Fuel Cycle Technologies 2014 Achievement Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hong, Bonnie C.
2015-01-01
The Fuel Cycle Technologies (FCT) program supports the Department of Energy’s (DOE’s) mission to: “Enhance U.S. security and economic growth through transformative science, technology innovation, and market solutions to meet our energy, nuclear security, and environmental challenges.” Goal 1 of DOE’s Strategic Plan is to innovate energy technologies that enhance U.S. economic growth and job creation, energy security, and environmental quality. FCT does this by investing in advanced technologies that could transform the nuclear fuel cycle in the decades to come. Goal 2 of DOE’s Strategic Plan is to strengthen national security by strengthening key science, technology, and engineering capabilities.more » FCT does this by working closely with the National Nuclear Security Administration and the U.S Department of State to develop advanced technologies that support the Nation’s nuclear nonproliferation goals.« less
Sandia National Laboratories: National Security Missions: International
Programs Environmental Responsibility Environmental Management System Pollution Prevention History 60 ; Security Weapons Science & Technology Defense Systems & Assessments About Defense Systems & ; Development Technology Deployment Centers Working With Sandia Working With Sandia Prospective Suppliers What
2017-05-01
ER D C/ EL T R- 17 -7 Environmental Security Technology Certification Program (ESTCP) Evaluation of Uncertainty in Constituent Input...Environmental Security Technology Certification Program (ESTCP) ERDC/EL TR-17-7 May 2017 Evaluation of Uncertainty in Constituent Input Parameters...Environmental Evaluation and Characterization Sys- tem (TREECS™) was applied to a groundwater site and a surface water site to evaluate the sensitivity
TECHNOLOGY EVALUATION REPORT CEREX ENVIRONMENTAL SERVICES UV HOUND POINT SAMPLE AIR MONITOR
The USEPA's National Homeland Security Research Center (NHSRC) Technology Testing and Evaluation Program (TTEP) is carrying out performance tests on homeland security technologies. Under TTEP, Battelle evaluated the performance of the Cerex UV Hound point sample air monitor in de...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-02
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Desert Mining, Inc., Eagle Broadband, Inc., Endovasc, Inc., Environmental Oil Processing Technology Corp., Falcon Ridge Development, Inc., Fellows... Environmental Oil Processing Technology Corp. because it has not filed any periodic reports since the period...
Security Metrics: A Solution in Search of a Problem
ERIC Educational Resources Information Center
Rosenblatt, Joel
2008-01-01
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Lashgarara, Farhad; Mirdamadi, Seyyed Mehdi; Hosseini, Seyyed Jamal Farajollah; Chizari, Mohammad
2008-10-01
The majority of the countries of the world, especially developing countries, face environmental problems. Limitations of basic resources (water and soil) and population growth have been the cause of these environmental problems that countries are confronted with. Developing countries have numerous problems, including destruction of forests, vegetable and animal species, and pollution of the environment. Damage to natural resources and the environment can influence the food-security situation. One of the main millennium development goals (MDGs) is protection of the environment and people's health. This cannot obtained unless there is ensured food security. Food security has been defined as a situation when all people, at all times, have physical and economic access to sufficient, safe, and nutritious food needed to maintain a healthy and active life. At the same time, with ensured food security, we can hope to protect the natural resources and environment. The methodology used is descriptive-analytical, and its main purpose is determining the importance and role of food-security solutions in the reduction of environmental hazards and improvement of natural resources and the environmental situation in developing countries. Therefore, some of the most important food-security solutions that can play an important role in this relation were discussed, including conventional research-based technology, biotechnology, information and communication technologies (ICTs), alternative energy sources, and food irradiation.
Updating energy security and environmental policy: Energy security theories revisited.
Proskuryakova, L
2018-06-18
The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.
Worldwide Emerging Environmental Issues Affecting the U.S. Military. January 2010 Report
2010-01-01
key farmland in Africa on a long-term basis. The report notes that it is critical to ensure that such contracts promote shared food security ...Technological Advances with Environmental Security Implications………………..4 6.1 New Detection and Cleanup Techniques…………………………………………...…4 6.2...Regulatory Regime might be adjusted to Include Nanomaterials…..6 7.2 Monopoly over Rare Earth Elements Raises Security and Environmental Concerns…..7
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-25
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Camelot Entertainment Group, Inc., Cavico Corp., Global 8 Environmental Technologies, Inc., GTC Telecom Corp., ICF Corporation, and... concerning the securities of GTC Telecom Corp. because it has not filed any periodic reports since the period...
NASA Astrophysics Data System (ADS)
Xian, W.; Chen, Y.; Chen, J.; Luo, X.; Shao, H.
2018-04-01
According to the overall requirements of ecological construction and environmental protection, rely on the national key ecological engineering, strengthen ecological environmental restoration and protection, improve forest cover, control soil erosion, construct important ecological security barrier in poor areas, inhibit poverty alleviation through ecological security in this area from environmental damage to the vicious cycle of poverty. Obviously, the dynamic monitoring of ecological security in contiguous destitute areas of Sichuan province has a policy sense of urgency and practical significance. This paper adopts RS technology and GIS technology to select the Luhe region of Jinchuan county and Ganzi prefecture as the research area, combined with the characteristics of ecological environment in poor areas, the impact factors of ecological environment are determined as land use type, terrain slope, vegetation cover, surface water, soil moisture and other factors. Using the ecological environmental safety assessment model, the ecological environment safety index is calculated. According to the index, the ecological environment safety of the research area is divided into four levels. The ecological environment safety classification map of 1990 in 2009 is obtained. It can be seen that with the human modern life and improve their economic level, the surrounding environment will be destroyed, because the research area ecological environment is now in good, the ecological environment generally tends to be stable. We should keep its ecological security good and improve local economic income. The relationship between ecological environmental security and economic coordinated development in poor areas has very important strategic significance.
To support the Nation's Homeland Security Program, this U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) project is conducted to verify the performance of commercially available products, methods, and equipment for decontamination of hard and...
Sandia National Laboratories: News: Publications: Environmental Reports
Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Technology Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios
Sandia National Laboratories: About Sandia: Environmental Responsibility
Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Technology Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios
About Us | Argonne National Laboratory
and technology - advanced technologies for detection of chemical and biological species of interest for environmental protection, national security and disease detection Explore this website to learn
A security architecture for health information networks.
Kailar, Rajashekar; Muralidhar, Vinod
2007-10-11
Health information network security needs to balance exacting security controls with practicality, and ease of implementation in today's healthcare enterprise. Recent work on 'nationwide health information network' architectures has sought to share highly confidential data over insecure networks such as the Internet. Using basic patterns of health network data flow and trust models to support secure communication between network nodes, we abstract network security requirements to a core set to enable secure inter-network data sharing. We propose a minimum set of security controls that can be implemented without needing major new technologies, but yet realize network security and privacy goals of confidentiality, integrity and availability. This framework combines a set of technology mechanisms with environmental controls, and is shown to be sufficient to counter commonly encountered network security threats adequately.
A Security Architecture for Health Information Networks
Kailar, Rajashekar
2007-01-01
Health information network security needs to balance exacting security controls with practicality, and ease of implementation in today’s healthcare enterprise. Recent work on ‘nationwide health information network’ architectures has sought to share highly confidential data over insecure networks such as the Internet. Using basic patterns of health network data flow and trust models to support secure communication between network nodes, we abstract network security requirements to a core set to enable secure inter-network data sharing. We propose a minimum set of security controls that can be implemented without needing major new technologies, but yet realize network security and privacy goals of confidentiality, integrity and availability. This framework combines a set of technology mechanisms with environmental controls, and is shown to be sufficient to counter commonly encountered network security threats adequately. PMID:18693862
33 CFR 148.715 - How is an environmental review conducted?
Code of Federal Regulations, 2010 CFR
2010-07-01
... quality of assessment, probable environmental impacts, and identification of procedures or technology that... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false How is an environmental review... SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: GENERAL Environmental Review Criteria for Deepwater...
Nevada National Security Site Environmental Report 2013
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, C.
2014-09-09
This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmentalmore » Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1999-01-01
The Tribal Colleges Initiatives in Science and Environmental Education (TCI) was developed in collaboration with the Partnership for Environmental Technology Education (PETE). This program is focused on long-term, systematic change through assisting tribally-controlled colleges in improving science and technology infrastructure, faculty and curricula. The goals are to: develop new or enhance existing science and technology education programs within tribally-controlled colleges and affiliates with a focus on environmental education and technology; establish and maintain clearly defined and secure educational pathways for Native American students; produce more Native American environmental and advanced degree graduates who can contribute to meeting the environmental/natural resourcemore » management and economic development goals of Indian Nations; and enhance the general level of Native American scientific literacy through improved public access to information.« less
Nevada Test Site Environmental Report 2008
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cathy A. Wills
2009-09-01
The Nevada Test Site Environmental Report (NTSER) 2008 was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years’ NTSERs are posted on the NNSA/NSO website at http://www.nv.doe.gov/library/publications/aser.aspx.
Report: FISMA - Fiscal Year 2004 Status of EPA’s Computer Security Program
Report #2004-S-00007, September 30, 2004. This report synopsizes the results of information technology security work the U.S. Environmental Protection Agency’s Office of Inspector General (OIG) performed during Fiscal Year (FY) 2004.
ASPECT (Airborne Spectral Photometric Environmental Collection Technology) Fact Sheet
This multi-sensor screening tool provides infrared and photographic images with geospatial, chemical, and radiological data within minutes to support emergency responses, home-land security missions, environmental surveys, and climate monitoring missions.
Practice brief. Securing wireless technology for healthcare.
Retterer, John; Casto, Brian W
2004-05-01
Wireless networking can be a very complex science, requiring an understanding of physics and the electromagnetic spectrum. While the radio theory behind the technology can be challenging, a basic understanding of wireless networking can be sufficient for small-scale deployment. Numerous security mechanisms are available to wireless technologies, making it practical, scalable, and affordable for healthcare organizations. The decision on the selected security model should take into account the needs for additional server hardware and administrative costs. Where wide area network connections exist between cooperative organizations, deployment of a distributed security model can be considered to reduce administrative overhead. The wireless approach chosen should be dynamic and concentrate on the organization's specific environmental needs. Aspects of organizational mission, operations, service level, and budget allotment as well as an organization's risk tolerance are all part of the balance in the decision to deploy wireless technology.
Cooperative monitoring and its role in regional security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Biringer, K.; Olsen, J.; Lincoln, R.
1997-03-01
Cooperative monitoring systems can play an important part in promoting the implementation of regional cooperative security agreements. These agreements advance the national security interests of the United States in a post Cold War environment. Regional issues as widely varying as nuclear nonproliferation, trade and environmental pollution can be the source of tensions which may escalate to armed conflict which could have global implications. The Office of National Security Policy Analysis at the US Department of Energy (DOE) has an interest in seeking ways to promote regional cooperation that can reduce the threats posed by regional conflict. DOE technologies and technicalmore » expertise can contribute to developing solutions to a wide variety of these international problems. Much of this DOE expertise has been developed in support of the US nuclear weapons and arms control missions. It is now being made available to other agencies and foreign governments in their search for regional security and cooperation. This report presents two examples of interest to DOE in which monitoring technologies could be employed to promote cooperation through experimentation. The two scenarios include nuclear transparency in Northeast Asia and environmental restoration in the Black Sea. Both offer the potential for the use of technology to promote regional cooperation. The issues associated with both of these monitoring applications are presented along with examples of appropriate monitoring technologies, potential experiments and potential DOE contributions to the scenarios.« less
1992-01-01
Spacecraft Technology 0503401F 450 35 Space Systems Environmental Interactions Technology 060341 OF 468 36 Space Subsystems Technology 0603428F 472 37...Space Systems Environmental Interactions Technology 35 468 0603402F Space Test Program (STP) 191 462 030591OF SPACETRACK 85 195 0604233F Specialized...is in the mid- 1990’s. Combat force commanders and units (equipped with EMP-hardened, secure radio equipment) interact with nearby relay nodes for
Keys to a Safe, Secure School.
ERIC Educational Resources Information Center
Kennedy, Mike
2002-01-01
Outlines 10 steps that school administrators can take to make their schools safer and more secure for students and staff. These steps encompass crime prevention through environmental design, crisis planning, entrances, lighting, police presence, prevention programs, rapport with students, smaller schools, technology implementation, and staff…
DOE Office of Scientific and Technical Information (OSTI.GOV)
VIGIL, FRANCINE S.; SANCHEZ, REBECCA D.; WAGNER, KATRINA
2002-09-01
Sandia National Laboratories, New Mexico (SNL/NM) is a government-owned, contractor-operated facility overseen by the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA) through the Albuquerque Operations Office (AL), Office of Kirtland Site Operations (OKSO). Sandia Corporation, a wholly-owned subsidiary of Lockheed Martin Corporation, operates SNL/NM. Work performed at SNL/NM is in support of the DOE and Sandia Corporation's mission to provide weapon component technology and hardware for the needs of the nation's security. Sandia Corporation also conducts fundamental research and development (R&D) to advance technology in energy research, computer science, waste management, microelectronics, materials science, and transportation safetymore » for hazardous and nuclear components. In support of Sandia Corporation's mission, the Integrated Safety and Security (ISS) Center and the Environmental Restoration (ER) Project at SNL/NM have established extensive environmental programs to assist Sandia Corporation's line organizations in meeting all applicable local, state, and federal environmental regulations and DOE requirements. This annual report summarizes data and the compliance status of Sandia Corporation's environmental protection and monitoring programs through December 31, 2001. Major environmental programs include air quality, water quality, groundwater protection, terrestrial surveillance, waste management, pollution prevention (P2), environmental remediation, oil and chemical spill prevention, and the National Environmental Policy Act (NEPA). Environmental monitoring and surveillance programs are required by DOE Order 5400.1, General Environmental Protection Program (DOE 1990) and DOE Order 231.1, Environment, Safety, and Health Reporting (DOE 1996).« less
Hydrogen Production from Nuclear Energy
NASA Astrophysics Data System (ADS)
Walters, Leon; Wade, Dave
2003-07-01
During the past decade the interest in hydrogen as transportation fuel has greatly escalated. This heighten interest is partly related to concerns surrounding local and regional air pollution from the combustion of fossil fuels along with carbon dioxide emissions adding to the enhanced greenhouse effect. More recently there has been a great sensitivity to the vulnerability of our oil supply. Thus, energy security and environmental concerns have driven the interest in hydrogen as the clean and secure alternative to fossil fuels. Remarkable advances in fuel-cell technology have made hydrogen fueled transportation a near-term possibility. However, copious quantities of hydrogen must be generated in a manner independent of fossil fuels if environmental benefits and energy security are to be achieved. The renewable technologies, wind, solar, and geothermal, although important contributors, simply do not comprise the energy density required to deliver enough hydrogen to displace much of the fossil transportation fuels. Nuclear energy is the only primary energy source that can generate enough hydrogen in an energy secure and environmentally benign fashion. Methods of production of hydrogen from nuclear energy, the relative cost of hydrogen, and possible transition schemes to a nuclear-hydrogen economy will be presented.
ETV - HOMELAND SECURITY EVALUATION OF CYANIDE DETECTORS
EPA's Environmental Technology Verification (ETV) Program was established in 1995 to objectively verify the performance of technologies that measure / monitor the quality of our environment, both for background or at suspected contamination site. The ETV program has established...
Sandia National Laboratories: News: Image Gallery
Environmental Management System Pollution Prevention History 60 impacts Diversity Locations Facts & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Technology Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
Technological challenges for boosting coal production with environmental sustainability.
Ghose, Mrinal K
2009-07-01
The global energy requirement has grown at a phenomenon rate and the consumption of primary energy sources has been a very high positive growth. This paper focuses on the consumption of different primary energy sources and it identifies that coal will continue to remain as the prime energy source in foreseeable future. It examines the energy requirement perspective for India and demand of coal as the prime energy source. Economic development and poverty alleviation depend on securing affordable energy sources and Indian coal mining industry offers a bright future for the country's energy security, provided the industry is allowed to develop by supportive government policies and adopts latest technologies for mining. It is an irony that in-spite of having a plentiful reserves, India is not able to jack up coal production to meet its current and future demand. It discusses the strategies to be adopted for growth and meeting the coal demand. But such energy are very much concerned with environmental degradation and must be driven by contemporary managerial acumen addressing environmental and social challenges effectively The paper highlights the emissions of greenhouse gases due to burning of fossil fuels and environmental consequences of global warming and sea-level rise. Technological solutions for environment friendly coal mining and environmental laws for the abatement of environmental degradation are discussed in this paper.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Quirk, W.J.; Canada, J.; de Vore, L.
1994-04-01
This issue highlights the Lawrence Livermore National Laboratory`s 1993 accomplishments in our mission areas and core programs: economic competitiveness, national security, energy, the environment, lasers, biology and biotechnology, engineering, physics, chemistry, materials science, computers and computing, and science and math education. Secondary topics include: nonproliferation, arms control, international security, environmental remediation, and waste management.
Pacific Northwest National Laboratory institutional plan FY 1997--2002
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1996-10-01
Pacific Northwest National Laboratory`s core mission is to deliver environmental science and technology in the service of the nation and humanity. Through basic research fundamental knowledge is created of natural, engineered, and social systems that is the basis for both effective environmental technology and sound public policy. Legacy environmental problems are solved by delivering technologies that remedy existing environmental hazards, today`s environmental needs are addressed with technologies that prevent pollution and minimize waste, and the technical foundation is being laid for tomorrow`s inherently clean energy and industrial processes. Pacific Northwest National Laboratory also applies its capabilities to meet selected nationalmore » security, energy, and human health needs; strengthen the US economy; and support the education of future scientists and engineers. Brief summaries are given of the various tasks being carried out under these broad categories.« less
Recommendations for the Investigation of Vapor Intrusion
2007-12-01
1,1-dfa 1,1- difluoroethane EPA U.S. Environmental Protection Agency ESTCP Environmental Security Technology Certification Program NHDES...the leak tracer itself caused significant problems. During this sample event, 1,1- difluoroethane (1,1-dfa, the propellant in duster spray) was used
DOE Office of Scientific and Technical Information (OSTI.GOV)
Anderson, E.; Antkowiak, M.; Butt, R.
The Strategic Environmental Research and Developmental Program (SERDP)/Environmental Security Technology Certification Program (ESTCP) is the Department of Defense?s (DOD) environmental science and technology program focusing on issues related to environment and energy for the military services. The SERDP/ESTCP Office requested that the National Renewable Energy Laboratory (NREL) provide technical assistance with strategic planning by evaluating the potential for several types of renewable energy technologies at DOD installations. NREL was tasked to provide technical expertise and strategic advice for the feasibility of geothermal resources, waste-to-energy technology, photovoltaics (PV), wind, microgrids, and building system technologies on military installations. This technical report ismore » the deliverable for these tasks.« less
US Naval Facilities Engineering Service Center Environmental Program on Climate Change
2008-09-01
of environmental issues related to climate change . There is a growing recognition that the Navy will need to perform its national security mission in... climate change -related technology work at the Naval Facilities Engineering Service Center (NAVFAC ESC) in Port Hueneme, California. NAVFAC ESC...categorized technologies that can be applied to climate change as mitigation, adaptation, and intervention. An essential element of the Navy’s response to
Natural Gas Based Electricity Production and Low Carbon Technology Options
Concerns regarding air quality, global climate change, and the national energy security impacts of the intensive use of fossil fuels and their environmental impacts in the power generation sector have raised interest in alternative low carbon electricity generation technology and...
Nevada National Security Site Environmental Report 2011
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cathy Wills, ed
2012-09-12
This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment,more » Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.« less
Science and Strategic - Climate Implications
NASA Astrophysics Data System (ADS)
Tindall, J. A.; Moran, E. H.
2008-12-01
Energy of weather systems greatly exceeds energy produced and used by humans. Variation in this energy causes climate variability potentially resulting in local, national, and/or global catastrophes beyond our ability to deter the loss of life and economic destabilization. Large scale natural disasters routinely result in shortages of water, disruption of energy supplies, and destruction of infrastructure. The resulting unforeseen and disastrous events occurring beyond national emergency preparation, as related to climate variability, could insight civil unrest due to dwindling and/or inaccessible resources necessary for survival. Lack of these necessary resources in impacted countries often leads to wars. Climate change coupled with population growth, which exposes more of the population to potential risks associated with climate and environmental change, demands faster technological response. Understanding climate/associated environmental changes, the relation to human activity and behavior, and including this in national and international emergency/security management plans would alleviate shortcomings in our present and future technological status. The scale of environmental change will determine the potential magnitude of civil unrest at the local, national, and/or global level along with security issues at each level. Commonly, security issues related to possible civil unrest owing to temporal environmental change is not part of a short and/or long-term strategy, yet recent large-scale disasters are reminders that system failures (as in hurricane Katrina) include acknowledged breaches to individual, community, and infrastructure security. Without advance planning and management concerning environmental change, oncoming and climate related events will intensify the level of devastation and human catastrophe. Depending upon the magnitude and period of catastrophic events and/or environmental changes, destabilization of agricultural systems, energy supplies, and other lines of commodities often results in severely unbalanced supply and demand ratios, which eventually affect the entire global community. National economies potentially risk destabilization, which is especially important since economics plays a major role in strategic planning. This presentation will address these issues and the role that science can play in human sustainability and local, national, and international security.
Sustainable integrated farming system: A solution for national food security and sovereignty
NASA Astrophysics Data System (ADS)
Ansar, M.; Fathurrahman
2018-05-01
This paper provides a comprehensive review of literature related to food security. The world food crisis is a threat to all countries, including Indonesia. The problem of food security in Indonesia is still happening, particularly, aspects of production and increasingly unbalanced food availability. Due to the increasing rate of population growth, land functional shift, degradation of land resources and water, as well as environmental pollution and climate change. Food production has not been able to meet the needs of the population continuously. Therefore, the food policy paradigm applied in Indonesia must change from food security to food independence. Thus, Indonesia is not dependent on other countries. Food diversification is one of the best policies to be implemented in achieving food independence and anticipating the food crisis. Food diversification utilizes land optimally by developing an integrated farming system. The integrated farming system is an efficient and environmentally agricultural system. It is able to utilize sustainable agriculture development, followed by the development of participatory technology (Participatory Technology Development) which refers to the local wisdom of the community.
1979-04-05
political, economic , or military pressure - pressure applied by those who either have the ability to contro directly or can indirectly influence the flow...collective national security. The political and economic risks of foreign oil supply interruptions are very serious and very real to our national security...security. We must find energy alternatives - alternatives that are domestically controllable, technically feasible, and economically , environmentally, and
Nevada National Security Site Environmental Report 2016
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills
This Nevada National Security Site Environmental Report (NNSSER) was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSERmore » summarizes data and compliance status for calendar year 2016 at the Nevada National Security Site (NNSS) and its two Nevada-based support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). NNSA/NFO directs the management and operation of the NNSS and six sites across the nation. In addition to the NNSA itself, the six sites include two in Nevada (NLVF and RSL-Nellis) and four in other states (RSL-Andrews in Maryland, Livermore Operations in California, Los Alamos Operations in New Mexico, and Special Technologies Laboratory in California). Los Alamos, Lawrence Livermore, and Sandia National Laboratories are the principal organizations that sponsor and implement the nuclear weapons programs at the NNSS. National Security Technologies, LLC (NSTec), is the current Management and Operating contractor accountable for the successful execution of work and ensuring that work is performed in compliance with environmental regulations. The six sites all provide support to enhance the NNSS as a location for its multiple missions. The three major NNSS missions include National Security/Defense, Environmental Management, and Nondefense. The major programs that support these missions are Stockpile Stewardship and Management, Nonproliferation and Counterterrorism, Nuclear Emergency Response, Strategic Partnership Projects, Environmental Restoration, Waste Management, Conservation and Renewable Energy, Other Research and Development, and Infrastructure. The major facilities that support the programs include the U1a Facility, Big Explosives Experimental Facility (BEEF), Device Assembly Facility, Dense Plasma Focus Facility, Joint Actinide Shock Physics Experimental Research Facility, Radiological/Nuclear Countermeasures Test and Evaluation Complex, Nonproliferation Test and Evaluation Complex (NPTEC), Radiological/Nuclear Weapons of Mass Destruction Incident Exercise Site, the Area 5 Radioactive Waste Management Complex (RWMC), and the Area 3 Radioactive Waste Management Site (RWMS).« less
Ageing-in-place with the use of ambient intelligence technology: perspectives of older users.
van Hoof, J; Kort, H S M; Rutten, P G S; Duijnstee, M S H
2011-05-01
Ambient intelligence technologies are a means to support ageing-in-place by monitoring clients in the home. In this study, monitoring is applied for the purpose of raising an alarm in an emergency situation, and thereby, providing an increased sense of safety and security. Apart from these technological solutions, there are numerous environmental interventions in the home environment that can support people to age-in-place. The aim of this study was to investigate the needs and motives, related to ageing-in-place, of the respondents receiving ambient intelligence technologies, and to investigate whether, and how, these technologies contributed to aspects of ageing-in-place. This paper presents the results of a qualitative study comprised of interviews and observations of technology and environmental interventions in the home environment among 18 community-dwelling older adults with a complex demand for care. These respondents had a prototype of the Unattended Autonomous Surveillance system, an example of ambient intelligence technology, installed in their homes as a means to age-in-place. The UAS-system offers a large range of functionalities, including mobility monitoring, voice response, fire detection, as well as wandering detection and prevention, which can be installed in different configurations. The respondents had various motives to use ambient intelligence technologies to support ageing-in-place. The most prominent reason was to improve the sense of safety and security, in particular, in case of fall incidents, when people were afraid not to be able to use their existing emergency response systems. The ambient intelligence technologies were initially seen as a welcome addition to strategies already adopted by the respondents, including a variety of home modifications and assistive devices. The systems tested increased the sense of safety and security and helped to postpone institutionalisation. Respondents came up with a set of specifications in terms of the operation and the design of the technology. False alarms were also regarded as a sign that the ambient intelligence technology is functioning. Moreover, a good integration of the new technologies in the provision of health care is indispensable, and installation should be done in an acceptable and unobtrusive manner. Ambient intelligence technologies can contribute to an increased safety and security at home. The technologies alone offer no all encompassing solution as home care and additional environmental interventions are still needed to support ageing-in-place. Results of the study are used to further improve the ambient intelligence technologies and their implementation. 2011 Elsevier Ireland Ltd. All rights reserved.
REAL-TIME ENVIRONMENTAL MONITORING: APPLICATIONS FOR HOMELAND SECURITY
Real-time monitoring technology developed as part of the EMPACT program has a variety of potential applications. These tools can measure a variety of potential contaminants in the air, water, in buildings, or in the soil. Real-time monitoring technology allows these detection sys...
Technical Report for the Demonstration of Wide Area ...
Report The U.S. Environmental Protection Agency in collaboration with the Department of Homeland Security conducted the “Wide-Area Urban Radiological Contaminant, Mitigation, and Cleanup Technology Demonstration” in Columbus, Ohio on June 22-25, 2015. Five wide-area radiological decontamination technologies (including strippable coatings, gels, and chemical foam technologies) were demonstrated on an urban building.
Rapid Building Assessment Project
2014-05-01
Efficiency Buildings Hub EISA Energy Independence Security Act EPRI The Electric Power and Research Institute ESTCP Environmental Security Technology...Ordinary Least Squares PG&E Pacific Gas & Electric R&D research and development RBA Remote Building Analytics REST representational state...utilities across North America and Europe. Requiring only hourly utility electric meter data, the building type, and address, FirstFuel can produce a
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hsieh, S.T.; Atwood, T.; Qiu Daxiong
1997-12-31
Since January 1997, the US/China Energy and Environmental Technology Center (EETC) in Beijing has been jointly operated by Tulane University and Tsinghua University. EETC is established to encourage the adoption of technologies for energy production with improved environmental performance which are essential for supporting economic growth and managing the Global Warming and Climate Change issues. International cooperation is critical to insure the environmental and energy security on a global basis. For example, the US has acquired a great deal of useful experience in clean coal technology which has been demonstrated with major utilities in commercial operations. The adaption of, andmore » the installation of, clean coal technology should be given high priority. Worldwide, the continuous exchange of information and technology between developed and developing nations relating to the current and future clean coal technologies is of great importance. Developed nations which possess environmental responsive technologies and financial resources should work closely with developing nations to facilitate technology transfer and trade of technologies. International cooperation will lower the cost of deploying clean coal technologies directed toward the clean production of energy. This paper presents the updated activities of EETC on facilitating technology transfer and promoting the clean use of coal to satisfy growing energy demand in China.« less
Light-Duty Vehicle Fuel Consumption Displacement Potential up to 2045
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moawad, Ayman; Rousseau, Aymeric
2016-04-01
The U.S. Department of Energy (DOE) Vehicle Technologies Program (VTP) is developing more energy-efficient and environmentally friendly highway transportation technologies that will enable America to use less petroleum. The long-term aim is to develop "leapfrog" technologies that will provide Americans with greater freedom of mobility and energy security, while lowering costs and reducing impacts on the environment.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-25
... technology that is used to aid in inspecting high-density cargo containers for contraband such as illicit... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Availability of the Draft Programmatic Environmental Assessment for the Deployment and Operation of High Energy X-Ray...
Environmental security in the Czech Republic: Status and concerns in the post Communist era
DOE Office of Scientific and Technical Information (OSTI.GOV)
Valley, P.J.
1998-10-01
The Czech Republic has made great strides toward reconciling its political and economic development with environmental protection and security issues since its recent democratization. Although new technological and legislative efforts continue to work at reducing emissions from automobiles, industries, power plants and coal mining, the Republic is committed to continuing its battle against air and water pollution, poor waste management, and needless destruction of nature. Shifting the structure of primary energy sources to qualitatively better fuels, along with the introduction of less energy-consuming technologies and the activation of new nuclear reactors, would eventually replace most of the output of coalmore » burning power plants. However, the use of nuclear power has been opposed by several political and environmental activists groups. At the international level, Austria`s opposition to the Temelin Nuclear Power plant is of great concern since Austria, as a non-nuclear state, propagates negative information about nuclear power to its citizens and other countries.« less
Antle, John M.; Stoorvogel, Jetse J.; Valdivia, Roberto O.
2014-01-01
This article presents conceptual and empirical foundations for new parsimonious simulation models that are being used to assess future food and environmental security of farm populations. The conceptual framework integrates key features of the biophysical and economic processes on which the farming systems are based. The approach represents a methodological advance by coupling important behavioural processes, for example, self-selection in adaptive responses to technological and environmental change, with aggregate processes, such as changes in market supply and demand conditions or environmental conditions as climate. Suitable biophysical and economic data are a critical limiting factor in modelling these complex systems, particularly for the characterization of out-of-sample counterfactuals in ex ante analyses. Parsimonious, population-based simulation methods are described that exploit available observational, experimental, modelled and expert data. The analysis makes use of a new scenario design concept called representative agricultural pathways. A case study illustrates how these methods can be used to assess food and environmental security. The concluding section addresses generalizations of parametric forms and linkages of regional models to global models. PMID:24535388
Antle, John M; Stoorvogel, Jetse J; Valdivia, Roberto O
2014-04-05
This article presents conceptual and empirical foundations for new parsimonious simulation models that are being used to assess future food and environmental security of farm populations. The conceptual framework integrates key features of the biophysical and economic processes on which the farming systems are based. The approach represents a methodological advance by coupling important behavioural processes, for example, self-selection in adaptive responses to technological and environmental change, with aggregate processes, such as changes in market supply and demand conditions or environmental conditions as climate. Suitable biophysical and economic data are a critical limiting factor in modelling these complex systems, particularly for the characterization of out-of-sample counterfactuals in ex ante analyses. Parsimonious, population-based simulation methods are described that exploit available observational, experimental, modelled and expert data. The analysis makes use of a new scenario design concept called representative agricultural pathways. A case study illustrates how these methods can be used to assess food and environmental security. The concluding section addresses generalizations of parametric forms and linkages of regional models to global models.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jimenez, Richard, D., Dr.
2007-10-01
The U.S. Department of Energy (DOE) maintains a strong commitment to transfer the results of its science and technology programs to the private sector. The intent is to apply innovative and sometimes advanced technologies to address needs while simultaneously stimulating new commercial business opportunities. Such focused “technology transfer” was evident in the late 1990s as the results of DOE investments in environmental management technology development led to new tools for characterizing and remediating contaminated sites as well as handling and minimizing the generation of hazardous wastes. The Department’s Office of Environmental Management was attempting to reduce the cost, accelerate themore » schedule, and improve the efficacy of clean-up efforts in the nuclear weapons complex. It recognized that resulting technologies had broader world market applications and that their commercialization would further reduce costs and facilitate deployment of improved technology at DOE sites. DOE’s Albuquerque Operations Office (now part of the National Nuclear Security Administration) began in 1995 to build the foundation for a technology exchange program with Mexico. Initial sponsorship for this work was provided by the Department’s Office of Environmental Management. As part of this effort, Applied Sciences Laboratory, Inc. (ASL) was contracted by the DOE Albuquerque office to identify Mexico’s priority environmental management needs, identify and evaluate DOE-sponsored technologies as potential solutions for those needs, and coordinate these opportunities with decision makers from Mexico’s federal government. That work led to an improved understanding of many key environmental challenges that Mexico faces and the many opportunities to apply DOE’s technologies to help resolve them. The above results constituted, in large part, the foundation for an initial DOE-funded program to apply the Department’s technology base to help address some of Mexico’s challenging environmental issues. The results also brought focus to the potential contributions that DOE’s science and technology could make for solving the many difficult, multi-generational problems faced by hundreds of bi-national communities along the 2,000-mile shared border of the United States and Mexico. Efforts to address these U.S.-Mexico border issues were initially sponsored by the DOE’s Albuquerque and Carlsbad offices. In subsequent years, the U.S. Congress directed appropriations to DOE’s Carlsbad office to address public health, safety and security issues prevalent within U.S.-Mexico border communities. With ASL’s assistance, DOE’s Albuquerque office developed contacts and formed partnerships with interested U.S and Mexican government, academic, and commercial organizations. Border industries, industrial effluents, and public health conditions were evaluated and documented. Relevant technologies were then matched to environmental problem sets along the border. Several technologies that were identified and subsequently supported by this effort are now operational in a number of U.S.-Mexico border communities, several communities within Mexico’s interior states, and in other parts of Latin America. As a result, some serious public health threats within these communities caused by exposure to toxic airborne pollutants have been reduced. During this time, DOE’s Carlsbad office hosted a bilateral conference to establish a cross-border consensus on what should be done on the basis of these earlier investigative efforts. Participating border region stakeholders set an agenda for technical collaborations. This agenda was supported by several Members of Congress who provided appropriations and directed DOE’s Carlsbad office to initiate technology demonstration projects. During the following two years, more than 12 private-sector and DOE-sponsored technologies were demonstrated in partnership with numerous border community stakeholders. All technologies were well received and their effectiveness at addressing health, safety and security issues was successfully demonstrated. Several of these technologies, including those noted above and demonstrated under this effort, are now operational. Furthermore, a number of public and national security issues unique to the U.S.-Mexico border were brought to the attention of the federal government and are now being addressed, largely through the efforts of the U.S. Department of Homeland Security. Program results demonstrated the value and effectiveness of the program’s process for technology exchanges. Opportunities now exist to transition the program from its successful initial stage to one where it can more effectively address a broader spectrum of multi-disciplinary problems that impact millions of U.S. and Mexican citizens. Substantial benefits would accrue to both sides of the U.S.-Mexico border were the two countries to continue this collaboration.« less
Push-Pull Tests for Evaluating the Aerobic Cometabolism of Chlorinated Aliphatic Hydrocarbons
2006-09-01
Z39-18 i COST & PERFORMANCE REPORT ESTCP Project: ER-9921 TABLE OF CONTENTS Page 1.0 EXECUTIVE SUMMARY...31 iv ACRONYMS AND ABBREVIATIONS ACFEE Air Force Center for Environmental Excellence Br bromine BTEX benzene...ESTCP Environmental Security Technology Certification Program FID flame ionization detector GC gas chromatography HP Hewlett-Packard IC
2006-09-01
Std Z39-18 i COST & PERFORMANCE REPORT ESTCP Project: ER-9921 TABLE OF CONTENTS Page 1.0 EXECUTIVE SUMMARY...31 iv ACRONYMS AND ABBREVIATIONS ACFEE Air Force Center for Environmental Excellence Br bromine BTEX...Agency ESTCP Environmental Security Technology Certification Program FID flame ionization detector GC gas chromatography HP Hewlett-Packard
78 FR 72873 - Availability of 2014-2018 Draft Strategic Plan and Request for Public Comment
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-04
... energy, environmental, and nuclear security of the United States; promoting scientific and technological innovation in support of that mission; sponsoring basic research in the physical sciences; [[Page 72874
Biological Treatment of Solvent-Based Paint
2011-01-01
ESTCP Environmental Security Technology Certification Program FK-WTP Fort Kamehameha Wastewater Treatment Plant FTIR Fourier Transform Infrared...established by the Fort Kamehameha Wastewater Treatment Plant (FK-WTP) for the water; toxicity characteristic leaching procedure (TCLP) requirements for
NASA Astrophysics Data System (ADS)
Lovett, Kian
Since the dawn of time, humans have engaged in war. In the last 5,600 years of recorded history 14,600 wars have been waged1. The United Nations has sought to save succeeding generations from the scourge of war and to foster peace. Wars have recently taken place in Afghanistan and Iraq. Both countries are now faced with a range of complex problems. In-depth country assessments reveal significant shortcomings in the areas of water, sanitation, health, security and natural resource management. These are key factors when examining environmental security, sustainable development and trans-boundary problems, all of which are issues relevant to the Middle East and Central Asian states. Space technology can be applied to support the reconstruction and development plans for Afghanistan and Iraq; however, there needs to be an investigation and open discussion of how these resources can best be used. Already, agencies within the United Nations possess considerable expertise in the use of space technologies in the area of disaster management. If this capability is to be used, there will need to be inter-agency coordination, not to mention a further expansion and development of the United Nations role in both Afghanistan and Iraq.
Energy technology evaluation report: Energy security
NASA Astrophysics Data System (ADS)
Koopman, R.; Lamont, A.; Schock, R.
1992-09-01
Energy security was identified in the National Energy Strategy (NES) as a major issue for the Department of Energy (DOE). As part of a process designed by the DOE to identify technologies important to implementing the NES, an expert working group was convened to consider which technologies can best contribute to reducing the nation's economic vulnerability to future disruptions of world oil supplies, the working definition of energy security. Other working groups were established to deal with economic growth, environmental quality, and technical foundations. Energy Security working group members were chosen to represent as broad a spectrum of energy supply and end-use technologies as possible and were selected for their established reputations as experienced experts with an ability to be objective. The time available for this evaluation was very short. The group evaluated technologies using criteria taken from the NES which can be summarized for energy security as follows: diversifying sources of world oil supply so as to decrease the increasing monopoly status of the Persian Gulf region; reducing the importance of oil use in the US economy to diminish the impact of future disruptions in oil supply; and increasing the preparedness of the US to deal with oil supply disruptions by having alternatives available at a known price. The result of the first phase of the evaluation process was the identification of technology groups determined to be clearly important for reducing US vulnerability to oil supply disruptions. The important technologies were mostly within the high leverage areas of oil and gas supply and transportation demand but also included hydrogen utilization, biomass, diversion resistant nuclear power, and substitute industrial feedstocks.
Hanrahan, Lawrence P.; Anderson, Henry A.; Busby, Brian; Bekkedal, Marni; Sieger, Thomas; Stephenson, Laura; Knobeloch, Lynda; Werner, Mark; Imm, Pamela; Olson, Joseph
2004-01-01
In this article we describe the development of an information system for environmental childhood cancer surveillance. The Wisconsin Cancer Registry annually receives more than 25,000 incident case reports. Approximately 269 cases per year involve children. Over time, there has been considerable community interest in understanding the role the environment plays as a cause of these cancer cases. Wisconsin’s Public Health Information Network (WI-PHIN) is a robust web portal integrating both Health Alert Network and National Electronic Disease Surveillance System components. WI-PHIN is the information technology platform for all public health surveillance programs. Functions include the secure, automated exchange of cancer case data between public health–based and hospital-based cancer registrars; web-based supplemental data entry for environmental exposure confirmation and hypothesis testing; automated data analysis, visualization, and exposure–outcome record linkage; directories of public health and clinical personnel for role-based access control of sensitive surveillance information; public health information dissemination and alerting; and information technology security and critical infrastructure protection. For hypothesis generation, cancer case data are sent electronically to WI-PHIN and populate the integrated data repository. Environmental data are linked and the exposure–disease relationships are explored using statistical tools for ecologic exposure risk assessment. For hypothesis testing, case–control interviews collect exposure histories, including parental employment and residential histories. This information technology approach can thus serve as the basis for building a comprehensive system to assess environmental cancer etiology. PMID:15471739
Laboratory Directed Research and Development FY2010 Annual Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jackson, K J
2011-03-22
A premier applied-science laboratory, Lawrence Livermore National Laboratory (LLNL) has at its core a primary national security mission - to ensure the safety, security, and reliability of the nation's nuclear weapons stockpile without nuclear testing, and to prevent and counter the spread and use of weapons of mass destruction: nuclear, chemical, and biological. The Laboratory uses the scientific and engineering expertise and facilities developed for its primary mission to pursue advanced technologies to meet other important national security needs - homeland defense, military operations, and missile defense, for example - that evolve in response to emerging threats. For broader nationalmore » needs, LLNL executes programs in energy security, climate change and long-term energy needs, environmental assessment and management, bioscience and technology to improve human health, and for breakthroughs in fundamental science and technology. With this multidisciplinary expertise, the Laboratory serves as a science and technology resource to the U.S. government and as a partner with industry and academia. This annual report discusses the following topics: (1) Advanced Sensors and Instrumentation; (2) Biological Sciences; (3) Chemistry; (4) Earth and Space Sciences; (5) Energy Supply and Use; (6) Engineering and Manufacturing Processes; (7) Materials Science and Technology; Mathematics and Computing Science; (8) Nuclear Science and Engineering; and (9) Physics.« less
Updated Classrooms for Updated Curriculum.
ERIC Educational Resources Information Center
Phillips, Joanne B.
1986-01-01
Based on an unspecified number of teachers surveyed and onsite visits, agreement exists about some features of optimum facilities for secondary classes in electronic technology. All involved wanted more security, adequate wiring, protection for the equipment, and environmental control. (MLF)
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 1 2011-07-01 2011-07-01 false Definitions. 11.4 Section 11.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS... revelation of sensitive intelligence operations; and the disclosure of scientific or technological...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 1 2013-07-01 2013-07-01 false Definitions. 11.4 Section 11.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS... revelation of sensitive intelligence operations; and the disclosure of scientific or technological...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 40 Protection of Environment 1 2014-07-01 2014-07-01 false Definitions. 11.4 Section 11.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS... revelation of sensitive intelligence operations; and the disclosure of scientific or technological...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 40 Protection of Environment 1 2012-07-01 2012-07-01 false Definitions. 11.4 Section 11.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS... revelation of sensitive intelligence operations; and the disclosure of scientific or technological...
Chelating Polymers and Environmental Remediation
2009-03-01
remediation, nanotechnology 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 22 19a. NAME OF RESPONSIBLE PERSON...interest in nanotechnology as well as biomaterials and biomimetic systems appears to be shaping the future of polymeric environmental remediation (18...in nanotechnology is not expected until the cost is commensurate to conventional technologies. 13 6. References 1. Kostal, J.; Prabhukumar
The DHS Directorate of Science and Technology: Key Issues for Congress
2009-06-22
recently under the authority of the Homeland Security Act. Environmental Measurements Laboratory The Environmental Measurements Laboratory ( EML ) in...Historically, the focus of EML was detection and monitoring of low-level radiation releases. The transfer of EML to the S&T Directorate required a realignment...debated whether EML is most appropriately positioned in 7 EML realignment and related
Peace and security in Northeast Asia: The nuclear issue and the Korean Peninsula
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kihl, Y.W.; Hayes, P.; Scalapino, R.A.
1996-01-01
Korean security was the focus of world-wide attention and concern in 1993--95 with North Korea's 'suspected' nuclear weapons program. Dubbed by some as the first post-Cold War nuclear crisis, it was triggered by the United Nations Security Council's move to impose economic sanctions on North Korea. Although the immediate crisis was defused diplomatically, the nuclear time bomb continues to tick on the Korean peninsula, and the issues remain under close international surveillance. This important book examines North Korea's nuclear controversy from a variety of perspectives, including nuclear reactor technology and technology transfer, economic sanctions and incentives, strategic calculus and confidence-buildingmore » measures, the major powers, and environmental challenges that a nuclear-free zone in Korea will present.« less
NASA Astrophysics Data System (ADS)
Johnson, S. P.; Rohrer, M. E.
2017-12-01
The application of scientific research pertaining to satellite imaging and data processing has facilitated the development of dynamic methodologies and tools that utilize nanosatellites and analytical platforms to address the increasing scope, scale, and intensity of emerging environmental threats to national security. While the use of remotely sensed data to monitor the environment at local and global scales is not a novel proposition, the application of advances in nanosatellites and analytical platforms are capable of overcoming the data availability and accessibility barriers that have historically impeded the timely detection, identification, and monitoring of these stressors. Commercial and university-based applications of these technologies were used to identify and evaluate their capacity as security-motivated environmental monitoring tools. Presently, nanosatellites can provide consumers with 1-meter resolution imaging, frequent revisits, and customizable tasking, allowing users to define an appropriate temporal scale for high resolution data collection that meets their operational needs. Analytical platforms are capable of ingesting increasingly large and diverse volumes of data, delivering complex analyses in the form of interpretation-ready data products and solutions. The synchronous advancement of these technologies creates the capability of analytical platforms to deliver interpretable products from persistently collected high-resolution data that meet varying temporal and geographic scale requirements. In terms of emerging environmental threats, these advances translate into customizable and flexible tools that can respond to and accommodate the evolving nature of environmental stressors. This presentation will demonstrate the capability of nanosatellites and analytical platforms to provide timely, relevant, and actionable information that enables environmental analysts and stakeholders to make informed decisions regarding the prevention, intervention, and prediction of emerging environmental threats.
Nevada National Security Site Environmental Report 2012 Attachment A: Site Description
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, Cathy A
This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, andmore » assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.« less
Nevada National Security Site Environmental Report 2016, Attachment A: Site Description
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, Cathy
This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2016 (prepared by National Security Technologies, LLC [NSTec], 2017). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological settings and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current sitemore » operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.« less
Nevada National Security Site Environmental Report 2013 Attachment A: Site Description
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, C.
This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, andmore » assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.« less
46 CFR 162.060-5 - Incorporation by reference.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) EQUIPMENT, CONSTRUCTION, AND MATERIALS: SPECIFICATIONS AND APPROVAL ENGINEERING EQUIPMENT Ballast Water Management Systems § 162.060-5 Incorporation by...), Environmental Technology Verification Program, National Risk Management Research Laboratory Office of Research...
Detailed Field Investigation of Vapor Intrusion Processes
2008-08-01
difluoroethane DQO data quality objective ESTCP Environmental Security Technology Certification Program HCl hydrochloric acid OU-5 Operable Unit...impacted by significant leakage of ambient air. Some leak tracer compounds such as difluoroethane (DFA) and isopropyl alcohol may cause elevated detection
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-14
... & Renewable Energy, Fossil Energy, and Nuclear Energy--a set of programs with an annual collected budget of... enhance energy and national security, reduce environmental impacts, and increase U.S. competitiveness. B...
Laboratory Directed Research and Development Annual Report for 2009
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hughes, Pamela J.
This report documents progress made on all LDRD-funded projects during fiscal year 2009. As a US Department of Energy (DOE) Office of Science (SC) national laboratory, Pacific Northwest National Laboratory (PNNL) has an enduring mission to bring molecular and environmental sciences and engineering strengths to bear on DOE missions and national needs. Their vision is to be recognized worldwide and valued nationally for leadership in accelerating the discovery and deployment of solutions to challenges in energy, national security, and the environment. To achieve this mission and vision, they provide distinctive, world-leading science and technology in: (1) the design and scalablemore » synthesis of materials and chemicals; (2) climate change science and emissions management; (3) efficient and secure electricity management from generation to end use; and (4) signature discovery and exploitation for threat detection and reduction. PNNL leadership also extends to operating EMSL: the Environmental Molecular Sciences Laboratory, a national scientific user facility dedicated to providing itnegrated experimental and computational resources for discovery and technological innovation in the environmental molecular sciences.« less
2016 National Algal Biofuels Technology Review
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barry, Amanda; Wolfe, Alexis; English, Christine
The Bioenergy Technologies Office (BETO) of the U.S. Department of Energy (DOE), Office of Energy Efficiency and Renewable Energy, is committed to advancing the vision of a viable, sustainable domestic biomass industry that produces renewable biofuels, bioproducts, and biopower; enhances U.S. energy security; reduces our dependence on fossil fuels; provides environmental benefits; and creates economic opportunities across the nation. BETO’s goals are driven by various federal policies and laws, including the Energy Independence and Security Act of 2007 (EISA). To accomplish its goals, BETO has undertaken a diverse portfolio of research, development, and demonstration (RD&D) activities, in partnership with nationalmore » laboratories, academia, and industry.« less
2006-07-01
The ADT in 2025 is predicted to range from 38,000 to 40,000. Peak hour volumes are predicted to be 2,097 in the AM peak hour and 2,360 in the PM... peak hour. A variety of things could change this classification and improve traffic and the projected LOS by 2025. Several examples include the...vehicles, as well as numerous off- peak trips. Development proposals south at the adjacent Sandia Science and Technology Park and further south of the
Enhancing infrastructure resilience through business continuity planning.
Fisher, Ronald; Norman, Michael; Klett, Mary
2017-01-01
Critical infrastructure is crucial to the functionality and wellbeing of the world around us. It is a complex network that works together to create an efficient society. The core components of critical infrastructure are dependent on one another to function at their full potential. Organisations face unprecedented environmental risks such as increased reliance on information technology and telecommunications, increased infrastructure interdependencies and globalisation. Successful organisations should integrate the components of cyber-physical and infrastructure interdependencies into a holistic risk framework. Physical security plans, cyber security plans and business continuity plans can help mitigate environmental risks. Cyber security plans are becoming the most crucial to have, yet are the least commonly found in organisations. As the reliance on cyber continues to grow, it is imperative that organisations update their business continuity and emergency preparedness activities to include this.
1996 Laboratory directed research and development annual report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meyers, C.E.; Harvey, C.L.; Lopez-Andreas, L.M.
This report summarizes progress from the Laboratory Directed Research and Development (LDRD) program during fiscal year 1996. In addition to a programmatic and financial overview, the report includes progress reports from 259 individual R&D projects in seventeen categories. The general areas of research include: engineered processes and materials; computational and information sciences; microelectronics and photonics; engineering sciences; pulsed power; advanced manufacturing technologies; biomedical engineering; energy and environmental science and technology; advanced information technologies; counterproliferation; advanced transportation; national security technology; electronics technologies; idea exploration and exploitation; production; and science at the interfaces - engineering with atoms.
Clean Coal Technology Demonstration Program: Project fact sheets 2000, status as of June 30, 2000
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
2000-09-01
The Clean Coal Technology Demonstration Program (CCT Program), a model of government and industry cooperation, responds to the Department of Energy's (DOE) mission to foster a secure and reliable energy system that is environmentally and economically sustainable. The CCT Program represents an investment of over $5.2 billion in advanced coal-based technology, with industry and state governments providing an unprecedented 66 percent of the funding. With 26 of the 38 active projects having completed operations, the CCT Program has yielded clean coal technologies (CCTs) that are capable of meeting existing and emerging environmental regulations and competing in a deregulated electric powermore » marketplace. The CCT Program is providing a portfolio of technologies that will assure that U.S. recoverable coal reserves of 274 billion tons can continue to supply the nation's energy needs economically and in an environmentally sound manner. As the nation embarks on a new millennium, many of the clean coal technologies have realized commercial application. Industry stands ready to respond to the energy and environmental demands of the 21st century, both domestically and internationally, For existing power plants, there are cost-effective environmental control devices to control sulfur dioxide (S02), nitrogen oxides (NO,), and particulate matter (PM). Also ready is a new generation of technologies that can produce electricity and other commodities, such as steam and synthetic gas, and provide efficiencies and environmental performance responsive to global climate change concerns. The CCT Program took a pollution prevention approach as well, demonstrating technologies that remove pollutants or their precursors from coal-based fuels before combustion. Finally, new technologies were introduced into the major coal-based industries, such as steel production, to enhance environmental performance. Thanks in part to the CCT Program, coal--abundant, secure, and economical--can continue in its role as a key component in the U.S. and world energy markets. The CCT Program also has global importance in providing clean, efficient coal-based technology to a burgeoning energy market in developing countries largely dependent on coal. Based on 1997 data, world energy consumption is expected to increase 60 percent by 2020, with almost half of the energy increment occurring in developing Asia (including China and India). By 2020, energy consumption in developing Asia is projected to surpass consumption in North America. The energy form contributing most to the growth is electricity, as developing Asia establishes its energy infrastructure. Coal, the predominant indigenous fuel, in that region will be the fuel of choice in electricity production. The CCTs offer a means to mitigate potential environmental problems associated with unprecedented energy growth, and to enhance the U.S. economy through foreign equipment sales and engineering services.« less
Demonstration of an Environmentally Benign and Reduced Corrosion Runway Deicing Fluid
2011-01-01
ADDRESS(ES) Enviromental Security Technology Certification Program: 901 North Stuart Street, Suite 303, Arlington, Virginia 22203 10. SPONSOR...IMPLEMENTATION ISSUES Users may express concern because the Battelle-RDF is new and they may have reservations because of its potential damage to...several drivers for implementing a new , more environmentally friendly RDF. 1.3.1 Water Pollution Reduction The Clean Water Act (CWA) and its
Demonstration of an Environmentally Benign and Reduced Corrosion Runway Deicing Fluid
2011-01-01
43201 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) Enviromental Security Technology...laboratory to the airfields and airports across the country. Users may express concern because the Battelle-RDFs are new and they may have...airfield anti-icing and deicing at WPAFB. 1.3 REGULATORY DRIVERS There are several drivers for implementing a new , more environmentally friendly
Satellite Power Systems (SPS) laser studies. Volume 1: Laser environmental impact study
NASA Technical Reports Server (NTRS)
Beverly, R. E., III
1980-01-01
The environmental impact of space to Earth power transmission using space borne laser subsystems is emphasized. A laser system is defined, estimates of relevant efficiencies for laser power generation and atmospheric transmission are developed, and a comparison is made to a microwave system. Ancillary issues, such as laser beam spreading, safety and security, mass and volume estimates and technology growth are considered.
Earth Observation for Food Security and Sustainable Agriculture
NASA Astrophysics Data System (ADS)
Bach, Heike; Mauser, Wolfram; Gernot, Klepper
2016-08-01
The global and regional potentials of Earth Observation (EO) to contribute to food security and sustainable agriculture in the 2050-timeframe were analysed in the ESA study EO4Food, whose outcome will be presented (www.EO4Food.org). Emphasis was put on the global societal, economic, environmental and technological megatrends that will create demand for food and shape the future societies. They will also constitute the background for developments in EO for food security and sustainable agriculture. The capabilities of EO in this respect were critically reviewed with three perspectives 1) the role of EO science for society, 2) observables from space and 3) development of future science missions.It was concluded that EO can be pivotal for the further development of food security and sustainable agriculture. EO allows to support the whole economic and societal value chain from farmers through food industry to insurance and financial industry in satisfying demands and at the same time to support society in governing sustainable agriculture through verifyable rules and regulations. It has the potential to become the global source of environmental information that is assimilated into sophisticated environmental management models and is used to make agriculture sustainable.
Information Communication System at Tsukuba EXPO'85
NASA Astrophysics Data System (ADS)
Sakagami, Yasuhiko
At Tsukuba EXPO'85 information communication system which employs the most advanced technology such as optical technology, is operated to conduct EXPO information guide, environmental and security control at the site, and office management, which is effective for smooth management of Exposition and appropriate service to visitors. The author outlines the characteristics of the whole communication system, and also describes how communication system using optical technology is located in the whole communication system, and the system outline.
Plant genetics, sustainable agriculture and global food security.
Ronald, Pamela
2011-05-01
The United States and the world face serious societal challenges in the areas of food, environment, energy, and health. Historically, advances in plant genetics have provided new knowledge and technologies needed to address these challenges. Plant genetics remains a key component of global food security, peace, and prosperity for the foreseeable future. Millions of lives depend upon the extent to which crop genetic improvement can keep pace with the growing global population, changing climate, and shrinking environmental resources. While there is still much to be learned about the biology of plant-environment interactions, the fundamental technologies of plant genetic improvement, including crop genetic engineering, are in place, and are expected to play crucial roles in meeting the chronic demands of global food security. However, genetically improved seed is only part of the solution. Such seed must be integrated into ecologically based farming systems and evaluated in light of their environmental, economic, and social impacts-the three pillars of sustainable agriculture. In this review, I describe some lessons learned, over the last decade, of how genetically engineered crops have been integrated into agricultural practices around the world and discuss their current and future contribution to sustainable agricultural systems.
Home automation in the workplace.
McCormack, J E; Tello, S F
1994-01-01
Environmental control units and home automation devices contribute to the independence and potential of individuals with disabilities, both at work and at home. Devices currently exist that can assist people with physical, cognitive, and sensory disabilities to control lighting, appliances, temperature, security, and telephone communications. This article highlights several possible applications for these technologies and discusses emerging technologies that will increase the benefits these devices offer people with disabilities.
2015-06-01
National Instruments. The National Instruments DAQ is a full-featured PC running Windows 7. The DAQ, electromagnetic transmitter , and batteries for the... electromagnetic induction Environet Environet, Inc. ESTCP Environmental Security Technology Certification Program ftp file transfer protocol FUDS formerly used...capabilities of a currently available advanced electromagnetic induction sensor developed specifically for discrimination on real sites under operational
- Oklahoma Water Resources Center
INTERDISCIPLINARY PROGRAMS Environmental Sciences Master of International Agriculture Degree Program OSU Home Professional Development Training (Baton Rouge, LA; 8/5-10) Global Water Security for Agriculture and Natural Oklahoma City Center for Health Sciences Division of Agriculture Institute of Technology Veterinary
Environmental impacts of biofuel production and use
The 2007 Energy Independence and Security Act (EISA) required a significant increase in the production and use of renewable fuels. Given the current state of technology and infrastructure, nearly all of the projected volume of biofuel consumption over the foreseeable future is ex...
Homeland Security Research Improves the Nation's Ability to ...
Technical Brief Homeland Security (HS) Research develops data, tools, and technologies to minimize the impact of accidents, natural disasters, terrorist attacks, and other incidents that can result in toxic chemical, biological or radiological (CBR) contamination. HS Research develops ways to detect contamination, sampling strategies, sampling and analytical methods, cleanup methods, waste management approaches, exposure assessment methods, and decision support tools (including water system models). These contributions improve EPA’s response to a broad range of environmental disasters.
2015-01-01
vapor-tight protection). This allows the team to make continuous entries into a contaminated area for at least 72 hours, before they need to restock...to secure a contamination source or to minimize human health or environmental impact. Tailored Response All NSF hazmat technicians are procient in...to identify unknown atmo- spheres and quantify contamination . The NSF also constantly evaluates new technology and advanced instru- ments that
[Biofuels, food security and transgenic crops].
Acosta, Orlando; Chaparro-Giraldo, Alejandro
2009-01-01
Soaring global food prices are threatening to push more poor people back below the poverty line; this will probably become aggravated by the serious challenge that increasing population and climate changes are posing for food security. There is growing evidence that human activities involving fossil fuel consumption and land use are contributing to greenhouse gas emissions and consequently changing the climate worldwide. The finite nature of fossil fuel reserves is causing concern about energy security and there is a growing interest in the use of renewable energy sources such as biofuels. There is growing concern regarding the fact that biofuels are currently produced from food crops, thereby leading to an undesirable competition for their use as food and feed. Nevertheless, biofuels can be produced from other feedstocks such as lingo-cellulose from perennial grasses, forestry and vegetable waste. Biofuel energy content should not be exceeded by that of the fossil fuel invested in its production to ensure that it is energetically sustainable; however, biofuels must also be economically competitive and environmentally acceptable. Climate change and biofuels are challenging FAO efforts aimed at eradicating hunger worldwide by the next decade. Given that current crops used in biofuel production have not been domesticated for this purpose, transgenic technology can offer an enormous contribution towards improving biofuel crops' environmental and economic performance. The present paper critically presents some relevant relationships between biofuels, food security and transgenic plant technology.
Physics and Its Multiple Roles in the International Atomic Energy Agency
NASA Astrophysics Data System (ADS)
Massey, Charles D.
2017-01-01
The IAEA is the world's centre for cooperation in the nuclear field. It was set up as the world's ``Atoms for Peace'' organization in 1957 within the United Nations family. The Agency works with its Member States and multiple partners worldwide to promote the safe, secure and peaceful use of nuclear technologies. Three main areas of work underpin the IAEA's mission: Safety and Security, Science and Technology, and Safeguards and Verification. To carry out its mission, the Agency is authorized to encourage and assist research on, and development and practical application of, atomic energy for peaceful uses throughout the world; foster the exchange of scientific and technical information on peaceful uses of atomic energy; and encourage the exchange of training of scientists and experts in the field of peaceful uses of atomic energy. Nowadays, nuclear physics and nuclear technology are applied in a great variety of social areas, such as power production, medical diagnosis and therapies, environmental protection, security control, material tests, food processing, waste treatments, agriculture and artifacts analysis. This presentation will cover the role and practical application of physics at the IAEA, and, in particular, focus on the role physics has, and will play, in nuclear security.
Water security-National and global issues
Tindall, James A.; Campbell, Andrew A.
2010-01-01
Potable or clean freshwater availability is crucial to life and economic, environmental, and social systems. The amount of freshwater is finite and makes up approximately 2.5 percent of all water on the Earth. Freshwater supplies are small and randomly distributed, so water resources can become points of conflict. Freshwater availability depends upon precipitation patterns, changing climate, and whether the source of consumed water comes directly from desalination, precipitation, or surface and (or) groundwater. At local to national levels, difficulties in securing potable water sources increase with growing populations and economies. Available water improves living standards and drives urbanization, which increases average water consumption per capita. Commonly, disruptions in sustainable supplies and distribution of potable water and conflicts over water resources become major security issues for Government officials. Disruptions are often influenced by land use, human population, use patterns, technological advances, environmental impacts, management processes and decisions, transnational boundaries, and so forth.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bryant, M.; Starkey, A.H.; Dick-Peddie, W.A.
A brief overview of the present day geothermal applications for hydrothermal electrical generation and direct heat use and their environmental implications is provided. Technologies and environmental impacts are considered at all points on the pathway of development resource exploration; well field, plant and transmission line construction; and plant operation. The technologies for electrical generation-direct, dry steam conversion; separated steam conversion; single-flash conversion, separated-steam/single-flash conversion and binary cycle conversion and the technologies for direct heat use - direct use of geothermal waters, surface heat exhanger, down-the hole heat exchanger and heat pump are described. A summary of the geothermal technologies plannedmore » or in operation within New Mexico geothermal areas is provided. A review of regulations that affect geothermal development and its related environmental impact in New Mexico is presented. The regulatory pathway, both state and federal, of geothermal exploration after the securing of appropriate leases, development, and construction and implementation of a geothermal facility are described. Six categories (Geophysical, Water, Air, Noise, Biota and Socioeconomics) were selected for environmental assessment. The data available is described.« less
75 FR 27547 - Notice of Reestablishment of the Secretary of Energy Advisory Board
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-17
... management, basic science, research, development and technology activities; energy and national security... basis of their broad competence in areas relating to quality management, basic science, renewable energy, energy policy, environmental science, economics, and broad public policy interests. Membership of the...
NASA Technical Reports Server (NTRS)
Campbell, Donald C.
1995-01-01
Aeropropulsion technologies must progress to satisfy increasingly stringent global environmental requirements with economically viable air transportation systems. In this paper, key propulsion technologies to meet future needs are identified and the associated challenges are briefly discussed. Also discussed are NASA's vision, NASA's changing role in meeting today's challenge of a shrinking research budget, and propulsion technology impacts on the environment and air transport economics. Critical aeropropulsion technology drivers are identified and their impact evaluated. The aviation industry is critical to the nation's economy, job creation, and national security. NASA's advanced aeropropulsion technology programs and their relation to the aviation industry are discussed.
FY2010 Annual Progress Report for Propulsion Materials
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, Patrick B.; Schutte, Carol L.; Gibbs, Jerry L.
The Propulsion Materials Technology actively supports the energy security and reduction of greenhouse emissions goals of the Vehicle Technologies Program by developing advanced materials that enable development of higher efficiency powertrains for ground transportation. Propulsion Materials works closely with the other disciplines within the VT Program to identify the materials properties essential for the development of cost-effective, highly efficient, and environmentally friendly next-generation heavy and light duty powertrains.
A High Speed Finger-Print Optical Scanning Method
2000-01-01
biometrics technologies for authentication, from the view point of convenience and higher security, dactyloscopy is by far the best, much better than the...sensing technologies using static capacitance, thermal or optical detection, the optical detection is by far with the most potential to meet the...present time due to the low resolution of the inherent nature of thermal imaging technique. Besides, this method is easily influenced by environmental
Data and monitoring needs for a more ecological agriculture
NASA Astrophysics Data System (ADS)
Zaks, David P. M.; Kucharik, Christopher J.
2011-01-01
Information on the life-cycle environmental impacts of agricultural production is often limited. As demands grow for increasing agricultural output while reducing its negative environmental impacts, both existing and novel data sources can be leveraged to provide more information to producers, consumers, scientists and policy makers. We review the components and organization of an agroecological sensor web that integrates remote sensing technologies and in situ sensors with models in order to provide decision makers with effective management options at useful spatial and temporal scales for making more informed decisions about agricultural productivity while reducing environmental burdens. Several components of the system are already in place, but by increasing the extent and accessibility of information, decision makers will have the opportunity to enhance food security and environmental quality. Potential roadblocks to implementation include farmer acceptance, data transparency and technology deployment.
Integrating Safety with Science,Technology and Innovation at Los Alamos National Laboratory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rich, Bethany M
2012-04-02
The mission of Los Alamos National Laboratory (LANL) is to develop and apply science, technology and engineering solutions to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve emerging national security challenges. The most important responsibility is to direct and conduct efforts to meet the mission with an emphasis on safety, security, and quality. In this article, LANL Environmental, Safety, and Health (ESH) trainers discuss how their application and use of a kinetic learning module (learn by doing) with a unique fall arrest system is helping to address one the most common industrialmore » safety challenges: slips and falls. A unique integration of Human Performance Improvement (HPI), Behavior Based Safety (BBS) and elements of the Voluntary Protection Program (VPP) combined with an interactive simulator experience is being used to address slip and fall events at Los Alamos.« less
2008-09-18
molecular oxygen – singlet oxygen (SO). According to the quantum theory , the spin configuration of the lowest energy state with unpaired electrons in...in applications spanning from environmental and health monitoring to security. Lectures on advanced theories and modeling of the sensing mechanisms...10:15 Marie-Isabelle BARATON and Pavel KASHKAROV Welcome address Introduction to the Advanced Study Institute 10:15 – 10:30 Welcome address by
2011-03-01
agricultural technology have contributed to a decline in global yields of maize and wheat in recent years. This decrease in yields , combined with a...medical communities to examine gaps in preparedness and iden- tify capabilities that must be built in military forces so that they can properly support...of yields . Rain fed agricultural could fall by about 50 percent by 2020. Health security, clean air water, food, shelter and the degra- dation cause
How 21st century droughts affect food and environmental security
NASA Astrophysics Data System (ADS)
Kogan, Felix
The first 13th years of the 21st century has begun with a series of widespread, long and intensive droughts around the world. Extreme and severe-to-extreme intensity droughts covered 2-6% and 7-16% of the world land, respectively, affecting environment, economies and humans. These droughts reduced agricultural production, leading to food shortages, human health deterioration, poverty, regional disturbances, population migration and death. This presentation is a travelogue of the 21st century global and regional droughts during the warmest years of the past 100 years. These droughts were identified and monitored with the NOAA operational space technology, called Vegetation Health (VH), which has the longest period of observation and provide good data quality. The VH method was used for assessment of vegetation condition or health, including drought early detection and monitoring. The VH method is based on operational satellites data estimating both land surface greenness (NDVI) and thermal conditions. The 21st century droughts in the USA, Russia, Australia Argentina, Brazil, China, India and other principal grain producing countries were intensive, long, covered large areas and caused huge losses in agricultural production, which affected food and environmental security and led to food riots in some countries. This presentation investigate how droughts affect food and environmental security, if they can be detected earlier, how to monitor their area, intensity, duration and impacts and also their dynamics during the climate warming era with satellite-based vegetation health technology.
NASA Astrophysics Data System (ADS)
Brown, C. E.
1995-12-01
The purpose of this report is to describe the research programs and program activities of the US Department of Energy (DOE) that most directly relate to topics in the field of environmental geology. In this light, the mission of the DOE and the definition of environmental geology will be discussed. In a broad sense, environmental geology is that branch of earth science that emphasizes the entire spectrum of human interactions with the physical environment that include environmental health, mineral exploration and exploitation, waste management, energy use and conservation, global change, environmental law, natural and man-made hazard assessment, and land-use planning. A large number of research, development, and demonstration programs are under DOE's administration and guidance that directly or indirectly relate to topics in environmental geology. The primary mission of the DOE is to contribute to the welfare of the nation by providing the scientific foundation, technology, policy, and institutional leadership necessary to achieve efficiency in energy use, diversity in energy sources, a more productive and competitive economy, improved environmental quality, and a secure national defense. The research and development funding effort has most recently been redirected toward greater utilization of clean fossil fuels, especially natural gas, weatherization, renewable energy, energy efficiency, fusion energy, and high-energy physics. This paper will summarize the role that environmental geology has played and will continue to play in the execution of DOE's mission and the energy options that DOE has investigated closely. The specific options are those that center around energy choices, such as alternative-fueled transportation, building technologies, energy-efficient lighting, and clean energy.
Solar-powered drip irrigation enhances food security in the Sudano–Sahel
Burney, Jennifer; Woltering, Lennart; Burke, Marshall; Naylor, Rosamond; Pasternak, Dov
2010-01-01
Meeting the food needs of Africa’s growing population over the next half-century will require technologies that significantly improve rural livelihoods at minimal environmental cost. These technologies will likely be distinct from those of the Green Revolution, which had relatively little impact in sub-Saharan Africa; consequently, few such interventions have been rigorously evaluated. This paper analyzes solar-powered drip irrigation as a strategy for enhancing food security in the rural Sudano–Sahel region of West Africa. Using a matched-pair comparison of villages in northern Benin (two treatment villages, two comparison villages), and household survey and field-level data through the first year of harvest in those villages, we find that solar-powered drip irrigation significantly augments both household income and nutritional intake, particularly during the dry season, and is cost effective compared to alternative technologies. PMID:20080616
Foundry Technologies Focused on Environmental and Ecological Applications
NASA Astrophysics Data System (ADS)
Roizin, Ya.; Lisiansky, M.; Pikhay, E.
Solutions allowing fabrication of remote control systems with integrated sensors (motes) were introduced as a part of CMOS foundry production platform and verified on silicon. The integrated features include sensors employing principles previously verified in the development of ultra-low power consuming non-volatile memories (C-Flash, MRAM) and components allowing low-power energy harvesting (low voltage rectifiers, high -voltage solar cells). The developed systems are discussed with emphasis on their environmental and security applications.
Trends in Global Agricultural Land Use: Implications for Environmental Health and Food Security.
Ramankutty, Navin; Mehrabi, Zia; Waha, Katharina; Jarvis, Larissa; Kremen, Claire; Herrero, Mario; Rieseberg, Loren H
2018-04-29
The eighteenth-century Malthusian prediction of population growth outstripping food production has not yet come to bear. Unprecedented agricultural land expansions since 1700, and technological innovations that began in the 1930s, have enabled more calorie production per capita than was ever available before in history. This remarkable success, however, has come at a great cost. Agriculture is a major cause of global environmental degradation. Malnutrition persists among large sections of the population, and a new epidemic of obesity is on the rise. We review both the successes and failures of the global food system, addressing ongoing debates on pathways to environmental health and food security. To deal with these challenges, a new coordinated research program blending modern breeding with agro-ecological methods is needed. We call on plant biologists to lead this effort and help steer humanity toward a safe operating space for agriculture.
Design Tool for Planning Permanganate Injection Systems
2010-08-01
Chemical Spill 10 CSTR continuously stirred tank reactors CT contact time EDB ethylene dibromide ESTCP Environmental Security Technology...63 6.2 Simulating Oxidant Distribution Using a Series of CSTRs ...ER- 0625. 6.2 SIMULATING OXIDANT DISTRIBUTION USING A SERIES OF CSTRS 6.2.1 MODEL DEVELOPMENT The transport and consumption of permanganate
This test simulated shipments of hazardous waste contained in polyethylene (poly) drums, metal drums, and corrugated boxes through routine land transportation routes and across international ports of entry in the El Paso/Ciudad Juarez trade area. RFID tags were attached to four ...
UAVs Being Used for Environmental Surveying
Chung, Sandra
2017-12-09
UAVs, are much more sophisticated than your typical remote-controlled plane. INL robotics and remote sensing experts have added state-of-the-art imaging and wireless technology to the UAVs to create intelligent remote surveillance craft that can rapidly survey a wide area for damage and track down security threats.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-26
... of Our Nation's Fleet of Cars And Trucks Memorandum for the Secretary of Transportation[,] the... the development of a new generation of clean cars and trucks through innovative technologies and..., 2010, which regulates these attributes of passenger cars and light-duty trucks for model years 2012...
Hydrogen Highways: Lessons on the Energy Technology-Policy Interface
ERIC Educational Resources Information Center
Waegel, Alex; Byrne, John; Tobin, Daniel; Haney, Bryan
2006-01-01
The hydrogen economy has received increasing attention recently. Common reasons cited for investigating hydrogen energy options are improved energy security, reduced environmental impacts, and its contribution to a transition to sustainable energy sources. In anticipation of these benefits, national and local initiatives have been launched in the…
1996 Site environmental report Sandia National Laboratories Albuquerque, New Mexico
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fink, C.H.; Duncan, D.; Sanchez, R.
1997-08-01
Sandia National Laboratories/New Mexico (SNL/NM) is operated in support of the U.S. Department of Energy (DOE) mission to provide weapon component technology and hardware for national security needs, and to conduct fundamental research and development (R&D) to advance technology in energy research, computer science, waste management, electronics, materials science, and transportation safety for hazardous and nuclear components. In support of this mission, the Environmental Safety and Health (ES&H) Center at SNL/NM conducts extensive environmental monitoring, surveillance, and compliance activities to assist SNL`s line organizations in meeting all applicable environmental regulations applicable to the site including those regulating radiological and nonradiologicalmore » effluents and emissions. Also herein are included, the status of environmental programs that direct and manage activities such as terrestrial surveillance; ambient air and meteorological monitoring; hazardous, radioactive, and solid waste management; pollution prevention and waste minimization; environmental restoration (ER); oil and chemical spill prevention; and National Environmental Policy Act (NEPA) documentation. This report has been prepared in compliance with DOE order 5400.1, General Environmental Protection.« less
DNA based random key generation and management for OTP encryption.
Zhang, Yunpeng; Liu, Xin; Sun, Manhui
2017-09-01
One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, Cathy
This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2012 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmentalmore » Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NFO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2012 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). Through a Memorandum of Agreement, NNSA/NFO is responsible for the oversight of these ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR and NTTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.« less
2016-09-23
Acquisition and Data Analysis). EMI sensors, MetalMapper, man-portable Time-domain Electromagnetic Multi-sensor Towed Array Detection System (TEMTADS...California Department of Toxic Substances Control EM61 EM61-MK2 EMI electromagnetic induction ESTCP Environmental Security Technology Certification...SOP Standard Operating Procedure v TEMTADS Time-domain Electromagnetic Multi-sensor Towed Array Detection System man-portable 2x2 TOI target(s
The impact of globalisation, free trade and technology on food and nutrition in the new millennium.
McMichael, P
2001-05-01
The millennium promises a dramatic politicisation of the food question. In addition to the prominent issues of food security, hunger and nutrition, bioengineering, food safety and quality, there are related issues of environmental sustainability, power, sovereignty and rights. All these issues are deeply implicated in the current corporate form of globalisation, which is transforming historic global arrangements by subordinating public institutions and the question of food security to private solutions. The present paper questions the self-evident association between globalisation and nutritional improvement.
Trade and commerce in improved crops and food: an essay on food security.
Kershen, Drew L
2010-11-30
Agricultural trade between nations is a significant proportion of total international trade. Agricultural trade in transgenic crops faces extra complications due to the existence of domestic and international regimes that focus specifically on agricultural biotechnology. These specialized regimes create legal and commercial challenges for trade in transgenic crops that have significant implications for the food security of the nations of the world. By food security, one should understand not just the available supply of food, but also the quality of the food and the environmental impact of agricultural production systems. These specialized regimes for transgenic crops can either encourage or hinder the adoption of agricultural biotechnology as a sustainable intensive agriculture. Sustainable intensive agriculture offers hope for agronomic improvements for agricultural production, socio-economic betterment for farmers and environmental benefits for societies. Sustainable intensive agriculture offers particular hope for the poorest farmers of the world because agricultural biotechnology is a technology in the seed. Copyright © 2010 Elsevier B.V. All rights reserved.
Worldwide Emerging Environmental Issues Affecting the U.S. Military. May 2007 Report
2007-05-01
Change…………………………….…….4 6.2 Nuclear Nonproliferation Treaty Stalemate Continues…………………………..…..5 6.3 Stockholm Convention on POPs Adopts Evaluation but...cooperation and implementation of the Convention on Desertification; and strengthen international cooperation in scientific research and technology transfer...Environmental Security Issues––May 2007 5 AC/UNU Millennium Project 6.3 Stockholm Convention on POPs Adopts
Environmental Security: Evolution of a New Concept in Security Studies
1999-04-01
vi ENVIRONMENTAL IMPACT OF POPULATION...1970�s. Environmental security and its direct impact on national and international security has not gone unnoticed by our nation�s leaders. Former...understanding of the �where and under what circumstances� environmental degradation, scarcity, and conflict occur and how they will impact U.S. environmental
LANL continuity of operations plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
Senutovitch, Diane M
2010-12-22
The Los Alamos National Laboratory (LANL) is a premier national security research institution, delivering scientific and engineering solutions for the nation's most crucial and complex problems. Our primary responsibility is to ensure the safety, security, and reliability of the nation's nuclear stockpile. LANL emphasizes worker safety, effective operational safeguards and security, and environmental stewardship, outstanding science remains the foundation of work at the Laboratory. In addition to supporting the Laboratory's core national security mission, our work advances bioscience, chemistry, computer science, earth and environmental sciences, materials science, and physics disciplines. To accomplish LANL's mission, we must ensure that the Laboratorymore » EFs continue to be performed during a continuity event, including localized acts of nature, accidents, technological or attack-related emergencies, and pandemic or epidemic events. The LANL Continuity of Operations (COOP) Plan documents the overall LANL COOP Program and provides the operational framework to implement continuity policies, requirements, and responsibilities at LANL, as required by DOE 0 150.1, Continuity Programs, May 2008. LANL must maintain its ability to perform the nation's PMEFs, which are: (1) maintain the safety and security of nuclear materials in the DOE Complex at fixed sites and in transit; (2) respond to a nuclear incident, both domestically and internationally, caused by terrorist activity, natural disaster, or accident, including mobilizing the resources to support these efforts; and (3) support the nation's energy infrastructure. This plan supports Continuity of Operations for Los Alamos National Laboratory (LANL). This plan issues LANL policy as directed by the DOE 0 150.1, Continuity Programs, and provides direction for the orderly continuation of LANL EFs for 30 days of closure or 60 days for a pandemic/epidemic event. Initiation of COOP operations may be required to support an allhazards event, including a national security emergency, major fire, catastrophic natural disaster, man-made disaster, terrorism event, or technological disaster by rendering LANL buildings, infrastructure, or Technical Areas unsafe, temporarily unusable, or inaccessible.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Anadon, Laura Diaz; Gallagher, Kelly Sims; Bunn, Matthew
2009-02-18
The report offers preliminary recommendations for near-term actions to strengthen the U.S. effort to develop and deploy advanced energy technologies. The report comes as the Obama Administration and the 111th U.S. Congress face enormous challenges and opportunities in tackling the pressing security, economic, and environmental problems posed by the energy sector. Improving the technologies of energy supply and end-use is a prerequisite for surmounting these challenges in a timely and cost-effective way, and this report elaborates on how policy can support develop of these important energy technologies.
NASA Astrophysics Data System (ADS)
Xu, Chong-Yao; Zheng, Xin; Xiong, Xiao-Ming
2017-02-01
With the development of Internet of Things (IoT) and the popularity of intelligent mobile terminals, smart home system has come into people’s vision. However, due to the high cost, complex installation and inconvenience, as well as network security issues, smart home system has not been popularized. In this paper, combined with Wi-Fi technology, Android system, cloud server and SSL security protocol, a new set of smart home system is designed, with low cost, easy operation, high security and stability. The system consists of Wi-Fi smart node (WSN), Android client and cloud server. In order to reduce system cost and complexity of the installation, each Wi-Fi transceiver, appliance control logic and data conversion in the WSN is setup by a single chip. In addition, all the data of the WSN can be uploaded to the server through the home router, without having to transit through the gateway. All the appliance status information and environmental information are preserved in the cloud server. Furthermore, to ensure the security of information, the Secure Sockets Layer (SSL) protocol is used in the WSN communication with the server. What’s more, to improve the comfort and simplify the operation, Android client is designed with room pattern to control home appliances more realistic, and more convenient.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ghose, M.K.; Paul, B.
The global energy requirement has grown at a phenomenal rate and the consumption of primary energy sources has been a very high positive growth. This article focuses on the consumption of different primary energy sources and it identifies that coal will continue to remain as the prime energy in the foreseeable future. It examines energy requirement perspectives for India and demands of petroleum, natural gas, and coal bed methane in the foreseeable future. It discusses the state of present day petroleum and petrochemical industries in the country and the latest advances in them to take over in the next fewmore » years. The regional pattern of consumption of primary energy sources shows that oil remains as the largest single source of primary energy in most parts of the world. However, gas dominates as the prime source in some parts of the world. Economic development and poverty alleviation depend on securing affordable energy sources and for the country's energy security; it is necessary to adopt the latest technological advances in petroleum and petrochemical industries by supportive government policies. But such energy is very much concerned with environmental degradation and must be driven by contemporary managerial acumen addressing environmental and social challenges effectively. Environmental laws for the abatement of environmental degradation are discussed in this paper. The paper concludes that energy security leading to energy independence is certainly possible and can be achieved through a planned manner.« less
Issues and options in addressing the environmental consequences of livestock sector's growth.
Gerber, P J; Vellinga, T V; Steinfeld, H
2010-02-01
The growth of the livestock sector is being achieved at substantial environmental costs. Today, livestock are a major stressor of the global environmental, occupying a quarter of emerged land (including a third of arable land), contributing close to a fifth of the anthropogenic greenhouse gas emissions, using eight percent of all water resources and threatening a wide range of endangered species. At the same time, livestock are also a crucial engine of rural growth and a tool for improving food security. Policies are required to guide the sector in achieving sometimes conflicting development objectives. Potential pathways include encouraging resource use efficiency, correcting for environmental externalities and accelerating technological change.
NASA Technical Reports Server (NTRS)
1983-01-01
Science and applications, NOAA environmental observation, commercial resource observations, commercial space processing, commercial communications, national security, technology development, and GEO servicing are addressed. Approach to time phasing of mission requirements, system sizing summary, time-phased user mission payload support, space station facility requirements, and integrated time-phased system requirements are also addressed.
Commercial Technology at the Tactical Edge
2013-06-01
Typical environmental examples are survivability in the face of hostile action, lack of fixed infrastructure , high mobility and ruggedness...Disconnected, Intermittent, and Limited (DIL) Communications Delay Tolerance Mobile Ad Hoc Networks (MANETs) Loss of infrastructure Security Cyber...for Apple’s IOS.25 In particular, various vendors have built application infrastructures around the various mobile phone operating systems (OSs) such
40 CFR 142.307 - What terms and conditions must be included in a small system variance?
Code of Federal Regulations, 2012 CFR
2012-07-01
... improvements to comply with the small system variance technology, secure an alternative source of water, or... included in a small system variance? 142.307 Section 142.307 Protection of Environment ENVIRONMENTAL... IMPLEMENTATION Variances for Small System Review of Small System Variance Application § 142.307 What terms and...
40 CFR 142.307 - What terms and conditions must be included in a small system variance?
Code of Federal Regulations, 2013 CFR
2013-07-01
... improvements to comply with the small system variance technology, secure an alternative source of water, or... included in a small system variance? 142.307 Section 142.307 Protection of Environment ENVIRONMENTAL... IMPLEMENTATION Variances for Small System Review of Small System Variance Application § 142.307 What terms and...
40 CFR 142.307 - What terms and conditions must be included in a small system variance?
Code of Federal Regulations, 2014 CFR
2014-07-01
... improvements to comply with the small system variance technology, secure an alternative source of water, or... included in a small system variance? 142.307 Section 142.307 Protection of Environment ENVIRONMENTAL... IMPLEMENTATION Variances for Small System Review of Small System Variance Application § 142.307 What terms and...
40 CFR 142.307 - What terms and conditions must be included in a small system variance?
Code of Federal Regulations, 2011 CFR
2011-07-01
... improvements to comply with the small system variance technology, secure an alternative source of water, or... included in a small system variance? 142.307 Section 142.307 Protection of Environment ENVIRONMENTAL... IMPLEMENTATION Variances for Small System Review of Small System Variance Application § 142.307 What terms and...
NASA Astrophysics Data System (ADS)
Leonelli, Joseph
1994-06-01
For the past 20 years, the Department of Defense has sponsored investigations and studies on the use of laser remote sensing techniques and light detection and ranging (lidar) methods for the detection, identification, and tracking of toxic and hazardous battlefield materials. The same lidar methods used by NASA, EPA, and several industry research groups to detect and measure the movement and concentration of air pollution near urban centers have been applied to the national security problem of detecting chemical and biological warfare agents that might be used on the modern battlefield. Significant government investment in the technology base and laser technology has resulted in advanced hardware configurations that are now available for demonstration and evaluation for industrial and environmental monitoring.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hughes, Joan F.
The US Department of Energy’s (DOE’s) Oak Ridge Reservation (ORR) is located in Roane and Anderson counties in East Tennessee, about 40 km (25 miles) from Knoxville. ORR is one of DOE’s most unique and complex sites. It encompasses three major facilities and thousands of employees that perform every mission in the DOE portfolio—energy research, environmental restoration, national security, nuclear fuel supply, reindustrialization, science education, basic and applied research in areas important to US security, and technology transfer. ORR was established in the early 1940s as part of the Manhattan Project for the purposes of enriching uranium and pioneering methodsmore » for producing and separating plutonium. Today, scientists at the Oak Ridge National Laboratory (ORNL), DOE’s largest multipurpose national laboratory, conduct world-leading research in advanced materials, alternative fuels, climate change, and supercomputing. The Y-12 National Security Complex (Y-12 or Y-12 Complex) is vital to maintaining the safety, security, and effectiveness of the US nuclear weapons stockpile and reducing the global threat posed by nuclear proliferation and terrorism. The East Tennessee Technology Park (ETTP), a former uranium enrichment complex, is being transitioned to a clean, revitalized industrial park.« less
Zhang, Xiao-Jian; Chen, Chao; Lin, Peng-Fei; Hou, Ai-Xin; Niu, Zhang-Bin; Wang, Jun
2011-01-01
China has suffered frequent source water contamination accidents in the past decade, which has resulted in severe consequences to the water supply of millions of residents. The origins of typical cases of contamination are discussed in this paper as well as the emergency response to these accidents. In general, excessive pursuit of rapid industrialization and the unreasonable location of factories are responsible for the increasing frequency of accidental pollution events. Moreover, insufficient attention to environmental protection and rudimentary emergency response capability has exacerbated the consequences of such accidents. These environmental accidents triggered or accelerated the promulgation of stricter environmental protection policy and the shift from economic development mode to a more sustainable direction, which should be regarded as the turning point of environmental protection in China. To guarantee water security, China is trying to establish a rapid and effective emergency response framework, build up the capability of early accident detection, and develop efficient technologies to remove contaminants from water.
NASA Astrophysics Data System (ADS)
Sileo, Maria; Gizzi, Fabrizio; Masini, Nicola
2015-04-01
One of the main tools of assessment and diagnosis used to define appropriate strategies for the preservation of cultural heritage is the environmental monitoring. To achieve an environmental monitoring are needed high costs of purchase and maintenance, high costs of instrumental and for the management of the plants and processing of results. These costs imply that the technologies for environmental monitoring are not as common but their use is limited to the study very famous monuments or sites. To extend the use and dissemination of such technologies to a greater number of monuments, through the project Pro_Cult (Advanced methodological approaches and technologies for Protection and Security of Cultural Heritage) a research aimed at testing low cost technologies has been performed. The aim of the research is to develop low cost monitoring systems, assessing their effectiveness in a comparative way with commercial high cost ones. To this aim an environmental monitoring system using the Arduino system was designed and developed. It is an electronics prototyping platform based on open-source hardware and software flexible and user friendly. This system is connected to sensors for the detection of environmental parameters of non high purchase cost but with respect to the medium potential detection sensors accurately. This low cost system was tested in the framework of a microclimate monitoring project of the crypt of St. Francis of Assisi in Irsina (Southern Italy) enriched by a precious cycle of medieval frescoes. The aim of this research was to compare two monitoring systems, the first, at low cost, using Arduino system, and the second, a standard commercial product for a full yearly cycle and assess the reliability and the results obtained by the two systems. This paper shows the results of the comparative analysis of an entire monitoring yearly cycle in relation to the problems of degradation affecting the paintings of medieval crypt [1]. The obtained results proved the capability and reliability of the designed low cost monitoring system for investigating the indoor microclimate in relation with decay pathologies. Acknowledgements The authors thank Basilicata Region for supporting this activity in the framework of the Project "PRO_CULT" (Advanced methodological approaches and technologies for Protection and Security of Cultural Heritage) financed by Regional Operational Programme ERDF 2007/2013 [1] M. Sileo, M. Biscione, F.T. Gizzi, N. Masini & M.I. Martinez-Garrido, 2014 - Low cost strategies for the environmental monitoring of Cultural Heritage: Preliminary data from the crypt of St. Francesco d'Assisi, Irsina (Basilicata, Southern Italy). Science, Technology and Cultural Heritage, Edited by Miguel Angel Rogerio-Candelera, 27-34. ISBN: 978-1-138-02744-2.
Laboratory Directed Research and Development FY2011 Annual Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Craig, W; Sketchley, J; Kotta, P
2012-03-22
A premier applied-science laboratory, Lawrence Livermore National Laboratory (LLNL) has earned the reputation as a leader in providing science and technology solutions to the most pressing national and global security problems. The LDRD Program, established by Congress at all DOE national laboratories in 1991, is LLNL's most important single resource for fostering excellent science and technology for today's needs and tomorrow's challenges. The LDRD internally directed research and development funding at LLNL enables high-risk, potentially high-payoff projects at the forefront of science and technology. The LDRD Program at Livermore serves to: (1) Support the Laboratory's missions, strategic plan, and foundationalmore » science; (2) Maintain the Laboratory's science and technology vitality; (3) Promote recruiting and retention; (4) Pursue collaborations; (5) Generate intellectual property; and (6) Strengthen the U.S. economy. Myriad LDRD projects over the years have made important contributions to every facet of the Laboratory's mission and strategic plan, including its commitment to nuclear, global, and energy and environmental security, as well as cutting-edge science and technology and engineering in high-energy-density matter, high-performance computing and simulation, materials and chemistry at the extremes, information systems, measurements and experimental science, and energy manipulation. A summary of each project was submitted by the principal investigator. Project summaries include the scope, motivation, goals, relevance to DOE/NNSA and LLNL mission areas, the technical progress achieved in FY11, and a list of publications that resulted from the research. The projects are: (1) Nuclear Threat Reduction; (2) Biosecurity; (3) High-Performance Computing and Simulation; (4) Intelligence; (5) Cybersecurity; (6) Energy Security; (7) Carbon Capture; (8) Material Properties, Theory, and Design; (9) Radiochemistry; (10) High-Energy-Density Science; (11) Laser Inertial-Fusion Energy; (12) Advanced Laser Optical Systems and Applications; (12) Space Security; (13) Stockpile Stewardship Science; (14) National Security; (15) Alternative Energy; and (16) Climatic Change.« less
Kerret, Dorit; Menahem, Gila; Sagi, Rinat
2010-11-01
Focusing on the potential of information regulations, this article aims to contribute to ongoing efforts of policymakers to improve policy tools, in light of the increasing complexity of assessing the environmental impacts of new technologies and industrial corporations. Using the annual reports of corporations and performance data from the Ministry of Environmental Protection, the study analyzed the quality of responses to the amendments of Israel's Securities Regulations by major, publicly traded, polluting industrial corporations in Israel. The main theoretical claim of this paper is that within mandatory regulations there may be a large variability in the degree of specification of requirements. When considerable discretion is left to corporations, the result is a mixed mandatory-voluntary regulation regime. Our findings suggest that such variability impacts the implementation outcomes, as responses to environmental requirements depend on the level of discretion. Facilities increased their reported information, including the negative aspects, when specific mandatory prescriptions were stipulated. However, voluntary motivations did not result in the provision of information when corporations were allowed a high level of discretion. The authors recommend the delineation of exact stipulations of prescriptive requirements for the provision of comparative environmental information in order to obtain the environmental information deemed necessary.
Quantum cascade lasers for defense and security
NASA Astrophysics Data System (ADS)
Day, Timothy; Pushkarsky, Michael; Caffey, Dave; Cecchetti, Kristen; Arp, Ron; Whitmore, Alex; Henson, Michael; Takeuchi, Eric B.
2013-10-01
Quantum cascade laser (QCL) systems are mature and at the vanguard of a new generation of products that support military applications such as Infrared Countermeasures (IRCM) and targeting. The demanding product requirements for aircraft platforms that include reduced size, weight, power consumption and cost (SWaP-C) extends to portable, battery powered handheld products. QCL technology operates throughout the mid-wave (MWIR) and long-wave (LWIR) infrared to provide new capabilities that leverage existing thermal imaging cameras. In addition to their suitability for aircraft platforms, QCL products are a natural fit to meet operator demands for small, lightweight pointer and beacon capabilities. Field-testing of high power, lightweight, battery operated devices has demonstrated their utility across a range of air and ground applications. This talk will present an overview of QCL technology and the Defense and Security products and capabilities that are enabled by it. This talk will also provide an overview of the extensive environmental and performance testing associated with products based on QCL technology.
Life cycle evaluation of emerging lignocellulosic ethanol conversion technologies.
Spatari, Sabrina; Bagley, David M; MacLean, Heather L
2010-01-01
Lignocellulosic ethanol holds promise for addressing climate change and energy security issues associated with personal transportation through lowering the fuel mixes' carbon intensity and petroleum demand. We compare the technological features and life cycle environmental impacts of near- and mid-term ethanol bioconversion technologies in the United States. Key uncertainties in the major processes: pre-treatment, hydrolysis, and fermentation are evaluated. The potential to reduce fossil energy use and greenhouse gas (GHG) emissions varies among bioconversion processes, although all options studied are considerably more attractive than gasoline. Anticipated future performance is found to be considerably more attractive than that published in the literature as being achieved to date. Electricity co-product credits are important in characterizing the GHG impacts of different ethanol production pathways; however, in the absence of near-term liquid transportation fuel alternatives to gasoline, optimizing ethanol facilities to produce ethanol (as opposed to co-products) is important for reducing the carbon intensity of the road transportation sector and for energy security.
Implications of Postharvest Food Loss/Waste Prevention to Energy and Resources Conservation
NASA Astrophysics Data System (ADS)
Cai, X.; Shafiee-Jood, M.
2015-12-01
World's growing demand for food is driven by population and income growth, dietary changes, and the ever-increasing competition between food, feed and bioenergy challenges food security; meanwhile agricultural expansion and intensification threats the environment by the various detrimental impacts. Researchers have attempted to explore strategies to overcome this grand challenge. One of the promising solutions that have attracted considerable attention recently is to increase the efficiency of food supply chain by reducing food loss and waste (FLW). According to recent studies conducted by Food and Agriculture Organization (FAO), United Nation, almost one third of the food produced for human consumption globally is lost or wasted along the food supply chain. This amount of food discarded manifests a missing, yet potential, opportunity to sustainably enhance both food security and environmental sustainability. However, implementing the strategies and technologies for tackling FLW does not come up as an easy solution since it requires economic incentives, benefit and cost analysis, infrastructure development, and appropriate market mechanism. In this presentation I will provide a synthesis of knowledge on the implications of postharvest food loss/waste prevention to energy and resource conservation, environmental protection, as well as food security. I will also discuss how traditional civil and environmental engineering can contribute to the reduction of postharvest food loss, an important issue of sustainable agriculture.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kotta, P. R.; Kline, K. M.
2005-02-28
The Laboratory Directed Research and Development (LDRD) Program is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the missions of the Laboratory, the Department of Energy, and the National Nuclear Security Administration in national security, homeland security, energy security, environmental management, bioscience and healthcare technology, and breakthroughs in fundamental science and technology. The LDRD Program was authorized by Congress in 1991 and is administered by the Laboratory Science and Technology Office. The accomplishments described in this Annual Report demonstrate how the LDRD portfolio is strongly aligned with these missions and contributes to the Laboratory’smore » success in meeting its goals. The LDRD budget of $69.8 million for FY2004 sponsored 220 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific and technical quality and mission relevance. Each year, the number of meritorious proposals far exceeds the funding available, making the selection a challenging one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the Nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory’s multidisciplinary team approach to science and technology. Safeguarding the Nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle for attracting and retaining the best and the brightest technical staff and for establishing collaborations with universities, industry, and other scientific and research institutions. By keeping the Laboratory at the forefront of science and technology, the LDRD Program enables us to meet our mission challenges, especially those of our ever-evolving national security and homeland security missions.« less
Consumer Views on Plug-in Electric Vehicles -- National Benchmark Report (Second Edition)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Singer, Mark
2016-12-01
Vehicle manufacturers, government agencies, universities, private researchers, and organizations worldwide are pursuing advanced vehicle technologies that aim to reduce the consumption of petroleum in the forms of gasoline and diesel. Plug-in electric vehicles (PEVs) are one such technology. This report, an update to the version published in January 2016, details findings from a study in February 2015 of broad American public sentiments toward issues that surround PEVs. This report is supported by the U.S. Department of Energy's Vehicle Technologies Office in alignment with its mission to develop and deploy these technologies to improve energy security, enhance mobility flexibility, reduce transportationmore » costs, and increase environmental sustainability.« less
The Barriers to Acceptance of Plug-in Electric Vehicles: 2017 Update
DOE Office of Scientific and Technical Information (OSTI.GOV)
Singer, Mark R.
Vehicle manufacturers, government agencies, universities, private researchers, and organizations worldwide are pursuing advanced vehicle technologies that aim to reduce the consumption of petroleum in the forms of gasoline and diesel. Plug-in electric vehicles (PEVs) are one such technology. This report, an update to the previous version published in December 2016, details findings from a study in February 2017 of broad American public sentiments toward issues that surround PEVs. This report is supported by the U.S. Department of Energy's Vehicle Technologies Office in alignment with its mission to develop and deploy these technologies to improve energy security, enhance mobility flexibility, reducemore » transportation costs, and increase environmental sustainability.« less
2010 Vehicle Technologies Market Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ward, Jacob; Davis, Stacy Cagle; Diegel, Susan W
2011-06-01
In the past five years, vehicle technologies have advanced on a number of fronts: power-train systems have become more energy efficient, materials have become more lightweight, fuels are burned more cleanly, and new hybrid electric systems reduce the need for traditional petroleum-fueled propulsion. This report documents the trends in market drivers, new vehicles, and component suppliers. This report is supported by the U.S. Department of Energy s (DOE s) Vehicle Technologies Program, which develops energy-efficient and environmentally friendly transportation technologies that will reduce use of petroleum in the United States. The long-term aim is to develop "leap frog" technologies thatmore » will provide Americans with greater freedom of mobility and energy security, while lowering costs and reducing impacts on the environment.« less
Consumer Views on Plug-in Electric Vehicles -- National Benchmark Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Singer, Mark
2016-01-31
Vehicle manufacturers, U.S. Department of Energy laboratories, universities, private researchers, and organizations from around the globe are pursuing advanced vehicle technologies that aim to reduce the consumption of petroleum in the form of gasoline and diesel. In order to make these technologies most appealing to the marketplace, they must take consumer sentiment into account. This report details study findings of broad American public sentiments toward issues that surround the advanced vehicle technologies of plug-in electric vehicles and is supported by the U.S. Department of Energy's Vehicle Technology Office in alignment with its mission to develop and deploy these technologies tomore » improve energy security, provide mobility flexibility, reduce transportation costs, and increase environmental sustainability.« less
Nevada National Security Site Environmental Report Summary 2016
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, Cathy
This document is a summary of the full 2016 Nevada National Security Site Environmental Report (NNSSER) prepared by the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/ NFO). This summary provides an abbreviated and more readable version of the full NNSSER. NNSA/NFO prepares the NNSSER to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the Nevada National Security Site (NNSS) to protect the public and the environment from radiation hazards and from potential nonradiological impacts. It is a comprehensive report of environmental activities performed at the NNSS andmore » offsite facilities over the previous calendar year. The NNSS is currently the nation’s unique site for ongoing national security–related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access as well as by lands that are open to public entry. In 2016, National Security Technologies, LLC (NSTec), was the NNSS Management and Operations Contractor accountable for ensuring work was performed in compliance with environmental regulations. NNSS activities in 2016 continued to be diverse, with the primary goal to ensure that the existing U.S. stockpile of nuclear weapons remains safe and reliable. Other activities included weapons of mass destruction first responder training; the controlled release of hazardous material at the Nonproliferation Test and Evaluation Complex (NPTEC); remediation of legacy contamination sites; characterization of waste destined for the Waste Isolation Pilot Plant in Carlsbad, New Mexico, or the Idaho National Laboratory in Idaho Falls, Idaho; disposal of low-level and mixed low-level radioactive waste; and environmental research. Facilities and centers that support the National Security/Defense mission include the U1a Facility, Big Explosives Experimental Facility (BEEF), Device Assembly Facility (DAF), National Criticality Experiments Research Center (NCERC) located in the DAF, Joint Actinide Shock Physics Experimental Research (JASPER) Facility, Dense Plasma Focus (DPF) Facility located in the Los Alamos Technical Facility (LATF), and the Radiological/ Nuclear Countermeasures Test and Evaluation Complex (RNCTEC). Facilities that support the Environmental Management mission include the Area 5 Radioactive Waste Management Complex (RWMC) and the Area 3 Radioactive Waste Management Site (RWMS), which has been in cold standby since 2006.« less
NASA Astrophysics Data System (ADS)
Thiel, M.; Flachenecker, G.; Schade, W.; Gorecki, C.; Thoma, A.; Rathje, R.
2017-11-01
Optical seals consisting of waveguide Bragg grating sensor structures in ultra thin glass transparencies have been developed to cover security relevant objects for detection of unauthorized access. For generation of optical signature in the seals, femtosecond laser pulses were used. The optical seals were connected with an optical fiber to enable external read out of the seal. Different attack scenarios for getting undetected access to the object, covered by the seal, were proven and evaluated. The results presented here, verify a very high level of security. An unauthorized detaching and subsequent replacement by original or copy of the seals for tampering would be accompanied with a very high technological effort, posing a substantial barrier towards an attacker. Additionally, environmental influences like temperature effects have a strong but reproducible influence on signature, which in context of a temperature reference database increases the level of security significantly.
2010-08-01
CSTR continuously stirred tank reactors CT contact time EDB ethylene dibromide ESTCP Environmental Security Technology Certification Program...63 6.2 Simulating Oxidant Distribution Using a Series of CSTRs -------------------- 63 6.2.1 Model...SIMULATING OXIDANT DISTRIBUTION USING A SERIES OF CSTRS 6.2.1 MODEL DEVELOPMENT The transport and consumption of permanganate are simulated within the
COST EFFECTIVE AND HIGH RESOLUTION SUBSURFACE CHARACTERIZATION USING HYDRAULIC TOMOGRAPHY
2017-08-01
FINAL REPORT Cost -Effective and High-Resolution Subsurface Characterization Using Hydraulic Tomography ESTCP Project ER-201212 AUGUST...This document has been cleared for public release Page Intentionally Left Blank This report was prepared under contract to the Department of...Defense Environmental Security Technology Certification Program (ESTCP). The publication of this report does not indicate endorsement by the Department
Real Time Quality Control Methods for Cued EMI Data Collection
2016-03-14
contents be construed as reflecting the official policy or position of the Department of Defense. Reference herein to any specific commercial product...This project evaluated the effectiveness of in-field quality control (QC) procedures during cued electromagnetic induction (EMI) data collection. The...electromagnetic induction ESTCP Environmental Security Technology Certification Program hr hour ISO Industry Standard Object IVS Instrument
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-06
... inspection technology that is used to scan high-density cargo containers for contraband such as illicit drugs... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Availability of the... Operation of High Energy X-Ray Inspection Systems at Sea and Land Ports of Entry AGENCY: U.S. Customs and...
Liquid Desiccant Regenerable Filters For Indoor Environmental Quality and Security
2003-11-19
Blake, C. Eddy, K. Evans, and Huang, J., “Deactivation of Bacillus Spores in Liquid Desiccant Media”, Unpublished Results, NREL, 2003. 10...Activated Technology RD&D over the past several years. This research develops heating, ventilation, and air-conditioning ( HVAC ) equipment whose...without expensive overcool and reheat. Packaged, solid desiccant dehumidifiers are used extensively in commercial HVAC applications where humidity
An evaluation of the ecological and environmental security on China's terrestrial ecosystems.
Zhang, Hongqi; Xu, Erqi
2017-04-11
With rapid economic growth, industrialization, and urbanization, various ecological and environmental problems occur, which threaten and undermine the sustainable development and domestic survival of China. On the national scale, our progress remains in a state of qualitative or semi-quantitative evaluation, lacking a quantitative evaluation and a spatial visualization of ecological and environmental security. This study collected 14 indictors of water, land, air, and biodiversity securities to compile a spatial evaluation of ecological and environmental security in terrestrial ecosystems of China. With area-weighted normalization and scaling transformations, the veto aggregation (focusing on the limit indicator) and balanced aggregation (measuring balanced performance among different indicators) methods were used to aggregate security evaluation indicators. Results showed that water, land, air, and biodiversity securities presented different spatial distributions. A relatively serious ecological and environmental security crisis was found in China, but presented an obviously spatial variation of security evaluation scores. Hotspot areas at the danger level, which are scattered throughout the entirety of the country, were identified. The spatial diversities and causes of ecological and environmental problems in different regions were analyzed. Spatial integration of regional development and proposals for improving the ecological and environmental security were put forward.
Agarwal, Ritu; Anderson, Catherine; Zarate, Jesus; Ward, Claudine
2013-02-26
Personal health records (PHRs) are an important tool for empowering patients and stimulating health action. To date, the volitional adoption of publicly available PHRs by consumers has been low. This may be partly due to patient concerns about issues such as data security, accuracy of the clinical information stored in the PHR, and challenges with keeping the information updated. One potential solution to mitigate concerns about security, accuracy, and updating of information that may accelerate technology adoption is the provision of PHRs by employers where the PHR is pre-populated with patients' health data. Increasingly, employers and payers are offering this technology to employees as a mechanism for greater patient engagement in health and well-being. Little is known about the antecedents of PHR acceptance in the context of an employer sponsored PHR system. Using social cognitive theory as a lens, we theorized and empirically tested how individual factors (patient activation and provider satisfaction) and two environment factors (technology and organization) influence patient intentions to use a PHR among early adopters of the technology. In technology factors, we studied tool empowerment potential and value of tool functionality. In organization factors, we focused on communication tactics deployed by the organization during PHR rollout. We conducted cross-sectional analysis of field data collected during the first 3 months post go-live of the deployment of a PHR with secure messaging implemented by the Air Force Medical Service at Elmendorf Air Force Base in Alaska in December 2010. A questionnaire with validated measures was designed and completed by 283 participants. The research model was estimated using moderated multiple regression. Provider satisfaction, interactions between environmental factors (communication tactics and value of the tool functionality), and interactions between patient activation and tool empowerment potential were significantly (P<.05) associated with behavioral intentions to use the PHR tool. The independent variables collectively explained 42% of the variance in behavioral intentions. The study demonstrated that individual and environmental factors influence intentions to use the PHR. Patients who were more satisfied with their provider had higher use intentions. For patients who perceived the health care process management support features of the tool to be of significant value, communication tactics served to increase their use intentions. Finally, patients who believed the tool to be empowering demonstrated higher intentions to use, which were further enhanced for highly activated patients. The findings highlight the importance of communication tactics and technology characteristics and have implications for the management of PHR implementations.
48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...
48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...
48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...
48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...
Nuclear Arms Control, Nonproliferation, and Counterterrorism: Impacts on Public Health
Pregenzer, Arian
2014-01-01
Reducing the risks of nuclear war, limiting the spread of nuclear weapons, and reducing global nuclear weapons stockpiles are key national and international security goals. They are pursued through a variety of international arms control, nonproliferation, and counterterrorism treaties and agreements. These legally binding and political commitments, together with the institutional infrastructure that supports them, work to establish global norms of behavior and have limited the spread of weapons of mass destruction. Beyond the primary security objectives, reducing the likelihood of the use of nuclear weapons, preventing environmental releases of radioactive material, increasing the availability of safe and secure nuclear technology for peaceful purposes, and providing scientific data relevant to predicting and managing the consequences of natural or human-caused disasters worldwide provide significant benefits to global public health. PMID:24524501
Economic and environmental evaluation of compressed-air cars
NASA Astrophysics Data System (ADS)
Creutzig, Felix; Papson, Andrew; Schipper, Lee; Kammen, Daniel M.
2009-10-01
Climate change and energy security require a reduction in travel demand, a modal shift, and technological innovation in the transport sector. Through a series of press releases and demonstrations, a car using energy stored in compressed air produced by a compressor has been suggested as an environmentally friendly vehicle of the future. We analyze the thermodynamic efficiency of a compressed-air car powered by a pneumatic engine and consider the merits of compressed air versus chemical storage of potential energy. Even under highly optimistic assumptions the compressed-air car is significantly less efficient than a battery electric vehicle and produces more greenhouse gas emissions than a conventional gas-powered car with a coal intensive power mix. However, a pneumatic-combustion hybrid is technologically feasible, inexpensive and could eventually compete with hybrid electric vehicles.
CONSOL`s perspective on CCT deployment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burke, F.P.; Statnick, R.M.
1997-12-31
The principal focus of government investment in Clean Coal Technology must be to serve the interests of the US energy consumer. Because of its security of supply and low cost, coal will continue to be the fuel of choice in the existing domestic electricity generating market. The ability of coal to compete for new generating capacity will depend largely on natural gas prices and the efficiency of coal and gas-fired generating options. Furthermore, potential environmental regulations, coupled with utility deregulation, create a climate of economic uncertainty that may limit future investment decisions favorable to coal. Therefore, the federal government, throughmore » programs such as CCT, should promote the development of greenfield and retrofit coal use technology that improves generating efficiency and meets environmental requirements for the domestic electric market.« less
IN2 Profile: Go Electric Provides Grid Stabilizing Energy Service Solutions to Utilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pless, Shanti
Through the Wells Fargo Innovation Incubator (IN²) program, Go Electric will validate their Link DR technology, which is an advanced, uninterruptable power supply that provides secure power, lowers facility energy costs, integrates renewables, and generates income from utility demand response programs. The IN² program launched in October 2014 and is part of Wells Fargo’s 2020 Environmental Commitment to provide $100 million to environmentally-focused nonprofits and universities. The goal is to create an ecosystem that fosters and accelerates the commercialization of promising commercial buildings technologies that can provide scalable solutions to reduce the energy impact of buildings. According to the Departmentmore » of Energy, nearly 40 percent of energy consumption in the U.S. today comes from buildings at an estimated cost of $413 billion.« less
Chemical and biological sensing needs for health effects studies
NASA Astrophysics Data System (ADS)
Breysse, Patrick N.
2012-06-01
Exposure assessment is an integral component of occupational and environmental epidemiology, risk assessment and management, as well as regulatory compliance. For the most part, air sampling and analysis tools used in occupational and environmental exposure assessments are based on technologies that have changed little since the 1970s. In many cases the lack of simple, inexpensive, exposure assessment technologies has limited epidemiologists' and risk assessors' ability to evaluate the environmental and occupational causes of disease. While there have been tremendous investments and advances in medical diagnostic and biomonitoring technologies (e.g., glucose testing, human genetics), there has been less effort invested in advancing the science of exposure assessment. Recent developments in sensor technology have focused on medical and homeland security applications. Developing and applying new sensors to health effects studies can revolutionize the way epidemiologic studies are conducted. Time-series studies that investigate short-term (hours to days) changes in exposure that are linked to changes in health care encounters, symptoms, and biological markers of preclinical disease and/or susceptibility are needed to more fully evaluate the impact of chemicals and other agents on health. Current sampling technology limits our ability to assess time-varying concentrations. The purpose of this paper is to discuss the current state of air sampling and health assessment and the potential application of novel sensor technology for use in health effects studies.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cathy Wills
The Nevada Test Site Environmental Report 2006 (NTSER) was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec). This Executive Summary presents the purpose of the document, the major programs conducted at the Nevada Test Site (NTS), NTS key environmental initiatives, radiological releases and potential doses to the public resulting from site operations, a summary of nonradiological releases, implementation status of the NTS Environmental Management System, a summary of compliance with environmental regulations, pollutionmore » prevention and waste minimization accomplishments, and significant environmental accomplishments. Much of the content of this Executive Summary is also presented in a separate stand-alone pamphlet titled Nevada Test Site Environmental Report Summary 2006 produced to be a more cost-effective means of distributing information contained in the NTSER to interested DOE stakeholders.« less
Women's Marginalization, Economic Flows, and Environmental Flows: A Classroom Approach.
ERIC Educational Resources Information Center
O'Lear, Shannon
1999-01-01
Discusses environmental security, focusing on the meaning of "security." Defines the global economy as a process in which the security of groups is sought, maintained, or threatened. Illustrates connections among environmental security, the global economy, and abuse of women and children in less economically developed places,…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moawad, Ayman; Kim, Namdoo; Shidore, Neeraj
2016-01-01
The U.S. Department of Energy (DOE) Vehicle Technologies Office (VTO) has been developing more energy-efficient and environmentally friendly highway transportation technologies that will enable America to use less petroleum. The long-term aim is to develop "leapfrog" technologies that will provide Americans with greater freedom of mobility and energy security, while lowering costs and reducing impacts on the environment. This report reviews the results of the DOE VTO. It gives an assessment of the fuel and light-duty vehicle technologies that are most likely to be established, developed, and eventually commercialized during the next 30 years (up to 2045). Because of themore » rapid evolution of component technologies, this study is performed every two years to continuously update the results based on the latest state-of-the-art technologies.« less
Managing Nitrogen in the anthropocene: integrating social and ecological science
NASA Astrophysics Data System (ADS)
Zhang, X.; Mauzerall, D. L.; Davidson, E. A.; Kanter, D.; Cai, R.; Searchinger, T.
2014-12-01
Human alteration of the global nitrogen cycle by agricultural activities has provided nutritious food to society, but also poses increasing threats to human and ecosystem health through unintended pollution. Managing nitrogen more efficiently in crop production is critical for addressing both food security and environmental challenges. Technologies and management practices have been developed to increase the uptake of applied nitrogen by crops. However, nitrogen use efficiency (NUE, yield per unit nitrogen input) is also affected by social and economic factors. For example, to maximize profit, farmers may change crop choice or their nitrogen application rate, both of which lead to a change in NUE. To evaluate such impacts, we use both theoretical and empirical approaches on micro (farm) and macro (national) scales: 1) We developed a bio-economic model (NUE3) on a farm scale to investigate how market signals (e.g. fertilizer and crop prices), government policies, and nitrogen-efficient technologies affect NUE. We demonstrate that if factors that influence nitrogen inputs (e.g. fertilizer-to-crop price ratios) are not considered, NUE projections will be poorly constrained. The impact of nitrogen-efficient technologies on NUE not only depends on how technology changes the production function, but also relies on the prices of the technologies, fertilizers, and crops. 2) We constructed a database of the nitrogen budget in crop production for major crops and major crop producing countries from 1961 to 2010. Using this database, we investigate historical trends of NUE and its relationship to agronomic, economic, social, and policy factors. We find that NUE in most developed countries follows a "U-shape" relationship with income level, consistent with the Environmental Kuznets Curve theory. According to the dynamics revealed in the NUE3 model, we propose three major pathways by which economic development affects NUE, namely consumption, technology, and public policy. Overall, our research suggests that it is critical to include social and economic processes when studying perturbations of the global nitrogen cycle and crafting environmental and food security policy. Better collaboration across disciplines is essential to improve nitrogen management in the anthropocene.
An integrated water-energy-food-livelihoods approach for assessing environmental livelihood security
NASA Astrophysics Data System (ADS)
Biggs, E. M.; Duncan, J.; Boruff, B.; Bruce, E.; Neef, A.; McNeill, K.; van Ogtrop, F. F.; Haworth, B.; Duce, S.; Horsley, J.; Pauli, N.; Curnow, J.; Imanari, Y.
2015-12-01
Environmental livelihood security refers to the challenges of maintaining global food security and universal access to freshwater and energy to sustain livelihoods and promote inclusive economic growth, whilst sustaining key environmental systems' functionality, particularly under variable climatic regimes. Environmental security is a concept complementary to sustainable development, and considers the increased vulnerability people have to certain environmental stresses, such as climatic change. Bridging links between the core component concepts of environmental security is integral to future human security, and in an attempt to create this bridge, the nexus approach to human protection has been created, where water resource availability underpins food, water and energy security. The water-energy-food nexus has an influential role in attaining human security, yet little research has made the link between the nexus and livelihoods. In this research we provide a critical appraisal of the synergies between water-energy-food nexus framings and sustainable livelihoods approaches, both of which aim to promote sustainable development. In regions where livelihoods are dependent on environmental conditions, the concept of sustainable development is critical for ensuring future environmental and human security. Given our appraisal we go on to develop an integrated framework for assessing environmental livelihood security of multiscale and multi-level systems. This framework provides a tangible approach for assessing changes in the water-energy-food-livelihood indicators of a system. Examples of where system applications may occur are discussed for the Southeast Asia and Oceania region. Our approach will be particularly useful for policy-makers to inform evidence-based decision-making, especially in localities where climate change increases the vulnerability of impoverished communities and extenuates environmental livelihood insecurity.
Bonnot, Karine; Cuesta-Soto, Francisco; Rodrigo, Manuel; Varriale, Antonio; Sanchez, Nuria; D'Auria, Sabato; Spitzer, Denis; Lopez-Royo, Francisco
2014-05-20
Combining photonic integrated circuits with a biologically based sensing approach has the ability to provide a new generation of portable and low-cost sensor devices with a high specificity and sensitivity for a number of applications in environmental monitoring, defense, and homeland security. We report herein on the specific biosensing under continuous air flow of DMMP, which is commonly used as a simulant and a precursor for the synthesis of Sarin. The proposed technology is based on the selective recognition of the targeted DMMP molecule by specifically modified proteins immobilized on photonic structures. The response of the biophotonic structures shows a high stability and accuracy over 3 months, allowing for the detection in diluted air of DMMP at concentration as low as 35 μg/m(3) (6.8 ppb) in less than 15 min. The performance of the developed technology satisfies most current homeland and military security requirements.
Fan, Mingsheng; Shen, Jianbo; Yuan, Lixing; Jiang, Rongfeng; Chen, Xinping; Davies, William J; Zhang, Fusuo
2012-01-01
In recent years, agricultural growth in China has accelerated remarkably, but most of this growth has been driven by increased yield per unit area rather than by expansion of the cultivated area. Looking towards 2030, to meet the demand for grain and to feed a growing population on the available arable land, it is suggested that annual crop production should be increased to around 580 Mt and that yield should increase by at least 2% annually. Crop production will become more difficult with climate change, resource scarcity (e.g. land, water, energy, and nutrients) and environmental degradation (e.g. declining soil quality, increased greenhouse gas emissions, and surface water eutrophication). To pursue the fastest and most practical route to improved yield, the near-term strategy is application and extension of existing agricultural technologies. This would lead to substantial improvement in crop and soil management practices, which are currently suboptimal. Two pivotal components are required if we are to follow new trajectories. First, the disciplines of soil management and agronomy need to be given increased emphasis in research and teaching, as part of a grand food security challenge. Second, continued genetic improvement in crop varieties will be vital. However, our view is that the biggest gains from improved technology will come most immediately from combinations of improved crops and improved agronomical practices. The objectives of this paper are to summarize the historical trend of crop production in China and to examine the main constraints to the further increase of crop productivity. The paper provides a perspective on the challenge faced by science and technology in agriculture which must be met both in terms of increased crop productivity but also in increased resource use efficiency and the protection of environmental quality.
76 FR 78009 - Information Collection; Implementation of Information Technology Security Provision
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-15
...] Information Collection; Implementation of Information Technology Security Provision AGENCY: General Services... collection requirement regarding Implementation of Information Technology Security Provision. Public comments... Information Collection 3090- 0294, Implementation of Information Technology Security Provision, by any of the...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pruski, Marek; Sadow, Aaron D.; Slowing, Igor I.
Here the catalysis research at the U.S. Department of Energy's (DOE's) National Laboratories covers a wide range of research topics in heterogeneous catalysis, homogeneous/molecular catalysis, biocatalysis, electrocatalysis, and surface science. Since much of the work at National Laboratories is funded by DOE, the research is largely focused on addressing DOE's mission to ensure America's security and prosperity by addressing its energy, environmental, and nuclear challenges through transformative science and technology solutions.
2014-05-30
6392 The TEMTADS 5×5 Array was demonstrated at two sites, the former Mare Island Naval Shipyard, CA, in 2011, and the former Spencer Artillery Range, TN...Contamination ......................................................................................... 11 4.3 Former Spencer Artillery Range...Magnetic Induction ESTCP Environmental Security Technology Certification Program fMINSY former Mare Island Naval Shipyard, CA fSpAR former Spencer
2007-11-01
PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) PARSONS 4890 University Square Suite 2 Huntsville, Alabama 35816 8 . PERFORMING ORGANIZATION REPORT NUMBER...PERSON a. REPORT unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8 -98) Prescribed by ANSI Std Z39-18...Intrusive Investigation Results ...................................................................................... 8 8.2 CLUSTER ANOMALIES
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sexton, L.
2012-06-06
Environmental sampling has become a key component of International Atomic Energy Agency (IAEA) safeguards approaches since its approval for use in 1996. Environmental sampling supports the IAEA's mission of drawing conclusions concerning the absence of undeclared nuclear material or nuclear activities in a Nation State. Swipe sampling is the most commonly used method for the collection of environmental samples from bulk handling facilities. However, augmenting swipe samples with an air monitoring system, which could continuously draw samples from the environment of bulk handling facilities, could improve the possibility of the detection of undeclared activities. Continuous sampling offers the opportunity tomore » collect airborne materials before they settle onto surfaces which can be decontaminated, taken into existing duct work, filtered by plant ventilation, or escape via alternate pathways (i.e. drains, doors). Researchers at the Savannah River National Laboratory and Oak Ridge National Laboratory have been working to further develop an aerosol collection technology that could be installed at IAEA safeguarded bulk handling facilities. The addition of this technology may reduce the number of IAEA inspector visits required to effectively collect samples. The principal sample collection device is a patented Aerosol Contaminant Extractor (ACE) which utilizes electrostatic precipitation principles to deposit particulates onto selected substrates. Recent work has focused on comparing traditional swipe sampling to samples collected via an ACE system, and incorporating tamper resistant and tamper indicating (TRI) technologies into the ACE system. Development of a TRI-ACE system would allow collection of samples at uranium/plutonium bulk handling facilities in a manner that ensures sample integrity and could be an important addition to the international nuclear safeguards inspector's toolkit. This work was supported by the Next Generation Safeguards Initiative (NGSI), Office of Nonproliferation and International Security (NIS), National Nuclear Security Administration (NNSA).« less
Lawrence Livermore National Laboratory Environmental Report 2012
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jones, Henry E.; Armstrong, Dave; Blake, Rick G.
Lawrence Livermore National Laboratory (LLNL) is a premier research laboratory that is part of the National Nuclear Security Administration (NNSA) within the U.S. Department of Energy (DOE). As a national security laboratory, LLNL is responsible for ensuring that the nation’s nuclear weapons remain safe, secure, and reliable. The Laboratory also meets other pressing national security needs, including countering the proliferation of weapons of mass destruction and strengthening homeland security, and conducting major research in atmospheric, earth, and energy sciences; bioscience and biotechnology; and engineering, basic science, and advanced technology. The Laboratory is managed and operated by Lawrence Livermore National Security,more » LLC (LLNS), and serves as a scientific resource to the U.S. government and a partner to industry and academia. LLNL operations have the potential to release a variety of constituents into the environment via atmospheric, surface water, and groundwater pathways. Some of the constituents, such as particles from diesel engines, are common at many types of facilities while others, such as radionuclides, are unique to research facilities like LLNL. All releases are highly regulated and carefully monitored. LLNL strives to maintain a safe, secure and efficient operational environment for its employees and neighboring communities. Experts in environment, safety and health (ES&H) support all Laboratory activities. LLNL’s radiological control program ensures that radiological exposures and releases are reduced to as low as reasonably achievable to protect the health and safety of its employees, contractors, the public, and the environment. LLNL is committed to enhancing its environmental stewardship and managing the impacts its operations may have on the environment through a formal Environmental Management System. The Laboratory encourages the public to participate in matters related to the Laboratory’s environmental impact on the community by soliciting citizens’ input on matters of significant public interest and through various communications. The Laboratory also provides public access to information on its ES&H activities. LLNL consists of two sites—an urban site in Livermore, California, referred to as the “Livermore Site,” which occupies 1.3 square miles; and a rural Experimental Test Site, referred to as “Site 300,” near Tracy, California, which occupies 10.9 square miles. In 2012 the Laboratory had a staff of approximately 7000.« less
Lawrence Livermore National Laboratory Environmental Report 2013
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jones, H. E.; Bertoldo, N. A.; Blake, R. G.
Lawrence Livermore National Laboratory (LLNL) is a premier research laboratory that is part of the National Nuclear Security Administration (NNSA) within the U.S. Department of Energy (DOE). As a national security laboratory, LLNL is responsible for ensuring that the nation’s nuclear weapons remain safe, secure, and reliable. The Laboratory also meets other pressing national security needs, including countering the proliferation of weapons of mass destruction and strengthening homeland security, and conducting major research in atmospheric, earth, and energy sciences; bioscience and biotechnology; and engineering, basic science, and advanced technology. The Laboratory is managed and operated by Lawrence Livermore National Security,more » LLC (LLNS), and serves as a scientific resource to the U.S. government and a partner to industry and academia. LLNL operations have the potential to release a variety of constituents into the environment via atmospheric, surface water, and groundwater pathways. Some of the constituents, such as particles from diesel engines, are common at many types of facilities while others, such as radionuclides, are unique to research facilities like LLNL. All releases are highly regulated and carefully monitored. LLNL strives to maintain a safe, secure and efficient operational environment for its employees and neighboring communities. Experts in environment, safety and health (ES&H) support all Laboratory activities. LLNL’s radiological control program ensures that radiological exposures and releases are reduced to as low as reasonably achievable to protect the health and safety of its employees, contractors, the public, and the environment. LLNL is committed to enhancing its environmental stewardship and managing the impacts its operations may have on the environment through a formal Environmental Management System. The Laboratory encourages the public to participate in matters related to the Laboratory’s environmental impact on the community by soliciting citizens’ input on matters of significant public interest and through various communications. The Laboratory also provides public access to information on its ES&H activities. LLNL consists of two sites—an urban site in Livermore, California, referred to as the “Livermore Site,” which occupies 1.3 square miles; and a rural Experimental Test Site, referred to as “Site 300,” near Tracy, California, which occupies 10.9 square miles. In 2013 the Laboratory had a staff of approximately 6,300.« less
Clinton creates environment post
DOE Office of Scientific and Technical Information (OSTI.GOV)
Begley, R.
Raising the importance of environmental considerations in all federal policy, President Clinton is creating a new White House Office of Environmental Policy and renewing his pledge to elevate the Environmental Protection Agency to a Cabinet-level position. The new office will coordinate environmental policy throughout the federal government, working with the security, economics, and domestic policy councils, as well as relevant federal agenies. Its duties will include addressing global environmental problems and promoting green' technologies. Pending Congressional approval, Clinton plans to dismantle the Council on Environmental Quality (CEQ). Sen. Max Baucus (D., MT), chairman of the Senate Environment Committee, cautiously saysmore » he needs to review how CEQ's many important functions' will be handled by the new organization. Clinton also dismantled former Vice President Quayle's Competitiveness Council, saying it is closed, and so is the back door the polluters used to get out from under our laws.'« less
Geographical patterns in climate and agricultural technology drive soybean productivity in Brazil
Caetano, Jordana Moura; Tessarolo, Geiziane; de Oliveira, Guilherme; Souza, Kelly da Silva e; Diniz-Filho, José Alexandre Felizola
2018-01-01
The impacts of global climate change have been a worldwide concern for several research areas, including those dealing with resources essential to human well being, such as agriculture, which directly impact economic activities and food security. Here we evaluate the relative effect of climate (as indicated by the Ecological Niche Model—ENM) and agricultural technology on actual soybean productivity in Brazilian municipalities and estimate the future geographic distribution of soybeans using a novel statistical approach allowing the evaluation of partial coefficients in a non-stationary (Geographically Weighted Regression; GWR) model. We found that technology was more important than climate in explaining soybean productivity in Brazil. However, some municipalities are more dependent on environmental suitability (mainly in Southern Brazil). The future environmental suitability for soybean cultivation tends to decrease by up 50% in the central region of Brazil. Meanwhile, southern-most Brazil will have more favourable conditions, with an increase of ca. 25% in environmental suitability. Considering that opening new areas for cultivation can degrade environmental quality, we suggest that, in the face of climate change impacts on soybean cultivation, the Brazilian government and producers must invest in breeding programmes and more general ecosystem-based strategies for adaptation to climate change, including the development of varieties tolerant to climate stress, and strategies to increase productivity and reduce costs (social and environmental). PMID:29381755
Geographical patterns in climate and agricultural technology drive soybean productivity in Brazil.
Caetano, Jordana Moura; Tessarolo, Geiziane; de Oliveira, Guilherme; Souza, Kelly da Silva E; Diniz-Filho, José Alexandre Felizola; Nabout, João Carlos
2018-01-01
The impacts of global climate change have been a worldwide concern for several research areas, including those dealing with resources essential to human well being, such as agriculture, which directly impact economic activities and food security. Here we evaluate the relative effect of climate (as indicated by the Ecological Niche Model-ENM) and agricultural technology on actual soybean productivity in Brazilian municipalities and estimate the future geographic distribution of soybeans using a novel statistical approach allowing the evaluation of partial coefficients in a non-stationary (Geographically Weighted Regression; GWR) model. We found that technology was more important than climate in explaining soybean productivity in Brazil. However, some municipalities are more dependent on environmental suitability (mainly in Southern Brazil). The future environmental suitability for soybean cultivation tends to decrease by up 50% in the central region of Brazil. Meanwhile, southern-most Brazil will have more favourable conditions, with an increase of ca. 25% in environmental suitability. Considering that opening new areas for cultivation can degrade environmental quality, we suggest that, in the face of climate change impacts on soybean cultivation, the Brazilian government and producers must invest in breeding programmes and more general ecosystem-based strategies for adaptation to climate change, including the development of varieties tolerant to climate stress, and strategies to increase productivity and reduce costs (social and environmental).
78 FR 17219 - Homeland Security Science and Technology Advisory Committee Meeting Cancellation
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-20
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0014] Homeland Security Science and...: Notice of Cancellation of the Federal Advisory Committee Meeting for Homeland Security Science and Technology Advisory Committee (HSSTAC). SUMMARY: The meeting of the Homeland Security Science and Technology...
Selecting Security Technology Providers
ERIC Educational Resources Information Center
Schneider, Tod
2009-01-01
The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…
Global renewable energy-based electricity generation and smart grid system for energy security.
Islam, M A; Hasanuzzaman, M; Rahim, N A; Nahar, A; Hosenuzzaman, M
2014-01-01
Energy is an indispensable factor for the economic growth and development of a country. Energy consumption is rapidly increasing worldwide. To fulfill this energy demand, alternative energy sources and efficient utilization are being explored. Various sources of renewable energy and their efficient utilization are comprehensively reviewed and presented in this paper. Also the trend in research and development for the technological advancement of energy utilization and smart grid system for future energy security is presented. Results show that renewable energy resources are becoming more prevalent as more electricity generation becomes necessary and could provide half of the total energy demands by 2050. To satisfy the future energy demand, the smart grid system can be used as an efficient system for energy security. The smart grid also delivers significant environmental benefits by conservation and renewable generation integration.
Nuclear Arms Control, Nonproliferation, and Counterterrorism: Impacts on Public Health
Dreicer, Mona; Pregenzer, Arian
2014-04-01
Reducing the risks of nuclear war, limiting the spread of nuclear weapons and reducing global nuclear weapons stockpiles are key national and international security goals. They are pursued through a variety of international arms control, nonproliferation and counter-terrorism treaties and agreements. These legally binding and political commitments, together with the institutional infrastructure that supports them, work to establish global norms of behavior and have limited the spread of weapons of mass destruction. Beyond the primary security objectives, reducing the likelihood of the use of nuclear weapons, preventing environmental releases of radioactive material, increasing the availability of safe and secure nuclearmore » technology for peaceful purposes, and providing scientific data relevant to predicting and managing the consequences of natural or human-caused disasters world-wide provide significant benefits to global public health.« less
Global Renewable Energy-Based Electricity Generation and Smart Grid System for Energy Security
Islam, M. A.; Hasanuzzaman, M.; Rahim, N. A.; Nahar, A.; Hosenuzzaman, M.
2014-01-01
Energy is an indispensable factor for the economic growth and development of a country. Energy consumption is rapidly increasing worldwide. To fulfill this energy demand, alternative energy sources and efficient utilization are being explored. Various sources of renewable energy and their efficient utilization are comprehensively reviewed and presented in this paper. Also the trend in research and development for the technological advancement of energy utilization and smart grid system for future energy security is presented. Results show that renewable energy resources are becoming more prevalent as more electricity generation becomes necessary and could provide half of the total energy demands by 2050. To satisfy the future energy demand, the smart grid system can be used as an efficient system for energy security. The smart grid also delivers significant environmental benefits by conservation and renewable generation integration. PMID:25243201
Nevada Test Site Environmental Report 2009
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cathy Wills, ed.
2010-09-13
The Nevada Test Site Environmental Report 2009 was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years’ Nevada Test Site Environmental Reports (NTSERs) are posted on the NNSA/NSO website at http://www.nv.doe.gov/library/publications/aser.aspx. This NTSER was prepared to satisfy DOE Order DOE O 231.1A, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status withmore » environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NTSER summarizes data and compliance status for calendar year 2009 at the Nevada Test Site (NTS) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory (RSL)-Nellis. It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.« less
2010-08-22
Commission (IEC). “Information technology — Security techniques — Code of practice for information security management ( ISO /IEC 27002 ...Information technology — Security techniques — Information security management systems —Requirements ( ISO /IEC 27002 ),”, “Information technology — Security...was a draft ISO standard on Systems and software engineering, Systems and software assurance [18]. Created by systems engineers for systems
Advances in Targeted Pesticides with Environmentally Responsive Controlled Release by Nanotechnology
Huang, Bingna; Chen, Feifei; Shen, Yue; Wang, Yan; Sun, Changjiao; Zhao, Xiang; Cui, Bo; Gao, Fei; Zeng, Zhanghua; Cui, Haixin
2018-01-01
Pesticides are the basis for defending against major biological disasters and important for ensuring national food security. Biocompatible, biodegradable, intelligent, and responsive materials are currently an emerging area of interest in the field of efficient, safe, and green pesticide formulation. Using nanotechnology to design and prepare targeted pesticides with environmentally responsive controlled release via compound and chemical modifications has also shown great potential in creating novel formulations. In this review, special attention has been paid to intelligent pesticides with precise controlled release modes that can respond to micro-ecological environment changes such as light-sensitivity, thermo-sensitivity, humidity sensitivity, soil pH, and enzyme activity. Moreover, establishing intelligent and controlled pesticide release technologies using nanomaterials are reported. These technologies could increase pesticide-loading, improve the dispersibility and stability of active ingredients, and promote target ability. PMID:29439498
Christensen, A. J.; Srinivasan, V.; Hart, J. C.; ...
2018-03-17
Sustainable crop production is a contributing factor to current and future food security. Innovative technologies are needed to design strategies that will achieve higher crop yields on less land and with fewer resources. Computational modeling coupled with advanced scientific visualization enables researchers to explore and interact with complex agriculture, nutrition, and climate data to predict how crops will respond to untested environments. These virtual observations and predictions can direct the development of crop ideotypes designed to meet future yield and nutritional demands. This review surveys modeling strategies for the development of crop ideotypes and scientific visualization technologies that have ledmore » to discoveries in “big data” analysis. Combined modeling and visualization approaches have been used to realistically simulate crops and to guide selection that immediately enhances crop quantity and quality under challenging environmental conditions. Lastly, this survey of current and developing technologies indicates that integrative modeling and advanced scientific visualization may help overcome challenges in agriculture and nutrition data as large-scale and multidimensional data become available in these fields.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Christensen, A. J.; Srinivasan, V.; Hart, J. C.
Sustainable crop production is a contributing factor to current and future food security. Innovative technologies are needed to design strategies that will achieve higher crop yields on less land and with fewer resources. Computational modeling coupled with advanced scientific visualization enables researchers to explore and interact with complex agriculture, nutrition, and climate data to predict how crops will respond to untested environments. These virtual observations and predictions can direct the development of crop ideotypes designed to meet future yield and nutritional demands. This review surveys modeling strategies for the development of crop ideotypes and scientific visualization technologies that have ledmore » to discoveries in “big data” analysis. Combined modeling and visualization approaches have been used to realistically simulate crops and to guide selection that immediately enhances crop quantity and quality under challenging environmental conditions. Lastly, this survey of current and developing technologies indicates that integrative modeling and advanced scientific visualization may help overcome challenges in agriculture and nutrition data as large-scale and multidimensional data become available in these fields.« less
Christensen, A J; Srinivasan, Venkatraman; Hart, John C; Marshall-Colon, Amy
2018-05-01
Sustainable crop production is a contributing factor to current and future food security. Innovative technologies are needed to design strategies that will achieve higher crop yields on less land and with fewer resources. Computational modeling coupled with advanced scientific visualization enables researchers to explore and interact with complex agriculture, nutrition, and climate data to predict how crops will respond to untested environments. These virtual observations and predictions can direct the development of crop ideotypes designed to meet future yield and nutritional demands. This review surveys modeling strategies for the development of crop ideotypes and scientific visualization technologies that have led to discoveries in "big data" analysis. Combined modeling and visualization approaches have been used to realistically simulate crops and to guide selection that immediately enhances crop quantity and quality under challenging environmental conditions. This survey of current and developing technologies indicates that integrative modeling and advanced scientific visualization may help overcome challenges in agriculture and nutrition data as large-scale and multidimensional data become available in these fields.
Christensen, A J; Srinivasan, Venkatraman; Hart, John C; Marshall-Colon, Amy
2018-01-01
Abstract Sustainable crop production is a contributing factor to current and future food security. Innovative technologies are needed to design strategies that will achieve higher crop yields on less land and with fewer resources. Computational modeling coupled with advanced scientific visualization enables researchers to explore and interact with complex agriculture, nutrition, and climate data to predict how crops will respond to untested environments. These virtual observations and predictions can direct the development of crop ideotypes designed to meet future yield and nutritional demands. This review surveys modeling strategies for the development of crop ideotypes and scientific visualization technologies that have led to discoveries in “big data” analysis. Combined modeling and visualization approaches have been used to realistically simulate crops and to guide selection that immediately enhances crop quantity and quality under challenging environmental conditions. This survey of current and developing technologies indicates that integrative modeling and advanced scientific visualization may help overcome challenges in agriculture and nutrition data as large-scale and multidimensional data become available in these fields. PMID:29562368
Zodrow, Katherine R; Li, Qilin; Buono, Regina M; Chen, Wei; Daigger, Glen; Dueñas-Osorio, Leonardo; Elimelech, Menachem; Huang, Xia; Jiang, Guibin; Kim, Jae-Hong; Logan, Bruce E; Sedlak, David L; Westerhoff, Paul; Alvarez, Pedro J J
2017-09-19
Innovation in urban water systems is required to address the increasing demand for clean water due to population growth and aggravated water stress caused by water pollution, aging infrastructure, and climate change. Advances in materials science, modular water treatment technologies, and complex systems analyses, coupled with the drive to minimize the energy and environmental footprints of cities, provide new opportunities to ensure a resilient and safe water supply. We present a vision for enhancing efficiency and resiliency of urban water systems and discuss approaches and research needs for overcoming associated implementation challenges.
NASA Astrophysics Data System (ADS)
Kido, Michael H.; Mundt, Carsten W.; Montgomery, Kevin N.; Asquith, Adam; Goodale, David W.; Kaneshiro, Kenneth Y.
2008-10-01
Monitoring the complex environmental relationships and feedbacks of ecosystems on catchment (or mountain)-to-sea scales is essential for social systems to effectively deal with the escalating impacts of expanding human populations globally on watersheds. However, synthesis of emerging technologies into a robust observing platform for the monitoring of coupled human-natural environments on extended spatial scales has been slow to develop. For this purpose, the authors produced a new cyberinfrastructure for environmental monitoring which successfully merged the use of wireless sensor technologies, grid computing with three-dimensional (3D) geospatial data visualization/exploration, and a secured internet portal user interface, into a working prototype for monitoring mountain-to-sea environments in the high Hawaiian Islands. A use-case example is described in which native Hawaiian residents of Waipa Valley (Kauai) utilized the technology to monitor the effects of regional weather variation on surface water quality/quantity response, to better understand their local hydrologic cycle, monitor agricultural water use, and mitigate the effects of lowland flooding.
Nowack, Bernd; Brouwer, Connie; Geertsma, Robert E; Heugens, Evelyn H W; Ross, Bryony L; Toufektsian, Marie-Claire; Wijnhoven, Susan W P; Aitken, Robert J
2013-09-01
Humans and the environment can come into contact with nanomaterials through a wide range of applications during all stages of the life cycle of nanoproducts. The aim of this commentary is to present an assessment of the potential for exposure and thus identify possible environmental, health and safety (EHS) issues for nanomaterials used in 10 technology sectors. We analysed all life cycle stages with regard to potential for exposure of workers, consumers/patients, and the environment. A wide variety of nanomaterials are used of which many have negligible potential for exposure, while others have medium or even high potential for exposure. Based on the likelihood of exposure, it appears that in general most attention should be paid to the agrifood, chemistry/materials, textiles and health sectors; and less to the information and communication technology (ICT), security and energy sectors. Toxicity and exposure are both important; however, the EHS impact of nanomaterials is always dependent on their particular use.
Kido, Michael H; Mundt, Carsten W; Montgomery, Kevin N; Asquith, Adam; Goodale, David W; Kaneshiro, Kenneth Y
2008-10-01
Monitoring the complex environmental relationships and feedbacks of ecosystems on catchment (or mountain)-to-sea scales is essential for social systems to effectively deal with the escalating impacts of expanding human populations globally on watersheds. However, synthesis of emerging technologies into a robust observing platform for the monitoring of coupled human-natural environments on extended spatial scales has been slow to develop. For this purpose, the authors produced a new cyberinfrastructure for environmental monitoring which successfully merged the use of wireless sensor technologies, grid computing with three-dimensional (3D) geospatial data visualization/exploration, and a secured internet portal user interface, into a working prototype for monitoring mountain-to-sea environments in the high Hawaiian Islands. A use-case example is described in which native Hawaiian residents of Waipa Valley (Kauai) utilized the technology to monitor the effects of regional weather variation on surface water quality/quantity response, to better understand their local hydrologic cycle, monitor agricultural water use, and mitigate the effects of lowland flooding.
Giovanni Zurlini; Irene Petrosillo; Nicola Zaccarelli; Kurt Riitters
2008-01-01
Environmental security, as the opposite of environmental fragility (vulnerability), is multilayered, multi-scale and complex, existing in both the objective realm of biophysics and society, and the subjective realm of individual human perception. For ecological risk assessments (ERAs), the relevant objects of environmental security are social-ecological landscapes (...
Clarens, Andres F.; Peters, Catherine A.
2016-01-01
Abstract Environmental engineers have played a critical role in improving human and ecosystem health over the past several decades. These contributions have focused on providing clean water and air as well as managing waste streams and remediating polluted sites. As environmental problems have become more global in scale and more deeply entrenched in sociotechnical systems, the discipline of environmental engineering must grow to be ready to respond to the challenges of the coming decades. Here we make the case that environmental engineers should play a leadership role in the development of climate change mitigation technologies at the carbon-water nexus (CWN). Climate change, driven largely by unfettered emissions of fossil carbon into the atmosphere, is a far-reaching and enormously complex environmental risk with the potential to negatively affect food security, human health, infrastructure, and other systems. Solving this problem will require a massive mobilization of existing and innovative new technology. The environmental engineering community is uniquely positioned to do pioneering work at the CWN using a skillset that has been honed, solving related problems. The focus of this special issue, on “The science and innovation of emerging subsurface energy technologies,” provides one example domain within which environmental engineers and related disciplines are beginning to make important contributions at the CWN. In this article, we define the CWN and describe how environmental engineers can bring their considerable expertise to bear in this area. Then we review some of the topics that appear in this special issue, for example, mitigating the impacts of hydraulic fracturing and geologic carbon storage, and we provide perspective on emergent research directions, for example, enhanced geothermal energy, energy storage in sedimentary formations, and others. PMID:28031695
Clarens, Andres F; Peters, Catherine A
2016-10-01
Environmental engineers have played a critical role in improving human and ecosystem health over the past several decades. These contributions have focused on providing clean water and air as well as managing waste streams and remediating polluted sites. As environmental problems have become more global in scale and more deeply entrenched in sociotechnical systems, the discipline of environmental engineering must grow to be ready to respond to the challenges of the coming decades. Here we make the case that environmental engineers should play a leadership role in the development of climate change mitigation technologies at the carbon-water nexus (CWN). Climate change, driven largely by unfettered emissions of fossil carbon into the atmosphere, is a far-reaching and enormously complex environmental risk with the potential to negatively affect food security, human health, infrastructure, and other systems. Solving this problem will require a massive mobilization of existing and innovative new technology. The environmental engineering community is uniquely positioned to do pioneering work at the CWN using a skillset that has been honed, solving related problems. The focus of this special issue, on "The science and innovation of emerging subsurface energy technologies," provides one example domain within which environmental engineers and related disciplines are beginning to make important contributions at the CWN. In this article, we define the CWN and describe how environmental engineers can bring their considerable expertise to bear in this area. Then we review some of the topics that appear in this special issue, for example, mitigating the impacts of hydraulic fracturing and geologic carbon storage, and we provide perspective on emergent research directions, for example, enhanced geothermal energy, energy storage in sedimentary formations, and others.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-12
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc., SLM Holdings, Inc., Spring Creek Healthcare Systems... securities of Security Intelligence Technologies, Inc. because it has not filed any periodic reports since...
The research of network database security technology based on web service
NASA Astrophysics Data System (ADS)
Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin
2013-03-01
Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.
Dipole Models for UXO Discrimination at Live Sites
2017-05-01
Discriminator CCR Combined Classifier Ranking cm Centimeter(s) EM Electromagnetic EMI Electromagnetic Induction ESTCP Environmental Security Technology...fraction of the anomalies as arising from non-hazardous items that could be safely left in the ground. Of particular note, the contractor EM -61-MK2 cart...use of classification metrics applied to production quality EM - 61 data, it was possible to significantly reduce the number of clutter items excavated
2012-06-01
23 5 TEST DESIGN ... research project, ORD will continue to focus on only the PCB inventory in the test zone and selected areas of the river as further defined in subsequent...1,000 500 50 25 5 TEST DESIGN This section of the report provides the detailed description of the experimental design and testing
2016-03-14
DoD Department of Defense EMI electromagnetic induction ESTCP Environmental Security Technology Certification Program ft. foot GPS global...three primary objectives: Test and validate detection and discrimination capabilities of a currently available advanced electromagnetic induction ... induction (EMI) sensors in dynamic and static data acquisition modes and associated analysis software. To achieve these objectives, a controlled test was
Marine data security based on blockchain technology
NASA Astrophysics Data System (ADS)
Yang, Zhao; Xie, Weiwei; Huang, Lei; Wei, Zhiqiang
2018-03-01
With the development of marine observation technology and network technology, the volume of marine data growing rapidly. This brings new challenges for data storage and transmission. How to protect data security of marine big data has become an urgent problem. The traditional information security methods’ characteristic is centralization. These technologies cannot provide whole process protection, e.g., data storage, data management and application of data. The blockchain technology is a novel technology, which can keep the data security and reliability by using decentralized methodology. It has aroused wide interest in the financial field. In this paper, we describe the concept, characteristics and key technologies of blockchain technology and introduce it into the field of marine data security.
Report #12-P-0879, September 26, 2012. The security posture and in-place environmental control review of the computer rooms in the Ariel Rios and Potomac Yard buildings revealed numerous security and environmental control deficiencies.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-12
... Business Technology Solutions Central Security Services Iselin, New Jersey; TA-W-82,634B, Prudential Global Business Technology Solutions Central Security Services Plymouth, Minnesota; TA- W-82,634C, Prudential Global Business Technology Solutions Central Security Services Scottsdale, Arizona; TA-W-82,634D...
Digital security technology simplified.
Scaglione, Bernard J
2007-01-01
Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.
Overview of RFID technology and its applications in the food industry.
Kumar, P; Reinitz, H W; Simunovic, J; Sandeep, K P; Franzon, P D
2009-10-01
Radio frequency identification (RFID) is an alternative technology with a potential to replace traditional universal product code (UPC) barcodes. RFID enables identification of an object from a distance without requiring a line of sight. RFID tags can also incorporate additional data such as details of product and manufacturer and can transmit measured environmental factors such as temperature and relative humidity. This article presents key concepts and terminology related to RFID technology and its applications in the food industry. Components and working principles of an RFID system are described. Numerous applications of RFID technology in the food industry (supply chain management, temperature monitoring of foods, and ensuring food safety) are discussed. Challenges in implementation of RFID technology are also discussed in terms of read range, read accuracy, nonuniform standards, cost, recycling issues, privacy, and security concerns.
Cybersecurity and Optimization in Smart “Autonomous” Buildings
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mylrea, Michael E.; Gourisetti, Sri Nikhil Gup
Significant resources have been invested in making buildings “smart” by digitizing, networking and automating key systems and operations. Smart autonomous buildings create new energy efficiency, economic and environmental opportunities. But as buildings become increasingly networked to the Internet, they can also become more vulnerable to various cyber threats. Automated and Internet-connected buildings systems, equipment, controls, and sensors can significantly increase cyber and physical vulnerabilities that threaten the confidentiality, integrity, and availability of critical systems in organizations. Securing smart autonomous buildings presents a national security and economic challenge to the nation. Ignoring this challenge threatens business continuity and the availability ofmore » critical infrastructures that are enabled by smart buildings. In this chapter, the authors address challenges and explore new opportunities in securing smart buildings that are enhanced by machine learning, cognitive sensing, artificial intelligence (AI) and smart-energy technologies. The chapter begins by identifying cyber-threats and challenges to smart autonomous buildings. Then it provides recommendations on how AI enabled solutions can help smart buildings and facilities better protect, detect and respond to cyber-physical threats and vulnerabilities. Next, the chapter will provide case studies that examine how combining AI with innovative smart-energy technologies can increase both cybersecurity and energy efficiency savings in buildings. The chapter will conclude by proposing recommendations for future cybersecurity and energy optimization research for examining AI enabled smart-energy technology.« less
32 CFR 2400.42 - Security Officer.
Code of Federal Regulations, 2011 CFR
2011-07-01
... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...
32 CFR 2400.42 - Security Officer.
Code of Federal Regulations, 2010 CFR
2010-07-01
... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...
32 CFR 2400.42 - Security Officer.
Code of Federal Regulations, 2014 CFR
2014-07-01
... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...
32 CFR 2400.42 - Security Officer.
Code of Federal Regulations, 2013 CFR
2013-07-01
... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...
32 CFR 2400.42 - Security Officer.
Code of Federal Regulations, 2012 CFR
2012-07-01
... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...
2016 Annual Site Environmental Report Sandia National Laboratories/New Mexico.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Salas, Angela Maria; Griffith, Stacy R.
Sandia National Laboratories (SNL) is a multimission laboratory managed and operated by National Technology & Engineering Solutions of Sandia, LLC, a wholly owned subsidiary of Honeywell International Inc., for the U.S. Department of Energy’s (DOE’s), National Nuclear Security Administration (NNSA). The DOE/NNSA Sandia Field Office administers the contract and oversees contractor operations at SNL, New Mexico. This Annual Site Environmental Report (ASER) summarizes data and the compliance status of sustainability, environmental protection, and monitoring programs at SNL/NM during calendar year 2016. Major environmental programs include air quality, water quality, groundwater protection, terrestrial and ecological surveillance, waste management, pollution prevention, environmentalmore » restoration, oil and chemical spill prevention, and implementation of the National Environmental Policy Act. This ASER is prepared in accordance with and required by DOE O 231.1B, Admin Change 1, Environment, Safety, and Health Reporting.« less
75 FR 18516 - Homeland Security Science and Technology Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-12
... Technology Advisory Committee AGENCY: Science and Technology Directorate, DHS. ACTION: Committee Management; notice of closed Federal Advisory Committee meeting SUMMARY: The Homeland Security Science and Technology.... DATES: The Homeland Security Science and Technology Advisory Committee will meet April 20, 2010 from 8...
NASA Astrophysics Data System (ADS)
Hamamoto, K.; Kaneko, Y.; Sobue, S.; Oyoshi, K.
2016-12-01
Climate change and human activities are directly or indirectly influence the acceleration of environmental problems and natural hazards such as forest fires, drought and floods in the Asia-Pacific countries. Satellite technology has become one of the key information sources in assessment, monitoring and mitigation of these hazards and related phenomenon. However, there are still gaps between science and application of space technology in practical usage. Asia-Pacific Regional Space Agency Forum (APRSAF) recommended to initiate the Space Applications for Environment (SAFE) proposal providing opportunity to potential user agencies in the Asia Pacific region to develop prototype applications of space technology for number of key issues including forest resources management, coastal monitoring and management, agriculture and food security, water resource management and development user-friendly tools for application of space technology. The main activity of SAFE is SAFE prototyping. SAFE prototyping is a demonstration for end users and decision makers to apply space technology applications for solving environmental issues in Asia-Pacific region. By utilizing space technology and getting technical support by experts, prototype executers can develop the application system, which could support decision making activities. SAFE holds a workshop once a year. In the workshop, new prototypes are approved and the progress of on-going prototypes are confirmed. Every prototype is limited for two years period and all activities are operated by volunteer manner. As of 2016, 20 prototypes are completed and 6 prototypes are on-going. Some of the completed prototypes, for example drought monitoring in Indonesia were applied to operational use by a local official organization.
NASA Astrophysics Data System (ADS)
Ito, Keishiro
The primacy of a nuclear fusion reactor in a competitive energy market remarkably depends on to what extent the reactor contributes to reduce the externalities of energy. The reduction effects are classified into two effects, which have quite dissimilar characteristics. One is an effect of environmental dimensions. The other is related to energy security. In this study I took up the results of EC's Extern Eproject studies as are presentative example of the former effect. Concerning the latter effect, I clarified the fundamental characteristics of externalities related to energy security and the conceptual framework for the purpose of evaluation. In the socio-economical evaluation of research into and development investments in nuclear fusions reactors, the public will require the development of integrated evaluation systems to support the cost-effect analysis of how well the reduction effects of externalities have been integrated with the effects of technological innovation, learning, spillover, etc.
Site Environmental Report for 2016 Sandia National Laboratories California.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Larsen, Barbara L.
Sandia National Laboratories, California (SNL/CA) is a Department of Energy (DOE) facility. The management and operations of the facility are under a contract with the DOE’s National Nuclear Security Administration (NNSA). On May 1, 2017, the name of the management and operating contractor changed from Sandia Corporation to National Technology and Engineering Solutions of Sandia, LLC (NTESS). The DOE, NNSA, Sandia Field Office administers the contract and oversees contractor operations at the site. This Site Environmental Report for 2016 was prepared in accordance with DOE Order 231.1B, Environment, Safety and Health Reporting (DOE 2012). The report provides a summary ofmore » environmental monitoring information and compliance activities that occurred at SNL/CA during calendar year 2016, unless noted otherwise. General site and environmental program information is also included.« less
Beyond Conflict and Kinetics: Airpower Strategy for Human Security Operations
2014-08-26
America to a leadership role of the international community while dramatically altering its security environment. After World War II, American security...health, environmental, personal, community , and political security. At the same time it stopped short of providing a finite definition, instead...seven areas of human security are economic, food, health, environmental, personal, community and political security. These components are a “universal
Technosocial Predictive Analytics for Security Informatics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sanfilippo, Antonio P.; Gilbert, Nigel; Greaves, Mark
2012-08-22
Challenges to the security, health, and sustainable growth of our society keep escalating asymmetrically due to the growing pace of globalization and global change. The increasing velocity of information sharing, social networking, economic forces, and environmental change has resulted in a rapid increase in the number and frequency of “game-changing moments” that a community can face. Social movements that once took a decade to build now take a year; shifts in public opinion that once took a year to take root now take a couple of months. More and more frequently, these critical moments occur too suddenly for the affectedmore » communities to succeed in countering the consequent adversities or seizing the emerging opportunities. Now more than ever, we need anticipatory reasoning technologies to forecast and manage change in order to secure and improve our way of life and the environment we inhabit.« less
Emerging Agricultural Biotechnologies for Sustainable Agriculture and Food Security.
Anderson, Jennifer A; Gipmans, Martijn; Hurst, Susan; Layton, Raymond; Nehra, Narender; Pickett, John; Shah, Dilip M; Souza, Thiago Lívio P O; Tripathi, Leena
2016-01-20
As global populations continue to increase, agricultural productivity will be challenged to keep pace without overtaxing important environmental resources. A dynamic and integrated approach will be required to solve global food insecurity and position agriculture on a trajectory toward sustainability. Genetically modified (GM) crops enhanced through modern biotechnology represent an important set of tools that can promote sustainable agriculture and improve food security. Several emerging biotechnology approaches were discussed in a recent symposium organized at the 13th IUPAC International Congress of Pesticide Chemistry meeting in San Francisco, CA, USA. This paper summarizes the innovative research and several of the new and emerging technologies within the field of agricultural biotechnology that were presented during the symposium. This discussion highlights how agricultural biotechnology fits within the context of sustainable agriculture and improved food security and can be used in support of further development and adoption of beneficial GM crops.
2017-03-01
FINAL REPORT Demonstration of Energy Savings in Commercial Buildings for Tiered Trim and Respond Method in Resetting Static Pressure for VAV...release Page Intentionally Left Blank This report was prepared under contract to the Department of Defense Environmental Security Technology...Certification Program (ESTCP). The publication of this report does not indicate endorsement by the Department of Defense, nor should the contents be
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2016 accomplishments and primary areas of focus for the Department of Energy's (DOE's) Office of Environmental Management and EM sites are presented. For DOE EM, these include Focusing on the Field, Teaming with Cleanup Partners, Developing New Technology, and Maximizing Cleanup Dollars. Major 2016 achievements are highlighted for EM, Richland Operations Office, Office of River Protection, Savannah River Site, Oak Ridge, Idaho, Waste Isolation Pilot Plant, Los Alamos, Portsmouth, Paducah, West Valley Demonstration Project, and the Nevada National Security Site,
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-15
... Acquisition Regulation; Implementation of Information Technology Security Provision AGENCY: Office of... information technology (IT) supplies, services and systems with security requirements. DATES: Effective Date... effective date that include information technology (IT) supplies, services and systems with security...
76 FR 4079 - Information Technology (IT) Security
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-24
... Technology (IT) Security AGENCY: National Aeronautics and Space Administration. ACTION: Final rule. SUMMARY: NASA is revising the NASA FAR Supplement (NFS) to update requirements related to Information Technology... Security clause. However, due to the critical importance of protecting the Agency's Information Technology...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, K.; Tsai, H.; Liu, Y. Y.
Radio frequency identification (RFID) is one of today's most rapidly growing technologies in the automatic data collection industry. Although commercial applications are already widespread, the use of this technology for managing nuclear materials is only in its infancy. Employing an RFID system has the potential to offer an immense payback: enhanced safety and security, reduced need for manned surveillance, real-time access to status and event history data, and overall cost-effectiveness. The Packaging Certification Program (PCP) in the U.S. Department of Energy's (DOE's) Office of Environmental Management (EM), Office of Packaging and Transportation (EM-63), is developing an RFID system for nuclearmore » materials management. The system consists of battery-powered RFID tags with onboard sensors and memories, a reader network, application software, a database server and web pages. The tags monitor and record critical parameters, including the status of seals, movement of objects, and environmental conditions of the nuclear material packages in real time. They also provide instant warnings or alarms when preset thresholds for the sensors are exceeded. The information collected by the readers is transmitted to a dedicated central database server that can be accessed by authorized users across the DOE complex via a secured network. The onboard memory of the tags allows the materials manifest and event history data to reside with the packages throughout their life cycles in storage, transportation, and disposal. Data security is currently based on Advanced Encryption Standard-256. The software provides easy-to-use graphical interfaces that allow access to all vital information once the security and privilege requirements are met. An innovative scheme has been developed for managing batteries in service for more than 10 years without needing to be changed. A miniature onboard dosimeter is being developed for applications that require radiation surveillance. A field demonstration of the RFID system was recently conducted to assess its performance. The preliminary results of the demonstration are reported in this paper.« less
Advances in analytical technologies for environmental protection and public safety.
Sadik, O A; Wanekaya, A K; Andreescu, S
2004-06-01
Due to the increased threats of chemical and biological agents of injury by terrorist organizations, a significant effort is underway to develop tools that can be used to detect and effectively combat chemical and biochemical toxins. In addition to the right mix of policies and training of medical personnel on how to recognize symptoms of biochemical warfare agents, the major success in combating terrorism still lies in the prevention, early detection and the efficient and timely response using reliable analytical technologies and powerful therapies for minimizing the effects in the event of an attack. The public and regulatory agencies expect reliable methodologies and devices for public security. Today's systems are too bulky or slow to meet the "detect-to-warn" needs for first responders such as soldiers and medical personnel. This paper presents the challenges in monitoring technologies for warfare agents and other toxins. It provides an overview of how advances in environmental analytical methodologies could be adapted to design reliable sensors for public safety and environmental surveillance. The paths to designing sensors that meet the needs of today's measurement challenges are analyzed using examples of novel sensors, autonomous cell-based toxicity monitoring, 'Lab-on-a-Chip' devices and conventional environmental analytical techniques. Finally, in order to ensure that the public and legal authorities are provided with quality data to make informed decisions, guidelines are provided for assessing data quality and quality assurance using the United States Environmental Protection Agency (US-EPA) methodologies.
Technology-Enabled Crime, Policing and Security
ERIC Educational Resources Information Center
McQuade, Sam
2006-01-01
Crime, policing and security are enabled by and co-evolve with technologies that make them possible. As criminals compete with security and policing officials for technological advantage perpetually complex crime, policing and security results in relatively confusing and therefore unmanageable threats to society. New, adaptive and ordinary crimes…
Brookhaven National Laboratory Institutional Plan FY2001--FY2005
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, S.
Brookhaven National Laboratory is a multidisciplinary laboratory in the Department of Energy National Laboratory system and plays a lead role in the DOE Science and Technology mission. The Laboratory also contributes to the DOE missions in Energy Resources, Environmental Quality, and National Security. Brookhaven strives for excellence in its science research and in facility operations and manages its activities with particular sensitivity to environmental and community issues. The Laboratory's programs are aligned continuously with the goals and objectives of the DOE through an Integrated Planning Process. This Institutional Plan summarizes the portfolio of research and capabilities that will assure successmore » in the Laboratory's mission in the future. It also sets forth BNL strategies for our programs and for management of the Laboratory. The Department of Energy national laboratory system provides extensive capabilities in both world class research expertise and unique facilities that cannot exist without federal support. Through these national resources, which are available to researchers from industry, universities, other government agencies and other nations, the Department advances the energy, environmental, economic and national security well being of the US, provides for the international advancement of science, and educates future scientists and engineers.« less
NASA Advanced Computing Environment for Science and Engineering
NASA Technical Reports Server (NTRS)
Biswas, Rupak
2017-01-01
Vision: To reach for new heights and reveal the unknown so that what we do and learn will benefit all humankind. Mission: To pioneer the future in space exploration, scientific discovery, and aeronautics research. Aeronautics Research (ARMD): Pioneer and prove new flight technologies for safer, more secure, efficient, and environmental friendly air transportation. Human Exploration and Operations (HEOMD): Focus on ISS operations; and develop new spacecraft and other capabilities for affordable, sustainable exploration beyond low Earth orbit. Science (SCMD): Explore the Earth, solar system, and universe beyond; chart best route for discovery; and reap the benefits of Earth and space exploration for society. Space Technology (STMD): Rapidly develop, demonstrate, and infuse revolutionary, high-payoff technologies through collaborative partnerships, expanding the boundaries of aerospace enterprise.
Yuan, Wei; Zhang, Jie; Tan Ji-qiang; Zhou, Bo; Kang, Rui-cun; Wang, Ai-hong; Liu, Wei; Zhang, Lu
2015-09-01
It is an effective way for natural reserves to enhance self-supportive ability and realize sustainable development by developing ecotourism. Taking the experimental zone of Langxiang Natural Reserve in Heilongjiang Province as research object, the forest sub-compartment as research unit, and spatial pattern of environmental suitability of camping sites as research content, an evaluation index system taking natural environment, geographical security, infrastructure and traffic as project levels was built. Delphi and AHP methods were used to determine index weights. A spatial distribution map of camping environmental suitability in Langxiang Natural Reserve was drawn using the GIS spatial information processing technology based on "3S" measurement and the survey data. The results showed that the highest score for quantification of environmental suitability was 90, while the lowest score was 78, and the average value was 83.66 in the 1067 forest sub-compartments for test. The area of forest sub-compartments which were suitable for camping was 1094.44 hm2, being 12.2% of the experimental zone. The forest sub-compartments which had high environmental suitability in the research area were distributed uniformly and centralized with low degree of fragmentation. It was suggested that the contiguous forest sub-compartments with high scores of environmental suitability could be integrated for camping tourism. Due to the high level of environmental suitability for camping, the experimental zone of Langxiang Natural Reserve is suitable for developing camping tourism. Based on "3S" technology, the land use conditions of ecotourism environment of a natural reserve could be evaluated quickly and quantitatively by mathematical model.
14 CFR 1274.937 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2012 CFR
2012-01-01
... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...
14 CFR 1274.937 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2013 CFR
2013-01-01
... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...
14 CFR 1274.937 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2011 CFR
2011-01-01
... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...
14 CFR 1274.937 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2010 CFR
2010-01-01
... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...
Flow and Transport of Fines in Dams and Embankments
NASA Astrophysics Data System (ADS)
Glascoe, L. G.; Ezzedine, S. M.; Kanarska, Y.; Lomov, I.; Antoun, T.; Woodson, S. C.; Hall, R. L.; Smith, J.
2013-12-01
Understanding the flow of fines in porous media and fractured media is significant for industrial, environmental, geotechnical and petroleum technologies to name a few. Several models have been proposed to simulate the flow and transport of fines using single or two-phase flow approaches while other models rely on mobile and immobile transport approaches. However, to the authors' best knowledge, all the proposed modeling approaches have not been compared to each other in order to define their limitations and domain of validation. In the present study, several models describing the transport of fines in heterogeneous porous and fractured media will be presented and compared to each other. Furthermore, we will evaluate their performance on the same published experimental sets of published data. This work performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under Contract DE-AC52-07NA27344 and was sponsored by the Department of Homeland Security (DHS), Science and Technology Directorate, Homeland Security Advanced Research Projects Agency (HSARPA).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Althouse, P.; McKannay, R. H.
This was a collaborative effort between Lawrence Livermore National Security, LLC as manager and operator of Lawrence Livermore National Laboratory (LLNL) and ISOFLEX USA (ISOFLEX), to 1) develop and test a prototype waste destruction system ("System") using AC plasma torch technology to break down and drastically reduce the volume of Carbon-14 (C-14) contaminated medical laboratory wastes while satisfying all environmental regulations, and 2) develop and demonstrate methods for recovering 99%+ of the carbon including the C-14 allowing for possible re-use as a tagging and labeling tool in the biomedical industry.
2004-03-31
include the black widow and the brown or violin spiders. The black widow is a coal-black bulbous spider 3/4 to 1 1/2 inches in length, with a bright red...pupils and generalized swelling of face and extremities. The brown recluse, or violin spider, is brownish to tan in color, rather flat, 1/2 to 5/8 inches...long with a dark brown “ violin ” marking on the underside. There are three varieties of the brown spider, which present a problem to site personnel
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dickson, Johnbull O.; Smith, John G.; Mehlhorn, Tonia L.
2017-07-01
Mercury remediation is a high priority for the US Department of Energy (DOE) Oak Ridge Office of Environmental Management (OREM), especially at and near the Y-12 National Security Complex (Y-12) where historical mercury use has resulted in contaminated buildings, soils, and downstream surface waters. To address mercury contamination of East Fork Poplar Creek (EFPC), the DOE has adopted a phased, adaptive management approach to remediation, which includes mercury treatment actions at Y-12 in the short-term and research and technology development (TD) to evaluate longer-term solutions in the downstream environment (US Department of Energy 2014).
48 CFR 1352.239-72 - Security requirements for information technology resources.
Code of Federal Regulations, 2011 CFR
2011-10-01
... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...
48 CFR 1352.239-72 - Security requirements for information technology resources.
Code of Federal Regulations, 2013 CFR
2013-10-01
... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...
48 CFR 1352.239-72 - Security requirements for information technology resources.
Code of Federal Regulations, 2012 CFR
2012-10-01
... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...
48 CFR 1352.239-72 - Security requirements for information technology resources.
Code of Federal Regulations, 2014 CFR
2014-10-01
... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...
48 CFR 1352.239-72 - Security requirements for information technology resources.
Code of Federal Regulations, 2010 CFR
2010-10-01
... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...
Securing Information Technology in Healthcare
Anthony, Denise; Campbell, Andrew T.; Candon, Thomas; Gettinger, Andrew; Kotz, David; Marsch, Lisa A.; Molina-Markham, Andrés; Page, Karen; Smith, Sean W.; Gunter, Carl A.; Johnson, M. Eric
2014-01-01
Dartmouth College’s Institute for Security, Technology, and Society conducted three workshops on securing information technology in healthcare, attended by a diverse range of experts in the field. This article summarizes the three workshops. PMID:25379030
A review of security of electronic health records.
Win, Khin Than
The objective of this study is to answer the research question, "Are current information security technologies adequate for electronic health records (EHRs)?" In order to achieve this, the following matters have been addressed in this article: (i) What is information security in the context of EHRs? (ii) Why is information security important for EHRs? and (iii) What are the current technologies for information security available to EHRs? It is concluded that current EHR security technologies are inadequate and urgently require improvement. Further study regarding information security of EHRs is indicated.
ADVANCED CERAMIC MATERIALS FOR NEXT-GENERATION NUCLEAR APPLICATIONS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Marra, J.
2010-09-29
Rising global energy demands coupled with increased environmental concerns point to one solution; they must reduce their dependence on fossil fuels that emit greenhouse gases. As the global community faces the challenge of maintaining sovereign nation security, reducing greenhouse gases, and addressing climate change nuclear power will play a significant and likely growing role. In the US, nuclear energy already provides approximately one-fifth of the electricity used to power factories, offices, homes, and schools with 104 operating nuclear power plants, located at 65 sites in 31 states. Additionally, 19 utilities have applied to the US Nuclear Regulatory Commission (NRC) formore » construction and operating licenses for 26 new reactors at 17 sites. This planned growth of nuclear power is occurring worldwide and has been termed the 'nuclear renaissance.' As major industrial nations craft their energy future, there are several important factors that must be considered about nuclear energy: (1) it has been proven over the last 40 years to be safe, reliable and affordable (good for Economic Security); (2) its technology and fuel can be domestically produced or obtained from allied nations (good for Energy Security); and (3) it is nearly free of greenhouse gas emissions (good for Environmental Security). Already an important part of worldwide energy security via electricity generation, nuclear energy can also potentially play an important role in industrial processes and supporting the nation's transportation sector. Coal-to-liquid processes, the generation of hydrogen and supporting the growing potential for a greatly increased electric transportation system (i.e. cars and trains) mean that nuclear energy could see dramatic growth in the near future as we seek to meet our growing demand for energy in cleaner, more secure ways. In order to address some of the prominent issues associated with nuclear power generation (i.e., high capital costs, waste management, and proliferation), the worldwide community is working to develop and deploy new nuclear energy systems and advanced fuel cycles. These new nuclear systems address the key challenges and include: (1) extracting the full energy value of the nuclear fuel; (2) creating waste solutions with improved long term safety; (3) minimizing the potential for the misuse of the technology and materials for weapons; (4) continually improving the safety of nuclear energy systems; and (5) keeping the cost of energy affordable.« less
Photonic quantum technologies (Presentation Recording)
NASA Astrophysics Data System (ADS)
O'Brien, Jeremy L.
2015-09-01
The impact of quantum technology will be profound and far-reaching: secure communication networks for consumers, corporations and government; precision sensors for biomedical technology and environmental monitoring; quantum simulators for the design of new materials, pharmaceuticals and clean energy devices; and ultra-powerful quantum computers for addressing otherwise impossibly large datasets for machine learning and artificial intelligence applications. However, engineering quantum systems and controlling them is an immense technological challenge: they are inherently fragile; and information extracted from a quantum system necessarily disturbs the system itself. Of the various approaches to quantum technologies, photons are particularly appealing for their low-noise properties and ease of manipulation at the single qubit level. We have developed an integrated waveguide approach to photonic quantum circuits for high performance, miniaturization and scalability. We will described our latest progress in generating, manipulating and interacting single photons in waveguide circuits on silicon chips.
78 FR 32696 - China Environmental Protection, Inc., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-31
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China Environmental Protection, Inc., Order of Suspension of Trading May 29, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China Environmental Protection, Inc. because it has not filed any periodi...
Management of the Defense Technology Security Administration Year 2000 Program
1998-11-03
caller is fully protected Acronyms DTSA Defense Technology Security Administration Y2K Year 2000 INSPECTOR GENERAL DEPARTMENT OF DEFENSE 400 ARMY NAVY...accordance with the DoD Management Plan Defense Technology Security Administration. The Defense Technology Security Administration ( DTSA ) was established...in 1985 as a field activity of the Office of the Secretary of Defense By establishing DTSA , the DoD role in export controls was centralized and
Secure and Resilient Cloud Computing for the Department of Defense
2015-07-21
that addresses that threat model, and (3) integrate the technology into a usable, secure, resilient cloud test bed. Underpinning this work is the...risks for the DoD’s acquisition of secure, resilient cloud technology by providing proofs of concept, technology maturity, integration demonstrations...we need a strategy for integrating LLSRC technology with the cloud services and applications that need to be secured. The LLSRC integration
U.S.-CHINA RADIOLOGICAL SOURCE SECURITY PROJECT: CONTINUING AND EXPANDING BILATERAL COOPERATION
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhu, Zhixuan; Zhou, Qifu; Yang, Yaoyun
2009-10-07
The successful radiological security cooperation between the U.S. and China to secure at-risk sites near venues of the 2008 Beijing Summer Olympics has led to an expanded bilateral nonproliferation cooperation scope. The U.S. Department of Energy’s National Nuclear Security Administration, the Chinese Atomic Energy Authority and the China Ministry of Environmental Protection are continuing joint efforts to secure radiological sources throughout China under the U.S.-China Peaceful Uses of Nuclear Technology (PUNT) Agreement. Joint cooperation activities include physical security upgrades of sites with International Atomic Energy Agency (IAEA) Category 1 radiological sources, packaging, recovery, and storage of high activity transuranic andmore » beta gamma sources, and secure transportation practices for the movement of recovered sources. Expansion of cooperation into numerous provinces within China includes the use of integrated training workshops that will demonstrate methodologies and best practices between U.S. and Chinese radiological source security and recovery experts. The fiscal year 2009 expanded scope of cooperation will be conducted similar to the 2008 Olympic cooperation with the Global Threat Reduction Initiative taking the lead for the U.S., PUNT being the umbrella agreement, and Los Alamos, Sandia, and Oak Ridge National Laboratories operating as technical working groups. This paper outlines the accomplishments of the joint implementation and training efforts to date and discusses the possible impact on future U.S./China cooperation.« less
48 CFR 2452.239-71 - Information Technology Virus Security.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...
48 CFR 2452.239-71 - Information Technology Virus Security.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...
48 CFR 2452.239-71 - Information Technology Virus Security.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...
48 CFR 1252.239-71 - Information technology security plan and accreditation.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...
48 CFR 1252.239-71 - Information technology security plan and accreditation.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...
48 CFR 1252.239-71 - Information technology security plan and accreditation.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...
48 CFR 2452.239-71 - Information Technology Virus Security.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...
48 CFR 1252.239-71 - Information technology security plan and accreditation.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...
48 CFR 1252.239-71 - Information technology security plan and accreditation.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...
48 CFR 2452.239-71 - Information Technology Virus Security.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...
The Chain-Link Fence Model: A Framework for Creating Security Procedures
ERIC Educational Resources Information Center
Houghton, Robert F.
2013-01-01
A long standing problem in information technology security is how to help reduce the security footprint. Many specific proposals exist to address specific problems in information technology security. Most information technology solutions need to be repeatable throughout the course of an information systems lifecycle. The Chain-Link Fence Model is…
MIT Lincoln Laboratory Annual Report 2007: Technology in Support of National Security
2007-01-01
technical innovation and scientific discoveries. MISSION: TechnoLogy In SupporT of naTIonaL SecurITy 2007 Dr. Claude R. Canizares Vice president for...problems. The Lincoln Laboratory New Technology Initiatives Program is one of several internal technology innovation mechanisms. Technologies emerging...externships. LIFT2, an innovative professional learning program for science, technology , and math teachers, serves Massachusetts metro south/west region
Feng, Qianmei
2007-10-01
Federal law mandates that every checked bag at all commercial airports be screened by explosive detection systems (EDS), explosive trace detection systems (ETD), or alternative technologies. These technologies serve as critical components of airport security systems that strive to reduce security risks at both national and global levels. To improve the operational efficiency and airport security, emerging image-based technologies have been developed, such as dual-energy X-ray (DX), backscatter X-ray (BX), and multiview tomography (MVT). These technologies differ widely in purchasing cost, maintenance cost, operating cost, processing rate, and accuracy. Based on a mathematical framework that takes into account all these factors, this article investigates two critical issues for operating screening devices: setting specifications for continuous security responses by different technologies; and selecting technology or combination of technologies for efficient 100% baggage screening. For continuous security responses, specifications or thresholds are used for classifying threat items from nonthreat items. By investigating the setting of specifications on system security responses, this article assesses the risk and cost effectiveness of various technologies for both single-device and two-device systems. The findings provide the best selection of image-based technologies for both single-device and two-device systems. Our study suggests that two-device systems outperform single-device systems in terms of both cost effectiveness and accuracy. The model can be readily extended to evaluate risk and cost effectiveness of multiple-device systems for airport checked-baggage security screening.
48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...
48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...
17 CFR 200.26a - Office of Information Technology.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Organization § 200.26a Office of Information Technology. The Office of Information Technology is responsible... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Office of Information Technology. 200.26a Section 200.26a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...
48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...
48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...
17 CFR 200.26a - Office of Information Technology.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Organization § 200.26a Office of Information Technology. The Office of Information Technology is responsible... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Office of Information Technology. 200.26a Section 200.26a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...
17 CFR 200.26a - Office of Information Technology.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Organization § 200.26a Office of Information Technology. The Office of Information Technology is responsible... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Office of Information Technology. 200.26a Section 200.26a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...
14 CFR § 1274.937 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2014 CFR
2014-01-01
... information technology resources. § 1274.937 Section § 1274.937 Aeronautics and Space NATIONAL AERONAUTICS... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...
17 CFR 200.26a - Office of Information Technology.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Organization § 200.26a Office of Information Technology. The Office of Information Technology is responsible... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Office of Information Technology. 200.26a Section 200.26a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...
17 CFR 200.26a - Office of Information Technology.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Office of Information Technology. 200.26a Section 200.26a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Organization § 200.26a Office of Information Technology. The Office of Information Technology is responsible...
48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...
Sustainable Food Security Measurement: A Systemic Methodology
NASA Astrophysics Data System (ADS)
Findiastuti, W.; Singgih, M. L.; Anityasari, M.
2017-04-01
Sustainable food security measures how a region provides food for its people without endangered the environment. In Indonesia, it was legally measured in Food Security and Vulnerability (FSVA). However, regard to sustainable food security policy, the measurement has not encompassed the environmental aspect. This will lead to lack of environmental aspect information for adjusting the next strategy. This study aimed to assess Sustainable Food security by encompassing both food security and environment aspect using systemic eco-efficiency. Given existing indicator of cereal production level, total emission as environment indicator was generated by constructing Causal Loop Diagram (CLD). Then, a stock-flow diagram was used to develop systemic simulation model. This model was demonstrated for Indonesian five provinces. The result showed there was difference between food security order with and without environmental aspect assessment.
The application of data encryption technology in computer network communication security
NASA Astrophysics Data System (ADS)
Gong, Lina; Zhang, Li; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen
2017-04-01
With the rapid development of Intemet and the extensive application of computer technology, the security of information becomes more and more serious, and the information security technology with data encryption technology as the core has also been developed greatly. Data encryption technology not only can encrypt and decrypt data, but also can realize digital signature, authentication and authentication and other functions, thus ensuring the confidentiality, integrity and confirmation of data transmission over the network. In order to improve the security of data in network communication, in this paper, a hybrid encryption system is used to encrypt and decrypt the triple DES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management; At the same time to realize digital signature using Java security software, to ensure data integrity and non-repudiation. Finally, the data encryption system is developed by Java language. The data encryption system is simple and effective, with good security and practicality.
2007 Report to Congress of the U.S.- China Economic and Security Review Commission
2007-11-01
the $3 billion stake it took in the New York-based private equity firm The Blackstone Group. Some worry that the new fund may be used to capture more...pollution of surrounding riverbanks and other ecological harm. Pollution from Coal Mining Air pollution is not the only environmental consequence of Chi...technology firms and human rights organizations was formed to discuss the establishment of an international code of ethics on issues related to
Republic of the Marshall Islands. Energy Project Development Options and Technical Assessment (2013)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Conrad, Misty Dawn; Olis, Dan; Ness, J. Erik
2015-09-01
The advancement of renewable energy and energy efficient technologies continues to be fluid. There are many technical opportunities and strategies that can be utilized to guide communities to deploy cost-effective commercial alternative energy options; however, to achieve aggressive economic, environmental, and security goals, it requires a comprehensive, integrated approach. This document reports on the initial findings of an energy assessment that was conducted for the Republic of the Marshall Islands.
Virtual special issue on catalysis at the U.S. Department of Energy's National Laboratories
Pruski, Marek; Sadow, Aaron D.; Slowing, Igor I.; ...
2016-04-21
Here the catalysis research at the U.S. Department of Energy's (DOE's) National Laboratories covers a wide range of research topics in heterogeneous catalysis, homogeneous/molecular catalysis, biocatalysis, electrocatalysis, and surface science. Since much of the work at National Laboratories is funded by DOE, the research is largely focused on addressing DOE's mission to ensure America's security and prosperity by addressing its energy, environmental, and nuclear challenges through transformative science and technology solutions.
The Threat of Security: Hindering Technology Integration in the Classroom
ERIC Educational Resources Information Center
Robinson, LeAnne K.; Brown, Abbie; Green, Tim
2007-01-01
For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…
Genetically modified foods: safety, risks and public concerns-a review.
Bawa, A S; Anilakumar, K R
2013-12-01
Genetic modification is a special set of gene technology that alters the genetic machinery of such living organisms as animals, plants or microorganisms. Combining genes from different organisms is known as recombinant DNA technology and the resulting organism is said to be 'Genetically modified (GM)', 'Genetically engineered' or 'Transgenic'. The principal transgenic crops grown commercially in field are herbicide and insecticide resistant soybeans, corn, cotton and canola. Other crops grown commercially and/or field-tested are sweet potato resistant to a virus that could destroy most of the African harvest, rice with increased iron and vitamins that may alleviate chronic malnutrition in Asian countries and a variety of plants that are able to survive weather extremes. There are bananas that produce human vaccines against infectious diseases such as hepatitis B, fish that mature more quickly, fruit and nut trees that yield years earlier and plants that produce new plastics with unique properties. Technologies for genetically modifying foods offer dramatic promise for meeting some areas of greatest challenge for the 21st century. Like all new technologies, they also pose some risks, both known and unknown. Controversies and public concern surrounding GM foods and crops commonly focus on human and environmental safety, labelling and consumer choice, intellectual property rights, ethics, food security, poverty reduction and environmental conservation. With this new technology on gene manipulation what are the risks of "tampering with Mother Nature"?, what effects will this have on the environment?, what are the health concerns that consumers should be aware of? and is recombinant technology really beneficial? This review will also address some major concerns about the safety, environmental and ecological risks and health hazards involved with GM foods and recombinant technology.
Sustainable Development Strategy for Russian Mineral Resources Extracting Economy
NASA Astrophysics Data System (ADS)
Dotsenko, Elena; Ezdina, Natalya; Prilepskaya, Angelina; Pivnyk, Kirill
2017-11-01
The immaturity of strategic and conceptual documents in the sphere of sustainable development of the Russian economy had a negative impact on long-term strategic forecasting of its neo-industrialization. At the present stage, the problems of overcoming the mineral and raw material dependence, the negative structural shift of the Russian economy, the acceleration of the rates of economic growth, the reduction of technological gap from the developed countries become strategically in demand. The modern structure of the Russian economy, developed within the framework of the proposed market model, does not generate a sustainable type of development. It became obvious that in conditions of the market processes' entropy, without neo-industrial changes, the reconstruction of industry on a new convergence-technological basis and without increasing the share of high technology production the instability of macroeconomic system, the risks of environmental and economic security of Russia are growing. Therefore, today we need a transition from forming one industry development strategy to the national one that will take into account both the social and economic and environmental challenges facing Russia as a mineral resources extracting country.
Information technology security system engineering methodology
NASA Technical Reports Server (NTRS)
Childs, D.
2003-01-01
A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.
Code of Federal Regulations, 2010 CFR
2010-10-01
... ADMINISTRATIVE MATTERS Safeguarding Classified Information Within Industry 1804.470-2 Policy. NASA IT security...) 2810, Security of Information Technology; NASA Procedural Requirements (NPR) 2810, Security of Information Technology; and interim policy updates in the form of NASA Information Technology Requirements...
NASA Astrophysics Data System (ADS)
Xue, Jie; Gui, Dongwei; Lei, Jiaqiang; Sun, Huaiwei; Zeng, Fanjiang; Feng, Xinlong
2017-12-01
Agriculture and the eco-environment are increasingly competing for water. The extension of intensive farmland for ensuring food security has resulted in excessive water exploitation by agriculture. Consequently, this has led to a lack of water supply in natural ecosystems. This paper proposes a trade-off framework to coordinate the water-use conflict between agriculture and the eco-environment, based on economic compensation for irrigation stakeholders. A hybrid Bayesian network (HBN) is developed to implement the framework, including: (a) agricultural water shortage assessments after meeting environmental flows; (b) water-use tradeoff analysis between agricultural irrigation and environmental flows using the HBN; and (c) quantification of the agricultural economic compensation for different irrigation stakeholders. The constructed HBN is computed by dynamic discretization, which is a more robust and accurate propagation algorithm than general static discretization. A case study of the Qira oasis area in Northwest China demonstrates that the water trade-off based on economic compensation depends on the available water supply and environmental flows at different levels. Agricultural irrigation water extracted for grain crops should be preferentially guaranteed to ensure food security, in spite of higher economic compensation in other cash crops' irrigation for water coordination. Updating water-saving engineering and adopting drip irrigation technology in agricultural facilities after satisfying environmental flows would greatly relieve agricultural water shortage and save the economic compensation for different irrigation stakeholders. The approach in this study can be easily applied in water-stressed areas worldwide for dealing with water competition.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...
Code of Federal Regulations, 2014 CFR
2014-10-01
..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...
Code of Federal Regulations, 2013 CFR
2013-10-01
..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...
Code of Federal Regulations, 2011 CFR
2011-10-01
..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...
2010-09-01
of Defense DTSA Defense Technology Security Administration FMS Foreign Military Sales GSD Gulf Security Dialogue LOA Letter of Offer and...may refer license applications to the Defense Technology Security Administration ( DTSA ) to determine if the United States should release the...requested technology to the requesting foreign government. Specifically, DTSA assesses the sale’s impact on preserving critical U.S. military technological
National Security Technology Incubator Business Plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with nationalmore » security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.« less
76 FR 27642 - Department of Homeland Security; Transfer of Data
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-12
... Subjects Environmental protection, Business and industry, Government property, Security measures. Dated... Security; Transfer of Data AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: This... Cosmetic Act (FFDCA), including information that may have been claimed as Confidential Business Information...
21 CFR 1311.08 - Incorporation by reference.
Code of Federal Regulations, 2010 CFR
2010-04-01
... of Standards and Technology, Computer Security Division, Information Technology Laboratory, National... standards are available from the National Institute of Standards and Technology, Computer Security Division... 140-2, Security Requirements for Cryptographic Modules, May 25, 2001, as amended by Change Notices 2...
Water-Energy-Food Nexus in Asia-Pacific Ring of Fire
NASA Astrophysics Data System (ADS)
Taniguchi, M.; Endo, A.; Gurdak, J. J.; Allen, D. M.; Siringan, F.; Delinom, R.; Shoji, J.; Fujii, M.; Baba, K.
2013-12-01
Climate change and economic development are causing increased pressure on water, energy and food resources, presenting communities with increased levels of tradeoffs and potential conflicts among these resources. Therefore, the water-energy-food nexus is one of the most important and fundamental global environmental issues facing the world. For the purposes of this research project, we define human-environmental security as the joint optimization between human and environmental security as well as the water-energy-food nexus. To optimize the governance and management within these inter-connected needs, it is desirable to increase human-environmental security by improving social managements for the water-energy-food nexus. In this research project, we intend to establish a method to manage and optimize the human-environmental security of the water-energy-food nexus by using integrated models, indices, and maps as well as social and natural investigations with stakeholder analyses. We base our approach on the viewpoint that it is important for a sustainable society to increase human-environmental security with decreasing risk and increasing resilience by optimizing the connections within the critical water-energy and water-food clusters. We will take a regional perspective to address these global environmental problems. The geological and geomorphological conditions in our proposed study area are heavily influenced by the so-called 'Ring of Fire,' around the Pacific Ocean. Within these areas including Japan and Southeast Asia, the hydro-meteorological conditions are dominated by the Asia monsoon. The populations that live under these natural conditions face elevated risk and potential disaster as negative impacts, while also benefitting from positive ecological goods and services. There are therefore tradeoffs and conflicts within the water-energy-food nexus, as well as among various stakeholders in the region. The objective of this project is to maximize human-environmental security (minimize the risk) by choosing management structures and policies that optimize both the water-food-energy nexus in Asia-Pacific coastal regions. We define joint security approach as optimized policy. Optimal policies will develop joint security approaches for human-environmental security in the coastal region of the Ring of Fire, including stakeholders and decision-makers.
Restricted access processor - An application of computer security technology
NASA Technical Reports Server (NTRS)
Mcmahon, E. M.
1985-01-01
This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sketchley, J A; Kotta, P; De Yoreo, J
The Laboratory Directed Research and Development (LDRD) Program, authorized by Congress in 1991 and administered by the Laboratory Science and Technology Office, is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the missions of the Laboratory, the Department of Energy, and National Nuclear Security Administration in national security, energy security, environmental management, bioscience and technology to improve human health, and breakthroughs in fundamental science and technology. The accomplishments described in this Annual Report demonstrate the strong alignment of the LDRD portfolio with these missions and contribute to the Laboratory's success in meeting its goals.more » The LDRD budget of $92 million for FY2006 sponsored 188 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific quality and mission relevance. Each year, the number of deserving proposals far exceeds the funding available, making the selection a tough one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory's multidisciplinary team approach to science and technology. Safeguarding the nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle for attracting and retaining the best and the brightest technical staff and for establishing collaborations with universities, industry, and other scientific and research institutions. By keeping the Laboratory at the forefront of science and technology, the LDRD Program enables us to meet our mission challenges, especially those of our ever-evolving national security mission.« less
75 FR 28275 - Homeland Security Science and Technology Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-20
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0020] Homeland Security Science and...; Notice of Closed Federal Advisory Committee Meeting. SUMMARY: On April 12, 2010, the Homeland Security...: The Homeland Security Science and Technology Advisory Committee met on April 20, 2010 from 8:30 a.m...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-29
...: Technology Security/Clearance Plans, Screening Records, and Non-Disclosure Agreements ACTION: Notice of... Information Collection: Technology Security/ Clearance Plans, Screening Records, and Non-Disclosure Agreements...: None. Respondents: Business and Nonprofit Organizations, Foreign Governments. Estimated Number of...
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2014 CFR
2014-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2012 CFR
2012-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2010 CFR
2010-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2011 CFR
2011-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2013 CFR
2013-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
76 FR 41274 - Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-13
..., cyber-security, knowledge management and how best to leverage related technologies funded by other... Science and Technology Advisory Committee (HSSTAC) ACTION: Committee Management; Notice of Federal... Committee Management Secretariat, General Services Administration. Name of Committee: Homeland Security...
ERIC Educational Resources Information Center
Schneider, Tod
2010-01-01
Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…
Input from Key Stakeholders in the National Security Technology Incubator
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.
Marketing Plan for Demonstration and Validation Assets
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
The National Security Preparedness Project (NSPP), is to be sustained by various programs, including technology demonstration and evaluation (DEMVAL). This project assists companies in developing technologies under the National Security Technology Incubator program (NSTI) through demonstration and validation of technologies applicable to national security created by incubators and other sources. The NSPP also will support the creation of an integrated demonstration and validation environment. This report documents the DEMVAL marketing and visibility plan, which will focus on collecting information about, and expanding the visibility of, DEMVAL assets serving businesses with national security technology applications in southern New Mexico.
Marketing and reputation aspects of neonatal safeguards and hospital-security systems.
Smith, Alan D
2009-01-01
Technological advancements have migrated from personal-use electronics into the healthcare setting for security enhancements. Within maternity wards and nurseries, technology was seen as one of best way to protect newborns from abduction. The present study is a focus on what systems and methods are used in neonatal security, the security arrangements, staff training, and impacts outside the control of the hospital, customer satisfaction and customer relations management. Through hypothesis-testing and exploratory analysis, gender biases and extremely high levels of security were found within a web-enabled and professional sample of 200 respondents. The factor-based constructs were found to be, in order of the greatest explained variance: security concerns, personal technology usage, work technology applications, and demographic maturity concerns, resulting in four factor-based scores with significant combined variance of 61.5%. It was found that through a better understanding on the importance and vital need for hospitals to continue to improve on their technology-based security policies significantly enhanced their reputation in the highly competitive local healthcare industry.
2010-08-22
practice for information security management ( ISO /IEC 27002 ),” “Information technology — Security techniques — Information security management...systems —Requirements ( ISO /IEC 27002 ),”, “Information technology — Security techniques — Information security risk management ( ISO /IEC 27005).” from...associated practice aids. Perhaps the most germane discovery from this effort was a draft ISO standard on Systems and software engineering, Systems and
48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...
48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...
48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...
48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...
48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
Small Technology Business Incubation Needs
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
2007-12-31
This report contains a summary of typical business incubation needs of small technology companies. This document will serve as a guide in the design and implementation of services offered by the National Security Technology Incubator (NSTI), an incubator program being designed and developed as part of the National Security Preparedness Project (NSPP), performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the methodology used to perform the needs assessment and services proposed to meet the needs of client companies. The purpose of the NSPP is to promote national security technologiesmore » through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland.« less
1999-07-01
Environmental Security . . . . . . . . . . . . . . . . . . . . 17 Robert E. Ebel Caspian Basin Oil and Gas: An Overview . . . . . . . . . . . 21 Brian R ...choke point near Baku, posing a threat to security of supply. 32 ENVIRONMENTAL BASELINE ANALYSIS OF THE CASPIAN SEA REGION BRIAN R . SHAW TERRY...up to 70% of the seasonal Caspian Sea level. Sources of water include runoff ( R ), precipitation (P), and groundwater flow (G); sink include
Technology Requirements and Selection for Securely Partitioning OBSW
NASA Astrophysics Data System (ADS)
Mendham, Peter; Windsor, James; Eckstein, Knut
2010-08-01
The Securely Partitioning Spacecraft Computing Resources project is a current ESA TRP activity investigating the application of secure time and space partitioning (TSP) technologies to enable multi-use missions from a single platform. Secure TSP technologies are used in a number of application areas outside the space domain and an opportunity exists to 'spin-in' a suitable solution. The selection of a technology for use within space the European space industry relies on an understanding of the requirements for the application of secure TSP, of which this paper presents a summary. Further, the paper outlines the selection process taken by the project and highlights promising solutions for use today.
2017-04-28
EM Electromagnetic EMI Electromagnetic Induction ERDC Engineering Research and Development Center ESTCP Environmental Security Technology... bombs , HE bombs and incendiary bombs . The site hosted demonstrations with the MPV and the 2x2 TEMTADS, both with crews from CH2MHill. Each study...array of five receiver units that measure all three components of the EM field (Figure 2). This second-generation MPV is specifically designed to
A Look Inside Argonne's Center for Nanoscale Materials
Divan, Ralu; Rosenthal, Dan; Rose, Volker; Wai Hla
2018-05-23
At a very small, or "nano" scale, materials behave differently. The study of nanomaterials is much more than miniaturization - scientists are discovering how changes in size change a material's properties. From sunscreen to computer memory, the applications of nanoscale materials research are all around us. Researchers at Argonne's Center for Nanoscale Materials are creating new materials, methods and technologies to address some of the world's greatest challenges in energy security, lightweight but durable materials, high-efficiency lighting, information storage, environmental stewardship and advanced medical devices.
Evaluating Realized Impacts of DOE/EERE R&D Programs. Standard impact evaluation method
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ruegg, Rosalie; O'Connor, Alan C.; Loomis, Ross J.
2014-08-01
This document provides guidance for evaluators who conduct impact assessments of research and development (R&D) programs for the U.S. Department of Energy’s (DOE) Office of Energy Efficiency and Renewable Energy (EERE). It is also targeted at EERE program staff responsible for initiating and managing commissioned impact studies. The guide specifies how to estimate economic benefits and costs, energy saved and installed or generated, environmental impacts, energy security impacts, and knowledge impacts of R&D investments in advanced energy technologies.
Strengthening Multidisciplinary Research on Climate and Environmental Change
NASA Astrophysics Data System (ADS)
Beer, Tom; Li, Jianping; Alverson, Keith
2014-08-01
The difficulty with multidisciplinary research is finding common ground for scientists, whose approach to a particular scientific problem can differ radically. For example, there is agreement between the geophysical community and the food science and technology community that food security is an important issue. However, the climate change community sees possible solutions coming from more detailed studies on the links between climate change and agriculture, whereas the food science community sees possible solutions emerging from studies of food logistics and supply chains.
Pacific Northwest National Laboratory Annual Site Environmental Report for Calendar Year 2013
DOE Office of Scientific and Technical Information (OSTI.GOV)
Duncan, Joanne P.; Sackschewsky, Michael R.; Tilden, Harold T.
2014-09-30
Pacific Northwest National Laboratory (PNNL), one of the U.S. Department of Energy (DOE) Office of Science’s 10 national laboratories, provides innovative science and technology development in the areas of energy and the environment, fundamental and computational science, and national security. DOE’s Pacific Northwest Site Office (PNSO) is responsible for oversight of PNNL at its Campus in Richland, Washington, as well as its facilities in Sequim, Seattle, and North Bonneville, Washington, and Corvallis and Portland, Oregon.
NASA Astrophysics Data System (ADS)
Badea, G.; Felseghi, R. A.; Aşchilean, I.; Rǎboacǎ, S. M.; Şoimoşan, T.
2017-12-01
The concept of sustainable development aims to meet the needs of the present without compromising the needs of future generations. In achieving the desideratum "low-carbon energy system", in the domain of energy production, the use of innovative low-carbon technologies providing maximum efficiency and minimum pollution is required. Such technology is the fuel cell; as these will be developed, it will become a reality to obtain the energy based on hydrogen. Thus, hydrogen produced by electrolysis of water using different forms of renewable resources becomes a secure and sustainable energy alternative. In this context, in the present paper, a comparative study of two different hybrid power generation systems for residential building placed in Cluj-Napoca was made. In these energy systems have been integrated renewable energies (photovoltaic panels and wind turbine), backup and storage system based on hydrogen (fuel cell, electrolyser and hydrogen storage tank), and, respectively, backup and storage system based on traditional technologies (diesel generator and battery). The software iHOGA was used to simulate the operating performance of the two hybrid systems. The aim of this study was to compare energy, environmental and economic performances of these two systems and to define possible future scenarios of competitiveness between traditional and new innovative technologies. After analyzing and comparing the results of simulations, it can be concluded that the fuel cells technology along with hydrogen, integrated in a hybrid system, may be the key to energy production systems with high energy efficiency, making possible an increased capitalization of renewable energy which have a low environmental impact.
Science, technology, and application of THz air photonics
NASA Astrophysics Data System (ADS)
Lu, X. F.; Clough, B.; Ho, I.-C.; Kaur, G.; Liu, J.; Karpowicz, N.; Dai, J. M.; Zhang, X.-C.
2010-11-01
The significant scientific and technological potential of terahertz (THz) wave sensing and imaging has been attracted considerable attention within many fields of research. However, the development of remote, broadband THz wave sensing technology is lagging behind the compelling needs that exist in the areas of astronomy, global environmental monitoring, and homeland security. This is due to the challenge posed by high absorption of ambient moisture in the THz range. Although various time-domain THz detection techniques have recently been demonstrated, the requirement for an on-site bias or forward collection of the optical signal inevitably prohibits their applications for remote sensing. The objective of this paper is to report updated THz air-plasma technology to meet this great challenge of remote sensing. A focused optical pulse (mJ pulse energy and femtosecond pulse duration) in gas creates a plasma, which can serve to generate intense, broadband, and directional THz waves in the far field.
A review of integration strategies for solid oxide fuel cells
NASA Astrophysics Data System (ADS)
Zhang, Xiongwen; Chan, S. H.; Li, Guojun; Ho, H. K.; Li, Jun; Feng, Zhenping
Due to increasing oil and gas demand, the depletion of fossil resources, serious global warming, efficient energy systems and new energy conversion processes are urgently needed. Fuel cells and hybrid systems have emerged as advanced thermodynamic systems with great promise in achieving high energy/power efficiency with reduced environmental loads. In particular, due to the synergistic effect of using integrated solid oxide fuel cell (SOFC) and classical thermodynamic cycle technologies, the efficiency of the integrated system can be significantly improved. This paper reviews different concepts/strategies for SOFC-based integration systems, which are timely transformational energy-related technologies available to overcome the threats posed by climate change and energy security.
National Security Technology Incubator Evaluation Process
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages ofmore » early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.« less
Technology's Role in Security.
ERIC Educational Resources Information Center
Day, C. William
1999-01-01
Examines the use of technology to bolster the school security system, tips on selecting a security consultant, and several basic strategies to make buildings and grounds safer. Technological ideas discussed include the use of telephones in classrooms to expedite care in emergency situations, surveillance cameras to reduce crime, and metal…
2016-02-12
SECURITY CLASSIFICATION OF: This project examined China’s drive to become a world-class defense and dual -use technological and industrial power and...2211 China, science, technology, dual use, defense, security, innovation REPORT DOCUMENTATION PAGE 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 10...Place in the Global Technology Order Report Title This project examined China’s drive to become a world-class defense and dual -use technological and
7 CFR 1951.210 - Environmental requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
..., assumptions, subordinations, sale or exchange of security property, and leasing of security will be reviewed for compliance with subpart G of part 1940 of this chapter. The appropriate environmental review will..., the completed environmental review will be included with other information submitted. ...
Report #12-P-0847, September 21, 2012.Our review of the security posture and in-place environmental controls of EPA’s Radiation and Indoor Environments National Laboratory computer room disclosed an array of security and environmental control deficiencies.
48 CFR 1339.107-70 - Information security.
Code of Federal Regulations, 2010 CFR
2010-10-01
... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 1339.107-70 Information security. (a... Clause 1352.239-73, Security Requirements for Information Technology Resources, is needed, contracting... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information security. 1339...
Recent biosensing developments in environmental security.
Wanekaya, Adam K; Chen, Wilfred; Mulchandani, Ashok
2008-06-01
Environmental security is one of the fundamental requirements of our well being. However, it still remains a major global challenge. Therefore, in addition to reducing and/or eliminating the amounts of toxic discharges into the environment, there is need to develop techniques that can detect and monitor these environmental pollutants in a sensitive and selective manner to enable effective remediation. Because of their integrated nature, biosensors are ideal for environmental monitoring and detection as they can be portable and provide selective and sensitive rapid responses in real time. In this review we discuss the main concepts behind the development of biosensors that have most relevant applications in the field of environmental monitoring and detection. We also review and document recent trends and challenges in biosensor research and development particularly in the detection of species of environmental significance such as organophosphate nerve agents, heavy metals, organic contaminants, pathogenic microorganisms and their toxins. Special focus will be given to the trends that have the most promising applications in environmental security. We conclude by highlighting the directions towards which future biosensors research in environmental security sector might proceed.
State-of-the-art in biosafety and biosecurity in European countries.
Bielecka, Anna; Mohammadi, Ali Akbar
2014-06-01
The terms biosafety and biosecurity are widely used in different concepts and refer not only to protection of human beings and their surrounding environment against hazardous biological agent, but also to global disarmament of weapons of mass destruction. As a result, the biosafety and biosecurity issues should be considered interdisciplinary based on multilateral agreements against proliferation of biological weapons, public health and environmental protection. This publication presents information on both, international and national biosafety and biosecurity legislation. Status of national implementation of the Biological and Toxin Weapons Convention, penalization issues and measures to account for and secure production, use, storage of particularly dangerous pathogens or activities involving humans, plants and animals where infection may pose a risk have been analyzed. Safety and security measures in laboratories have been studied. Moreover, dual-use technology and measures of secure transport of biohazard materials have been also taken into account. In addition, genetic engineering regulations, biosecurity activities in laboratories and code of conducts have been investigated, as well.
75 FR 27847 - China Technology Global Corp.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-18
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China Technology Global Corp.; Order of Suspension of Trading May 14, 2010. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China Technology Global Corp...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
... 1974; Department of Homeland Security/ALL-004 General Information Technology Access Account Records..., Department of Homeland Security/ALL-004 General Information Technology Access Account Records System of... access account records. This system consists of information collected in order to provide authorized...
New Technology's Surprising Security Threats. Building Digital Libraries
ERIC Educational Resources Information Center
Huwe, Terence
2005-01-01
In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…
32 CFR 989.4 - Initial considerations.
Code of Federal Regulations, 2010 CFR
2010-07-01
... national security interests while at the same time considering important environmental factors. (g... Under Secretary of Defense (Environmental Security). This coordination requirement does not apply to...
National Security Technology Incubation Strategic Plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
This strategic plan contains information on the vision, mission, business and technology environment, goals, objectives, and incubation process of the National Security Technology Incubation Program (NSTI) at Arrowhead Center. The development of the NSTI is a key goal of the National Security Preparedness Project (NSPP). Objectives to achieve this goal include developing incubator plans (strategic, business, action, and operations), creating an incubator environment, creating a support and mentor network for companies in the incubator program, attracting security technology businesses to the region, encouraging existing business to expand, initiating business start-ups, evaluating products and processes of the incubator program, and achievingmore » sustainability of the incubator program. With the events of 9/11, the global community faces ever increasing and emerging threats from hostile groups determined to rule by terror. According to the National Nuclear Security Administration (NNSA) Strategic Plan, the United States must be able to quickly respond and adapt to unanticipated situations as they relate to protection of our homeland and national security. Technology plays a key role in a strong national security position, and the private business community, along with the national laboratories, academia, defense and homeland security organizations, provide this technology. Fostering innovative ideas, translated into relevant technologies answering the needs of NNSA, is the purpose of the NSTI. Arrowhead Center of New Mexico State University is the operator and manager of the NSTI. To develop the NSTI, Arrowhead Center must meet the planning, development, execution, evaluation, and sustainability activities for the program and identify and incubate new technologies to assist the NNSA in meeting its mission and goals. Technology alone does not give a competitive advantage to the country, but the creativity and speed with which it is employed does. For a company to succeed, it must have sustainable competitive advantages in seven key areas: geography, products and businesses, distribution, sales and service culture, efficiency, brand, and most important, people. The four strategic goals of the plan are to: 1. Identify and recruit small businesses with technology applications for national security. 2. Design and implement a national security incubator program that provides incubator services and physical space for the targeted businesses. 3. Provide business assistance and technical leadership to NSTI clients to assist in bringing their products to market. 4. Construct a new multi-tenant facility with dedicated physical space for businesses with technology applications for national security.« less
Theory and application for the promotion of wheat production in China: past, present and future.
Xu, Zhenzhu; Yu, Zhenwen; Zhao, Junye
2013-08-15
Food security is becoming a crucial concern worldwide. In this study, we focus on wheat - a staple crop in China - as a model to review its history, status quo and future scenarios, with regard to key production technologies and management practices for wheat production and associated food security issues since the new era in China: the post-1949 era. First, the dominant technologies and management practices over the past 60 years are reviewed. Secondly, we outline several key innovative technologies and their theoretical bases over the last decade, including (i) prohibiting excessively early senescence at a later growth stage to maintain viable leaves with higher photosynthetic capacity, (ii) postponing top dressing nitrogen application to balance carbon and nitrogen nutrition, and (iii) achieving both high yield and better grain quality mainly by increasing soil productivity and balancing the ratio of nutrient elements. Finally, concerns such as water shortages and excessive application of chemical fertilizers are presented. Nevertheless, under high negative conditions, including global warming, rapid population growth, decreasing amounts of arable land, increasing competition with cash crops and severe environmental pollution, we conclude that domestic food production will be able to meet Chinese demand in the mid to long term, because increasingly innovative technologies and improved management practices have been and may continue to be applied appropriately. © 2013 Society of Chemical Industry.
Making Technology Work for Campus Security
ERIC Educational Resources Information Center
Floreno, Jeff; Keil, Brad
2010-01-01
The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…
Technology Empowerment: Security Challenges.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Warren, Drake Edward; Backus, George A.; Jones, Wendell
“Technology empowerment” means that innovation is increasingly accessible to ordinary people of limited means. As powerful technologies become more affordable and accessible, and as people are increasingly connected around the world, ordinary people are empowered to participate in the process of innovation and share the fruits of collaborative innovation. This annotated briefing describes technology empowerment and focuses on how empowerment may create challenges to U.S. national security. U.S. defense research as a share of global innovation has dwindled in recent years. With technology empowerment, the role of U.S. defense research is likely to shrink even further while technology empowerment willmore » continue to increase the speed of innovation. To avoid falling too far behind potential technology threats to U.S. national security, U.S. national security institutions will need to adopt many of the tools of technology empowerment.« less
Report on the first Quadrennial Technology Review (QTR)
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2011-09-30
Access to clean, affordable, secure, and reliable energy has been a cornerstone of America’s economic growth. The Nation’s systems that produce, store, transmit, and use energy are falling short of U.S. needs. Maintaining energy security, bolstering U.S. competitiveness, and mitigating the environmental impacts of energy are long-standing challenges. Governments, consumers, and the private sector have worked for decades to address these challenges, yet they remain among the Nation’s most pressing issues. President Obama has articulated broad national energy goals for reducing U.S. dependence on oil, reducing pollution, and investing in research and development (R&D) for clean-energy technologies in the Unitedmore » States to create jobs. These include: Reducing oil imports by one-third by 2025; Supporting the deployment of 1 million electric vehicles on the road by 2015; Making non-residential buildings 20% more energy efficient by 2020; Deriving 80% of America's electricity from clean-energy sources by 2035; and Reducing greenhouse gas emissions by 175 by 2020 and 83% of 2050, from a 2005 baseline.« less
1995-06-01
required, the Defense Technology Security Administration ( DTSA ) will make a determination on whether or not advanced technologies are being risked by the...sale or transfer of that product. DTSA has this role whether it is a commercial or government-to-government transfer. The Joint Chiefs of Staff also...Office of Defense Relations Security Assistance DSAA Defense Security Assistance Agency DTIB Defense Technological and Industrial Base DTSA Defense
Secrecy vs. the need for ecological information: challenges to environmental activism in Russia.
Jandl, T
1998-01-01
This article identifies the lessons learned from the Nikitin case study in Russia. The Nikitin case involves the analysis of sources of radioactive contamination in several Russian counties and in the Russian Northern Fleet. Norway was interested in the issue due to proximity to the storage sites. The issue involved national security and environmental protection. It was learned that mixing national security issues with environmental issues offers dangerous and multiple challenges. Environmental groups must build relationships with a wide audience. International security policy must include the issues of globalization of trade and the spread of environmental problems into the global commons (oceans and atmosphere). The risk of an environmentally dangerous accident as a consequence of Cold War activities is greater than the risk of nuclear war. Secrecy in military affairs is not justified when there is inadequate storage of nuclear weapons and contaminated materials. In Russia, the concern is great due to their economic transition and shortages of funds for even the most basic needs, which excludes nuclear waste clean up. The Bellona Foundation studied the extent of nuclear pollution from military nuclear reactors in the Kola peninsula of northwest Russia, in 1994 and 1996. Russian security police arrested one of the report authors for alleged national security violations. A valuable lesson learned was that local Russian environmental groups needed international support. The military nuclear complex poses an enormous hazard. Limiting inspections is an unacceptable national security risk. The new Russian law on state secrets is too broad.
NASA Astrophysics Data System (ADS)
Perry, William G.
2006-04-01
One goal of database mining is to draw unique and valid perspectives from multiple data sources. Insights that are fashioned from closely-held data stores are likely to possess a high degree of reliability. The degree of information assurance comes into question, however, when external databases are accessed, combined and analyzed to form new perspectives. ISO/IEC 17799, Information technology-Security techniques-Code of practice for information security management, can be used to establish a higher level of information assurance among disparate entities using data mining in the defense, homeland security, commercial and other civilian/commercial domains. Organizations that meet ISO/IEC information security standards have identified and assessed risks, threats and vulnerabilities and have taken significant proactive steps to meet their unique security requirements. The ISO standards address twelve domains: risk assessment and treatment, security policy, organization of information security, asset management, human resources security, physical and environmental security, communications and operations management, access control, information systems acquisition, development and maintenance, information security incident management and business continuity management and compliance. Analysts can be relatively confident that if organizations are ISO 17799 compliant, a high degree of information assurance is likely to be a characteristic of the data sets being used. The reverse may be true. Extracting, fusing and drawing conclusions based upon databases with a low degree of information assurance may be wrought with all of the hazards that come from knowingly using bad data to make decisions. Using ISO/IEC 17799 as a baseline for information assurance can help mitigate these risks.
Sandia National Laboratories: National Security Missions: International
Weapons Safety & Security Weapons Science & Technology Defense Systems & Assessments About Directed Research & Development Technology Deployment Centers Working With Sandia Working With Sandia Licensing & Technology Transfer Browse Technology Portfolios Technology Partnerships Business, Industry
Increasing water productivity on Vertisols: implications for environmental sustainability.
Jiru, Mintesinot; Van Ranst, Eric
2010-10-01
The availability and quality of irrigation water have become a serious concern because of global climate change and an increased competition for water by industry, domestic users and the environment. Therefore, exploring environmentally friendly water-saving irrigation strategies is essential for achieving food and environmental security. In northern Ethiopia, where traditional furrow irrigation is widely practiced, water mismanagement and its undesirable environmental impact are rampant. A 2-year field study was undertaken to compare the traditional irrigation management with surge and deficit irrigation practices on a Vertisol plot. Results have shown that surge and deficit irrigation practices increase water productivity by 62% and 58%, respectively, when compared to traditional management. The study also found out that these practices reduce the adverse environmental impacts (waterlogging and salinity) of traditional management by minimizing deep percolation and tail water losses. Total irrigation depth was reduced by 12% (for surge) and 27% (for deficit) when compared to traditional management. Based on the results, the study concluded that surge and deficit irrigation technologies not only improve water productivity but also enhance environmental sustainability. Copyright © 2010 Society of Chemical Industry.
Hybrid network defense model based on fuzzy evaluation.
Cho, Ying-Chiang; Pan, Jen-Yi
2014-01-01
With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network's existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter's inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tsai, H. C.; Chen, K.; Liu, Y. Y.
The US Department of Energy (DOE) [Environmental Management (EM), Office of Packaging and Transportation (EM-45)] Packaging Certification Program (PCP) has developed a radiofrequency identification (RFID) tracking and monitoring system for the management of nuclear materials packages during storage and transportation. The system, developed by the PCP team at Argonne National Laboratory, involves hardware modification, application software development, secured database and web server development, and irradiation experiments. In April 2008, Argonne tested key features of the RFID tracking and monitoring system in a weeklong, 1700 mile (2736 km) demonstration employing 14 empty type B fissile material drums of three designs (modelsmore » 9975, 9977 and ES-3100) that have been certified for shipment by the DOE and the US Nuclear Regulatory Commission. The demonstration successfully integrated global positioning system (GPS) technology for vehicle tracking, satellite/cellular (general packet radio service, or GPRS) technologies for wireless communication, and active RFID tags with multiple sensors (seal integrity, shock, temperature, humidity and battery status) on drums. In addition, the demonstration integrated geographic information system (GIS) technology with automatic alarm notifications of incidents and generated buffer zone reports for emergency response and management of staged incidents. The demonstration was sponsored by EM and the US National Nuclear Security Administration, with the participation of Argonne, Savannah River and Oak Ridge National Laboratories. Over 50 authorised stakeholders across the country observed the demonstration via secured Internet access. The DOE PCP and national laboratories are working on several RFID system implementation projects at selected DOE sites, as well as continuing device and systems development and widening applications beyond DOE sites and possibly beyond nuclear materials to include other radioactive materials.« less
Put a Coalatom in Your Tank: The Compelling Case for a Marriage of Coal and Nuclear Energy
DOE Office of Scientific and Technical Information (OSTI.GOV)
Penfield, Scott R. Jr.; Bolthrunis, Charles O.
2006-07-01
Increasing costs and security concerns with present fossil energy sources, plus environmental concerns related to CO{sub 2} emissions and the emergence of new technologies in the energy and transportation sectors set the stage for a marriage of convenience between coal and nuclear energy. As the price of oil continues to increase and supply becomes increasingly constrained, coal offers a secure domestic alternative to foreign oil as a source of liquid fuels. However, conventional technologies for converting coal to liquid fuels produce large quantities of CO{sub 2} that must be released or sequestered. Advanced nuclear technologies, particularly the High-Temperature Gas-Cooled Reactormore » (HTGR), have the potential to produce hydrogen via water splitting; however, the transportation and storage of hydrogen are significant barriers to the 'Holy Grail', the Hydrogen Economy. In a coal/nuclear marriage, the hydrogen and oxygen provided by nuclear energy are joined with coal as a source of carbon to provide liquid fuels with negligible CO{sub 2} release from the process. In combination with emerging hybrid vehicles, fuels based on a coal/nuclear marriage promise stable prices, increased domestic security and a reduction in CO{sub 2} emissions without the need to completely replace our transportation fuels infrastructure. The intent of this paper is to outline the technical basis for the above points and to show that process energy applications of nuclear energy can provide the basis for answering some of the tougher questions related to energy and the environment. (authors)« less
The strategic measures for the industrial security of small and medium business.
Lee, Chang-Moo
2014-01-01
The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures.
Prospects for Accelerator Technology
NASA Astrophysics Data System (ADS)
Todd, Alan
2011-02-01
Accelerator technology today is a greater than US$5 billion per annum business. Development of higher-performance technology with improved reliability that delivers reduced system size and life cycle cost is expected to significantly increase the total accelerator technology market and open up new application sales. Potential future directions are identified and pitfalls in new market penetration are considered. Both of the present big market segments, medical radiation therapy units and semiconductor ion implanters, are approaching the "maturity" phase of their product cycles, where incremental development rather than paradigm shifts is the norm, but they should continue to dominate commercial sales for some time. It is anticipated that large discovery-science accelerators will continue to provide a specialty market beset by the unpredictable cycles resulting from the scale of the projects themselves, coupled with external political and economic drivers. Although fraught with differing market entry difficulties, the security and environmental markets, together with new, as yet unrealized, industrial material processing applications, are expected to provide the bulk of future commercial accelerator technology growth.
Space weather effects on communications
NASA Astrophysics Data System (ADS)
Lanzerotti, Louis J.
In the 150 years since the advent of the first electrical communication system - the electrical telegraph - the diversity of communications technologies that are embedded within space-affected environments have vastly increased. The increasing sophistication of these communications technologies, and how their installation and operations may relate to the environments in which they are embedded, requires ever more sophisticated understanding of natural physical phenomena. At the same time, the business environment for most present-day communications technologies that are affected by space phenomena is very dynamic. The commercial and national security deployment and use of these technologies do not wait for optimum knowledge of possible environmental effects to be acquired before new technological embodiments are created, implemented, and marketed. Indeed, those companies that might foolishly seek perfectionist understanding of natural effects can be left behind by the marketplace. A well-considered balance is needed between seeking ever deeper understanding of physical phenomena and implementing `engineering' solutions to current crises. The research community must try to understand, and operate in, this dynamic environment.
1989-08-01
Include in this plan the role of the Defense Technical Information Center (DTIC), the Defense Technology Security Administration ( DTSA ), and ODDR&E’s...DTIC = Defense Technical Information Center DTSA = Defense Technology Security Administration DUSD = Deputy Under Secretary of Defense Gloss. 2 DUSD...technologically sensitive requests. The Defense Technology Security Administi ation ( DTSA ) is developing a large system to track foreign military sales
76 FR 31350 - Cruise Vessel Safety and Security Act of 2010, Available Technology
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-31
... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0357] Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast Guard, DHS. ACTION: Notice of request for comments... Security and Safety Act of 2010(CVSSA), specifically related to video recording and overboard detection...
OLED study for military applications
NASA Astrophysics Data System (ADS)
Barre, F.; Chiquard, A.; Faure, S.; Landais, L.; Patry, P.
2005-07-01
The presentation deals with some applications of OLED displays in military optronic systems, which are scheduled by SAGEM DS (Defence and Security). SAGEM DS, one of the largest group in the defence and security market, is currently investigating OLED Technologies for military programs. This technology is close from being chosen for optronic equipment such as future infantry night vision goggles, rifle-sight, or, more generally, vision enhancement systems. Most of those applications requires micro-display with an active matrix size below 1". Some others, such as, for instance, ruggedized flat displays do have a need for higher active matrix size (1,5" to 15"). SAGEM DS takes advantages of this flat, high luminance and emissive technology in highly integrated systems. In any case, many requirements have to be fulfilled: ultra-low power consumption, wide viewing angle, good pixel to pixel uniformity, and satisfactory behaviour in extreme environmental conditions.... Accurate measurements have been achieved at SAGEM DS on some micro display OLEDs and will be detailed: luminance (over 2000 cd/m2 achieved), area uniformity and pixel to pixel uniformity, robustness at low and high temperature (-40°C to +60°C), lifetime. These results, which refer to military requirements, provide a valuable feedback representative of the state of the art OLED performances.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2008-04-30
This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.
Transportation Security Administration in Defense of the National Aviation Infrastructure
2009-02-12
evidence suggests a hole exists within our airport security process. That hole may be caused by an over-reliance on technology and a blatant disregard of...environment enables BDOs to operate with increased effectiveness.11 Technology. Three major tools sit at the airport security technology forefront...Through Covert Testing of TSA’s Passenger Screening Process, GAO‐08‐48T, 15 Nov 07, 2. 16 Orlando News, “TSA Workers Skipping Orlando Airport Security Causes
Biosensors for Sustainable Food Engineering: Challenges and Perspectives.
Neethirajan, Suresh; Ragavan, Vasanth; Weng, Xuan; Chand, Rohit
2018-03-12
Current food production faces tremendous challenges from growing human population, maintaining clean resources and food qualities, and protecting climate and environment. Food sustainability is mostly a cooperative effort resulting in technology development supported by both governments and enterprises. Multiple attempts have been promoted in tackling challenges and enhancing drivers in food production. Biosensors and biosensing technologies with their applications, are being widely applied to tackling top challenges in food production and its sustainability. Consequently, a growing demand in biosensing technologies exists in food sustainability. Microfluidics represents a technological system integrating multiple technologies. Nanomaterials, with its technology in biosensing, is thought to be the most promising tool in dealing with health, energy, and environmental issues closely related to world populations. The demand of point of care (POC) technologies in this area focus on rapid, simple, accurate, portable, and low-cost analytical instruments. This review provides current viewpoints from the literature on biosensing in food production, food processing, safety and security, food packaging and supply chain, food waste processing, food quality assurance, and food engineering. The current understanding of progress, solution, and future challenges, as well as the commercialization of biosensors are summarized.
Rivera, Rebecca L; Dunne, Jennifer; Maulding, Melissa K; Wang, Qi; Savaiano, Dennis A; Nickols-Richardson, Sharon M; Eicher-Miller, Heather A
2018-04-01
To investigate the association of policy, systems and environmental factors with improvement in household food security among low-income Indiana households with children after a Supplemental Nutrition Assistance Program-Education (SNAP-Ed) direct nutrition education intervention. Household food security scores measured by the eighteen-item US Household Food Security Survey Module in a longitudinal randomized and controlled SNAP-Ed intervention study conducted from August 2013 to April 2015 were the response variable. Metrics to quantify environmental factors including classification of urban or rural county status; the number of SNAP-authorized stores, food pantries and recreational facilities; average fair market housing rental price; and natural amenity rank were collected from government websites and data sets covering the years 2012-2016 and used as covariates in mixed multiple linear regression modelling. Thirty-seven Indiana counties, USA, 2012-2016. SNAP-Ed eligible adults from households with children (n 328). None of the environmental factors investigated were significantly associated with changes in household food security in this exploratory study. SNAP-Ed improves food security regardless of urban or rural location or the environmental factors investigated. Expansion of SNAP-Ed in rural areas may support food access among the low-income population and reduce the prevalence of food insecurity in rural compared with urban areas. Further investigation into policy, systems and environmental factors of the Social Ecological Model are warranted to better understand their relationship with direct SNAP-Ed and their impact on diet-related behaviours and food security.
Information Security Risk Assessment in Hospitals.
Ayatollahi, Haleh; Shagerdi, Ghazal
2017-01-01
To date, many efforts have been made to classify information security threats, especially in the healthcare area. However, there are still many unknown risks which may threat the security of health information and their resources especially in the hospitals. The aim of this study was to assess the risks threatening information security in the hospitals located in one of the northwest cities of Iran. This study was completed in 2014. The participants were information technology managers who worked in the hospitals (n=27). The research instrument was a questionnaire composed of a number of open and closed questions. The content validity of the questionnaire was confirmed, and the reliability of the closed questions was measured by using the test-retest method (r =0.78). The results showed that among the information security risks, fire found to be a high probability/high impact risk factor. Human and physical/environmental threats were among the low probability risk factors. Regarding the information security safeguards used in the hospitals, the results showed that the use of the technical safeguards was the most frequent one (n =22, 91.7%) compared to the administrative (n =21, 87.5%) and the physical safeguards (n =16, 66.7%). The high probability risk factors require quick corrective actions to be taken. Therefore, the underlying causes of such threats should be identified and controlled before experiencing adverse effects. It is also important to note that information security in health care systems needs to be considered at a macro level with respect to the national interests and policies.
On the Horizon: New Advances in Security Technology
ERIC Educational Resources Information Center
Gamble, Cheryl
2005-01-01
The worlds of security and technology have been on an intersecting course since the first published account of the use of fingerprint identification made news in 1880 (although unpublished reports suggest its use as early as 1858). In the three and one half years since the September 11 attacks, technological advances across the security field have…
2000-01-24
Security Administration ( DTSA ). d. Reporting requirements (1) General. Army organizations with security assistance responsibility for ad- ministering...by the Department of State (DOS) and the Director, Defense Technology Security Administration ( DTSA ). The term “munitions case” includes in its scope...also formulate the Army position for ARSTAF coordination before responding to Defense Technology Security Agency ( DTSA ). AR 12-1 • 24 January 2000
Sandia National Laboratories: Privacy and Security
Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Technology Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios
New Brunswick Laboratory. Progress report, October 1995--September 1996
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
Fiscal year (FY) 1996 was a very good year for New Brunswick Laboratory (NBL), whose major sponsor is the Office of Safeguards and Security (NN-51) in the US Department of Energy (DOE), Office of Nonproliferation and National Security, Office of Security Affairs. Several projects pertinent to the NBL mission were completed, and NBL`s interactions with partners and customers were encouraging. Among the partners with which NBL interacted in this report period were the International Atomic Energy Agency (IAEA), NN-51. Environmental Program Group of the DOE Chicago Operations Office, International Safeguards Project Office, Waste Isolation Pilot Plant (WIPP), Ukraine Working Group,more » Fissile Materials Assurance Working Group, National Institute of Standards and Technology (NIST), Nuclear Regulatory Commission (NRC), Institute for Reference Materials and Measurements (IRMM) in Belgium, Brazilian/Argentine Agency for Accounting and Control of Nuclear Materials (ABACC), Lockheed Idaho Technologies Company, and other DOE facilities and laboratories. NBL staff publications, participation in safeguards assistance and other nuclear programs, development of new reference materials, involvement in the updating and refinement of DOE documents, service in enhancing the science education of others, and other related activities enhanced NBL`s status among DOE laboratories and facilities. Noteworthy are the facts that NBL`s small inventory of nuclear materials is accurately accounted for, and, as in past years, its materials and human resources were used in peaceful nuclear activities worldwide.« less
Waste Technology Engineering Laboratory (324 building)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kammenzind, D.E.
The 324 Facility Standards/Requirements Identification Document (S/RID) is comprised of twenty functional areas. Two of the twenty functional areas (Decontamination and Decommissioning and Environmental Restoration) were determined as nonapplicable functional areas and one functional area (Research and Development and Experimental Activities) was determined applicable, however, requirements are found in other functional areas and will not be duplicated. Each functional area follows as a separate chapter, either containing the S/RID or a justification for nonapplicability. The twenty functional areas listed below follow as chapters: 1. Management Systems; 2. Quality Assurance; 3. Configuration Management; 4. Training and Qualification; 5. Emergency Management; 6.more » Safeguards and Security; 7. Engineering Program; 8. Construction; 9. Operations; 10. Maintenance; 11. Radiation Protection; 12. Fire Protection; 13. Packaging and Transportation; 14. Environmental Restoration; 15. Decontamination and Decommissioning; 16. Waste Management; 17. Research and Development and Experimental Activities; 18. Nuclear Safety; 19. Occupational Safety and Health; 20. Environmental Protection.« less
NASA Astrophysics Data System (ADS)
Almuslem, A. S.; Hanna, A. N.; Yapici, T.; Wehbe, N.; Diallo, E. M.; Kutbee, A. T.; Bahabry, R. R.; Hussain, M. M.
2017-02-01
In the recent past, with the advent of transient electronics for mostly implantable and secured electronic applications, the whole field effect transistor structure has been dissolved in a variety of chemicals. Here, we show simple water soluble nano-scale (sub-10 nm) germanium oxide (GeO2) as the dissolvable component to remove the functional structures of metal oxide semiconductor devices and then reuse the expensive germanium substrate again for functional device fabrication. This way, in addition to transiency, we also show an environmentally friendly manufacturing process for a complementary metal oxide semiconductor (CMOS) technology. Every year, trillions of complementary metal oxide semiconductor (CMOS) electronics are manufactured and billions are disposed, which extend the harmful impact to our environment. Therefore, this is a key study to show a pragmatic approach for water soluble high performance electronics for environmentally friendly manufacturing and bioresorbable electronic applications.
48 CFR 652.239-71 - Security Requirements for Unclassified Information Technology Resources.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Unclassified Information Technology Resources. 652.239-71 Section 652.239-71 Federal Acquisition Regulations... Provisions and Clauses 652.239-71 Security Requirements for Unclassified Information Technology Resources. As... Technology Resources (SEP 2007) (a) General. The Contractor shall be responsible for information technology...
48 CFR 652.239-71 - Security Requirements for Unclassified Information Technology Resources.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Unclassified Information Technology Resources. 652.239-71 Section 652.239-71 Federal Acquisition Regulations... Provisions and Clauses 652.239-71 Security Requirements for Unclassified Information Technology Resources. As... Technology Resources (SEP 2007) (a) General. The Contractor shall be responsible for information technology...
48 CFR 652.239-71 - Security Requirements for Unclassified Information Technology Resources.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Unclassified Information Technology Resources. 652.239-71 Section 652.239-71 Federal Acquisition Regulations... Provisions and Clauses 652.239-71 Security Requirements for Unclassified Information Technology Resources. As... Technology Resources (SEP 2007) (a) General. The Contractor shall be responsible for information technology...
48 CFR 652.239-71 - Security Requirements for Unclassified Information Technology Resources.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Unclassified Information Technology Resources. 652.239-71 Section 652.239-71 Federal Acquisition Regulations... Provisions and Clauses 652.239-71 Security Requirements for Unclassified Information Technology Resources. As... Technology Resources (SEP 2007) (a) General. The Contractor shall be responsible for information technology...
78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-04
... Technology Advisory Committee (HSSTAC) AGENCY: Science and Technology Directorate, DHS. ACTION: Committee... Technology Advisory Committee (HSSTAC) will meet on March 21, 2013 in Washington, DC The meeting will be open... the Department of Homeland Security (DHS), Science and Technology Directorate, 1120 Vermont Avenue NW...
48 CFR 652.239-71 - Security Requirements for Unclassified Information Technology Resources.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Unclassified Information Technology Resources. 652.239-71 Section 652.239-71 Federal Acquisition Regulations... Provisions and Clauses 652.239-71 Security Requirements for Unclassified Information Technology Resources. As... Technology Resources (SEP 2007) (a) General. The Contractor shall be responsible for information technology...
Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community
2012-01-13
unintrusive solutions that boost security. For example, gamers are even buying hardware tokens to protect their World of Warcraft accounts [5]. Build...security technology. http://www. vmware.com/technology/security/vmsafe.html. [4] VNC. http://en.wikipedia.org/wiki/VNC. [5] World of warcraft to sell
Determination of ISRA Framework Using Delphi Methodology for Small and Midsized Enterprises
ERIC Educational Resources Information Center
Shah, Ashish
2017-01-01
Unfathomable a few decades ago, the velocity of revolution in information technology (IT) security is accelerating. Small and midsized enterprises (SMEs) continue to make IT security a highest priority and foster security controls to safeguard their environments from adverse effects. Information technology security professionals must rely on one…
Ecology and equity: key determinants of sustainable water security.
Swaminathan, M S
2001-01-01
Trends in water consumption indicate that demand for water for household and industrial uses in developing countries could double as a proportion of total water demand in the next 25 years. Scope for expansion of water supply will, at the same time, be limited because development of irrigation and urban water supplies is becoming increasingly expensive, and often involves high costs in terms of environmental degradation and human resettlement. Without fundamental reform of water management, the rapid growth in urban water demand will require large transfers of water from irrigated agriculture, thereby threatening food security. Hence, water supply and demand should be managed in an integrated fashion, simultaneously considering all uses and sources. This will call for the establishment of community centred food and water security systems and national water trusts. Once such systems and Trusts are established there could be a legally binding Global Water Convention on the model of the Global Convention on Climate and Biodiversity. The details of such a Global Water Conventions can be finalized at one of the future Stockholm Water Symposia. There are uncommon opportunities today for a water-secure world through synergy between technology, public policy and peoples' participation.
Information security of power enterprises of North-Arctic region
NASA Astrophysics Data System (ADS)
Sushko, O. P.
2018-05-01
The role of information technologies in providing technological security for energy enterprises is a component of the economic security for the northern Arctic region in general. Applying instruments and methods of information protection modelling of the energy enterprises' business process in the northern Arctic region (such as Arkhenergo and Komienergo), the authors analysed and identified most frequent risks of information security. With the analytic hierarchy process based on weighting factor estimations, information risks of energy enterprises' technological processes were ranked. The economic estimation of the information security within an energy enterprise considers weighting factor-adjusted variables (risks). Investments in information security systems of energy enterprises in the northern Arctic region are related to necessary security elements installation; current operating expenses on business process protection systems become materialized economic damage.
48 CFR 339.7102 - Applicability.
Code of Federal Regulations, 2010 CFR
2010-10-01
... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7102 Applicability. Contracting Officers are responsible for ensuring that all information technology acquisitions comply with the Federal Information Security Management Act (FISMA), the HHS-OCIO Information Systems Security and Privacy...
Managing nitrogen for sustainable development.
Zhang, Xin; Davidson, Eric A; Mauzerall, Denise L; Searchinger, Timothy D; Dumas, Patrice; Shen, Ye
2015-12-03
Improvements in nitrogen use efficiency in crop production are critical for addressing the triple challenges of food security, environmental degradation and climate change. Such improvements are conditional not only on technological innovation, but also on socio-economic factors that are at present poorly understood. Here we examine historical patterns of agricultural nitrogen-use efficiency and find a broad range of national approaches to agricultural development and related pollution. We analyse examples of nitrogen use and propose targets, by geographic region and crop type, to meet the 2050 global food demand projected by the Food and Agriculture Organization while also meeting the Sustainable Development Goals pertaining to agriculture recently adopted by the United Nations General Assembly. Furthermore, we discuss socio-economic policies and technological innovations that may help achieve them.
Addressing social resistance in emerging security technologies
Mitchener-Nissen, Timothy
2013-01-01
In their efforts to enhance the safety and security of citizens, governments and law enforcement agencies look to scientists and engineers to produce modern methods for preventing, detecting, and prosecuting criminal activities. Whole body scanners, lie detection technologies, biometrics, etc., are all being developed for incorporation into the criminal justice apparatus.1 Yet despite their purported security benefits these technologies often evoke social resistance. Concerns over privacy, ethics, and function-creep appear repeatedly in analyses of these technologies. It is argued here that scientists and engineers continue to pay insufficient attention to this resistance; acknowledging the presence of these social concerns yet failing to meaningfully address them. In so doing they place at risk the very technologies and techniques they are seeking to develop, for socially controversial security technologies face restrictions and in some cases outright banning. By identifying sources of potential social resistance early in the research and design process, scientists can both engage with the public in meaningful debate and modify their security technologies before deployment so as to minimize social resistance and enhance uptake. PMID:23970863
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-06
... Acquisition Regulation; Implementation of Information Technology Security Provision AGENCY: Office of... orders that include information technology (IT) supplies, services and systems. DATES: Effective Date... 6, 2012 that include information technology (IT) supplies, services and systems with security...
Ethical management of food systems: plant based diet as a holistic approach.
Chiu, Tina H T; Lin, Chin-Lon
2009-01-01
While improvement in agricultural technology had enabled the production of abundant food, it has thus far failed to eliminate hunger. Malnutrition is expected to reach an all time high. Evidences have suggested that animal based diet has put immense pressure on the already fragile food system, contributing to problems in terms of global food security, health security, and environmental sustainability. Plant based dietary approaches may therefore, target some of these problems from the roots, and may be a solution to improving ethical issues and equity in the current food system. This paper examines how meat production and consumption contributed to the current crises in the food system through the lens of ethics--the moral compass--to find directions on how the present generation should eat, and how the food system could be maintained for a better future.
75 FR 39955 - Homeland Security Science and Technology Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-13
... Technology Advisory Committee AGENCY: Science and Technology Directorate, DHS. ACTION: Committee Management... Technology Advisory Committee (HSSTAC) will meet July 20-21, 2010 at 4075 Wilson Blvd., Liberty Conference... Homeland Security Science and Technology Advisory Committee meeting will be open to the public on July 20th...
75 FR 2555 - Homeland Security Science and Technology Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-15
... Technology Advisory Committee AGENCY: Science and Technology Directorate, DHS. ACTION: Committee management... Technology Advisory Committee will meet January 26-28, 2010, at the Department of Homeland Security, 1120... Science and Technology Advisory Committee will meet January 26, 2010, from 9 a.m. to 5 p.m., January 27...
Hybrid Network Defense Model Based on Fuzzy Evaluation
2014-01-01
With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network's existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter's inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture. PMID:24574870
The Strategic Measures for the Industrial Security of Small and Medium Business
Lee, Chang-Moo
2014-01-01
The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures. PMID:24955414
Environmental Lessons from China: Finding Promising Policies in Unlikely Places
Zhang, Junfeng
2011-01-01
Background: Alongside the major health risks posed by environmental pollution in China are recent achievements on several environmental issues that have affluent Western nations racing to catch up. The country has propelled itself to a position of leadership in clean energy and efficiency, for instance, with important consequences for public health. Objectives: We comment on China’s challenges and recent accomplishments in addressing environmental problems from domestic pollution to global climate change. We compare China’s commitment to clean energy technology with that of other leading nations and discuss key achievements in other areas, including vehicle efficiency standards and transportation policy. Discussion: We discuss policy directions that would secure much-needed improvements to environmental quality and health in China, along with actions that could motivate global action on issues of energy conservation and pollution reduction. Conclusions: A comprehensive regulatory and institutional framework for environmental policy is within reach in China but will require addressing major hurdles such as the lack of an independent monitoring mechanism and the need for greater transparency and enforcement in environmental matters. Meanwhile, China can continue to set important examples by investing in renewable energy, improving energy efficiency, and limiting greenhouse gas emissions. PMID:21402514
77 FR 56697 - Technology and Trading Roundtable
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-13
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67802; File No. 4-652] Technology and Trading.... SUMMARY: The Securities and Exchange Commission will host a one day roundtable entitled ``Technology and... rely on highly automated systems. The market technology roundtable, which was scheduled for September...
Energy for the new millennium.
Goldemberg, J; Johansson, T B; Reddy, A K; Williams, R H
2001-09-01
The evolution of thinking about energy is discussed. When the authors began collaborating 20 years ago, energy was typically considered from a growth-oriented, supply-side perspective, with a focus on consumption trends and how to expand supplies to meet rising demand. They were deeply troubled by the environmental, security and equity implications of that approach. For instance, about two billion people lack access to affordable modern energy, seriously limiting their opportunities for a better life. And energy is a significant contributor to environmental problems, including indoor air pollution, urban air pollution, acidification, and global warming. The authors saw the need to evolve a different perspective in which energy is provided in ways that help solve such serious problems. They argued that energy must become an instrument for advancing sustainable development--economically viable, need-oriented, self-reliant and environmentally sound development--and that the focus should be on the end uses of energy and the services that energy provides. Energy technological options that can help meet sustainable development goals are discussed. The necessity of developing and employing innovative technological solutions is stressed. The possibilities of technological leap-frogging that could enable developing countries to avoid repeating the mistakes of the industrialized countries is illustrated with a discussion of ethanol in Brazil. The role foreign direct investment might play in bringing advanced technologies to developing countries is highlighted. Near- and long-term strategies for rural energy are discussed. Finally, policy issues are considered for evolving the energy system so that it will be consistent with and supportive of sustainable development.
The elephant in the room: critical reflections on militarism, war, and their health contingencies.
McGuire, Sharon; Boyle, Joyceen
2008-01-01
This philosophical analysis critically explores an archeology of militarism as an underpinning to multiple forms of violence, especially war. Deconstructing militarism and its discourses reveal it as a pervasive geographical, cultural, political, and psychological presence. New war technologies, related health and environmental problems, injuries, social suffering, and disproportionality in military spending as a threat to health are uncovered. Continuing the dialogue in formal nursing associations, critiquing media complicity in securing consent for war, and reconstructing a nonviolent, healthier world through nonviolent resistance are advocated.
1989-01-30
D-007 & Hazardous Materials Agency 1 CETHA-TE Task No. 11 . ADDRESS (City, State, and ZIP Code) 10. SOURCE OF FUNDING NUMBERS ATTN: CETHA-TE-D...PROGRAM IPROJECT TASK IWORK UNIT Aberdeen Proving Ground, MD 21010-5401 ELEMENT NO. NO. NO. ACCESSION NO. 1 . TITLE (Include SecurityClassification...Peter J. Marks 3a. TYPE OF REPORT 13b. TIME COVERED T14. DATE OF REPORT (Year, Month, Day) 115. PAGE COUNT Final FROM 1 /87 TO_1/89 11989 January 3 6
1989-01-01
Number DAAK- 1 1 -85-D-007 Report Number CETHA-TE-CR-89006 January 1989 Prepared for: COMMANDER, U.S. ARMY TOXIC AND HAZARDOUS MATERIALS AGENCY Aberdeen...UNIT Aberdeen Proving Ground, MD 21010-5401 ELEMENT NO. NO. NO. ACCESSION NO. 1 . TITLE (Include Security Classification) - Biodegradation of DIMP...TYPE OF REPORT 113b. TIME COVERED 114. DATE OF REPORT (Year, Month, Day) 15. PAGE COUNT Final I FROM 1 /87 TO_1/89 1989 January 30 6. SUPPLEMENTARY
Research on the information security system in electrical gis system in mobile application
NASA Astrophysics Data System (ADS)
Zhou, Chao; Feng, Renjun; Jiang, Haitao; Huang, Wei; Zhu, Daohua
2017-05-01
With the rapid development of social informatization process, the demands of government, enterprise, and individuals for spatial information becomes larger. In addition, the combination of wireless network technology and spatial information technology promotes the generation and development of mobile technologies. In today’s rapidly developed information technology field, network technology and mobile communication have become the two pillar industries by leaps and bounds. They almost absorbed and adopted all the latest information, communication, computer, electronics and so on new technologies. Concomitantly, the network coverage is more and more big, the transmission rate is faster and faster, the volume of user’s terminal is smaller and smaller. What’s more, from LAN to WAN, from wired network to wireless network, from wired access to mobile wireless access, people’s demand for communication technology is increasingly higher. As a result, mobile communication technology is facing unprecedented challenges as well as unprecedented opportunities. When combined with the existing mobile communication network, it led to the development of leaps and bounds. However, due to the inherent dependence of the system on the existing computer communication network, information security problems cannot be ignored. Today’s information security has penetrated into all aspects of life. Information system is a complex computer system, and it’s physical, operational and management vulnerabilities constitute the security vulnerability of the system. Firstly, this paper analyzes the composition of mobile enterprise network and information security threat. Secondly, this paper puts forward the security planning and measures, and constructs the information security structure.
Information Technology Security Professionals' Knowledge and Use Intention Based on UTAUT Model
ERIC Educational Resources Information Center
Kassa, Woldeloul
2016-01-01
Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…
CMMI(Registered) for Services, Version 1.3
2010-11-01
ISO 2008b] ISO /IEC 27001 :2005 Information technology – Security techniques – Information Security Management Systems – Requirements [ ISO /IEC 2005...Commission. ISO /IEC 27001 Information Technology – Security Techniques – Information Security Management Systems – Requirements, 2005. http...CMM or International Organization for Standardization ( ISO ) 9001, you will immediately recognize many similarities in their structure and content
77 FR 5865 - China Agro-Technology Holdings Ltd.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-06
... Suspension of Trading February 2, 2012. It appears to the Securities and Exchange Commission that there is a... trading in the securities of China Agro-Technology Holdings Ltd. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in the securities of China Agro...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-01
... Environmental Services, Inc., Dupont Direct Financial Holdings, Inc., New Paradigm Software Corp. (n/k/a Brunton... concerning the securities of Commodore Environmental Services, Inc. because it has not filed any periodic... accurate information concerning the securities of New Paradigm Software Corp. (n/k/a Brunton Vineyards...
Nuclear decontamination technology evaluation to address contamination of a municipal water system
DOE Office of Scientific and Technical Information (OSTI.GOV)
McFee, J.; Langsted, J.; Young, M.
The US Environmental Protection Agency (EPA) and US Department of Homeland Security (DHS) are considering the impact and recovery from contamination of municipal water systems, including intentional contamination of those systems. Industrial chemicals, biological agents, drugs, pesticides, chemical warfare agents, and radionuclides all could be introduced into a municipal water system to create detrimental health effects and disrupt a community. Although unintentional, the 1993 cryptosporidium contamination of the Milwaukee WS water system resulted in 100 fatalities and disrupted the city for weeks. Shaw Environmental and Infrastructure Inc, (Shaw), as a subcontractor on a DHS contract with Michael Baker Jr., Inc.,more » was responsible for evaluation of the impact and recovery from radionuclide contamination in a municipal water system distribution system. Shaw was tasked to develop a matrix of nuclear industry decontamination technologies and evaluate applicability to municipal water systems. Shaw expanded the evaluation to include decontamination methods commonly used in the drinking water supply. The matrix compared all technologies for implementability, effectiveness, and cost. To address the very broad range of contaminants and contamination scenarios, Shaw bounded the problem by identification of specific contaminant release scenario(s) for specific water system architecture(s). A decontamination technology matrix was developed containing fifty-nine decontamination technologies potentially applicable to the water distribution system piping, pumps, tanks, associated equipment, and/or contaminated water. Qualitatively, the majority of the nuclear industry decontamination technologies were eliminated from consideration due to implementability concerns. However, inclusion of the municipal water system technologies supported recommendations that combined the most effective approaches in both industries. (authors)« less
48 CFR 1252.239-70 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2011 CFR
2011-10-01
... unclassified information technology resources. 1252.239-70 Section 1252.239-70 Federal Acquisition Regulations... of Provisions and Clauses 1252.239-70 Security requirements for unclassified information technology... Unclassified Information Technology Resources (APR 2005) (a) The Contractor shall be responsible for...
48 CFR 1252.239-70 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2014 CFR
2014-10-01
... unclassified information technology resources. 1252.239-70 Section 1252.239-70 Federal Acquisition Regulations... of Provisions and Clauses 1252.239-70 Security requirements for unclassified information technology... Unclassified Information Technology Resources (APR 2005) (a) The Contractor shall be responsible for...
48 CFR 1252.239-70 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2013 CFR
2013-10-01
... unclassified information technology resources. 1252.239-70 Section 1252.239-70 Federal Acquisition Regulations... of Provisions and Clauses 1252.239-70 Security requirements for unclassified information technology... Unclassified Information Technology Resources (APR 2005) (a) The Contractor shall be responsible for...
48 CFR 1252.239-70 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2012 CFR
2012-10-01
... unclassified information technology resources. 1252.239-70 Section 1252.239-70 Federal Acquisition Regulations... of Provisions and Clauses 1252.239-70 Security requirements for unclassified information technology... Unclassified Information Technology Resources (APR 2005) (a) The Contractor shall be responsible for...
48 CFR 352.239-72 - Security requirements for Federal information technology resources.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Federal information technology resources. 352.239-72 Section 352.239-72 Federal Acquisition Regulations... Provisions and Clauses 352.239-72 Security requirements for Federal information technology resources. As... Federal Information Technology Resources (January 2010) (a) Applicability. This clause applies whether the...
48 CFR 1252.239-70 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2010 CFR
2010-10-01
... unclassified information technology resources. 1252.239-70 Section 1252.239-70 Federal Acquisition Regulations... of Provisions and Clauses 1252.239-70 Security requirements for unclassified information technology... Unclassified Information Technology Resources (APR 2005) (a) The Contractor shall be responsible for...
2009-01-01
Cattle raiding and the effects of poaching would likely intensify as well. Fisheries may be adversely impacted due to climatic effects on coral...organized crime to set roots in southern Africa during the early 1990s. Chinese gangs have since diversified into trafficking of poached rhino horn...charged with poaching rhino horn for shipment to China.90 Intelligence sources developed by Botswana security personnel for anti- poaching purposes
Solar radiation control using nematic curvilinear aligned phase (NCAP) liquid crystal technology
NASA Astrophysics Data System (ADS)
vanKonynenburg, Peter; Marsland, Stephen; McCoy, James
1987-11-01
A new, advanced liquid crystal technology has made economical, large area, electrically-controlled windows a commercial reality. The new technology, Nematic Curvilinear Aligned Phase (NCAP), is based on a polymeric material containing small droplets of nematic liquid crystal which is coated and laminated between transparent electrodes and fabricated into large area field effect devices. NCAP windows feature variable solar transmission and reflection through a voltage-controlled scattering mechanism. Laminated window constructions provide the excellent transmission and visibility of glass in the powered condition. In the unpowered condition, the windows are highly translucent, and provide 1) blocked vision for privacy, security, and obscuration of information, and 2) glare control and solar shading. The stability is excellent during accelerated aging tests. Degradation mechanisms which can limit performance and lifetime are discussed. Maximum long term stability is achieved by product designs that incorporate the appropriate window materials to provide environmental protection.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
DOE-EERE's Bioenergy Technologies Office (BETO) works to accelerate the development of a sustainable, cost-competitive, advanced biofuel industry that can strengthen U.S. energy security, environmental quality, and economic vitality, through research, development, and demonstration projects in partnership with industry, academia, and national laboratory partners. BETO’s Advanced Algal Systems Program (also called the Algae Program) has a long-term applied research and development (R&D) strategy to increase the yields and lower the costs of algal biofuels. The team works with partners to develop new technologies, to integrate technologies at commercially relevant scales, and to conduct crosscutting analyses to better understand the potential andmore » challenges of the algal biofuels industry. Research has indicated that this industry is capable of producing billions of gallons of renewable diesel, gasoline, and jet fuels annually. R&D activities are integrated with BETO’s longstanding effort to accelerate the commercialization of lignocellulosic biofuels.« less
Assistive Technologies and Issues Relating to Privacy, Ethics and Security
NASA Astrophysics Data System (ADS)
Martin, Suzanne; Bengtsson, Johan E.; Dröes, Rose-Marie
Emerging technologies provide the opportunity to develop innovative sustainable service models, capable of supporting adults with dementia at home. Devices range from simple stand-alone components that can generate a responsive alarm call to complex interoperable systems that even can be remotely controlled. From these complex systems the paradigm of the ubiquitous or ambient smart home has emerged, integrating technology, environmental design and traditional care provision. The service context is often complex, involving a variety of stakeholders and a range of interested agencies. Against this backdrop, as anecdotal evidence and government policies spawn further innovation it is critical that due consideration is given to the potential ethical ramifications at an individual, organisational and societal level. Well-grounded ethical thinking and proactive ethical responses to this innovation are required. Explicit policy and practice should therefore emerge which engenders confidence in existing supported living option schemes for adults with dementia and informs further innovation.
2013-01-01
Service DTSA Defense Technology Security Administration MCTL Militarily Critical Technologies List This is a work of the U.S. government and is not...Respond to MCTL Weaknesses Page 8 GAO-13-157 Protecting Defense Technologies Administration ( DTSA ), military services, and DOD...implementation of technology security policies on international transfers of defense- related goods, services, and technologies; • directed DTSA to
Environmental Security in the Danube River Basin: Policy Implications for the United States
1999-01-01
United Nations Environmental Programme and Centre for Human Settlements jointly formed a Balkans Task Force that has been conducting independent and...1199 V ACKNOWLEDGMENTS I would like to thank the United States Air Force Institute for National Security Studies (TNSS) and the Army Environmental...regularly scheduled course on Responsibilities of Military Forces in Environmental Protection. Mr. Robert Jarrett of AEPI provided valuable review
75 FR 18566 - Future Systems Technology Advisory Panel Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-12
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0014] Future Systems Technology Advisory Panel Meeting AGENCY: Social Security Administration (SSA). ACTION: Notice of Seventh Panel Meeting. DATES: May... ``the FACA'') shall report to and provide the Commissioner of Social Security independent advice and...
75 FR 38861 - Future Systems Technology Advisory Panel Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-06
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0037] Future Systems Technology Advisory Panel Meeting AGENCY: Social Security Administration (SSA). ACTION: Notice of Eighth Panel Meeting. DATES... referred to as ``the FACA'') shall report to and provide the Commissioner of Social Security independent...
78 FR 66949 - Homeland Security Science and Technology Advisory Committee (HSSTAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-07
... Technology, such as new developments in systems engineering, cyber-security, knowledge management and how... Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Science and... also advises the Under Secretary on policies, management processes, and organizational constructs as...
76 FR 4146 - Future Systems Technology Advisory Panel Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-24
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0010] Future Systems Technology Advisory Panel Meeting AGENCY: Social Security Administration (SSA). ACTION: Notice of Tenth Panel Meeting. DATES... referred to as ``the FACA'') shall report to and provide the Commissioner of Social Security independent...
Ecological Monitoring and Compliance Program 2007 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hansen, Dennis; Anderson, David; Derek, Hall
2008-03-01
In accordance with U.S. Department of Energy (DOE) Order 450.1, 'Environmental Protection Program', the Office of the Assistant Manager for Environmental Management of the DOE, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) requires ecological monitoring and biological compliance support for activities and programs conducted at the Nevada Test Site (NTS). National Security Technologies, LLC (NSTec), Ecological Services has implemented the Ecological Monitoring and Compliance (EMAC) Program to provide this support. EMAC is designed to ensure compliance with applicable laws and regulations, delineate and define NTS ecosystems, and provide ecological information that can be used to predict and evaluate themore » potential impacts of proposed projects and programs on those ecosystems. This report summarizes the EMAC activities conducted by NSTec during calendar year 2007. Monitoring tasks during 2007 included eight program areas: (a) biological surveys, (b) desert tortoise compliance, (c) ecosystem mapping and data management, (d) sensitive plant monitoring, (e) sensitive and protected/regulated animal monitoring, (f) habitat monitoring, (g) habitat restoration monitoring, and (h) biological monitoring at the Nonproliferation Test and Evaluation Complex (NPTEC). The following sections of this report describe work performed under these eight areas.« less
A modern depleted uranium manufacturing facility
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zagula, T.A.
1995-07-01
The Specific Manufacturing Capabilities (SMC) Project located at the Idaho National Engineering Laboratory (INEL) and operated by Lockheed Martin Idaho Technologies Co. (LMIT) for the Department of Energy (DOE) manufactures depleted uranium for use in the U.S. Army MIA2 Abrams Heavy Tank Armor Program. Since 1986, SMC has fabricated more than 12 million pounds of depleted uranium (DU) products in a multitude of shapes and sizes with varying metallurgical properties while maintaining security, environmental, health and safety requirements. During initial facility design in the early 1980`s, emphasis on employee safety, radiation control and environmental consciousness was gaining momentum throughout themore » DOE complex. This fact coupled with security and production requirements forced design efforts to focus on incorporating automation, local containment and computerized material accountability at all work stations. The result was a fully automated production facility engineered to manufacture DU armor packages with virtually no human contact while maintaining security, traceability and quality requirements. This hands off approach to handling depleted uranium resulted in minimal radiation exposures and employee injuries. Construction of the manufacturing facility was complete in early 1986 with the first armor package certified in October 1986. Rolling facility construction was completed in 1987 with the first certified plate produced in the fall of 1988. Since 1988 the rolling and manufacturing facilities have delivered more than 2600 armor packages on schedule with 100% final product quality acceptance. During this period there was an annual average of only 2.2 lost time incidents and a single individual maximum radiation exposure of 150 mrem. SMC is an example of designing and operating a facility that meets regulatory requirements with respect to national security, radiation control and personnel safety while achieving production schedules and product quality.« less
Seeger, Thomas; Dreier, Thomas; Chen, Weidong; Kearny, Sean; Kulatilaka, Waruna
2017-04-10
This Applied Optics feature issue on laser applications to chemical, security, and environmental analysis (LACSEA) highlights papers presented at the LACSEA 2016 Fifteenth Topical Meeting sponsored by the Optical Society of America.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-01
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0026] Science and Technology Directorate; Submission for Review; Information Collection Request for the Department of Homeland Security Science and Technology Directorate First Responders Community of Practice AGENCY: Science and Technology Directorate, DHS...
48 CFR 1852.204-76 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2011 CFR
2011-10-01
... unclassified information technology resources. 1852.204-76 Section 1852.204-76 Federal Acquisition Regulations... information technology resources. As prescribed in 1804.470-4(a), insert the following clause: SECURITY REQUIREMENTS FOR UNCLASSIFIED INFORMATION TECHNOLOGY RESOURCES (MONTH YEAR) (a) The contractor shall protect...
48 CFR 552.239-71 - Security Requirements for Unclassified Information Technology Resources.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Unclassified Information Technology Resources. 552.239-71 Section 552.239-71 Federal Acquisition Regulations... Text of Provisions and Clauses 552.239-71 Security Requirements for Unclassified Information Technology... Information Technology Resources (JAN 2012) (a) General. The Contractor shall be responsible for information...
48 CFR 552.239-71 - Security Requirements for Unclassified Information Technology Resources.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Unclassified Information Technology Resources. 552.239-71 Section 552.239-71 Federal Acquisition Regulations... Text of Provisions and Clauses 552.239-71 Security Requirements for Unclassified Information Technology... Information Technology Resources (JAN 2012) (a) General. The Contractor shall be responsible for information...
48 CFR 3052.204-70 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2011 CFR
2011-10-01
... unclassified information technology resources. 3052.204-70 Section 3052.204-70 Federal Acquisition Regulations... for unclassified information technology resources. As prescribed in (HSAR) 48 CFR 3004.470-3, insert a clause substantially the same as follows: Security Requirements for Unclassified Information Technology...
48 CFR 552.239-71 - Security Requirements for Unclassified Information Technology Resources.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Unclassified Information Technology Resources. 552.239-71 Section 552.239-71 Federal Acquisition Regulations... Text of Provisions and Clauses 552.239-71 Security Requirements for Unclassified Information Technology... Information Technology Resources (JAN 2012) (a) General. The Contractor shall be responsible for information...
48 CFR 3052.204-70 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2012 CFR
2012-10-01
... unclassified information technology resources. 3052.204-70 Section 3052.204-70 Federal Acquisition Regulations... for unclassified information technology resources. As prescribed in (HSAR) 48 CFR 3004.470-3, insert a clause substantially the same as follows: Security Requirements for Unclassified Information Technology...
48 CFR 552.239-71 - Security Requirements for Unclassified Information Technology Resources.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Unclassified Information Technology Resources. 552.239-71 Section 552.239-71 Federal Acquisition Regulations... Text of Provisions and Clauses 552.239-71 Security Requirements for Unclassified Information Technology... Information Technology Resources (JUN 2011) (a) General. The Contractor shall be responsible for information...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-13
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Order of Suspension of Trading; American Resource Technologies, Inc., Apollo Resources International, Inc., Bloodhound Search Technologies, Inc... securities of Bloodhound Search Technologies, Inc. because it has not filed any periodic reports since the...
48 CFR 1852.204-76 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2012 CFR
2012-10-01
... unclassified information technology resources. 1852.204-76 Section 1852.204-76 Federal Acquisition Regulations... information technology resources. As prescribed in 1804.470-4(a), insert the following clause: Security Requirements for Unclassified Information Technology Resources (MONTH YEAR) (a) The contractor shall protect...
48 CFR 1852.204-76 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2013 CFR
2013-10-01
... unclassified information technology resources. 1852.204-76 Section 1852.204-76 Federal Acquisition Regulations... information technology resources. As prescribed in 1804.470-4(a), insert the following clause: Security Requirements for Unclassified Information Technology Resources (MONTH YEAR) (a) The contractor shall protect...
48 CFR 1852.204-76 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2014 CFR
2014-10-01
... unclassified information technology resources. 1852.204-76 Section 1852.204-76 Federal Acquisition Regulations... information technology resources. As prescribed in 1804.470-4(a), insert the following clause: Security Requirements for Unclassified Information Technology Resources (MONTH YEAR) (a) The contractor shall protect...
48 CFR 3052.204-70 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2010 CFR
2010-10-01
... unclassified information technology resources. 3052.204-70 Section 3052.204-70 Federal Acquisition Regulations... for unclassified information technology resources. As prescribed in (HSAR) 48 CFR 3004.470-3, insert a clause substantially the same as follows: Security Requirements for Unclassified Information Technology...
Environmental influences on food security in high-income countries.
Gorton, Delvina; Bullen, Chris R; Mhurchu, Cliona Ni
2010-01-01
Food security is a fundamental human right yet many people are food insecure, even in high-income countries. Reviewed here is the evidence for the physical, economic, sociocultural, and political environmental influences on household food security in high-income countries. The literature was evaluated using the ANGELO framework, which is a lens developed for understanding the environmental factors underpinning the obesity pandemic. A review of the literature identified 78 articles, which mostly reported on cross-sectional or qualitative studies. These studies identified a wide range of factors associated with food security. Foremost among them was household financial resources, but many other factors were identified and the complexity of the issue was highlighted. Few studies were prospective and even fewer tested the use of interventions other than the supplemental nutrition assistance program to address food security. This indicates a solution-oriented research paradigm is required to identify effective interventions and policies to enhance food security. In addition, comprehensive top-down and bottom-up interventions at the community and national levels are urgently needed.
OverView of Space Applications for Environment (SAFE) initiative
NASA Astrophysics Data System (ADS)
Hamamoto, Ko; Fukuda, Toru; Tajima, Yoshimitsu; Takeuchi, Wataru; Sobue, Shinichi; Nukui, Tomoyuki
2014-06-01
Climate change and human activities have a direc or indirect influence on the acceleration of environmental problems and natural hazards such as forest fires, draughts and floods in the Asia-Pacific countries. Satellite technology has become one of the key information sources in assessment, monitoring and mitigation of these disasters and related phenomenon. However, there are still gaps between science and application of satellite technology in real-world usage. Asia-Pacific Regional Space Agency Forum (APRSAF) recommended to initiate the Space Applications for Environment (SAFE) proposal providing opportunity to potential user agencies in the Asia Pacific region to develop prototype applications of satellite technology for number of key issues including forest resources management, coastal monitoring and management, agriculture and food security, water resource management and development user-friendly tools for application of satellite technology. This paper describes the overview of SAFE initiative and outcomes of two selected prototypes; agricultural drought monitoring in Indonesia and coastal management in Sri Lanka, as well as the current status of on-going prototypes.
Meeting the challenges--the role of medical informatics in an ageing society.
Koch, Sabine
2006-01-01
The objective of this paper is to identify trends and new technological developments that appear due to an ageing society and to relate them to current research in the field of medical informatics. A survey of the current literature reveals that recent technological advances have been made in the fields of "telecare and home-monitoring", "smart homes and robotics" and "health information systems and knowledge management". Innovative technologies such as wearable devices, bio- and environmental sensors and mobile, humanoid robots do already exist and ambient assistant living environments are being created for an ageing society. However, those technologies have to be adapted to older people's self-care processes and coping strategies, and to support new ways of healthcare delivery. Medical informatics can support this process by providing the necessary information infrastructure, contribute to standardisation, interoperability and security issues and provide modelling and simulation techniques for educational purposes. Research fields of increasing importance with regard to an ageing society are, moreover, the fields of knowledge management, ubiquitous computing and human-computer interaction.
Modern supercritical fluid technology for food applications.
King, Jerry W
2014-01-01
This review provides an update on the use of supercritical fluid (SCF) technology as applied to food-based materials. It advocates the use of the solubility parameter theory (SPT) for rationalizing the results obtained when employing sub- and supercritical media to food and nutrient-bearing materials and for optimizing processing conditions. Total extraction and fractionation of foodstuffs employing SCFs are compared and are illustrated by using multiple fluids and unit processes to obtain the desired food product. Some of the additional prophylactic benefits of using carbon dioxide as the processing fluid are explained and illustrated with multiple examples of commercial products produced using SCF media. I emphasize the role of SCF technology in the context of environmentally benign and sustainable processing, as well as its integration into an overall biorefinery concept. Conclusions are drawn in terms of current trends in the field and future research that is needed to secure new applications of the SCF platform as applied in food science and technology.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 1804.470-2 Federal Acquisition Regulations System NATIONAL AERONAUTICS AND SPACE ADMINISTRATION GENERAL...) 2810, Security of Information Technology; NASA Procedural Requirements (NPR) 2810, Security of Information Technology; and interim policy updates in the form of NASA Information Technology Requirements...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 1804.470-2 Federal Acquisition Regulations System NATIONAL AERONAUTICS AND SPACE ADMINISTRATION GENERAL...) 2810, Security of Information Technology; NASA Procedural Requirements (NPR) 2810, Security of Information Technology; and interim policy updates in the form of NASA Information Technology Requirements...
A DHS Skunkworks Project: Defining and Addressing Homeland Security Grand Challenges
2016-12-01
Peter Diamandis, Ansari XPRIZE, market failure, technology, stealth technologies, Pasteur’s quadrant, Heilmeier Catechism, Homeland Security Advanced...Judging and Scoring ....................................................................27 D. OPTIMIZING FOR AN EMERGING MARKET ...37 Figure 3. Market /Technology Chart
Database security and encryption technology research and application
NASA Astrophysics Data System (ADS)
Zhu, Li-juan
2013-03-01
The main purpose of this paper is to discuss the current database information leakage problem, and discuss the important role played by the message encryption techniques in database security, As well as MD5 encryption technology principle and the use in the field of website or application. This article is divided into introduction, the overview of the MD5 encryption technology, the use of MD5 encryption technology and the final summary. In the field of requirements and application, this paper makes readers more detailed and clearly understood the principle, the importance in database security, and the use of MD5 encryption technology.
Assessing security technology's impact: old tools for new problems.
Kreissl, Reinhard
2014-09-01
The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for the use of surveillance technologies. These distinctions developed in the physical world and are rooted in a cultural understanding of pre-digital culture. Attempts to capture the problems emerging with the implementation of security technologies using legal reasoning encounter a number of problems since law is by definition oriented backwards, adapting new developments to existing traditions, whereas the intrusion of new technologies in the physical world produces changes and creates fundamentally new problems.
Application of telecom planar lightwave circuits for homeland security sensing
NASA Astrophysics Data System (ADS)
Veldhuis, Gert J.; Elders, Job; van Weerden, Harm; Amersfoort, Martin
2004-03-01
Over the past decade, a massive effort has been made in the development of planar lightwave circuits (PLCs) for application in optical telecommunications. Major advances have been made, on both the technological and functional performance front. Highly sophisticated software tools that are used to tailor designs to required functional performance support these developments. In addition extensive know-how in the field of packaging, testing, and failure mode and effects analysis (FMEA) has been built up in the struggle for meeting the stringent Telcordia requirements that apply to telecom products. As an example, silica-on-silicon is now a mature technology available at several industrial foundries around the world, where, on the performance front, the arrayed-waveguide grating (AWG) has evolved into an off-the-shelf product. The field of optical chemical-biological (CB) sensors for homeland security application can greatly benefit from the advances as described above. In this paper we discuss the currently available technologies, device concepts, and modeling tools that have emerged from the telecommunications arena and that can effectively be applied to the field of homeland security. Using this profound telecom knowledge base, standard telecom components can readily be tailored for detecting CB agents. Designs for telecom components aim at complete isolation from the environment to exclude impact of environmental parameters on optical performance. For sensing applications, the optical path must be exposed to the measurand, in this area additional development is required beyond what has already been achieved in telecom development. We have tackled this problem, and are now in a position to apply standard telecom components for CB sensing. As an example, the application of an AWG as a refractometer is demonstrated, and its performance evaluated.
Security analysis of cyber-physical system
NASA Astrophysics Data System (ADS)
Li, Bo; Zhang, Lichen
2017-05-01
In recent years, Cyber-Physical System (CPS) has become an important research direction of academic circles and scientific and technological circles at home and abroad, is considered to be following the third wave of world information technology after the computer, the Internet. PS is a multi-dimensional, heterogeneous, deep integration of open systems, Involving the computer, communication, control and other disciplines of knowledge. As the various disciplines in the research theory and methods are significantly different, so the application of CPS has brought great challenges. This paper introduces the definition and characteristics of CPS, analyzes the current situation of CPS, analyzes the security threats faced by CPS, and gives the security solution for security threats. It also discusses CPS-specific security technology, to promote the healthy development of CPS in information security.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bazillian, Morgan; Pedersen, Ascha Lychett; Pless, Jacuelyn
Shale gas resource potential in China is assessed to be large, and its development could have wide-ranging economic, environmental, and energy security implications. Although commercial scale shale gas development has not yet begun in China, it holds the potential to change the global energy landscape. Chinese decision-makers are wrestling with the challenges associated with bringing the potential to reality: geologic complexity; infrastructure and logistical difficulties; technological, institutional, social and market development issues; and environmental impacts, including greenhouse gas emissions, impacts on water availability and quality, and air pollution. This paper briefly examines the current situation and outlook for shale gasmore » in China, and explores existing and potential avenues for international cooperation. We find that despite some barriers to large-scale development, Chinese shale gas production has the potential to grow rapidly over the medium-term.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pope, Jason E.
For more than 50 years, the United States (U.S.) Department of Energy’s (DOE’s) Pacific Northwest National Laboratory (PNNL) has advanced the frontiers of science and technology through courageous discovery and innovation. Our multidisciplinary team of more than 4,400 scientists, engineers, and support professionals is tackling global sustainability challenges in our science, energy, environmental, and security missions. For example, our research on how human and natural systems interact is critical to informing sustainable solutions to the nation’s energy and environmental challenges. PNNL is equally committed to sustainability right here at home, and we are making excellent progress toward the goals describedmore » in this plan. We are working on ongoing challenges, such as reducing the energy required to meet our research mission and promoting conservation among our employees.« less
Nalley, Lawton; Tsiboe, Francis; Durand-Morat, Alvaro; Shew, Aaron; Thoma, Greg
2016-01-01
Rice blast (Magnaporthe oryzae) is a key concern in combating global food insecurity given the disease is responsible for approximately 30% of rice production losses globally-the equivalent of feeding 60 million people. These losses increase the global rice price and reduce consumer welfare and food security. Rice is the staple crop for more than half the world's population so any reduction in rice blast would have substantial beneficial effects on consumer livelihoods. In 2012, researchers in the US began analyzing the feasibility of creating blast-resistant rice through cisgenic breeding. Correspondingly, our study evaluates the changes in producer, consumer, and environmental welfare, if all the rice produced in the Mid-South of the US were blast resistant through a process like cisgenics, using both international trade and environmental assessment modeling. Our results show that US rice producers would gain 69.34 million dollars annually and increase the rice supply to feed an additional one million consumers globally by eliminating blast from production in the Mid-South. These results suggest that blast alleviation could be even more significant in increasing global food security given that the US is a small rice producer by global standards and likely experiences lower losses from blast than other rice-producing countries because of its ongoing investment in production technology and management. Furthermore, results from our detailed life cycle assessment (LCA) show that producing blast-resistant rice has lower environmental (fossil fuel depletion, ecotoxicity, carcinogenics, eutrophication, acidification, global warming potential, and ozone depletion) impacts per unit of rice than non-blast resistant rice production. Our findings suggest that any reduction in blast via breeding will have significantly positive impacts on reducing global food insecurity through increased supply, as well as decreased price and environmental impacts in production.
2016-01-01
Rice blast (Magnaporthe oryzae) is a key concern in combating global food insecurity given the disease is responsible for approximately 30% of rice production losses globally—the equivalent of feeding 60 million people. These losses increase the global rice price and reduce consumer welfare and food security. Rice is the staple crop for more than half the world’s population so any reduction in rice blast would have substantial beneficial effects on consumer livelihoods. In 2012, researchers in the US began analyzing the feasibility of creating blast-resistant rice through cisgenic breeding. Correspondingly, our study evaluates the changes in producer, consumer, and environmental welfare, if all the rice produced in the Mid-South of the US were blast resistant through a process like cisgenics, using both international trade and environmental assessment modeling. Our results show that US rice producers would gain 69.34 million dollars annually and increase the rice supply to feed an additional one million consumers globally by eliminating blast from production in the Mid-South. These results suggest that blast alleviation could be even more significant in increasing global food security given that the US is a small rice producer by global standards and likely experiences lower losses from blast than other rice-producing countries because of its ongoing investment in production technology and management. Furthermore, results from our detailed life cycle assessment (LCA) show that producing blast-resistant rice has lower environmental (fossil fuel depletion, ecotoxicity, carcinogenics, eutrophication, acidification, global warming potential, and ozone depletion) impacts per unit of rice than non-blast resistant rice production. Our findings suggest that any reduction in blast via breeding will have significantly positive impacts on reducing global food insecurity through increased supply, as well as decreased price and environmental impacts in production. PMID:27907101
Sandia National Laboratories: National Security Programs
policy. Topics About Nuclear Weapons Safety & Security Science & Technology Defense Systems & science and technology to help defend and protect the United States. Topics About Defense Systems & . Topics Stationary Power Earth Science Transportation Energy Energy Research Global Security Birc We
DOE Office of Scientific and Technical Information (OSTI.GOV)
Happenny, Sean F.
The United States’ power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power distribution networks utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Demonstrating security in embedded systems is another research area PNNL ismore » tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the networks protecting them are becoming easier to breach. Providing a virtual power substation network to each student team at the National Collegiate Cyber Defense Competition, thereby supporting the education of future cyber security professionals, is another way PNNL is helping to strengthen the security of the nation’s power infrastructure.« less
Increasing the resilience and security of the United States' power infrastructure
DOE Office of Scientific and Technical Information (OSTI.GOV)
Happenny, Sean F.
2015-08-01
The United States' power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power infrastructure control and distribution paradigms by utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Understanding how these systems behave in real-worldmore » conditions will lead to new ways to make our power infrastructure more resilient and secure. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the aging networks protecting them are becoming easier to attack.« less
Chemical Sniffing Instrumentation for Security Applications.
Giannoukos, Stamatios; Brkić, Boris; Taylor, Stephen; Marshall, Alan; Verbeck, Guido F
2016-07-27
Border control for homeland security faces major challenges worldwide due to chemical threats from national and/or international terrorism as well as organized crime. A wide range of technologies and systems with threat detection and monitoring capabilities has emerged to identify the chemical footprint associated with these illegal activities. This review paper investigates artificial sniffing technologies used as chemical sensors for point-of-use chemical analysis, especially during border security applications. This article presents an overview of (a) the existing available technologies reported in the scientific literature for threat screening, (b) commercially available, portable (hand-held and stand-off) chemical detection systems, and (c) their underlying functional and operational principles. Emphasis is given to technologies that have been developed for in-field security operations, but laboratory developed techniques are also summarized as emerging technologies. The chemical analytes of interest in this review are (a) volatile organic compounds (VOCs) associated with security applications (e.g., illegal, hazardous, and terrorist events), (b) chemical "signatures" associated with human presence, and (c) threat compounds (drugs, explosives, and chemical warfare agents).
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-02
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Thermo Tech Technologies Inc., T.V.G. Technologies Ltd., and Visual Frontier, Inc.; Order of Suspension of Trading January 31, 2012. It appears to... is a lack of current and accurate information concerning the securities of T.V.G. Technologies Ltd...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-02
..., Including On-Site Leased Workers From Westaff, Supply Technologies, Aerotek, and Securitas Security Services..., including on-site leased workers from Westaff, Supply Technologies, Aerotek and Securitas Security Services... was amended on December 6, 2010 to include on- site leased workers from Supply Technologies. The...
48 CFR 352.239-72 - Security requirements for Federal information technology resources.
Code of Federal Regulations, 2011 CFR
2011-10-01
...' mission. The term “information technology (IT)”, as used in this clause, includes computers, ancillary... Federal information technology resources. 352.239-72 Section 352.239-72 Federal Acquisition Regulations... Provisions and Clauses 352.239-72 Security requirements for Federal information technology resources. As...
6 CFR 25.4 - Designation of qualified anti-terrorism technologies.
Code of Federal Regulations, 2011 CFR
2011-01-01
... technologies. 25.4 Section 25.4 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.4 Designation of qualified anti-terrorism technologies. (a) General. The Under Secretary may Designate as a Qualified Anti-Terrorism...
6 CFR 25.4 - Designation of qualified anti-terrorism technologies.
Code of Federal Regulations, 2012 CFR
2012-01-01
... technologies. 25.4 Section 25.4 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.4 Designation of qualified anti-terrorism technologies. (a) General. The Under Secretary may Designate as a Qualified Anti-Terrorism...
6 CFR 25.4 - Designation of qualified anti-terrorism technologies.
Code of Federal Regulations, 2014 CFR
2014-01-01
... technologies. 25.4 Section 25.4 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.4 Designation of qualified anti-terrorism technologies. (a) General. The Under Secretary may Designate as a Qualified Anti-Terrorism...
6 CFR 25.4 - Designation of qualified anti-terrorism technologies.
Code of Federal Regulations, 2013 CFR
2013-01-01
... technologies. 25.4 Section 25.4 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.4 Designation of qualified anti-terrorism technologies. (a) General. The Under Secretary may Designate as a Qualified Anti-Terrorism...
48 CFR 352.239-72 - Security requirements for Federal information technology resources.
Code of Federal Regulations, 2013 CFR
2013-10-01
...' mission. The term “information technology (IT)”, as used in this clause, includes computers, ancillary... Federal information technology resources. 352.239-72 Section 352.239-72 Federal Acquisition Regulations... Provisions and Clauses 352.239-72 Security requirements for Federal information technology resources. As...
48 CFR 352.239-72 - Security requirements for Federal information technology resources.
Code of Federal Regulations, 2014 CFR
2014-10-01
...' mission. The term “information technology (IT)”, as used in this clause, includes computers, ancillary... Federal information technology resources. 352.239-72 Section 352.239-72 Federal Acquisition Regulations... Provisions and Clauses 352.239-72 Security requirements for Federal information technology resources. As...
48 CFR 352.239-72 - Security requirements for Federal information technology resources.
Code of Federal Regulations, 2012 CFR
2012-10-01
...' mission. The term “information technology (IT)”, as used in this clause, includes computers, ancillary... Federal information technology resources. 352.239-72 Section 352.239-72 Federal Acquisition Regulations... Provisions and Clauses 352.239-72 Security requirements for Federal information technology resources. As...
6 CFR 25.4 - Designation of qualified anti-terrorism technologies.
Code of Federal Regulations, 2010 CFR
2010-01-01
... technologies. 25.4 Section 25.4 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.4 Designation of qualified anti-terrorism technologies. (a) General. The Under Secretary may Designate as a Qualified Anti-Terrorism...
The effects of environmental resource and security on aggressive behavior.
Ng, Henry Kin Shing; Chow, Tak Sang
2017-05-01
Exposure to different environments has been reported to change aggressive behavior, but previous research did not consider the underlying elements that caused such an effect. Based on previous work on environmental perception, we examined the role of environmental resource and security in altering aggression level. In three experiments, participants were exposed to environments that varied in resource (High vs. Low) and security (High vs. Low) levels, after which aggression was measured. The environments were presented through visual priming (Experiments 1-2) and a first-person gameplay (Experiment 3). We observed a consistent resource-security interaction effect on aggression, operationalized as the level of noise blast (Experiment 1) and number of unpleasant pictures (Experiments 2-3) delivered to strangers by the participants. High resource levels associated with higher aggression in insecure conditions, but lower aggression in secure conditions. The findings suggest that the adaptive value of aggression varies under different environmental constraints. Implications are discussed in terms of the effects of adverse environments on aggression, and the nature's effects on social behavior. Aggr. Behav. 43:304-314, 2017. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.
Secure, Mobile, Wireless Network Technology Designed, Developed, and Demonstrated
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Paulsen, Phillip E.
2004-01-01
The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and mitigation of potential equipment malfunctions. As an additional benefit, team advancements were incorporated into open standards, ensuring technology transfer. Low-cost, commercial products incorporating the new technology are already available. Furthermore, these products are fully interoperable with legacy network technology equipment currently being used throughout the world.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Procedures. 11.5 Section 11.5 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS...” shall be directed to: Director, Security and Inspection Division, Environmental Protection Agency...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.44 Custodians...
32 CFR 2400.40 - Responsibility.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.40 Responsibility...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.44 Custodians...
32 CFR 2400.40 - Responsibility.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.40 Responsibility...
32 CFR 2400.40 - Responsibility.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.40 Responsibility...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.44 Custodians...
32 CFR 2400.40 - Responsibility.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.40 Responsibility...
32 CFR 2400.40 - Responsibility.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.40 Responsibility...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.44 Custodians...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.44 Custodians...
Sandia National Laboratories: National Security Missions: International
; Security Weapons Science & Technology Defense Systems & Assessments About Defense Systems & ; Development Technology Deployment Centers Working With Sandia Working With Sandia Prospective Suppliers What Information Construction & Facilities Contract Audit Sandia's Economic Impact Licensing & Technology
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weldu, Yemane W., E-mail: ywweldem@ucalgary.ca; Assefa, Getachew; Athena Chair in Life Cycle Assessment in Design
A roadmap for a more sustainable energy strategy is complex, as its development interacts critically with the economic, social, and environmental dimensions of sustainable development. This paper applied an impact matrix method to evaluate the environmental sustainability and to identify the desirable policy objectives of biomass-based energy strategy for the case of Alberta. A matrix with the sustainability domains on one axis and areas of environmental impact on the other was presented to evaluate the nexus effect of policy objectives and bioenergy production. As per to our analysis, economic diversification, technological innovation, and resource conservation came up as the desirablemore » policy objectives of sustainable development for Alberta because they demonstrated environmental benefits in all environmental impact categories, namely climate change, human health, and ecosystem. On the other hand, human health and ecosystem impacts were identified as trade-offs when the policy objectives for sustainability were energy security, job creation, and climate change. Thus, bioenergy can mitigate climate change but may impact human health and ecosystem which then in turn can become issues of concern. Energy strategies may result in shifting of risks from one environmental impact category to another, and from one sustainable domain to another if the technical and policy-related issues are not identified.« less
NASA Astrophysics Data System (ADS)
Donoho, N.; Graumann, A.; McNamara, D. P.
2015-12-01
In this presentation we will highlight access and availability of NOAA satellite data for near real time (NRT) and retrospective product users. The presentation includes an overview of the current fleet of NOAA satellites and methods of data distribution and access to hundreds of imagery and products offered by the Environmental Satellite Processing Center (ESPC) and the Comprehensive Large Array-data Stewardship System (CLASS). In particular, emphasis on the various levels of services for current and past observations will be presented. The National Environmental Satellite, Data, and Information Service (NESDIS) is dedicated to providing timely access to global environmental data from satellites and other sources. In special cases, users are authorized direct access to NESDIS data distribution systems for environmental satellite data and products. Other means of access include publicly available distribution services such as the Global Telecommunication System (GTS), NOAA satellite direct broadcast services and various NOAA websites and ftp servers, including CLASS. CLASS is NOAA's information technology system designed to support long-term, secure preservation and standards-based access to environmental data collections and information. The National Centers for Environmental Information (NCEI) is responsible for the ingest, quality control, stewardship, archival and access to data and science information. This work will also show the latest technology improvements, enterprise approach and future plans for distribution of exponentially increasing data volumes from future NOAA missions. A primer on access to NOAA operational satellite products and services is available at http://www.ospo.noaa.gov/Organization/About/access.html. Access to post-operational satellite data and assorted products is available at http://www.class.noaa.gov
Biosensor technology: recent advances in threat agent detection and medicine.
Kirsch, Jeffrey; Siltanen, Christian; Zhou, Qing; Revzin, Alexander; Simonian, Aleksandr
2013-11-21
Biosensors are of great significance because of their capability to resolve a potentially large number of analytical problems and challenges in very diverse areas such as defense, homeland security, agriculture and food safety, environmental monitoring, medicine, pharmacology, industry, etc. The expanding role of biosensing in society and a real-world environment has led to an exponential growth of the R&D efforts around the world. The world market for biosensor devices, according to Global Industry Analysts, Inc., is expected to reach $12 billion by 2015. Such expedient growth is driven by several factors including medical and health problems, such as a growing population with a high risk of diabetes and obesity, and the rising incidence of chronic diseases such as heart disease, stroke, cancer, chronic respiratory diseases, tuberculosis, etc.; significant problems with environmental monitoring; and of course serious challenges in security and military applications and agriculture/food safety. A review paper in the biosensor technology area may be structured based on (i) the principles of detection, such as the type of transducer platform, bioanalytical principles (affinity or kinetic), and biorecognition elements origin/properties (i.e. antibodies, enzymes, cells, aptamers, etc.), and (ii) the application area. This review follows the latter strategy and focuses on the applications. This allows discussion on how different sensing strategies are brought to bear on the same problem and highlights advantages/disadvantages of these sensing strategies. Given the broad range of biosensor related applications, several particularly relevant areas of application were selected for review: biological threat agents, chemical threat agents, and medicine.
Information Security Risk Assessment in Hospitals
Ayatollahi, Haleh; Shagerdi, Ghazal
2017-01-01
Background: To date, many efforts have been made to classify information security threats, especially in the healthcare area. However, there are still many unknown risks which may threat the security of health information and their resources especially in the hospitals. Objective: The aim of this study was to assess the risks threatening information security in the hospitals located in one of the northwest cities of Iran. Method: This study was completed in 2014. The participants were information technology managers who worked in the hospitals (n=27). The research instrument was a questionnaire composed of a number of open and closed questions. The content validity of the questionnaire was confirmed, and the reliability of the closed questions was measured by using the test-retest method (r =0.78). Results: The results showed that among the information security risks, fire found to be a high probability/high impact risk factor. Human and physical/environmental threats were among the low probability risk factors. Regarding the information security safeguards used in the hospitals, the results showed that the use of the technical safeguards was the most frequent one (n =22, 91.7%) compared to the administrative (n =21, 87.5%) and the physical safeguards (n =16, 66.7%). Conclusion: The high probability risk factors require quick corrective actions to be taken. Therefore, the underlying causes of such threats should be identified and controlled before experiencing adverse effects. It is also important to note that information security in health care systems needs to be considered at a macro level with respect to the national interests and policies. PMID:29204226
Market Evolution: Wholesale Electricity Market Design for 21st Century Power Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cochran, Jaquelin; Miller, Mackay; Milligan, Michael
2013-10-01
Demand for affordable, reliable, domestically sourced, and low-carbon electricity is on the rise. This growing demand is driven in part by evolving public policy priorities, especially reducing the health and environmental impacts of electricity service and expanding energy access to under-served customers. Consequently, variable renewable energy resources comprise an increasing share ofelectricity generation globally. At the same time, new opportunities for addressing the variability of renewables are being strengthened through advances in smart grids, communications, and technologies that enable dispatchable demand response and distributed generation to extend to the mass market. A key challenge of merging these opportunities is marketmore » design -- determining how to createincentives and compensate providers justly for attributes and performance that ensure a reliable and secure grid -- in a context that fully realizes the potential of a broad array of sources of flexibility in both the wholesale power and retail markets. This report reviews the suite of wholesale power market designs in use and under consideration to ensure adequacy, security, and flexibilityin a landscape of significant variable renewable energy. It also examines considerations needed to ensure that wholesale market designs are inclusive of emerging technologies, such as demand response, distributed generation, and storage.« less
NASA Astrophysics Data System (ADS)
Recanati, Francesca; Castelletti, Andrea; Melià, Paco; Dotelli, Giovanni
2013-04-01
Food security is a major issue in Palestine for both political and physical reasons, with direct effects on the local population living conditions: the nutritional level of people in Gaza is classified by FAO as "insecure". As most of the protein supply comes from irrigated agricultural production and aquaculture, freshwater availability is a limiting factor to food security, and the primary reason for frequent conflicts among food production processes (e.g. aquaculture, land livestock or different types of crops). In this study we use Life Cycle Analysis to assess the environmental impacts associated to all the stages of water-based protein production (from agriculture and aquaculture) in the Gaza strip under different agricultural scenarios and hydroclimatic variability. As reported in several recent studies, LCA seems to be an appropriate methodology to analyze agricultural systems and assess associated food security in different socio-economic contexts. However, we argue that the inherently linear and static nature of LCA might prove inadequate to tackle with the complex interaction between water cycle variability and the food production system in water-scarce regions of underdeveloped countries. Lack of sufficient and reliable data to characterize the water cycle is a further source of uncertainty affecting the robustness of the analysis. We investigate pros and cons of LCA and LCA-based option planning in an average size farm in Gaza strip, where farming and aquaculture are family-based and integrated by reuse of fish breeding water for irrigation. Different technological solutions (drip irrigation system, greenhouses etc.) are evaluated to improve protein supply and reduce the pressure on freshwater, particularly during droughts. But this use of technology represent also a contribution in increasing sustainability in agricultural processes, and therefore in economy, of Gaza Strip (reduction in chemical fertilizers and pesticides etc.).
Research on information security in big data era
NASA Astrophysics Data System (ADS)
Zhou, Linqi; Gu, Weihong; Huang, Cheng; Huang, Aijun; Bai, Yongbin
2018-05-01
Big data is becoming another hotspot in the field of information technology after the cloud computing and the Internet of Things. However, the existing information security methods can no longer meet the information security requirements in the era of big data. This paper analyzes the challenges and a cause of data security brought by big data, discusses the development trend of network attacks under the background of big data, and puts forward my own opinions on the development of security defense in technology, strategy and product.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, G.; Mansur, D.L.; Ruhter, W.D.
1994-10-01
This report presents the details of the Lawrence Livermore National Laboratory safeguards and securities program. This program is focused on developing new technology, such as x- and gamma-ray spectrometry, for measurement of special nuclear materials. This program supports the Office of Safeguards and Securities in the following five areas; safeguards technology, safeguards and decision support, computer security, automated physical security, and automated visitor access control systems.
Laboratory Directed Research and Development Program FY 2008 Annual Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
editor, Todd C Hansen
2009-02-23
The Ernest Orlando Lawrence Berkeley National Laboratory (Berkeley Lab or LBNL) is a multi-program national research facility operated by the University of California for the Department of Energy (DOE). As an integral element of DOE's National Laboratory System, Berkeley Lab supports DOE's missions in fundamental science, energy resources, and environmental quality. Berkeley Lab programs advance four distinct goals for DOE and the nation: (1) To perform leading multidisciplinary research in the computing sciences, physical sciences, energy sciences, biosciences, and general sciences in a manner that ensures employee and public safety and protection of the environment. (2) To develop and operatemore » unique national experimental facilities for qualified investigators. (3) To educate and train future generations of scientists and engineers to promote national science and education goals. (4) To transfer knowledge and technological innovations and to foster productive relationships among Berkeley Lab's research programs, universities, and industry in order to promote national economic competitiveness. Berkeley Lab's research and the Laboratory Directed Research and Development (LDRD) program support DOE's Strategic Themes that are codified in DOE's 2006 Strategic Plan (DOE/CF-0010), with a primary focus on Scientific Discovery and Innovation. For that strategic theme, the Fiscal Year (FY) 2008 LDRD projects support each one of the three goals through multiple strategies described in the plan. In addition, LDRD efforts support the four goals of Energy Security, the two goals of Environmental Responsibility, and Nuclear Security (unclassified fundamental research that supports stockpile safety and nonproliferation programs). The LDRD program supports Office of Science strategic plans, including the 20-year Scientific Facilities Plan and the Office of Science Strategic Plan. The research also supports the strategic directions periodically under consideration and review by the Office of Science Program Offices, such as LDRD projects germane to new research facility concepts and new fundamental science directions. Berkeley Lab LDRD program also play an important role in leveraging DOE capabilities for national needs. The fundamental scientific research and development conducted in the program advances the skills and technologies of importance to our Work For Others (WFO) sponsors. Among many directions, these include a broad range of health-related science and technology of interest to the National Institutes of Health, breast cancer and accelerator research supported by the Department of Defense, detector technologies that should be useful to the Department of Homeland Security, and particle detection that will be valuable to the Environmental Protection Agency. The Berkeley Lab Laboratory Directed Research and Development Program FY2008 report is compiled from annual reports submitted by principal investigators following the close of the fiscal year. This report describes the supported projects and summarizes their accomplishments. It constitutes a part of the LDRD program planning and documentation process that includes an annual planning cycle, project selection, implementation, and review.« less
The study and implementation of the wireless network data security model
NASA Astrophysics Data System (ADS)
Lin, Haifeng
2013-03-01
In recent years, the rapid development of Internet technology and the advent of information age, people are increasing the strong demand for the information products and the market for information technology. Particularly, the network security requirements have become more sophisticated. This paper analyzes the wireless network in the data security vulnerabilities. And a list of wireless networks in the framework is the serious defects with the related problems. It has proposed the virtual private network technology and wireless network security defense structure; and it also given the wireless networks and related network intrusion detection model for the detection strategies.
Cyber security evaluation of II&C technologies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thomas, Ken
The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) tomore » address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.« less
Malthus is still wrong: we can feed a world of 9-10 billion, but only by reducing food demand.
Smith, Pete
2015-08-01
In 1798, Thomas Robert Malthus published 'An essay on the principle of population' in which he concluded that: 'The power of population is so superior to the power of the earth to produce subsistence for man, that premature death must in some shape or other visit the human race.' Over the following century he was criticised for underestimating the potential for scientific and technological innovation to provide positive change. Since then, he has been proved wrong, with a number of papers published during the past few decades pointing out why he has been proved wrong so many times. In the present paper, I briefly review the main changes in food production in the past that have allowed us to continue to meet ever growing demand for food, and I examine the possibility of these same innovations delivering food security in the future. On the basis of recent studies, I conclude that technological innovation can no longer be relied upon to prove Malthus wrong as we strive to feed 9-10 billion people by 2050. Unless we are prepared to accept a wide range of significant, undesirable environmental consequences, technology alone cannot provide food security in 2050. Food demand, particularly the demand for livestock products, will need to be managed if we are to continue to prove Malthus wrong into the future.