Sample records for energy security problem

  1. Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks.

    PubMed

    Zhang, Guomei; Sun, Hao

    2016-12-16

    We study the secure distributed detection problems under energy constraint for IoT-oriented sensor networks. The conventional channel-aware encryption (CAE) is an efficient physical-layer secure distributed detection scheme in light of its energy efficiency, good scalability and robustness over diverse eavesdropping scenarios. However, in the CAE scheme, it remains an open problem of how to optimize the key thresholds for the estimated channel gain, which are used to determine the sensor's reporting action. Moreover, the CAE scheme does not jointly consider the accuracy of local detection results in determining whether to stay dormant for a sensor. To solve these problems, we first analyze the error probability and derive the optimal thresholds in the CAE scheme under a specified energy constraint. These results build a convenient mathematic framework for our further innovative design. Under this framework, we propose a hybrid secure distributed detection scheme. Our proposal can satisfy the energy constraint by keeping some sensors inactive according to the local detection confidence level, which is characterized by likelihood ratio. In the meanwhile, the security is guaranteed through randomly flipping the local decisions forwarded to the fusion center based on the channel amplitude. We further optimize the key parameters of our hybrid scheme, including two local decision thresholds and one channel comparison threshold. Performance evaluation results demonstrate that our hybrid scheme outperforms the CAE under stringent energy constraints, especially in the high signal-to-noise ratio scenario, while the security is still assured.

  2. Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks

    PubMed Central

    Zhang, Guomei; Sun, Hao

    2016-01-01

    We study the secure distributed detection problems under energy constraint for IoT-oriented sensor networks. The conventional channel-aware encryption (CAE) is an efficient physical-layer secure distributed detection scheme in light of its energy efficiency, good scalability and robustness over diverse eavesdropping scenarios. However, in the CAE scheme, it remains an open problem of how to optimize the key thresholds for the estimated channel gain, which are used to determine the sensor’s reporting action. Moreover, the CAE scheme does not jointly consider the accuracy of local detection results in determining whether to stay dormant for a sensor. To solve these problems, we first analyze the error probability and derive the optimal thresholds in the CAE scheme under a specified energy constraint. These results build a convenient mathematic framework for our further innovative design. Under this framework, we propose a hybrid secure distributed detection scheme. Our proposal can satisfy the energy constraint by keeping some sensors inactive according to the local detection confidence level, which is characterized by likelihood ratio. In the meanwhile, the security is guaranteed through randomly flipping the local decisions forwarded to the fusion center based on the channel amplitude. We further optimize the key parameters of our hybrid scheme, including two local decision thresholds and one channel comparison threshold. Performance evaluation results demonstrate that our hybrid scheme outperforms the CAE under stringent energy constraints, especially in the high signal-to-noise ratio scenario, while the security is still assured. PMID:27999282

  3. The Energy and Security Nexus: A Strategic Dilemma

    DTIC Science & Technology

    2011-07-15

    substantial natural gas reserves which can be exploited if we solve problems associated with hydraulic fracturing and competition over water. Other parts of...between energy, water, and security. Sometimes water is diverted to produce energy as in the case of hydropower, hydraulic fracturing , irrigation of

  4. Energy efficiency in urban management: Russian and world experience

    NASA Astrophysics Data System (ADS)

    Pryadko, Igor

    2017-10-01

    The article discusses the role of energetics in creating a comfortable and safe environment of modern megacities, and the problem is considered in the socio-economic aspect. The object is the energy security of the city, and the subject is the influence of urban society on the formation of energy security. In particular, the problems are raised: ecological problems of urban energy supply, the condition of surface layer of the atmosphere near electric power lines. The author assesses the actions, implemented by the urban authorities in Mytischi, in the southwestern areas of New Moscow. The author assesses these sample areas on the basis of Ch. Landry’s concept of self-training, designated for municipal authorities and urban communities, and offers several successfully implemented self-study cases and in the light of modern methods of ensuring energy security. The forecasts of creation of energy-safe space, made by modern sociologist-urbanist Leo Hollis, are taken into account. The author also considers some of the economic aspects of biosphere safety. In particular, he insists that biosphere safety, convenience, and comfort have developed into competitive advantages in the housing market.

  5. A Multi-Attribute Pheromone Ant Secure Routing Algorithm Based on Reputation Value for Sensor Networks

    PubMed Central

    Zhang, Lin; Yin, Na; Fu, Xiong; Lin, Qiaomin; Wang, Ruchuan

    2017-01-01

    With the development of wireless sensor networks, certain network problems have become more prominent, such as limited node resources, low data transmission security, and short network life cycles. To solve these problems effectively, it is important to design an efficient and trusted secure routing algorithm for wireless sensor networks. Traditional ant-colony optimization algorithms exhibit only local convergence, without considering the residual energy of the nodes and many other problems. This paper introduces a multi-attribute pheromone ant secure routing algorithm based on reputation value (MPASR). This algorithm can reduce the energy consumption of a network and improve the reliability of the nodes’ reputations by filtering nodes with higher coincidence rates and improving the method used to update the nodes’ communication behaviors. At the same time, the node reputation value, the residual node energy and the transmission delay are combined to formulate a synthetic pheromone that is used in the formula for calculating the random proportion rule in traditional ant-colony optimization to select the optimal data transmission path. Simulation results show that the improved algorithm can increase both the security of data transmission and the quality of routing service. PMID:28282894

  6. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks.

    PubMed

    Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa

    2017-05-16

    In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks.

  7. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks

    PubMed Central

    Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa

    2017-01-01

    In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks. PMID:28509841

  8. A brief indicator of household energy security: associations with food security, child health, and child development in US infants and toddlers.

    PubMed

    Cook, John T; Frank, Deborah A; Casey, Patrick H; Rose-Jacobs, Ruth; Black, Maureen M; Chilton, Mariana; Ettinger de Cuba, Stephanie; Appugliese, Danielle; Coleman, Sharon; Heeren, Timothy; Berkowitz, Carol; Cutts, Diana B

    2008-10-01

    Household energy security has not been measured empirically or related to child health and development but is an emerging concern for clinicians and researchers as energy costs increase. The objectives of this study were to develop a clinical indicator of household energy security and assess associations with food security, health, and developmental risk in children <36 months of age. A cross-sectional study that used household survey and surveillance data was conducted. Caregivers were interviewed in emergency departments and primary care clinics form January 2001 through December 2006 on demographics, public assistance, food security, experience with heating/cooling and utilities, Parents Evaluation of Developmental Status, and child health. The household energy security indicator includes energy-secure, no energy problems; moderate energy insecurity, utility shutoff threatened in past year; and severe energy insecurity, heated with cooking stove, utility shutoff, or >or=1 day without heat/cooling in past year. The main outcome measures were household and child food security, child reported health status, Parents Evaluation of Developmental Status concerns, and hospitalizations. Of 9721 children, 11% (n = 1043) and 23% (n = 2293) experienced moderate and severe energy insecurity, respectively. Versus children with energy security, children with moderate energy insecurity had greater odds of household food insecurity, child food insecurity, hospitalization since birth, and caregiver report of child fair/poor health, adjusted for research site and mother, child, and household characteristics. Children with severe energy insecurity had greater adjusted odds of household food insecurity, child food insecurity, caregivers reporting significant developmental concerns on the Parents Evaluation of Developmental Status scale, and report of child fair/poor health. No significant association was found between energy security and child weight for age or weight for length. As household energy insecurity increases, infants and toddlers experienced increased odds of household and child food insecurity and of reported poor health, hospitalizations, and developmental risks.

  9. MPA-11: Materials Synthesis and Integrated Devices; Overview of an Applied Energy Group

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dattelbaum, Andrew Martin

    Our mission is to provide innovative and creative chemical synthesis and materials science solutions to solve materials problems across the LANL missions. Our group conducts basic and applied research in areas related to energy security as well as problems relevant to the Weapons Program.

  10. Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay

    PubMed Central

    Hu, Hequn; Liao, Xuewen

    2017-01-01

    The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device’s messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission (PSST), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. PSST is analyzed for the proposed secure schemes, and the closed form expressions of PSST for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better PSST than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar PSST, the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations. PMID:28869540

  11. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks.

    PubMed

    Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero

    2016-04-12

    Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes' resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.

  12. American Security and the International Energy Situation. Volume 2. World Energy and the Security of Supply

    DTIC Science & Technology

    1975-04-15

    flue gas desulfurization technology seems to oe progressing so that by the late 1970s utilities may be able to burn high-sultur coal directly with...CObHqat ion•.V Conferva 1i on 0’ I , gas . and shale Coa I Lir.’I ronmcntal control Nuclear fission Nuclear fusion Other a. So I a r B...abandonment of all import controls , its findings on th: key problem of import dependence and security did not reflect a dear conviction that a

  13. Reliable Adaptive Data Aggregation Route Strategy for a Trade-off between Energy and Lifetime in WSNs

    PubMed Central

    Guo, Wenzhong; Hong, Wei; Zhang, Bin; Chen, Yuzhong; Xiong, Naixue

    2014-01-01

    Mobile security is one of the most fundamental problems in Wireless Sensor Networks (WSNs). The data transmission path will be compromised for some disabled nodes. To construct a secure and reliable network, designing an adaptive route strategy which optimizes energy consumption and network lifetime of the aggregation cost is of great importance. In this paper, we address the reliable data aggregation route problem for WSNs. Firstly, to ensure nodes work properly, we propose a data aggregation route algorithm which improves the energy efficiency in the WSN. The construction process achieved through discrete particle swarm optimization (DPSO) saves node energy costs. Then, to balance the network load and establish a reliable network, an adaptive route algorithm with the minimal energy and the maximum lifetime is proposed. Since it is a non-linear constrained multi-objective optimization problem, in this paper we propose a DPSO with the multi-objective fitness function combined with the phenotype sharing function and penalty function to find available routes. Experimental results show that compared with other tree routing algorithms our algorithm can effectively reduce energy consumption and trade off energy consumption and network lifetime. PMID:25215944

  14. POWERING AIRPOWER: IS THE AIR FORCES ENERGY SECURE

    DTIC Science & Technology

    2016-02-01

    needs. More on-site renewable energy generation increases AF readiness in crisis times by minimizing the AF’s dependency on fossil fuels. Financing...reducing the need for traditional fossil fuels, and the high investment cost of onsite renewable energy sources is still a serious roadblock in this...help installations better plan holistically. This research will take the form of problem/solution framework. With any complex problem, rarely does a

  15. Policy in Conflict: The Struggle Between Environmental Policy and Homeland Security Goals

    DTIC Science & Technology

    2013-09-01

    security by reducing consumption in the most important petroleum consuming sector, that of automobile transportation. Some U.S. oil dollars may be...sustainable energy security by reducing consumption in the most important petroleum consuming sector, that of automobile transportation. Some U.S...39  A.  POLICY CHOICES............................................................................. 39  B.  WHY IS THIS PROBLEM IMPORTANT

  16. Renewable Energy Education in India

    ERIC Educational Resources Information Center

    Bajpai, Shrish; Kidwai, Naimur Rahman

    2017-01-01

    The issue of renewable energy sources that have great potential to give solutions to the longstanding energy problems of India has been considered. It has been stated that renewable energy sources are an important part of India's plan to increase energy security and provide new generation with ample job opportunities. India's plans to move towards…

  17. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks

    PubMed Central

    Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero

    2016-01-01

    Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach. PMID:27077866

  18. Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay.

    PubMed

    Hu, Hequn; Gao, Zhenzhen; Liao, Xuewen; Leung, Victor C M

    2017-09-04

    The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device's messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission ( P S S T ), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. P S S T is analyzed for the proposed secure schemes, and the closed form expressions of P S S T for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better P S S T than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar P S S T , the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations.

  19. An Open Framework for Low-Latency Communications across the Smart Grid Network

    ERIC Educational Resources Information Center

    Sturm, John Andrew

    2011-01-01

    The recent White House (2011) policy paper for the Smart Grid that was released on June 13, 2011, "A Policy Framework for the 21st Century Grid: Enabling Our Secure Energy Future," defines four major problems to be solved and the one that is addressed in this dissertation is Securing the Grid. Securing the Grid is referred to as one of…

  20. Blockchain for Smart Grid Resilience: Exchanging Distributed Energy at Speed, Scale and Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mylrea, Michael E.; Gourisetti, Sri Nikhil Gup

    Blockchain may help solve several complex problems related to integrity and trustworthiness of rapid, distributed, complex energy transactions and data exchanges. In a move towards resilience, blockchain commoditizes trust and enables automated smart contracts to support auditable multiparty transactions based on predefined rules between distributed energy providers and customers. Blockchain based smart contracts also help remove the need to interact with third-parties, facilitating the adoption and monetization of distributed energy transactions and exchanges, both energy flows as well as financial transactions. This may help reduce transactive energy costs and increase the security and sustainability of distributed energy resource (DER) integration,more » helping to remove barriers to a more decentralized and resilient power grid.« less

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carrington, David Bradley; Waters, Jiajia

    Research and development of KIVA-hpFE for turbulent reactive and multiphase flow particularly as related to engine modeling program has relevance to National energy security and climate change. Climate change is a source problem, and energy national security is consumption of petroleum products problem. Accurately predicting engine processes leads to, lower greenhouse gas (GHG) emission, where engines in the transportation sector currently account for 26% of the U.S. GHG emissions. Less dependence on petroleum products leads to greater energy security. By Environmental Protection Agency standards, some vehicles are now reaching 42 to the 50 mpg mark. These are conventional gasoline engines.more » Continued investment and research into new technical innovations, the potential exists to save more than 4 million barrels of oil per day or approximately $200 to $400 million per day. This would be a significant decrease in emission and use of petroleum and a very large economic stimulus too! It is estimated with further advancements in combustion, the current emissions can be reduced up to 40%. Enabling better understanding of fuel injection and fuel-air mixing, thermodynamic combustion losses, and combustion/emission formation processes enhances our ability to help solve both problems. To provide adequate capability for accurately simulating these processes, minimize time and labor for development of engine technology, are the goals of our KIVA development program.« less

  2. Homeland Security: Compendium of Recommendations Relevant to House Committee Organization and Analysis of Considerations for the House, and 109th and 110th Congresses: Epilogue

    DTIC Science & Technology

    2007-03-02

    strong indication that existing committees are capable of action. A third consideration in creating a homeland security committee is whether such a...current House committee system. Ranking Member Dingell of the Energy and Commerce Committee indicated that his experience with committees sharing oversight...Schlesinger reported spending half of his time as secretary of energy on Capitol Hill, “dealing with one problem or another.” He indicated the number of

  3. A Hybrid Secure Scheme for Wireless Sensor Networks against Timing Attacks Using Continuous-Time Markov Chain and Queueing Model.

    PubMed

    Meng, Tianhui; Li, Xiaofan; Zhang, Sha; Zhao, Yubin

    2016-09-28

    Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of applications. Monitoring tasks can be performed in various environments. This may be beneficial in many scenarios, but it certainly exhibits new challenges in terms of security due to increased data transmission over the wireless channel with potentially unknown threats. Among possible security issues are timing attacks, which are not prevented by traditional cryptographic security. Moreover, the limited energy and memory resources prohibit the use of complex security mechanisms in such systems. Therefore, balancing between security and the associated energy consumption becomes a crucial challenge. This paper proposes a secure scheme for WSNs while maintaining the requirement of the security-performance tradeoff. In order to proceed to a quantitative treatment of this problem, a hybrid continuous-time Markov chain (CTMC) and queueing model are put forward, and the tradeoff analysis of the security and performance attributes is carried out. By extending and transforming this model, the mean time to security attributes failure is evaluated. Through tradeoff analysis, we show that our scheme can enhance the security of WSNs, and the optimal rekeying rate of the performance and security tradeoff can be obtained.

  4. A Hybrid Secure Scheme for Wireless Sensor Networks against Timing Attacks Using Continuous-Time Markov Chain and Queueing Model

    PubMed Central

    Meng, Tianhui; Li, Xiaofan; Zhang, Sha; Zhao, Yubin

    2016-01-01

    Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of applications. Monitoring tasks can be performed in various environments. This may be beneficial in many scenarios, but it certainly exhibits new challenges in terms of security due to increased data transmission over the wireless channel with potentially unknown threats. Among possible security issues are timing attacks, which are not prevented by traditional cryptographic security. Moreover, the limited energy and memory resources prohibit the use of complex security mechanisms in such systems. Therefore, balancing between security and the associated energy consumption becomes a crucial challenge. This paper proposes a secure scheme for WSNs while maintaining the requirement of the security-performance tradeoff. In order to proceed to a quantitative treatment of this problem, a hybrid continuous-time Markov chain (CTMC) and queueing model are put forward, and the tradeoff analysis of the security and performance attributes is carried out. By extending and transforming this model, the mean time to security attributes failure is evaluated. Through tradeoff analysis, we show that our scheme can enhance the security of WSNs, and the optimal rekeying rate of the performance and security tradeoff can be obtained. PMID:27690042

  5. Experimental Physical Sciences Vitae 2017

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kippen, Karen Elizabeth; Del Mauro, Diana; Patterson, Eileen Frances

    Frequently our most basic research experiments stimulate solutions for some of the most intractable national security problems, such as nuclear weapons stewardship, homeland security, intelligence and information analysis, and nuclear and alternative energy. This publication highlights our talented and creative staff who deliver solutions to these complex scientific and technological challenges by conducting cutting-edge multidisciplinary physical science research.

  6. KIVA-hpFE. Predictive turbulent reactive and multiphase flow in engines - An Overview

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carrington, David Bradley

    2016-05-23

    Research and development of KIVA-hpFE for turbulent reactive and multiphase flow particularly as related to engine modeling program has relevance to National energy security and climate change. Climate change is a source problem, and energy national security is consumption of petroleum products problem. Accurately predicting engine processes leads to, lower greenhouse gas (GHG) emission, where engines in the transportation sector currently account for 26% of the U.S. GHG emissions. Less dependence on petroleum products leads to greater energy security. By Environmental Protection Agency standards, some vehicles are now reaching 42 to the 50 mpg mark. These are conventional gasoline engines.more » Continued investment and research into new technical innovations, the potential exists to save more than 4 million barrels of oil per day or approximately $200 to $400 million per day. This would be a significant decrease in emission and use of petroleum and a very large economic stimulus too! It is estimated with further advancements in combustion, the current emissions can be reduced up to 40%. Enabling better understanding of fuel injection and fuel-air mixing, thermodynamic combustion losses, and combustion/emission formation processes enhances our ability to help solve both problems. To provide adequate capability for accurately simulating these processes, minimize time and labor for development of engine technology, are the goals of our KIVA development program.« less

  7. Food in health security in North East Asia.

    PubMed

    Moon, Hyun-Kyung

    2009-01-01

    Food and health security in North East Asia including South Korea, North Korea, China and Japan was compared. Because this region contains countries with many complex problems, it is worthwhile to study the current situation. With about 24% of the world's population, all North East Asian countries supply between 2400 and 3000 Kcal of energy. Regarding health status, two extreme problems exist. One is malnutrition in North Korea and China and the other is chronic degenerative disease in Japan, South Korea and China. Because quality, quantity and safety of the food supply have to be secured for health security, some topics are selected and discussed. 1) World food price can have an effect on food security for countries with a low food self sufficiency rate such as Japan and Korea; specially, for the urban poor. 2) Population aging can increase the number of aged people without food security. An aged population with less income and no support from their off-spring, because of disappearing traditional values, may have food insecurity. 3) Population growth and economic growth in this region may worsen food problems. Since a quarter of the world's population resides in this region, populations will continue to increase. With economic growth, people will consume more animal products. 4) Climate change generates food production problems. As the progress of industry continues, there will be less land for food and more pollutants in the environment. 5) Political instability will cause food insecurity and conflict will cause problems with regard to food aid.

  8. 10 CFR 707.6 - Employee assistance, education, and training.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Section 707.6 Energy DEPARTMENT OF ENERGY WORKPLACE SUBSTANCE ABUSE PROGRAMS AT DOE SITES Procedures § 707... employees: Health aspects of substance abuse, especially illegal drug use; safety, security, and other workplace-related problems caused by substance abuse, especially illegal drug use; the provisions of this...

  9. 10 CFR 707.6 - Employee assistance, education, and training.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Section 707.6 Energy DEPARTMENT OF ENERGY WORKPLACE SUBSTANCE ABUSE PROGRAMS AT DOE SITES Procedures § 707... employees: Health aspects of substance abuse, especially illegal drug use; safety, security, and other workplace-related problems caused by substance abuse, especially illegal drug use; the provisions of this...

  10. 10 CFR 707.6 - Employee assistance, education, and training.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Section 707.6 Energy DEPARTMENT OF ENERGY WORKPLACE SUBSTANCE ABUSE PROGRAMS AT DOE SITES Procedures § 707... employees: Health aspects of substance abuse, especially illegal drug use; safety, security, and other workplace-related problems caused by substance abuse, especially illegal drug use; the provisions of this...

  11. 10 CFR 707.6 - Employee assistance, education, and training.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Section 707.6 Energy DEPARTMENT OF ENERGY WORKPLACE SUBSTANCE ABUSE PROGRAMS AT DOE SITES Procedures § 707... employees: Health aspects of substance abuse, especially illegal drug use; safety, security, and other workplace-related problems caused by substance abuse, especially illegal drug use; the provisions of this...

  12. U.S., Soviets Face Common Science Problems.

    ERIC Educational Resources Information Center

    Lepkowski, Wil

    1981-01-01

    Summarizes recent findings reported in a two-volume publication, "Science Policy: USA/USSR," issued by the National Science Foundation. Volumes I and II review U.S. and Soviet science policy in research and development, respectively. Comparisons are made concerning common problems around energy, environment, and the meaning of security.…

  13. Water-Energy-Food Nexus in Asia-Pacific Ring of Fire

    NASA Astrophysics Data System (ADS)

    Taniguchi, M.; Endo, A.; Gurdak, J. J.; Allen, D. M.; Siringan, F.; Delinom, R.; Shoji, J.; Fujii, M.; Baba, K.

    2013-12-01

    Climate change and economic development are causing increased pressure on water, energy and food resources, presenting communities with increased levels of tradeoffs and potential conflicts among these resources. Therefore, the water-energy-food nexus is one of the most important and fundamental global environmental issues facing the world. For the purposes of this research project, we define human-environmental security as the joint optimization between human and environmental security as well as the water-energy-food nexus. To optimize the governance and management within these inter-connected needs, it is desirable to increase human-environmental security by improving social managements for the water-energy-food nexus. In this research project, we intend to establish a method to manage and optimize the human-environmental security of the water-energy-food nexus by using integrated models, indices, and maps as well as social and natural investigations with stakeholder analyses. We base our approach on the viewpoint that it is important for a sustainable society to increase human-environmental security with decreasing risk and increasing resilience by optimizing the connections within the critical water-energy and water-food clusters. We will take a regional perspective to address these global environmental problems. The geological and geomorphological conditions in our proposed study area are heavily influenced by the so-called 'Ring of Fire,' around the Pacific Ocean. Within these areas including Japan and Southeast Asia, the hydro-meteorological conditions are dominated by the Asia monsoon. The populations that live under these natural conditions face elevated risk and potential disaster as negative impacts, while also benefitting from positive ecological goods and services. There are therefore tradeoffs and conflicts within the water-energy-food nexus, as well as among various stakeholders in the region. The objective of this project is to maximize human-environmental security (minimize the risk) by choosing management structures and policies that optimize both the water-food-energy nexus in Asia-Pacific coastal regions. We define joint security approach as optimized policy. Optimal policies will develop joint security approaches for human-environmental security in the coastal region of the Ring of Fire, including stakeholders and decision-makers.

  14. Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks.

    PubMed

    Peng, Haipeng; Tian, Ye; Kurths, Jurgen; Li, Lixiang; Yang, Yixian; Wang, Daoshun

    2017-06-01

    Applications of wireless body area networks (WBANs) are extended from remote health care to military, sports, disaster relief, etc. With the network scale expanding, nodes increasing, and links complicated, a WBAN evolves to a body-to-body network. Along with the development, energy saving and data security problems are highlighted. In this paper, chaotic compressive sensing (CCS) is proposed to solve these two crucial problems, simultaneously. Compared with the traditional compressive sensing, CCS can save vast storage space by only storing the matrix generation parameters. Additionally, the sensitivity of chaos can improve the security of data transmission. Aimed at image transmission, modified CCS is proposed, which uses two encryption mechanisms, confusion and mask, and performs a much better encryption quality. Simulation is conducted to verify the feasibility and effectiveness of the proposed methods. The results show that the energy efficiency and security are strongly improved, while the storage space is saved. And the secret key is extremely sensitive, [Formula: see text] perturbation of the secret key could lead to a total different decoding, the relative error is larger than 100%. Particularly for image encryption, the performance of the modified method is excellent. The adjacent pixel correlation is smaller than 0.04 in different directions including horizontal, vertical, and diagonal; the entropy of the cipher image with a 256-level gray value is larger than 7.98.

  15. Blockchain: A Path to Grid Modernization and Cyber Resiliency

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mylrea, Michael E.; Gourisetti, Sri Nikhil G.

    Blockchain may help solve several complex problems related to integrity and trustworthiness of rapid, distributed, complex energy transactions and data exchanges. In a move towards resilience, blockchain commoditizes trust and enables automated smart contracts to support auditable multiparty transactions based on predefined rules between distributed energy providers and customers. Blockchain based smart contracts also help remove the need to interact with third-parties, facilitating the adoption and monetization of distributed energy transactions and exchanges, both energy flows as well as financial transactions. This may help reduce transactive energy costs and increase the security and sustainability of distributed energy resource (DER) integration,more » helping to remove barriers to a more decentralized and resilient power grid. This paper explores the application of blockchain and smart contracts to improve smart grid cyber resiliency and secure transactive energy applications.« less

  16. Basic research needs to assure a secure energy future. A report from the Basic Energy Sciences Advisory Committee

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    This report has highlighted many of the possible fundamental research areas that will help our country avoid a future energy crisis. The report may not have adequately captured the atmosphere of concern that permeated the discussions at the workshop. The difficulties facing our nation and the world in meeting our energy needs over the next several decades are very challenging. It was generally felt that traditional solutions and approaches will not solve the total energy problem. Knowledge that does not exist must be obtained to address both the quantity of energy needed to increase the standard of living world-wide andmore » the quality of energy generation needed to preserve the environment. In terms of investments, it was clear that there is no single research area that will secure the future energy supply. A diverse range of economic energy sources will be required--and a broad range of fundamental research is needed to enable these. Many of the issues fall into the traditional materials and chemical sciences research areas, but with specific emphasis on understanding mechanisms, energy related phenomena, and pursuing novel directions in, for example, nanoscience and integrated modeling. An important result from the discussions, which is hopefully apparent from the brief presentations above, is that the problems that must be dealt with are truly multidisciplinary. This means that they require the participation of investigators with different skill sets. Basic science skills have to be complemented by awareness of the overall nature of the problem in a national and world context, and with knowledge of the engineering, design, and control issues in any eventual solution. It is necessary to find ways in which this can be done while still preserving the ability to do first-class basic science. The traditional structure of research, with specific disciplinary groupings, will not be sufficient. This presents great challenges and opportunities for the funders of the research that must be done. For example, the applied research programs in the DOE need a greater awareness of the user facilities and an understanding of how to use them to solve their unique problems. The discussions reinforced what all of the participants already knew: the issue of energy security is of major importance both for the U.S. and for the world. Furthermore, it is clear that major changes in the primary energy sources, in energy conversion, and in energy use, must be achieved within the next fifty years. This time scale is determined by two drivers: increasing world population and increasing expectations of that population. Much of the research and development currently being done are concerned with incremental improvements in what has been done in the immediate past; and it is necessary to take this path because improvements will be needed across the board. These advances extend the period before the radical changes have to be made; however, they will not solve the underlying, long-range problem. The Subpanel recommends that a major program be funded to conduct a multidisciplinary research program to address the issues to ensure a secure energy future for the U.S. It is necessary to recognize that this program must be ensured of a long-term stability. It is also necessary that a management and funding structure appropriate for such an approach be developed. The Department of Energy's Office of Basic Energy Sciences is well positioned to support this initiative by enhancement of their already world-class scientific research programs and user facilities.« less

  17. Towards a Standard for Highly Secure SCADA Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carlson, R.

    1998-09-25

    The critical energy inkstructures include gas, OL and electric power. These Mrastructures are complex and interdependent nmvorks that are vital to the national secwiy and social well being of our nation. Many electric power systems depend upon gas and oil, while fossil energy delive~ systems depend upon elecnic power. The control mechanisms for these Mrastructures are often referred to as SCADA (Supmivry CkmdandDaU Ac@itz&z) systems. SCADA systems provide remote monitoring and centralized control for a distributed tmnsportation infmsmucture in order to facilitate delivery of a commodi~. AIthough many of the SCADA concepts developed in this paper can be applied tomore » automotive mmsponation systems, we will use transportation to refer to the movement of electrici~, gas, and oil. \\ Recently, there have been seveml reports suggesting that the widespread and increasing use of SCADA for control of energy systems provides an increasing opportuni~ for an advers~ to cause serious darnage to the energy inbstmcturei~. This damage could arise through cyber infiltration of the SCADA networks, by physically tampering with the control networks, or through a combination of both means. SCADA system threats decompose into cyber and physical threats. One solution to the SCADA security problem is to design a standard for a highly secure KA.DA system that is both cyber, and physdly secure. Not all-physical threats are possible to guard again% but of those threats that are, high security SCADA provides confidence that the system will continue to operate in their presence. One of the most important problems in SCADA securi~ is the relationship between the cyber and physical vulnerabilities. Cyber intrusion increases physical Vulnerabilities, while in the dual problem physical tampering increases cyber vulnerabilit.ies. There is potential for feedback and the precise dynamics need to be understood. As a first step towards a stan~ the goal of this paper is to facilitate a discussion of the requirements analysis for a highly secure SCADA system. The fi-arnework for the discussion consists of the identification of SCADA security investment areas coupled with the tradeoffs that will force compromises in the solution. For example, computational and bandwidth requirements of a security standard could force the replacement of entire SCADA systems. The requirements for a real-time response in a cascading electric power failure could pose limitations on authentication and encryption mechanisms. The shortest path to the development of a high securi~ SC.ADA standard will be achieved by leveraging existing standards efforts and ensuring that security is being properly addressed in those standards. The Utility Communications Architecture 2.o (UC@, for real-time utili~ decision control, represents one such standard. The development of a SCADA secwiy specification is a complex task that will benefit from a systems engineering approach.« less

  18. The role of food-security solutions in the protection of natural resources and environment of developing countries.

    PubMed

    Lashgarara, Farhad; Mirdamadi, Seyyed Mehdi; Hosseini, Seyyed Jamal Farajollah; Chizari, Mohammad

    2008-10-01

    The majority of the countries of the world, especially developing countries, face environmental problems. Limitations of basic resources (water and soil) and population growth have been the cause of these environmental problems that countries are confronted with. Developing countries have numerous problems, including destruction of forests, vegetable and animal species, and pollution of the environment. Damage to natural resources and the environment can influence the food-security situation. One of the main millennium development goals (MDGs) is protection of the environment and people's health. This cannot obtained unless there is ensured food security. Food security has been defined as a situation when all people, at all times, have physical and economic access to sufficient, safe, and nutritious food needed to maintain a healthy and active life. At the same time, with ensured food security, we can hope to protect the natural resources and environment. The methodology used is descriptive-analytical, and its main purpose is determining the importance and role of food-security solutions in the reduction of environmental hazards and improvement of natural resources and the environmental situation in developing countries. Therefore, some of the most important food-security solutions that can play an important role in this relation were discussed, including conventional research-based technology, biotechnology, information and communication technologies (ICTs), alternative energy sources, and food irradiation.

  19. An investigation on nuclear energy policy in Turkey and public perception

    NASA Astrophysics Data System (ADS)

    Coskun, Mehmet Burhanettin; Tanriover, Banu

    2016-11-01

    Turkey, which meets nearly 70 per cent of its energy demands with import, is facing the problems of energy security and current account deficit as a result of its dependence on foreign sources in terms of energy input. It is also known that Turkey is having environmental problems due to the increases in CO2 emission. Considering these problems in Turkish economy, where energy input is commonly used, it is necessary to use energy sources efficiently and provide alternative energy sources. Due to the dependency of renewable sources on meteorological conditions (the absence of enough sun, wind, and water sources), the energy generation could not be provided efficiently and permanently from these sources. At this point, nuclear energy as analternative energy source maintains its importance as a sustainable energy source that providing energy in 7 days and 24 hours. The main purpose of this study is to evaluate the nuclear energy subject within the context of negative public perceptions emerged after Chernobyl (1986) and Fukushima (2011) disasters and to investigate in the economic framework.

  20. Reconciling food security and bioenergy: priorities for action

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kline, Keith L.; Msangi, Siwa; Dale, Virginia H.

    Addressing the challenges of understanding and managing complex interactions among food security, biofuels, and land management requires a focus on specific contextual problems and opportunities. The United Nations 2030 Sustainable Development Goals prioritize food and energy security and bioenergy links these two priorities. Effective food security programs begin by clearly defining the problem and asking, What options will be effective to assist people at high risk? Headlines and cartoons that blame biofuels for food insecurity reflect good intentions but mislead the public and policy makers because they obscure or miss the main drivers of local food insecurity and opportunities formore » biofuels to contribute to solutions. Applying sustainability guidelines to bioenergy will help achieve near- and long- term goals to eradicate hunger. Priorities for achieving successful synergies between bioenergy and food security include (1) clarifying communications with clear and consistent terms, (2) recognizing that food and bioenergy do not compete for land but food and bioenergy systems can and do work together to improve resource management, (3) investing in innovations to build capacity and infrastructure such as rural agricultural extension and technology, (4) promoting stable prices that incentivize local production, (5) adopting flex crops that can provide food along with other products and services to society, and (6) engaging stakeholders in identifying and assessing specific opportunities for biofuels to improve food security. In conclusion, systematic monitoring and analysis to support adaptive management and continual improvement are essential elements to build synergies and help society equitably meet growing demands for both food and energy.« less

  1. Reconciling food security and bioenergy: priorities for action

    DOE PAGES

    Kline, Keith L.; Msangi, Siwa; Dale, Virginia H.; ...

    2016-06-14

    Addressing the challenges of understanding and managing complex interactions among food security, biofuels, and land management requires a focus on specific contextual problems and opportunities. The United Nations 2030 Sustainable Development Goals prioritize food and energy security and bioenergy links these two priorities. Effective food security programs begin by clearly defining the problem and asking, What options will be effective to assist people at high risk? Headlines and cartoons that blame biofuels for food insecurity reflect good intentions but mislead the public and policy makers because they obscure or miss the main drivers of local food insecurity and opportunities formore » biofuels to contribute to solutions. Applying sustainability guidelines to bioenergy will help achieve near- and long- term goals to eradicate hunger. Priorities for achieving successful synergies between bioenergy and food security include (1) clarifying communications with clear and consistent terms, (2) recognizing that food and bioenergy do not compete for land but food and bioenergy systems can and do work together to improve resource management, (3) investing in innovations to build capacity and infrastructure such as rural agricultural extension and technology, (4) promoting stable prices that incentivize local production, (5) adopting flex crops that can provide food along with other products and services to society, and (6) engaging stakeholders in identifying and assessing specific opportunities for biofuels to improve food security. In conclusion, systematic monitoring and analysis to support adaptive management and continual improvement are essential elements to build synergies and help society equitably meet growing demands for both food and energy.« less

  2. Why food in health security (FIHS)?

    PubMed

    Wahlqvist, Mark L

    2009-01-01

    Health is intrinsic to human security (HumS) although it is somewhat anthropocentric and about our own psychosocial and biomedical status more than various external threats. The 1994 United Nations Development Program definition of HumS includes economic, food, environmental, personal, community and political security with freedom from fear and want. Environmental factors are critical for health security (HealS), especially with widespread socio-economic difficulty, and health systems less affordable or accessible. The nexus between nutritionally-related disorders and infectious disease is the most pervasive world health problem. Most if not all of the Millennium Development Goals are food-linked. Maternal nutrition has life-long health effects on the yet-to-be born child. The mix of essential nutrient deprivation and energy imbalance is rife across many societies. Food systems require deeper understanding and governance to overcome these food-related health risks which are matters of food security (FoodS). Nutritionally-related Disability Adjusted Life Years (DALYS) are improving markedly in many parts of the world, along with poverty and hunger reduction and health system advances. But recent economic, energy, food, water, climate change and health crises along with conflict are limiting. It is time for international and regional understanding of how households and communities can collectively manage these threats in affordable and sustainable ways. There is untapped problem-solving capacity at the international local level if supported by combined food--health systems expertise, innovation, infrastructure and governance. Principles of equity and ethics must apply. The Food in Health Security (FIHS) roundtable aims to develop a Network to facilitate this process.

  3. World oil

    NASA Astrophysics Data System (ADS)

    Sweeney, J. L.

    1982-06-01

    Results obtained through the application of 10 prominent world oil or world energy models to 12 scenarios are reported. These scenarios were designed to bound the range of likely future world oil market outcomes. Conclusions relate to oil market trends, impacts of policies on oil prices, security of oil supplies, impacts of policies on oil security problems, use of the oil import premium in policymaking, the transition to oil substitutes, and the state of the art of world oil modeling.

  4. Future for oil and gas in the EEC. I

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1974-03-01

    This study by UNICE (Union of Industries of the EEC), prepared prior to the October 1973 Mideast conflict, shows remarkable foresight in the light of subsequent events. Of the 3 major industrial units (the U.S., Europe, and Japan), Europe would be in the weakest position in the event of an energy shortage. During the 1973-85 period, the techncal risks threatening the security of Europe's oil supplies are subordinate to the political and economic risks: (1) Certain producing countries may be tempted to use their oil potential as a means of influencing foreign policy by limiting production, (2) international monetary problemsmore » and worldwide inflation may give rise to producer-country reactions which are not confined to the technical field, and (3) the utilization of the vast financial resources of some producer countries may prove a serious problem. UNICE considers it imperative for the EEC, in collaboration with industry and with due regard for the fundamental importance of competition, to arrive at a common energy policy as soon as possible and to take the decisions necessary to ensure the long-term security of energy supplies on satisfactory economic terms. The EEC and the national governments must seek to promote the security of energy supplies in all forms, ensure an adequate profitability level to finance investment, deal more flexibly with environmental problems, adopt a more homogenous attitude, and encourage the development of alternative energy sources. For oil specifically, there are 4 ways of reducing the political and economic risks threatening exploration and production: limiting demand for oil products, increasing energy supplies, facilitating the oil industry's activities, and encouraging action by governments.« less

  5. Disarmament, Security and Development

    ERIC Educational Resources Information Center

    Bulletin of the Atomic Scientists, 1976

    1976-01-01

    Provided is a summary of the 26th Pugwash Conference on Science and World Affairs held August 26-31, 1976, in Muhlhausen, East Germany. World problems discussed included: arms limitations, military research and development, nuclear test ban, alternative energy sources, and genetic engineering. (SL)

  6. DOE`s nation-wide system for access control can solve problems for the federal government

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Callahan, S.; Tomes, D.; Davis, G.

    1996-07-01

    The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by manymore » different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.« less

  7. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  8. Public key infrastructure for DOE security research

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aiken, R.; Foster, I.; Johnston, W.E.

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-keymore » infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.« less

  9. Secure and Time-Aware Communication of Wireless Sensors Monitoring Overhead Transmission Lines.

    PubMed

    Mazur, Katarzyna; Wydra, Michal; Ksiezopolski, Bogdan

    2017-07-11

    Existing transmission power grids suffer from high maintenance costs and scalability issues along with a lack of effective and secure system monitoring. To address these problems, we propose to use Wireless Sensor Networks (WSNs) as a technology to achieve energy efficient, reliable, and low-cost remote monitoring of transmission grids. With WSNs, smart grid enables both utilities and customers to monitor, predict and manage energy usage effectively and react to possible power grid disturbances in a timely manner. However, the increased application of WSNs also introduces new security challenges, especially related to privacy, connectivity, and security management, repeatedly causing unpredicted expenditures. Monitoring the status of the power system, a large amount of sensors generates massive amount of sensitive data. In order to build an effective Wireless Sensor Network (WSN) for a smart grid, we focus on designing a methodology of efficient and secure delivery of the data measured on transmission lines. We perform a set of simulations, in which we examine different routing algorithms, security mechanisms and WSN deployments in order to select the parameters that will not affect the delivery time but fulfill their role and ensure security at the same time. Furthermore, we analyze the optimal placement of direct wireless links, aiming at minimizing time delays, balancing network performance and decreasing deployment costs.

  10. Secure and Time-Aware Communication of Wireless Sensors Monitoring Overhead Transmission Lines

    PubMed Central

    Mazur, Katarzyna; Wydra, Michal; Ksiezopolski, Bogdan

    2017-01-01

    Existing transmission power grids suffer from high maintenance costs and scalability issues along with a lack of effective and secure system monitoring. To address these problems, we propose to use Wireless Sensor Networks (WSNs)as a technology to achieve energy efficient, reliable, and low-cost remote monitoring of transmission grids. With WSNs, smart grid enables both utilities and customers to monitor, predict and manage energy usage effectively and react to possible power grid disturbances in a timely manner. However, the increased application of WSNs also introduces new security challenges, especially related to privacy, connectivity, and security management, repeatedly causing unpredicted expenditures. Monitoring the status of the power system, a large amount of sensors generates massive amount of sensitive data. In order to build an effective Wireless Sensor Networks (WSNs) for a smart grid, we focus on designing a methodology of efficient and secure delivery of the data measured on transmission lines. We perform a set of simulations, in which we examine different routing algorithms, security mechanisms and WSN deployments in order to select the parameters that will not affect the delivery time but fulfill their role and ensure security at the same time. Furthermore, we analyze the optimal placement of direct wireless links, aiming at minimizing time delays, balancing network performance and decreasing deployment costs. PMID:28696390

  11. FY2017 Analysis Annual Progress Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    During fiscal year 2017, the U.S. Department of Energy Vehicle Technologies Office (VTO) funded analysis projects supportive of VTO’s goals to pursue early stage research in vehicle and mobility system technologies to reduce petroleum dependence, increase energy reliability and security, improve transportation affordability, and promote economic growth. VTO analysis projects result in a foundation of data, analytical models, and applied analyses that provide insights into critical transportation energy problems and assist in research investment prioritization and portfolio planning.

  12. Sensor Authentication in Collaborating Sensor Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bielefeldt, Jake Uriah

    2014-11-01

    In this thesis, we address a new security problem in the realm of collaborating sensor networks. By collaborating sensor networks, we refer to the networks of sensor networks collaborating on a mission, with each sensor network is independently owned and operated by separate entities. Such networks are practical where a number of independent entities can deploy their own sensor networks in multi-national, commercial, and environmental scenarios, and some of these networks will integrate complementary functionalities for a mission. In the scenario, we address an authentication problem wherein the goal is for the Operator O i of Sensor Network S imore » to correctly determine the number of active sensors in Network Si. Such a problem is challenging in collaborating sensor networks where other sensor networks, despite showing an intent to collaborate, may not be completely trustworthy and could compromise the authentication process. We propose two authentication protocols to address this problem. Our protocols rely on Physically Unclonable Functions, which are a hardware based authentication primitive exploiting inherent randomness in circuit fabrication. Our protocols are light-weight, energy efficient, and highly secure against a number of attacks. To the best of our knowledge, ours is the first to addresses a practical security problem in collaborating sensor networks.« less

  13. Tackling U.S. energy challenges and opportunities: preliminary policy recommendations for enhancing energy innovation in the United States

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Anadon, Laura Diaz; Gallagher, Kelly Sims; Bunn, Matthew

    2009-02-18

    The report offers preliminary recommendations for near-term actions to strengthen the U.S. effort to develop and deploy advanced energy technologies. The report comes as the Obama Administration and the 111th U.S. Congress face enormous challenges and opportunities in tackling the pressing security, economic, and environmental problems posed by the energy sector. Improving the technologies of energy supply and end-use is a prerequisite for surmounting these challenges in a timely and cost-effective way, and this report elaborates on how policy can support develop of these important energy technologies.

  14. Joint the Center for Applied Scientific Computing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gamblin, Todd; Bremer, Timo; Van Essen, Brian

    The Center for Applied Scientific Computing serves as Livermore Lab’s window to the broader computer science, computational physics, applied mathematics, and data science research communities. In collaboration with academic, industrial, and other government laboratory partners, we conduct world-class scientific research and development on problems critical to national security. CASC applies the power of high-performance computing and the efficiency of modern computational methods to the realms of stockpile stewardship, cyber and energy security, and knowledge discovery for intelligence applications.

  15. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.

    PubMed

    Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang

    2015-09-25

    Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  16. Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction

    NASA Astrophysics Data System (ADS)

    Leverrier, Anthony

    2017-05-01

    Establishing the security of continuous-variable quantum key distribution against general attacks in a realistic finite-size regime is an outstanding open problem in the field of theoretical quantum cryptography if we restrict our attention to protocols that rely on the exchange of coherent states. Indeed, techniques based on the uncertainty principle are not known to work for such protocols, and the usual tools based on de Finetti reductions only provide security for unrealistically large block lengths. We address this problem here by considering a new type of Gaussian de Finetti reduction, that exploits the invariance of some continuous-variable protocols under the action of the unitary group U (n ) (instead of the symmetric group Sn as in usual de Finetti theorems), and by introducing generalized S U (2 ,2 ) coherent states. Crucially, combined with an energy test, this allows us to truncate the Hilbert space globally instead as at the single-mode level as in previous approaches that failed to provide security in realistic conditions. Our reduction shows that it is sufficient to prove the security of these protocols against Gaussian collective attacks in order to obtain security against general attacks, thereby confirming rigorously the widely held belief that Gaussian attacks are indeed optimal against such protocols.

  17. Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction.

    PubMed

    Leverrier, Anthony

    2017-05-19

    Establishing the security of continuous-variable quantum key distribution against general attacks in a realistic finite-size regime is an outstanding open problem in the field of theoretical quantum cryptography if we restrict our attention to protocols that rely on the exchange of coherent states. Indeed, techniques based on the uncertainty principle are not known to work for such protocols, and the usual tools based on de Finetti reductions only provide security for unrealistically large block lengths. We address this problem here by considering a new type of Gaussian de Finetti reduction, that exploits the invariance of some continuous-variable protocols under the action of the unitary group U(n) (instead of the symmetric group S_{n} as in usual de Finetti theorems), and by introducing generalized SU(2,2) coherent states. Crucially, combined with an energy test, this allows us to truncate the Hilbert space globally instead as at the single-mode level as in previous approaches that failed to provide security in realistic conditions. Our reduction shows that it is sufficient to prove the security of these protocols against Gaussian collective attacks in order to obtain security against general attacks, thereby confirming rigorously the widely held belief that Gaussian attacks are indeed optimal against such protocols.

  18. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mizner, Jack Harry; Passell, Howard David; Keller, Elizabeth James Kistin

    Sustainability is a critical national security issue for the U.S. and other nations. Sandia National Laboratories (SNL) is already a global leader in sustainability science and technology (SS&T) as documented in this report. This report documents the ongoing work conducted this year as part of the Sustainability Innovation Foundry (SIF). The efforts of the SIF support Sandia's national and international security missions related to sustainability and resilience revolving around energy use, water use, and materials, both on site at Sandia and externally. The SIF leverages existing Sandia research and development (R&D) in sustainability science and technology to support new solutionsmore » to complex problems. The SIF also builds on existing Sandia initiatives to support transformation of Sandia into a fully sustainable entity in terms of materials, energy, and water use. In the long term, the SIF will demonstrate the efficacy of sustainability technology developed at Sandia through prototyping and test bed approaches and will provide a common platform for support of solutions to the complex problems surrounding sustainability. Highlights from this year include the Sustainability Idea Challenge, improvements in facilities energy use, lectures and presentations from relevant experts in sustainability [Dr. Barry Hughes, University of Denver], and significant development of the Institutional Transformation (IX) modeling tools to support evaluation of proposed modifications to the SNL infrastructure to realize energy savings.« less

  19. The National Ignition Facility: The Path to a Carbon-Free Energy Future

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stolz, C J

    2011-03-16

    The National Ignition Facility (NIF), the world's largest and most energetic laser system, is now operational at Lawrence Livermore National Laboratory (LLNL). The NIF will enable exploration of scientific problems in national strategic security, basic science and fusion energy. One of the early NIF goals centers on achieving laboratory-scale thermonuclear ignition and energy gain, demonstrating the feasibility of laser fusion as a viable source of clean, carbon-free energy. This talk will discuss the precision technology and engineering challenges of building the NIF and those we must overcome to make fusion energy a commercial reality.

  20. The National Ignition Facility: the path to a carbon-free energy future.

    PubMed

    Stolz, Christopher J

    2012-08-28

    The National Ignition Facility (NIF), the world's largest and most energetic laser system, is now operational at Lawrence Livermore National Laboratory. The NIF will enable exploration of scientific problems in national strategic security, basic science and fusion energy. One of the early NIF goals centres on achieving laboratory-scale thermonuclear ignition and energy gain, demonstrating the feasibility of laser fusion as a viable source of clean, carbon-free energy. This talk will discuss the precision technology and engineering challenges of building the NIF and those we must overcome to make fusion energy a commercial reality.

  1. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks.

    PubMed

    Li, Zhen; Jing, Tao; Ma, Liran; Huo, Yan; Qian, Jin

    2016-03-07

    The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. The use of a large number of IoT devices makes the spectrum scarcity problem even more serious. The usable spectrum resources are almost entirely occupied, and thus, the increasing radio access demands of IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric cryptography and asymmetric cryptography) may be compromised in CIoT networks, since these types of networks are heterogeneous. In this paper, we address the security issue in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative networks, we propose to employ cooperative jamming to achieve secrecy transmission. In the cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the signal to interference plus noise ratio (SINR) at the eavesdropper subject to the quality of service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the considered minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper. By using semi-definite programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative jamming scheme. The proposed auction framework jointly formulates the helper selection and the corresponding energy allocation problems under the constraint of the eavesdropper's SINR. By adopting the Vickrey auction, truthfulness and individual rationality can be guaranteed. Simulation results demonstrate the good performance of the cooperative jamming scheme and the auction framework.

  2. Test and Evaluation of Architecture-Aware Compiler Environment

    DTIC Science & Technology

    2011-11-01

    biology, medicine, social sciences , and security applications. Challenges include extremely large graphs (the Facebook friend network has over...Operations with Temporal Binning ....................................................................... 32 4.12 Memory behavior and Energy per...five challenge problems empirically, exploring their scaling properties, computation and datatype needs, memory behavior , and temporal behavior

  3. Laboratory Directed Research and Development FY2011 Annual Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Craig, W; Sketchley, J; Kotta, P

    2012-03-22

    A premier applied-science laboratory, Lawrence Livermore National Laboratory (LLNL) has earned the reputation as a leader in providing science and technology solutions to the most pressing national and global security problems. The LDRD Program, established by Congress at all DOE national laboratories in 1991, is LLNL's most important single resource for fostering excellent science and technology for today's needs and tomorrow's challenges. The LDRD internally directed research and development funding at LLNL enables high-risk, potentially high-payoff projects at the forefront of science and technology. The LDRD Program at Livermore serves to: (1) Support the Laboratory's missions, strategic plan, and foundationalmore » science; (2) Maintain the Laboratory's science and technology vitality; (3) Promote recruiting and retention; (4) Pursue collaborations; (5) Generate intellectual property; and (6) Strengthen the U.S. economy. Myriad LDRD projects over the years have made important contributions to every facet of the Laboratory's mission and strategic plan, including its commitment to nuclear, global, and energy and environmental security, as well as cutting-edge science and technology and engineering in high-energy-density matter, high-performance computing and simulation, materials and chemistry at the extremes, information systems, measurements and experimental science, and energy manipulation. A summary of each project was submitted by the principal investigator. Project summaries include the scope, motivation, goals, relevance to DOE/NNSA and LLNL mission areas, the technical progress achieved in FY11, and a list of publications that resulted from the research. The projects are: (1) Nuclear Threat Reduction; (2) Biosecurity; (3) High-Performance Computing and Simulation; (4) Intelligence; (5) Cybersecurity; (6) Energy Security; (7) Carbon Capture; (8) Material Properties, Theory, and Design; (9) Radiochemistry; (10) High-Energy-Density Science; (11) Laser Inertial-Fusion Energy; (12) Advanced Laser Optical Systems and Applications; (12) Space Security; (13) Stockpile Stewardship Science; (14) National Security; (15) Alternative Energy; and (16) Climatic Change.« less

  4. Weather extremes could affect agriculture

    NASA Astrophysics Data System (ADS)

    Balcerak, Ernie

    2012-05-01

    As Earth's climate warms, agricultural producers will need to adapt. Changes, especially increases in extreme events, are already having an impact on food production, according to speakers at a 1 May session on agriculture and food security at the AGU Science Policy Conference. Christopher Field, director of the Department of Global Ecology at the Carnegie Institution for Science of Washington, D. C., pointed out the complex factors that come into play in understanding food security, including spatially varying controls and stresses, incomplete models, and the potential for threshold responses. Factors that are likely to cause problems include increasing population; increasing preference for meat, which needs more land and energy inputs to produce; climate change; and increasing use of agricultural lands for biomass energy.

  5. Energy risk in the arbitrage pricing model: an empirical and theoretical study

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bremer, M.A.

    1986-01-01

    This dissertation empirically explores the Arbitrage Pricing Theory in the context of energy risk for securities over the 1960s, 1970s, and early 1980s. Starting from a general multifactor pricing model, the paper develops a two factor model based on a market-like factor and an energy factor. This model is then tested on portfolios of securities grouped according to industrial classification using several econometric techniques designed to overcome some of the more serious estimation problems common to these models. The paper concludes that energy risk is priced in the 1970s and possibly even in the 1960s. Energy risk is found tomore » be priced in the sense that investors who hold assets subjected to energy risk are paid for this risk. The classic version of the Capital Asset Pricing Model which posits the market as the single priced factor is rejected in favor of the Arbitrage Pricing Theory or multi-beta versions of the Capital Asset Pricing Model. The study introduces some original econometric methodology to carry out empirical tests.« less

  6. Nuclear Power; Past, present and future

    NASA Astrophysics Data System (ADS)

    Elliott, David

    2017-04-01

    This book looks at the early history of nuclear power, at what happened next, and at its longer-term prospects. The main question is: can nuclear power overcome the problems that have emerged? It was once touted as the ultimate energy source, freeing mankind from reliance on dirty, expensive fossil energy. Sixty years on, nuclear only supplies around 11.5% of global energy and is being challenged by cheaper energy options. While the costs of renewable sources, like wind and solar, are falling rapidly, nuclear costs have remained stubbornly high. Its development has also been slowed by a range of other problems, including a spate of major accidents, security concerns and the as yet unresolved issue of what to do with the wastes that it produces. In response, a new generation of nuclear reactors is being developed, many of them actually revised versions of the ideas first looked at in the earlier phase. Will this new generation of reactors bring nuclear energy to the forefront of energy production in the future?

  7. Global CLEWs model - A novel application of OSeMOSYS

    NASA Astrophysics Data System (ADS)

    Avgerinopoulos, Georgios; Pereira Ramos, Eunice; Howells, Mark

    2017-04-01

    Over the past years, studies that analyse Nexus issues from a holistic point of view and not energy, land or water separately have been gaining momentum. This project aims at giving insights into global issues through the application and the analysis of a global scale OSeMOSYS model. The latter -which is based on a fully open and amendable code- has been used successfully in the latest years as it has been the producing fully accessible energy models suitable for capacity building and policy making suggestions. This study develops a CLEWs (climate, land, energy and water) model with the objective of interrogating global challenges (e.g. increasing food demand) and international trade features, with policy priorities on food security, resource efficiency, low-carbon energy and climate change mitigation, water availability and vulnerability to water stress and floods, water quality, biodiversity and ecosystem services. It will for instance assess (i) the impact of water constraints on food security and human development (clean water for human use; industrial and energy water demands), as well as (ii) the impact of climate change on aggravating or relieving water problems.

  8. The connection between water and energy in cities: a review.

    PubMed

    Kenway, S J; Lant, P A; Priestley, A; Daniels, P

    2011-01-01

    We have only rudimentary understanding of the complex and pervasive connections between water and energy in cities. As water security now threatens energy and economic security, this is a major omission. Understanding the water-energy nexus is necessary if we want to contribute to solving water and energy issues simultaneously; if we want to stop moving problems from one resource dimension to another. This is particularly relevant in the Australian context where energy use for water supplies is forecast to rapidly escalate, growing around 300% from 2007 levels, by 2030. This paper presents a literature review with an aim of characterising the research to date with a particular focus on cities, the major centres of consumption and growth. It systematically analyses a wide range of papers and summarises the diverse objectives, dimensions, and scale of the research to-date together with knowledge gaps. There are many major gaps. These include energy use associated with water in industrial and commercial operations as well as socio-political perspectives. A major gap is the lack of a unifying theoretical framework and consistent methodology for analysis. This is considered a prerequisite for quantitative trans-city comparisons.

  9. Secure Cluster Head Sensor Elections Using Signal Strength Estimation and Ordered Transmissions

    PubMed Central

    Wang, Gicheol; Cho, Gihwan

    2009-01-01

    In clustered sensor networks, electing CHs (Cluster Heads) in a secure manner is very important because they collect data from sensors and send the aggregated data to the sink. If a compromised node is elected as a CH, it can illegally acquire data from all the members and even send forged data to the sink. Nevertheless, most of the existing CH election schemes have not treated the problem of the secure CH election. Recently, random value based protocols have been proposed to resolve the secure CH election problem. However, these schemes cannot prevent an attacker from suppressing its contribution for the change of CH election result and from selectively forwarding its contribution for the disagreement of CH election result. In this paper, we propose a modified random value scheme to prevent these disturbances. Our scheme dynamically adjusts the forwarding order of contributions and discards a received contribution when its signal strength is lower than the specified level to prevent these malicious actions. The simulation results have shown that our scheme effectively prevents attackers from changing and splitting an agreement of CH election result. Also, they have shown that our scheme is relatively energy-efficient than other schemes. PMID:22408550

  10. Rebecca Erikson – Solving Problems with Love for Science

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Erikson, Rebecca

    Rebecca Erikson’s love for science began at a young age. Today, she’s a senior scientist at PNNL trying to solve problems that address national security concerns. Through one project, she developed a sleek, simple and inexpensive way to turn a cellphone into a high-powered, high-quality microscope that helps authorities determine if white powder that falls from an envelope is anthrax or something simple like baby powder. Listen as Rebecca describes her work in this Energy Department video.

  11. Quantitative analysis of Indonesia's reserves and energy security as an evaluation by the nation in facing global competition

    NASA Astrophysics Data System (ADS)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede

    2015-12-01

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy proposed in this study, Indonesia energy security for 2025 could be improved to ranked 8 of 11 countries, better than Malaysia, Thailand and Singapore.

  12. Quantitative analysis of Indonesia’s reserves and energy security as an evaluation by the nation in facing global competition

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Selfmore » Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy proposed in this study, Indonesia energy security for 2025 could be improved to ranked 8 of 11 countries, better than Malaysia, Thailand and Singapore.« less

  13. Energy System Integration Facility Secure Data Center | Energy Systems

    Science.gov Websites

    Integration Facility | NREL Energy System Integration Facility Secure Data Center Energy System Integration Facility Secure Data Center The Energy Systems Integration Facility's Secure Data Center provides

  14. Using system-of-systems simulation modeling and analysis to measure energy KPP impacts for brigade combat team missions.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lawton, Craig R.; Welch, Kimberly M.; Kerper, Jessica

    2010-06-01

    The Department of Defense's (DoD) Energy Posture identified dependence of the US Military on fossil fuel energy as a key issue facing the military. Inefficient energy consumption leads to increased costs, effects operational performance and warfighter protection through large and vulnerable logistics support infrastructures. Military's use of energy is a critical national security problem. DoD's proposed metrics Fully Burdened Cost of Fuel and Energy Efficiency Key Performance Parameter (FBCF and Energy KPP) are a positive step to force energy use accountability onto Military programs. The ability to measure impacts of sustainment are required to fully measure Energy KPP. Sandia's workmore » with Army demonstrates the capability to measure performance which includes energy constraint.« less

  15. Roadmaps to Transition Countries to 100% Clean, Renewable Energy for All Purposes to Curtail Global Warming, Air Pollution, and Energy Risk

    NASA Astrophysics Data System (ADS)

    Jacobson, Mark Z.

    2017-10-01

    Solving the problems of global warming, air pollution, and energy security requires a massive effort by individuals, communities, businesses, nonprofits, and policy makers around the world. The first step in that process is to have a plan. To that end, roadmaps to transition 139 countries of the world to 100% clean, renewable wind, water, and solar power for all energy purposes (electricity, transportation, heating, cooling, industry, agriculture, forestry, and fishing) by 2050, with 80% by 2030, have been developed. The evolution, characteristics, and impacts to date of these plans are briefly described.

  16. Quick-fix proposals to reorganize Energy Department draw concern

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    The crisis prompting the current call to restructure the U.S. Department of Energy could just as easily have been the agency's failures in managing major environmental cleanup projects or other management problems, say some DOE watchers. But the “crisis du jour” bringing pressure on the agency to change its mode of operations stems from recent alarming reports of national security lapses and Chinese espionage at DOE. Congress currently is considering a handful of separate bills that could restructure or even dismantle the agency. However, on July 12, a bipartisan group of seven key congressmen urged House of Representatives Speaker Dennis Hastert (R-Ill.) to oppose any hasty and haphazard efforts at reform, which they said needs careful, bipartisan legislation that brings about changes along with protection of national security, safety, health, and the environment.

  17. The overview of nuclear energy situation in the World and Turkey

    NASA Astrophysics Data System (ADS)

    Kaplan, Yusuf Alper; Karagöz, Merve; Sayılmaz, Serhat

    2017-09-01

    The dependence on the energy and its use has increased in every country due to the increasing population and advanced technology. As a result of it, the reserves of fossil fuel have decreased, several energy crises have occurred from time to time and the alternative energy sources have been on the focus. One of these alternative energy sources is nuclear energy. The nuclear power plants, which were built in order to get nuclear energy, have attracted the attention thanks to some disadvantages such as its high cost and emission of radiation while they do not radiate harmful gases towards environment. The nuclear power plants that have already been and are planned to be constructed by a number of countries have become problematic because of the power plant accidents. On one hand, some countries have abandoned the nuclear power plants owing to the accidents mentioned above, on the other hand some other countries have continued to operate the nuclear power plants by claiming the necessity to meet the increasing demand on energy. It is seen that conflicts and problems experienced in the geography in which Turkey is located impacts the energy security of Turkey and it is understood that this situation may have a negative influence on national security of Turkey. Because of all these reasons, actualizing nuclear energy projects are important for Turkey which is dependent in respect of energy.

  18. Capturing security requirements for software systems.

    PubMed

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-07-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  19. Capturing security requirements for software systems

    PubMed Central

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-01-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way. PMID:25685514

  20. Updating energy security and environmental policy: Energy security theories revisited.

    PubMed

    Proskuryakova, L

    2018-06-18

    The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  1. Security Research on VoIP with Watermarking

    NASA Astrophysics Data System (ADS)

    Hu, Dong; Lee, Ping

    2008-11-01

    With the wide application of VoIP, many problems have occurred. One of the problems is security. The problems with securing VoIP systems, insufficient standardization and lack of security mechanisms emerged the need for new approaches and solutions. In this paper, we propose a new security architecture for VoIP which is based on digital watermarking which is a new, flexible and powerful technology that is increasingly gaining more and more attentions. Besides known applications e.g. to solve copyright protection problems, we propose to use digital watermarking to secure not only transmitted audio but also signaling protocol that VoIP is based on.

  2. Cyber physical systems based on cloud computing and internet of things for energy efficiency

    NASA Astrophysics Data System (ADS)

    Suciu, George; Butca, Cristina; Suciu, Victor; Cretu, Alexandru; Fratu, Octavian

    2016-12-01

    Cyber Physical Systems (CPS) and energy efficiency play a major role in the context of industry expansion. Management practices for improving efficiency in the field of energy consumption became a priority of many major industries who are inefficient in terms of exploitation costs. The effort of adopting energy management means in an organization is quite challenging due to the lack of resources and expertise. One major problem consists in the lack of knowledge for energy management and practices. This paper aims to present authors' concept in creating a Cyber Physical Energy System (CPES) that will change organizations' way of consuming energy, by making them aware of their use. The presented concept will consider the security of the whole system and the easy integration with the existing electric network infrastructure.

  3. An energy-efficient and secure hybrid algorithm for wireless sensor networks using a mobile data collector

    NASA Astrophysics Data System (ADS)

    Dayananda, Karanam Ravichandran; Straub, Jeremy

    2017-05-01

    This paper proposes a new hybrid algorithm for security, which incorporates both distributed and hierarchal approaches. It uses a mobile data collector (MDC) to collect information in order to save energy of sensor nodes in a wireless sensor network (WSN) as, in most networks, these sensor nodes have limited energy. Wireless sensor networks are prone to security problems because, among other things, it is possible to use a rogue sensor node to eavesdrop on or alter the information being transmitted. To prevent this, this paper introduces a security algorithm for MDC-based WSNs. A key use of this algorithm is to protect the confidentiality of the information sent by the sensor nodes. The sensor nodes are deployed in a random fashion and form group structures called clusters. Each cluster has a cluster head. The cluster head collects data from the other nodes using the time-division multiple access protocol. The sensor nodes send their data to the cluster head for transmission to the base station node for further processing. The MDC acts as an intermediate node between the cluster head and base station. The MDC, using its dynamic acyclic graph path, collects the data from the cluster head and sends it to base station. This approach is useful for applications including warfighting, intelligent building and medicine. To assess the proposed system, the paper presents a comparison of its performance with other approaches and algorithms that can be used for similar purposes.

  4. Three Blind Men and the Elephant

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Long, J S

    2007-02-13

    Just like the blind men in the popular story of perceiving the elephant, the three major constituencies participating in the energy debate have greatly different perceptions of the problem. The constituency that is worried about climate change believes the energy problem is caused by profligate use of fossil fuel that has dramatically changed our atmosphere. The energy security group sees dangerous reliance on foreign sources of oil increasingly held by countries hostile to the US. The economic vitality group sees high energy prices and their effect on the economy and our life-style. Just like the blind men, each of themore » three constituencies perceives a different problem. And just as with the blind men, while each perspective is right as a piece of the elephant, it takes all the perspectives together to actually solve the problem. Environmentalists focus on solutions responding to the scientific consensus that greenhouse gases are creating rapid climate change. The tipping point has come: it is now a consensus position among scientists the global warming is being affected by anthropogenic activity to 90% certainty according to the last IPCC report. Although they still struggle with the prediction of how much global temperatures will rise if we do nothing--is it 5 deg or 10 under BAU? This group believes that we cannot afford to take a chance because we get only one chance. We can not afford to do this kind of experiment with the Earth. Any choice which decreases our CO{sub 2} footprint is favored, even if it means a decrease in standard of living. The energy security constituency sees the geo-politics of oil becoming increasingly dire. They look at oil money being used to fund anti-American activities of groups such as the Wahabis in Saudi Arabia, Hezbollah in Lebanon and the infamous Al Qaeda. They quip that the Iraq war is the first war where we are paying for both sides. They note Iran and the Shia throughout the Middle East seeing the possibility of controlling 2/3 of the world's oil. They see oil and gas being used by Russia to exert political power using the gas tap and Hugo Chavez in Venezuela clearly anti-American and now a virtual dictator who controls 15% of our oil imports. Conflicts in Nigeria over oil wealth and corruption affected our oil supply. Countries such as China are at best unwilling to join political action against countries such as Sudan that supply them oil, and at worst, selling them arms in order to cement their relationships with respect to importing oil. This security constituency favors ending our vulnerability by ending our ''addiction to foreign oil''. This group thinks that there is no domestic source of energy that is bad. They will be happy to see our corn turned into ethanol; our coal turned into liquid fuel for transportation. No matter that the price of tortillas doubles in Mexico, we expand corn farming at the expense of the environment, our tanks and pipes in gas stations corrode and leak, or we make liquid fuel from coal, thus increasing the carbon footprint by 30% per unit of energy. The economic vitality group sees increasing international demand for oil occurring simultaneously with a peaking supply of light sweet crude. They see an oil market where higher prices drive more production of oil which is heavier and more sour (supply follows demand). However, fast growth in world-wide demand increases even faster and prices will go up. For example, China adds 10,000 cars per month, and there is an uncanny correlation between the price of oil and the amount of oil imported by China. The security contingent also worries about reliability of supply as affected by pipeline leaks in Alaska or hurricanes or potential terrorism. This constituency thinks the problem is one of capacity and favors solutions that will increase oil production, reservoirs, pipelines and refineries. They believe that the energy system will be determined by the market and want solutions that favor investment in capacity. What the environmentalists don't seem to get is climate change by itself will fail to gather broad enough support to achieve the environmentalists goals. People will not likely choose to shiver in the dark for a climate problem which is intangible to them. Where environmentalists have been successful they have built coalitions with other constituencies. As an example, the renewable energy portfolio standards (RPS) in California, Nevada, New York, and Texas etc. are supported by people who want to lower emissions to protect air quality, or protect the state from energy supply crises or promote economic development within the boundaries of the state. The adoption of an RPS addresses a coalition of interests. In Nevada, there was an effort to change the RPS to a low-carbon portfolio standard. The effort failed because those who were interested in economic development or energy security in the state saw no benefit.« less

  5. Sandia National Laboratories: Directed-energy tech receives funding to

    Science.gov Websites

    Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research

  6. 10 CFR 1016.12 - Termination of security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Termination of security facility approval. 1016.12 Section 1016.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.12 Termination of security facility approval. Security facility approval will be terminated...

  7. 10 CFR 1016.12 - Termination of security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Termination of security facility approval. 1016.12 Section 1016.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.12 Termination of security facility approval. Security facility approval will be terminated...

  8. Engineering Infrastructures: Problems of Safety and Security in the Russian Federation

    NASA Astrophysics Data System (ADS)

    Makhutov, Nikolay A.; Reznikov, Dmitry O.; Petrov, Vitaly P.

    Modern society cannot exist without stable and reliable engineering infrastructures (EI), whose operation is vital for any national economy. These infrastructures include energy, transportation, water and gas supply systems, telecommunication and cyber systems, etc. Their performance is commensurate with storing and processing huge amounts of information, energy and hazardous substances. Ageing infrastructures are deteriorating — with operating conditions declining from normal to emergency and catastrophic. The complexity of engineering infrastructures and their interdependence with other technical systems makes them vulnerable to emergency situations triggered by natural and manmade catastrophes or terrorist attacks.

  9. Modeling Primary Atomization of Liquid Fuels using a Multiphase DNS/LES Approach

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Arienti, Marco; Oefelein, Joe; Doisneau, Francois

    2016-08-01

    As part of a Laboratory Directed Research and Development project, we are developing a modeling-and-simulation capability to study fuel direct injection in automotive engines. Predicting mixing and combustion at realistic conditions remains a challenging objective of energy science. And it is a research priority in Sandia’s mission-critical area of energy security, being also relevant to many flows in defense and climate. High-performance computing applied to this non-linear multi-scale problem is key to engine calculations with increased scientific reliability.

  10. Energy Security: Emerging Challenges and Opportunities

    DTIC Science & Technology

    2010-08-01

    46 Appendix A: Electrical Capacity Margins...options........................................................................................ 21 6 Net electrical capacity compared to the North...Energy Security The Army Energy and Water Campaign Plan for Installations defines energy security as: the capacity to avoid adverse impact of energy

  11. The Strategic Petroleum Reserve: United States energy security, oil politics, and petroleum reserves policies in the twentieth century

    NASA Astrophysics Data System (ADS)

    Beaubouef, Bruce Andre

    The history of U.S. petroleum reserves policies in the twentieth century, including the Strategic Petroleum Reserve (SPR) program, provides a case study of the economic and political aspects of national security, and shows the ways in which the American political economy influences national security. One key problem plagued federal petroleum reserve programs and proposals throughout the twentieth century. In a political economy which traditionally placed strong emphasis upon the sanctity of private property and free markets, could the government develop an emergency petroleum reserve policy despite opposition from the private sector? Previous literature on the SPR and oil-stockpiling programs has largely disregarded the historical perspective, focusing instead upon econometric models, suggesting future oil-stockpiling policy options. This study will also make conclusions about the future of governmental oil-stockpiling policies, particularly with regard to the SPR program, but it will do so informed by a systematic history of the emergency petroleum reserve impulse in the twentieth century. Through a study of the emergency petroleum reserve impulse, one can see how the American political economy of oil and energy changed over the twentieth century. As petroleum became crucial to the military and then economic security of the United States, the federal government sought to develop emergency petroleum reserves first for the military, then for the civilian economy. But while the American petroleum industry could deliver the energy "goods" to American energy consumers at a reasonable price, the companies reigned supreme in the political equation. While that was true, federal petroleum reserve programs and proposals conflicted with and were overwhelmed by the historic American tradition of individual economic and private property rights. The depletion of American petroleum reserves changed that political equation, and the ensuing energy crises of the 1970s not only brought the issue of national energy autonomy into the realm of national security considerations, but also allowed for an unprecedented level of government intervention into the marketplace of oil and energy in peacetime. The federal government assumed the role of protecting and serving the interests of energy consumers, a role which had previously been the sole purview of the private sector. What resulted was a complex, chaotic, and controversial regulatory nightmare that highlighted the deficiencies of micro-management, and stoked the political momentum for deregulation in the 1980s, which continued into the 1990s. Gradually, government micro-management of the energy economy was abandoned. That left the SPR, a passive, market-conforming policy tool as the government's primary mechanism for combating energy crises. (Abstract shortened by UMI.)

  12. Energy Independence and Security Act of 2007

    EPA Pesticide Factsheets

    This page provides an overview of the Energy Independence and Security Act (EISA) of 2007, which aims to increase U.S. energy security, develop renewable energy production, and improve vehicle fuel economy.

  13. Cooperative high-performance storage in the accelerated strategic computing initiative

    NASA Technical Reports Server (NTRS)

    Gary, Mark; Howard, Barry; Louis, Steve; Minuzzo, Kim; Seager, Mark

    1996-01-01

    The use and acceptance of new high-performance, parallel computing platforms will be impeded by the absence of an infrastructure capable of supporting orders-of-magnitude improvement in hierarchical storage and high-speed I/O (Input/Output). The distribution of these high-performance platforms and supporting infrastructures across a wide-area network further compounds this problem. We describe an architectural design and phased implementation plan for a distributed, Cooperative Storage Environment (CSE) to achieve the necessary performance, user transparency, site autonomy, communication, and security features needed to support the Accelerated Strategic Computing Initiative (ASCI). ASCI is a Department of Energy (DOE) program attempting to apply terascale platforms and Problem-Solving Environments (PSEs) toward real-world computational modeling and simulation problems. The ASCI mission must be carried out through a unified, multilaboratory effort, and will require highly secure, efficient access to vast amounts of data. The CSE provides a logically simple, geographically distributed, storage infrastructure of semi-autonomous cooperating sites to meet the strategic ASCI PSE goal of highperformance data storage and access at the user desktop.

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kong, Bo

    China’s energy insecurity largely originates from its constrained availability, questionable reliability, and uncertain affordability of its oil supplies. The country’s fast industrialization and urbanization, together with demand for infrastructure and increasing popularity of automobiles, requires a lot of energy, but it consumes energy both intensively and inefficiently, threatening the environmental well-being of China and its neighbors. China’s risk aversion and poor energy policy making system further magnifies its perceptions of the low availability, reliability and affordability of oil imports, which further compounds its sense of energy insecurity. Distrustful of the market, and suspicious of other major energy players in themore » international market, the Chinese leadership relies on the state-centered approach, or economic nationalism, rather than a market approach to enhance its energy security. However, the country lacks not only an energy policy making system that can make and implement sound energy policies but also an energy market that relies on market prices to allocate energy resources efficiently. As a result of this domestic failure, China has pushed its national flagship companies to undertake a global scavenger hunt for energy while muddling along a messy road of energy reform at home. Setbacks in acquiring new sources of oil have validated the Chinese leadership’s belief that the international oil market is not free and China’s access to international oil is not guaranteed through the market. China’s problems in the international energy market are also perceived as evidence of attempts to prevent China from exerting international influence. China’s leadership is convinced that China should focus on areas where western capital is not heavily concentrated or where western influences are weak. With the recent revaluation of Chinese currency and growing economy, China has both the wherewithal and appetite to acquire more oil assets abroad. Both China and the United States stand at a critical juncture of history where China’s rise depends on reliable energy supplies which it increasingly imports from abroad and where the growing wealth of the United States is increasingly dependent upon China’s success. If China does not have energy security it’s 1.3 billion fuel-starved people will prevent the rest of the world from achieving energy security.« less

  15. Indirection and computer security.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyzemore » common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.« less

  16. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov Websites

    Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers

  17. Modeling Security Bridge Certificate Authority Architecture

    NASA Astrophysics Data System (ADS)

    Ren, Yizhi; Li, Mingchu; Sakurai, Kouichi

    Current Public Key Infrastructures suffer from a scaling problem, and some may have security problems, even given the topological simplification of bridge certification authorities. This paper analyzes the security problems in Bridge Certificate Authorities (BCA) model by using the concept of “impersonation risk, ” and proposes a new modified BCA model, which enhances its security, but is a bit more complex incertification path building and implementation than the existing one.

  18. 10 CFR 780.8 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...

  19. 10 CFR 780.8 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...

  20. 10 CFR 780.8 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...

  1. 10 CFR 780.8 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...

  2. 10 CFR 780.8 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...

  3. Information security of power enterprises of North-Arctic region

    NASA Astrophysics Data System (ADS)

    Sushko, O. P.

    2018-05-01

    The role of information technologies in providing technological security for energy enterprises is a component of the economic security for the northern Arctic region in general. Applying instruments and methods of information protection modelling of the energy enterprises' business process in the northern Arctic region (such as Arkhenergo and Komienergo), the authors analysed and identified most frequent risks of information security. With the analytic hierarchy process based on weighting factor estimations, information risks of energy enterprises' technological processes were ranked. The economic estimation of the information security within an energy enterprise considers weighting factor-adjusted variables (risks). Investments in information security systems of energy enterprises in the northern Arctic region are related to necessary security elements installation; current operating expenses on business process protection systems become materialized economic damage.

  4. Economic Evaluation of the Information Security Levels Achieved by Electric Energy Providers in North Arctic Region

    NASA Astrophysics Data System (ADS)

    Sushko, O. P.; Kaznin, A. A.; Babkin, A. V.; Bogdanov, D. A.

    2017-10-01

    The study we are conducting involves the analysis of information security levels achieved by energy providers operating in the North Arctic Region. We look into whether the energy providers’ current information security levels meet reliability standards and determine what further actions may be needed for upgrading information security in the context of the digital transformation that the world community is undergoing. When developing the information security systems for electric energy providers or selecting the protection means for them, we are governed by the fact that the assets to be protected are process technologies. While information security risk can be assessed using different methods, the evaluation of the economic damage from these risks appears to be a difficult task. The most probable and harmful risks we have identified when evaluating the electric energy providers’ information security will be used by us as variables. To provide the evaluation, it is necessary to calculate the costs relating to elimination of the risks identified. The final stage of the study will involve the development of an operation algorithm for the North Arctic Region’s energy provider’s business information protection security system - a set of information security services, and security software and hardware.

  5. The pressure cold wind system on the impact of industrial boiler economy and security

    NASA Astrophysics Data System (ADS)

    Li, Henan; Qian, Hongli; Jiang, Lei; Yu, Dekai; Li, Guannan; Yuan, Hong

    2017-05-01

    Industrial boiler is one of the most energy-consuming equipment in china, the annual consumption of energy accounts for about one-third of the national energy consumption.Industrial boiler in service at present have several severe problems such as small capacity, low efficiency, high energy consumption and causing severe pollution on environment, the average industrial boiler operation efficiency is only 65%. If the efficiency increased by 15% ∼ 20%, which meet the international advanced level, each year 70 million tons of coal saving and reduce environmental pollution[1]. As energy conservation and emissions reduction becomes the basic national policy of our country, improving the efficiency of industrial boiler energy is facing opportunities and challenges, optimizing the operation mode of the existing units, it is necessary to increase the flexibility of the boiler control.

  6. The lead/acid battery — a key technology for global energy management

    NASA Astrophysics Data System (ADS)

    Rand, D. A. J.

    As the nations of the world continue to develop, their industrialization and growing populations will require increasing amounts of energy. Yet, global energy consumption, even at present levels, is already giving rise to concerns over both the security of future supplies and the attendant problems of environmental degradation. Thus, a major objective for the energy industry — in all its sectors — is to develop procedures so that the burgeoning demand for energy can be tolerated without exhaustion of the planet's resources, and without further deterioration of the global ecosystem. A step in the right direction is to place lead/acid batteries — serviceable, efficient and clean technology — at the cutting edge of energy strategies, regardless of the relatively low price of such traditional fuels as coal, mineral oil and natural gas.

  7. A security/safety survey of long term care facilities.

    PubMed

    Acorn, Jonathan R

    2010-01-01

    What are the major security/safety problems of long term care facilities? What steps are being taken by some facilities to mitigate such problems? Answers to these questions can be found in a survey of IAHSS members involved in long term care security conducted for the IAHSS Long Term Care Security Task Force. The survey, the author points out, focuses primarily on long term care facilities operated by hospitals and health systems. However, he believes, it does accurately reflect the security problems most long term facilities face, and presents valuable information on security systems and practices which should be also considered by independent and chain operated facilities.

  8. Innovation on Energy Power Technology (7)Development and Practical Application of Sodium-Sulfur Battery for Electric Energy Storage System

    NASA Astrophysics Data System (ADS)

    Rachi, Hideki

    Sodium-Sulfur battery (NAS battery), which has more than 3 times of energy density compared with the conventional lead-acid battery and can be compactly established, has a great installation effects as a distributed energy storage system in the urban area which consumes big electric power. For the power company, NAS battery contributes to the load leveling, the supply capability up at the peak period, the efficient operation of the electric power equipment and the reduction of the capital expenditure. And for the customer, it is possible to enjoy the reduction of the electricity charges by utilizing nighttime electric power and the securing of a security. The contribution to the highly sophisticated information society where the higher electric power quality is desired, mainly office buildings and factories by the progress of IT, is very big. Tokyo Electric Power Company (TEPCO) developed the elementary technology of NAS battery from 1984 and ended the development of practical battery which has long-term durability and the safety and the performance verification of the megawatt scale. Finally TEPCO accomplished the practical application and commercialization of the stationary energy storage technology by NAS battery. In this paper, we introduces about conquered problems until practical application and commercialization.

  9. 10 CFR 1016.11 - Cancellation of requests for security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Cancellation of requests for security facility approval. 1016.11 Section 1016.11 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.11 Cancellation of requests for security facility approval. When a...

  10. 10 CFR 1016.11 - Cancellation of requests for security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Cancellation of requests for security facility approval. 1016.11 Section 1016.11 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.11 Cancellation of requests for security facility approval. When a...

  11. 10 CFR 1016.10 - Grant, denial, or suspension of security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Grant, denial, or suspension of security facility approval. 1016.10 Section 1016.10 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.10 Grant, denial, or suspension of security facility approval...

  12. 10 CFR 1016.10 - Grant, denial, or suspension of security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Grant, denial, or suspension of security facility approval. 1016.10 Section 1016.10 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.10 Grant, denial, or suspension of security facility approval...

  13. 10 CFR 1016.10 - Grant, denial, or suspension of security facility approval.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Grant, denial, or suspension of security facility approval. 1016.10 Section 1016.10 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.10 Grant, denial, or suspension of security facility approval...

  14. Exploring the Application of Shared Ledger Technology to Safeguards and other National Security Topics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Frazar, Sarah L.; Winters, Samuel T.; Kreyling, Sean J.

    In 2016, the Office of International Nuclear Safeguards at the National Nuclear Security Administration (NNSA) within the Department of Energy (DOE) commissioned the Pacific Northwest National Laboratory (PNNL) to explore the potential implications of the digital currency bitcoin and its underlying technologies on the safeguards system. The authors found that one category of technologies referred to as Shared Ledger Technology (SLT) offers a spectrum of benefits to the safeguards system. While further research is needed to validate assumptions and findings in the paper, preliminary analysis suggests that both the International Atomic Energy Agency (IAEA) and Member States can use SLTmore » to promote efficient, effective, accurate, and timely reporting, and increase transparency in the safeguards system without sacrificing confidentiality of safeguards data. This increased transparency and involvement of Member States in certain safeguards transactions could lead to increased trust and cooperation among States and the public, which generates a number of benefits. This paper describes these benefits and the analytical framework for assessing SLT applications for specific safeguards problems. The paper will also describe other national security areas where SLT could provide benefits.« less

  15. Amoeba-inspired nanoarchitectonic computing: solving intractable computational problems using nanoscale photoexcitation transfer dynamics.

    PubMed

    Aono, Masashi; Naruse, Makoto; Kim, Song-Ju; Wakabayashi, Masamitsu; Hori, Hirokazu; Ohtsu, Motoichi; Hara, Masahiko

    2013-06-18

    Biologically inspired computing devices and architectures are expected to overcome the limitations of conventional technologies in terms of solving computationally demanding problems, adapting to complex environments, reducing energy consumption, and so on. We previously demonstrated that a primitive single-celled amoeba (a plasmodial slime mold), which exhibits complex spatiotemporal oscillatory dynamics and sophisticated computing capabilities, can be used to search for a solution to a very hard combinatorial optimization problem. We successfully extracted the essential spatiotemporal dynamics by which the amoeba solves the problem. This amoeba-inspired computing paradigm can be implemented by various physical systems that exhibit suitable spatiotemporal dynamics resembling the amoeba's problem-solving process. In this Article, we demonstrate that photoexcitation transfer phenomena in certain quantum nanostructures mediated by optical near-field interactions generate the amoebalike spatiotemporal dynamics and can be used to solve the satisfiability problem (SAT), which is the problem of judging whether a given logical proposition (a Boolean formula) is self-consistent. SAT is related to diverse application problems in artificial intelligence, information security, and bioinformatics and is a crucially important nondeterministic polynomial time (NP)-complete problem, which is believed to become intractable for conventional digital computers when the problem size increases. We show that our amoeba-inspired computing paradigm dramatically outperforms a conventional stochastic search method. These results indicate the potential for developing highly versatile nanoarchitectonic computers that realize powerful solution searching with low energy consumption.

  16. 2010 Nevada National Security Site Annual Illness and Injury Surveillance Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2011-07-28

    The U.S. Department of Energy's (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  17. 2010 Y-12 National Security Complex Annual Illness and Injury Surveillance Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs

    2011-08-31

    The U.S. Department of Energy's (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.

  18. Sandia National Laboratories focus issue: introduction.

    PubMed

    Boye, Robert

    2014-08-20

    For more than six decades, Sandia has provided the critical science and technology to address the nation's most challenging issues. Our original nuclear weapons mission has been complemented with work in defense systems, energy and climate, as well as international and homeland security. Our vision is to be a premier science and engineering laboratory for technology solutions to the most challenging problems that threaten peace and freedom for our nation and the globe.

  19. From Dr. Steven Ashby, Director of PNNL

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ashby, Steven

    Powered by the creativity and imagination of more than 4,000 exceptional scientists, engineers and support professionals, at PNNL we advance the frontiers of science and address some of the most challenging problems in energy, the environment and national security. As DOE’s premier chemistry, environmental sciences and data analytics laboratory, we provide national leadership in four areas: deepening our understanding of climate science; inventing the future power grid; preventing nuclear proliferation; and speeding environmental remediation. Other areas where we make important contributions include energy storage, microbial biology and cyber security. PNNL also is home to EMSL (the Environmental Molecular Sciences Laboratory),more » one of DOE’s scientific user facilities. We apply these science strengths to address both national and international problems in complex adaptive systems that are too difficult for one institution to tackle alone. Take earth systems, for instance. The earth is a complex adaptive system because it involves everything from climate and microbial communities in the soil to emissions from cars and coal-powered industrial plants. All of these factors and others ultimately influence not only our environment and overall quality of life, but cause the earth to adapt in ways that must be further addressed. PNNL researchers are playing a vital role in finding solutions across every area of this complex adaptive system.« less

  20. Negative emotionality moderates associations among attachment, toddler sleep, and later problem behaviors.

    PubMed

    Troxel, Wendy M; Trentacosta, Christopher J; Forbes, Erika E; Campbell, Susan B

    2013-02-01

    Secure parent-child relationships are implicated in children's self-regulation, including the ability to self-soothe at bedtime. Sleep, in turn, may serve as a pathway linking attachment security with subsequent emotional and behavioral problems in children. We used path analysis to examine the direct relationship between attachment security and maternal reports of sleep problems during toddlerhood and the degree to which sleep serves as a pathway linking attachment with subsequent teacher-reported emotional and behavioral problems. We also examined infant negative emotionality as a vulnerability factor that may potentiate attachment-sleep-adjustment outcomes. Data were drawn from 776 mother-infant dyads participating in the National Institute of Child and Human Development Study of Early Child Care. After statistically adjusting for mother and child characteristics, including child sleep and emotional and behavioral problems at 24 months, we found no evidence for a statistically significant direct path between attachment security and sleep problems at 36 months; however, there was a direct relationship between sleep problems at 36 months and internalizing problems at 54 months. Path models that examined the moderating influence of infant negative emotionality demonstrated significant direct relationships between attachment security and toddler sleep problems and between sleep problems and subsequent emotional and behavioral problems, but only among children characterized by high negative emotionality at 6 months. In addition, among this subset, there was a significant indirect path between attachment and internalizing problems through sleep problems. These longitudinal findings implicate sleep as one critical pathway linking attachment security with adjustment difficulties, particularly among temperamentally vulnerable children. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  1. Negative Emotionality Moderates Associations among Attachment, Toddler Sleep, and Later Problem Behaviors

    PubMed Central

    Troxel, Wendy M.; Trentacosta, Christopher J.; Forbes, Erika E.; Campbell, Susan B.

    2013-01-01

    Secure parent-child relationships are implicated in children’s self-regulation, including the ability to self-soothe at bedtime. Sleep, in turn, may serve as a pathway linking attachment security with subsequent emotional and behavioral problems in children. We used path analysis to examine the direct relationship between attachment security and maternal-reports of sleep problems during toddlerhood, and the degree to which sleep serves as a pathway linking attachment with subsequent teacher-reported emotional and behavioral problems. We also examined infant negative emotionality as a vulnerability factor that may potentiate attachment-sleep-adjustment outcomes. Data were drawn from 776 mother-infant dyads participating in the NICHD Study of Early Child Care (SECC). In the full sample, after statistically adjusting for mother and child characteristics, including child sleep and emotional and behavioral problems at 24 months, we did not find evidence for a statistically significant direct path between attachment security and sleep problems at 36 months; however, there was a direct relationship between sleep problems at 36 months and internalizing problems at 54 months. Path models that examined the moderating influence of infant negative emotionality demonstrated significant direct relationships between attachment security and toddler sleep problems, and sleep problems and subsequent emotional and behavioral problems, but only among children characterized by high negative emotionality at 6 months of age. In addition, among this subset, there was a significant indirect path between attachment and internalizing problems through sleep problems. These longitudinal findings implicate sleep as one critical pathway linking attachment security with adjustment difficulties, particularly among temperamentally vulnerable children. PMID:23421840

  2. Coupled Flow and Mechanics in Porous and Fractured Media*

    NASA Astrophysics Data System (ADS)

    Martinez, M. J.; Newell, P.; Bishop, J.

    2012-12-01

    Numerical models describing subsurface flow through deformable porous materials are important for understanding and enabling energy security and climate security. Some applications of current interest come from such diverse areas as geologic sequestration of anthropogenic CO2, hydro-fracturing for stimulation of hydrocarbon reservoirs, and modeling electrochemistry-induced swelling of fluid-filled porous electrodes. Induced stress fields in any of these applications can lead to structural failure and fracture. The ultimate goal of this research is to model evolving faults and fracture networks and flow within the networks while coupling to flow and mechanics within the intact porous structure. We report here on a new computational capability for coupling of multiphase porous flow with geomechanics including assessment of over-pressure-induced structural damage. The geomechanics is coupled to the flow via the variation in the fluid pore pressures, whereas the flow problem is coupled to mechanics by the concomitant material strains which alter the pore volume (porosity field) and hence the permeability field. For linear elastic solid mechanics a monolithic coupling strategy is utilized. For nonlinear elastic/plastic and fractured media, a segregated coupling is presented. To facilitate coupling with disparate flow and mechanics time scales, the coupling strategy allows for different time steps in the flow solve compared to the mechanics solve. If time steps are synchronized, the controller allows user-specified intra-time-step iterations. The iterative coupling is dynamically controlled based on a norm measuring the degree of variation in the deformed porosity. The model is applied for evaluation of the integrity of jointed caprock systems during CO2 sequestration operations. Creation or reactivation of joints can lead to enhanced pathways for leakage. Similarly, over-pressures can induce flow along faults. Fluid flow rates in fractures are strongly dependent on the effective hydraulic aperture, which is a non-linear function of effective normal stress. The dynamically evolving aperture field updates the effective, anisotropic permeability tensor, thus resulting in a highly coupled multiphysics problem. Two models of geomechanical damage are discussed: critical shear-slip criteria and a sub-grid joint model. Leakage rates through the caprock resulting from the joint model are compared to those assuming intact material, allowing a correlation between potential for leakage and injection rates/pressures, for various in-situ stratigraphies. *This material is based upon work supported as part of the Center for Frontiers of Subsurface Energy Security, an Energy Frontier Research Center funded by the U.S. Department of Energy, Office of Science, Office of Basic Energy Sciences under Award Number DE-SC0001114. Sandia is a multi-program laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energys National Nuclear Security Administration under Contract DE-AC04-94AL85000.

  3. European Union energy policy integration: A case of European Commission policy entrepreneurship and increasing supranationalism.

    PubMed

    Maltby, Tomas

    2013-04-01

    Focusing on gas, this article explores the role of the European Commission in the process of European Union energy security policy development, and the extent to which the policy area is becoming increasingly supranational. Situating the article within the literature on agenda-setting and framing, it is argued that a policy window was opened as a result of: enlargement to include more energy import dependent states, a trend of increasing energy imports and prices, and gas supply disruptions. From the mid-2000s, the Commission contributed to a shift in political norms, successfully framing import dependency as a problem requiring an EU-level solution, based on the institution's pre-existing preferences for a diversified energy supply and internal energy market. Whilst Member States retain significant sovereignty, the Commission has achieved since 2006 creeping competencies in the internal, and to a lesser extent external, dimensions of EU energy policy.

  4. European Union energy policy integration: A case of European Commission policy entrepreneurship and increasing supranationalism

    PubMed Central

    Maltby, Tomas

    2013-01-01

    Focusing on gas, this article explores the role of the European Commission in the process of European Union energy security policy development, and the extent to which the policy area is becoming increasingly supranational. Situating the article within the literature on agenda-setting and framing, it is argued that a policy window was opened as a result of: enlargement to include more energy import dependent states, a trend of increasing energy imports and prices, and gas supply disruptions. From the mid-2000s, the Commission contributed to a shift in political norms, successfully framing import dependency as a problem requiring an EU-level solution, based on the institution’s pre-existing preferences for a diversified energy supply and internal energy market. Whilst Member States retain significant sovereignty, the Commission has achieved since 2006 creeping competencies in the internal, and to a lesser extent external, dimensions of EU energy policy. PMID:24926115

  5. 22 CFR 9a.1 - Security of certain information and material related to the International Energy Program.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...

  6. 76 FR 65508 - Extension of the Public Comment Period for the Draft Site-Wide Environmental Impact Statement for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-21

    ... DEPARTMENT OF ENERGY National Nuclear Security Administration Extension of the Public Comment... Department of Energy/National Nuclear Security Administration Nevada National Security Site and Off-Site Locations in the State of Nevada AGENCY: National Nuclear Security Administration, U.S. Department of Energy...

  7. 10 CFR 1016.8 - Approval for processing access permittees for security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security facility...

  8. 10 CFR 1016.8 - Approval for processing access permittees for security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security facility...

  9. 22 CFR 9a.1 - Security of certain information and material related to the International Energy Program.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...

  10. Post-Cold War Science and Technology at Los Alamos

    NASA Astrophysics Data System (ADS)

    Browne, John C.

    2002-04-01

    Los Alamos National Laboratory serves the nation through the development and application of leading-edge science and technology in support of national security. Our mission supports national security by: ensuring the safety, security, and reliability of the U.S. nuclear stockpile; reducing the threat of weapons of mass destruction in support of counter terrorism and homeland defense; and solving national energy, environment, infrastructure, and health security problems. We require crosscutting fundamental and advanced science and technology research to accomplish our mission. The Stockpile Stewardship Program develops and applies, advanced experimental science, computational simulation, and technology to ensure the safety and reliability of U.S. nuclear weapons in the absence of nuclear testing. This effort in itself is a grand challenge. However, the terrorist attack of September 11, 2001, reminded us of the importance of robust and vibrant research and development capabilities to meet new and evolving threats to our national security. Today through rapid prototyping we are applying new, innovative, science and technology for homeland defense, to address the threats of nuclear, chemical, and biological weapons globally. Synergistically, with the capabilities that we require for our core mission, we contribute in many other areas of scientific endeavor. For example, our Laboratory has been part of the NASA effort on mapping water on the moon and NSF/DOE projects studying high-energy astrophysical phenomena, understanding fundamental scaling phenomena of life, exploring high-temperature superconductors, investigating quantum information systems, applying neutrons to condensed-matter and nuclear physics research, developing large-scale modeling and simulations to understand complex phenomena, and exploring nanoscience that bridges the atomic to macroscopic scales. In this presentation, I will highlight some of these post-cold war science and technology advances including our national security contributions, and discuss some of challenges for Los Alamos in the future.

  11. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  12. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  13. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  14. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  15. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...

  16. Cutting planes for the multistage stochastic unit commitment problem

    DOE PAGES

    Jiang, Ruiwei; Guan, Yongpei; Watson, Jean -Paul

    2016-04-20

    As renewable energy penetration rates continue to increase in power systems worldwide, new challenges arise for system operators in both regulated and deregulated electricity markets to solve the security-constrained coal-fired unit commitment problem with intermittent generation (due to renewables) and uncertain load, in order to ensure system reliability and maintain cost effectiveness. In this paper, we study a security-constrained coal-fired stochastic unit commitment model, which we use to enhance the reliability unit commitment process for day-ahead power system operations. In our approach, we first develop a deterministic equivalent formulation for the problem, which leads to a large-scale mixed-integer linear program.more » Then, we verify that the turn on/off inequalities provide a convex hull representation of the minimum-up/down time polytope under the stochastic setting. Next, we develop several families of strong valid inequalities mainly through lifting schemes. In particular, by exploring sequence independent lifting and subadditive approximation lifting properties for the lifting schemes, we obtain strong valid inequalities for the ramping and general load balance polytopes. Lastly, branch-and-cut algorithms are developed to employ these valid inequalities as cutting planes to solve the problem. Our computational results verify the effectiveness of the proposed approach.« less

  17. Cutting planes for the multistage stochastic unit commitment problem

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jiang, Ruiwei; Guan, Yongpei; Watson, Jean -Paul

    As renewable energy penetration rates continue to increase in power systems worldwide, new challenges arise for system operators in both regulated and deregulated electricity markets to solve the security-constrained coal-fired unit commitment problem with intermittent generation (due to renewables) and uncertain load, in order to ensure system reliability and maintain cost effectiveness. In this paper, we study a security-constrained coal-fired stochastic unit commitment model, which we use to enhance the reliability unit commitment process for day-ahead power system operations. In our approach, we first develop a deterministic equivalent formulation for the problem, which leads to a large-scale mixed-integer linear program.more » Then, we verify that the turn on/off inequalities provide a convex hull representation of the minimum-up/down time polytope under the stochastic setting. Next, we develop several families of strong valid inequalities mainly through lifting schemes. In particular, by exploring sequence independent lifting and subadditive approximation lifting properties for the lifting schemes, we obtain strong valid inequalities for the ramping and general load balance polytopes. Lastly, branch-and-cut algorithms are developed to employ these valid inequalities as cutting planes to solve the problem. Our computational results verify the effectiveness of the proposed approach.« less

  18. The Chain-Link Fence Model: A Framework for Creating Security Procedures

    ERIC Educational Resources Information Center

    Houghton, Robert F.

    2013-01-01

    A long standing problem in information technology security is how to help reduce the security footprint. Many specific proposals exist to address specific problems in information technology security. Most information technology solutions need to be repeatable throughout the course of an information systems lifecycle. The Chain-Link Fence Model is…

  19. Understand the Big Picture So You Can Plan for Network Security

    ERIC Educational Resources Information Center

    Cervone, Frank

    2005-01-01

    This article discusses network security for libraries. It indicates that there were only six exploit (security exposure) problems, worldwide, reported to the CERT Coordination Center back in 1988. In that year, the CERT had just been established to provide a clearinghouse for exchanging information about network security problems. By 2003, the…

  20. Transit security : a description of problems and countermeasures

    DOT National Transportation Integrated Search

    1984-10-01

    This report provides a broad perspective on transit security. It examines a wide range of transit security problems encountered by transit systems, namely: crime against passengers and employees; crimes involving revenues, including fare evasion by p...

  1. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  2. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  3. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  4. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  5. Optimal damper placement research

    NASA Astrophysics Data System (ADS)

    Smirnov, Vladimir; Kuzhin, Bulat

    2017-10-01

    Nowadays increased noise and vibration pollution on technopark and research laboratories territories, which is negatively influencing on production of high-precision measuring instruments. The problem is actual for transport hubs, which experience influence of machines, vehicles, trains and planes. Energy efficiency is one of major functions in modern road transport development. The problem of environmental pollution, lack of energy resources and energy efficiency requires research, production and implementation of energy efficient materials that would be the foundation of environmentally sustainable transport infrastructure in road traffic. Improving the efficiency of energy use is a leading option to gain better energy security, improve industry profitability and competitiveness, and reduce the overall energy sector impacts on climate change. This paper has next indirect goals. Research impact of vibration on constructions, such as bus and train stations, terminals, which are mostly exposed to oscillation. Extend the buildings operation by decreasing the negative influence. Reduce expenses on maintenance and repair works. It is important not to forget about seismic protection, which is actual nowadays, when the safety stands first. Analysis of devastating earthquakes for last few years proves reasonableness of application such systems. The article is dedicated to learning dependence of damper location on natural frequency. As a model for analyze was simulated concrete construction with variable profile. We used program complex Patran for analyzing the model.

  6. Transmission Technologies and Operational Characteristic Analysis of Hybrid UHV AC/DC Power Grids in China

    NASA Astrophysics Data System (ADS)

    Tian, Zhang; Yanfeng, Gong

    2017-05-01

    In order to solve the contradiction between demand and distribution range of primary energy resource, Ultra High Voltage (UHV) power grids should be developed rapidly to meet development of energy bases and accessing of large-scale renewable energy. This paper reviewed the latest research processes of AC/DC transmission technologies, summarized the characteristics of AC/DC power grids, concluded that China’s power grids certainly enter a new period of large -scale hybrid UHV AC/DC power grids and characteristics of “strong DC and weak AC” becomes increasingly pro minent; possible problems in operation of AC/DC power grids was discussed, and interaction or effect between AC/DC power grids was made an intensive study of; according to above problems in operation of power grids, preliminary scheme is summarized as fo llows: strengthening backbone structures, enhancing AC/DC transmission technologies, promoting protection measures of clean energ y accessing grids, and taking actions to solve stability problems of voltage and frequency etc. It’s valuable for making hybrid UHV AC/DC power grids adapt to operating mode of large power grids, thus guaranteeing security and stability of power system.

  7. P.L. 110-140, "Energy Independence and Security Act of 2007", 2007

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2007-12-19

    The Energy Independence and Security Act of 2007 (EISA), signed into law on December 19, 2007, set forth an agenda for improving U.S. energy security across the entire economy. While industrial energy efficiency is specifically called out in Title IV, Subtitle D, other EISA provisions also apply to AMO activities.

  8. Single and multiple objective biomass-to-biofuel supply chain optimization considering environmental impacts

    NASA Astrophysics Data System (ADS)

    Valles Sosa, Claudia Evangelina

    Bioenergy has become an important alternative source of energy to alleviate the reliance on petroleum energy. Bioenergy offers diminishing climate change by reducing Green House Gas Emissions, as well as providing energy security and enhancing rural development. The Energy Independence and Security Act mandate the use of 21 billion gallons of advanced biofuels including 16 billion gallons of cellulosic biofuels by the year 2022. It is clear that Biomass can make a substantial contribution to supply future energy demand in a sustainable way. However, the supply of sustainable energy is one of the main challenges that mankind will face over the coming decades. For instance, many logistical challenges will be faced in order to provide an efficient and reliable supply of quality feedstock to biorefineries. 700 million tons of biomass will be required to be sustainably delivered to biorefineries annually to meet the projected use of biofuels by the year of 2022. Approaching this complex logistic problem as a multi-commodity network flow structure, the present work proposes the use of a genetic algorithm as a single objective optimization problem that considers the maximization of profit and the present work also proposes the use of a Multiple Objective Evolutionary Algorithm to simultaneously maximize profit while minimizing global warming potential. Most transportation optimization problems available in the literature have mostly considered the maximization of profit or the minimization of total travel time as potential objectives to be optimized. However, on this research work, we take a more conscious and sustainable approach for this logistic problem. Planners are increasingly expected to adopt a multi-disciplinary approach, especially due to the rising importance of environmental stewardship. The role of a transportation planner and designer is shifting from simple economic analysis to promoting sustainability through the integration of environmental objectives. To respond to these new challenges, the Modified Multiple Objective Evolutionary Algorithm for the design optimization of a biomass to bio-refinery logistic system that considers the simultaneous maximization of the total profit and the minimization of three environmental impacts is presented. Sustainability balances economic, social and environmental goals and objectives. There exist several works in the literature that have considered economic and environmental objectives for the presented supply chain problem. However, there is a lack of research performed in the social aspect of a sustainable logistics system. This work proposes a methodology to integrate social aspect assessment, based on employment creation. Finally, most of the assessment methodologies considered in the literature only contemplate deterministic values, when in realistic situations uncertainties in the supply chain are present. In this work, Value-at-Risk, an advanced risk measure commonly used in portfolio optimization is included to consider the uncertainties in biofuel prices, among the others.

  9. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... providing security education and training. A licensee or other entity subject to part 95 may obtain...

  10. 10 CFR 95.49 - Security of automatic data processing (ADP) systems.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security of automatic data processing (ADP) systems. 95.49 Section 95.49 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.49 Security of...

  11. Children's very low food security is associated with increased dietary intakes in energy, fat, and added sugar among Mexican-origin children (6-11 y) in Texas border Colonias.

    PubMed

    Sharkey, Joseph R; Nalty, Courtney; Johnson, Cassandra M; Dean, Wesley R

    2012-02-20

    Food insecurity among Mexican-origin and Hispanic households is a critical nutritional health issue of national importance. At the same time, nutrition-related health conditions, such as obesity and type 2 diabetes, are increasing in Mexican-origin youth. Risk factors for obesity and type 2 diabetes are more common in Mexican-origin children and include increased intakes of energy-dense and nutrient-poor foods. This study assessed the relationship between children's experience of food insecurity and nutrient intake from food and beverages among Mexican-origin children (age 6-11 y) who resided in Texas border colonias. Baseline data from 50 Mexican-origin children were collected in the home by trained promotora-researchers. All survey (demographics and nine-item child food security measure) and 24-hour dietary recall data were collected in Spanish. Dietary data were collected in person on three occasions using a multiple-pass approach; nutrient intakes were calculated with NDS-R software. Separate multiple regression models were individually fitted for total energy, protein, dietary fiber, calcium, vitamin D, potassium, sodium, Vitamin C, and percentage of calories from fat and added sugars. Thirty-two children (64%) reported low or very low food security. Few children met the recommendations for calcium, dietary fiber, and sodium; and none for potassium or vitamin D. Weekend intake was lower than weekday for calcium, vitamin D, potassium, and vitamin C; and higher for percent of calories from fat. Three-day average dietary intakes of total calories, protein, and percent of calories from added sugars increased with declining food security status. Very low food security was associated with greater intakes of total energy, calcium, and percentage of calories from fat and added sugar. This paper not only emphasizes the alarming rates of food insecurity for this Hispanic subgroup, but describes the associations for food insecurity and diet among this sample of Mexican-origin children. Child-reported food insecurity situations could serve as a screen for nutrition problems in children. Further, the National School Lunch and School Breakfast Programs, which play a major beneficial role in children's weekday intakes, may not be enough to keep pace with the nutritional needs of low and very low food secure Mexican-origin children.

  12. Children's very low food security is associated with increased dietary intakes in energy, fat, and added sugar among Mexican-origin children (6-11 y) in Texas border Colonias

    PubMed Central

    2012-01-01

    Background Food insecurity among Mexican-origin and Hispanic households is a critical nutritional health issue of national importance. At the same time, nutrition-related health conditions, such as obesity and type 2 diabetes, are increasing in Mexican-origin youth. Risk factors for obesity and type 2 diabetes are more common in Mexican-origin children and include increased intakes of energy-dense and nutrient-poor foods. This study assessed the relationship between children's experience of food insecurity and nutrient intake from food and beverages among Mexican-origin children (age 6-11 y) who resided in Texas border colonias. Methods Baseline data from 50 Mexican-origin children were collected in the home by trained promotora-researchers. All survey (demographics and nine-item child food security measure) and 24-hour dietary recall data were collected in Spanish. Dietary data were collected in person on three occasions using a multiple-pass approach; nutrient intakes were calculated with NDS-R software. Separate multiple regression models were individually fitted for total energy, protein, dietary fiber, calcium, vitamin D, potassium, sodium, Vitamin C, and percentage of calories from fat and added sugars. Results Thirty-two children (64%) reported low or very low food security. Few children met the recommendations for calcium, dietary fiber, and sodium; and none for potassium or vitamin D. Weekend intake was lower than weekday for calcium, vitamin D, potassium, and vitamin C; and higher for percent of calories from fat. Three-day average dietary intakes of total calories, protein, and percent of calories from added sugars increased with declining food security status. Very low food security was associated with greater intakes of total energy, calcium, and percentage of calories from fat and added sugar. Conclusions This paper not only emphasizes the alarming rates of food insecurity for this Hispanic subgroup, but describes the associations for food insecurity and diet among this sample of Mexican-origin children. Child-reported food insecurity situations could serve as a screen for nutrition problems in children. Further, the National School Lunch and School Breakfast Programs, which play a major beneficial role in children's weekday intakes, may not be enough to keep pace with the nutritional needs of low and very low food secure Mexican-origin children. PMID:22348599

  13. Sandia National Laboratories: Hydrogen Risk Assessment Models toolkit now

    Science.gov Websites

    Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers

  14. Sandia National Laboratories: 100 Resilient Cities: Sandia Challenge:

    Science.gov Websites

    Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers

  15. Inorganic scintillating materials and scintillation detectors

    PubMed Central

    YANAGIDA, Takayuki

    2018-01-01

    Scintillation materials and detectors that are used in many applications, such as medical imaging, security, oil-logging, high energy physics and non-destructive inspection, are reviewed. The fundamental physics understood today is explained, and common scintillators and scintillation detectors are introduced. The properties explained here are light yield, energy non-proportionality, emission wavelength, energy resolution, decay time, effective atomic number and timing resolution. For further understanding, the emission mechanisms of scintillator materials are also introduced. Furthermore, unresolved problems in scintillation phenomenon are considered, and my recent interpretations are discussed. These topics include positive hysteresis, the co-doping of non-luminescent ions, the introduction of an aimed impurity phase, the excitation density effect and the complementary relationship between scintillators and storage phosphors. PMID:29434081

  16. [Are the flight security measures good for the patients? The "sickurity" problem].

    PubMed

    Felkai, Péter

    2010-10-10

    Due to the stiffening requirements of security measures at the airports, prevention of air-travel related illnesses have become more difficult. The backlash effects of restrictions (e.g. fluid and movement restrictions) can trigger or even improve pathophysiological processes. The most advanced security check methods, the full body scan, besides ethical and moral considerations, may induce yet unknown pathological processes. We face the similar problem with the traveller, who becomes ill or injured during the trip. In this case, repatriation is often required, which is usually accomplished by commercial airlines. If patient should be transported by stretcher, it is also available on regular flight, but in this case he/she must be accompanied by a medical professional. This solution raises much more security problem: not only the sick person and the medical team, but even their medical equipments and medicines have to be checked. Due to the lack of standardised regulations the security staff solves the problem by various attempts from emphatic approach till refusal. For these reasons, a clear and exact regulation is needed, which must be based upon medical experts' opinion, and should deal not only with the flight security but with the patient's security, as well. This regulation can cease the patients and their medical accompanied persons' to be defencelessness against local authorities and security services. The same is true for handicapped persons. Author suggests solutions for the problem, balancing between flight security and the patient's "sickurity".

  17. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  18. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  19. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  20. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  1. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...

  2. China’s Energy Security: The Grand Hedging Strategy

    DTIC Science & Technology

    2010-05-01

    spotlight. The key to sustaining this dynamic economic growth is access to petroleum resources. The central question of this monograph is as follows...Is China’s energy security strategy liberal-institutionalist or realist-mercantilist? Using a qualitative case study methodology that explores the...dependent variable -- energy security -- using three independent variables (cost of supply, reliability of supply, and security of supply), China’s

  3. Sandia National Laboratories: National Security Missions: International

    Science.gov Websites

    Transportation Energy Energy Research Global Security WMD Counterterrorism & Response Global Threat Reduction Homeland Defense & Force Protection Homeland Security Cyber & Infrastructure Security Global Business Procurement Technical Assistance Program (PTAP) Current Suppliers iSupplier Account Accounts

  4. The security energy encryption in wireless power transfer

    NASA Astrophysics Data System (ADS)

    Sadzali, M. N.; Ali, A.; Azizan, M. M.; Albreem, M. A. M.

    2017-09-01

    This paper presents a concept of security in wireless power transfer (WPT) by applying chaos theory. Chaos theory is applied as a security system in order to safeguard the transfer of energy from a transmitter to the intended receiver. The energy encryption of the wireless power transfer utilizes chaos theory to generate the possibility of a logistic map for the chaotic security key. The simulation for energy encryption wireless power transfer system was conducted by using MATLAB and Simulink. By employing chaos theory, the chaotic key ensures the transmission of energy from transmitter to its intended receiver.

  5. Operational adaptability evaluation index system of pumped storage in UHV receiving-end grids

    NASA Astrophysics Data System (ADS)

    Yuan, Bo; Zong, Jin; Feng, Junshu

    2017-01-01

    Pumped storage is an effective solution to deal with the emergency reserve shortage, renewable energy accommodating and peak-shaving problems in ultra-high voltage (UHV) transmission receiving-end grids. However, governments and public opinion in China tend to evaluate the operational effectiveness of pumped storage using annual utilization hour, which may result in unreasonable and unnecessary dispatch of pumped storage. This paper built an operational adaptability evaluation index system for pumped storage in UHV-receiving end grids from three aspects: security insurance, peak-shaving and renewable energy accommodating, which can provide a comprehensive and objective way to evaluate the operational performance of a pumped storage station.

  6. Energy Structure and Energy Security under Climate Mitigation Scenarios in China

    PubMed Central

    Matsumoto, Ken’ichi

    2015-01-01

    This study investigates how energy structure and energy security in China will change in the future under climate mitigation policy scenarios using Representative Concentration Pathways in a computable general equilibrium model. The findings suggest that to reduce greenhouse gas emissions, China needs to shift its energy structure from fossil fuel dominance to renewables and nuclear. The lower the allowable emissions, the larger the shifts required. Among fossil fuels, coal use particularly must significantly decrease. Such structural shifts will improve energy self-sufficiency, thus enhancing energy security. Under the policy scenarios, energy-source diversity as measured by the Herfindahl Index improves until 2050, after which diversity declines because of high dependence on a specific energy source (nuclear and biomass). Overall, however, it is revealed that energy security improves along with progress in climate mitigation. These improvements will also contribute to the economy by reducing energy procurement risks. PMID:26660094

  7. 10 CFR 712.16 - DOE security review.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false DOE security review. 712.16 Section 712.16 Energy DEPARTMENT OF ENERGY HUMAN RELIABILITY PROGRAM Establishment of and Procedures for the Human Reliability... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file...

  8. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.

    PubMed

    Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae

    2015-06-26

    The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

  9. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation

    PubMed Central

    Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae

    2015-01-01

    The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both. PMID:26131669

  10. Interparental conflict, children’s security with parents, and long-term risk of internalizing problems: A longitudinal study from ages 2 to 10

    PubMed Central

    Brock, Rebecca L.; Kochanska, Grazyna

    2015-01-01

    Although the negative impact of marital conflict on children has been amply documented, few studies have examined the process of risk in a long-term, longitudinal design. We examined parent–child attachment security as a mechanism that may account for the impact of interparental conflict on children’s long-term risk of internalizing problems. Sixty-two community mothers, fathers, and children were followed from ages 2 to 10. Parents reported on their conflicts when their children were 2. Trained observers produced parent–child attachment security scores (Attachment Q-Set, Waters, 1987), based on lengthy naturalistic observations of the child with each parent. Parents rated children’s internalizing problems at age 10. A conditional process model and bootstrap approach were implemented to examine conditional indirect effects of conflict on child internalizing problems through attachment security for girls versus boys. Maladaptive marital conflict (destructive strategies, severity of arguments) increased internalizing problems 8 years later due to the undermined security for girls, whereas negative emotional aftermath of conflict (unresolved, lingering tension) increased internalizing problems for both boys and girls. The emotional aftermath of conflict is often overlooked, yet it appears to be a key dimension influencing emotional security in the family system, with significant consequences for children’s development. PMID:25797703

  11. Interparental conflict, children's security with parents, and long-term risk of internalizing problems: A longitudinal study from ages 2 to 10.

    PubMed

    Brock, Rebecca L; Kochanska, Grazyna

    2016-02-01

    Although the negative impact of marital conflict on children has been amply documented, few studies have examined the process of risk in a long-term, longitudinal design. We examined parent-child attachment security as a mechanism that may account for the impact of interparental conflict on children's long-term risk of internalizing problems. Sixty-two community mothers, fathers, and children were followed from ages 2 to 10. Parents reported on their conflicts when their children were 2. Trained observers produced parent-child attachment security scores (Attachment Q-Set, Waters, 1987), based on lengthy naturalistic observations of the child with each parent. Parents rated children's internalizing problems at age 10. A conditional process model and bootstrap approach were implemented to examine conditional indirect effects of conflict on child internalizing problems through attachment security for girls versus boys. Maladaptive marital conflict (destructive strategies, severity of arguments) increased internalizing problems 8 years later due to the undermined security for girls, whereas negative emotional aftermath of conflict (unresolved, lingering tension) increased internalizing problems for both boys and girls. The emotional aftermath of conflict is often overlooked, yet it appears to be a key dimension influencing emotional security in the family system, with significant consequences for children's development.

  12. Addressing Global Warming, Air Pollution, Energy Security, and Jobs with Roadmaps for Changing the All-Purpose Energy Infrastructure of the 50 United States

    NASA Astrophysics Data System (ADS)

    Jacobson, M. Z.

    2014-12-01

    Global warming, air pollution, and energy insecurity are three of the most significant problems facing the world today. This talk discusses the development of technical and economic plans to convert the energy infrastructure of each of the 50 United States to those powered by 100% wind, water, and sunlight (WWS) for all purposes, namely electricity, transportation, industry, and heating/cooling, after energy efficiency measures have been accounted for. The plans call for all new energy to be WWS by 2020, ~80% conversion of existing energy by 2030, and 100% by 2050 through aggressive policy measures and natural transition. Resource availability, footprint and spacing areas required, jobs created versus lost, energy costs, avoided costs from air pollution mortality and morbidity and climate damage, and methods of ensuring reliability of the grid are discussed. Please see http://web.stanford.edu/group/efmh/jacobson/Articles/I/WWS-50-USState-plans.html

  13. Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing

    NASA Astrophysics Data System (ADS)

    Sajeed, Shihan; Radchenko, Igor; Kaiser, Sarah; Bourgoin, Jean-Philippe; Pappa, Anna; Monat, Laurent; Legré, Matthieu; Makarov, Vadim

    2015-03-01

    The security of quantum communication using a weak coherent source requires an accurate knowledge of the source's mean photon number. Finite calibration precision or an active manipulation by an attacker may cause the actual emitted photon number to deviate from the known value. We model effects of this deviation on the security of three quantum communication protocols: the Bennett-Brassard 1984 (BB84) quantum key distribution (QKD) protocol without decoy states, Scarani-Acín-Ribordy-Gisin 2004 (SARG04) QKD protocol, and a coin-tossing protocol. For QKD we model both a strong attack using technology possible in principle and a realistic attack bounded by today's technology. To maintain the mean photon number in two-way systems, such as plug-and-play and relativistic quantum cryptography schemes, bright pulse energy incoming from the communication channel must be monitored. Implementation of a monitoring detector has largely been ignored so far, except for ID Quantique's commercial QKD system Clavis2. We scrutinize this implementation for security problems and show that designing a hack-proof pulse-energy-measuring detector is far from trivial. Indeed, the first implementation has three serious flaws confirmed experimentally, each of which may be exploited in a cleverly constructed Trojan-horse attack. We discuss requirements for a loophole-free implementation of the monitoring detector.

  14. Maternal prenatal felt security and infant health at birth interact to predict infant fussing and crying at 12 months postpartum.

    PubMed

    Sawada, Natsumi; Gagné, Faby M; Séguin, Louise; Kramer, Michael S; McNamara, Helen; Platt, Robert W; Goulet, Lise; Meaney, Michael J; Lydon, John E

    2015-08-01

    Infants born with medical problems are at risk for less optimal developmental outcomes. This may be, in part, because neonatal medical problems are associated with maternal distress, which may adversely impact infants. However, the reserve capacity model suggests that an individual's bank of psychosocial resources buffers the adverse effects of later-encountered stressors. This prospective longitudinal study examined whether preexisting maternal psychosocial resources, conceptualized as felt security in close relationships, moderate the association between neonatal medical problems and infant fussing and crying 12 months postpartum. Maternal felt security was measured by assessing its indicators in 5,092 pregnant women. At birth, infants were classified as healthy or having a medical problem. At 12 months, experience sampling was used to assess daily maternal reports of fussing and crying in 135 mothers of infants who were healthy or had medical problems at birth. Confirmatory factor analyses revealed that attachment, relationship quality, self-esteem, and social support can be conceptualized as indicators of a single felt security factor. Multiple regression analyses revealed that prenatal maternal felt security interacts with infant health at birth to predict fussing and crying at 12 months. Among infants born with medical problems, higher felt security predicted decreased fussing and crying. Maternal felt security assessed before birth dampens the association between neonatal medical problems and subsequent infant behavior. This supports the hypothesis that psychosocial resources in reserve can be called upon in the face of a stressor to reduce its adverse effects on the self or others. (c) 2015 APA, all rights reserved).

  15. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  16. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  17. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  18. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  19. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  20. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  1. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...

  2. 10 CFR 39.71 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  3. The Problem With Hugo

    DTIC Science & Technology

    2011-01-28

    of the oil market and lack of diversity within its GDP makes Chavez‘s economy extremely dangerous and risky. If the oil prices would again decline...Venezuela is one of the top four suppliers of oil to the U.S. and America is Venezuela‘s top trading partner.53 The National Security Strategy (NSS...with Chavez (much like Cuba and Fidel Castro). The U.S.‘s declaration of seeking energy independence, while reducing the need for U.S. oil imports

  4. 10 CFR 1016.23 - Establishment of security areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Establishment of security areas. 1016.23 Section 1016.23 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016... safeguard documents and material containing Restricted Data in accordance with the provisions of §§ 1016.21...

  5. 10 CFR 1016.39 - Termination, suspension, or revocation of security facility approval.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Termination, suspension, or revocation of security facility approval. 1016.39 Section 1016.39 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Control of Information § 1016.39 Termination, suspension, or revocation of security facility...

  6. 10 CFR 1016.39 - Termination, suspension, or revocation of security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Termination, suspension, or revocation of security facility approval. 1016.39 Section 1016.39 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Control of Information § 1016.39 Termination, suspension, or revocation of security facility...

  7. 10 CFR 1016.23 - Establishment of security areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Establishment of security areas. 1016.23 Section 1016.23 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016... safeguard documents and material containing Restricted Data in accordance with the provisions of §§ 1016.21...

  8. 75 FR 39273 - Energy Independence and Security Act (Pub. L. 110-140)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    ... DEPARTMENT OF THE INTERIOR U.S. Geological Survey Energy Independence and Security Act (Pub. L... Resource Assessment Methodology. SUMMARY: In 2007, the Energy Independence and Security Act (Pub. L. 110... provide important information to evaluate the potential for CO 2 storage as a mitigation option for global...

  9. 10 CFR 110.44 - Physical security standards.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Physical security standards. 110.44 Section 110.44 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) EXPORT AND IMPORT OF NUCLEAR EQUIPMENT AND MATERIAL Review of License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient...

  10. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...

  11. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...

  12. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...

  13. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  14. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  15. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  16. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  17. 10 CFR 20.1801 - Security of stored material.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...

  18. Correlation Research of Medical Security Management System Network Platform in Medical Practice

    NASA Astrophysics Data System (ADS)

    Jie, Wang; Fan, Zhang; Jian, Hao; Li-nong, Yu; Jun, Fei; Ping, Hao; Ya-wei, Shen; Yue-jin, Chang

    Objective-The related research of medical security management system network in medical practice. Methods-Establishing network platform of medical safety management system, medical security network host station, medical security management system(C/S), medical security management system of departments and sections, comprehensive query, medical security disposal and examination system. Results-In medical safety management, medical security management system can reflect the hospital medical security problem, and can achieve real-time detection and improve the medical security incident detection rate. Conclusion-The application of the research in the hospital management implementation, can find hospital medical security hidden danger and the problems of medical disputes, and can help in resolving medical disputes in time and achieve good work efficiency, which is worth applying in the hospital practice.

  19. Synchrophasor Sensing and Processing based Smart Grid Security Assessment for Renewable Energy Integration

    NASA Astrophysics Data System (ADS)

    Jiang, Huaiguang

    With the evolution of energy and power systems, the emerging Smart Grid (SG) is mainly featured by distributed renewable energy generations, demand-response control and huge amount of heterogeneous data sources. Widely distributed synchrophasor sensors, such as phasor measurement units (PMUs) and fault disturbance recorders (FDRs), can record multi-modal signals, for power system situational awareness and renewable energy integration. An effective and economical approach is proposed for wide-area security assessment. This approach is based on wavelet analysis for detecting and locating the short-term and long-term faults in SG, using voltage signals collected by distributed synchrophasor sensors. A data-driven approach for fault detection, identification and location is proposed and studied. This approach is based on matching pursuit decomposition (MPD) using Gaussian atom dictionary, hidden Markov model (HMM) of real-time frequency and voltage variation features, and fault contour maps generated by machine learning algorithms in SG systems. In addition, considering the economic issues, the placement optimization of distributed synchrophasor sensors is studied to reduce the number of the sensors without affecting the accuracy and effectiveness of the proposed approach. Furthermore, because the natural hazards is a critical issue for power system security, this approach is studied under different types of faults caused by natural hazards. A fast steady-state approach is proposed for voltage security of power systems with a wind power plant connected. The impedance matrix can be calculated by the voltage and current information collected by the PMUs. Based on the impedance matrix, locations in SG can be identified, where cause the greatest impact on the voltage at the wind power plants point of interconnection. Furthermore, because this dynamic voltage security assessment method relies on time-domain simulations of faults at different locations, the proposed approach is feasible, convenient and effective. Conventionally, wind energy is highly location-dependent. Many desirable wind resources are located in rural areas without direct access to the transmission grid. By connecting MW-scale wind turbines or wind farms to the distributions system of SG, the cost of building long transmission facilities can be avoid and wind power supplied to consumers can be greatly increased. After the effective wide area monitoring (WAM) approach is built, an event-driven control strategy is proposed for renewable energy integration. This approach is based on support vector machine (SVM) predictor and multiple-input and multiple-output (MIMO) model predictive control (MPC) on linear time-invariant (LTI) and linear time-variant (LTV) systems. The voltage condition of the distribution system is predicted by the SVM classifier using synchrophasor measurement data. The controllers equipped with wind turbine generators are triggered by the prediction results. Both transmission level and distribution level are designed based on this proposed approach. Considering economic issues in the power system, a statistical scheduling approach to economic dispatch and energy reserves is proposed. The proposed approach focuses on minimizing the overall power operating cost with considerations of renewable energy uncertainty and power system security. The hybrid power system scheduling is formulated as a convex programming problem to minimize power operating cost, taking considerations of renewable energy generation, power generation-consumption balance and power system security. A genetic algorithm based approach is used for solving the minimization of the power operating cost. In addition, with technology development, it can be predicted that the renewable energy such as wind turbine generators and PV panels will be pervasively located in distribution systems. The distribution system is an unbalanced system, which contains single-phase, two-phase and three-phase loads, and distribution lines. The complex configuration brings a challenge to power flow calculation. A topology analysis based iterative approach is used to solve this problem. In this approach, a self-adaptive topology recognition method is used to analyze the distribution system, and the backward/forward sweep algorithm is used to generate the power flow results. Finally, for the numerical simulations, the IEEE 14-bus, 30-bus, 39-bus and 118-bus systems are studied for fault detection, identification and location. Both transmission level and distribution level models are employed with the proposed control strategy for voltage stability of renewable energy integration. The simulation results demonstrate the effectiveness of the proposed methods. The IEEE 24-bus reliability test system (IEEE-RTS), which is commonly used for evaluating the price stability and reliability of power system, is used as the test bench for verifying and evaluating system performance of the proposed scheduling approach.

  20. Barriers to Securing Data on Bluetooth®-Enabled Mobile Devices: A Phenomenological Study

    ERIC Educational Resources Information Center

    Hines, Natasha

    2015-01-01

    Company data on mobile devices is vulnerable and subject to unauthorized access. The general problem is that information security incidents compromise the integrity and authenticity of electronic data. The specific problem is that organizational security policies, procedures, and training do not adequately address the vulnerabilities associated…

  1. Using ant colony optimization on the quadratic assignment problem to achieve low energy cost in geo-distributed data centers

    NASA Astrophysics Data System (ADS)

    Osei, Richard

    There are many problems associated with operating a data center. Some of these problems include data security, system performance, increasing infrastructure complexity, increasing storage utilization, keeping up with data growth, and increasing energy costs. Energy cost differs by location, and at most locations fluctuates over time. The rising cost of energy makes it harder for data centers to function properly and provide a good quality of service. With reduced energy cost, data centers will have longer lasting servers/equipment, higher availability of resources, better quality of service, a greener environment, and reduced service and software costs for consumers. Some of the ways that data centers have tried to using to reduce energy costs include dynamically switching on and off servers based on the number of users and some predefined conditions, the use of environmental monitoring sensors, and the use of dynamic voltage and frequency scaling (DVFS), which enables processors to run at different combinations of frequencies with voltages to reduce energy cost. This thesis presents another method by which energy cost at data centers could be reduced. This method involves the use of Ant Colony Optimization (ACO) on a Quadratic Assignment Problem (QAP) in assigning user request to servers in geo-distributed data centers. In this paper, an effort to reduce data center energy cost involves the use of front portals, which handle users' requests, were used as ants to find cost effective ways to assign users requests to a server in heterogeneous geo-distributed data centers. The simulation results indicate that the ACO for Optimal Server Activation and Task Placement algorithm reduces energy cost on a small and large number of users' requests in a geo-distributed data center and its performance increases as the input data grows. In a simulation with 3 geo-distributed data centers, and user's resource request ranging from 25,000 to 25,000,000, the ACO algorithm was able to reduce energy cost on an average of $.70 per second. The ACO for Optimal Server Activation and Task Placement algorithm has proven to work as an alternative or improvement in reducing energy cost in geo-distributed data centers.

  2. Post-Social Politics, Employability, and the Security Effects of Higher Education

    ERIC Educational Resources Information Center

    Frauley, Jon

    2012-01-01

    Trends within Western capitalist societies toward the individualizing of social problems, the responsibilizing of individuals for such problems, the treating of social problems as problems of control, ongoing attempts to shift the burden for safety and security from the state to the market, and changing conceptions of citizenship, have produced a…

  3. An Energy Efficient Protocol For The Internet Of Things

    NASA Astrophysics Data System (ADS)

    Venčkauskas, Algimantas; Jusas, Nerijus; Kazanavičius, Egidijus; Štuikys, Vytautas

    2015-01-01

    The Internet of Things (IoT) is a technological revolution that represents the future of computing and communications. One of the most important challenges of IoT is security: protection of data and privacy. The SSL protocol is the de-facto standard for secure Internet communications. The extra energy cost of encrypting and authenticating of the application data with SSL is around 15%. For IoT devices, where energy resources are limited, the increase in the cost of energy is a very significant factor. In this paper we present the energy efficient SSL protocol which ensures the maximum bandwidth and the required level of security with minimum energy consumption. The proper selection of the security level and CPU multiplier, can save up to 85% of the energy required for data encryption.

  4. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Freund, M.T.; Wise, J.A.; Ulibarri, C.A.

    This paper addresses US energy security in the post-Cold War era for a conference on energy security jointly sponsored by the Department of Energy and the National Defense University. It examines the evolving nature of energy security based on analysis of past crisis-inducing events and-discusses potentially important geopolitical, environmental, regulatory, and economic developments during the next twenty-five years. The paper steps beyond the traditional economic focus of energy security issues to examine the interplay between fundamental economic and technical drivers on the one hand, and political, environmental, and perceptual phenomena, on the other hand, that can combine to create crisesmore » where none were expected. The paper expands on the premise that the recent demise of the Soviet Union and other changing world conditions have created a new set of energy dynamics, and that it is imperative that the United States revise its energy security perspective accordingly. It proceeds by reviewing key factors that comprise the concepts of ``energy security`` and ``energy crisis`` and how they may fit into the new world energy security equation. The study also presents a series of crisis scenarios that could develop during the next twenty-five years, paying particular attention to mechanisms and linked crisis causes and responses. It concludes with a discussion of factors that may serve to warn analysts and decision makers of impending future crises conditions. The crisis scenarios contained in this report should be viewed only as a representative sample of the types of situations that could occur. They serve to illustrate the variety of factors that can coalesce to produce a ``crisis.``« less

  5. 10 CFR 110.44 - Physical security standards.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...

  6. 10 CFR 110.44 - Physical security standards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...

  7. 10 CFR 110.44 - Physical security standards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...

  8. 10 CFR 110.44 - Physical security standards.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...

  9. 18 CFR 3a.51 - Designation of security officers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 18 Conservation of Power and Water Resources 1 2013-04-01 2013-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...

  10. 18 CFR 3a.51 - Designation of security officers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...

  11. 18 CFR 3a.51 - Designation of security officers.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...

  12. 18 CFR 3a.51 - Designation of security officers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 18 Conservation of Power and Water Resources 1 2014-04-01 2014-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...

  13. Big data, little security: Addressing security issues in your platform

    NASA Astrophysics Data System (ADS)

    Macklin, Thomas; Mathews, Joseph

    2017-05-01

    This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.

  14. Prospective relations between family conflict and adolescent maladjustment: security in the family system as a mediating process.

    PubMed

    Cummings, E Mark; Koss, Kalsea J; Davies, Patrick T

    2015-04-01

    Conflict in specific family systems (e.g., interparental, parent-child) has been implicated in the development of a host of adjustment problems in adolescence, but little is known about the impact of family conflict involving multiple family systems. Furthermore, questions remain about the effects of family conflict on symptoms of specific disorders and adjustment problems and the processes mediating these effects. The present study prospectively examines the impact of family conflict and emotional security about the family system on adolescent symptoms of specific disorders and adjustment problems, including the development of symptoms of anxiety, depression, conduct problems, and peer problems. Security in the family system was examined as a mediator of these relations. Participants included 295 mother-father-adolescent families (149 girls) participating across three annual time points (grades 7-9). Including auto-regressive controls for initial levels of emotional insecurity and multiple adjustment problems (T1), higher-order emotional insecurity about the family system (T2) mediated relations between T1 family conflict and T3 peer problems, anxiety, and depressive symptoms. Further analyses supported specific patterns of emotional security/insecurity (i.e., security, disengagement, preoccupation) as mediators between family conflict and specific domains of adolescent adjustment. Family conflict was thus found to prospectively predict the development of symptoms of multiple specific adjustment problems, including symptoms of depression, anxiety, conduct problems, and peer problems, by elevating in in adolescent's emotional insecurity about the family system. The clinical implications of these findings are considered.

  15. Preface: photosynthesis and hydrogen energy research for sustainability.

    PubMed

    Tomo, Tatsuya; Allakhverdiev, Suleyman I

    2017-09-01

    Energy supply, climate change, and global food security are among the main chalenges facing humanity in the twenty-first century. Despite global energy demand is continuing to increase, the availability of low cost energy is decreasing. Together with the urgent problem of climate change due to CO 2 release from the combustion of fossil fuels, there is a strong requirement of developing the clean and renewable energy system for the hydrogen production. Solar fuel, biofuel, and hydrogen energy production gained unlimited possibility and feasibility due to understanding of the detailed photosynthetic system structures. This special issue contains selected papers on photosynthetic and biomimetic hydrogen production presented at the International Conference "Photosynthesis Research for Sustainability-2016", that was held in Pushchino (Russia), during June 19-25, 2016, with the sponsorship of the International Society of Photosynthesis Research (ISPR) and of the International Association for Hydrogen Energy (IAHE). This issue is intended to provide recent information on the photosynthetic and biohydrogen production to our readers.

  16. 3 CFR - The Energy Independence and Security Act of 2007

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false The Energy Independence and Security Act of 2007 Presidential Documents Other Presidential Documents Memorandum of January 26, 2009 The Energy Independence and Security Act of 2007 Memorandum for the Secretary of Transportation [and] the Administrator of the National Highway Traffic Safety...

  17. The pivotal and paradoxical role of phosphorus in a resilient water-energy-food security nexus

    USDA-ARS?s Scientific Manuscript database

    We make the case that phosphorus (P) is inextricably linked to an increasingly fragile, interconnected and interdependent ‘nexus’ of water, energy, and food security. While there are many other drivers that influence water, energy, and food security, P plays a unique and under-recognized role within...

  18. Sandia National Laboratories analysis code data base

    NASA Astrophysics Data System (ADS)

    Peterson, C. W.

    1994-11-01

    Sandia National Laboratories' mission is to solve important problems in the areas of national defense, energy security, environmental integrity, and industrial technology. The laboratories' strategy for accomplishing this mission is to conduct research to provide an understanding of the important physical phenomena underlying any problem, and then to construct validated computational models of the phenomena which can be used as tools to solve the problem. In the course of implementing this strategy, Sandia's technical staff has produced a wide variety of numerical problem-solving tools which they use regularly in the design, analysis, performance prediction, and optimization of Sandia components, systems, and manufacturing processes. This report provides the relevant technical and accessibility data on the numerical codes used at Sandia, including information on the technical competency or capability area that each code addresses, code 'ownership' and release status, and references describing the physical models and numerical implementation.

  19. Simple intrinsic defects in GaP and InP

    NASA Astrophysics Data System (ADS)

    Schultz, Peter A.

    2012-02-01

    To faithfully simulate evolution of defect chemistry and electrical response in irradiated semiconductor devices requires accurate defect reaction energies and energy levels. In III-Vs, good data is scarce, theory hampered by band gap and supercell problems. I apply density functional theory (DFT) to intrinsic defects in GaP and InP, predicting stable charge states, ground state configurations, defect energy levels, and identifying mobile species. The SeqQuest calculations incorporate rigorous charge boundary conditions removing supercell artifacts, demonstrated converged to the infinite limit. Computed defect levels are not limited by a band gap problem, despite Kohn-Sham gaps much smaller than the experimental gap. As in GaAs, [P.A. Schultz and O.A. von Lilienfeld, Modeling Simul. Mater. Sci. Eng. 17, 084007 (2009)], defects in GaP and InP exhibit great complexity---multitudes of charge states, bistabilities, and negative U systems---but show similarities to each other (and to GaAs). Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Company, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.

  20. MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain.

    PubMed

    Fan, Kai; Wang, Shangyang; Ren, Yanhui; Li, Hui; Yang, Yintang

    2018-06-21

    With the development of electronic information technology, electronic medical records (EMRs) have been a common way to store the patients' data in hospitals. They are stored in different hospitals' databases, even for the same patient. Therefore, it is difficult to construct a summarized EMR for one patient from multiple hospital databases due to the security and privacy concerns. Meanwhile, current EMRs systems lack a standard data management and sharing policy, making it difficult for pharmaceutical scientists to develop precise medicines based on data obtained under different policies. To solve the above problems, we proposed a blockchain-based information management system, MedBlock, to handle patients' information. In this scheme, the distributed ledger of MedBlock allows the efficient EMRs access and EMRs retrieval. The improved consensus mechanism achieves consensus of EMRs without large energy consumption and network congestion. In addition, MedBlock also exhibits high information security combining the customized access control protocols and symmetric cryptography. MedBlock can play an important role in the sensitive medical information sharing.

  1. Quantum Biometrics with Retinal Photon Counting

    NASA Astrophysics Data System (ADS)

    Loulakis, M.; Blatsios, G.; Vrettou, C. S.; Kominis, I. K.

    2017-10-01

    It is known that the eye's scotopic photodetectors, rhodopsin molecules, and their associated phototransduction mechanism leading to light perception, are efficient single-photon counters. We here use the photon-counting principles of human rod vision to propose a secure quantum biometric identification based on the quantum-statistical properties of retinal photon detection. The photon path along the human eye until its detection by rod cells is modeled as a filter having a specific transmission coefficient. Precisely determining its value from the photodetection statistics registered by the conscious observer is a quantum parameter estimation problem that leads to a quantum secure identification method. The probabilities for false-positive and false-negative identification of this biometric technique can readily approach 10-10 and 10-4, respectively. The security of the biometric method can be further quantified by the physics of quantum measurements. An impostor must be able to perform quantum thermometry and quantum magnetometry with energy resolution better than 10-9ℏ , in order to foil the device by noninvasively monitoring the biometric activity of a user.

  2. Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar

    NASA Astrophysics Data System (ADS)

    Botel, Gabriel

    This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive literature in human security rarely applied in this context. This includes a brief review of human security and Sino-Myanmar relations, and is grounded in an empirical analysis of Chinese investment in Myanmar's hydropower and oil and gas sectors. Ultimately, this thesis argues that, while insightful, many traditional interpretations of Sino-Myanmar energy cooperation overlook the security interests of those worst affected. Furthermore, that the worst excesses of Chinese companies in Myanmar are not unique to China, but common across all investors in the regime, Western or otherwise.

  3. Public views on multiple dimensions of security : nuclear waepons, terrorism, energy, and the environment : 2007.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.

    2008-01-01

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support formore » domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.« less

  4. Threats to US energy security: the challenge of Arab oil

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Phillips, J.

    1979-08-13

    Assured access to foreign oil supplies is a vital national interest of the United States which has been repeatedly jeopardized in the 1970s and one that will face additional critical challenges in the 1980s. This paper identifies and analyzes various threats to US energy security both in terms of their past use and future usability. Since the most ominous threat to US energy security is posed in connection with the Arab-Israeli conflict, the paper focuses on the Arab oil weapon, although the energy-security implications of the Iranian revolution are also assessed.

  5. Integrated Model-Based Decisions for Water, Energy and Food Nexus

    NASA Astrophysics Data System (ADS)

    Zhang, X.; Vesselinov, V. V.

    2015-12-01

    Energy, water and food are critical resources for sustaining social development and human lives; human beings cannot survive without any one of them. Energy crises, water shortages and food security are crucial worldwide problems. The nexus of energy, water and food has received more and more attention in the past decade. Energy, water and food are closely interrelated; water is required in energy development such as electricity generation; energy is indispensable for collecting, treating, and transporting water; both energy and water are crucial inputs for food production. Changes of either of them can lead to substantial impacts on other two resources, and vice versa. Effective decisions should be based on thorough research efforts for better understanding of their complex nexus. Rapid increase of population has significantly intensified the pressures on energy, water and food. Addressing and quantifying their interactive relationships are important for making robust and cost-effective strategies for managing the three resources simultaneously. In addition, greenhouse gases (GHGs) are emitted in energy, water, food production, consequently making contributions to growing climate change. Reflecting environmental impacts of GHGs is also desired (especially, on the quality and quantity of fresh water resources). Thus, a socio-economic model is developed in this study to quantitatively address the complex connections among energy, water and food production. A synthetic problem is proposed to demonstrate the model's applicability and feasibility. Preliminary results related to integrated decisions on energy supply management, water use planning, electricity generation planning, energy facility capacity expansion, food production, and associated GHG emission control are generated for providing cost-effective supports for decision makers.

  6. Fundamental problems in provable security and cryptography.

    PubMed

    Dent, Alexander W

    2006-12-15

    This paper examines methods for formally proving the security of cryptographic schemes. We show that, despite many years of active research and dozens of significant results, there are fundamental problems which have yet to be solved. We also present a new approach to one of the more controversial aspects of provable security, the random oracle model.

  7. The Globalization of Higher Education as a Societal and Cultural Security Problem

    ERIC Educational Resources Information Center

    Samier, Eugenie A.

    2015-01-01

    In this article, I propose a theory of the globalization of higher education as societal and cultural security problems for many regions of the world. The first section examines the field of security studies for theoretical frameworks appropriate to critiquing globalized higher education, including critical human, societal and cultural security…

  8. Children’s Attachment to Both Parents from Toddler Age to Middle Childhood: Links to Adaptive and Maladaptive Outcomes

    PubMed Central

    Boldt, Lea J.; Kochanska, Grazyna; Yoon, Jeung Eun; Nordling, Jamie Koenig

    2014-01-01

    We examined children’s attachment security with their mothers and fathers in a community sample (N = 100). At 25 months, mothers, fathers, and trained observers completed Attachment Q-Set (AQS). At 100 months, children completed Kerns Security Scale (KSS) for each parent. Children’s adaptation (behavior problems and competence in broader ecologies of school and peer group, child- and parent-reported) was assessed at 100 months. By and large, the child’s security with the mother and father was modestly to robustly concordant across both relationships, depending on the assessment method. Observers’ AQS security scores predicted children’s self-reported security 6 years later. For children with low AQS security scores with mothers, variations in security with fathers had significant implications for adaptation: Those whose security with fathers was also low reported the most behavior problems and were seen as least competent in broader ecologies, but those whose security with fathers was high reported few problems and were seen as competent. Security with fathers, observer-rated and child-reported, predicted children’s higher competence in broader ecologies. A cumulative index of the history of security from toddler age to middle childhood, integrating measures across both relationships and diverse methodologies, was significantly associated with positive adaptation at 100 months. PMID:24605850

  9. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND... National Security Information § 2.911 Admissibility of restricted data or other national security...

  10. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND... National Security Information § 2.911 Admissibility of restricted data or other national security...

  11. 10 CFR 76.111 - Physical security, material control and accounting, and protection of certain information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...

  12. 10 CFR 76.111 - Physical security, material control and accounting, and protection of certain information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...

  13. 10 CFR 76.111 - Physical security, material control and accounting, and protection of certain information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...

  14. 10 CFR 76.111 - Physical security, material control and accounting, and protection of certain information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...

  15. Load Frequency Control by use of a Number of Both Heat Pump Water Heaters and Electric Vehicles in Power System with a Large Integration of Renewable Energy Sources

    NASA Astrophysics Data System (ADS)

    Masuta, Taisuke; Shimizu, Koichiro; Yokoyama, Akihiko

    In Japan, from the viewpoints of global warming countermeasures and energy security, it is expected to establish a smart grid as a power system into which a large amount of generation from renewable energy sources such as wind power generation and photovoltaic generation can be installed. Measures for the power system stability and reliability are necessary because a large integration of these renewable energy sources causes some problems in power systems, e.g. frequency fluctuation and distribution voltage rise, and Battery Energy Storage System (BESS) is one of effective solutions to these problems. Due to a high cost of the BESS, our research group has studied an application of controllable loads such as Heat Pump Water Heater (HPWH) and Electric Vehicle (EV) to the power system control for reduction of the required capacity of BESS. This paper proposes a new coordinated Load Frequency Control (LFC) method for the conventional power plants, the BESS, the HPWHs, and the EVs. The performance of the proposed LFC method is evaluated by the numerical simulations conducted on a power system model with a large integration of wind power generation and photovoltaic generation.

  16. NREL: News - New Energy Systems Enhance National Security

    Science.gov Websites

    resources, bioenergy and bio-based products, zero energy buildings, wind energy, geothermal energy, solar Energy Systems Enhance National Security Washington D.C., March 14, 2002 Experts from the U.S . Department of Energy's National Renewable Energy Laboratory (NREL) have identified key renewable energy

  17. Software Development Life Cycle Security Issues

    NASA Astrophysics Data System (ADS)

    Kaur, Daljit; Kaur, Parminder

    2011-12-01

    Security is now-a-days one of the major problems because of many reasons. Security is now-a-days one of the major problems because of many reasons. The main cause is that software can't withstand security attacks because of vulnerabilities in it which are caused by defective specifications design and implementation. We have conducted a survey asking software developers, project managers and other people in software development about their security awareness and implementation in Software Development Life Cycle (SDLC). The survey was open to participation for three weeks and this paper explains the survey results.

  18. Urbanization, Extreme Climate Hazards and Food, Energy Water Security

    NASA Astrophysics Data System (ADS)

    Romero-Lankao, P.; Davidson, D.; McPhearson, T.

    2016-12-01

    Research is urgently needed that incorporates the interconnected nature of three critical resources supporting our cities: food, energy and water. Cities are increasing demands for food, water and energy resources that in turn stress resource supplies, creating risks of negative impacts to human and ecological wellbeing. Simultaneously, shifts in climatic conditions, including extremes such as floods, heat, and droughts, threaten the sustainable availability of adequate quantities and qualities of food, energy and water (FEW) resources needed for resilient cities and ecosystems. These resource flows cannot be treated in isolation simply because they are interconnected: shifts in food, energy or water dynamics in turn affect the others, affecting the security of the whole - i.e., FEW nexus security. We present a framework to examine the dynamic interactions of urbanization, FEW nexus security and extreme hazard risks, with two overarching research questions: Do existing and emerging actions intended to enhance a population's food, water and energy security have the capacity to ensure FEW nexus security in the face of changing climate and urban development conditions? Can we identify a common set of social, ecological and technological conditions across a diversity of urban-regions that support the emergence of innovations that can lead to structural transformations for FEW nexus security?

  19. Renewable Hydrogen-Economically Viable: Integration into the U.S. Transportation Sector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurtz, Jennifer; Peters, Mike; Muratori, Matteo

    The U.S. transportation sector is expected to meet numerous goals in differing applications. These goals address security, safety, fuel source, emissions reductions, advanced mobility models, and improvements in quality and accessibility. Solutions to meeting these goals include a variety of alternative-fuel technologies, including batteries, fuel cells, synthetic fuels, and biofuels, as well as modifying how current transportation systems are used and integrating new systems, such as storing renewable energy. Overall, there are many combinations of problems, objectives, and solutions.

  20. Science & Technology Review October/November 2015

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orme, C.; Meissner, C.; Kotta, P. A.

    At Lawrence Livermore National Laboratory, we focus on science and technology research to ensure our nation’s security. We also apply that expertise to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published eight times a year to communicate, to a broad audience, the Laboratory’s scientific and technological accomplishments in fulfilling its primary missions. The publication’s goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world.

  1. Science & Technology Review January/February 2018

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Duoss, E. B.; Meissner, C. N.; Kotta, P. R.

    At Lawrence Livermore National Laboratory, we focus on science and technology research to ensure our nation’s security. We also apply that expertise to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published eight times a year to communicate, to a broad audience, the Laboratory’s scientific and technological accomplishments in fulfilling its primary missions. The publication’s goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world.

  2. Science & Technology Review January/February 2016

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orme, C. A.; Meissner, C. N.; Kotta, P. R.

    2016-01-18

    At Lawrence Livermore National Laboratory, we focus on science and technology research to ensure our nation’s security. We also apply that expertise to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published eight times a year to communicate, to a broad audience, the Laboratory’s scientific and technological accomplishments in fulfilling its primary missions. The publication’s goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world.

  3. Science & Technology Review June 2016

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vogt, Ramona L.; Chinn, Ken B.; Kotta, Paul

    At Lawrence Livermore National Laboratory, we focus on science and technology research to ensure our nation’s security. We also apply that expertise to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published eight times a year to communicate, to a broad audience, the Laboratory’s scientific and technological accomplishments in fulfilling its primary missions. The publication’s goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world.

  4. Science & Technology Review January/February 2017

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vogt, R. L.; Meissner, C. N.; Kotta, P. R.

    At Lawrence Livermore National Laboratory, we focus on science and technology research to ensure our nation’s security. We also apply that expertise to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published eight times a year to communicate, to a broad audience, the Laboratory’s scientific and technological accomplishments in fulfilling its primary missions. The publication’s goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world.

  5. A lightweight security scheme for wireless body area networks: design, energy evaluation and proposed microprocessor design.

    PubMed

    Selimis, Georgios; Huang, Li; Massé, Fabien; Tsekoura, Ioanna; Ashouei, Maryam; Catthoor, Francky; Huisken, Jos; Stuyt, Jan; Dolmans, Guido; Penders, Julien; De Groot, Harmke

    2011-10-01

    In order for wireless body area networks to meet widespread adoption, a number of security implications must be explored to promote and maintain fundamental medical ethical principles and social expectations. As a result, integration of security functionality to sensor nodes is required. Integrating security functionality to a wireless sensor node increases the size of the stored software program in program memory, the required time that the sensor's microprocessor needs to process the data and the wireless network traffic which is exchanged among sensors. This security overhead has dominant impact on the energy dissipation which is strongly related to the lifetime of the sensor, a critical aspect in wireless sensor network (WSN) technology. Strict definition of the security functionality, complete hardware model (microprocessor and radio), WBAN topology and the structure of the medium access control (MAC) frame are required for an accurate estimation of the energy that security introduces into the WBAN. In this work, we define a lightweight security scheme for WBAN, we estimate the additional energy consumption that the security scheme introduces to WBAN based on commercial available off-the-shelf hardware components (microprocessor and radio), the network topology and the MAC frame. Furthermore, we propose a new microcontroller design in order to reduce the energy consumption of the system. Experimental results and comparisons with other works are given.

  6. Temporal and Spatial Distribution of Ecological Security in Arid Region Based on GIS: A Case Study in Xinjiang

    NASA Astrophysics Data System (ADS)

    Zhang, Q.; Song, W.; Yang, J.

    2017-12-01

    Ecological security is close related to the people's survival and development. In the context of the global warming, with the increasingly frequent human activities, ecological and environmental problems have become increasingly prominent. Ecological security has aroused widespread concern, especially in the arid region. It has an important role in national security as well as political security, military security, economic security, social security. Taken Xinjiang as the research area, which is a typical arid region in China, this study establishes an ecological safety assessment indicator system from perspective of the generic process and the formation mechanism of the ecosystem. The framework is based on natural resources dimensions, natural environment dimensions and human disturbance dimensions. Water is the restrictive factor for the development of arid region, so the water resources carrying capacity is the main natural resource of the study area. The natural environment includes SPI(standardized precipitation index), dryness index, landscape vulnerability, NDVI. Human disturbance includes urbanization rate, population density, afforestation area, per capita GDP, water-saving irrigation area, fertilizer and pesticide application, agriculture Mechanical power, energy consumption. The expert scoring method and the coefficient of variation method are used to determine the weight of each indicator, and finally a comprehensive index is constructed to evaluate the ecological security of Xinjiang, that is, the ecological security index. The results indicate that the ecological security of Xinjiang is 0.43, which is in the critical area. The ecological security of Hami, Turpan and Karamay is the lowest, and the ecological security of the Arabian and Yili is the highest. The ecological security of the south in the Xinjiang is higher than that in the north. In short, ecological environment of Xinjiang is in a sensitive period. Effective ecological protection policy will ameliorate the ecological environment, on the contrary, high-intensity human activities will make it tends to deteriorate. This research would provide scientific guidance and suggestions for the ecological environment protection and sustainable development of Xinjiang.

  7. Powering America’s Economy: Energy Innovation at the Crossroads of National Security Challenges

    DTIC Science & Technology

    2010-07-01

    the United States? • How can DOD contribute to America’s eco - nomic and national security while addressing its own energy challenges? Our findings and...recommendations follow. Findings Finding 1: America’s energy choices are inextricably linked to national and eco - nomic security. America’s...tegic environment. By taking bold leadership actions now, the nation can turn the growing energy and eco - nomic challenges into great opportunity

  8. An integrated water-energy-food-livelihoods approach for assessing environmental livelihood security

    NASA Astrophysics Data System (ADS)

    Biggs, E. M.; Duncan, J.; Boruff, B.; Bruce, E.; Neef, A.; McNeill, K.; van Ogtrop, F. F.; Haworth, B.; Duce, S.; Horsley, J.; Pauli, N.; Curnow, J.; Imanari, Y.

    2015-12-01

    Environmental livelihood security refers to the challenges of maintaining global food security and universal access to freshwater and energy to sustain livelihoods and promote inclusive economic growth, whilst sustaining key environmental systems' functionality, particularly under variable climatic regimes. Environmental security is a concept complementary to sustainable development, and considers the increased vulnerability people have to certain environmental stresses, such as climatic change. Bridging links between the core component concepts of environmental security is integral to future human security, and in an attempt to create this bridge, the nexus approach to human protection has been created, where water resource availability underpins food, water and energy security. The water-energy-food nexus has an influential role in attaining human security, yet little research has made the link between the nexus and livelihoods. In this research we provide a critical appraisal of the synergies between water-energy-food nexus framings and sustainable livelihoods approaches, both of which aim to promote sustainable development. In regions where livelihoods are dependent on environmental conditions, the concept of sustainable development is critical for ensuring future environmental and human security. Given our appraisal we go on to develop an integrated framework for assessing environmental livelihood security of multiscale and multi-level systems. This framework provides a tangible approach for assessing changes in the water-energy-food-livelihood indicators of a system. Examples of where system applications may occur are discussed for the Southeast Asia and Oceania region. Our approach will be particularly useful for policy-makers to inform evidence-based decision-making, especially in localities where climate change increases the vulnerability of impoverished communities and extenuates environmental livelihood insecurity.

  9. Energy for the new millennium.

    PubMed

    Goldemberg, J; Johansson, T B; Reddy, A K; Williams, R H

    2001-09-01

    The evolution of thinking about energy is discussed. When the authors began collaborating 20 years ago, energy was typically considered from a growth-oriented, supply-side perspective, with a focus on consumption trends and how to expand supplies to meet rising demand. They were deeply troubled by the environmental, security and equity implications of that approach. For instance, about two billion people lack access to affordable modern energy, seriously limiting their opportunities for a better life. And energy is a significant contributor to environmental problems, including indoor air pollution, urban air pollution, acidification, and global warming. The authors saw the need to evolve a different perspective in which energy is provided in ways that help solve such serious problems. They argued that energy must become an instrument for advancing sustainable development--economically viable, need-oriented, self-reliant and environmentally sound development--and that the focus should be on the end uses of energy and the services that energy provides. Energy technological options that can help meet sustainable development goals are discussed. The necessity of developing and employing innovative technological solutions is stressed. The possibilities of technological leap-frogging that could enable developing countries to avoid repeating the mistakes of the industrialized countries is illustrated with a discussion of ethanol in Brazil. The role foreign direct investment might play in bringing advanced technologies to developing countries is highlighted. Near- and long-term strategies for rural energy are discussed. Finally, policy issues are considered for evolving the energy system so that it will be consistent with and supportive of sustainable development.

  10. Data threats analysis and prevention on iOS platform

    NASA Astrophysics Data System (ADS)

    Gao, Bo; Wang, Yi; Chen, Zhou; Tang, Jiqiang

    2015-12-01

    Background: The rapid growth of mobile internet has driven the rapid popularity of smart mobiles. iOS device is chosen by more and more people for its humanity, stability and excellent industrial design, and the data security problem that followed it has gradually attracted the researchers' attention. Method & Result: This thesis focuses on the analysis of current situation of data security on iOS platform, from both security mechanism and data risk, and proposes countermeasures. Conclusion: From practical work, many problems of data security mechanism on iOS platform still exist. At present, the problem of malicious software towards iOS system has not been severe, but how to ensure the security of data on iOS platform will inevitably become one of the directions for our further study.

  11. Long-term energy security in a national scale using LEAP. Application to de-carbonization scenarios in Andorra

    NASA Astrophysics Data System (ADS)

    Travesset-Baro, Oriol; Jover, Eric; Rosas-Casals, Marti

    2016-04-01

    This paper analyses the long-term energy security in a national scale using Long-range Energy Alternatives Planning System (LEAP) modelling tool. It builds the LEAP Andorra model, which forecasts energy demand and supply for the Principality of Andorra by 2050. It has a general bottom-up structure, where energy demand is driven by the technological composition of the sectors of the economy. The technological model is combined with a top-down econometric model to take into account macroeconomic trends. The model presented in this paper provides an initial estimate of energy demand in Andorra segregated into all sectors (residential, transport, secondary, tertiary and public administration) and charts a baseline scenario based on historical trends. Additional scenarios representing different policy strategies are built to explore the country's potential energy savings and the feasibility to achieve the Intended Nationally Determined Contribution (INDC) submitted in April 2015 to UN. In this climatic agreement Andorra intends to reduce net greenhouse gas emissions (GHG) by 37% as compared to a business-as-usual scenario by 2030. In addition, current and future energy security is analysed in this paper under baseline and de-carbonization scenarios. Energy security issues are assessed in LEAP with an integrated vision, going beyond the classic perspective of security of supply, and being closer to the sustainability's integrative vision. Results of scenarios show the benefits of climate policies in terms of national energy security and the difficulties for Andorra to achieving the de-carbonization target by 2030.

  12. Prospective Relations between Family Conflict and Adolescent Maladjustment: Security in the Family System as a Mediating Process

    PubMed Central

    Cummings, E. Mark; Koss, Kalsea J.; Davies, Patrick T.

    2018-01-01

    Conflict in specific family systems (e.g., interparental, parent-child) has been implicated in the development of a host of adjustment problems in adolescence, but little is known about the impact of family conflict involving multiple family systems. Furthermore, questions remain about the effects of family conflict on symptoms of specific disorders and adjustment problems and the processes mediating these effects. The present study prospectively examines the impact of family conflict and emotional security about the family system on adolescent symptoms of specific disorders and adjustment problems, including the development of symptoms of anxiety, depression, conduct problems, and peer problems. Security in the family system was examined as a mediator of these relations. Participants included 295 mother-father-adolescent families (149 girls) participating across three annual time points (grades 7–9). Including auto-regressive controls for initial levels of emotional insecurity and multiple adjustment problems (T1), higher-order emotional insecurity about the family system (T2) mediated relations between T1 family conflict and T3 peer problems, anxiety, and depressive symptoms. Further analyses supported specific patterns of emotional security/insecurity (i.e., security, disengagement, preoccupation) as mediators between family conflict and specific domains of adolescent adjustment. Family conflict was thus found to prospectively predict the development of symptoms of multiple specific adjustment problems, including symptoms of depression, anxiety, conduct problems, and peer problems, by elevating in in adolescent’s emotional insecurity about the family system. The clinical implications of these findings are considered. PMID:25131144

  13. Automated Information Security Will Not Improve until Effectively Supported by IRM.

    ERIC Educational Resources Information Center

    Chick, Morey J.

    1989-01-01

    The first of two articles on the nature of the growing problem of automated information systems security, especially in the federal government, this article presents a brief history of the problem and describes the need for integrating security activities into overall policies and programs to help reduce system vulnerabilities and risks. (23…

  14. 75 FR 63867 - DTE Energy; Enrico Fermi Atomic Power Plant Unit 1, Exemption From Certain Security Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-18

    ... procedures, physical security plan, guard training and qualification plan, or cyber security plan for the... Power Plant Unit 1, Exemption From Certain Security Requirements 1.0 Background DTE Energy (DTE) is the... atmospheric pressure. In November 1972, the Power Reactor Development Company (PRDC), the licensee at that...

  15. 75 FR 36128 - Green Energy Resources, Inc.; Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-24

    ... Suspension of Trading June 22, 2010. It appears to the Securities and Exchange Commission that there is a... a suspension of trading in the securities of Green Energy. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in the securities of the above-listed...

  16. Energy and National Security

    ERIC Educational Resources Information Center

    Abelson, Philip H.

    1973-01-01

    Discussed in this editorial is the need for a broad and detailed government policy on energy use. Oil companies can not be given complete responsibility to demonstrate usage of different energy sources. The government should construct plants because energy is connected with national security. (PS)

  17. 76 FR 37343 - Proposed Subsequent Arrangement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-27

    ... International Security, National Nuclear Security Administration, Department of Energy. ACTION: Proposed... arrangement under the Agreement for Cooperation Concerning Civil Uses of Nuclear Energy Between the Government... Peaceful Uses of Nuclear Energy Between the United States of America and the European Atomic Energy...

  18. Ensuring the Reliable Operation of the Power Grid: State-Based and Distributed Approaches to Scheduling Energy and Contingency Reserves

    NASA Astrophysics Data System (ADS)

    Prada, Jose Fernando

    Keeping a contingency reserve in power systems is necessary to preserve the security of real-time operations. This work studies two different approaches to the optimal allocation of energy and reserves in the day-ahead generation scheduling process. Part I presents a stochastic security-constrained unit commitment model to co-optimize energy and the locational reserves required to respond to a set of uncertain generation contingencies, using a novel state-based formulation. The model is applied in an offer-based electricity market to allocate contingency reserves throughout the power grid, in order to comply with the N-1 security criterion under transmission congestion. The objective is to minimize expected dispatch and reserve costs, together with post contingency corrective redispatch costs, modeling the probability of generation failure and associated post contingency states. The characteristics of the scheduling problem are exploited to formulate a computationally efficient method, consistent with established operational practices. We simulated the distribution of locational contingency reserves on the IEEE RTS96 system and compared the results with the conventional deterministic method. We found that assigning locational spinning reserves can guarantee an N-1 secure dispatch accounting for transmission congestion at a reasonable extra cost. The simulations also showed little value of allocating downward reserves but sizable operating savings from co-optimizing locational nonspinning reserves. Overall, the results indicate the computational tractability of the proposed method. Part II presents a distributed generation scheduling model to optimally allocate energy and spinning reserves among competing generators in a day-ahead market. The model is based on the coordination between individual generators and a market entity. The proposed method uses forecasting, augmented pricing and locational signals to induce efficient commitment of generators based on firm posted prices. It is price-based but does not rely on multiple iterations, minimizes information exchange and simplifies the market clearing process. Simulations of the distributed method performed on a six-bus test system showed that, using an appropriate set of prices, it is possible to emulate the results of a conventional centralized solution, without need of providing make-whole payments to generators. Likewise, they showed that the distributed method can accommodate transactions with different products and complex security constraints.

  19. Food security, selection, and healthy eating in a Pacific Community in Auckland New Zealand.

    PubMed

    Rush, Elaine; Puniani, Naita; Snowling, Neil; Paterson, Janis

    2007-01-01

    When an infant is brought home to the family, it is often a time of emotional, economic and physical stress due to the extra demands placed on parents. Household food security means "access at all times to enough and nutritionally appropriate food to provide the energy and nutrients needed to maintain an active and healthy life". Questions about food security were asked of 1376 Pacific Island mothers (as part of the Pacific Island Family Study) approximately six weeks after the birth of their baby. Due to lack of money food sometimes ran out in 39.8% of households and in a further 3.8% food often ran out. Variety of foods was limited by lack of money in 39.3%. Foods that were still bought when money was limited included bread (97%), milk (95%), meat and chicken (91%), vegetables and fruit (83%), rice or pasta (82%), breakfast cereals (69%), fish or shellfish (50%) and biscuits or chips (44%). Alcohol (1%), soft drinks (11%), ice cream (12%) and fruit juice (21%) were the least often bought. Energy density (MJ/kg) and nutrient-density of typical foods limited by lack of money were analysed. Rice, bread and fatty meats provided the most calories per dollar and fruit and vegetables the least. The best protein-value for money was from minced beef, chicken and tinned tuna and the most fibre-rich foods included baked beans and mixed vegetables. Food security is a major problem for Pacific families. The environment of food availability, choice and cost requires attention to help close the health gap.

  20. Security in Father-child Relationship and Behavior Problems in Sexually Abused Children.

    PubMed

    Parent-Boursier, Claudel; Hébert, Martine

    2015-01-01

    While the influence of mother-child relationships on children's recovery following sexual abuse has been documented, less is known about the possible contribution of father-child relationships on outcomes. The present study explored the contribution of children's perception of security in their relationship to the father on internalizing and externalizing behavior problems, while controlling for sociodemographic variables and variables associated with the mother-child relationship. Participants were 142 children who disclosed sexual abuse involving a perpetrator other than the biological father. Regression analyses indicated that children's perception of security to fathers contributed to the prediction of parental reports of children's behavior problems, even after controlling for maternal psychological distress and perception of security to mothers.

  1. Application of Multipurpose Cadastre to Evaluate Energy Security of Land Parcel (Case Study: Gedung A and Gedung B, Institut Teknologi Sumatra)

    NASA Astrophysics Data System (ADS)

    Alif, S. M.; Nugroho, A. P.; Leksono, B. E.

    2018-03-01

    Energy security has one of its dimensions: Short-term energy security which focuses on the ability of the energy system to react promptly to sudden changes within the supply-demand balance. Non-energy components (such as land parcel) that comprise an energy system are analysed comprehensively with other component to measure energy security related to energy supply. Multipurpose cadastre which is an integrated land information system containing legal, physical, and cultural is used to evaluate energy (electrical energy) security of land parcel. The fundamental component of multipurpose cadastre used to evaluate energy security is attribute data which is the value of land parcel facilities. Other fundamental components (geographic control data, base map data, cadastral data) are used as position information and provide weight in room (part of land parcel) valuation. High value-room means the room is comfortable and/or used productively by its occupant. The method of valuation is by comparing one facility to other facilities. Facilities included in room valuation are relatively static items (such as chair, desk, and cabinet) except lamps and other electronic devices. The room value and number of electronic devices which consume electrical energy are correlated with each other. Consumption of electrical energy of electronic devices in the room with average value remains constant while consumption in other room needs to be evaluated to save the energy. The result of this research shows that room value correlate weakly with number of electronic device in corresponding room. It shows excess energy consumed in low-value room. Although numbers of electronic devices do not always mean the consumption of electrical energy and there are plenty electronic devices, it is recommended for occupant to be careful in utilizing electronic devices in low-value room to minimize energy consumption.

  2. Energy Security Strategies: An Analysis of Tanzania and Mozambique

    DTIC Science & Technology

    2016-06-01

    prioritizes domestic consumption or export of energy resources. The strategy a government chooses affects the overall energy security of that country...This thesis seeks to explain why countries pursue energy strategies that focus on domestic consumption of indigenous energy resources instead of...energy strategy that either prioritizes domestic consumption or export of energy resources. The strategy a government chooses affects the overall

  3. Integrated modeling approach for optimal management of water, energy and food security nexus

    NASA Astrophysics Data System (ADS)

    Zhang, Xiaodong; Vesselinov, Velimir V.

    2017-03-01

    Water, energy and food (WEF) are inextricably interrelated. Effective planning and management of limited WEF resources to meet current and future socioeconomic demands for sustainable development is challenging. WEF production/delivery may also produce environmental impacts; as a result, green-house-gas emission control will impact WEF nexus management as well. Nexus management for WEF security necessitates integrated tools for predictive analysis that are capable of identifying the tradeoffs among various sectors, generating cost-effective planning and management strategies and policies. To address these needs, we have developed an integrated model analysis framework and tool called WEFO. WEFO provides a multi-period socioeconomic model for predicting how to satisfy WEF demands based on model inputs representing productions costs, socioeconomic demands, and environmental controls. WEFO is applied to quantitatively analyze the interrelationships and trade-offs among system components including energy supply, electricity generation, water supply-demand, food production as well as mitigation of environmental impacts. WEFO is demonstrated to solve a hypothetical nexus management problem consistent with real-world management scenarios. Model parameters are analyzed using global sensitivity analysis and their effects on total system cost are quantified. The obtained results demonstrate how these types of analyses can be helpful for decision-makers and stakeholders to make cost-effective decisions for optimal WEF management.

  4. Global renewable energy-based electricity generation and smart grid system for energy security.

    PubMed

    Islam, M A; Hasanuzzaman, M; Rahim, N A; Nahar, A; Hosenuzzaman, M

    2014-01-01

    Energy is an indispensable factor for the economic growth and development of a country. Energy consumption is rapidly increasing worldwide. To fulfill this energy demand, alternative energy sources and efficient utilization are being explored. Various sources of renewable energy and their efficient utilization are comprehensively reviewed and presented in this paper. Also the trend in research and development for the technological advancement of energy utilization and smart grid system for future energy security is presented. Results show that renewable energy resources are becoming more prevalent as more electricity generation becomes necessary and could provide half of the total energy demands by 2050. To satisfy the future energy demand, the smart grid system can be used as an efficient system for energy security. The smart grid also delivers significant environmental benefits by conservation and renewable generation integration.

  5. Global Renewable Energy-Based Electricity Generation and Smart Grid System for Energy Security

    PubMed Central

    Islam, M. A.; Hasanuzzaman, M.; Rahim, N. A.; Nahar, A.; Hosenuzzaman, M.

    2014-01-01

    Energy is an indispensable factor for the economic growth and development of a country. Energy consumption is rapidly increasing worldwide. To fulfill this energy demand, alternative energy sources and efficient utilization are being explored. Various sources of renewable energy and their efficient utilization are comprehensively reviewed and presented in this paper. Also the trend in research and development for the technological advancement of energy utilization and smart grid system for future energy security is presented. Results show that renewable energy resources are becoming more prevalent as more electricity generation becomes necessary and could provide half of the total energy demands by 2050. To satisfy the future energy demand, the smart grid system can be used as an efficient system for energy security. The smart grid also delivers significant environmental benefits by conservation and renewable generation integration. PMID:25243201

  6. Mobile code security

    NASA Astrophysics Data System (ADS)

    Ramalingam, Srikumar

    2001-11-01

    A highly secure mobile agent system is very important for a mobile computing environment. The security issues in mobile agent system comprise protecting mobile hosts from malicious agents, protecting agents from other malicious agents, protecting hosts from other malicious hosts and protecting agents from malicious hosts. Using traditional security mechanisms the first three security problems can be solved. Apart from using trusted hardware, very few approaches exist to protect mobile code from malicious hosts. Some of the approaches to solve this problem are the use of trusted computing, computing with encrypted function, steganography, cryptographic traces, Seal Calculas, etc. This paper focuses on the simulation of some of these existing techniques in the designed mobile language. Some new approaches to solve malicious network problem and agent tampering problem are developed using public key encryption system and steganographic concepts. The approaches are based on encrypting and hiding the partial solutions of the mobile agents. The partial results are stored and the address of the storage is destroyed as the agent moves from one host to another host. This allows only the originator to make use of the partial results. Through these approaches some of the existing problems are solved.

  7. OPSAID Initial Design and Testing Report.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hurd, Steven A.; Stamp, Jason Edwin; Chavez, Adrian R.

    2007-11-01

    Process Control System (PCS) security is critical to our national security. Yet, there are a number of technological, economic, and educational impediments to PCS owners implementing effective security on their systems. OPSAID (Open PCS Security Architecture for Interoperable Design), a project sponsored by the US Department of Energy's Office of Electricity Delivery and Reliability, aims to address this issue through developing and testing an open source architecture for PCS security. Sandia National Laboratories, along with a team of PCS vendors and owners, have developed and tested this PCS security architecture. This report describes their progress to date.2 AcknowledgementsThe authors acknowledgemore » and thank their colleagues for their assistance with the OPSAID project.Sandia National Laboratories: Alex Berry, Charles Perine, Regis Cassidy, Bryan Richardson, Laurence PhillipsTeumim Technical, LLC: Dave TeumimIn addition, the authors are greatly indebted to the invaluable help of the members of the OPSAID Core Team. Their assistance has been critical to the success and industry acceptance of the OPSAID project.Schweitzer Engineering Laboratory: Rhett Smith, Ryan Bradetich, Dennis GammelTelTone: Ori Artman Entergy: Dave Norton, Leonard Chamberlin, Mark AllenThe authors would like to acknowledge that the work that produced the results presented in this paper was funded by the U.S. Department of Energy/Office of Electricity Delivery and Energy Reliability (DOE/OE) as part of the National SCADA Test Bed (NSTB) Program. Executive SummaryProcess control systems (PCS) are very important for critical infrastructure and manufacturing operations, yet cyber security technology in PCS is generally poor. The OPSAID (Open PCS (Process Control System) Security Architecture for Interoperable Design) program is intended to address these security shortcomings by accelerating the availability and deployment of comprehensive security technology for PCS, both for existing PCS and inherently secure PCS in the future. All activities are closely linked to industry outreach and advisory efforts.Generally speaking, the OPSAID project is focused on providing comprehensive security functionality to PCS that communicate using IP. This is done through creating an interoperable PCS security architecture and developing a reference implementation, which is tested extensively for performance and reliability.This report first provides background on the PCS security problem and OPSAID, followed by goals and objectives of the project. The report also includes an overview of the results, including the OPSAID architecture and testing activities, along with results from industry outreach activities. Conclusion and recommendation sections follow. Finally, a series of appendices provide more detailed information regarding architecture and testing activities.Summarizing the project results, the OPSAID architecture was defined, which includes modular security functionality and corresponding component modules. The reference implementation, which includes the collection of component modules, was tested extensively and proved to provide more than acceptable performance in a variety of test scenarios. The primary challenge in implementation and testing was correcting initial configuration errors.OPSAID industry outreach efforts were very successful. A small group of industry partners were extensively involved in both the design and testing of OPSAID. Conference presentations resulted in creating a larger group of potential industry partners.Based upon experience implementing and testing OPSAID, as well as through collecting industry feedback, the OPSAID project has done well and is well received. Recommendations for future work include further development of advanced functionality, refinement of interoperability guidance, additional laboratory and field testing, and industry outreach that includes PCS owner education. 4 5 --This page intentionally left blank --« less

  8. 78 FR 57922 - American Energy Production, Inc., Best Energy Services, Inc., Community Central Bank Corporation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-20

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] American Energy Production, Inc., Best Energy Services, Inc., Community Central Bank Corporation, Explortex Energy, Inc., HemoBioTech, Inc., Larrea... securities of HemoBioTech, Inc. because it has not filed any periodic reports since the period ended December...

  9. When trust defies common security sense.

    PubMed

    Williams, Patricia A H

    2008-09-01

    Primary care medical practices fail to recognize the seriousness of security threats to their patient and practice information. This can be attributed to a lack of understanding of security concepts, underestimation of potential threats and the difficulty in configuration of security technology countermeasures. To appreciate the factors contributing to such problems, research into general practitioner security practice and perceptions of security was undertaken. The investigation focused on demographics, actual practice, issues and barriers, and practitioner perception. Poor implementation, lack of relevant knowledge and inconsistencies between principles and practice were identified as key themes. Also the results revealed an overwhelming reliance on trust in staff and in computer information systems. This clearly identified that both cultural and technical attributes contribute to the deficiencies in information security practice. The aim of this research is to understand user needs and problems when dealing with information security practice.

  10. Sandia National Laboratories: National Security Programs

    Science.gov Websites

    policy. Topics About Nuclear Weapons Safety & Security Science & Technology Defense Systems & science and technology to help defend and protect the United States. Topics About Defense Systems & . Topics Stationary Power Earth Science Transportation Energy Energy Research Global Security Birc We

  11. 10 CFR 1015.210 - Liquidation of collateral.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... States. Collection from other sources, including liquidation of security or collateral, is not a... Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) COLLECTION OF CLAIMS OWED THE UNITED STATES Standards... liquidate security or collateral through the exercise of a power of sale in the security instrument or a...

  12. New Generation of Los Alamos Opacity Tables

    NASA Astrophysics Data System (ADS)

    Colgan, James; Kilcrease, D. P.; Magee, N. H.; Sherrill, M. E.; Abdallah, J.; Hakel, P.; Fontes, C. J.; Guzik, J. A.; Mussack, K. A.

    2016-05-01

    We present a new generation of Los Alamos OPLIB opacity tables that have been computed using the ATOMIC code. Our tables have been calculated for all 30 elements from hydrogen through zinc and are publicly available through our website. In this poster we discuss the details of the calculations that underpin the new opacity tables. We also show several recent applications of the use of our opacity tables to solar modeling and other astrophysical applications. In particular, we demonstrate that use of the new opacities improves the agreement between solar models and helioseismology, but does not fully resolve the long-standing `solar abundance' problem. The Los Alamos National Laboratory is operated by Los Alamos National Security, LLC for the National Nuclear Security Administration of the U.S. Department of Energy under Contract No. DE-AC5206NA25396.

  13. 3 CFR - Blue Ribbon Commission on America's Nuclear Future

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... America's Nuclear Future Memorandum for the Secretary of Energy Expanding our Nation's capacity to generate clean nuclear energy is crucial to our ability to combat climate change, enhance energy security... safe, secure, and responsible use of nuclear energy. These efforts are critical to accomplishing many...

  14. [The relationship between a sense of security and psychological problems in adolescents living in boarding schools and youth-welfare institutions].

    PubMed

    Seidler, Corinna; Rau, Thea; Allroggen, Marc

    2018-05-01

    The willingness to participate and a sense of security are important aspects to be fostered in the institutional care of adolescents. Although these aspects are increasingly being examined from the perspective of the affected adolescents, it has yet to be considered whether psychological problems can be attributed to their experiences with the above-mentioned aspects. A total of 216 adolescents aged 14 to 18 years answered an online questionnaire the sense of security in their institution and their perception of the institution. Their willingness to participate was also examined. Psychological symptoms were assessed with the Strengths and Difficulties Questionnaire Self-Report (SDQ-S). There is a significant correlation between sense of security and the overall SDQ score, with prosocial behavior, and with the positive perception of the institution. In addition, sense of security had a significant influence on the SDQ factors, the positive perception of the institution, and the items on the willingness to participate of the adolescents. The subsequent t-tests also showed significant results. Among other things, it was shown that the factor problems of adolescents is related to sense of security. The results provide an initial indication that there is a link between sense of security and psychological symptoms as well as willingness to participate and perception of the institution. Especially problems of adolescents in dealing with peers must be taken into account.in the development of protective concepts to increase the sense of security and their willingness to participate.

  15. Relevance of Clean Coal Technology for India’s Energy Security: A Policy Perspective

    NASA Astrophysics Data System (ADS)

    Garg, Amit; Tiwari, Vineet; Vishwanathan, Saritha

    2017-07-01

    Climate change mitigation regimes are expected to impose constraints on the future use of fossil fuels in order to reduce greenhouse gas (GHG) emissions. In 2015, 41% of total final energy consumption and 64% of power generation in India came from coal. Although almost a sixth of the total coal based thermal power generation is now super critical pulverized coal technology, the average CO2 emissions from the Indian power sector are 0.82 kg-CO2/kWh, mainly driven by coal. India has large domestic coal reserves which give it adequate energy security. There is a need to find options that allow the continued use of coal while considering the need for GHG mitigation. This paper explores options of linking GHG emission mitigation and energy security from 2000 to 2050 using the AIM/Enduse model under Business-as-Usual scenario. Our simulation analysis suggests that advanced clean coal technologies options could provide promising solutions for reducing CO2 emissions by improving energy efficiencies. This paper concludes that integrating climate change security and energy security for India is possible with a large scale deployment of advanced coal combustion technologies in Indian energy systems along with other measures.

  16. Assessing security technology's impact: old tools for new problems.

    PubMed

    Kreissl, Reinhard

    2014-09-01

    The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for the use of surveillance technologies. These distinctions developed in the physical world and are rooted in a cultural understanding of pre-digital culture. Attempts to capture the problems emerging with the implementation of security technologies using legal reasoning encounter a number of problems since law is by definition oriented backwards, adapting new developments to existing traditions, whereas the intrusion of new technologies in the physical world produces changes and creates fundamentally new problems.

  17. Energy Security is National Security

    DTIC Science & Technology

    2011-03-11

    made to resur~ect Cantrell in early 2000 with some success. A newer technique using nitrogen injection was used on the mammoth field. For four years...related to economic survival. Addiction to fossil f-uels enslaves foreign policy, ensures trade deficits and destroys the · enviro ~ent. Energy security

  18. 10 CFR 39.31 - Labels, security, and transportation precautions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...

  19. 10 CFR 39.31 - Labels, security, and transportation precautions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...

  20. 10 CFR 39.31 - Labels, security, and transportation precautions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...

  1. Security in Father-child Relationship and Behavior Problems in Sexually Abused Children

    PubMed Central

    Parent-Boursier, Claudel; Hébert, Martine

    2017-01-01

    While the influence of mother-child relationships on children’s recovery following sexual abuse has been documented, less is known about the possible contribution of father-child relationships on outcomes. The present study explored the contribution of children’s perception of security in their relationship to the father on internalizing and externalizing behavior problems, while controlling for sociodemographic variables and variables associated with the mother-child relationship. Participants were 142 children who disclosed sexual abuse involving a perpetrator other than the biological father. Regression analyses indicated that children’s perception of security to fathers contributed to the prediction of parental reports of children’s behavior problems, even after controlling for maternal psychological distress and perception of security to mothers. PMID:29321696

  2. Integrating security in multiple, remote, and diverse facilities: how major health systems are meeting today's and tomorrow's technological and organizational challenges.

    PubMed

    1996-11-01

    As the trend to mergers and diversification of healthcare facilities grows, so too does the challenge to security directors to effectively and efficiently protect not only acute care, emergency, and outpatient facilities, but physician office buildings, parking garages, long-term-care units, medical schools, technical service units, and even health clubs. Besides the different security and communications problems posed by each type of facility, the problem of distance between facilities and their geographic location must also be met. In this report, we'll update you on the approaches being taken by security and planning executives at three leading health systems and how they are dealing with current and future problems.

  3. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Johnson, Terry Alan; Hogan, Roy E., Jr.; McDaniel, Anthony H.

    Two of the most daunting problems facing humankind in the twenty-first century are energy security and climate change. This report summarizes work accomplished towards addressing these problems through the execution of a Grand Challenge LDRD project (FY09-11). The vision of Sunshine to Petrol is captured in one deceptively simple chemical equation: Solar Energy + xCO{sub 2} + (x+1)H{sub 2}O {yields} C{sub x}H{sub 2x+2}(liquid fuel) + (1.5x+.5)O{sub 2} Practical implementation of this equation may seem far-fetched, since it effectively describes the use of solar energy to reverse combustion. However, it is also representative of the photosynthetic processes responsible for much ofmore » life on earth and, as such, summarizes the biomass approach to fuels production. It is our contention that an alternative approach, one that is not limited by efficiency of photosynthesis and more directly leads to a liquid fuel, is desirable. The development of a process that efficiently, cost effectively, and sustainably reenergizes thermodynamically spent feedstocks to create reactive fuel intermediates would be an unparalleled achievement and is the key challenge that must be surmounted to solve the intertwined problems of accelerating energy demand and climate change. We proposed that the direct thermochemical conversion of CO{sub 2} and H{sub 2}O to CO and H{sub 2}, which are the universal building blocks for synthetic fuels, serve as the basis for this revolutionary process. To realize this concept, we addressed complex chemical, materials science, and engineering problems associated with thermochemical heat engines and the crucial metal-oxide working-materials deployed therein. By project's end, we had demonstrated solar-driven conversion of CO{sub 2} to CO, a key energetic synthetic fuel intermediate, at 1.7% efficiency.« less

  4. 78 FR 31997 - Greatmat Technology Corp., Kentucky USA Energy, Inc., Solar Energy Ltd., and Visiphor Corp...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-28

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Greatmat Technology Corp., Kentucky USA Energy, Inc., Solar Energy Ltd., and Visiphor Corp., Order of Suspension of Trading May 23, 2013. It appears... concerning the securities of Solar Energy Ltd. because it has not filed any periodic reports since the period...

  5. 76 FR 30326 - Proposed Subsequent Arrangement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-25

    ... International Security, National Nuclear Security Administration, Department of Energy. ACTION: Proposed... United States of America and the Government of Japan Concerning Peaceful Uses of Nuclear Energy. DATES... Energy. Anne M. Harrington, Deputy Administrator, Defense Nuclear Nonproliferation. [FR Doc. 2011-12919...

  6. Transportation Energy Security and Climate Change Mitigation Act of 2007

    DOT National Transportation Integrated Search

    2008-09-29

    The Committee on Transportation and Infrastructure, to whom was referred the bill (H.R. 2701) to strengthen our Nations energy security and mitigate the effects of climate change by promoting energy efficient transportation and public buildings, c...

  7. Personal health record systems and their security protection.

    PubMed

    Win, Khin Than; Susilo, Willy; Mu, Yi

    2006-08-01

    The objective of this study is to analyze the security protection of personal health record systems. To achieve this we have investigated different personal health record systems, their security functions, and security issues. We have noted that current security mechanisms are not adequate and we have proposed some security mechanisms to tackle these problems.

  8. Data-Aware Retrodiction for Asynchronous Harmonic Measurement in a Cyber-Physical Energy System.

    PubMed

    Liu, Youda; Wang, Xue; Liu, Yanchi; Cui, Sujin

    2016-08-18

    Cyber-physical energy systems provide a networked solution for safety, reliability and efficiency problems in smart grids. On the demand side, the secure and trustworthy energy supply requires real-time supervising and online power quality assessing. Harmonics measurement is necessary in power quality evaluation. However, under the large-scale distributed metering architecture, harmonic measurement faces the out-of-sequence measurement (OOSM) problem, which is the result of latencies in sensing or the communication process and brings deviations in data fusion. This paper depicts a distributed measurement network for large-scale asynchronous harmonic analysis and exploits a nonlinear autoregressive model with exogenous inputs (NARX) network to reorder the out-of-sequence measuring data. The NARX network gets the characteristics of the electrical harmonics from practical data rather than the kinematic equations. Thus, the data-aware network approximates the behavior of the practical electrical parameter with real-time data and improves the retrodiction accuracy. Theoretical analysis demonstrates that the data-aware method maintains a reasonable consumption of computing resources. Experiments on a practical testbed of a cyber-physical system are implemented, and harmonic measurement and analysis accuracy are adopted to evaluate the measuring mechanism under a distributed metering network. Results demonstrate an improvement of the harmonics analysis precision and validate the asynchronous measuring method in cyber-physical energy systems.

  9. Advanced Micro Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy Security, and Power Quality at DoD Installations

    DTIC Science & Technology

    2016-10-28

    assumptions. List of Assumptions: Price of electrical energy : $0.07/kWh flat rate for energy at the base Price of peak power: $15/MW peak power...EW-201147) Advanced Micro-Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy Security, and...12-C-0002 5b. GRANT NUMBER Advanced Micro-Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy

  10. 10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...

  11. 10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...

  12. 10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...

  13. 10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...

  14. 10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...

  15. 10 CFR 76.111 - Physical security, material control and accounting, and protection of certain information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... significance (Category III), and for protection of Restricted Data, National Security Information, Safeguards... 10 Energy 2 2010-01-01 2010-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED...

  16. Model-Based Detection of Radioactive Contraband for Harbor Defense Incorporating Compton Scattering Physics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Candy, J V; Chambers, D H; Breitfeller, E F

    2010-03-02

    The detection of radioactive contraband is a critical problem is maintaining national security for any country. Photon emissions from threat materials challenge both detection and measurement technologies especially when concealed by various types of shielding complicating the transport physics significantly. This problem becomes especially important when ships are intercepted by U.S. Coast Guard harbor patrols searching for contraband. The development of a sequential model-based processor that captures both the underlying transport physics of gamma-ray emissions including Compton scattering and the measurement of photon energies offers a physics-based approach to attack this challenging problem. The inclusion of a basic radionuclide representationmore » of absorbed/scattered photons at a given energy along with interarrival times is used to extract the physics information available from the noisy measurements portable radiation detection systems used to interdict contraband. It is shown that this physics representation can incorporated scattering physics leading to an 'extended' model-based structure that can be used to develop an effective sequential detection technique. The resulting model-based processor is shown to perform quite well based on data obtained from a controlled experiment.« less

  17. Intelligent Facial Recognition Systems: Technology advancements for security applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Beer, C.L.

    1993-07-01

    Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g.,more » fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.« less

  18. Network Security Risk Assessment System Based on Attack Graph and Markov Chain

    NASA Astrophysics Data System (ADS)

    Sun, Fuxiong; Pi, Juntao; Lv, Jin; Cao, Tian

    2017-10-01

    Network security risk assessment technology can be found in advance of the network problems and related vulnerabilities, it has become an important means to solve the problem of network security. Based on attack graph and Markov chain, this paper provides a Network Security Risk Assessment Model (NSRAM). Based on the network infiltration tests, NSRAM generates the attack graph by the breadth traversal algorithm. Combines with the international standard CVSS, the attack probability of atomic nodes are counted, and then the attack transition probabilities of ones are calculated by Markov chain. NSRAM selects the optimal attack path after comprehensive measurement to assessment network security risk. The simulation results show that NSRAM can reflect the actual situation of network security objectively.

  19. Guidelines for Network Security in the Learning Environment.

    ERIC Educational Resources Information Center

    Littman, Marlyn Kemper

    1996-01-01

    Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)

  20. A study of the security technology and a new security model for WiFi network

    NASA Astrophysics Data System (ADS)

    Huang, Jing

    2013-07-01

    The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.

  1. Cyber Security Audit and Attack Detection Toolkit

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  2. Establishing a Conceptual Foundation for Addressing Challenges Facing Food-Energy-Water Management

    NASA Astrophysics Data System (ADS)

    Goldsby, M.; Padowski, J.; Katz, S.; Brady, M.; Hampton, S. E.

    2017-12-01

    Ensuring the security of food, energy and water in the face of a changing environment is a top societal priority. In order to make sound policy decisions aimed at meeting those needs, policy-makers need decision-relevant information. As such, considerable effort and resources have recently been devoted to investigating the Food-Energy-Water (FEW) Nexus in order to better provide that information. However, despite the increased research activity into FEW systems and FEW problems, little attention has been devoted to the fundamental conceptual issues underlying contemporary FEW systems. Consequently, this inattention has led to conceptual confusion about what is and what is not a FEW system. This project aims to fill that lacuna in order to better facilitate the FEW research agenda. Toward that end, we identify three features that distinguish FEW problems from other resource management problems: (1) the production and management of the resources in each sector of a FEW system is specialized to its own sector; (2) interdependencies exist between sectors such that overproduction in one sector, for example, may have impacts on other sectors; and (3) there are real limits to FEW resource availability as well as limits on the ability to transact across sector boundaries. We contend that once armed with this distinction, one can model the stocks and flows of FEW capital in a conceptually rigorous way that may lead to operational innovations of FEW management.

  3. Strategic Response to Energy-Related Security Threats in the US Department of Defense

    DTIC Science & Technology

    2014-10-15

    generation in the United States are fossil fuels . These include coal, natural gas, and oil . In some cases solar, wind, geothermal, and hydroelectric...and findings. The research addressed engagement on climate change and energy security issues by DoD across various tiers and sectors of the...on climate change and energy security issues by DoD across various tiers and sectors of the organization. Specifically, a tripartite analysis

  4. Cooperative monitoring and its role in regional security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Biringer, K.; Olsen, J.; Lincoln, R.

    1997-03-01

    Cooperative monitoring systems can play an important part in promoting the implementation of regional cooperative security agreements. These agreements advance the national security interests of the United States in a post Cold War environment. Regional issues as widely varying as nuclear nonproliferation, trade and environmental pollution can be the source of tensions which may escalate to armed conflict which could have global implications. The Office of National Security Policy Analysis at the US Department of Energy (DOE) has an interest in seeking ways to promote regional cooperation that can reduce the threats posed by regional conflict. DOE technologies and technicalmore » expertise can contribute to developing solutions to a wide variety of these international problems. Much of this DOE expertise has been developed in support of the US nuclear weapons and arms control missions. It is now being made available to other agencies and foreign governments in their search for regional security and cooperation. This report presents two examples of interest to DOE in which monitoring technologies could be employed to promote cooperation through experimentation. The two scenarios include nuclear transparency in Northeast Asia and environmental restoration in the Black Sea. Both offer the potential for the use of technology to promote regional cooperation. The issues associated with both of these monitoring applications are presented along with examples of appropriate monitoring technologies, potential experiments and potential DOE contributions to the scenarios.« less

  5. Science and Technology Review April/May 2011

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nikolic, R J

    2011-03-03

    At Lawrence Livermore National Laboratory, the focus is on science and technology research to ensure the nation's security. That expertise is also applied to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published eight time a year to communicate, to a broad audience, the Laboratory's scientific and technological accomplishments in fulfilling its primary missions. The publication's goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world. In this issue for April/May 2011, the features are 'Dealing with the Nonlinear Battlefield' andmore » 'From Video to Knowledge.' Research highlights are 'Kinetic Models Predict Biofuel Efficiency,' Going Deep with MEGa-Rays' and 'Energy on Demand.'« less

  6. Sustainable Development and Energy Geotechnology Potential Roles for Geotechnical Engineering

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    FragaszyProgram Dire, Dr. R. J.; Santamarina, Carlos; Espinoza, N.

    2011-01-01

    The world is facing unprecedented challenges related to energy resources, global climate change, material use, and waste generation. Failure to address these challenges will inhibit the growth of the developing world and will negatively impact the standard of living and security of future generations in all nations. The solutions to these challenges will require multidisciplinary research across the social and physical sciences and engineering. Although perhaps not always recognized, geotechnical engineering expertise is critical to the solution of many energy and sustainability-related problems. Hence, geotechnical engineers and academicians have opportunity and responsibility to contribute to the solution of these worldwidemore » problems. Research will need to be extended to non-standard issues such as thermal properties of soils; sediment and rock response to extreme conditions and at very long time scales; coupled hydro-chemo-thermo-bio-mechanical processes; positive feedback systems; the development of discontinuities; biological modification of soil properties; spatial variability; and emergent phenomena. Clearly, the challenges facing geotechnical engineering in the future will require a much broader knowledge base than our traditional educational programs provide. The geotechnical engineering curricula, from undergraduate education through continuing professional education, must address the changing needs of a profession that will increasingly be engaged in alternative/renewable energy production; energy efficiency; sustainable design, enhanced and more efficient use of natural resources, waste management, and underground utilization.« less

  7. 78 FR 40131 - Proposed Subsequent Arrangement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-03

    ... Concerning Peaceful Uses of Nuclear Energy and the Agreement Between the Government of the United States of America and Australia Concerning Peaceful Uses of Nuclear Energy. DATES: This subsequent arrangement will... Nonproliferation and International Security, National Nuclear Security Administration, Department of Energy...

  8. 77 FR 35366 - Proposed Subsequent Arrangement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-13

    ... Uses of Nuclear Energy and the Agreement for Cooperation Between the United States of America and the Republic of Kazakhstan Concerning Peaceful Uses of Nuclear Energy. DATES: This subsequent arrangement will... Nonproliferation and International Security, National Nuclear Security Administration, Department of Energy...

  9. Quantum solution to a class of two-party private summation problems

    NASA Astrophysics Data System (ADS)

    Shi, Run-Hua; Zhang, Shun

    2017-09-01

    In this paper, we define a class of special two-party private summation (S2PPS) problems and present a common quantum solution to S2PPS problems. Compared to related classical solutions, our solution has advantages of higher security and lower communication complexity, and especially it can ensure the fairness of two parties without the help of a third party. Furthermore, we investigate the practical applications of our proposed S2PPS protocol in many privacy-preserving settings with big data sets, including private similarity decision, anonymous authentication, social networks, secure trade negotiation, secure data mining.

  10. Security Systems Consideration: A Total Security Approach

    NASA Astrophysics Data System (ADS)

    Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.

    2007-12-01

    The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.

  11. Diagnosing water security in the rural North with an environmental security framework.

    PubMed

    Penn, Henry J F; Loring, Philip A; Schnabel, William E

    2017-09-01

    This study explores the nature of water security challenges in rural Alaska, using a framework for environmental security that entails four interrelated concepts: availability, access, utility, and stability of water resources. Many researchers and professionals agree that water insecurity is a problem in rural Alaska, although the scale and nature of the problem is contested. Some academics have argued that the problem is systemic, and rooted in an approach to water security by the state that prioritizes economic concerns over public health concerns. Health practitioners and state agencies, on the other hand, contend that much progress has been made, and that nearly all rural households have access to safe drinking water, though many are still lacking 'modern' in-home water service. Here, we draw on a synthesis of ethnographic research alongside data from state agencies to show that the persistent water insecurity problems in rural Alaska are not a problem of access to or availability of clean water, or a lack of 'modern' infrastructure, but instead are rooted in complex human dimensions of water resources management, including the political legacies of state and federal community development schemes that did not fully account for local needs and challenges. The diagnostic approach we implement here helps to identify solutions to these challenges, which accordingly focus on place-based needs and empowering local actors. The framework likewise proves to be broadly applicable to exploring water security concerns elsewhere in the world. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Federal Government Information Systems Security Management and Governance Are Pacing Factors for Innovation

    ERIC Educational Resources Information Center

    Edwards, Gregory

    2011-01-01

    Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…

  13. 10 CFR 824.9 - Hearing Counsel.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Hearing Counsel. 824.9 Section 824.9 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... consistent with the objectives of the Act and DOE security requirements. ...

  14. 10 CFR 824.9 - Hearing Counsel.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Hearing Counsel. 824.9 Section 824.9 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... consistent with the objectives of the Act and DOE security requirements. ...

  15. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR... Proceedings Involving Restricted Data and/or National Security Information § 2.911 Admissibility of restricted...

  16. 10 CFR 10.32 - Recommendation of the NRC Personnel Security Review Panel.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Recommendation of the NRC Personnel Security Review Panel. 10.32 Section 10.32 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING... Procedures § 10.32 Recommendation of the NRC Personnel Security Review Panel. (a) The Deputy Executive...

  17. 10 CFR 10.32 - Recommendation of the NRC Personnel Security Review Panel.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Recommendation of the NRC Personnel Security Review Panel. 10.32 Section 10.32 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING... Procedures § 10.32 Recommendation of the NRC Personnel Security Review Panel. (a) The Deputy Executive...

  18. 10 CFR 10.32 - Recommendation of the NRC Personnel Security Review Panel.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Recommendation of the NRC Personnel Security Review Panel. 10.32 Section 10.32 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING... Procedures § 10.32 Recommendation of the NRC Personnel Security Review Panel. (a) The Deputy Executive...

  19. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  20. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  1. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  2. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  3. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  4. An enhanced mobile-healthcare emergency system based on extended chaotic maps.

    PubMed

    Lee, Cheng-Chi; Hsu, Che-Wei; Lai, Yan-Ming; Vasilakos, Athanasios

    2013-10-01

    Mobile Healthcare (m-Healthcare) systems, namely smartphone applications of pervasive computing that utilize wireless body sensor networks (BSNs), have recently been proposed to provide smartphone users with health monitoring services and received great attentions. An m-Healthcare system with flaws, however, may leak out the smartphone user's personal information and cause security, privacy preservation, or user anonymity problems. In 2012, Lu et al. proposed a secure and privacy-preserving opportunistic computing (SPOC) framework for mobile-Healthcare emergency. The brilliant SPOC framework can opportunistically gather resources on the smartphone such as computing power and energy to process the computing-intensive personal health information (PHI) in case of an m-Healthcare emergency with minimal privacy disclosure. To balance between the hazard of PHI privacy disclosure and the necessity of PHI processing and transmission in m-Healthcare emergency, in their SPOC framework, Lu et al. introduced an efficient user-centric privacy access control system which they built on the basis of an attribute-based access control mechanism and a new privacy-preserving scalar product computation (PPSPC) technique. However, we found out that Lu et al.'s protocol still has some secure flaws such as user anonymity and mutual authentication. To fix those problems and further enhance the computation efficiency of Lu et al.'s protocol, in this article, the authors will present an improved mobile-Healthcare emergency system based on extended chaotic maps. The new system is capable of not only providing flawless user anonymity and mutual authentication but also reducing the computation cost.

  5. A framework for the analysis of the security of supply of utilising carbon dioxide as a chemical feedstock.

    PubMed

    Fraga, Eric S; Ng, Melvin

    2015-01-01

    Recent developments in catalysts have enhanced the potential for the utilisation of carbon dioxide as a chemical feedstock. Using the appropriate energy efficient catalyst enables a range of chemical pathways leading to desirable products. In doing so, CO2 provides an economically and environmentally beneficial source of C1 feedstock, while improving the issues relating to security of supply that are associated with fossil-based feedstocks. However, the dependence on catalysts brings other supply chains into consideration, supply chains that may also have security of supply issues. The choice of chemical pathways for specific products will therefore entail an assessment not only of economic factors but also the security of supply issues for the catalysts. This is a multi-criteria decision making problem. In this paper, we present a modified 4A framework based on the framework suggested by the Asian Pacific Energy Research centre for macro-economic applications. The 4A methodology is named after the criteria used to compare alternatives: availability, acceptability, applicability and affordability. We have adapted this framework for the consideration of alternative chemical reaction processes using a micro-economic outlook. Data from a number of sources were collected and used to quantify each of the 4A criteria. A graphical representation of the assessments is used to support the decision maker in comparing alternatives. The framework not only allows for the comparison of processes but also highlights current limitations in the CCU processes. The framework presented can be used by a variety of stakeholders, including regulators, investors, and process industries, with the aim of identifying promising routes within a broader multi-criteria decision making process.

  6. Assurance of energy efficiency and data security for ECG transmission in BASNs.

    PubMed

    Ma, Tao; Shrestha, Pradhumna Lal; Hempel, Michael; Peng, Dongming; Sharif, Hamid; Chen, Hsiao-Hwa

    2012-04-01

    With the technological advancement in body area sensor networks (BASNs), low cost high quality electrocardiographic (ECG) diagnosis systems have become important equipment for healthcare service providers. However, energy consumption and data security with ECG systems in BASNs are still two major challenges to tackle. In this study, we investigate the properties of compressed ECG data for energy saving as an effort to devise a selective encryption mechanism and a two-rate unequal error protection (UEP) scheme. The proposed selective encryption mechanism provides a simple and yet effective security solution for an ECG sensor-based communication platform, where only one percent of data is encrypted without compromising ECG data security. This part of the encrypted data is essential to ECG data quality due to its unequally important contribution to distortion reduction. The two-rate UEP scheme achieves a significant additional energy saving due to its unequal investment of communication energy to the outcomes of the selective encryption, and thus, it maintains a high ECG data transmission quality. Our results show the improvements in communication energy saving of about 40%, and demonstrate a higher transmission quality and security measured in terms of wavelet-based weighted percent root-mean-squared difference.

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Halbgewachs, Ronald D.; Chavez, Adrian R.

    Process Control System (PCS) and Industrial Control System (ICS) security is critical to our national security. But there are a number of technological, economic, and educational impediments to PCS owners implementing effective security on their systems. Sandia National Laboratories has performed the research and development of the OPSAID (Open PCS Security Architecture for Interoperable Design), a project sponsored by the US Department of Energy Office of Electricity Delivery and Energy Reliability (DOE/OE), to address this issue. OPSAID is an open-source architecture for PCS/ICS security that provides a design basis for vendors to build add-on security devices for legacy systems, whilemore » providing a path forward for the development of inherently-secure PCS elements in the future. Using standardized hardware, a proof-of-concept prototype system was also developed. This report describes the improvements and capabilities that have been added to OPSAID since an initial report was released. Testing and validation of this architecture has been conducted in another project, Lemnos Interoperable Security Project, sponsored by DOE/OE and managed by the National Energy Technology Laboratory (NETL).« less

  8. Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry.

    PubMed

    Zhang, Zheshen; Mower, Jacob; Englund, Dirk; Wong, Franco N C; Shapiro, Jeffrey H

    2014-03-28

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down-conversion and show that it is secure against collective attacks. Its security rests upon visibility data-obtained from Franson and conjugate-Franson interferometers-that probe photon-pair frequency correlations and arrival-time correlations. From these measurements, an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over a 200-km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700-bit/sec secure-key rate and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with a 15% system efficiency.

  9. Instrumentation, Control, and Intelligent Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    2005-09-01

    Abundant and affordable energy is required for U.S. economic stability and national security. Advanced nuclear power plants offer the best near-term potential to generate abundant, affordable, and sustainable electricity and hydrogen without appreciable generation of greenhouse gases. To that end, Idaho National Laboratory (INL) has been charged with leading the revitalization of nuclear power in the U.S. The INL vision is to become the preeminent nuclear energy laboratory with synergistic, world-class, multi-program capabilities and partnerships by 2015. The vision focuses on four essential destinations: (1) Be the preeminent internationally-recognized nuclear energy research, development, and demonstration laboratory; (2) Be a majormore » center for national security technology development and demonstration; (3) Be a multi-program national laboratory with world-class capabilities; (4) Foster academic, industry, government, and international collaborations to produce the needed investment, programs, and expertise. Crucial to that effort is the inclusion of research in advanced instrumentation, control, and intelligent systems (ICIS) for use in current and advanced power and energy security systems to enable increased performance, reliability, security, and safety. For nuclear energy plants, ICIS will extend the lifetime of power plant systems, increase performance and power output, and ensure reliable operation within the system's safety margin; for national security applications, ICIS will enable increased protection of our nation's critical infrastructure. In general, ICIS will cost-effectively increase performance for all energy security systems.« less

  10. Parental Problem Drinking, Marital Aggression, and Child Emotional Insecurity: A Longitudinal Investigation*

    PubMed Central

    Keller, Peggy S.; Gilbert, Lauren R.; Koss, Kalsea J.; Cummings, E. Mark; Davies, Patrick T.

    2011-01-01

    Objective: Marital aggression plays an important role in relations between parental problem drinking and child maladjustment. The purpose of the current study was to apply emotional security theory as a framework for understanding the role of marital aggression. Method: A community sample of 235 children in kindergarten participated once a year for 3 years. Parents completed measures of parental problem drinking and marital aggression, and children were interviewed about their emotional security reactions to marital conflict vignettes. Results: Greater parental problem drinking was directly associated with children's more negative emotional reactions to conflict. Maternal problem drinking predicted increased sad reactions and negative expectations for the future. Paternal problem drinking predicted increases in child anger reactions and negative expectations for the future. Parental problem drinking was also indirectly associated with child reactions via marital aggression. Conclusions: Results confirmed hypotheses that parental problem drinking would be related to child emotional insecurity and that associations would be indirect via greater marital conflict. Findings are interpreted in terms of emotional security theory as a framework for understanding the effects of parental problem drinking on marital aggression and child development. PMID:21906498

  11. Parental problem drinking, marital aggression, and child emotional insecurity: a longitudinal investigation.

    PubMed

    Keller, Peggy S; Gilbert, Lauren R; Koss, Kalsea J; Cummings, E Mark; Davies, Patrick T

    2011-09-01

    Marital aggression plays an important role in relations between parental problem drinking and child maladjustment. The purpose of the current study was to apply emotional security theory as a framework for understanding the role of marital aggression. A community sample of 235 children in kindergarten participated once a year for 3 years. Parents completed measures of parental problem drinking and marital aggression, and children were interviewed about their emotional security reactions to marital conflict vignettes. Greater parental problem drinking was directly associated with children's more negative emotional reactions to conflict. Maternal problem drinking predicted increased sad reactions and negative expectations for the future. Paternal problem drinking predicted increases in child anger reactions and negative expectations for the future. Parental problem drinking was also indirectly associated with child reactions via marital aggression. Results confirmed hypotheses that parental problem drinking would be related to child emotional insecurity and that associations would be indirect via greater marital conflict. Findings are interpreted in terms of emotional security theory as a framework for understanding the effects of parental problem drinking on marital aggression and child development.

  12. Sex-specific relationships among attachment security, social values, and sensation seeking in early adolescence: implications for adolescents' externalizing problem behaviour.

    PubMed

    Sarracino, Diego; Presaghi, Fabio; Degni, Silvia; Innamorati, Marco

    2011-06-01

    In early adolescence, attachment security reflects not only the quality of ongoing relationships with parents, but also how adolescents process social relationships with "others" - that is, their "social value orientation" - with possible implications for adolescents' risk-taking. In this study, a sample of Italian early adolescents were administered self-report measures in order to examine the relationships (a) between early adolescents' perceived attachment security to mothers and fathers, social values (related to family and the socio-cultural context), and sensation seeking (as a temperamental predisposition to risk-taking), and (b) between these variables and adolescents' externalizing problem behaviour. Adolescents were more securely attached to the same-sexed parent. Further, attachment security with the opposite-sexed parent predicted more conservative social value orientations, and lower levels of problem behaviour. In contrast, sensation seeking predicted self-enhancement and openness-to-change values to a greater extent, and, in girls, lower levels of attachment security to mothers and fathers. Copyright © 2010 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  13. Security Measures to Protect Mobile Agents

    NASA Astrophysics Data System (ADS)

    Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh

    2010-11-01

    The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.

  14. 10 CFR 706.12 - Administrative Law Judges.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Administrative Law Judges. 706.12 Section 706.12 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies... hearings and to facilitate preparation of an unclassified record. The assignment of individual...

  15. 10 CFR 706.12 - Administrative Law Judges.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Administrative Law Judges. 706.12 Section 706.12 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies... hearings and to facilitate preparation of an unclassified record. The assignment of individual...

  16. 10 CFR 706.12 - Administrative Law Judges.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Administrative Law Judges. 706.12 Section 706.12 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies... hearings and to facilitate preparation of an unclassified record. The assignment of individual...

  17. 10 CFR 706.12 - Administrative Law Judges.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Administrative Law Judges. 706.12 Section 706.12 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies... hearings and to facilitate preparation of an unclassified record. The assignment of individual...

  18. 10 CFR 706.12 - Administrative Law Judges.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Administrative Law Judges. 706.12 Section 706.12 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies... hearings and to facilitate preparation of an unclassified record. The assignment of individual...

  19. 77 FR 65602 - Chimera Energy Corporation; Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-29

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Chimera Energy Corporation; Order of... lack of current and accurate information concerning the securities of Chimera Energy Corporation (``Chimera'') because of questions regarding the accuracy of statements by Chimera in press releases to...

  20. Protecting proprietary rights - A potential Shuttle user's view

    NASA Technical Reports Server (NTRS)

    Day, J. B.

    1977-01-01

    Maintaining a high degree of industrial security in the multiple-payload Shuttle environment poses a number of problems for NASA. As a part of Battelle-Columbus' support of NASA's User Development Program, this paper presents a potential user's perspective on this situation. The need for security, the nature of the problem, and precedents for NASA security measures are discussed. Eleven policy guidelines representing desirable features from a potential user's viewpoint are presented for NASA consideration.

  1. Assessing national nutrition security: The UK reliance on imports to meet population energy and nutrient recommendations

    PubMed Central

    Clark, Heather; Whybrow, Stephen; de Ruiter, Henri; McNeill, Geraldine

    2018-01-01

    Nutrition security describes the adequacy of the food supply to meet not only energy but also macronutrient and micronutrient requirements for the population. The aim of this study was to develop a method to assess trends in national nutrition security and the contribution of imports to nutrition security, using the UK as a case study. Food supply data from FAO food balance sheets and national food composition tables were used to estimate the nutrient content of domestically produced food, imported food and exported food. Nutrition security was defined as the total nutrient supply (domestic production, minus exports, plus imports) to meet population-level nutrient requirements. The results showed that the UK was nutrition secure over the period 1961–2011 for energy, macronutrients and key micronutrients, with the exception of total carbohydrates and fibre, which may be due to the loss of fibre incurred by processing cereals into refined products. The supply of protein exceeded population requirements and could be met with domestic production alone. Even excluding all meat there was sufficient protein for population requirements. The supply of total fat, saturated fat and sugar considerably exceeded the current dietary recommendation. As regards nutrition security in 2010, the UK was reliant on imported foods to meet energy, fibre, total carbohydrate, iron, zinc and vitamin A requirements. This analysis demonstrates the importance of including nutrients other than energy to determine the adequacy of the food supply. The methodology also provides an alternative perspective on food security and self-sufficiency by assessing the dependency on imports to meet population level nutritional requirements. PMID:29489830

  2. Assessing national nutrition security: The UK reliance on imports to meet population energy and nutrient recommendations.

    PubMed

    Macdiarmid, Jennie I; Clark, Heather; Whybrow, Stephen; de Ruiter, Henri; McNeill, Geraldine

    2018-01-01

    Nutrition security describes the adequacy of the food supply to meet not only energy but also macronutrient and micronutrient requirements for the population. The aim of this study was to develop a method to assess trends in national nutrition security and the contribution of imports to nutrition security, using the UK as a case study. Food supply data from FAO food balance sheets and national food composition tables were used to estimate the nutrient content of domestically produced food, imported food and exported food. Nutrition security was defined as the total nutrient supply (domestic production, minus exports, plus imports) to meet population-level nutrient requirements. The results showed that the UK was nutrition secure over the period 1961-2011 for energy, macronutrients and key micronutrients, with the exception of total carbohydrates and fibre, which may be due to the loss of fibre incurred by processing cereals into refined products. The supply of protein exceeded population requirements and could be met with domestic production alone. Even excluding all meat there was sufficient protein for population requirements. The supply of total fat, saturated fat and sugar considerably exceeded the current dietary recommendation. As regards nutrition security in 2010, the UK was reliant on imported foods to meet energy, fibre, total carbohydrate, iron, zinc and vitamin A requirements. This analysis demonstrates the importance of including nutrients other than energy to determine the adequacy of the food supply. The methodology also provides an alternative perspective on food security and self-sufficiency by assessing the dependency on imports to meet population level nutritional requirements.

  3. 75 Breakthroughs by the U.S. Department of Energy's National Laboratories; Breakthroughs 2017

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    Born at a time when the world faced a dire threat, the National Laboratory System protects America through science and technology. For more than 75 years, the Department of Energy’s national laboratories have solved important problems in science, energy and national security. Partnering with industry and academia, the laboratories also drive innovation to advance economic competitiveness and ensure our nation’s future prosperity. Over the years, America's National Laboratories have been changing and improving the lives of millions of people and this expertise continues to keep our nation at the forefront of science and technology in a rapidly changing world. Thismore » network of Department of Energy Laboratories has grown into 17 facilities across the country. As this list of breakthroughs attests, Laboratory discoveries have spawned industries, saved lives, generated new products, fired the imagination and helped to reveal the secrets of the universe.« less

  4. Asian Security in the 1980s: Problems and Policies for a Time of Transition,

    DTIC Science & Technology

    1979-11-01

    A7416 RAND CORP SANTA MONICA CAF/54AO7R ASIAN SECURITY INM THE 198CS: PROBLEMS AND POLICIES FOR A TIME O-ETC(U) WCASF NOV 79 R H SOLOMON N0A903-77-C...O115 UN LAFED RAND/R-2692-IA NL14 mEEEmmEEEE -EEiiEEmiEEEE iinnninnnnnnlinn Illlliilillllu,. -EEEEag/Ilh/lI -EiilllllEilE Asian Security in the 1980s...INTERNATIONAL SECURITY AFFAIRS R-2492-ISA November 1979 ".80 CO ) L j ... -- The research described in this report was sponsored by the Department of

  5. Cyber security issues in online games

    NASA Astrophysics Data System (ADS)

    Zhao, Chen

    2018-04-01

    With the rapid development of the Internet, online gaming has become a way of entertainment for many young people in the modern era. However, in recent years, cyber security issues in online games have emerged in an endless stream, which have also caused great attention of many game operators. Common cyber security problems in the game include information disclosure and cyber-attacks. These problems will directly or indirectly cause economic losses to gamers. Many gaming companies are enhancing the stability and security of their network or gaming systems in order to enhance the gaming user experience. This article has carried out the research of the cyber security issues in online games by introducing the background and some common cyber security threats, and by proposing the latent solution. Finally, it speculates the future research direction of the cyber security issues of online games in the hope of providing feasible solution and useful information for game operators.

  6. Security Metrics: A Solution in Search of a Problem

    ERIC Educational Resources Information Center

    Rosenblatt, Joel

    2008-01-01

    Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…

  7. 76 FR 30325 - Proposed Subsequent Arrangement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-25

    ..., 2011. For the Department of Energy. Anne M. Harrington, Deputy Administrator, Defense Nuclear... International Security, National Nuclear Security Administration, Department of Energy. ACTION: Proposed... arrangement under the Agreement for [[Page 30326

  8. Problem Patrons: Reviewing Your Options.

    ERIC Educational Resources Information Center

    Shuman, Bruce A.

    2002-01-01

    Considers possible options for public librarians dealing with problem patrons. Highlights include considering the safety of the patrons and staff; general considerations of library security, including security guards, legal responsibility for patrons and staff safety; and working through possible options ahead of time to be more prepared. (LRW)

  9. The urban stormwater farm.

    PubMed

    Liebman, M B; Jonasson, O J; Wiese, R N

    2011-01-01

    Currently more than 3 billion people live in urban areas. The urban population is predicted to increase by a further 3 billion by 2050. Rising oil prices, unreliable rainfall and natural disasters have all contributed to a rise in global food prices. Food security is becoming an increasingly important issue for many nations. There is also a growing awareness of both 'food miles' and 'virtual water'. Food miles and virtual water are concepts that describe the amount of embodied energy and water that is inherent in the food and other goods we consume. Growing urban agglomerations have been widely shown to consume vast quantities of energy and water whilst emitting harmful quantities of wastewater and stormwater runoff through the creation of massive impervious areas. In this paper it is proposed that there is an efficient way of simultaneously addressing the problems of food security, carbon emissions and stormwater pollution. Through a case study we demonstrate how it is possible to harvest and store stormwater from densely populated urban areas and use it to produce food at relatively low costs. This reduces food miles (carbon emissions) and virtual water consumption and serves to highlight the need for more sustainable land-use planning.

  10. A Network Topology Control and Identity Authentication Protocol with Support for Movable Sensor Nodes

    PubMed Central

    Zhang, Ying; Chen, Wei; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming

    2015-01-01

    It is expected that in the near future wireless sensor network (WSNs) will be more widely used in the mobile environment, in applications such as Autonomous Underwater Vehicles (AUVs) for marine monitoring and mobile robots for environmental investigation. The sensor nodes’ mobility can easily cause changes to the structure of a network topology, and lead to the decline in the amount of transmitted data, excessive energy consumption, and lack of security. To solve these problems, a kind of efficient Topology Control algorithm for node Mobility (TCM) is proposed. In the topology construction stage, an efficient clustering algorithm is adopted, which supports sensor node movement. It can ensure the balance of clustering, and reduce the energy consumption. In the topology maintenance stage, the digital signature authentication based on Error Correction Code (ECC) and the communication mechanism of soft handover are adopted. After verifying the legal identity of the mobile nodes, secure communications can be established, and this can increase the amount of data transmitted. Compared to some existing schemes, the proposed scheme has significant advantages regarding network topology stability, amounts of data transferred, lifetime and safety performance of the network. PMID:26633405

  11. A Network Topology Control and Identity Authentication Protocol with Support for Movable Sensor Nodes.

    PubMed

    Zhang, Ying; Chen, Wei; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming

    2015-12-01

    It is expected that in the near future wireless sensor network (WSNs) will be more widely used in the mobile environment, in applications such as Autonomous Underwater Vehicles (AUVs) for marine monitoring and mobile robots for environmental investigation. The sensor nodes' mobility can easily cause changes to the structure of a network topology, and lead to the decline in the amount of transmitted data, excessive energy consumption, and lack of security. To solve these problems, a kind of efficient Topology Control algorithm for node Mobility (TCM) is proposed. In the topology construction stage, an efficient clustering algorithm is adopted, which supports sensor node movement. It can ensure the balance of clustering, and reduce the energy consumption. In the topology maintenance stage, the digital signature authentication based on Error Correction Code (ECC) and the communication mechanism of soft handover are adopted. After verifying the legal identity of the mobile nodes, secure communications can be established, and this can increase the amount of data transmitted. Compared to some existing schemes, the proposed scheme has significant advantages regarding network topology stability, amounts of data transferred, lifetime and safety performance of the network.

  12. An analysis of factors contributing to household water security problems and threats in different settlement categories of Ngamiland, Botswana

    NASA Astrophysics Data System (ADS)

    Kujinga, Krasposy; Vanderpost, Cornelis; Mmopelwa, Gagoitseope; Wolski, Piotr

    Globally, water security is negatively affected by factors that include climatic and hydrological conditions, population growth, rural-urban migration, increased per-capita water use, pollution and over-abstraction of groundwater. While Botswana has made strides in providing safe and clean water to its population since independence in 1966, over the years, a combination of factors have contributed to water security problems in different settlement categories of the country (i.e., primary, secondary, tertiary and ungazetted settlements) in general and in the district of Ngamiland in particular. To study water security problems differentiated by settlement category, this study employed quantitative data collection methods (i.e. household structured questionnaires) and qualitative data collection methods (i.e. key informant interviews, observation, focus group discussions and informal interviews), complemented by a review of relevant literature. Water security in all settlements is affected by status of the settlement, i.e. gazetted or ungazetted, climatic and hydrological factors and water governance challenges. In large villages such as Maun, factors threatening water security include population growth, urbanization, management challenges, old water supply and distribution infrastructure, increased demand for individual connections and changing lifestyles. Small gazetted and ungazetted settlements encounter problems related to limited sources of water supply as well as salinity of groundwater resources. In order to enhance water security in different settlement categories, Botswana has to develop a comprehensive water resources management strategy underpinned by integrated water resources management principles aimed at addressing factors contributing to water security problems. The strategy has to be settlement category specific. Large villages have to address factors related to demographic changes, urbanization, management challenges, water supply infrastructure and the introducing of water demand management activities. Households in small villages need provision of water from more sustainable sources while ungazetted settlements need better access to clean water.

  13. Survey of cyber security issues in smart grids

    NASA Astrophysics Data System (ADS)

    Chen, Thomas M.

    2010-04-01

    The future smart grid will enable cost savings and lower energy use by means of smart appliances and smart meters which support dynamic load management and real-time monitoring of energy use and distribution. The introduction of two-way communications and control into power grid introduces security and privacy concerns. This talk will survey the security and privacy issues in smart grids using the NIST reference model, and relate these issues to cyber security in the Internet.

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jacobs, R

    The Physics and Advanced Technologies (PAT) Directorate was created in July 2000 by Bruce Tarter, Director of Lawrence Livermore National Laboratory (LLNL). The Director called for the new organization to execute and support programs that apply cutting-edge physics and advanced technology to develop integrated solutions to problems in national security, fusion energy, information science, health care, and other national grand challenges. When I was appointed a year later as the PAT Directorate's first Associate Director, I initiated a strategic planning project to develop a vision, mission, and long-term goals for the Directorate. We adopted the goal of becoming a leadermore » in frontier physics and technology for twenty-first-century national security missions: Stockpile Stewardship, homeland security, energy independence, and the exploration of space. Our mission is to: (1) Help ensure the scientific excellence and vitality of the major LLNL programs through its leadership role in performing basic and applied multidisciplinary research and development with programmatic impact, and by recruiting and retaining science and technology leaders; (2) Create future opportunities and directions for LLNL and its major programs by growing new program areas and cutting-edge capabilities that are synergistic with, and supportive of, its national security mission; (3) Provide a direct conduit to the academic and high-tech industrial sectors for LLNL and its national security programs, through which the Laboratory gains access to frontier science and technology, and can impact the science and technology communities; (4) Leverage unique Laboratory capabilities, to advance the state universe. This inaugural PAT Annual Report begins a series that will chronicle our progress towards fulfilling this mission. I believe the report demonstrates that the PAT Directorate has a strong base of capabilities and accomplishments on which to build in meeting its goals. Some of the highlights include: (1) Leadership of the Laboratory's Physical Data Research Program that provides fundamental physics information for the Stockpile Stewardship Program. (2) Development of the handheld Microbead Immunoassay Dipstick System that will allow relatively untrained first-responders to run sophisticated onsite diagnostics for pathogens, including those associated with biowarfare agents, by using a simple, one-step measurement. (3) Major advances in target design for inertial fusion energy research using both laser and ion-beam drivers. (4) Development of the Advanced Technology Kill Vehicle concept for use as a high-performance interceptor in a broad range of missile defense programs. Over the course of the past decade, the Laboratory has seen its major program evolve from weapons research, development, and testing, to Stockpile Stewardship. Today, the country's national security priorities are changing rapidly: nuclear security is becoming a broader set of missions, and the Laboratory is being asked to contribute to a range of new mission areas from countering bioterrorism to ensuring information security. As we embark on the twenty-first century, the new PAT Directorate is poised to help lead the Laboratory's response to the country's changing national security needs.« less

  15. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  16. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  17. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  18. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  19. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY... protection during non-working hours; or (2) Any steel file cabinet that has four sides and a top and bottom...

  20. 76 FR 45548 - Draft Site-Wide Environmental Impact Statement for the Continued Operation of the Department of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-29

    ... geothermal energy demonstration project and research center. Reduced Operations Alternative The Reduced... DEPARTMENT OF ENERGY National Nuclear Security Administration Draft Site-Wide Environmental Impact Statement for the Continued Operation of the Department of Energy/National Nuclear Security Administration...

  1. 10 CFR 1046.12 - Physical fitness training program.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Physical fitness training program. 1046.12 Section 1046.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF SECURITY INTERESTS Protective Force Personnel § 1046.12 Physical fitness training program. (a) Each incumbent security police officer...

  2. 10 CFR 1046.12 - Physical fitness training program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Physical fitness training program. 1046.12 Section 1046.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF SECURITY INTERESTS Protective Force Personnel § 1046.12 Physical fitness training program. (a) Each incumbent security police officer...

  3. July 2015

    Science.gov Websites

    Science Programs Applied Energy Programs Civilian Nuclear Energy Programs Laboratory Directed Research Energy United States of America National Nuclear Security Administration Visit Blogger Join Us on key role in national security and nuclear deterrence in an increasingly dangerous and unstable world

  4. NETL's Energy Data Exchange (EDX) - a coordination, collaboration, and data resource discovery platform for energy science

    NASA Astrophysics Data System (ADS)

    Rose, K.; Rowan, C.; Rager, D.; Dehlin, M.; Baker, D. V.; McIntyre, D.

    2015-12-01

    Multi-organizational research teams working jointly on projects often encounter problems with discovery, access to relevant existing resources, and data sharing due to large file sizes, inappropriate file formats, or other inefficient options that make collaboration difficult. The Energy Data eXchange (EDX) from Department of Energy's (DOE) National Energy Technology Laboratory (NETL) is an evolving online research environment designed to overcome these challenges in support of DOE's fossil energy goals while offering improved access to data driven products of fossil energy R&D such as datasets, tools, and web applications. In 2011, development of NETL's Energy Data eXchange (EDX) was initiated and offers i) a means for better preserving of NETL's research and development products for future access and re-use, ii) efficient, discoverable access to authoritative, relevant, external resources, and iii) an improved approach and tools to support secure, private collaboration and coordination between multi-organizational teams to meet DOE mission and goals. EDX presently supports fossil energy and SubTER Crosscut research activities, with an ever-growing user base. EDX is built on a heavily customized instance of the open source platform, Comprehensive Knowledge Archive Network (CKAN). EDX connects users to externally relevant data and tools through connecting to external data repositories built on different platforms and other CKAN platforms (e.g. Data.gov). EDX does not download and repost data or tools that already have an online presence. This leads to redundancy and even error. If a relevant resource already has an online instance, is hosted by another online entity, EDX will point users to that external host either using web services, inventorying URLs and other methods. EDX offers users the ability to leverage private-secure capabilities custom built into the system. The team is presently working on version 3 of EDX which will incorporate big data analytical capabilities amongst other advanced features.

  5. A decade of nutrition research in Africa: assessment of the evidence base and academic collaboration.

    PubMed

    Lachat, Carl; Roberfroid, Dominique; Van den Broeck, Lien; Van den Briel, Natalie; Nago, Eunice; Kruger, Annamarie; Holdsworth, Michelle; Garimoi Orach, Christopher; Kolsteren, Patrick

    2015-07-01

    Malnutrition in Africa has not improved compared with other regions in the world. Investment in the build-up of a strong African research workforce is essential to provide contextual solutions to the nutritional problems of Africa. To orientate this process, we reviewed nutrition research carried out in Africa and published during the last decade. We assessed nutrition research from Africa published between 2000 and 2010 from MEDLINE and EMBASE and analysed the study design and type of intervention for studies indexed with major MeSH terms for vitamin A deficiency, protein-energy malnutrition, obesity, breast-feeding, nutritional status and food security. Affiliations of first authors were visualised as a network and power of affiliations was assessed using centrality metrics. Africa. Africans, all age groups. Most research on the topics was conducted in Southern (36%) and Western Africa (34%). The intervention studies (9%; n 95) mainly tested technological and curative approaches to the nutritional problems. Only for papers on protein-energy malnutrition and obesity did lead authorship from Africa exceed that from non-African affiliations. The 10% most powerfully connected affiliations were situated mainly outside Africa for publications on vitamin A deficiency, breast-feeding, nutritional status and food security. The development of the evidence base for nutrition research in Africa is focused on treatment and the potential for cross-African networks to publish nutrition research from Africa remains grossly underutilised. Efforts to build capacity for effective nutrition action in Africa will require forging a true academic partnership between African and non-African research institutions.

  6. Integrated Modeling Approach for Optimal Management of Water, Energy and Food Security Nexus

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Xiaodong; Vesselinov, Velimir Valentinov

    We report that water, energy and food (WEF) are inextricably interrelated. Effective planning and management of limited WEF resources to meet current and future socioeconomic demands for sustainable development is challenging. WEF production/delivery may also produce environmental impacts; as a result, green-house-gas emission control will impact WEF nexus management as well. Nexus management for WEF security necessitates integrated tools for predictive analysis that are capable of identifying the tradeoffs among various sectors, generating cost-effective planning and management strategies and policies. To address these needs, we have developed an integrated model analysis framework and tool called WEFO. WEFO provides a multi-periodmore » socioeconomic model for predicting how to satisfy WEF demands based on model inputs representing productions costs, socioeconomic demands, and environmental controls. WEFO is applied to quantitatively analyze the interrelationships and trade-offs among system components including energy supply, electricity generation, water supply-demand, food production as well as mitigation of environmental impacts. WEFO is demonstrated to solve a hypothetical nexus management problem consistent with real-world management scenarios. Model parameters are analyzed using global sensitivity analysis and their effects on total system cost are quantified. Lastly, the obtained results demonstrate how these types of analyses can be helpful for decision-makers and stakeholders to make cost-effective decisions for optimal WEF management.« less

  7. Integrated Modeling Approach for Optimal Management of Water, Energy and Food Security Nexus

    DOE PAGES

    Zhang, Xiaodong; Vesselinov, Velimir Valentinov

    2016-12-28

    We report that water, energy and food (WEF) are inextricably interrelated. Effective planning and management of limited WEF resources to meet current and future socioeconomic demands for sustainable development is challenging. WEF production/delivery may also produce environmental impacts; as a result, green-house-gas emission control will impact WEF nexus management as well. Nexus management for WEF security necessitates integrated tools for predictive analysis that are capable of identifying the tradeoffs among various sectors, generating cost-effective planning and management strategies and policies. To address these needs, we have developed an integrated model analysis framework and tool called WEFO. WEFO provides a multi-periodmore » socioeconomic model for predicting how to satisfy WEF demands based on model inputs representing productions costs, socioeconomic demands, and environmental controls. WEFO is applied to quantitatively analyze the interrelationships and trade-offs among system components including energy supply, electricity generation, water supply-demand, food production as well as mitigation of environmental impacts. WEFO is demonstrated to solve a hypothetical nexus management problem consistent with real-world management scenarios. Model parameters are analyzed using global sensitivity analysis and their effects on total system cost are quantified. Lastly, the obtained results demonstrate how these types of analyses can be helpful for decision-makers and stakeholders to make cost-effective decisions for optimal WEF management.« less

  8. Solar thermal technologies benefits assessment: Objectives, methodologies and results for 1981

    NASA Technical Reports Server (NTRS)

    Gates, W. R.

    1982-01-01

    The economic and social benefits of developing cost competitive solar thermal technologies (STT) were assessed. The analysis was restricted to STT in electric applications for 16 high insolation/high energy price states. Three fuel price scenarios and three 1990 STT system costs were considered, reflecting uncertainty over fuel prices and STT cost projections. After considering the numerous benefits of introducing STT into the energy market, three primary benefits were identified and evaluated: (1) direct energy cost savings were estimated to range from zero to $50 billion; (2) oil imports may be reduced by up to 9 percent, improving national security; and (3) significant environmental benefits can be realized in air basins where electric power plant emissions create substantial air pollution problems. STT research and development was found to be unacceptably risky for private industry in the absence of federal support. The normal risks associated with investments in research and development are accentuated because the OPEC cartel can artificially manipulate oil prices and undercut the growth of alternative energy sources.

  9. Solar thermal technologies benefits assessment: Objectives, methodologies and results for 1981

    NASA Astrophysics Data System (ADS)

    Gates, W. R.

    1982-07-01

    The economic and social benefits of developing cost competitive solar thermal technologies (STT) were assessed. The analysis was restricted to STT in electric applications for 16 high insolation/high energy price states. Three fuel price scenarios and three 1990 STT system costs were considered, reflecting uncertainty over fuel prices and STT cost projections. After considering the numerous benefits of introducing STT into the energy market, three primary benefits were identified and evaluated: (1) direct energy cost savings were estimated to range from zero to $50 billion; (2) oil imports may be reduced by up to 9 percent, improving national security; and (3) significant environmental benefits can be realized in air basins where electric power plant emissions create substantial air pollution problems. STT research and development was found to be unacceptably risky for private industry in the absence of federal support. The normal risks associated with investments in research and development are accentuated because the OPEC cartel can artificially manipulate oil prices and undercut the growth of alternative energy sources.

  10. Global energy, sustainability, and the conventional development paradigm

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Raskin, P.D.; Margolis, R.M.

    1998-05-01

    The conventional development paradigm assumes that the values, consumption patterns, and dynamics of the western industrial system will be progressively played out on a global scale. In this inquiry, the authors explore the implications of the conventional paradigm for the evolution of global energy patterns, and the compatibility with notions of sustainability. They present a global long-range conventional development scenario to the year 2050, and identify major environmental, resource, and social pressures and uncertainties. These include the economic and geopolitical consequences of fossil fuel depletion, the environmental and security implications of increased nuclear generation, the risk of significant climatic change,more » and the threats to social cohesion of distributional inequities. Such potential problems could negate the basic scenario assumption of steady economic and social development. By clarifying the stress points in a conventional picture of energy development, the scenario provides a useful point of departure for examining alternative long-range scenarios for sustainable energy development.« less

  11. Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

    NASA Astrophysics Data System (ADS)

    Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.

  12. Knowledge of practice: A multi-sited event ethnography of border security fairs in Europe and North America.

    PubMed

    Baird, Theodore

    2017-06-01

    This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices.

  13. Knowledge of practice: A multi-sited event ethnography of border security fairs in Europe and North America

    PubMed Central

    Baird, Theodore

    2017-01-01

    This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices. PMID:29046601

  14. Comment on: Supervisory Asymmetric Deterministic Secure Quantum Communication

    NASA Astrophysics Data System (ADS)

    Kao, Shih-Hung; Tsai, Chia-Wei; Hwang, Tzonelih

    2012-12-01

    In 2010, Xiu et al. (Optics Communications 284:2065-2069, 2011) proposed several applications based on a new secure four-site distribution scheme using χ-type entangled states. This paper points out that one of these applications, namely, supervisory asymmetric deterministic secure quantum communication, is subject to an information leakage problem, in which the receiver can extract two bits of a three-bit secret message without the supervisor's permission. An enhanced protocol is proposed to resolve this problem.

  15. Focus on Resiliency: A Process-Oriented Approach to Security

    DTIC Science & Technology

    2005-11-01

    by ANSI Std Z39-18 © 2005 Carnegie Mellon University CSI v1.0 2 Agenda About the SEI Characterizing the problem Security, resiliency, and risk A...2005 Carnegie Mellon University CSI v1.0 5 SEI Technical Programs Product Line Systems Dynamic Systems Software Engineering Process Management...University CSI v1.0 7 What is the problem? Is your organization’s security capability sufficient to identify and manage risks that result from failed

  16. Energy Relations in Russia: Administration, Politics and Security

    ERIC Educational Resources Information Center

    Makarychev, Andrey

    2005-01-01

    This chapter analyses energy relations through a prism of three interlinked concepts: administration, politics and security. This triad describes the basic approaches to questions about technical, politicised and securitised energy. These three concepts are logically linked to one another and represent an elementary matrix; a prism through which…

  17. 10 CFR 824.1 - Purpose and scope.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Purpose and scope. 824.1 Section 824.1 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... Act relating to the security or safeguarding of Restricted Data or other classified information, shall...

  18. 10 CFR 824.5 - Investigations.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Investigations. 824.5 Section 824.5 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... scope, nature and extent of compliance by a person with DOE security requirements specified in § 824.4(a...

  19. 10 CFR 706.10 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Policy. 706.10 Section 706.10 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies and Procedures in National Labor Relations Board Proceedings § 706.10 Policy. It is policy of DOE that NLRB cases falling...

  20. 10 CFR 824.5 - Investigations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Investigations. 824.5 Section 824.5 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... scope, nature and extent of compliance by a person with DOE security requirements specified in § 824.4(a...

  1. 77 FR 3257 - Transfer of Land Tracts Located at Los Alamos National Laboratory, New Mexico

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-23

    ... DEPARTMENT OF ENERGY Transfer of Land Tracts Located at Los Alamos National Laboratory, New Mexico AGENCY: National Nuclear Security Administration, U.S. Department of Energy. ACTION: Amended Record of Decision. SUMMARY: The U.S. Department of Energy's National Nuclear Security Administration (DOE/NNSA) is...

  2. 10 CFR 706.10 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Policy. 706.10 Section 706.10 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies and Procedures in National Labor Relations Board Proceedings § 706.10 Policy. It is policy of DOE that NLRB cases falling...

  3. 78 FR 8682 - Americas Energy Company-AECo; Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-06

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Americas Energy Company--AECo; Order of... lack of current and accurate information concerning the securities of Americas Energy Company-AECo (``Americas'') because Americas has not filed any periodic reports since the period ended September 30, 2011...

  4. Hydrogen Production from Nuclear Energy

    NASA Astrophysics Data System (ADS)

    Walters, Leon; Wade, Dave

    2003-07-01

    During the past decade the interest in hydrogen as transportation fuel has greatly escalated. This heighten interest is partly related to concerns surrounding local and regional air pollution from the combustion of fossil fuels along with carbon dioxide emissions adding to the enhanced greenhouse effect. More recently there has been a great sensitivity to the vulnerability of our oil supply. Thus, energy security and environmental concerns have driven the interest in hydrogen as the clean and secure alternative to fossil fuels. Remarkable advances in fuel-cell technology have made hydrogen fueled transportation a near-term possibility. However, copious quantities of hydrogen must be generated in a manner independent of fossil fuels if environmental benefits and energy security are to be achieved. The renewable technologies, wind, solar, and geothermal, although important contributors, simply do not comprise the energy density required to deliver enough hydrogen to displace much of the fossil transportation fuels. Nuclear energy is the only primary energy source that can generate enough hydrogen in an energy secure and environmentally benign fashion. Methods of production of hydrogen from nuclear energy, the relative cost of hydrogen, and possible transition schemes to a nuclear-hydrogen economy will be presented.

  5. Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods

    PubMed Central

    Alsaleh, Mansour; Alomar, Noura; Alarifi, Abdulrahman

    2017-01-01

    Protecting smartphones against security threats is a multidimensional problem involving human and technological factors. This study investigates how smartphone users’ security- and privacy-related decisions are influenced by their attitudes, perceptions, and understanding of various security threats. In this work, we seek to provide quantified insights into smartphone users’ behavior toward multiple key security features including locking mechanisms, application repositories, mobile instant messaging, and smartphone location services. To the best of our knowledge, this is the first study that reveals often unforeseen correlations and dependencies between various privacy- and security-related behaviors. Our work also provides evidence that making correct security decisions might not necessarily correlate with individuals’ awareness of the consequences of security threats. By comparing participants’ behavior and their motives for adopting or ignoring certain security practices, we suggest implementing additional persuasive approaches that focus on addressing social and technological aspects of the problem. On the basis of our findings and the results presented in the literature, we identify the factors that might influence smartphone users’ security behaviors. We then use our understanding of what might drive and influence significant behavioral changes to propose several platform design modifications that we believe could improve the security levels of smartphones. PMID:28297719

  6. Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods.

    PubMed

    Alsaleh, Mansour; Alomar, Noura; Alarifi, Abdulrahman

    2017-01-01

    Protecting smartphones against security threats is a multidimensional problem involving human and technological factors. This study investigates how smartphone users' security- and privacy-related decisions are influenced by their attitudes, perceptions, and understanding of various security threats. In this work, we seek to provide quantified insights into smartphone users' behavior toward multiple key security features including locking mechanisms, application repositories, mobile instant messaging, and smartphone location services. To the best of our knowledge, this is the first study that reveals often unforeseen correlations and dependencies between various privacy- and security-related behaviors. Our work also provides evidence that making correct security decisions might not necessarily correlate with individuals' awareness of the consequences of security threats. By comparing participants' behavior and their motives for adopting or ignoring certain security practices, we suggest implementing additional persuasive approaches that focus on addressing social and technological aspects of the problem. On the basis of our findings and the results presented in the literature, we identify the factors that might influence smartphone users' security behaviors. We then use our understanding of what might drive and influence significant behavioral changes to propose several platform design modifications that we believe could improve the security levels of smartphones.

  7. 15 CFR 700.20 - Use of priority ratings.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS DEFENSE PRIORITIES AND ALLOCATIONS SYSTEM Industrial Priorities for Energy Programs § 700.20 Use of... maintenance of energy facilities. ...

  8. Fuel Cycle Technologies 2014 Achievement Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hong, Bonnie C.

    2015-01-01

    The Fuel Cycle Technologies (FCT) program supports the Department of Energy’s (DOE’s) mission to: “Enhance U.S. security and economic growth through transformative science, technology innovation, and market solutions to meet our energy, nuclear security, and environmental challenges.” Goal 1 of DOE’s Strategic Plan is to innovate energy technologies that enhance U.S. economic growth and job creation, energy security, and environmental quality. FCT does this by investing in advanced technologies that could transform the nuclear fuel cycle in the decades to come. Goal 2 of DOE’s Strategic Plan is to strengthen national security by strengthening key science, technology, and engineering capabilities.more » FCT does this by working closely with the National Nuclear Security Administration and the U.S Department of State to develop advanced technologies that support the Nation’s nuclear nonproliferation goals.« less

  9. Social problem-solving interventions in medium secure settings for women.

    PubMed

    Long, C G; Fulton, B; Dolley, O; Hollin, C R

    2011-10-01

    Problem-solving interventions are a feature of overall medium secure treatment programmes. However, despite the relevance of such treatment to personality disorder there are few descriptions of such interventions for women. Beneficial effects for women who completed social problem-solving group treatment were evident on a number of psychometric assessments. A treatment non-completion rate of one-third raises questions of both acceptability and timing of cognitive behavioural interventions.

  10. Productivity and Job Security: Attrition--Benefits and Problems.

    ERIC Educational Resources Information Center

    National Center for Productivity and Quality of Working Life, Washington, DC.

    Three case studies are presented to document different approaches to providing the job security which would encourage acceptance of technological changes that could result in productivity improvements. The intent is to assist union and management practitioners in handling similar problems in their own firms. Focus is on the utility of attrition…

  11. Risky Business: Students and Smartphones

    ERIC Educational Resources Information Center

    Jones, Beth H.; Chin, Amita Goyal; Aiken, Peter

    2014-01-01

    The increase in smartphone adoption has been no less than astounding. Unfortunately, the explosive growth has been accompanied by a rash of security problems. A contributing factor to the growing security problem is a lack of education, training, and awareness. In addition, "bring your own device" (BYOD) policies often leave security…

  12. Rescuing Computerized Testing by Breaking Zipf's Law.

    ERIC Educational Resources Information Center

    Wainer, Howard

    2000-01-01

    Suggests that because of the nonlinear relationship between item usage and item security, the problems of test security posed by continuous administration of standardized tests cannot be resolved merely by increasing the size of the item pool. Offers alternative strategies to overcome these problems, distributing test items so as to avoid the…

  13. Population Growth and Global Security: Toward an American Strategic Commitment.

    ERIC Educational Resources Information Center

    Mumford, Steven

    1981-01-01

    Addresses the world population problem by highlighting three crucial areas: the relationship between population growth control and national security issues, the role of American leadership in resolving the problem, and the barriers to effective action. One barrier discussed in detail is the Roman Catholic Church's stand on abortion and…

  14. Global carbon management using air capture and geosequestration at remote locations

    NASA Astrophysics Data System (ADS)

    Lackner, K. S.; Goldberg, D.

    2014-12-01

    CO2 emissions need not only stop; according the IPCC, emissions need to turn negative. This requires means to remove CO2 from air and store it safely and permanently. We outline a combination of secure geosequestration and direct capture of CO2 from ambient air to create negative emissions at remote locations. Operation at remote sites avoids many difficulties associated with capture at the source, where space for added equipment is limited, good storage sites are in short supply, and proximity to private property engenders resistance. Large Igneous Provinces have been tested as secure CO2 reservoirs. CO2 and water react with reservoir rock to form stable carbonates, permanently sequestering the carbon. Outfitting reservoirs in large igneous provinces far from human habitation with ambient air capture systems creates large CO2 sequestration sites. Their remoteness offers advantages in environmental security and public acceptance and, thus, can smooth the path toward CO2 stabilization. Direct capture of CO2 from ambient air appears energetically and economically viable and could be scaled up quickly. Thermodynamic energy requirements are very small and a number of approaches have shown to be energy efficient in practice. Sorbent technologies include supported organoamines, alkaline brines, and quaternary ammonium based ion-exchange resins. To demonstrate that the stated goals of low cost and low energy consumption can be reached at scale, public research and demonstration projects are essential. We suggest co-locating air capture and geosequestration at sites where renewable energy resources can power both activities. Ready renewable energy would also allow for the co-production of synthetic fuels. Possible locations with large wind and basalt resources include Iceland and Greenland, the north-western United States, the Kerguelen plateau, Siberia and Morocco. Capture and sequestration in these reservoirs could recover all of the emissions of the 20th century and still contribute to a carbon neutral economy throughout the 21st century. Mobilizing industrial infrastructure to these areas poses a challenge. However, the urgency of the climate problem requires immediate action, with economic incentives and commitments to site evaluation and engineering development.

  15. The climate change and energy security nexus

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    King, Marcus Dubois; Gulledge, Jay

    2013-01-01

    The study of the impacts of climate change on national and interna-tional security has grown as a research field, particularly in the last five years. Within this broad field, academic scholarship has concentrated primarily on whether climate change is, or may become, a driver of violent conflict. This relationship remains highly contested. However, national security policy and many non-governmental organizations have identified climate change as a threat multiplier in conflict situations. The U.S. Department of Defense and the United Kingdom's Ministry of Defense have incorporated these findings into strategic planning documents such as the Quadrennial Defense Review and the Strategicmore » Defence and Security Review. In contrast to the climate-conflict nexus, our analysis found that academic scholarship on the climate change and energy security nexus is small and more disciplinarily focused. In fact, a search of social science litera-ture found few sources, with a significant percentage of these works attribut-able to a single journal. Assuming that policymakers are more likely to rely on broader social science literature than technical or scientific journals, this leaves a limited foundation. This then begged the question: what are these sources? We identified a body of grey literature on the nexus of climate change and energy security of a greater size than the body of peer-reviewed social science literature. We reviewed fifty-eight recent reports, issue briefs, and transcripts to better understand the nexus of climate change and energy security, as well as to gain insight about the questions policymakers need answered by those undertaking the research. In this article, we describe the nature of the sources reviewed, highlight possible climate change and energy security linkages found within those sources, identify emerging risks, and offer conclusions that can guide further research.« less

  16. Systematic implementation of spectral CT with a photon counting detector for liquid security inspection

    NASA Astrophysics Data System (ADS)

    Xu, Xiaofei; Xing, Yuxiang; Wang, Sen; Zhang, Li

    2018-06-01

    X-ray liquid security inspection system plays an important role in homeland security, while the conventional dual-energy CT (DECT) system may have a big deviation in extracting the atomic number and the electron density of materials in various conditions. Photon counting detectors (PCDs) have the capability of discriminating the incident photons of different energy. The technique becomes more and more mature in nowadays. In this work, we explore the performance of a multi-energy CT imaging system with a PCD for liquid security inspection in material discrimination. We used a maximum-likelihood (ML) decomposition method with scatter correction based on a cross-energy response model (CERM) for PCDs so that to improve the accuracy of atomic number and electronic density imaging. Experimental study was carried to examine the effectiveness and robustness of the proposed system. Our results show that the concentration of different solutions in physical phantoms can be reconstructed accurately, which could improve the material identification compared to current available dual-energy liquid security inspection systems. The CERM-base decomposition and reconstruction method can be easily used to different applications such as medical diagnosis.

  17. Evolving the Role of Campus Security

    ERIC Educational Resources Information Center

    May, Vern

    2008-01-01

    One of the problems security professionals see in security is that there are few benchmarks to quantify the effectiveness of proactive security initiatives. This hurts them with funding support and also with ensuring community buy-in outside of crisis situations. The reactive nature of many institutions makes it difficult to move forward with…

  18. Issues of Falsifying Financial Statements in Terms of Economic Security

    ERIC Educational Resources Information Center

    Zhitlukhina, Olga G.; Rakutko, Svetlana Y.; Berezhnova, Elena I.; Selezneva, Elena Y.; Belik, Elena V.; Shalaeva, Nina I.; Denisevich, Elena I.; Belik, Natalia V.; Saenko, Zhanna E.; Sultanova, Alina A.

    2016-01-01

    The paper deals with problems of the country's economic security and entities, timely resolution of which influences directly the country's national security. The cornerstone of successful existence of any country, especially the Russian Federation, during such complicated period is the presence of effective national economic security system.…

  19. Energy technology evaluation report: Energy security

    NASA Astrophysics Data System (ADS)

    Koopman, R.; Lamont, A.; Schock, R.

    1992-09-01

    Energy security was identified in the National Energy Strategy (NES) as a major issue for the Department of Energy (DOE). As part of a process designed by the DOE to identify technologies important to implementing the NES, an expert working group was convened to consider which technologies can best contribute to reducing the nation's economic vulnerability to future disruptions of world oil supplies, the working definition of energy security. Other working groups were established to deal with economic growth, environmental quality, and technical foundations. Energy Security working group members were chosen to represent as broad a spectrum of energy supply and end-use technologies as possible and were selected for their established reputations as experienced experts with an ability to be objective. The time available for this evaluation was very short. The group evaluated technologies using criteria taken from the NES which can be summarized for energy security as follows: diversifying sources of world oil supply so as to decrease the increasing monopoly status of the Persian Gulf region; reducing the importance of oil use in the US economy to diminish the impact of future disruptions in oil supply; and increasing the preparedness of the US to deal with oil supply disruptions by having alternatives available at a known price. The result of the first phase of the evaluation process was the identification of technology groups determined to be clearly important for reducing US vulnerability to oil supply disruptions. The important technologies were mostly within the high leverage areas of oil and gas supply and transportation demand but also included hydrogen utilization, biomass, diversion resistant nuclear power, and substitute industrial feedstocks.

  20. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Access to restricted data and national security... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access...

  1. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Access to restricted data and national security... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access...

  2. Data-Aware Retrodiction for Asynchronous Harmonic Measurement in a Cyber-Physical Energy System

    PubMed Central

    Liu, Youda; Wang, Xue; Liu, Yanchi; Cui, Sujin

    2016-01-01

    Cyber-physical energy systems provide a networked solution for safety, reliability and efficiency problems in smart grids. On the demand side, the secure and trustworthy energy supply requires real-time supervising and online power quality assessing. Harmonics measurement is necessary in power quality evaluation. However, under the large-scale distributed metering architecture, harmonic measurement faces the out-of-sequence measurement (OOSM) problem, which is the result of latencies in sensing or the communication process and brings deviations in data fusion. This paper depicts a distributed measurement network for large-scale asynchronous harmonic analysis and exploits a nonlinear autoregressive model with exogenous inputs (NARX) network to reorder the out-of-sequence measuring data. The NARX network gets the characteristics of the electrical harmonics from practical data rather than the kinematic equations. Thus, the data-aware network approximates the behavior of the practical electrical parameter with real-time data and improves the retrodiction accuracy. Theoretical analysis demonstrates that the data-aware method maintains a reasonable consumption of computing resources. Experiments on a practical testbed of a cyber-physical system are implemented, and harmonic measurement and analysis accuracy are adopted to evaluate the measuring mechanism under a distributed metering network. Results demonstrate an improvement of the harmonics analysis precision and validate the asynchronous measuring method in cyber-physical energy systems. PMID:27548171

  3. 76 FR 77578 - In the Matter of: Brendan Technologies, Inc., CenterStaging Corp., PGMI, Inc., Thermal Energy...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-13

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of: Brendan Technologies, Inc., CenterStaging Corp., PGMI, Inc., Thermal Energy Storage, Inc., and Trinity3 Corporation; Order of... there is a lack of current and accurate information concerning the securities of Thermal Energy Storage...

  4. 77 FR 5865 - American Unity Investments, Inc., China Display Technologies, Inc., China Wind Energy, Inc., Fuda...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-06

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] American Unity Investments, Inc., China Display Technologies, Inc., China Wind Energy, Inc., Fuda Faucet Works, Inc., Greater China Media... concerning the securities of China Wind Energy, Inc. because it has not filed any periodic reports since the...

  5. U.S. Energy Security -- The Campaign We Must Win

    DTIC Science & Technology

    2009-03-23

    population.2 Our industry, commerce, transportation and economic livelihood require the uninterrupted supply of energy. In all its forms, energy underpins...mitigate our vulnerability to unstable oil prices. Rising global demand and competition threatens our ability to secure long term economical access... economically while strengthening our enemies. This research paper addresses the effectiveness of U.S. energy policy and proposes a new approach that seeks to

  6. Design and Analysis of Windmill Simulation and Pole by Solidwork Program

    NASA Astrophysics Data System (ADS)

    Mulyana, Tatang; Sebayang, Darwin; R, Akmal Muamar. D.; A, Jauharah H. D.; Yahya Shomit, M.

    2018-03-01

    The Indonesian state of archipelago has great wind energy potential. For micro-scale power generation, the energy obtained from the windmill can be connected directly to the electrical load and can be used without problems. However, for macro-scale power generation, problems will arise such as the design of vane shapes, there should be a simulation and an accurate experiment to produce blades with a special shape that can capture wind energy. In addition, daily and yearly wind and wind rate calculations are also required to ensure the best latitude and longitude positions for building windmills. This paper presents a solution to solve the problem of how to produce a windmill which in the builder is very practical and very mobile can be moved its location. Before a windmill prototype is built it should have obtained the best windmill design result. Therefore, the simulation of the designed windmill is of crucial importance. Solid simulation express is a tool that serves to generate simulation of a design. Some factors that can affect a design result include the power part and the rest part of the part, material selection, the load is given, the security of the design power made, and changes in shape due to treat the load given to the design made. In this paper, static and thermal simulations of windmills have been designed. Based on the simulation result on the designed windmill, it shows that the design has been made very satisfactory so that it can be done prototyping fabrication process.

  7. An Improved Protocol for Controlled Deterministic Secure Quantum Communication Using Five-Qubit Entangled State

    NASA Astrophysics Data System (ADS)

    Kao, Shih-Hung; Lin, Jason; Tsai, Chia-Wei; Hwang, Tzonelih

    2018-03-01

    In early 2009, Xiu et al. (Opt. Commun. 282(2) 333-337 2009) presented a controlled deterministic secure quantum communication (CDSQC) protocol via a newly constructed five-qubit entangled quantum state. Later, Qin et al. (Opt. Commun. 282(13), 2656-2658 2009) pointed out two security loopholes in Xiu et al.'s protocol: (1) A correlation-elicitation (CE) attack can reveal the entire secret message; (2) A leakage of partial information for the receiver is noticed. Then, Xiu et al. (Opt. Commun. 283(2), 344-347 2010) presented a revised CDSQC protocol to remedy the CE attack problem. However, the information leakage problem still remains open. This work proposes a new CDSQC protocol using the same five-qubit entangled state which can work without the above mentioned security problems. Moreover, the Trojan Horse attacks can be automatically avoided without using detecting devices in the new CDSQC.

  8. An Improved Protocol for Controlled Deterministic Secure Quantum Communication Using Five-Qubit Entangled State

    NASA Astrophysics Data System (ADS)

    Kao, Shih-Hung; Lin, Jason; Tsai, Chia-Wei; Hwang, Tzonelih

    2018-06-01

    In early 2009, Xiu et al. (Opt. Commun. 282(2) 333-337 2009) presented a controlled deterministic secure quantum communication (CDSQC) protocol via a newly constructed five-qubit entangled quantum state. Later, Qin et al. (Opt. Commun. 282(13), 2656-2658 2009) pointed out two security loopholes in Xiu et al.'s protocol: (1) A correlation-elicitation (CE) attack can reveal the entire secret message; (2) A leakage of partial information for the receiver is noticed. Then, Xiu et al. (Opt. Commun. 283(2), 344-347 2010) presented a revised CDSQC protocol to remedy the CE attack problem. However, the information leakage problem still remains open. This work proposes a new CDSQC protocol using the same five-qubit entangled state which can work without the above mentioned security problems. Moreover, the Trojan Horse attacks can be automatically avoided without using detecting devices in the new CDSQC.

  9. The global potential of bioenergy on abandoned agriculture lands.

    PubMed

    Campbell, J Elliott; Lobell, David B; Genova, Robert C; Field, Christopher B

    2008-08-01

    Converting forest lands into bioenergy agriculture could accelerate climate change by emitting carbon stored in forests, while converting food agriculture lands into bioenergy agriculture could threaten food security. Both problems are potentially avoided by using abandoned agriculture lands for bioenergy agriculture. Here we show the global potential for bioenergy on abandoned agriculture lands to be less than 8% of current primary energy demand, based on historical land use data, satellite-derived land cover data, and global ecosystem modeling. The estimated global area of abandoned agriculture is 385-472 million hectares, or 66-110% of the areas reported in previous preliminary assessments. The area-weighted mean production of above-ground biomass is 4.3 tons ha(-1) y(-1), in contrast to estimates of up to 10 tons ha(-1) y(-1) in previous assessments. The energy content of potential biomass grown on 100% of abandoned agriculture lands is less than 10% of primary energy demand for most nations in North America, Europe, and Asia, but it represents many times the energy demand in some African nations where grasslands are relatively productive and current energy demand is low.

  10. A Hybrid Location Method for Missile Security Team Positioning

    DTIC Science & Technology

    2007-01-01

    Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. A Hybrid Location Method for Missile Security...Bell and Weir A Hybrid Location Method for Missile Security Team Positioning Chief Master Sergeant Michael C. Dawson Air Force Logistics Management...problem oj locating security teams over a geographic area to maintain security Jor US Air Force Intercontinental Ballistic Missile Systems. A

  11. Final Technical Report. Project Boeing SGS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bell, Thomas E.

    Boeing and its partner, PJM Interconnection, teamed to bring advanced “defense-grade” technologies for cyber security to the US regional power grid through demonstration in PJM’s energy management environment. Under this cooperative project with the Department of Energy, Boeing and PJM have developed and demonstrated a host of technologies specifically tailored to the needs of PJM and the electric sector as a whole. The team has demonstrated to the energy industry a combination of processes, techniques and technologies that have been successfully implemented in the commercial, defense, and intelligence communities to identify, mitigate and continuously monitor the cyber security of criticalmore » systems. Guided by the results of a Cyber Security Risk-Based Assessment completed in Phase I, the Boeing-PJM team has completed multiple iterations through the Phase II Development and Phase III Deployment phases. Multiple cyber security solutions have been completed across a variety of controls including: Application Security, Enhanced Malware Detection, Security Incident and Event Management (SIEM) Optimization, Continuous Vulnerability Monitoring, SCADA Monitoring/Intrusion Detection, Operational Resiliency, Cyber Range simulations and hands on cyber security personnel training. All of the developed and demonstrated solutions are suitable for replication across the electric sector and/or the energy sector as a whole. Benefits identified include; Improved malware and intrusion detection capability on critical SCADA networks including behavioral-based alerts resulting in improved zero-day threat protection; Improved Security Incident and Event Management system resulting in better threat visibility, thus increasing the likelihood of detecting a serious event; Improved malware detection and zero-day threat response capability; Improved ability to systematically evaluate and secure in house and vendor sourced software applications; Improved ability to continuously monitor and maintain secure configuration of network devices resulting in reduced vulnerabilities for potential exploitation; Improved overall cyber security situational awareness through the integration of multiple discrete security technologies into a single cyber security reporting console; Improved ability to maintain the resiliency of critical systems in the face of a targeted cyber attack of other significant event; Improved ability to model complex networks for penetration testing and advanced training of cyber security personnel« less

  12. CHAMPION: Intelligent Hierarchical Reasoning Agents for Enhanced Decision Support

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hohimer, Ryan E.; Greitzer, Frank L.; Noonan, Christine F.

    2011-11-15

    We describe the design and development of an advanced reasoning framework employing semantic technologies, organized within a hierarchy of computational reasoning agents that interpret domain specific information. Designed based on an inspirational metaphor of the pattern recognition functions performed by the human neocortex, the CHAMPION reasoning framework represents a new computational modeling approach that derives invariant knowledge representations through memory-prediction belief propagation processes that are driven by formal ontological language specification and semantic technologies. The CHAMPION framework shows promise for enhancing complex decision making in diverse problem domains including cyber security, nonproliferation and energy consumption analysis.

  13. Science & Technology Review September 2017

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Duoss, Eric B.; Kotta, Paul R.; Meissner, Caryn N.

    This is the September 2017 edition of the LLNL, Science and Technology Review. At Lawrence Livermore National Laboratory, we focus on science and technology research to ensure our nation’s security. We also apply that expertise to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published eight times a year to communicate, to a broad audience, the Laboratory’s scientific and technological accomplishments in fulfilling its primary missions. The publication’s goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world.

  14. Innovative Surveillance and Risk Reduction Systems for Family Maltreatment, Suicidality, and Substance Problems in USAF

    DTIC Science & Technology

    2005-03-01

    prevention, spouse 13 abuse, child abuse , suicide, alcohol, drug abuse 16. PRICE CODE 17. SECURITY CLASSIFICA TION 18. SECURITY CLASSIFICA TION 19...cohesion 9 Triple P Command) • Spouse emotional 0 Depressive 9 Common Sense Parenting abuse symptomatology * Child abuse & neglect e Relationship...and secretive problems Partner Physical Prescr. Illicit Child Abuse Abuse Partner Emo. Abuse Alcohol Drug Drug Suicid- c3-to- Problems Misuse Use ality

  15. Afghanistan: Post-Taliban Governance, Security, and U.S. Policy

    DTIC Science & Technology

    2016-11-08

    Ogap Tsuka) delivered components of the third turbine to the dam, hoping to install it by 2010, but technical and security problems delayed the...that difficulty. The problem was further alleviated with better pay and other reforms, and the force composition is now roughly in line with that of...utilized extensively to reverse Taliban gains, and its roles as an elite force might be eroding. There problem of absenteeism within the ANA is in

  16. Afghanistan: Post Taliban Governance, Security, and U.S. Policy

    DTIC Science & Technology

    2017-01-12

    components of the third turbine to the dam, hoping to install it by 2010, but technical and security problems delayed the project. In 2013, USAID...Pashtuns, in reaction, refused recruitment, but the naming of a Pashtun as Defense Minister in December 2004 mitigated that difficulty. The problem ...utilized extensively to reverse Taliban gains, and its roles as an elite force might be eroding. The problem of absenteeism within the ANA is in

  17. Department of the Navy Transformation Plan FY 2014-2016

    DTIC Science & Technology

    2014-01-01

    SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF...with the competing realities of shrinking defense budgets and rising maritime security challenges. Throughout our history, the Navy and Marine...DON continues to support alternative energy efforts, realizing that energy independence is vital to our national security and the safety of our

  18. 78 FR 5438 - Proposed Agency Information Collection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-25

    ... DEPARTMENT OF ENERGY National Nuclear Security Administration Proposed Agency Information Collection AGENCY: National Nuclear Security Administration, U.S. Department of Energy. ACTION: Notice and... techniques or other forms of information technology. DATES: Comments regarding this proposed information...

  19. Common Criteria Related Security Design Patterns for Intelligent Sensors—Knowledge Engineering-Based Implementation

    PubMed Central

    Bialas, Andrzej

    2011-01-01

    Intelligent sensors experience security problems very similar to those inherent to other kinds of IT products or systems. The assurance for these products or systems creation methodologies, like Common Criteria (ISO/IEC 15408) can be used to improve the robustness of the sensor systems in high risk environments. The paper presents the background and results of the previous research on patterns-based security specifications and introduces a new ontological approach. The elaborated ontology and knowledge base were validated on the IT security development process dealing with the sensor example. The contribution of the paper concerns the application of the knowledge engineering methodology to the previously developed Common Criteria compliant and pattern-based method for intelligent sensor security development. The issue presented in the paper has a broader significance in terms that it can solve information security problems in many application domains. PMID:22164064

  20. Common criteria related security design patterns for intelligent sensors--knowledge engineering-based implementation.

    PubMed

    Bialas, Andrzej

    2011-01-01

    Intelligent sensors experience security problems very similar to those inherent to other kinds of IT products or systems. The assurance for these products or systems creation methodologies, like Common Criteria (ISO/IEC 15408) can be used to improve the robustness of the sensor systems in high risk environments. The paper presents the background and results of the previous research on patterns-based security specifications and introduces a new ontological approach. The elaborated ontology and knowledge base were validated on the IT security development process dealing with the sensor example. The contribution of the paper concerns the application of the knowledge engineering methodology to the previously developed Common Criteria compliant and pattern-based method for intelligent sensor security development. The issue presented in the paper has a broader significance in terms that it can solve information security problems in many application domains.

  1. Permeable pavement and stormwater management systems: a review.

    PubMed

    Imran, H M; Akib, Shatirah; Karim, Mohamed Rehan

    2013-01-01

    Uncontrolled stormwater runoff not only creates drainage problems and flash floods but also presents a considerable threat to water quality and the environment. These problems can, to a large extent, be reduced by a type of stormwater management approach employing permeable pavement systems (PPS) in urban, industrial and commercial areas, where frequent problems are caused by intense undrained stormwater. PPS could be an efficient solution for sustainable drainage systems, and control water security as well as renewable energy in certain cases. Considerable research has been conducted on the function of PPS and their improvement to ensure sustainable drainage systems and water quality. This paper presents a review of the use of permeable pavement for different purposes. The paper focuses on drainage systems and stormwater runoff quality from roads, driveways, rooftops and parking lots. PPS are very effective for stormwater management and water reuse. Moreover, geotextiles provide additional facilities to reduce the pollutants from infiltrate runoff into the ground, creating a suitable environment for the biodegradation process. Furthermore, recently, ground source heat pumps and PPS have been found to be an excellent combination for sustainable renewable energy. In addition, this study has identified several gaps in the present state of knowledge on PPS and indicates some research needs for future consideration.

  2. Less waste corn, more land in soybeans, and the switch to genetically modified crops: Trends with important implications for wildlife management

    USGS Publications Warehouse

    Krapu, G.L.; Brandt, D.A.; Cox, R.R.

    2004-01-01

    American agriculture has provided abundant high-energy foods for migratory and resident wildlife populations since the onset of modern wildlife management. Responding to anecdotal evidence that corn residues are declining in cropland, we remeasured waste corn post-harvest in the Central Platte River Valley (CPRV) of Nebraska during 1997 and 1998 to compare with 1978. Post-harvest waste corn averaged 2.6% and 1.8% of yield in 1997 and 1998, respectively. After accounting for a 20% increase in yield, waste corn in 1997 and 1998 was reduced 24% and 47% from 1978. We also evaluated use of soybeans by spring-staging sandhill cranes (Crus canadensis) and waterfowl during spring 1998 and 1999. Despite being widely available in the CPRV, soybeans did not occur in esophageal contents of sandhill cranes (n=174), northern pintails (Anas acuta, n=139), greater white-fronted geese (Anser albifrons, n=198), or lesser snow geese (Chen caerulescens, n=208) collected with food in their esophagi. Lack of soybean consumption by cranes and waterfowl in Nebraska in early spring builds upon previously published findings, suggesting that soybeans are poorly suited for meeting nutrient needs of wildlife requiring a high-energy diet. Given evidence that high-energy food and numerous populations of seed-eating species found on farmland are declining, and the enormous potential risk to game and nongame wildlife populations if high-energy foods were to become scarce, a comprehensive research effort to study the problem appears warranted. Provisions under the Conservation Security subtitle of The Farm Security and Rural Investment Act of 2002 offer a potential mechanism to encourage producers to manage cropland in ways that would replace part of the high-energy foods that have been lost to increasing efficiency of production agriculture.

  3. Protecting software agents from malicious hosts using quantum computing

    NASA Astrophysics Data System (ADS)

    Reisner, John; Donkor, Eric

    2000-07-01

    We evaluate how quantum computing can be applied to security problems for software agents. Agent-based computing, which merges technological advances in artificial intelligence and mobile computing, is a rapidly growing domain, especially in applications such as electronic commerce, network management, information retrieval, and mission planning. System security is one of the more eminent research areas in agent-based computing, and the specific problem of protecting a mobile agent from a potentially hostile host is one of the most difficult of these challenges. In this work, we describe our agent model, and discuss the capabilities and limitations of classical solutions to the malicious host problem. Quantum computing may be extremely helpful in addressing the limitations of classical solutions to this problem. This paper highlights some of the areas where quantum computing could be applied to agent security.

  4. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks.

    PubMed

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-11

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.

  5. Can Parenting Intervention Prevent Cascading Effects From Placement Instability to Insecure Attachment to Externalizing Problems in Maltreated Toddlers?

    PubMed

    Pasalich, Dave S; Fleming, Charles B; Oxford, Monica L; Zheng, Yao; Spieker, Susan J

    2016-08-01

    Multiple placement changes disrupt continuity in caregiving and undermine well-being in children in child welfare. This study conducted secondary data analysis of a randomized controlled trial to examine whether a relationship-based intervention, Promoting First Relationships(©) (PFR), reduced risk for a maladaptive cascade from placement instability to less secure attachment to elevated externalizing problems. Participants included caregivers (birth or foster/kin) of toddlers (10-24 months) recently transitioned to their care because of child welfare placement decisions. Although main effects of PFR on security and externalizing problems were not previously observed, this study's results revealed that PFR attenuated the association between multiple placement changes (baseline) and less security (postintervention) and that the indirect effect of placement instability on greater externalizing problems (6-month follow-up) via less security was evident only in toddlers in the comparison condition. These findings shed light on how a history of multiple caregiver changes may influence toddlers' risk for poor adjustment in subsequent placements, and the promise of supporting caregivers through a parenting intervention to prevent such risk. © The Author(s) 2016.

  6. Can parenting intervention prevent cascading effects from placement instability to insecure attachment to externalizing problems in maltreated toddlers?

    PubMed Central

    Pasalich, Dave S.; Fleming, Charles B.; Oxford, Monica L.; Zheng, Yao; Spieker, Susan J.

    2016-01-01

    Multiple placement changes disrupt continuity in caregiving and undermine well-being in children in child welfare. This study conducted secondary data analysis of a randomized controlled trial to examine whether a relationship-based intervention, Promoting First Relationships© (PFR), reduced risk for a maladaptive cascade from placement instability to less secure attachment to elevated externalizing problems. Participants included caregivers (birth or foster/kin) of toddlers (10–24 months) recently transitioned to their care because of child welfare placement decisions. Although main effects of PFR on security and externalizing problems were not previously observed, this study’s results revealed that PFR attenuated the association between multiple placement changes (baseline) and less security (postintervention), and that the indirect effect of placement instability on greater externalizing problems (6-month follow-up) via less security was evident only in toddlers in the comparison condition. These findings shed light on how a history of multiple caregiver changes may influence toddlers’ risk for poor adjustment in subsequent placements, and the promise of supporting caregivers through a parenting intervention to prevent such risk. PMID:27381935

  7. Engage States on Energy Assurance and Energy Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kara Colton; John Ratliff; Sue Gander

    2008-09-30

    The NGA Center's 'Engaging States on Energy Security and Energy Assurance' has been successful in achieving the stated project purposes and objectives both in the initial proposal as well as in subsequent revisions to it. Our activities, which involve the NGA Center for Best Practices (The NGA Center) Homeland Security and Technology Division, included conducting tabletop exercises to help federal and state homeland security and energy officials determine roles and actions for various emergency scenarios. This included efforts to education state official on developing an energy assurance plan, harmonizing approaches to controlling price volatility, implementing reliability standards, understanding short andmore » long-term energy outlooks and fuel diversification, and capitalizing on DOE's research and development activities. Regarding our work on energy efficiency and renewable energy, the NGA Center's Environment, Energy and Natural Resources Division hosted three workshops which engaged states on the clean energy and alternative transportation fuel and also produced several reports on related topics. In addition, we convened 18 meetings, via conference call, of the Energy Working Group. Finally, through the NGA Center's Front and Center newsletter articles, the NGA Center disseminated promising practices to a wide audience of state policymakers. The NGA Center also hosted a number of workshops and web conferences designed to directly engage states on the deliverables under this Cooperative Agreement. Through the NGA Center's written products and newsletter articles, the NGA Center was able to disseminate promising practices to a wide audience of state policymakers.« less

  8. 10 CFR 1046.15 - Training and qualification for security skills and knowledge.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Training and qualification for security skills and... SECURITY INTERESTS Protective Force Personnel § 1046.15 Training and qualification for security skills and... and Qualification for Security Skills and Knowledge,” to this subpart. The DOE contractor shall...

  9. Fuzzy Random λ-Mean SAD Portfolio Selection Problem: An Ant Colony Optimization Approach

    NASA Astrophysics Data System (ADS)

    Thakur, Gour Sundar Mitra; Bhattacharyya, Rupak; Mitra, Swapan Kumar

    2010-10-01

    To reach the investment goal, one has to select a combination of securities among different portfolios containing large number of securities. Only the past records of each security do not guarantee the future return. As there are many uncertain factors which directly or indirectly influence the stock market and there are also some newer stock markets which do not have enough historical data, experts' expectation and experience must be combined with the past records to generate an effective portfolio selection model. In this paper the return of security is assumed to be Fuzzy Random Variable Set (FRVS), where returns are set of random numbers which are in turn fuzzy numbers. A new λ-Mean Semi Absolute Deviation (λ-MSAD) portfolio selection model is developed. The subjective opinions of the investors to the rate of returns of each security are taken into consideration by introducing a pessimistic-optimistic parameter vector λ. λ-Mean Semi Absolute Deviation (λ-MSAD) model is preferred as it follows absolute deviation of the rate of returns of a portfolio instead of the variance as the measure of the risk. As this model can be reduced to Linear Programming Problem (LPP) it can be solved much faster than quadratic programming problems. Ant Colony Optimization (ACO) is used for solving the portfolio selection problem. ACO is a paradigm for designing meta-heuristic algorithms for combinatorial optimization problem. Data from BSE is used for illustration.

  10. Incorporating voltage security into the planning, operation and monitoring of restructured electric energy markets

    NASA Astrophysics Data System (ADS)

    Nair, Nirmal-Kumar

    As open access market principles are applied to power systems, significant changes are happening in their planning, operation and control. In the emerging marketplace, systems are operating under higher loading conditions as markets focus greater attention to operating costs than stability and security margins. Since operating stability is a basic requirement for any power system, there is need for newer tools to ensure stability and security margins being strictly enforced in the competitive marketplace. This dissertation investigates issues associated with incorporating voltage security into the unbundled operating environment of electricity markets. It includes addressing voltage security in the monitoring, operational and planning horizons of restructured power system. This dissertation presents a new decomposition procedure to estimate voltage security usage by transactions. The procedure follows physical law and uses an index that can be monitored knowing the state of the system. The expression derived is based on composite market coordination models that have both PoolCo and OpCo transactions, in a shared stressed transmission grid. Our procedure is able to equitably distinguish the impacts of individual transactions on voltage stability, at load buses, in a simple and fast manner. This dissertation formulates a new voltage stability constrained optimal power flow (VSCOPF) using a simple voltage security index. In modern planning, composite power system reliability analysis that encompasses both adequacy and security issues is being developed. We have illustrated the applicability of our VSCOPF into composite reliability analysis. This dissertation also delves into the various applications of voltage security index. Increasingly, FACT devices are being used in restructured markets to mitigate a variety of operational problems. Their control effects on voltage security would be demonstrated using our VSCOPF procedure. Further, this dissertation investigates the application of steady state voltage stability index to detect potential dynamic voltage collapse. Finally, this dissertation examines developments in representation, standardization, communication and exchange of power system data. Power system data is the key input to all analytical engines for system operation, monitoring and control. Data exchange and dissemination could impact voltage security evaluation and therefore needs to be critically examined.

  11. High tonnage forest biomass production systems from southern pine energy plantations

    Treesearch

    P. Jernigan; T. Gallagher; Dana Mitchell; L. Teeter

    2011-01-01

    The topic of declining fossil fuels and the absolute need for renewable energy sources is very evident in today’s society. The utilization of bio-fuels is necessary to meet goals set forth in the Energy Independence and Security Act of 2007. Included in the act are standards in which bio-fuels will play a major role in ensuring national energy security and the...

  12. The European Union’s Energy Security Challenges

    DTIC Science & Technology

    2007-01-26

    NATO’s summit in Riga, Latvia in November 2006. Members of the Democratic Leadership in the 110th Congress have signaled their intention to introduce...cooperation through the development of international energy partnerships. Members of the Democratic Leadership in the 110th Congress have signaled their...surrounding global energy supply and demand persist, energy security issues are likely to gain importance in the 110th Congress. Members of the Democratic

  13. Information Data Security Specialists' and Business Leaders' Experiences Regarding Communication Challenges

    ERIC Educational Resources Information Center

    Lopez, Robert H.

    2012-01-01

    The problem addressed was the need to maintain data security in the field of information technology. Specifically, the breakdown of communication between business leaders and data security specialists create risks to data security. The purpose of this qualitative phenomenological study was to determine which factors would improve communication…

  14. Securing medical research: a cybersecurity point of view.

    PubMed

    Schneier, Bruce

    2012-06-22

    The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough to ensure the security of existing data sets. Lessons from cryptography illustrate that neither secrecy measures, such as deleting technical details, nor national solutions, such as export controls, will work.

  15. 76 FR 65768 - ADS Media Group, Inc., American Enterprise Development Corp., and Arcland Energy Corp.; Order of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-24

    ... Development Corp., and Arcland Energy Corp.; Order of Suspension of Trading October 20, 2011. It appears to... current and accurate information concerning the securities of American Enterprise Development Corp... securities of Arcland Energy Corp. because it has not filed any periodic reports since the period ended April...

  16. Science & Technology Review October/November 2016

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vogt, R. L.; Meissner, C. N.; Kotta, P. R.

    At Lawrence Livermore National Laboratory, we focus on science and technology research to ensure our nation’s security. We also apply that expertise to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published eight times a year to communicate, to a broad audience, the Laboratory’s scientific and technological accomplishments in fulfilling its primary missions. The publication’s goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world. The Laboratory is operated by Lawrence Livermore National Security, LLC (LLNS), for the Department of Energy’smore » National Nuclear Security Administration. LLNS is a partnership involving Bechtel National, University of California, Babcock & Wilcox, Washington Division of URS Corporation, and Battelle in affiliation with Texas A&M University. More information about LLNS is available online at www.llnsllc.com. Please address any correspondence (including name and address changes) to S&TR, Mail Stop L-664, Lawrence Livermore National Laboratory, P.O. Box 808, Livermore, California 94551, or telephone (925) 423-3893. Our e-mail address is str-mail@llnl.gov. S&TR is available on the Web at str.llnl.gov.« less

  17. Food security: contributions from science to a new and greener revolution

    PubMed Central

    Beddington, John

    2010-01-01

    There is an intrinsic link between the challenge we face to ensure food security through the twenty-first century and other global issues, most notably climate change, population growth and the need to sustainably manage the world's rapidly growing demand for energy and water. Our progress in reducing global poverty and achieving the Millennium Development Goals will be determined to a great extent by how coherently these long-term challenges are tackled. A key question is whether we can feed a future nine billion people equitably, healthily and sustainably. Science and technology can make a major contribution, by providing practical solutions. Securing this contribution requires that high priority be attached both to research and to facilitating the real world deployment of existing and emergent technologies. Put simply, we need a new, ‘greener revolution’. Important areas for focus include: crop improvement; smarter use of water and fertilizers; new pesticides and their effective management to avoid resistance problems; introduction of novel non-chemical approaches to crop protection; reduction of post-harvest losses; and more sustainable livestock and marine production. Techniques and technologies from many disciplines, ranging from biotechnology and engineering to newer fields such as nanotechnology, will be needed. PMID:20008386

  18. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    PubMed

    Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong

    2013-01-01

    The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  19. Forging the Solution to the Energy Challenge: The Role of Materials Science and Materials Scientists

    NASA Astrophysics Data System (ADS)

    Wadsworth, Jeffrey

    2010-04-01

    The energy challenge is central to the most important strategic problems facing the United States and the world. It is increasingly clear that even large-scale deployments of the best technologies available today cannot meet the rising energy demands of a growing world population. Achieving a secure and sustainable energy future will require full utilization of, and substantial improvements in, a comprehensive portfolio of energy systems and technologies. This goal is complicated by several factors. First, energy strategies are inextricably linked to national security and health issues. Second, in developing and deploying energy technologies, it is vital to consider not only environmental issues, such as global climate change, but also economic considerations, which strongly influence both public and political views on energy policy. Third, a significant and sustained effort in basic and applied research and development (R&D) will be required to deliver the innovations needed to ensure a desirable energy future. Innovations in materials science and engineering are especially needed to overcome the limits of essentially all energy technologies. A wealth of historical evidence demonstrates that such innovations are also the key to economic prosperity. From the development of the earliest cities around flint-trading centers, to the Industrial Revolution, to today’s silicon-based global economy, the advantage goes to those who lead in exploiting materials. I view our challenge by considering the rate of innovation and the transition of discovery to the marketplace as the relationship among R&D investment, a skilled and talented workforce, business innovations, and the activities of competitors. Most disturbing in analyzing this relationship is the need for trained workers in science, technology, engineering, and mathematics (STEM). To develop the STEM workforce needed for innovation, we need sustainable, positive change in STEM education at all levels from preschool through postgraduate. Materials sciences can be a significant magnet in attracting students to STEM areas, and a focused effort is needed to ensure that it is included in STEM programs. From this effort will come the next generation of materials scientists and the innovations that will enable us to overcome the energy challenge.

  20. Forging the Solution to the Energy Challenge: The Role of Materials Science and Materials Scientists

    NASA Astrophysics Data System (ADS)

    Wadsworth, Jeffrey

    2010-05-01

    The energy challenge is central to the most important strategic problems facing the United States and the world. It is increasingly clear that even large-scale deployments of the best technologies available today cannot meet the rising energy demands of a growing world population. Achieving a secure and sustainable energy future will require full utilization of, and substantial improvements in, a comprehensive portfolio of energy systems and technologies. This goal is complicated by several factors. First, energy strategies are inextricably linked to national security and health issues. Second, in developing and deploying energy technologies, it is vital to consider not only environmental issues, such as global climate change, but also economic considerations, which strongly influence both public and political views on energy policy. Third, a significant and sustained effort in basic and applied research and development (R&D) will be required to deliver the innovations needed to ensure a desirable energy future. Innovations in materials science and engineering are especially needed to overcome the limits of essentially all energy technologies. A wealth of historical evidence demonstrates that such innovations are also the key to economic prosperity. From the development of the earliest cities around flint-trading centers, to the Industrial Revolution, to today’s silicon-based global economy, the advantage goes to those who lead in exploiting materials. I view our challenge by considering the rate of innovation and the transition of discovery to the marketplace as the relationship among R&D investment, a skilled and talented workforce, business innovations, and the activities of competitors. Most disturbing in analyzing this relationship is the need for trained workers in science, technology, engineering, and mathematics (STEM). To develop the STEM workforce needed for innovation, we need sustainable, positive change in STEM education at all levels from preschool through postgraduate. Materials sciences can be a significant magnet in attracting students to STEM areas, and a focused effort is needed to ensure that it is included in STEM programs. From this effort will come the next generation of materials scientists and the innovations that will enable us to overcome the energy challenge.

  1. A Qualitative Meta-Analysis of the Diffusion of Mandated and Subsidized Technology: United States Energy Security and Independence

    ERIC Educational Resources Information Center

    Noah, Philip D., Jr.

    2013-01-01

    The purpose of this research project was to explore what the core factors are that play a role in the development of the smart-grid. This research study examined The Energy Independence and Security Act (EISA) of 2007 as it pertains to the smart-grid, the economic and security effects of the smart grid, and key factors for its success. The…

  2. Density-to-Potential Inversions to Guide Development of Exchange-Correlation Approximations at Finite Temperature

    NASA Astrophysics Data System (ADS)

    Jensen, Daniel; Wasserman, Adam; Baczewski, Andrew

    The construction of approximations to the exchange-correlation potential for warm dense matter (WDM) is a topic of significant recent interest. In this work, we study the inverse problem of Kohn-Sham (KS) DFT as a means of guiding functional design at zero temperature and in WDM. Whereas the forward problem solves the KS equations to produce a density from a specified exchange-correlation potential, the inverse problem seeks to construct the exchange-correlation potential from specified densities. These two problems require different computational methods and convergence criteria despite sharing the same mathematical equations. We present two new inversion methods based on constrained variational and PDE-constrained optimization methods. We adapt these methods to finite temperature calculations to reveal the exchange-correlation potential's temperature dependence in WDM-relevant conditions. The different inversion methods presented are applied to both non-interacting and interacting model systems for comparison. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Security Administration under contract DE-AC04-94.

  3. A Lightweight Protocol for Secure Video Streaming

    PubMed Central

    Morkevicius, Nerijus; Bagdonas, Kazimieras

    2018-01-01

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988

  4. A Lightweight Protocol for Secure Video Streaming.

    PubMed

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  5. Efficient Simulation of Compressible, Viscous Fluids using Multi-rate Time Integration

    NASA Astrophysics Data System (ADS)

    Mikida, Cory; Kloeckner, Andreas; Bodony, Daniel

    2017-11-01

    In the numerical simulation of problems of compressible, viscous fluids with single-rate time integrators, the global timestep used is limited to that of the finest mesh point or fastest physical process. This talk discusses the application of multi-rate Adams-Bashforth (MRAB) integrators to an overset mesh framework to solve compressible viscous fluid problems of varying scale with improved efficiency, with emphasis on the strategy of timescale separation and the application of the resulting numerical method to two sample problems: subsonic viscous flow over a cylinder and a viscous jet in crossflow. The results presented indicate the numerical efficacy of MRAB integrators, outline a number of outstanding code challenges, demonstrate the expected reduction in time enabled by MRAB, and emphasize the need for proper load balancing through spatial decomposition in order for parallel runs to achieve the predicted time-saving benefit. This material is based in part upon work supported by the Department of Energy, National Nuclear Security Administration, under Award Number DE-NA0002374.

  6. Energy and Environmental Insecurity (Joint Force Quarterly, Issue 55, 4th Quarter 2009)

    DTIC Science & Technology

    2009-01-01

    Energy and Environmental Insecurity By r i c h a r D B . a n D r e s Dr. Richard B. Andres is Energy and Environment Security and Policy Chair in...security, they are as likely referring to carbon emissions as to energy self -reliance and affordable oil. Moreover, the solutions that the international...2009 4. TITLE AND SUBTITLE Energy and Environmental Insecurity 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d

  7. An evaluation of the ecological and environmental security on China's terrestrial ecosystems.

    PubMed

    Zhang, Hongqi; Xu, Erqi

    2017-04-11

    With rapid economic growth, industrialization, and urbanization, various ecological and environmental problems occur, which threaten and undermine the sustainable development and domestic survival of China. On the national scale, our progress remains in a state of qualitative or semi-quantitative evaluation, lacking a quantitative evaluation and a spatial visualization of ecological and environmental security. This study collected 14 indictors of water, land, air, and biodiversity securities to compile a spatial evaluation of ecological and environmental security in terrestrial ecosystems of China. With area-weighted normalization and scaling transformations, the veto aggregation (focusing on the limit indicator) and balanced aggregation (measuring balanced performance among different indicators) methods were used to aggregate security evaluation indicators. Results showed that water, land, air, and biodiversity securities presented different spatial distributions. A relatively serious ecological and environmental security crisis was found in China, but presented an obviously spatial variation of security evaluation scores. Hotspot areas at the danger level, which are scattered throughout the entirety of the country, were identified. The spatial diversities and causes of ecological and environmental problems in different regions were analyzed. Spatial integration of regional development and proposals for improving the ecological and environmental security were put forward.

  8. 10 CFR 2.904 - Classification assistance.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Classification assistance. 2.904 Section 2.904 Energy... Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.904 Classification... security classification of information and the safeguards to be observed. ...

  9. 10 CFR 2.904 - Classification assistance.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Classification assistance. 2.904 Section 2.904 Energy... Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.904 Classification... security classification of information and the safeguards to be observed. ...

  10. The Management and Security Expert (MASE)

    NASA Technical Reports Server (NTRS)

    Miller, Mark D.; Barr, Stanley J.; Gryphon, Coranth D.; Keegan, Jeff; Kniker, Catherine A.; Krolak, Patrick D.

    1991-01-01

    The Management and Security Expert (MASE) is a distributed expert system that monitors the operating systems and applications of a network. It is capable of gleaning the information provided by the different operating systems in order to optimize hardware and software performance; recognize potential hardware and/or software failure, and either repair the problem before it becomes an emergency, or notify the systems manager of the problem; and monitor applications and known security holes for indications of an intruder or virus. MASE can eradicate much of the guess work of system management.

  11. ADVANCED CERAMIC MATERIALS FOR NEXT-GENERATION NUCLEAR APPLICATIONS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Marra, J.

    2010-09-29

    Rising global energy demands coupled with increased environmental concerns point to one solution; they must reduce their dependence on fossil fuels that emit greenhouse gases. As the global community faces the challenge of maintaining sovereign nation security, reducing greenhouse gases, and addressing climate change nuclear power will play a significant and likely growing role. In the US, nuclear energy already provides approximately one-fifth of the electricity used to power factories, offices, homes, and schools with 104 operating nuclear power plants, located at 65 sites in 31 states. Additionally, 19 utilities have applied to the US Nuclear Regulatory Commission (NRC) formore » construction and operating licenses for 26 new reactors at 17 sites. This planned growth of nuclear power is occurring worldwide and has been termed the 'nuclear renaissance.' As major industrial nations craft their energy future, there are several important factors that must be considered about nuclear energy: (1) it has been proven over the last 40 years to be safe, reliable and affordable (good for Economic Security); (2) its technology and fuel can be domestically produced or obtained from allied nations (good for Energy Security); and (3) it is nearly free of greenhouse gas emissions (good for Environmental Security). Already an important part of worldwide energy security via electricity generation, nuclear energy can also potentially play an important role in industrial processes and supporting the nation's transportation sector. Coal-to-liquid processes, the generation of hydrogen and supporting the growing potential for a greatly increased electric transportation system (i.e. cars and trains) mean that nuclear energy could see dramatic growth in the near future as we seek to meet our growing demand for energy in cleaner, more secure ways. In order to address some of the prominent issues associated with nuclear power generation (i.e., high capital costs, waste management, and proliferation), the worldwide community is working to develop and deploy new nuclear energy systems and advanced fuel cycles. These new nuclear systems address the key challenges and include: (1) extracting the full energy value of the nuclear fuel; (2) creating waste solutions with improved long term safety; (3) minimizing the potential for the misuse of the technology and materials for weapons; (4) continually improving the safety of nuclear energy systems; and (5) keeping the cost of energy affordable.« less

  12. Smaller Communities Program, Stone County, Mississippi. Part I: Economic Base Report; Part II: Manpower Resource Report.

    ERIC Educational Resources Information Center

    Mississippi Employment Security Commission, Jackson.

    The 2-part document, published by the Mississippi Employment Security Commission, relates to the Smaller Communities Program conducted during 1969 to help alleviate employment problems in rural areas of Mississippi and to provide employment services in areas with varying economic problems. Based on data secured from Federal, state, and private…

  13. Global Food Security Problems in the Modern World Economy

    ERIC Educational Resources Information Center

    Abdulkadyrova, Madina A.; Dikinov, Andzor H.; Tajmashanov, Hassan È.; Shidaev, Lomali A.; Shidaeva, Eliza A.

    2016-01-01

    Importance: Food problem at the present stage of development of mankind is that due to improper and overly intensive use of natural resources, increasing demand for livestock products, increasing per capita food consumption and other factors, there has been a steady rise in food prices, represents a threat to food security in the countries with…

  14. Oil Dependence, Climate Change and Energy Security: Will Constraints on Oil Shape our Climate Future or Vice Versa?

    NASA Astrophysics Data System (ADS)

    Mignone, B. K.

    2008-12-01

    Threats to US and global energy security take several forms. First, the overwhelming dependence on oil in the transport sector leaves the US economy (and others) vulnerable to supply shocks and price volatility. Secondly, the global dependence on oil inflates prices and enhances the transfer of wealth to authoritarian regimes. Finally, the global reliance on fossil fuels more generally jeopardizes the stability of the climate system. These three threats - economic, strategic and environmental - can only be mitigated through a gradual substitution away from fossil fuels (both coal and oil) on a global scale. Such large-scale substitution could occur in response to potential resource constraints or in response to coordinated government policies in which these externalities are explicitly internalized. Here, I make use of a well-known integrated assessment model (MERGE) to examine both possibilities. When resource limits are considered alone, global fuel use tends to shift toward even more carbon-intensive resources, like oil shale or liquids derived from coal. On the other hand, when explicit carbon constraints are imposed, the fuel sector response is more complex. Generally, less stringent climate targets can be satisfied entirely through reductions in global coal consumption, while more stringent targets require simultaneous reductions in both coal and oil consumption. Taken together, these model results suggest that resource constraints alone will only exacerbate the climate problem, while a subset of policy-driven carbon constraints may yield tangible security benefits (in the form of reduced global oil consumption) in addition to the intended environmental outcome.

  15. 17 CFR 229.308 - (Item 308) Internal control over financial reporting.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...

  16. 17 CFR 229.308 - (Item 308) Internal control over financial reporting.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...

  17. 17 CFR 229.308 - (Item 308) Internal control over financial reporting.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...

  18. 17 CFR 229.308 - (Item 308) Internal control over financial reporting.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...

  19. American Security and the International Energy Situation. Volume 1. Introduction and Summary

    DTIC Science & Technology

    1975-04-15

    Financial Security 28 Timely Energy Supply Enhancement 31 Prospects for a Price Break M Concluding Remarks ’♦S II. World Energy Interdependence...likely to experience as the level of social and political chaos rises under the pressures of economic contraction, financial hemorrhage, and pervasive...and Consolidated Edison’s punned storage facility planned for Storm King). Often, energy projects are delayed from the very beginning by vocal

  20. 32 CFR 216.2 - Applicability.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... with the Department of Homeland Security (DHS), to the Coast Guard at all times, including when it is a service in the Department of Homeland Security. The policies herein also affect the Departments of Transportation, Homeland Security, Energy (National Nuclear Security Administration), the Central Intelligence...

  1. 32 CFR 216.2 - Applicability.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... with the Department of Homeland Security (DHS), to the Coast Guard at all times, including when it is a service in the Department of Homeland Security. The policies herein also affect the Departments of Transportation, Homeland Security, Energy (National Nuclear Security Administration), the Central Intelligence...

  2. 32 CFR 216.2 - Applicability.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... with the Department of Homeland Security (DHS), to the Coast Guard at all times, including when it is a service in the Department of Homeland Security. The policies herein also affect the Departments of Transportation, Homeland Security, Energy (National Nuclear Security Administration), the Central Intelligence...

  3. P.L. 110-140, "Energy Independence and Security Act of 2007" (2007)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2007-12-13

    An act to move the United States toward greater energy independence and security, to increase the production of clean renewable fuels, to protect consumers, to increase the efficiency of products, buildings, and vehicles, to promote research on and deploy greenhouse gas capture and storage options, and to improve the energy performance of the Federal Government, and for other purposes.

  4. 78 FR 56264 - Big Bear Mining Corp., Four Rivers BioEnergy, Inc., Mainland Resources, Inc., QI Systems Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-12

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Big Bear Mining Corp., Four Rivers BioEnergy, Inc., Mainland Resources, Inc., QI Systems Inc., South Texas Oil Co., and Synova Healthcare Group, Inc... concerning the securities of Four Rivers BioEnergy, Inc. because it has not filed any periodic reports since...

  5. Better Safe than Sorry: Panic Buttons as a Security Measure in an Academic Medical Library

    ERIC Educational Resources Information Center

    McMullen, Karen D.; Kane, Laura Townsend

    2008-01-01

    In the wake of recent tragedies, campus security has become a hot issue nationwide. Campus libraries, as traditional meeting spots for varied groups of people, are particularly vulnerable to security issues. Safety and security problems that can occur at any library generally include theft, vandalism, arson, antisocial behavior, and assaults on…

  6. The food production and consumption balance in sub-Saharan Africa under different SSPs, from 2010 to 2050

    NASA Astrophysics Data System (ADS)

    Wada, Y.; Luan, Y.; Fischer, G.; Sun, L.; Shi, P.

    2015-12-01

    Forcing with the population growth and consequently increasing food requirement, food security in sub-Saharan Africa is one of the most emergent and challenging issues. The purposes of this work are 1) what's the future food requirement and their food security status in each sub-Saharan African countries? What is the distance from current and future food security status, corresponding to the food requirement, to the targeted food security status? 2) To what extent Sub-Saharan countries could meet their present and future food requirement, and whether they have potential to improve their food insecurity status on currently cultivated land? 3) Whether or, if there have, how the pressures on land resources from meeting the food requirements? To figure those questions out, we firstly use socio-economic pathways datasets, and historical food diet pattern classification to forecast the 2010-2050 food commodity and feed calories demand per country. A new food security indicator, which considered the influences of both the food energy and quality intake, was used to evaluate the food insecurity status and the distances to different targeted statuses of the specific country. The latest Global Agro-Ecological Zones (GAEZ) databases were used to estimate the current and future crop yield gap and crop potential production. For current to future scenario analysis, we considered population growth, dietary change, climate change, agricultural input level, and target food security status. Then the balance of food requirement with the current and potential crop production was analyzed for different scenarios. Land requirements were calculated for meeting those food requirements, and the pressures on land resources are evaluated. Our works are hoping to provide scientific-based evidences for policy recommendations for local government to tackle food insecurity problems in Sub-Saharan Africa.

  7. Transportation's oil dependence and energy security in the 21st century

    DOT National Transportation Integrated Search

    1997-10-01

    The persistent and in many parts of the world rapid motorization of transport is intensifying global dependence on petroleum. Transportation's global oil dependence poses real energy security risks for the first few decades of the 21st century, at le...

  8. German Energy Security and Its Implications on Regional Security

    DTIC Science & Technology

    2016-12-01

    Daniel Moran THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this...280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. 239-18 ii THIS PAGE INTENTIONALLY LEFT BLANK iii Approved for public...independence.17 In the 1980s and 1990s, Esakova points out that energy security took a more economic form , with countries focusing on protecting their

  9. Securing global trade through secure freight transportation : final report.

    DOT National Transportation Integrated Search

    2009-12-16

    Given the increased probability of disruptions to global supply chains, and the significant impact these have on national and global economies, the problem is how to secure global trade. The concept of a global trade chain-of-custody has been develop...

  10. School Security Technologies

    ERIC Educational Resources Information Center

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  11. Pacific Northwest National Laboratory institutional plan FY 1997--2002

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1996-10-01

    Pacific Northwest National Laboratory`s core mission is to deliver environmental science and technology in the service of the nation and humanity. Through basic research fundamental knowledge is created of natural, engineered, and social systems that is the basis for both effective environmental technology and sound public policy. Legacy environmental problems are solved by delivering technologies that remedy existing environmental hazards, today`s environmental needs are addressed with technologies that prevent pollution and minimize waste, and the technical foundation is being laid for tomorrow`s inherently clean energy and industrial processes. Pacific Northwest National Laboratory also applies its capabilities to meet selected nationalmore » security, energy, and human health needs; strengthen the US economy; and support the education of future scientists and engineers. Brief summaries are given of the various tasks being carried out under these broad categories.« less

  12. Research of carbon composite material for nonlinear finite element method

    NASA Astrophysics Data System (ADS)

    Kim, Jung Ho; Garg, Mohit; Kim, Ji Hoon

    2012-04-01

    Works on the absorption of collision energy in the structural members are carried out widely with various material and cross-sections. And, with ever increasing safety concerns, they are presently applied in various fields including railroad trains, air crafts and automobiles. In addition to this, problem of lighting structural members became important subject by control of exhaust gas emission, fuel economy and energy efficiency. CFRP(Carbon Fiber Reinforced Plastics) usually is applying the two primary structural members because of different result each design parameter as like stacking thickness, stacking angle, moisture absorption ect. We have to secure the data for applying primary structural members. But it always happens to test design parameters each for securing the data. So, it has much more money and time. We can reduce the money and the time, if can ensure the CFRP material properties each design parameters. In this study, we experiment the coupon test each tension, compression and shear using CFRP prepreg sheet and simulate non-linear analyze at the sources - test result, Caron longitudinal modulus and matrix poisson's ratio using GENOAMQC is specialized at Composite analysis. And then we predict the result that specimen manufacture changing stacking angle and experiment in such a way of test method using GENOA-MCQ.

  13. Global Security Sciences Home - Global Security Sciences

    Science.gov Websites

    Us About Our Research Global Security Sciences Leadership Strategic Initiatives Research Centers Center for Strategic Security Overview Leadership Risk and Infrastructure Science Center Overview Leadership Strategic Alliance for Global Energy Solutions Overview Leadership Systems Science Center Overview

  14. Smart Grid Communications Security Project, U.S. Department of Energy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barnes, Frank

    There were four groups that worked on this project in different areas related to Smart Girds and Security. They included faculty and students from electric computer and energy engineering, law, business and sociology. The results of the work are summarized in a verity of reports, papers and thesis. A major report to the Governor of Colorado’s energy office with contributions from all the groups working on this project is given bellow. Smart Grid Deployment in Colorado: Challenges and Opportunities, Report to Colorado Governor’s Energy Office and Colorado Smart Grid Task Force(2010) (Kevin Doran, Frank Barnes, and Puneet Pasrich, eds.) Thismore » report includes information on the state of the grid cyber security, privacy, energy storage and grid stability, workforce development, consumer behavior with respect to the smart grid and safety issues.« less

  15. Energy Security: From Deal Killers to Game Changers

    NASA Astrophysics Data System (ADS)

    Cooke, Charlie

    2010-03-01

    Five energy security ``deal killers" are identified: 1) Global warming and CO2 emissions from fossil fuel combustion; 2) Intermittent energy sources (wind, solar) and the presence and stability of the grid; 3) Penetration of plant defenses to produce transportation fuels from biomass; 4) Mimicking nature: artificial photosynthesis for solar energy to fuels; and 5) Spent fuel from nuclear power reactors. Transformational basic research is required to successfully change the ground rules, to transform these ``deal killers" into ``game changers." T hey are: 1) Offsetting carbon capture and storage costs through enhanced oil recovery and methane generation from high temperature geothermal saline aquifers; 2) Electrical energy storage, through batteries and super-capacitors; 3) Genetic modification of plant cell walls, and catalytic methods for transforming plant sugars into fuels; 4) Separation of solar-induced electrons from holes, and catalysis to produce fuels; and 5) Closing the nuclear fuel cycle. Basic research can revolutionize our approach to carbon-free energy by enhancing nature to achieve energy security.

  16. Science and the Energy Security Challenge: The Example of Solid-State Lighting

    ScienceCinema

    Philips, Julia [Sandia

    2017-12-09

    Securing a viable, carbon neutral energy future for humankind will require an effort of gargantuan proportions. As outlined clearly in a series of workshops sponsored by the DOE Office of Basic Energy Sciences (http://www.sc.doe.gov/bes/reports/list.html), fundamental advances in scientific understanding are needed to broadly implement many of the technologies that are held out as promising options to meet future energy needs, ranging from solar energy, to nuclear energy, to approaches to clean combustion. Using solid state lighting based on inorganic materials as an example, I will discuss some recent results and new directions, emphasizing the multidisciplinary, team nature of the endeavor. I will also offer some thoughts about how to encourage translation of the science into attractive, widely available products – a significant challenge that cannot be ignored. This case study offers insight into approaches that are likely to be beneficial for addressing other aspects of the energy security challenge.

  17. Moving toward energy security and sustainability in 2050 by reconfiguring biofuel production

    USDA-ARS?s Scientific Manuscript database

    To achieve energy security and sustainability by 2050 requires reconfiguring biofuel production both by building on current infrastructure and existing technology and also by making substantial improvements and changes in the feedstocks used, the process technologies applied, and the fuels produced....

  18. Security in Wireless Sensor Networks Employing MACGSP6

    ERIC Educational Resources Information Center

    Nitipaichit, Yuttasart

    2010-01-01

    Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…

  19. Spatially Explicit Life Cycle Assessment of Biofuel Feedstock Production

    EPA Science Inventory

    Biofuels derived from renewable resources have gained increased research and development priority due to increasing energy demand and national security concerns. In the US, the Energy Independence and Security Act (EISA) of 2007 mandated the annual production of 56.8 billion L of...

  20. Applying Acquisition Lessons Learned to Operational Energy Initiatives

    DTIC Science & Technology

    2013-03-01

    current and future platforms to meet the demands of Energy-Informed Operations. Endnotes 1 Charles F. Wald , and Tom Captain, Energy Security America’s...2013); Wald and Captain, Energy Security America’s Best Defense, 1. 3 The Army’s agile process involves seven phases and three decision points to...https://acc.dau.mil/adl/en- US/329976/file/47235/EVM_Report_to_Congress.pdf (accessed January 14, 2013). 22 Lisa Pracchia, “The AV-8B Team Learns Synergy

  1. A Theoretical Analysis: Physical Unclonable Functions and The Software Protection Problem

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nithyanand, Rishab; Solis, John H.

    2011-09-01

    Physical Unclonable Functions (PUFs) or Physical One Way Functions (P-OWFs) are physical systems whose responses to input stimuli (i.e., challenges) are easy to measure (within reasonable error bounds) but hard to clone. This property of unclonability is due to the accepted hardness of replicating the multitude of uncontrollable manufacturing characteristics and makes PUFs useful in solving problems such as device authentication, software protection, licensing, and certified execution. In this paper, we focus on the effectiveness of PUFs for software protection and show that traditional non-computational (black-box) PUFs cannot solve the problem against real world adversaries in offline settings. Our contributionsmore » are the following: We provide two real world adversary models (weak and strong variants) and present definitions for security against the adversaries. We continue by proposing schemes secure against the weak adversary and show that no scheme is secure against a strong adversary without the use of trusted hardware. Finally, we present a protection scheme secure against strong adversaries based on trusted hardware.« less

  2. The Great Game redux: Energy security and the emergence of tripolarity in Eurasia

    NASA Astrophysics Data System (ADS)

    Ozdamar, Ibrahim Ozgur

    Securing energy resources has become a key aspect of foreign policy-making since the 1970s. States have used military and economic foreign policy tools to secure the supply of energy to their domestic markets. With the fall of the USSR in 1991, political and economic competition for penetration into energy-rich regions spread through Eurasia. Inspired from the nineteenth century term to describe Russian-British rivalry in the region, the current rivalry among great powers and their allies is called the "New Great Game". This project analyzes three political conflicts that are shaped by such rivalry that can threaten global energy security. Empirical results from the expected utility model (Bueno de Mesquita 1985) suggest the rivalry among the Western (i.e. EU, US) and Eastern (i.e. Russia, China) powers about the Iranian nuclear program, Nagorno-Karabakh and South Ossetia conflicts is likely to continue and shows some Cold War characteristics. I have also found out the expected outcomes of these conflicts and foreign policy tools and obvious and unseen strategic moves available to actors. The major conclusion of the study is that the EU and US should pursue a coordinated foreign policy and balance the Russian and Chinese influence in the region to secure access to energy resources. Most effective foreign policy tools to achieve such aim appear to be the use of economic relations as leverage against Russia and China and support economic and democratic developments of the newly established republics in Eurasia.

  3. Social Security at the Crossroads.

    ERIC Educational Resources Information Center

    International Labour Review, 1980

    1980-01-01

    Social security schemes need to be streamlined and the underlying policies made more coherent to obtain the fullest possible return on expenditure. Third World countries need to reflect very seriously on the role of social security in the development process and on the management problems involved. (CT)

  4. How Safe Are Our Libraries?

    ERIC Educational Resources Information Center

    St. Lifer, Evan

    1994-01-01

    Addresses issues of safety and security in libraries. Topics discussed include keeping library collections safe; patron behavioral problems; factoring loss into the budget; staff theft; access versus security; apathy regarding library crime; a need for a unified security apparatus; preventive measures; staff and patron safety; and a…

  5. Interactive Programming Support for Secure Software Development

    ERIC Educational Resources Information Center

    Xie, Jing

    2012-01-01

    Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have not been adequately trained in writing secure programs that are resistant from attacks violating program confidentiality, integrity, and availability, a style of programming…

  6. High Assurance Models for Secure Systems

    ERIC Educational Resources Information Center

    Almohri, Hussain M. J.

    2013-01-01

    Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…

  7. Securing the communication of medical information using local biometric authentication and commercial wireless links.

    PubMed

    Ivanov, Vladimir I; Yu, Paul L; Baras, John S

    2010-09-01

    Medical information is extremely sensitive in nature - a compromise, such as eavesdropping or tampering by a malicious third party, may result in identity theft, incorrect diagnosis and treatment, and even death. Therefore, it is important to secure the transfer of medical information from the patient to the recording system. We consider a portable, wireless device transferring medical information to a remote server. We decompose this problem into two sub-problems and propose security solutions to each of them: (1) to secure the link between the patient and the portable device, and (2) to secure the link between the portable device and the network. Thus we push the limits of the network security to the edge by authenticating the user using their biometric information; authenticating the device to the network at the physical layer; and strengthening the security of the wireless link with a key exchange mechanism. The proposed authentication methods can be used for recording the readings of medical data in a central database and for accessing medical records in various settings.

  8. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks

    PubMed Central

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-01

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719

  9. An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States

    NASA Astrophysics Data System (ADS)

    Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin

    2018-01-01

    Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.

  10. Implementing Security Sector Reform

    DTIC Science & Technology

    2008-12-04

    ownership and genuine reform. His experience in Diyala Province indicated that the most effective means of pursuing transition and transformation among...that I have no solution to the security situation in Afghanistan, or to the questions of violence, crime, insurrection, or militias vs . army vs ...than to merge those interests into a greater whole. Franchising of problems or solutions is often the result. In Afghanistan, problems and

  11. Men in Limbo: Former Students with Special Educational Needs Caught between Economic Independence and Social Security Dependence

    ERIC Educational Resources Information Center

    Skjong, Gerd; Myklebust, Jon Olav

    2016-01-01

    Individuals in their mid-thirties are expected to be employed and economically independent. However, people with disabilities and health problems--for example, former students with special educational needs (SEN)--may have problems in this domain of adult life. In Norway, individuals with SEN frequently rely on social security and support measures…

  12. Analysis and Improvement of Large Payload Bidirectional Quantum Secure Direct Communication Without Information Leakage

    NASA Astrophysics Data System (ADS)

    Liu, Zhi-Hao; Chen, Han-Wu

    2018-02-01

    As we know, the information leakage problem should be avoided in a secure quantum communication protocol. Unfortunately, it is found that this problem does exist in the large payload bidirectional quantum secure direct communication (BQSDC) protocol (Ye Int. J. Quantum. Inf. 11(5), 1350051 2013) which is based on entanglement swapping between any two Greenberger-Horne-Zeilinger (GHZ) states. To be specific, one half of the information interchanged in this protocol is leaked out unconsciously without any active attack from an eavesdropper. Afterward, this BQSDC protocol is revised to the one without information leakage. It is shown that the improved BQSDC protocol is secure against the general individual attack and has some obvious features compared with the original one.

  13. The association of family food security and depression in mothers having primary school children in Ray-Iran.

    PubMed

    Payab, Moloud; Motlagh, Ahmad-Reza Dorosty; Eshraghian, Mohammadreza; Rostami, Reza; Siassi, Fereydoun

    2014-01-01

    As a major public health problem, food insecurity has adverse social and psychological effects, in addition to the impact on public health. This study aimed to determine the association of household food security and depression in mothers with primary school children in Ray County. This descriptive, analytical cross-sectional study was conducted on 430 mothers with primary school children in the spring 2010. During a two-stage cluster sampling, an 18-items food security questionnaire (USDA) and the Beck depression inventory were completed via interviewing mothers. Chi-squared test, one-way analysis of variance, simple regression and stepwise multiple regression were used to describe and analyze data, and to identify related factors using SPSS-16 software. The prevalence of food insecurity and depression in mothers were 50.2% and 51.4% respectively. Also 34.6% of mothers in the "food secure" group were depressed and 77.8% in "food insecure with hunger" group were depressed and this difference was statistically significant. Twelve out of the 20 examined variables (age, family size, number of children, economic status, home ownership, employment households, educational level of the mother and also the head of household, height, energy intake, and carbohydrate and protein intakes) were significantly associated with food security and depression. Food insecurity and depression in mothers with primary school children in Ray County showed a significant positive correlation (P < 0.001). The prevalence of household food insecurity and depression in the studied population were high. Since there is a significant relationship between food insecurity and depression, more attention must be paid to this group.

  14. Poverty and psychological health among AIDS-orphaned children in Cape Town, South Africa.

    PubMed

    Cluver, Lucie; Gardner, Frances; Operario, Don

    2009-06-01

    This study examined associations between AIDS-orphanhood status, poverty indicators, and psychological problems (depression, anxiety, post-traumatic stress, peer problems, delinquency, conduct problems) among children and adolescents in townships surrounding Cape Town, South Africa. One thousand and twenty-five children and adolescents completed standardized and culturally sensitive cross-sectional surveys. Children orphaned by AIDS had more psychological problems including depression, peer problems, post-traumatic stress, and conduct problems. Specific poverty indicators including food security, access to social welfare grants, employment in the household and access to school were associated with better psychological health. Poverty indicators mediated associations of AIDS-orphanhood with psychological problems. Food security showed the most consistent association with reduced psychological problems. Poverty alleviation measures have the potential to improve psychological health for AIDS-orphaned children in South African townships.

  15. Low-power cryptographic coprocessor for autonomous wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Olszyna, Jakub; Winiecki, Wiesław

    2013-10-01

    The concept of autonomous wireless sensor networks involves energy harvesting, as well as effective management of system resources. Public-key cryptography (PKC) offers the advantage of elegant key agreement schemes with which a secret key can be securely established over unsecure channels. In addition to solving the key management problem, the other major application of PKC is digital signatures, with which non-repudiation of messages exchanges can be achieved. The motivation for studying low-power and area efficient modular arithmetic algorithms comes from enabling public-key security for low-power devices that can perform under constrained environment like autonomous wireless sensor networks. This paper presents a cryptographic coprocessor tailored to the autonomous wireless sensor networks constraints. Such hardware circuit is aimed to support the implementation of different public-key cryptosystems based on modular arithmetic in GF(p) and GF(2m). Key components of the coprocessor are described as GEZEL models and can be easily transformed to VHDL and implemented in hardware.

  16. 76 FR 36951 - In the Matter of Animal Cloning Sciences, Inc. (n/k/a Bancorp Energy, Inc.): Order of Suspension...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-23

    .... (n/k/a Bancorp Energy, Inc.): Order of Suspension of Trading June 21, 2011. It appears to the... securities of Animal Cloning Sciences, Inc. (n/k/a Bancorp Energy, Inc.) because it has not filed any... above-listed company. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act...

  17. 76 FR 18587 - In the Matter of Corestream Energy, Inc. (f/k/a Zealous, Inc.); Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-04

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Corestream Energy, Inc. (f/k... Corestream Energy, Inc. (``Corestream'') (f/k/a Zealous, Inc.) because it has failed to file certain periodic.... Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in...

  18. HOMELAND SECURITY: Challenges and Strategies in Addressing Short- and Long-Term National Needs

    DTIC Science & Technology

    2001-11-07

    air travel has already prompted attention to chronic problems with airport security that we and others have been pointing to for years. Moreover, the...capital for certain areas such as intelligence, public health and airport security will also be necessary as well to foster and maintain the skill...Weaknesses in Airport Security and Options for Assigning Screening Responsibilities, (GAO-01-1165T, Sept. 21, 2001). Aviation Security: Terrorist Acts

  19. Examining the Security Awareness, Information Privacy, and the Security Behaviors of Home Computer Users

    ERIC Educational Resources Information Center

    Edwards, Keith

    2015-01-01

    Attacks on computer systems continue to be a problem. The majority of the attacks target home computer users. To help mitigate the attacks some companies provide security awareness training to their employees. However, not all people work for a company that provides security awareness training and typically, home computer users do not have the…

  20. [The concept and measurement of food security].

    PubMed

    Kim, Kirang; Kim, Mi Kyung; Shin, Young Jeon

    2008-11-01

    During the past two decades, food deprivation and hunger have been recognized to be not just the concerns of only underdeveloped or developing countries, but as problems for many affluent Western nations as well. Many countries have made numerous efforts to define and measure the extent of these problems. Based on these efforts, the theory and practice of food security studies has significantly evolved during the last decades. Thus, this study aims to provide a comprehensive review of the concept and measurement of food security. In this review, we introduce the definition and background of food security, we describe the impact of food insecurity on nutrition and health, we provide its measurements and operational instruments and we discuss its applications and implications. Some practical information for the use of the food security index in South Korea is also presented. Food security is an essential element in achieving a good nutritional and health status and it has an influence to reduce poverty. The information about the current understanding of food security can help scientists, policy makers and program practitioners conduct research and maintain outreach programs that address the issues of poverty and the promotion of food security.

Top