of security areas. 1016.23 Section 1016.23 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016... safeguard documents and material containing Restricted Data in accordance with the provisions of §§ 1016.21...

  14. 10 CFR 1016.39 - Termination, suspension, or revocation of security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Termination, suspension, or revocation of security facility approval. 1016.39 Section 1016.39 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Control of Information § 1016.39 Termination, suspension, or revocation of security facility...

  15. 10 CFR 1016.39 - Termination, suspension, or revocation of security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Termination, suspension, or revocation of security facility approval. 1016.39 Section 1016.39 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Control of Information § 1016.39 Termination, suspension, or revocation of security facility...

  16. 10 CFR 1016.23 - Establishment of security areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Establishment of security areas. 1016.23 Section 1016.23 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016... safeguard documents and material containing Restricted Data in accordance with the provisions of §§ 1016.21...

  17. 75 FR 39273 - Energy Independence and Security Act (Pub. L. 110-140)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    ... DEPARTMENT OF THE INTERIOR U.S. Geological Survey Energy Independence and Security Act (Pub. L... Resource Assessment Methodology. SUMMARY: In 2007, the Energy Independence and Security Act (Pub. L. 110... provide important information to evaluate the potential for CO 2 storage as a mitigation option for global...

  18. Department of Homeland Security Assistance to States and Localities: A Summary and Issues for the 111th Congress

    DTIC Science & Technology

    2009-04-21

    6 Intercity Passenger Rail Program (Amtrak) .....................................................................6... Intercity Bus Security Grant Program..............................................................................7 Trucking Security Program...continue security enhancements for its intercity rail services between high-risk urban areas. 20 U.S. Department of Homeland Security, Federal Emergency

  19. Computer Network Security: Best Practices for Alberta School Jurisdictions.

    ERIC Educational Resources Information Center

    Alberta Dept. of Education, Edmonton.

    This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…

  20. 75 FR 64643 - Reporting of Security-Based Swap Transaction Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-20

    ... information relating to pre-enactment security-based swaps to a registered security-based swap data repository... within 60 days after a registered security- based swap data repository commences operations to receive... repository,\\8\\ and security- based swap execution facility.\\9\\ The Commission has issued an advance notice of...

  1. 49 CFR 1548.19 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars... CARRIER SECURITY § 1548.19 Security Directives and Information Circulars. (a) TSA may issue an Information... security measures are necessary to respond to a threat assessment, or to a specific threat against civil...

  2. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ...; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343-1717), Acting... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  3. 77 FR 70795 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  4. A Security Checklist for ERP Implementations

    ERIC Educational Resources Information Center

    Hughes, Joy R.; Beer, Robert

    2007-01-01

    The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…

  5. Impacts of Urbanization on Water Use and Energy-related CO2 Emissions of Residential Consumption in China: A Spatio-temporal Analysis during 2003-2012

    NASA Astrophysics Data System (ADS)

    Cai, J.; Yin, H.; Varis, O.

    2017-12-01

    China has been undergoing unprecedented urbanization since the 1978 economic reform, especially with the present growth rate for the last decade at approximately 20 million people per year. This rapid and perennial progress has been raising soaring concerns on environmental sustainability, due to a severe nationwide deterioration of China's environment and ecosystems in the context of ceaselessly increasing demand for water and energy. It is therefore of prime necessity and importance to comprehend China's water and energy security under the effect of its dramatic demographic changes. Analyses of this issue still remain few and far between, and a comprehensive picture has not been available that would help understand China's recent development in urbanization, its spatial features and links to water and energy security, particularly regarding residential consumption, as well as national policy-making in the context of its water-energy nexus. Consequently, we addressed these knowledge gaps by performing an integrated and quantitative spatio-temporal analysis of the impacts of China's urbanization on water use of residential consumption (WURC) and energy-related CO2 emissions of residential consumption (ERCERC). We proposed per capita WURC and per capita ERCERC as potential national indicators for policy-making targets of its water and energy security. Our study, conducted over the period 2003-2012, for the first time demonstrated strong evidence of the significant impacts of China's urbanization on WURC and ERCERC. Its highlights can be portrayed as follows: (1) rural areas dominated per capita WURC at both national and provincial scales, with a significant increasing trend, while WURC share and per capita WURC in urban areas decreased, despite the fact that the urban population was soaring; (2) per capita ERCERC was significantly augmented in both urban and rural areas nationwide; and (3) per capita WURC and per capita ERCERC had a significant positive correlation, so did rural per capita WURC and per capita ERCERC, however, urban per capita WURC and per capita ERCERC manifested a significant negative correlation.

  6. The security concern on internet banking adoption among Malaysian banking customers.

    PubMed

    Sudha, Raju; Thiagarajan, A S; Seetharaman, A

    2007-01-01

    The existing literatures highlights that the security is the primary factor which determines the adoption of Internet banking technology. The secondary information on Internet banking development in Malaysia shows a very slow growth rate. Hence, this study aims to study the banking customers perception towards security concern and Internet banking adoption through the information collected from 150 sample respondents. The data analysis reveals that the customers have much concern about security and privacy issue in adoption of Internet banking, whether the customers are adopted Internet banking or not. Hence, it infers that to popularize Internet banking system there is a need for improvement in security and privacy issue among the banking customers.

  7. 12 CFR 1.3 - Limitations on dealing in, underwriting, and purchase and sale of securities.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... security. (2) The aggregate par value of securities treated as investment securities under paragraph (i)(1... its own account, provided the aggregate par value of Type II securities issued by any one obligor held... may purchase and sell Type III securities for its own account, provided the aggregate par value of...

  8. 12 CFR 1.3 - Limitations on dealing in, underwriting, and purchase and sale of securities.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... security. (2) The aggregate par value of securities treated as investment securities under paragraph (i)(1... its own account, provided the aggregate par value of Type II securities issued by any one obligor held... may purchase and sell Type III securities for its own account, provided the aggregate par value of...

  9. Maritime security : progress made in implementing Maritime Transportation Security Act, but concerns remain : statement of Margaret Wrightson, Director, Homeland Security and Justice Issues

    DOT National Transportation Integrated Search

    2003-09-09

    After the events of September 11, 2001, concerns were raised over the security of U.S. ports and waterways. In response to the concerns over port security, Congress passed the Maritime Transportation Security Act in November 2002. The act created a b...

  10. 31 CFR 306.23 - Securities eligible to be held in the TREASURY DIRECT Book-entry Securities System.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... TREASURY DIRECT Book-entry Securities System. 306.23 Section 306.23 Money and Finance: Treasury Regulations... Securities eligible to be held in the TREASURY DIRECT Book-entry Securities System. (a) Eligible issues. The... conversion to the TREASURY DIRECT Book-entry Securities System. The notice shall specify the period during...

  11. 10 CFR 110.44 - Physical security standards.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Physical security standards. 110.44 Section 110.44 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) EXPORT AND IMPORT OF NUCLEAR EQUIPMENT AND MATERIAL Review of License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient...

  12. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...

  13. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...

  14. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...

  15. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  16. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  17. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  18. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  19. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  20. FORWARD: DESERTIFICATION IN THE MEDITERRANEAN REGION: A SECURITY ISSUE

    EPA Science Inventory

    The Workshop focused on two basic concepts: security and desertification and their linkages. Since the end of the Cold War, traditional security concepts based on national sovereignty and territorial security have increasingly been brought under review. Currently, a broader defin...

Top