Teng, Ming-jun; Zeng, Li-xiong; Xiao, Wen-fa; Zhou, Zhi-xiang; Huang, Zhi-lin; Wang, Peng-cheng; Dian, Yuan-yong
2014-12-01
The Three Gorges Reservoir area (TGR area) , one of the most sensitive ecological zones in China, has dramatically changes in ecosystem configurations and services driven by the Three Gorges Engineering Project and its related human activities. Thus, understanding the dynamics of ecosystem configurations, ecological processes and ecosystem services is an attractive and critical issue to promote regional ecological security of the TGR area. The remote sensing of environment is a promising approach to the target and is thus increasingly applied to and ecosystem dynamics of the TGR area on mid- and macro-scales. However, current researches often showed controversial results in ecological and environmental changes in the TGR area due to the differences in remote sensing data, scale, and land-use/cover classification. Due to the complexity of ecological configurations and human activities, challenges still exist in the remote-sensing based research of ecological and environmental changes in the TGR area. The purpose of this review was to summarize the research advances in remote sensing of ecological and environmental changes in the TGR area. The status, challenges and trends of ecological and environmental remote-sensing in the TGR area were further discussed and concluded in the aspect of land-use/land-cover, vegetation dynamics, soil and water security, ecosystem services, ecosystem health and its management. The further researches on the remote sensing of ecological and environmental changes were proposed to improve the ecosystem management of the TGR area.
2008-09-18
molecular oxygen – singlet oxygen (SO). According to the quantum theory , the spin configuration of the lowest energy state with unpaired electrons in...in applications spanning from environmental and health monitoring to security. Lectures on advanced theories and modeling of the sensing mechanisms...10:15 Marie-Isabelle BARATON and Pavel KASHKAROV Welcome address Introduction to the Advanced Study Institute 10:15 – 10:30 Welcome address by
MX Systems Environmental Programs Scoping Summary.
1980-04-14
statemet o water resource conflicts o local growth impracts,, particularly loss of gialit-4 o preservation of archaeological and cultural resmew Date...health and safety o Archaeological and historical resources o Energy and nonrenewable resources o Terrestrial and aquatic biology o Air quality o...and regulations Public Health & Safety Noise; security configuration Archaeological /Historical Permitting and compliance with state/ Resources local
Model-Driven Configuration of SELinux Policies
NASA Astrophysics Data System (ADS)
Agreiter, Berthold; Breu, Ruth
The need for access control in computer systems is inherent. However, the complexity to configure such systems is constantly increasing which affects the overall security of a system negatively. We think that it is important to define security requirements on a non-technical level while taking the application domain into respect in order to have a clear and separated view on security configuration (i.e. unblurred by technical details). On the other hand, security functionality has to be tightly integrated with the system and its development process in order to provide comprehensive means of enforcement. In this paper, we propose a systematic approach based on model-driven security configuration to leverage existing operating system security mechanisms (SELinux) for realising access control. We use UML models and develop a UML profile to satisfy these needs. Our goal is to exploit a comprehensive protection mechanism while rendering its security policy manageable by a domain specialist.
Environmental control and life support system: Analysis of STS-1
NASA Technical Reports Server (NTRS)
Steines, G.
1980-01-01
The capability of the orbiter environmental control and life support system (ECLSS) to support vehicle cooling requirements in the event of cabin pressure reduction to 9 psia was evaluated, using the Orbiter versions of the shuttle environmental consumbles usage requirement evaluation (SECURE) program, and using heat load input data developed by the spacecraft electrical power simulator (SEPS) program. The SECURE model used in the analysis, the timeline and ECLSS configuration used in formulating the analysis, and the results of the analysis are presented. The conclusion which may be drawn drom these results. is summarized. There are no significant thermal problems with the proposed mission. There are, however, several procedures which could be optimized for better performance: setting the cabin HX air bypass and the interchanger water bypass to the zero flow position is of questionable efficacy; the cabin air pressure monitoring procedure should be re-evaluated; and the degree of equipment power down specified for this analysis and no problems were noted.
48 CFR 352.239-70 - Standard for security configurations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... configure its computers that contain HHS data with the applicable Federal Desktop Core Configuration (FDCC) (see http://nvd.nist.gov/fdcc/index.cfm) and ensure that its computers have and maintain the latest... technology (IT) that is used to process information on behalf of HHS. The following security configuration...
48 CFR 352.239-70 - Standard for security configurations.
Code of Federal Regulations, 2011 CFR
2011-10-01
... configure its computers that contain HHS data with the applicable Federal Desktop Core Configuration (FDCC) (see http://nvd.nist.gov/fdcc/index.cfm) and ensure that its computers have and maintain the latest... technology (IT) that is used to process information on behalf of HHS. The following security configuration...
48 CFR 352.239-70 - Standard for security configurations.
Code of Federal Regulations, 2013 CFR
2013-10-01
... configure its computers that contain HHS data with the applicable Federal Desktop Core Configuration (FDCC) (see http://nvd.nist.gov/fdcc/index.cfm) and ensure that its computers have and maintain the latest... technology (IT) that is used to process information on behalf of HHS. The following security configuration...
48 CFR 352.239-70 - Standard for security configurations.
Code of Federal Regulations, 2014 CFR
2014-10-01
... configure its computers that contain HHS data with the applicable Federal Desktop Core Configuration (FDCC) (see http://nvd.nist.gov/fdcc/index.cfm) and ensure that its computers have and maintain the latest... technology (IT) that is used to process information on behalf of HHS. The following security configuration...
48 CFR 352.239-70 - Standard for security configurations.
Code of Federal Regulations, 2012 CFR
2012-10-01
... configure its computers that contain HHS data with the applicable Federal Desktop Core Configuration (FDCC) (see http://nvd.nist.gov/fdcc/index.cfm) and ensure that its computers have and maintain the latest... technology (IT) that is used to process information on behalf of HHS. The following security configuration...
DOE Office of Scientific and Technical Information (OSTI.GOV)
McDonald, K; Curran, B
I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusionmore » Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.« less
Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era
NASA Astrophysics Data System (ADS)
Ali, Firkhan Ali Bin Hamid; Zalisham Jali, Mohd, Dr
2018-05-01
The development of the digital transformation in the organizations has become more expanding in these present and future years. This is because of the active demand to use the ICT services among all the organizations whether in the government agencies or private sectors. While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. So, their needs a well plan to implement the cyber infrastructures and equipment. The cyber security play important role to ensure that the ICT components or infrastructures execute well along the organization’s business successful. This paper will present a study of security management models to guideline the security maintenance on existing cyber infrastructures. In order to perform security model for the currently existing cyber infrastructures, combination of the some security workforces and security process of extracting the security maintenance in cyber infrastructures. In the assessment, the focused on the cyber security maintenance within security models in cyber infrastructures and presented a way for the theoretical and practical analysis based on the selected security management models. Then, the proposed model does evaluation for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. The implemented cyber security maintenance within security management model in a prototype and evaluated it for practical and theoretical scenarios. Furthermore, a framework model is presented which allows the evaluation of configuration changes in the agile and dynamic cyber infrastructure environments with regard to properties like vulnerabilities or expected availability. In case of a security perspective, this evaluation can be used to monitor the security levels of the configuration over its lifetime and to indicate degradations.
Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture
McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID
2012-05-08
Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.
NASA Astrophysics Data System (ADS)
Leonelli, Joseph
1994-06-01
For the past 20 years, the Department of Defense has sponsored investigations and studies on the use of laser remote sensing techniques and light detection and ranging (lidar) methods for the detection, identification, and tracking of toxic and hazardous battlefield materials. The same lidar methods used by NASA, EPA, and several industry research groups to detect and measure the movement and concentration of air pollution near urban centers have been applied to the national security problem of detecting chemical and biological warfare agents that might be used on the modern battlefield. Significant government investment in the technology base and laser technology has resulted in advanced hardware configurations that are now available for demonstration and evaluation for industrial and environmental monitoring.
Securing your Site in Development and Beyond
DOE Office of Scientific and Technical Information (OSTI.GOV)
Akopov, Mikhail S.
Why wait until production deployment, or even staging and testing deployment to identify security vulnerabilities? Using tools like Burp Suite, you can find security vulnerabilities before they creep up on you. Prevent cross-site scripting attacks, and establish a firmer trust between your website and your client. Verify that Apache/Nginx have the correct SSL Ciphers set. We explore using these tools and more to validate proper Apache/Nginx configurations, and to be compliant with modern configuration standards as part of the development cycle. Your clients can use tools like https://securityheaders.io and https://ssllabs.com to get a graded report on your level of compliancemore » with OWASP Secure Headers Project and SSLLabs recommendations. Likewise, you should always use the same sites to validate your configurations. Burp Suite will find common misconfigurations and will also perform more thorough security testing of your applications. In this session you will see examples of vulnerabilities that were detected early on, as well has how to integrate these practices into your daily workflow.« less
Waste Technology Engineering Laboratory (324 building)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kammenzind, D.E.
The 324 Facility Standards/Requirements Identification Document (S/RID) is comprised of twenty functional areas. Two of the twenty functional areas (Decontamination and Decommissioning and Environmental Restoration) were determined as nonapplicable functional areas and one functional area (Research and Development and Experimental Activities) was determined applicable, however, requirements are found in other functional areas and will not be duplicated. Each functional area follows as a separate chapter, either containing the S/RID or a justification for nonapplicability. The twenty functional areas listed below follow as chapters: 1. Management Systems; 2. Quality Assurance; 3. Configuration Management; 4. Training and Qualification; 5. Emergency Management; 6.more » Safeguards and Security; 7. Engineering Program; 8. Construction; 9. Operations; 10. Maintenance; 11. Radiation Protection; 12. Fire Protection; 13. Packaging and Transportation; 14. Environmental Restoration; 15. Decontamination and Decommissioning; 16. Waste Management; 17. Research and Development and Experimental Activities; 18. Nuclear Safety; 19. Occupational Safety and Health; 20. Environmental Protection.« less
Code of Federal Regulations, 2012 CFR
2012-10-01
..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...
Code of Federal Regulations, 2014 CFR
2014-10-01
..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...
Code of Federal Regulations, 2013 CFR
2013-10-01
..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...
Code of Federal Regulations, 2011 CFR
2011-10-01
..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...
Secure videoconferencing equipment switching system and method
Dirks, David H; Gomes, Diane; Stewart, Corbin J; Fischer, Robert A
2013-04-30
Examples of systems described herein include videoconferencing systems having audio/visual components coupled to a codec. The codec may be configured by a control system. Communication networks having different security levels may be alternately coupled to the codec following appropriate configuration by the control system. The control system may also be coupled to the communication networks.
Caruso, Ronald D
2004-01-01
Proper configuration of software security settings and proper file management are necessary and important elements of safe computer use. Unfortunately, the configuration of software security options is often not user friendly. Safe file management requires the use of several utilities, most of which are already installed on the computer or available as freeware. Among these file operations are setting passwords, defragmentation, deletion, wiping, removal of personal information, and encryption. For example, Digital Imaging and Communications in Medicine medical images need to be anonymized, or "scrubbed," to remove patient identifying information in the header section prior to their use in a public educational or research environment. The choices made with respect to computer security may affect the convenience of the computing process. Ultimately, the degree of inconvenience accepted will depend on the sensitivity of the files and communications to be protected and the tolerance of the user. Copyright RSNA, 2004
Device for remote operation of electrical disconnect
DOE Office of Scientific and Technical Information (OSTI.GOV)
Coleman, Jody Rustyn; Bobbitt, III, John Thomas
Provided is a device for remote operation of an electrical disconnect. The device can include a handle clamp configured to be secured to an extending member of the electrical disconnect. The device can further include a case clamp configured to be secured to a rigid portion of the electrical disconnect. The device can further include a cable having an exterior sheath coaxially surrounding an inner cable. The inner cable can be coaxially slidable with respect to the exterior sheath. The inner cable can extend through an opening of the case clamp and be secured to the handle clamp. The devicemore » can further include an actuator configured to coaxially slide the inner cable such that the handle clamp is actuated towards the case clamp.« less
Configuring a Graphical User Interface for Managing Local HYSPLIT Model Runs Through AWIPS
NASA Technical Reports Server (NTRS)
Wheeler, mark M.; Blottman, Peter F.; Sharp, David W.; Hoeth, Brian; VanSpeybroeck, Kurt M.
2009-01-01
Responding to incidents involving the release of harmful airborne pollutants is a continual challenge for Weather Forecast Offices in the National Weather Service. When such incidents occur, current protocol recommends forecaster-initiated requests of NOAA's Hybrid Single-Particle Lagrangian Integrated Trajectory (HYSPLIT) model output through the National Centers of Environmental Prediction to obtain critical dispersion guidance. Individual requests are submitted manually through a secured web site, with desired multiple requests submitted in sequence, for the purpose of obtaining useful trajectory and concentration forecasts associated with the significant release of harmful chemical gases, radiation, wildfire smoke, etc., into local the atmosphere. To help manage the local HYSPLIT for both routine and emergency use, a graphical user interface was designed for operational efficiency. The interface allows forecasters to quickly determine the current HYSPLIT configuration for the list of predefined sites (e.g., fixed sites and floating sites), and to make any necessary adjustments to key parameters such as Input Model. Number of Forecast Hours, etc. When using the interface, forecasters will obtain desired output more confidently and without the danger of corrupting essential configuration files.
NASA Astrophysics Data System (ADS)
Rehan, S. C.
This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.
Reconfigurable environmentally adaptive computing
NASA Technical Reports Server (NTRS)
Coxe, Robin L. (Inventor); Galica, Gary E. (Inventor)
2008-01-01
Described are methods and apparatus, including computer program products, for reconfigurable environmentally adaptive computing technology. An environmental signal representative of an external environmental condition is received. A processing configuration is automatically selected, based on the environmental signal, from a plurality of processing configurations. A reconfigurable processing element is reconfigured to operate according to the selected processing configuration. In some examples, the environmental condition is detected and the environmental signal is generated based on the detected condition.
CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection
Dai, Huning; Murphy, Christian; Kaiser, Gail
2010-01-01
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations and inputs together with a certain runtime environment. One approach to detecting these vulnerabilities is fuzz testing. However, typical fuzz testing makes no guarantees regarding the syntactic and semantic validity of the input, or of how much of the input space will be explored. To address these problems, we present a new testing methodology called Configuration Fuzzing. Configuration Fuzzing is a technique whereby the configuration of the running application is mutated at certain execution points, in order to check for vulnerabilities that only arise in certain conditions. As the application runs in the deployment environment, this testing technique continuously fuzzes the configuration and checks “security invariants” that, if violated, indicate a vulnerability. We discuss the approach and introduce a prototype framework called ConFu (CONfiguration FUzzing testing framework) for implementation. We also present the results of case studies that demonstrate the approach’s feasibility and evaluate its performance. PMID:21037923
Implementing Information Assurance - Beyond Process
2009-01-01
disabled or properly configured. Tools and scripts are available to expedite the configuration process on some platforms, For example, approved Windows...in the System Security Plan (SSP) or Information Security Plan (lSP). Any PPSs not required for operation by the system must be disabled , This...Services must be disabled , Implementing an 1M capability within the boundary carries many policy and documentation requirements. Usemame and passwords
DOE Office of Scientific and Technical Information (OSTI.GOV)
2015-05-13
STONIX is a program for configuring UNIX and Linux computer operating systems. It applies configurations based on the guidance from publicly accessible resources such as: NSA Guides, DISA STIGs, the Center for Internet Security (CIS), USGCB and vendor security documentation. STONIX is written in the Python programming language using the QT4 and PyQT4 libraries to provide a GUI. The code is designed to be easily extensible and customizable.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Coleman, Jody Rustyn; Poland, Richard W.
A system and method for the secure storage and transmission of data is provided. A data aggregate device can be configured to receive secure data from a data source, such as a sensor, and encrypt the secure data using a suitable encryption technique, such as a shared private key technique, a public key encryption technique, a Diffie-Hellman key exchange technique, or other suitable encryption technique. The encrypted secure data can be provided from the data aggregate device to different remote devices over a plurality of segregated or isolated data paths. Each of the isolated data paths can include an optoisolatormore » that is configured to provide one-way transmission of the encrypted secure data from the data aggregate device over the isolated data path. External data can be received through a secure data filter which, by validating the external data, allows for key exchange and other various adjustments from an external source.« less
Authenticated sensor interface device
DOE Office of Scientific and Technical Information (OSTI.GOV)
Coleman, Jody Rustyn; Poland, Richard W.
A system and method for the secure storage and transmission of data is provided. A data aggregate device can be configured to receive secure data from a data source, such as a sensor, and encrypt the secure data using a suitable encryption technique, such as a shared private key technique, a public key encryption technique, a Diffie-Hellman key exchange technique, or other suitable encryption technique. The encrypted secure data can be provided from the data aggregate device to different remote devices over a plurality of segregated or isolated data paths. Each of the isolated data paths can include an optoisolatormore » that is configured to provide one-way transmission of the encrypted secure data from the data aggregate device over the isolated data path. External data can be received through a secure data filter which, by validating the external data, allows for key exchange and other various adjustments from an external source.« less
Environmental Security: Evolution of a New Concept in Security Studies
1999-04-01
vi ENVIRONMENTAL IMPACT OF POPULATION...1970�s. Environmental security and its direct impact on national and international security has not gone unnoticed by our nation�s leaders. Former...understanding of the �where and under what circumstances� environmental degradation, scarcity, and conflict occur and how they will impact U.S. environmental
48 CFR 1852.204-76 - Security requirements for unclassified information technolocgy resources.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Officer for approval by the Network Security Configuration Control Board (NSCCB); (ii) Comply with the... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Security requirements for... CONTRACT CLAUSES Texts of Provisions and Clauses 1852.204-76 Security requirements for unclassified...
An evaluation of the ecological and environmental security on China's terrestrial ecosystems.
Zhang, Hongqi; Xu, Erqi
2017-04-11
With rapid economic growth, industrialization, and urbanization, various ecological and environmental problems occur, which threaten and undermine the sustainable development and domestic survival of China. On the national scale, our progress remains in a state of qualitative or semi-quantitative evaluation, lacking a quantitative evaluation and a spatial visualization of ecological and environmental security. This study collected 14 indictors of water, land, air, and biodiversity securities to compile a spatial evaluation of ecological and environmental security in terrestrial ecosystems of China. With area-weighted normalization and scaling transformations, the veto aggregation (focusing on the limit indicator) and balanced aggregation (measuring balanced performance among different indicators) methods were used to aggregate security evaluation indicators. Results showed that water, land, air, and biodiversity securities presented different spatial distributions. A relatively serious ecological and environmental security crisis was found in China, but presented an obviously spatial variation of security evaluation scores. Hotspot areas at the danger level, which are scattered throughout the entirety of the country, were identified. The spatial diversities and causes of ecological and environmental problems in different regions were analyzed. Spatial integration of regional development and proposals for improving the ecological and environmental security were put forward.
A COTS-MQS shipborne EO/IR imaging system
NASA Astrophysics Data System (ADS)
Hutchinson, Mark A.; Miller, John L.; Weaver, James
2005-05-01
The Sea Star SAFIRE is a commercially developed, off the shelf, military qualified system (COTS-MQS) consisting of a 640 by 480 InSb infrared imager, laser rangefinder and visible imager in a gyro-stabilized platform designed for shipborne applications. These applications include search and rescue, surveillance, fire control, fisheries patrol, harbor security, and own-vessel perimeter security and self protection. Particularly challenging considerations unique to shipborne systems include the demanding environment conditions, man-machine interfaces, and effects of atmospheric conditions on sensor performance. Shipborne environmental conditions requiring special attention include electromagnetic fields, as well as resistance to rain, ice and snow, shock, vibration, and salt. Features have been implemented to withstand exposure to water and high humidity; anti-ice/de-ice capability for exposure to snow and ice; wash/wipe of external windows; corrosion resistance for exposure to water and salt spray. A variety of system controller configurations provide man-machine interfaces suitable for operation on ships. EO sensor developments that address areas of haze penetration, glint, and scintillation will be presented.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nelson, Kurt; James, Scott C.; Roberts, Jesse D.
A modelling framework identifies deployment locations for current-energy-capture devices that maximise power output while minimising potential environmental impacts. The framework, based on the Environmental Fluid Dynamics Code, can incorporate site-specific environmental constraints. Over a 29-day period, energy outputs from three array layouts were estimated for: (1) the preliminary configuration (baseline), (2) an updated configuration that accounted for environmental constraints, (3) and an improved configuration subject to no environmental constraints. Of these layouts, array placement that did not consider environmental constraints extracted the most energy from flow (4.38 MW-hr/day), 19% higher than output from the baseline configuration (3.69 MW-hr/day). Array placementmore » that considered environmental constraints removed 4.27 MW-hr/day of energy (16% more than baseline). In conclusion, this analysis framework accounts for bathymetry and flow-pattern variations that typical experimental studies cannot, demonstrating that it is a valuable tool for identifying improved array layouts for field deployments.« less
An Innovative Community College Program and Partnership in Information Security.
ERIC Educational Resources Information Center
Howard, Barbara C; Morneau, Keith A.
This report describes an innovative network security program initiated by Northern Virginia Community College and funded with a grant from the Northern Virginia Regional Partnership. The program educates and trains students in the instillation, configuration, and troubleshooting of the hardware and software infrastructure of information security.…
Women's Marginalization, Economic Flows, and Environmental Flows: A Classroom Approach.
ERIC Educational Resources Information Center
O'Lear, Shannon
1999-01-01
Discusses environmental security, focusing on the meaning of "security." Defines the global economy as a process in which the security of groups is sought, maintained, or threatened. Illustrates connections among environmental security, the global economy, and abuse of women and children in less economically developed places,…
An integrated water-energy-food-livelihoods approach for assessing environmental livelihood security
NASA Astrophysics Data System (ADS)
Biggs, E. M.; Duncan, J.; Boruff, B.; Bruce, E.; Neef, A.; McNeill, K.; van Ogtrop, F. F.; Haworth, B.; Duce, S.; Horsley, J.; Pauli, N.; Curnow, J.; Imanari, Y.
2015-12-01
Environmental livelihood security refers to the challenges of maintaining global food security and universal access to freshwater and energy to sustain livelihoods and promote inclusive economic growth, whilst sustaining key environmental systems' functionality, particularly under variable climatic regimes. Environmental security is a concept complementary to sustainable development, and considers the increased vulnerability people have to certain environmental stresses, such as climatic change. Bridging links between the core component concepts of environmental security is integral to future human security, and in an attempt to create this bridge, the nexus approach to human protection has been created, where water resource availability underpins food, water and energy security. The water-energy-food nexus has an influential role in attaining human security, yet little research has made the link between the nexus and livelihoods. In this research we provide a critical appraisal of the synergies between water-energy-food nexus framings and sustainable livelihoods approaches, both of which aim to promote sustainable development. In regions where livelihoods are dependent on environmental conditions, the concept of sustainable development is critical for ensuring future environmental and human security. Given our appraisal we go on to develop an integrated framework for assessing environmental livelihood security of multiscale and multi-level systems. This framework provides a tangible approach for assessing changes in the water-energy-food-livelihood indicators of a system. Examples of where system applications may occur are discussed for the Southeast Asia and Oceania region. Our approach will be particularly useful for policy-makers to inform evidence-based decision-making, especially in localities where climate change increases the vulnerability of impoverished communities and extenuates environmental livelihood insecurity.
Nelson, Kurt; James, Scott C.; Roberts, Jesse D.; ...
2017-06-05
A modelling framework identifies deployment locations for current-energy-capture devices that maximise power output while minimising potential environmental impacts. The framework, based on the Environmental Fluid Dynamics Code, can incorporate site-specific environmental constraints. Over a 29-day period, energy outputs from three array layouts were estimated for: (1) the preliminary configuration (baseline), (2) an updated configuration that accounted for environmental constraints, (3) and an improved configuration subject to no environmental constraints. Of these layouts, array placement that did not consider environmental constraints extracted the most energy from flow (4.38 MW-hr/day), 19% higher than output from the baseline configuration (3.69 MW-hr/day). Array placementmore » that considered environmental constraints removed 4.27 MW-hr/day of energy (16% more than baseline). In conclusion, this analysis framework accounts for bathymetry and flow-pattern variations that typical experimental studies cannot, demonstrating that it is a valuable tool for identifying improved array layouts for field deployments.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cabrera-Palmer, Belkis
Predicting the performance of radiation detection systems at field sites based on measured performance acquired under controlled conditions at test locations, e.g., the Nevada National Security Site (NNSS), remains an unsolved and standing issue within DNDO’s testing methodology. Detector performance can be defined in terms of the system’s ability to detect and/or identify a given source or set of sources, and depends on the signal generated by the detector for the given measurement configuration (i.e., source strength, distance, time, surrounding materials, etc.) and on the quality of the detection algorithm. Detector performance is usually evaluated in the performance and operationalmore » testing phases, where the measurement configurations are selected to represent radiation source and background configurations of interest to security applications.« less
SPI/U3.2. Security Profile Inspector for UNIX Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartoletti, A.
1994-08-01
SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less
On the security of Y-00 under fast correlation and other attacks on the key
NASA Astrophysics Data System (ADS)
Yuen, Horace P.; Nair, Ranjith
2007-04-01
The security of the Y-00 direct encryption protocol under correlation attack is addressed. A Y-00 configuration that is more secure than AES under known-plaintext attack is presented. It is shown that under any ciphertext-only attack, full information-theoretic security on the Y-00 seed key is obtained for any encryption box ENC with proper deliberate signal randomization.
Cyber Security Audit and Attack Detection Toolkit
DOE Office of Scientific and Technical Information (OSTI.GOV)
Peterson, Dale
2012-05-31
This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.
OS friendly microprocessor architecture: Hardware level computer security
NASA Astrophysics Data System (ADS)
Jungwirth, Patrick; La Fratta, Patrick
2016-05-01
We present an introduction to the patented OS Friendly Microprocessor Architecture (OSFA) and hardware level computer security. Conventional microprocessors have not tried to balance hardware performance and OS performance at the same time. Conventional microprocessors have depended on the Operating System for computer security and information assurance. The goal of the OS Friendly Architecture is to provide a high performance and secure microprocessor and OS system. We are interested in cyber security, information technology (IT), and SCADA control professionals reviewing the hardware level security features. The OS Friendly Architecture is a switched set of cache memory banks in a pipeline configuration. For light-weight threads, the memory pipeline configuration provides near instantaneous context switching times. The pipelining and parallelism provided by the cache memory pipeline provides for background cache read and write operations while the microprocessor's execution pipeline is running instructions. The cache bank selection controllers provide arbitration to prevent the memory pipeline and microprocessor's execution pipeline from accessing the same cache bank at the same time. This separation allows the cache memory pages to transfer to and from level 1 (L1) caching while the microprocessor pipeline is executing instructions. Computer security operations are implemented in hardware. By extending Unix file permissions bits to each cache memory bank and memory address, the OSFA provides hardware level computer security.
Giovanni Zurlini; Irene Petrosillo; Nicola Zaccarelli; Kurt Riitters
2008-01-01
Environmental security, as the opposite of environmental fragility (vulnerability), is multilayered, multi-scale and complex, existing in both the objective realm of biophysics and society, and the subjective realm of individual human perception. For ecological risk assessments (ERAs), the relevant objects of environmental security are social-ecological landscapes (...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-13
... to, or access by, external systems and networks may result in security vulnerabilities to the... configuration may allow the exploitation of network security vulnerabilities resulting in intentional or..., Models ATR42-500 and ATR72-212A Airplanes; Aircraft Electronic System Security Protection From...
Report #12-P-0879, September 26, 2012. The security posture and in-place environmental control review of the computer rooms in the Ariel Rios and Potomac Yard buildings revealed numerous security and environmental control deficiencies.
A programmable palm-size gas analyzer for use in micro-autonomous systems
NASA Astrophysics Data System (ADS)
Gordenker, Robert J. M.; Wise, Kensall D.
2012-06-01
Gas analysis systems having small size, low power, and high selectivity are badly needed for defense (detection of explosives and chemical warfare agents), homeland security, health care, and environmental applications. This paper presents a palm-size gas chromatography system having analysis times of 5-50sec, detection limits less than 1ppb, and an average power dissipation less than one watt. It uses no consumables. The three-chip fluidic system consists of a preconcentrator, a 25cm-3m separation column, and a chemi-resistive detector and is supported by a microcomputer and circuitry for programmable temperature control. The entire system, including the mini-pump and battery, occupies less than 200cc and is configured for use on autonomous robotic vehicles.
Proposal of Secure VoIP System Using Attribute Certificate
NASA Astrophysics Data System (ADS)
Kim, Jin-Mook; Jeong, Young-Ae; Hong, Seong-Sik
VoIP is a service that changes the analogue audio signal into a digital signal and then transfers the audio information to the users after configuring it as a packet; and it has an advantage of lower price than the existing voice call service and better extensibility. However, VoIP service has a system structure that, compared to the existing PSTN (Public Switched Telephone Network), has poor call quality and is vulnerable in the security aspect. To make up these problems, TLS service was introduced to enhance the security. In practical system, however, since QoS problem occurs, it is necessary to develop the VoIP security system that can satisfy QoS at the same time in the security aspect. In this paper, a user authentication VoIP system that can provide a service according to the security and the user through providing a differential service according to the approach of the users by adding AA server at the step of configuring the existing VoIP session is suggested. It was found that the proposed system of this study provides a quicker QoS than the TLS-added system at a similar level of security. Also, it is able to provide a variety of additional services by the different users.
Lee, Adrian J; Jacobson, Sheldon H
2012-02-01
A critical component of aviation security consists of screening passengers and baggage to protect airports and aircraft from terrorist threats. Advancements in screening device technology have increased the ability to detect these threats; however, specifying the operational configurations of these devices in response to changes in the threat environment can become difficult. This article proposes to use Fisher information as a statistical measure for detecting changes in the threat environment. The perceived risk of passengers, according to prescreening information and behavior analysis, is analyzed as the passengers sequentially enter the security checkpoint. The alarm responses from the devices used to detect threats are also analyzed to monitor significant changes in the frequency of threat items uncovered. The key results are that this information-based measure can be used within the Homeland Security Advisory System to indicate changes in threat conditions in real time, and provide the flexibility of security screening detection devices to responsively and automatically adapt operational configurations to these changing threat conditions. © 2012 Society for Risk Analysis. All rights reserved.
Beyond Conflict and Kinetics: Airpower Strategy for Human Security Operations
2014-08-26
America to a leadership role of the international community while dramatically altering its security environment. After World War II, American security...health, environmental, personal, community , and political security. At the same time it stopped short of providing a finite definition, instead...seven areas of human security are economic, food, health, environmental, personal, community and political security. These components are a “universal
NASA Astrophysics Data System (ADS)
Ivanov, A. V.; Reva, I. L.; Babin, A. A.
2018-04-01
The article deals with influence of various ways to place vibration transmitters on efficiency of rooms safety for negotiations. Standing for remote vibration listening of window glass, electro-optical channel, the most typical technical channel of information leakage, was investigated. The modern system “Sonata-AB” of 4B model is used as an active protection tool. Factors influencing on security tools configuration efficiency have been determined. The results allow utilizer to reduce masking interference level as well as parasitic noise with keeping properties of room safety.
Short-term clinical and quality-of-life outcomes in women treated by the TVT-Secur procedure.
Lim, Jeanette L; de Cuyper, Eva M J; Cornish, Ann; Frazer, Malcolm
2010-04-01
The TVT-Secur (Ethicon, Somerville, NJ, USA) is a minimally invasive suburethral synthetic sling used in the treatment of female stress urinary incontinence. It claims to cause less postoperative pain and to enable performing in an office setting. However, this may be at the expense of a significant learning curve and a higher early failure rate. To assess objectively the success rate of the TVT-Secur procedure in the 'U' configuration at six months. Secondary outcomes focussed on subjective success rates, complications, patient satisfaction and quality-of-life (QOL). A prospective observational study was undertaken at two tertiary referral urogynaecology centres. A cohort of 42 consecutive patients with urodynamic stress incontinence who underwent the TVT-Secur procedure in the 'U' configuration between November 2006 and August 2007 were followed up for six months. Three standardised QOL questionnaires were completed preoperatively and at six months. A urogenital history, visual analogue score (VAS) for patient satisfaction, uroflow and urinary stress test were performed at six months. Recruitment was ceased prematurely because of a high number of early failures. Objective and subjective success rates at six months were 58.3% and 51.3% respectively. Complications included urinary tract infections, voiding difficulty, groin discomfort, haematoma, vaginal pain, tape erosion and intra-operative dislodgement of tape. Prevalence of de novo urge incontinence was 10.3%. Only symptom-specific QOL scores improved and only 48.6% indicated a high level satisfaction (VAS > or = 80%) with TVT-Secur. On the basis of this limited study, we are hesitant to recommend the 'U' configuration of the TVT-Secur over its more established counterparts, the TVT and TVT-O.
ViNEL: A Virtual Networking Lab for Cyber Defense Education
ERIC Educational Resources Information Center
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie
2018-01-01
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Detection and response to unauthorized access to a communication device
Smith, Rhett; Gordon, Colin
2015-09-08
A communication gateway consistent with the present disclosure may detect unauthorized physical or electronic access and implement security actions in response thereto. A communication gateway may provide a communication path to an intelligent electronic device (IED) using an IED communications port configured to communicate with the IED. The communication gateway may include a physical intrusion detection port and a network port. The communication gateway may further include control logic configured to evaluate physical intrusion detection signal. The control logic may be configured to determine that the physical intrusion detection signal is indicative of an attempt to obtain unauthorized access to one of the communication gateway, the IED, and a device in communication with the gateway; and take a security action based upon the determination that the indication is indicative of the attempt to gain unauthorized access.
Cyber-Physical Security Assessment (CyPSA) Toolset
DOE Office of Scientific and Technical Information (OSTI.GOV)
Garcia, Luis; Patapanchala, Panini; Zonouz, Saman
CyPSA seeks to organize and gain insight into the diverse sets of data that a critical infrastructure provider must manage. Specifically CyPSA inventories, manages, and analyzes assets and relations among those assets. A variety of interfaces are provided. CyPSA inventories assets (both cyber and physical). This may include the cataloging of assets through a common interface. Data sources used to generate a catalogue of assets include PowerWorld, NPView, NMap Scans, and device configurations. Depending upon the role of the person using the tool the types of assets accessed as well as the data sources through which asset information is accessedmore » may vary. CyPSA allows practitioners to catalogue relations among assets and these may either be manually or programmatically generated. For example, some common relations among assets include the following: Topological Network Data: Which devices and assets are connected and how? Data sources for this kind of information include NMap scans, NPView topologies (via Firewall rule analysis). Security Metrics Outputs: The output of various security metrics such as overall exposure. Configure Assets:CyPSA may eventually include the ability to configure assets including relays and switches. For example, a system administrator would be able to configure and alter the state of a relay via the CyPSA interface. Annotate Assets: CyPSA also allows practitioners to manually and programmatically annotate assets. Sources of information with which to annotate assets include provenance metadata regarding the data source from which the asset was loaded, vulnerability information from vulnerability databases, configuration information, and the output of an analysis in general.« less
Enterotoxin Vaccine Delivery System With Bioadherence. Phase 1.
1995-12-05
Microencapsulation 33 Bioadhesive Biodegradable 16. PRICE CODE Perorally Controlled Delivery 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY...this magnitude requires a delivery system configured with a bioadhesive polymer that integrates the surface of the microcapsules and the mucosa. SBIR...integrates the surface of the microcapsules and the mucosa. SBIR Phase I Program efforts focused on the development of the most feasible method(s) for
NASA Astrophysics Data System (ADS)
Poat, M. D.; Lauret, J.; Betts, W.
2015-12-01
The STAR online computing environment is an intensive ever-growing system used for real-time data collection and analysis. Composed of heterogeneous and sometimes groups of custom-tuned machines, the computing infrastructure was previously managed by manual configurations and inconsistently monitored by a combination of tools. This situation led to configuration inconsistency and an overload of repetitive tasks along with lackluster communication between personnel and machines. Globally securing this heterogeneous cyberinfrastructure was tedious at best and an agile, policy-driven system ensuring consistency, was pursued. Three configuration management tools, Chef, Puppet, and CFEngine have been compared in reliability, versatility and performance along with a comparison of infrastructure monitoring tools Nagios and Icinga. STAR has selected the CFEngine configuration management tool and the Icinga infrastructure monitoring system leading to a versatile and sustainable solution. By leveraging these two tools STAR can now swiftly upgrade and modify the environment to its needs with ease as well as promptly react to cyber-security requests. By creating a sustainable long term monitoring solution, the detection of failures was reduced from days to minutes, allowing rapid actions before the issues become dire problems, potentially causing loss of precious experimental data or uptime.
33 CFR 183.530 - Spud, pipe, and hose fitting configuration.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Spud, pipe, and hose fitting configuration. 183.530 Section 183.530 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) BOATING SAFETY BOATS AND ASSOCIATED EQUIPMENT Fuel Systems Equipment Standards § 183...
Analysis of Access Control Policies in Operating Systems
ERIC Educational Resources Information Center
Chen, Hong
2009-01-01
Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…
Continuous Security and Configuration Monitoring of HPC Clusters
DOE Office of Scientific and Technical Information (OSTI.GOV)
Garcia-Lomeli, H. D.; Bertsch, A. D.; Fox, D. M.
Continuous security and configuration monitoring of information systems has been a time consuming and laborious task for system administrators at the High Performance Computing (HPC) center. Prior to this project, system administrators had to manually check the settings of thousands of nodes, which required a significant number of hours rendering the old process ineffective and inefficient. This paper explains the application of Splunk Enterprise, a software agent, and a reporting tool in the development of a user application interface to track and report on critical system updates and security compliance status of HPC Clusters. In conjunction with other configuration managementmore » systems, the reporting tool is to provide continuous situational awareness to system administrators of the compliance state of information systems. Our approach consisted of the development, testing, and deployment of an agent to collect any arbitrary information across a massively distributed computing center, and organize that information into a human-readable format. Using Splunk Enterprise, this raw data was then gathered into a central repository and indexed for search, analysis, and correlation. Following acquisition and accumulation, the reporting tool generated and presented actionable information by filtering the data according to command line parameters passed at run time. Preliminary data showed results for over six thousand nodes. Further research and expansion of this tool could lead to the development of a series of agents to gather and report critical system parameters. However, in order to make use of the flexibility and resourcefulness of the reporting tool the agent must conform to specifications set forth in this paper. This project has simplified the way system administrators gather, analyze, and report on the configuration and security state of HPC clusters, maintaining ongoing situational awareness. Rather than querying each cluster independently, compliance checking can be managed from one central location.« less
78 FR 32696 - China Environmental Protection, Inc., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-31
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China Environmental Protection, Inc., Order of Suspension of Trading May 29, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China Environmental Protection, Inc. because it has not filed any periodi...
Cloud-Based Virtual Laboratory for Network Security Education
ERIC Educational Resources Information Center
Xu, Le; Huang, Dijiang; Tsai, Wei-Tek
2014-01-01
Hands-on experiments are essential for computer network security education. Existing laboratory solutions usually require significant effort to build, configure, and maintain and often do not support reconfigurability, flexibility, and scalability. This paper presents a cloud-based virtual laboratory education platform called V-Lab that provides a…
Sustainable Food Security Measurement: A Systemic Methodology
NASA Astrophysics Data System (ADS)
Findiastuti, W.; Singgih, M. L.; Anityasari, M.
2017-04-01
Sustainable food security measures how a region provides food for its people without endangered the environment. In Indonesia, it was legally measured in Food Security and Vulnerability (FSVA). However, regard to sustainable food security policy, the measurement has not encompassed the environmental aspect. This will lead to lack of environmental aspect information for adjusting the next strategy. This study aimed to assess Sustainable Food security by encompassing both food security and environment aspect using systemic eco-efficiency. Given existing indicator of cereal production level, total emission as environment indicator was generated by constructing Causal Loop Diagram (CLD). Then, a stock-flow diagram was used to develop systemic simulation model. This model was demonstrated for Indonesian five provinces. The result showed there was difference between food security order with and without environmental aspect assessment.
VMSoar: a cognitive agent for network security
NASA Astrophysics Data System (ADS)
Benjamin, David P.; Shankar-Iyer, Ranjita; Perumal, Archana
2005-03-01
VMSoar is a cognitive network security agent designed for both network configuration and long-term security management. It performs automatic vulnerability assessments by exploring a configuration"s weaknesses and also performs network intrusion detection. VMSoar is built on the Soar cognitive architecture, and benefits from the general cognitive abilities of Soar, including learning from experience, the ability to solve a wide range of complex problems, and use of natural language to interact with humans. The approach used by VMSoar is very different from that taken by other vulnerability assessment or intrusion detection systems. VMSoar performs vulnerability assessments by using VMWare to create a virtual copy of the target machine then attacking the simulated machine with a wide assortment of exploits. VMSoar uses this same ability to perform intrusion detection. When trying to understand a sequence of network packets, VMSoar uses VMWare to make a virtual copy of the local portion of the network and then attempts to generate the observed packets on the simulated network by performing various exploits. This approach is initially slow, but VMSoar"s learning ability significantly speeds up both vulnerability assessment and intrusion detection. This paper describes the design and implementation of VMSoar, and initial experiments with Windows NT and XP.
76 FR 27642 - Department of Homeland Security; Transfer of Data
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-12
... Subjects Environmental protection, Business and industry, Government property, Security measures. Dated... Security; Transfer of Data AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: This... Cosmetic Act (FFDCA), including information that may have been claimed as Confidential Business Information...
Water-Energy-Food Nexus in Asia-Pacific Ring of Fire
NASA Astrophysics Data System (ADS)
Taniguchi, M.; Endo, A.; Gurdak, J. J.; Allen, D. M.; Siringan, F.; Delinom, R.; Shoji, J.; Fujii, M.; Baba, K.
2013-12-01
Climate change and economic development are causing increased pressure on water, energy and food resources, presenting communities with increased levels of tradeoffs and potential conflicts among these resources. Therefore, the water-energy-food nexus is one of the most important and fundamental global environmental issues facing the world. For the purposes of this research project, we define human-environmental security as the joint optimization between human and environmental security as well as the water-energy-food nexus. To optimize the governance and management within these inter-connected needs, it is desirable to increase human-environmental security by improving social managements for the water-energy-food nexus. In this research project, we intend to establish a method to manage and optimize the human-environmental security of the water-energy-food nexus by using integrated models, indices, and maps as well as social and natural investigations with stakeholder analyses. We base our approach on the viewpoint that it is important for a sustainable society to increase human-environmental security with decreasing risk and increasing resilience by optimizing the connections within the critical water-energy and water-food clusters. We will take a regional perspective to address these global environmental problems. The geological and geomorphological conditions in our proposed study area are heavily influenced by the so-called 'Ring of Fire,' around the Pacific Ocean. Within these areas including Japan and Southeast Asia, the hydro-meteorological conditions are dominated by the Asia monsoon. The populations that live under these natural conditions face elevated risk and potential disaster as negative impacts, while also benefitting from positive ecological goods and services. There are therefore tradeoffs and conflicts within the water-energy-food nexus, as well as among various stakeholders in the region. The objective of this project is to maximize human-environmental security (minimize the risk) by choosing management structures and policies that optimize both the water-food-energy nexus in Asia-Pacific coastal regions. We define joint security approach as optimized policy. Optimal policies will develop joint security approaches for human-environmental security in the coastal region of the Ring of Fire, including stakeholders and decision-makers.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartoletti, T.
SPI/U3.1 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Inspector Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartoletti, Tony
SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less
Ver-i-Fus: an integrated access control and information monitoring and management system
NASA Astrophysics Data System (ADS)
Thomopoulos, Stelios C.; Reisman, James G.; Papelis, Yiannis E.
1997-01-01
This paper describes the Ver-i-Fus Integrated Access Control and Information Monitoring and Management (IAC-I2M) system that INTELNET Inc. has developed. The Ver-i-Fus IAC-I2M system has been designed to meet the most stringent security and information monitoring requirements while allowing two- way communication between the user and the system. The systems offers a flexible interface that permits to integrate practically any sensing device, or combination of sensing devices, including a live-scan fingerprint reader, thus providing biometrics verification for enhanced security. Different configurations of the system provide solutions to different sets of access control problems. The re-configurable hardware interface, tied together with biometrics verification and a flexible interface that allows to integrate Ver-i-Fus with an MIS, provide an integrated solution to security, time and attendance, labor monitoring, production monitoring, and payroll applications.
2006-09-01
data transform set contains : the security protocol (AH and/or ESP, connection mode (tunnel or transport), encryption information (DES, 3DES, AES...Management Information Base, version 2) objects are variables that contain data about the system. They are defined as part of the Simple Network...Avon Park was configured for access on the concentrator. c. Security Association (SA) • A security association contains all of the information
Wireless local area network security.
Bergeron, Bryan P
2004-01-01
Wireless local area networks (WLANs) are increasingly popular in clinical settings because they facilitate the use of wireless PDAs, laptops, and other pervasive computing devices at the point of care. However, because of the relative immaturity of wireless network technology and evolving standards, WLANs, if improperly configured, can present significant security risks. Understanding the security limitations of the technology and available fixes can help minimize the risks of clinical data loss and maintain compliance with HIPAA guidelines.
Novel technology for enhanced security and trust in communication networks
NASA Astrophysics Data System (ADS)
Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit; Jannson, Tomasz
2011-06-01
A novel technology that significantly enhances security and trust in wireless and wired communication networks has been developed. It is based on integration of a novel encryption mechanism and novel data packet structure with enhanced security tools. This novel data packet structure results in an unprecedented level of security and trust, while at the same time reducing power consumption and computing/communication overhead in networks. As a result, networks are provided with protection against intrusion, exploitation, and cyber attacks and posses self-building, self-awareness, self-configuring, self-healing, and self-protecting intelligence.
1999-07-01
Environmental Security . . . . . . . . . . . . . . . . . . . . 17 Robert E. Ebel Caspian Basin Oil and Gas: An Overview . . . . . . . . . . . 21 Brian R ...choke point near Baku, posing a threat to security of supply. 32 ENVIRONMENTAL BASELINE ANALYSIS OF THE CASPIAN SEA REGION BRIAN R . SHAW TERRY...up to 70% of the seasonal Caspian Sea level. Sources of water include runoff ( R ), precipitation (P), and groundwater flow (G); sink include
Sánchez, Óscar J; Cardona, Carlos A
2012-01-01
In this work, the hierarchical decomposition methodology was used to conceptually design the production of fuel ethanol from sugarcane. The decomposition of the process into six levels of analysis was carried out. Several options of technological configurations were assessed in each level considering economic and environmental criteria. The most promising alternatives were chosen rejecting the ones with a least favorable performance. Aspen Plus was employed for simulation of each one of the technological configurations studied. Aspen Icarus was used for economic evaluation of each configuration, and WAR algorithm was utilized for calculation of the environmental criterion. The results obtained showed that the most suitable synthesized flowsheet involves the continuous cultivation of Zymomonas mobilis with cane juice as substrate and including cell recycling and the ethanol dehydration by molecular sieves. The proposed strategy demonstrated to be a powerful tool for conceptual design of biotechnological processes considering both techno-economic and environmental indicators. Copyright © 2011 Elsevier Ltd. All rights reserved.
Toward Automating Web Protocol Configuration for a Programmable Logic Controller Emulator
2014-06-19
Security Risks for Industrial Control Systems ,” VDE 2004 Congress, Berlin, Germany, October 2004, pp. 1-7. [Cis12] Cisco, NetFlow Configuration Guide...Date 29 May 2014 Date AFIT-ENG-T-14-J-4 Abstract Industrial Control Systems (ICS) remain vulnerable through attack vectors that exist within programmable...5 2.2 Industrial Control Systems
7 CFR 1951.210 - Environmental requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
..., assumptions, subordinations, sale or exchange of security property, and leasing of security will be reviewed for compliance with subpart G of part 1940 of this chapter. The appropriate environmental review will..., the completed environmental review will be included with other information submitted. ...
Report #12-P-0847, September 21, 2012.Our review of the security posture and in-place environmental controls of EPA’s Radiation and Indoor Environments National Laboratory computer room disclosed an array of security and environmental control deficiencies.
Recent biosensing developments in environmental security.
Wanekaya, Adam K; Chen, Wilfred; Mulchandani, Ashok
2008-06-01
Environmental security is one of the fundamental requirements of our well being. However, it still remains a major global challenge. Therefore, in addition to reducing and/or eliminating the amounts of toxic discharges into the environment, there is need to develop techniques that can detect and monitor these environmental pollutants in a sensitive and selective manner to enable effective remediation. Because of their integrated nature, biosensors are ideal for environmental monitoring and detection as they can be portable and provide selective and sensitive rapid responses in real time. In this review we discuss the main concepts behind the development of biosensors that have most relevant applications in the field of environmental monitoring and detection. We also review and document recent trends and challenges in biosensor research and development particularly in the detection of species of environmental significance such as organophosphate nerve agents, heavy metals, organic contaminants, pathogenic microorganisms and their toxins. Special focus will be given to the trends that have the most promising applications in environmental security. We conclude by highlighting the directions towards which future biosensors research in environmental security sector might proceed.
32 CFR 989.4 - Initial considerations.
Code of Federal Regulations, 2010 CFR
2010-07-01
... national security interests while at the same time considering important environmental factors. (g... Under Secretary of Defense (Environmental Security). This coordination requirement does not apply to...
Pies, Ross E.
2016-03-29
A method and device for the detection of impact events on a security barrier. A hollow rebar is farmed within a security barrier, whereby the hollow rebar is completely surrounded by the security barrier. An optical fiber passes through the interior of the hollow rebar. An optical transmitter and an optical receiver are both optically connected to the optical fiber and connected to optical electronics. The optical electronics are configured to provide notification upon the detection of an impact event at the security barrier based on the detection of disturbances within the optical fiber.
Security-Enhanced Push Button Configuration for Home Smart Control.
Han, Junghee; Park, Taejoon
2017-06-08
With the emergence of smart and converged home services, the need for the secure and easy interplay of various devices has been increased. Push Button Configuration (PBC) is one of the technologies proposed for easy set-up of a secure session between IT and consumer devices. Although the Wi-Fi Direct specification explicitly states that all devices must support the PBC method, its applicability is very limited. This is because the security vulnerability of PBC can be maliciously exploited so that attackers can make illegitimate sessions with consumer devices. To address this problem, this paper proposes a novel Security-enhanced PBC (SePBC) scheme with which we can uncover suspicious or malicious devices. The proposed mechanism has several unique features. First, we develop a secure handshake distance measurement protocol by preventing an adversary sitting outside the region from maliciously manipulating its distance to be fake. Second, it is compatible with the original Wi-Fi PBC without introducing a brand-new methodology. Finally, SePBC uses lightweight operations without CPU-intensive cryptography computation and employs inexpensive H/W. Moreover, it needs to incur little overhead when there is no attack. This paper also designs and implements the proposed SePBC in the real world. Our experimental results and analysis show that the proposed SePBC scheme effectively defeats attacks on PBC while minimizing the modification of the original PBC equipment.
Security-Enhanced Push Button Configuration for Home Smart Control †
Han, Junghee; Park, Taejoon
2017-01-01
With the emergence of smart and converged home services, the need for the secure and easy interplay of various devices has been increased. Push Button Configuration (PBC) is one of the technologies proposed for easy set-up of a secure session between IT and consumer devices. Although the Wi-Fi Direct specification explicitly states that all devices must support the PBC method, its applicability is very limited. This is because the security vulnerability of PBC can be maliciously exploited so that attackers can make illegitimate sessions with consumer devices. To address this problem, this paper proposes a novel Security-enhanced PBC (SePBC) scheme with which we can uncover suspicious or malicious devices. The proposed mechanism has several unique features. First, we develop a secure handshake distance measurement protocol by preventing an adversary sitting outside the region from maliciously manipulating its distance to be fake. Second, it is compatible with the original Wi-Fi PBC without introducing a brand-new methodology. Finally, SePBC uses lightweight operations without CPU-intensive cryptography computation and employs inexpensive H/W. Moreover, it needs to incur little overhead when there is no attack. This paper also designs and implements the proposed SePBC in the real world. Our experimental results and analysis show that the proposed SePBC scheme effectively defeats attacks on PBC while minimizing the modification of the original PBC equipment. PMID:28594370
Nevada National Security Site Environmental Report 2011
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cathy Wills, ed
2012-09-12
This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment,more » Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.« less
Secrecy vs. the need for ecological information: challenges to environmental activism in Russia.
Jandl, T
1998-01-01
This article identifies the lessons learned from the Nikitin case study in Russia. The Nikitin case involves the analysis of sources of radioactive contamination in several Russian counties and in the Russian Northern Fleet. Norway was interested in the issue due to proximity to the storage sites. The issue involved national security and environmental protection. It was learned that mixing national security issues with environmental issues offers dangerous and multiple challenges. Environmental groups must build relationships with a wide audience. International security policy must include the issues of globalization of trade and the spread of environmental problems into the global commons (oceans and atmosphere). The risk of an environmentally dangerous accident as a consequence of Cold War activities is greater than the risk of nuclear war. Secrecy in military affairs is not justified when there is inadequate storage of nuclear weapons and contaminated materials. In Russia, the concern is great due to their economic transition and shortages of funds for even the most basic needs, which excludes nuclear waste clean up. The Bellona Foundation studied the extent of nuclear pollution from military nuclear reactors in the Kola peninsula of northwest Russia, in 1994 and 1996. Russian security police arrested one of the report authors for alleged national security violations. A valuable lesson learned was that local Russian environmental groups needed international support. The military nuclear complex poses an enormous hazard. Limiting inspections is an unacceptable national security risk. The new Russian law on state secrets is too broad.
IT Security Support for Spaceport Command and Control System
NASA Technical Reports Server (NTRS)
McLain, Jeffrey
2013-01-01
During the fall 2013 semester, I worked at the Kennedy Space Center as an IT Security Intern in support of the Spaceport Command and Control System under the guidance of the IT Security Lead Engineer. Some of my responsibilities included assisting with security plan documentation collection, system hardware and software inventory, and malicious code and malware scanning. Throughout the semester, I had the opportunity to work on a wide range of security related projects. However, there are three projects in particular that stand out. The first project I completed was updating a large interactive spreadsheet that details the SANS Institutes Top 20 Critical Security Controls. My task was to add in all of the new commercial of the shelf (COTS) software listed on the SANS website that can be used to meet their Top 20 controls. In total, there are 153 unique security tools listed by SANS that meet one or more of their 20 controls. My second project was the creation of a database that will allow my mentor to keep track of the work done by the contractors that report to him in a more efficient manner by recording events as they occur throughout the quarter. Lastly, I expanded upon a security assessment of the Linux machines being used on center that I began last semester. To do this, I used a vulnerability and configuration tool that scans hosts remotely through the network and presents the user with an abundance of information detailing each machines configuration. The experience I gained from working on each of these projects has been invaluable, and I look forward to returning in the spring semester to continue working with the IT Security team.
Armstrong, Lucas C; Chong, Alexander; Livermore, Ryan W; Prohaska, Daniel J; Doyon, Amanda N; Wooley, Paul H
2015-04-01
We conducted a study to evaluate biomechanical performance during destructive testing of several different suture materials in various arthroscopic knot configurations under both in vitro and in situ conditions. Surgeons of different levels of experience tied the knots. Three different arthroscopic knots (static surgeon's, Weston, Tennessee slider) with 3 reverse half-hitches on alternating posts were tested using Fiberwire, ForceFiber, Orthocord, and Ultrabraid suture materials under both in vitro and in situ (blood plasma at 37°C) conditions. Three surgeons of different experience levels tied the knots on a post 30 mm in circumference. A single load-to-failure test was performed. There were no significant in vitro-in situ differences for Ultrabraid in the different knot configurations or with the different experience levels. Surgeon B (intermediate experience) showed no significant differences between test conditions for any knot configuration or suture material. With Tennessee slider knots, surgeon C (least experience) showed significantly lower clinical failure load under both test conditions and had a higher percentage of complete knot slippage. Surgeon B had no knot slippage with use of Fiberwire. Both the aqueous environment and the surgeon's familiarity with certain knots have an effect on knot security.
Flexible and Secure Computer-Based Assessment Using a Single Zip Disk
ERIC Educational Resources Information Center
Ko, C. C.; Cheng, C. D.
2008-01-01
Electronic examination systems, which include Internet-based system, require extremely complicated installation, configuration and maintenance of software as well as hardware. In this paper, we present the design and development of a flexible, easy-to-use and secure examination system (e-Test), in which any commonly used computer can be used as a…
Security Criteria for Distributed Systems: Functional Requirements.
1995-09-01
Open Company Limited. Ziv , J. and A. Lempel . 1977. A Universal Algorithm for Sequential Data Compression . IEEE Transactions on Information Theory Vol...3, SCF-5 DCF-7. Configurable Cryptographic Algorithms (a) It shall be possible to configure the system such that the data confidentiality functions...use different cryptographic algorithms for different protocols (e.g., mail or interprocess communication data ). (b) The modes of encryption
Cooperative Autonomous Robots for Reconnaissance
2009-03-06
REPORT Cooperative Autonomous Robots for Reconnaissance 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Collaborating mobile robots equipped with WiFi ...Cooperative Autonomous Robots for Reconnaissance Report Title ABSTRACT Collaborating mobile robots equipped with WiFi transceivers are configured as a mobile...equipped with WiFi transceivers are configured as a mobile ad-hoc network. Algorithms are developed to take advantage of the distributed processing
When trust defies common security sense.
Williams, Patricia A H
2008-09-01
Primary care medical practices fail to recognize the seriousness of security threats to their patient and practice information. This can be attributed to a lack of understanding of security concepts, underestimation of potential threats and the difficulty in configuration of security technology countermeasures. To appreciate the factors contributing to such problems, research into general practitioner security practice and perceptions of security was undertaken. The investigation focused on demographics, actual practice, issues and barriers, and practitioner perception. Poor implementation, lack of relevant knowledge and inconsistencies between principles and practice were identified as key themes. Also the results revealed an overwhelming reliance on trust in staff and in computer information systems. This clearly identified that both cultural and technical attributes contribute to the deficiencies in information security practice. The aim of this research is to understand user needs and problems when dealing with information security practice.
Rivera, Rebecca L; Dunne, Jennifer; Maulding, Melissa K; Wang, Qi; Savaiano, Dennis A; Nickols-Richardson, Sharon M; Eicher-Miller, Heather A
2018-04-01
To investigate the association of policy, systems and environmental factors with improvement in household food security among low-income Indiana households with children after a Supplemental Nutrition Assistance Program-Education (SNAP-Ed) direct nutrition education intervention. Household food security scores measured by the eighteen-item US Household Food Security Survey Module in a longitudinal randomized and controlled SNAP-Ed intervention study conducted from August 2013 to April 2015 were the response variable. Metrics to quantify environmental factors including classification of urban or rural county status; the number of SNAP-authorized stores, food pantries and recreational facilities; average fair market housing rental price; and natural amenity rank were collected from government websites and data sets covering the years 2012-2016 and used as covariates in mixed multiple linear regression modelling. Thirty-seven Indiana counties, USA, 2012-2016. SNAP-Ed eligible adults from households with children (n 328). None of the environmental factors investigated were significantly associated with changes in household food security in this exploratory study. SNAP-Ed improves food security regardless of urban or rural location or the environmental factors investigated. Expansion of SNAP-Ed in rural areas may support food access among the low-income population and reduce the prevalence of food insecurity in rural compared with urban areas. Further investigation into policy, systems and environmental factors of the Social Ecological Model are warranted to better understand their relationship with direct SNAP-Ed and their impact on diet-related behaviours and food security.
The Security Email Based on Smart Card
NASA Astrophysics Data System (ADS)
Lina, Zhang; Jiang, Meng Hai.
Email has become one of the most important communication tools in modern internet society, and its security is an important issue that can't be ignored. The security requirements of Email can be summarized as confidentiality, integrity, authentication and non-repudiation. Recently many researches on IBE (identify based encrypt) have been carried out to solve these security problems. However, because of IBE's fatal flaws and great advantages of PKI (Public Key Infrastructure), PKI is found to be still irreplaceable especially in the applications based on smart card. In this paper, a construction of security Email is presented, then the design of relatively cryptography algorithms and the configuration of certificates are elaborated, and finally the security for the proposed system is discussed.
NASA Technical Reports Server (NTRS)
Afjeh, Abdollah A.; Reed, John A.
2003-01-01
The following reports are presented on this project:A first year progress report on: Development of a Dynamically Configurable,Object-Oriented Framework for Distributed, Multi-modal Computational Aerospace Systems Simulation; A second year progress report on: Development of a Dynamically Configurable, Object-Oriented Framework for Distributed, Multi-modal Computational Aerospace Systems Simulation; An Extensible, Interchangeable and Sharable Database Model for Improving Multidisciplinary Aircraft Design; Interactive, Secure Web-enabled Aircraft Engine Simulation Using XML Databinding Integration; and Improving the Aircraft Design Process Using Web-based Modeling and Simulation.
ERIC Educational Resources Information Center
Simonneaux, Jean; Simonneaux, Laurence
2012-01-01
Education for Sustainability has become an institutional requirement in many countries. It takes many forms that can integrate the teaching of environmental Socioscientific Issues (SSIs). In this context, we present the French notion of Socially Acute Questions (SAQs). We develop a theoretical frame to analyse educational configurations applied to…
Nevada National Security Site Environmental Report 2013
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, C.
2014-09-09
This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmentalmore » Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-01
... Environmental Services, Inc., Dupont Direct Financial Holdings, Inc., New Paradigm Software Corp. (n/k/a Brunton... concerning the securities of Commodore Environmental Services, Inc. because it has not filed any periodic... accurate information concerning the securities of New Paradigm Software Corp. (n/k/a Brunton Vineyards...
Ageing-in-place with the use of ambient intelligence technology: perspectives of older users.
van Hoof, J; Kort, H S M; Rutten, P G S; Duijnstee, M S H
2011-05-01
Ambient intelligence technologies are a means to support ageing-in-place by monitoring clients in the home. In this study, monitoring is applied for the purpose of raising an alarm in an emergency situation, and thereby, providing an increased sense of safety and security. Apart from these technological solutions, there are numerous environmental interventions in the home environment that can support people to age-in-place. The aim of this study was to investigate the needs and motives, related to ageing-in-place, of the respondents receiving ambient intelligence technologies, and to investigate whether, and how, these technologies contributed to aspects of ageing-in-place. This paper presents the results of a qualitative study comprised of interviews and observations of technology and environmental interventions in the home environment among 18 community-dwelling older adults with a complex demand for care. These respondents had a prototype of the Unattended Autonomous Surveillance system, an example of ambient intelligence technology, installed in their homes as a means to age-in-place. The UAS-system offers a large range of functionalities, including mobility monitoring, voice response, fire detection, as well as wandering detection and prevention, which can be installed in different configurations. The respondents had various motives to use ambient intelligence technologies to support ageing-in-place. The most prominent reason was to improve the sense of safety and security, in particular, in case of fall incidents, when people were afraid not to be able to use their existing emergency response systems. The ambient intelligence technologies were initially seen as a welcome addition to strategies already adopted by the respondents, including a variety of home modifications and assistive devices. The systems tested increased the sense of safety and security and helped to postpone institutionalisation. Respondents came up with a set of specifications in terms of the operation and the design of the technology. False alarms were also regarded as a sign that the ambient intelligence technology is functioning. Moreover, a good integration of the new technologies in the provision of health care is indispensable, and installation should be done in an acceptable and unobtrusive manner. Ambient intelligence technologies can contribute to an increased safety and security at home. The technologies alone offer no all encompassing solution as home care and additional environmental interventions are still needed to support ageing-in-place. Results of the study are used to further improve the ambient intelligence technologies and their implementation. 2011 Elsevier Ireland Ltd. All rights reserved.
Verhoeven, Harry
2013-11-13
As key economic, ecological and demographic trends converge to reshape Africa and its relationship with the outside world, a new politics is emerging in the twenty-first century around the water-food-energy nexus, which is central to the continent's relevance in the global economy. On the one hand, Malthusian anxieties are proliferating; pessimists link population growth and growing water scarcity to state failure and 'water wars'. On the other hand, entrepreneurs, sovereign wealth funds and speculators consider Africa's potential in water resources, energy production and food output as one of the last great untapped opportunities for the global economy: Africa is on the brink of an agro-industrial transformation. This article examines how African actors are not merely responding to economic and environmental changes but also thinking politically about water, food and energy security. Many of them are seizing the new opportunities to redefine their national politics, their relationship with local communities and their ties with external players, regionally and globally. Ethiopia's project of hydro-agricultural state-building helps to identify the most important fault lines of this new politics at the national, local and international level. The politics of water security and energy development simultaneously puts African states and their populations on the defensive, as they grapple with huge challenges, but also provides them with unique opportunities to take advantage of a more favourable global configuration of forces.
Portable convertible blast effects shield
Pastrnak, John W.; Hollaway, Rocky; Henning, Carl D.; Deteresa, Steve; Grundler, Walter; Hagler,; Lisle B.; Kokko, Edwin; Switzer, Vernon A
2010-10-26
A rapidly deployable portable convertible blast effects shield/ballistic shield includes a set two or more telescoping cylindrical rings operably connected to each other to convert between a telescopically-collapsed configuration for storage and transport, and a telescopically-extended upright configuration forming an expanded inner volume. In a first embodiment, the upright configuration provides blast effects shielding, such as against blast pressures, shrapnel, and/or fire balls. And in a second embodiment, the upright configuration provides ballistic shielding, such as against incoming weapons fire, shrapnel, etc. Each ring has a high-strength material construction, such as a composite fiber and matrix material, capable of substantially inhibiting blast effects and impinging projectiles from passing through the shield. And the set of rings are releasably securable to each other in the telescopically-extended upright configuration, such as by click locks.
Portable convertible blast effects shield
Pastrnak, John W [Livermore, CA; Hollaway, Rocky [Modesto, CA; Henning, Carl D [Livermore, CA; Deteresa, Steve [Livermore, CA; Grundler, Walter [Hayward, CA; Hagler, Lisle B [Berkeley, CA; Kokko, Edwin [Dublin, CA; Switzer, Vernon A [Livermore, CA
2007-05-22
A rapidly deployable portable convertible blast effects shield/ballistic shield includes a set two or more telescoping cylindrical rings operably connected to each other to convert between a telescopically-collapsed configuration for storage and transport, and a telescopically-extended upright configuration forming an expanded inner volume. In a first embodiment, the upright configuration provides blast effects shielding, such as against blast pressures, shrapnel, and/or fire balls. And in a second embodiment, the upright configuration provides ballistic shielding, such as against incoming weapons fire, shrapnel, etc. Each ring has a high-strength material construction, such as a composite fiber and matrix material, capable of substantially inhibiting blast effects and impinging projectiles from passing through the shield. And the set of rings are releasably securable to each other in the telescopically-extended upright configuration, such as by click locks.
40 CFR 205.157-3 - Configuration identification.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 25 2011-07-01 2011-07-01 false Configuration identification. 205.157-3 Section 205.157-3 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS Motorcycles § 205.157-3 Configuration...
40 CFR 205.157-3 - Configuration identification.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Configuration identification. 205.157-3 Section 205.157-3 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS Motorcycles § 205.157-3 Configuration...
2009-01-01
Cattle raiding and the effects of poaching would likely intensify as well. Fisheries may be adversely impacted due to climatic effects on coral...organized crime to set roots in southern Africa during the early 1990s. Chinese gangs have since diversified into trafficking of poached rhino horn...charged with poaching rhino horn for shipment to China.90 Intelligence sources developed by Botswana security personnel for anti- poaching purposes
Worldwide Emerging Environmental Issues Affecting the U.S. Military. January 2010 Report
2010-01-01
key farmland in Africa on a long-term basis. The report notes that it is critical to ensure that such contracts promote shared food security ...Technological Advances with Environmental Security Implications………………..4 6.1 New Detection and Cleanup Techniques…………………………………………...…4 6.2...Regulatory Regime might be adjusted to Include Nanomaterials…..6 7.2 Monopoly over Rare Earth Elements Raises Security and Environmental Concerns…..7
Environmental Security in the Danube River Basin: Policy Implications for the United States
1999-01-01
United Nations Environmental Programme and Centre for Human Settlements jointly formed a Balkans Task Force that has been conducting independent and...1199 V ACKNOWLEDGMENTS I would like to thank the United States Air Force Institute for National Security Studies (TNSS) and the Army Environmental...regularly scheduled course on Responsibilities of Military Forces in Environmental Protection. Mr. Robert Jarrett of AEPI provided valuable review
Seeger, Thomas; Dreier, Thomas; Chen, Weidong; Kearny, Sean; Kulatilaka, Waruna
2017-04-10
This Applied Optics feature issue on laser applications to chemical, security, and environmental analysis (LACSEA) highlights papers presented at the LACSEA 2016 Fifteenth Topical Meeting sponsored by the Optical Society of America.
Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.
2016-02-02
A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.
PUREX/UO{sub 3} deactivation project management plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
Washenfelder, D.J.
1993-12-01
From 1955 through 1990, the Plutonium-Uranium Extraction Plant (PUREX) provided the United States Department of Energy Hanford Site with nuclear fuel reprocessing capability. It operated in sequence with the Uranium Trioxide (UO{sub 3}) Plant, which converted the PUREX liquid uranium nitrate product to solid UO{sub 3} powder. Final UO{sub 3} Plant operation ended in 1993. In December 1992, planning was initiated for the deactivation of PUREX and UO{sub 3} Plant. The objective of deactivation planning was to identify the activities needed to establish a passively safe, environmentally secure configuration at both plants, and ensure that the configuration could be retainedmore » during the post-deactivation period. The PUREX/UO{sub 3} Deactivation Project management plan represents completion of the planning efforts. It presents the deactivation approach to be used for the two plants, and the supporting technical, cost, and schedule baselines. Deactivation activities concentrate on removal, reduction, and stabilization of the radioactive and chemical materials remaining at the plants, and the shutdown of the utilities and effluents. When deactivation is completed, the two plants will be left unoccupied and locked, pending eventual decontamination and decommissioning. Deactivation is expected to cost $233.8 million, require 5 years to complete, and yield $36 million in annual surveillance and maintenance cost savings.« less
Environmental influences on food security in high-income countries.
Gorton, Delvina; Bullen, Chris R; Mhurchu, Cliona Ni
2010-01-01
Food security is a fundamental human right yet many people are food insecure, even in high-income countries. Reviewed here is the evidence for the physical, economic, sociocultural, and political environmental influences on household food security in high-income countries. The literature was evaluated using the ANGELO framework, which is a lens developed for understanding the environmental factors underpinning the obesity pandemic. A review of the literature identified 78 articles, which mostly reported on cross-sectional or qualitative studies. These studies identified a wide range of factors associated with food security. Foremost among them was household financial resources, but many other factors were identified and the complexity of the issue was highlighted. Few studies were prospective and even fewer tested the use of interventions other than the supplemental nutrition assistance program to address food security. This indicates a solution-oriented research paradigm is required to identify effective interventions and policies to enhance food security. In addition, comprehensive top-down and bottom-up interventions at the community and national levels are urgently needed.
Implementation Of The Configurable Fault Tolerant System Experiment On NPSAT 1
2016-03-01
REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE IMPLEMENTATION OF THE CONFIGURABLE FAULT TOLERANT SYSTEM EXPERIMENT ON NPSAT...open-source microprocessor without interlocked pipeline stages (MIPS) based processor softcore, a cached memory structure capable of accessing double...data rate type three and secure digital card memories, an interface to the main satellite bus, and XILINX’s soft error mitigation softcore. The
Advanced Wireless Integrated Navy Network - AWINN
2005-09-30
progress report No. 3 on AWINN hardware and software configurations of smart , wideband, multi-function antennas, secure configurable platform, close-in...results to the host PC via a UART soft core. The UART core used is a proprietary Xilinx core which incorporates features described in National...current software uses wheel odometry and visual landmarks to create a map and estimate position on an internal x, y grid . The wheel odometry provides a
The role of configuration interaction in the LTE opacity of Fe
NASA Astrophysics Data System (ADS)
Colgan, James; Kilcrease, David; Magee, Norm; Armstrong, Gregory; Abdallah, Joe; Sherrill, Manolo; Fontes, Christopher; Zhang, Honglin; Hakel, Peter
2013-05-01
The Los Alamos National Laboratory code ATOMIC has been recently used to generate a series of local-thermodynamic-equilibrium (LTE) light element opacities for the elements H through Ne. Our calculations, which include fine-structure detail, represent a systematic improvement over previous Los Alamos opacity calculations using the LEDCOP legacy code. Recent efforts have resulted in comprehensive new calculations of the opacity of Fe. In this presentation we explore the role of configuration interaction (CI) in the Fe opacity, and show where CI influences the monochromatic opacity. We present such comparisons for conditions of astrophysical interest. The Los Alamos National Laboratory is operated by Los Alamos National Security, LLC for the National Nuclear Security Administration of the U.S. Department of Energy under Contract No. DE-AC5206NA25396.
Pulse-shape discrimination scintillators for homeland security applications
NASA Astrophysics Data System (ADS)
Ellis, Mark E.; Duroe, Kirk; Kendall, Paul A.
2016-09-01
An extensive programme of research has been conducted for scintillation liquids and plastics capable of neutron-gamma discrimination for deployment in future passive and active Homeland Security systems to provide protection against radiological and nuclear threats. The more established detection materials such as EJ-301 and EJ-309 are compared with novel materials such as EJ-299-33 and p-terphenyl. This research also explores the benefits that can be gained from improvements in the analogue-to-digital sampling rate and sample bit resolution. Results are presented on the Pulse Shape Discrimination performance of various detector and data acquisition combinations and how optimum configurations from these studies have been developed into field-ready detector arrays. Early results from application-specific experimental configurations of multi-element detector arrays are presented.
The effects of environmental resource and security on aggressive behavior.
Ng, Henry Kin Shing; Chow, Tak Sang
2017-05-01
Exposure to different environments has been reported to change aggressive behavior, but previous research did not consider the underlying elements that caused such an effect. Based on previous work on environmental perception, we examined the role of environmental resource and security in altering aggression level. In three experiments, participants were exposed to environments that varied in resource (High vs. Low) and security (High vs. Low) levels, after which aggression was measured. The environments were presented through visual priming (Experiments 1-2) and a first-person gameplay (Experiment 3). We observed a consistent resource-security interaction effect on aggression, operationalized as the level of noise blast (Experiment 1) and number of unpleasant pictures (Experiments 2-3) delivered to strangers by the participants. High resource levels associated with higher aggression in insecure conditions, but lower aggression in secure conditions. The findings suggest that the adaptive value of aggression varies under different environmental constraints. Implications are discussed in terms of the effects of adverse environments on aggression, and the nature's effects on social behavior. Aggr. Behav. 43:304-314, 2017. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Procedures. 11.5 Section 11.5 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS...” shall be directed to: Director, Security and Inspection Division, Environmental Protection Agency...
Sandia National Laboratories: National Security Missions: International
Programs Environmental Responsibility Environmental Management System Pollution Prevention History 60 ; Security Weapons Science & Technology Defense Systems & Assessments About Defense Systems & ; Development Technology Deployment Centers Working With Sandia Working With Sandia Prospective Suppliers What
Khiewwijit, Rungnapha; Rijnaarts, Huub; Temmink, Hardy; Keesman, Karel J
2018-07-01
This study explored the feasibility and estimated the environmental impacts of two novel wastewater treatment configurations. Both include combined bioflocculation and anaerobic digestion but apply different nutrient removal technologies, i.e. partial nitritation/Anammox or microalgae treatment. The feasibility of such configurations was investigated for 16 locations worldwide with respect to environmental impacts, such as net energy yield, nutrient recovery and effluent quality, CO 2 emission, and area requirements. The results quantitatively support the applicability of partial nitritation/Anammox in tropical regions and some locations in temperate regions, whereas microalgae treatment is only applicable the whole year round in tropical regions that are close to the equator line. Microalgae treatment has an advantage over the configuration with partial nitritation/Anammox with respect to aeration energy and nutrient recovery, but not with area requirements. Differential sensitivity analysis points out the dominant influence of microalgal biomass yield and wastewater nutrient concentrations on area requirements and effluent quality. This study provides initial selection criteria for worldwide feasibility and corresponding environmental impacts of these novel municipal wastewater treatment plant configurations. Copyright © 2018. Published by Elsevier B.V.
40 CFR 205.55-3 - Configuration identification.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Configuration identification. 205.55-3 Section 205.55-3 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS Medium and Heavy Trucks § 205.55-3 Configuration...
Lashgarara, Farhad; Mirdamadi, Seyyed Mehdi; Hosseini, Seyyed Jamal Farajollah; Chizari, Mohammad
2008-10-01
The majority of the countries of the world, especially developing countries, face environmental problems. Limitations of basic resources (water and soil) and population growth have been the cause of these environmental problems that countries are confronted with. Developing countries have numerous problems, including destruction of forests, vegetable and animal species, and pollution of the environment. Damage to natural resources and the environment can influence the food-security situation. One of the main millennium development goals (MDGs) is protection of the environment and people's health. This cannot obtained unless there is ensured food security. Food security has been defined as a situation when all people, at all times, have physical and economic access to sufficient, safe, and nutritious food needed to maintain a healthy and active life. At the same time, with ensured food security, we can hope to protect the natural resources and environment. The methodology used is descriptive-analytical, and its main purpose is determining the importance and role of food-security solutions in the reduction of environmental hazards and improvement of natural resources and the environmental situation in developing countries. Therefore, some of the most important food-security solutions that can play an important role in this relation were discussed, including conventional research-based technology, biotechnology, information and communication technologies (ICTs), alternative energy sources, and food irradiation.
Gimbal system configurations and line-of-sight control techniques for small UAV applications
NASA Astrophysics Data System (ADS)
Miller, Rick; Mooty, Greg; Hilkert, J. M.
2013-05-01
The proliferation of small Unmanned Air Vehicles (UAVs) in the past decade has been driven, in part, by the diverse applications that various industries have found for these platforms. Originally, these applications were predominately military in nature but now include law enforcement/security, environmental monitoring/remote sensing, agricultural surveying, movie making and others. Many of these require sensors/payloads such as cameras, laser pointers/ illuminators/rangefinders and other systems that must be pointed and/or stabilized and therefore require a precision miniature gimbal or other means to control their line-of-sight (LOS). Until now, these markets have been served by traditional/larger gimbals; however, the latest class of small UAVs demands much smaller gimbals while maintaining high-performance. The limited size and weight of these gimbaled devices result in design challenges unique to the small-gimbal design field. In the past five years, Ascendant Engineering Solutions has engaged in designing, analyzing and building several small-gimbal systems to meet these challenges and has undertaken a number of trade studies to investigate techniques to achieve optimal performance within the inherent limitations mentioned above. These have included investigating various gimbal configurations, feedback sensors such as gyros, IMUs and encoders, drive train configurations, control system techniques, packaging and interconnect, as well as technology such as fast-steering mirrors and image-stabilization algorithms. This paper summarizes the results of these trade studies, attempts to identify inherent trends and limitations in the various design approaches and techniques, and discusses some practical issues such as test and verification.
The NASA John C. Stennis Environmental Geographic Information System
NASA Technical Reports Server (NTRS)
Cohan, Tyrus; Grant, Kerry
2002-01-01
In addition to the Environmental Geographic Information System (EGIS) presentation, we will present two live demonstrations of a portion of the work being performed in support of environmental operations onsite and NASA-wide. These live demonstrations will showcase the NASA EGIS database through working versions of two software packages available from Environmental Systems Research Institute, Inc. (ESRI, Inc.): ArcIMS 3.0 and either ArcView 3.2a or ArcGIS 8.0.2. Using a standard web browser, the ArcIMS demo will allow users to access a project file containing several data layers found in the EGIS database. ArcIMS is configured so that a single computer can be used as the data server and as the user interface, which allows for maximum Internet security because the computer being used will not actually be connected to the World Wide Web. Further, being independent of the Internet, the demo will run at an increased speed. This demo will include several data layers that are specific to Stennis Space Center. The EGIS database demo is a representative portion of the entire EGIS project sent to NASA Headquarters last year. This demo contains data files that are readily available at various government agency Web sites for download. Although these files contain roads, rails, and other infrastructure details, they are generalized and at a small enough scale that they provide only a general idea of each NASA center's surroundings rather than specific details of the area.
Situated Usability Testing for Security Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greitzer, Frank L.
2011-03-02
While usability testing is well established, assessing the usability of security software, tools, or methods deserves more careful consideration. It has been argued that dealing with security has become too difficult for individuals or organizations to manage effectively or to use conveniently. As difficult as it is for system administrators and developers to deal with, security is even more challenging for casual users. Indeed, it is much too easy for casual/home users to configure the security of their systems in non-optimal ways that leave their systems inadvertently insecure. This is exacerbated by the fact that casual users are focused onmore » matters other than security, and likely would prefer not even to think about security. This brief report argues that when security and/or privacy are part of the equation, traditional methods for usability testing should be re-considered. The purpose of this brief report is to argue for and outline a method associated with a new approach to usability testing for examining usable security issues.« less
ERIC Educational Resources Information Center
Stanley Foundation, Muscatine, IA.
The world's political structure and many economic practices are out of harmony with nature. This disharmony threatens environmentally sustainable growth and human survival. United Nations (UN) conference participants discussed the degree of political acceptance of concepts such as environmental security and sustainable development. Their reading…
Maritime Security in the Gulf of Guinea Subregion: Threats, Challenges and Solutions
2011-03-16
the GoG maritime domain. These threats adversely impact the socio-economic and political fabrics of most countries within the region. Poaching ...geographical location as well as environmental and demographic factors. Poaching , piracy, transnational crime, boundary disputes and environmental...and demographic factors. Poaching , piracy, transnational crime, boundary disputes and environmental degradation are common threats to security of the
Caspian Sea Environmental Security Game: 16-17 November 1998
1999-07-01
17 Robert E. Ebel Caspian Basin Oil and Gas: An Overview . . . . . . . . . . . 21 Brian R . Shaw Environmental Baseline...threat to security of supply. 32 ENVIRONMENTAL BASELINE ANALYSIS OF THE CASPIAN SEA REGION BRIAN R . SHAW TERRY PALUSZKIEWICZ SUSAN A. THOMAS...Caspian Sea level. Sources of water include runoff ( R ), precipitation (P), and groundwater flow (G); sink include evaporation (E), and discharge of water
Contains basic information on the role and origins of the Selected Analytical Methods including the formation of the Homeland Security Laboratory Capacity Work Group and the Environmental Evaluation Analytical Process Roadmap for Homeland Security Events
NASA Environmentally Responsible Aviation Hybrid Wing Body Flow-Through Nacelle Wind Tunnel CFD
NASA Technical Reports Server (NTRS)
Schuh, Michael J.; Garcia, Jospeh A.; Carter, Melissa B.; Deere, Karen A.; Stremel, Paul M.; Tompkins, Daniel M.
2016-01-01
Wind tunnel tests of a 5.75% scale model of the Boeing Hybrid Wing Body (HWB) configuration were conducted in the NASA Langley Research Center (LaRC) 14'x22' and NASA Ames Research Center (ARC) 40'x80' low speed wind tunnels as part of the NASA Environmentally Responsible Aviation (ERA) Project. Computational fluid dynamics (CFD) simulations of the flow-through nacelle (FTN) configuration of this model were performed before and after the testing. This paper presents a summary of the experimental and CFD results for the model in the cruise and landing configurations.
NASA Environmentally Responsible Aviation Hybrid Wing Body Flow-Through Nacelle Wind Tunnel CFD
NASA Technical Reports Server (NTRS)
Schuh, Michael J.; Garcia, Joseph A.; Carter, Melissa B.; Deere, Karen A.; Tompkins, Daniel M.; Stremel, Paul M.
2016-01-01
Wind tunnel tests of a 5.75 scale model of the Boeing Hybrid Wing Body (HWB) configuration were conducted in the NASA Langley Research Center (LaRC) 14x22 and NASA Ames Research Center (ARC) 40x80 low speed wind tunnels as part of the NASA Environmentally Responsible Aviation (ERA) Project. Computational fluid dynamics (CFD) simulations of the flow-through nacelle (FTN) configuration of this model were performed before and after the testing. This paper presents a summary of the experimental and CFD results for the model in the cruise and landing configurations.
Advanced Geophysical Classification with the Marine Towed Array
NASA Astrophysics Data System (ADS)
Steinhurst, D.; Harbaugh, G.; Keiswetter, D.; Bell, T. W.; Massey, G.; Wright, D.
2017-12-01
The Marine Towed Array, or MTA, is an underwater dual-mode sensor array that has been successfully deployed at multiple marine venues in support of Strategic Environmental Research and Development Program (SERDP) and Environmental Security Technology Certification Program (ESTCP) demonstrations beginning in 2004. It provided both marine electromagnetic and marine magnetic sensors for detection and mapping of underwater UXO. The EMI sensor array was based on older technology, which in several ESTCP demonstrations has not been able to support advanced geophysical classification (AGC). Under ESTCP funding, the U.S. Naval Research Laboratory is in the process of upgrading the MTA with modern, advanced electromagnetic (EMI) electronics and replacing the sensor array with a modern, multistatic array design. A half-scale version of the proposed array has been built and tested on land. Six tri-axial receiver cubes were placed inside two- and three- transmit coil configurations in equivalent positions to design locations for the MTA wing. The responses of a variety of munitions items and test spheres were measured over a range of target-to-array geometries and in both static and simulated dynamic data collection modes. The multi-transmit coil configuration was shown to provide enhanced single-pass classification performance over the original single coil design, particularly as a function of target location relative to the centerline. The ability to go beyond anomaly detection and additionally classify detected anomalies from survey data would dramatically improve the state of the art for underwater UXO remediation by reducing costs and improving the efficiency of these efforts. The results of our efforts to return the MTA to service and validating the new EMI array's design for UXO detection and classification in the underwater environment will be the focus of this presentation.
NASA Astrophysics Data System (ADS)
Xian, W.; Chen, Y.; Chen, J.; Luo, X.; Shao, H.
2018-04-01
According to the overall requirements of ecological construction and environmental protection, rely on the national key ecological engineering, strengthen ecological environmental restoration and protection, improve forest cover, control soil erosion, construct important ecological security barrier in poor areas, inhibit poverty alleviation through ecological security in this area from environmental damage to the vicious cycle of poverty. Obviously, the dynamic monitoring of ecological security in contiguous destitute areas of Sichuan province has a policy sense of urgency and practical significance. This paper adopts RS technology and GIS technology to select the Luhe region of Jinchuan county and Ganzi prefecture as the research area, combined with the characteristics of ecological environment in poor areas, the impact factors of ecological environment are determined as land use type, terrain slope, vegetation cover, surface water, soil moisture and other factors. Using the ecological environmental safety assessment model, the ecological environment safety index is calculated. According to the index, the ecological environment safety of the research area is divided into four levels. The ecological environment safety classification map of 1990 in 2009 is obtained. It can be seen that with the human modern life and improve their economic level, the surrounding environment will be destroyed, because the research area ecological environment is now in good, the ecological environment generally tends to be stable. We should keep its ecological security good and improve local economic income. The relationship between ecological environmental security and economic coordinated development in poor areas has very important strategic significance.
2006-09-01
Lavoie, D. Kurts, SYNTHETIC ENVIRONMENTS AT THE ENTREPRISE LEVEL: OVERVIEW OF A GOVERNMENT OF CANADA (GOC), ACADEMIA and INDUSTRY DISTRIBUTED...vehicle (UAV) focused to locate the radiological source, and by comparing the performance of these assets in terms of various capability based...framework to analyze homeland security capabilities • Illustrate how a rapidly configured distributed simulation involving academia, industry and
Wang, Chao-Qiang; Lin, Xiao-Yan; Zhang, Chun; Mei, Xu-Dong
2017-09-01
The overall objective of this research project was to investigate the heavy metals environmental security control of resource utilization of shale gas' drilling cuttings. To achieve this objective, we got through theoretical calculation and testing, ultimately and preliminarily determine the content of heavy metals pollutants, and compared with related standards at domestically and abroad. The results indicated that using the second Fike's law, the theoretical model of the release amount of heavy metal can be made, and the groundwater environmental risk as main point compared with soil. This study can play a role of standard guidance on environmental security control of drilling cuttings resource utilization by the exploration and development of shale gas in our country.
Panepinto, D; Zanetti, M C
2018-03-01
This study proposes a multi-step approach to evaluating the environmental and economic aspects of a thermal treatment plant with an energy-recovery configuration. In order to validate the proposed approach, the Turin incineration plant was analyzed, and the potential of the incinerator and several different possible connections to the district heating network were then considered. Both local and global environmental balances were defined. The global-scale results provided information on carbon dioxide emissions, while the local-scale results were used as reference values for the implementation of a Gaussian model that could evaluate the actual concentrations of pollutants released into the atmosphere. The economic aspects were then analyzed, and a correspondence between the environmental and economic advantages defined. The results showed a high energy efficiency for the combined production of heat and electricity, and the opportunity to minimize environmental impacts by including cogeneration in a district heating scheme. This scheme showed an environmental advantage, whereas the electricity-only configuration showed an economic advantage. A change in the thermal energy price (specifically, to 40 €/MWh), however, would make it possible to obtain both environmental and economic advantages. Copyright © 2017 Elsevier Ltd. All rights reserved.
Managing Security in FPGA-Based Embedded Systems
2008-01-01
Trans. De- sign Automation of Electronic Systems (TODAES), vol. 13, no. 3, July 2008, article 44. c©2008 ACM with permission.5) of the function would need...in the finished design. In addition, the life cycle can be subverted when engineers inject unintended functionality, some of which might be malicious...cores and a moat size of two. There are several different drawbridge configurations between the cores. (IOB: I/O block; CLB: configuration logic block
Navigation Ground Data System Engineering for the Cassini/Huygens Mission
NASA Technical Reports Server (NTRS)
Beswick, R. M.; Antreasian, P. G.; Gillam, S. D.; Hahn, Y.; Roth, D. C.; Jones, J. B.
2008-01-01
The launch of the Cassini/Huygens mission on October 15, 1997, began a seven year journey across the solar system that culminated in the entry of the spacecraft into Saturnian orbit on June 30, 2004. Cassini/Huygens Spacecraft Navigation is the result of a complex interplay between several teams within the Cassini Project, performed on the Ground Data System. The work of Spacecraft Navigation involves rigorous requirements for accuracy and completeness carried out often under uncompromising critical time pressures. To support the Navigation function, a fault-tolerant, high-reliability/high-availability computational environment was necessary to support data processing. Configuration Management (CM) was integrated with fault tolerant design and security engineering, according to the cornerstone principles of Confidentiality, Integrity, and Availability. Integrated with this approach are security benchmarks and validation to meet strict confidence levels. In addition, similar approaches to CM were applied in consideration of the staffing and training of the system administration team supporting this effort. As a result, the current configuration of this computational environment incorporates a secure, modular system, that provides for almost no downtime during tour operations.
Gaffan, D
1998-11-01
Memory for object-place configurations appears to be a common function of the hippocampus in the human and monkey brain. The nature of the spatial information which enters into these object-configural memories in the primate, and the location of the memories themselves, have remained obscure, however. In the rat, much evidence indicates that the hippocampus processes idiothetic spatial information, an estimate of the animal's current environmental location derived from path integration. I propose that in primates the hippocampus provides idiothetic information about the environmental location of body parts, and that the main function of this information in the primate brain is to become configured with object-identity information provided by temporal lobe cortex outside the hippocampus.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hogberg, Nicholas Alvin; Garcia-Crespo, Andres Jose
A turbine system and adapter are disclosed. The adapter includes a turbine attachment portion having a first geometry arranged to receive a corresponding geometry of a wheelpost of a turbine rotor, and a bucket attachment portion having a second geometry arranged to receive a corresponding geometry of a root portion of a non-metallic turbine bucket. Another adapter includes a turbine attachment portion arranged to receive a plurality of wheelposts of a turbine rotor, and a bucket attachment portion arranged to receive a plurality of non-metallic turbine buckets having single dovetail configuration root portions. The turbine system includes a turbine rotormore » wheel configured to receive metal buckets, at least one adapter secured to at least one wheelpost on the turbine rotor wheel, and at least one non-metallic bucket secured to the at least one adapter.« less
NASA Astrophysics Data System (ADS)
Ottaviani, Carlo; Spedalieri, Gaetana; Braunstein, Samuel L.; Pirandola, Stefano
2015-02-01
We consider the continuous-variable protocol of Pirandola et al. [arXiv:1312.4104] where the secret key is established by the measurement of an untrusted relay. In this network protocol, two authorized parties are connected to an untrusted relay by insecure quantum links. Secret correlations are generated by a continuous-variable Bell detection performed on incoming coherent states. In the present work we provide a detailed study of the symmetric configuration, where the relay is midway between the parties. We analyze symmetric eavesdropping strategies against the quantum links explicitly showing that, at fixed transmissivity and thermal noise, two-mode coherent attacks are optimal, manifestly outperforming one-mode collective attacks based on independent entangling cloners. Such an advantage is shown both in terms of security threshold and secret-key rate.
Lu, Zhaojun; Li, Dongfang; Liu, Hailong; Gong, Mingyang; Liu, Zhenglin
2017-01-01
Wireless sensor networks (WSNs) are an emerging technology employed in some crucial applications. However, limited resources and physical exposure to attackers make security a challenging issue for a WSN. Ring oscillator-based physical unclonable function (RO PUF) is a potential option to protect the security of sensor nodes because it is able to generate random responses efficiently for a key extraction mechanism, which prevents the non-volatile memory from storing secret keys. In order to deploy RO PUF in a WSN, hardware efficiency, randomness, uniqueness, and reliability should be taken into account. Besides, the resistance to electromagnetic (EM) analysis attack is important to guarantee the security of RO PUF itself. In this paper, we propose a novel architecture of configurable RO PUF based on exclusive-or (XOR) gates. First, it dramatically increases the hardware efficiency compared with other types of RO PUFs. Second, it mitigates the vulnerability to EM analysis attack by placing the adjacent RO arrays in accordance with the cosine wave and sine wave so that the frequency of each RO cannot be detected. We implement our proposal in XINLINX A-7 field programmable gate arrays (FPGAs) and conduct a set of experiments to evaluate the quality of the responses. The results show that responses pass the National Institute of Standards and Technology (NIST) statistical test and have good uniqueness and reliability under different environments. Therefore, the proposed configurable RO PUF is suitable to establish a key extraction mechanism in a WSN. PMID:28914756
Lu, Zhaojun; Li, Dongfang; Liu, Hailong; Gong, Mingyang; Liu, Zhenglin
2017-09-15
Wireless sensor networks (WSNs) are an emerging technology employed in some crucial applications. However, limited resources and physical exposure to attackers make security a challenging issue for a WSN. Ring oscillator-based physical unclonable function (RO PUF) is a potential option to protect the security of sensor nodes because it is able to generate random responses efficiently for a key extraction mechanism, which prevents the non-volatile memory from storing secret keys. In order to deploy RO PUF in a WSN, hardware efficiency, randomness, uniqueness, and reliability should be taken into account. Besides, the resistance to electromagnetic (EM) analysis attack is important to guarantee the security of RO PUF itself. In this paper, we propose a novel architecture of configurable RO PUF based on exclusive-or (XOR) gates. First, it dramatically increases the hardware efficiency compared with other types of RO PUFs. Second, it mitigates the vulnerability to EM analysis attack by placing the adjacent RO arrays in accordance with the cosine wave and sine wave so that the frequency of each RO cannot be detected. We implement our proposal in XINLINX A-7 field programmable gate arrays (FPGAs) and conduct a set of experiments to evaluate the quality of the responses. The results show that responses pass the National Institute of Standards and Technology (NIST) statistical test and have good uniqueness and reliability under different environments. Therefore, the proposed configurable RO PUF is suitable to establish a key extraction mechanism in a WSN.
Secure communications of CAP-4 and OOK signals over MMF based on electro-optic chaos.
Ai, Jianzhou; Wang, Lulu; Wang, Jian
2017-09-15
Chaos-based secure communication can provide a high level of privacy in data transmission. Here, we experimentally demonstrate secure signal transmission over two kinds of multimode fiber (MMF) based on electro-optic intensity chaos. High-quality synchronization is achieved in an electro-optic feedback configuration. Both 5 Gbit/s carrier-less amplitude/phase (CAP-4) modulation and 10 Gbit/s on-off key (OOK) signals are recovered efficiently in electro-optic chaos-based communication systems. Degradations of chaos synchronization and communication system due to mismatch of various hardware keys are also discussed.
Biorhythms in the activity of children during free play1
Wade, M. G.; Ellis, M. J.; Bohrer, R. E.
1973-01-01
The interaction between the arousal to action of environmental stimuli and recovery from that activity was presumed to generate biorhythms in the activity level of children. The level of environmental stimuli was manipulated by varying the play-group size and the apparatus, and higher environmental complexity was expected to produce more pronounced rhythms. The heart rates of 16 subjects playing in monad, dyad, and tetrad group sizes, in two playroom configurations, were monitored and spectral analysis used to locate significant biorhythms. There was a tendency toward 40-min (slow frequency) and 15-min (fast frequency) biorhythms. The group size manipulation produced the strongest biorhythmic behavior in the dyadic groups. Apparatus differences were not significant but the configuration containing a minimum quantity of play apparatus produced more variable activity than the configuration containing a large amount of play apparatus. PMID:4714575
Biorhythms in the activity of children during free play.
Wade, M G; Ellis, M J; Bohrer, R E
1973-07-01
The interaction between the arousal to action of environmental stimuli and recovery from that activity was presumed to generate biorhythms in the activity level of children. The level of environmental stimuli was manipulated by varying the play-group size and the apparatus, and higher environmental complexity was expected to produce more pronounced rhythms. The heart rates of 16 subjects playing in monad, dyad, and tetrad group sizes, in two playroom configurations, were monitored and spectral analysis used to locate significant biorhythms. There was a tendency toward 40-min (slow frequency) and 15-min (fast frequency) biorhythms. The group size manipulation produced the strongest biorhythmic behavior in the dyadic groups. Apparatus differences were not significant but the configuration containing a minimum quantity of play apparatus produced more variable activity than the configuration containing a large amount of play apparatus.
Report #2006-P-00019, March 28, 2006. OSWER’s implemented practices to ensure production servers were being monitored for known vulnerabilities and personnel with significant security responsibility completed the Agency’s recommended security training.
NASA Technical Reports Server (NTRS)
Packard, Ed
2016-01-01
This presentation describes the test objectives, test summary, test configuration and test performance of the James Webb Space Telescope Integrated Science Instrument Module CryoVac 3 Thermal Vacuum Test. Verify the ISIM System in its final configuration after environmental exposure and provide a post-environmental performance baseline, including critical ground calibrations needed for science data processing in flight.
Portable convertible blast effects shield
Pastrnak, John W [Livermore, CA; Hollaway, Rocky [Modesto, CA; Henning, Carl D [Livermore, CA; Deteresa, Steve [Livermore, CA; Grundler, Walter [Hayward, CA; Hagler, Lisle B [Berkeley, CA; Kokko, Edwin [Dublin, CA; Switzer, Vernon A [Livermore, CA
2011-03-15
A rapidly deployable portable convertible blast effects shield/ballistic shield includes a set two or more frusto-conically-tapered telescoping rings operably connected to each other to convert between a telescopically-collapsed configuration for storage and transport, and a telescopically-extended upright configuration forming an expanded inner volume. In a first embodiment, the upright configuration provides blast effects shielding, such as against blast pressures, shrapnel, and/or fire balls. And in a second embodiment, the upright configuration provides ballistic shielding, such as against incoming weapons fire, shrapnel, etc. Each ring has a high-strength material construction, such as a composite fiber and matrix material, capable of substantially inhibiting blast effects and impinging projectiles from passing through the shield. And the set of rings are releasably securable to each other in the telescopically-extended upright configuration by the friction fit of adjacent pairs of frusto-conically-tapered rings to each other.
MAC layer security issues in wireless mesh networks
NASA Astrophysics Data System (ADS)
Reddy, K. Ganesh; Thilagam, P. Santhi
2016-03-01
Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-29
... geothermal energy demonstration project and research center. Reduced Operations Alternative The Reduced... DEPARTMENT OF ENERGY National Nuclear Security Administration Draft Site-Wide Environmental Impact Statement for the Continued Operation of the Department of Energy/National Nuclear Security Administration...
Project #OA-FY14-0135, February 10, 2014. The Office of Inspector General plans to begin fieldwork for an audit of the U.S. Environmental Protection Agency's compliance with the Federal Information Security Management Act (FISMA).
2009-09-01
DIFFIE-HELLMAN KEY EXCHANGE .......................14 III. GHOSTNET SETUP .........................................15 A. INSTALLATION OF OPENVPN FOR...16 3. Verifying the Secure Connection ..............16 B. RUNNING OPENVPN AS A SERVER ON WINDOWS ............17 1. Creating...Generating Server and Client Keys ............20 5. Keys to Transfer to the Client ...............21 6. Configuring OpenVPN to Use Certificates
Environmental control/life support system for Space Station
NASA Technical Reports Server (NTRS)
Miller, C. W.; Heppner, D. B.; Schubert, F. H.; Dahlhausen, M. J.
1986-01-01
The functional, operational, and design load requirements for the Environmental Control/Life Support System (ECLSS) are described. The ECLSS is divided into two groups: (1) an atmosphere management group and (2) a water and waste management group. The interaction between the ECLSS and the Space Station Habitability System is examined. The cruciform baseline station design, the delta and big T module configuration, and the reference Space Station configuration are evaluated in terms of ECLSS requirements. The distribution of ECLSS equipment in a reference Space Station configuration is studied as a function of initial operating conditions and growth orbit capabilities. The benefits of water electrolysis as a Space Station utility are considered.
Lighting system with thermal management system having point contact synthetic jets
Arik, Mehmet; Weaver, Stanton Earl; Kuenzler, Glenn Howard; Wolfe, Jr., Charles Franklin; Sharma, Rajdeep
2013-12-10
Lighting system having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system includes a plurality of synthetic jets. The synthetic jets are arranged within the lighting system such that they are secured at contact points.
A Unified Access Model for Interconnecting Heterogeneous Wireless Networks
2015-05-01
Defined Networking, OpenFlow, WiFi, LTE 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 18 19a. NAME OF...Machine Configurations with WiFi and LTE 4 2.3 Three Virtual Machine Configurations with WiFi and LTE 5 3. Results and Discussion 5 4. Summary and...WiFi and long-term evolution ( LTE ), and created a communication pathway between them via a central controller node. Our simulation serves as a
Lighting system with thermal management system having point contact synthetic jets
Arik, Mehmet; Weaver, Stanton Earl; Kuenzler, Glenn Howard; Wolfe, Jr, Charles Franklin; Sharma, Rajdeep
2016-08-30
Lighting systems having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system includes a plurality of synthetic jets. The synthetic jets are arranged within the lighting system such that they are secured at contact points.
Lighting system with thermal management system having point contact synthetic jets
Arik, Mehmet; Weaver, Stanton Earl; Kuenzler, Glenn Howard; Wolfe, Jr., Charles Franklin; Sharma, Rajdeep
2016-08-23
Lighting systems having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system includes a plurality of synthetic jets. The synthetic jets are arranged within the lighting system such that they are secured at contact points.
2017-05-01
ER D C/ EL T R- 17 -7 Environmental Security Technology Certification Program (ESTCP) Evaluation of Uncertainty in Constituent Input...Environmental Security Technology Certification Program (ESTCP) ERDC/EL TR-17-7 May 2017 Evaluation of Uncertainty in Constituent Input Parameters...Environmental Evaluation and Characterization Sys- tem (TREECS™) was applied to a groundwater site and a surface water site to evaluate the sensitivity
Flachsbarth, Insa; Willaarts, Bárbara; Xie, Hua; Pitois, Gauthier; Mueller, Nathaniel D.; Ringler, Claudia; Garrido, Alberto
2015-01-01
One of humanity’s major challenges of the 21st century will be meeting future food demands on an increasingly resource constrained-planet. Global food production will have to rise by 70 percent between 2000 and 2050 to meet effective demand which poses major challenges to food production systems. Doing so without compromising environmental integrity is an even greater challenge. This study looks at the interdependencies between land and water resources, agricultural production and environmental outcomes in Latin America and the Caribbean (LAC), an area of growing importance in international agricultural markets. Special emphasis is given to the role of LAC’s agriculture for (a) global food security and (b) environmental sustainability. We use the International Model for Policy Analysis of Agricultural Commodities and Trade (IMPACT)—a global dynamic partial equilibrium model of the agricultural sector—to run different future production scenarios, and agricultural trade regimes out to 2050, and assess changes in related environmental indicators. Results indicate that further trade liberalization is crucial for improving food security globally, but that it would also lead to more environmental pressures in some regions across Latin America. Contrasting land expansion versus more intensified agriculture shows that productivity improvements are generally superior to agricultural land expansion, from an economic and environmental point of view. Finally, our analysis shows that there are trade-offs between environmental and food security goals for all agricultural development paths. PMID:25617621
Flachsbarth, Insa; Willaarts, Bárbara; Xie, Hua; Pitois, Gauthier; Mueller, Nathaniel D; Ringler, Claudia; Garrido, Alberto
2015-01-01
One of humanity's major challenges of the 21st century will be meeting future food demands on an increasingly resource constrained-planet. Global food production will have to rise by 70 percent between 2000 and 2050 to meet effective demand which poses major challenges to food production systems. Doing so without compromising environmental integrity is an even greater challenge. This study looks at the interdependencies between land and water resources, agricultural production and environmental outcomes in Latin America and the Caribbean (LAC), an area of growing importance in international agricultural markets. Special emphasis is given to the role of LAC's agriculture for (a) global food security and (b) environmental sustainability. We use the International Model for Policy Analysis of Agricultural Commodities and Trade (IMPACT)-a global dynamic partial equilibrium model of the agricultural sector-to run different future production scenarios, and agricultural trade regimes out to 2050, and assess changes in related environmental indicators. Results indicate that further trade liberalization is crucial for improving food security globally, but that it would also lead to more environmental pressures in some regions across Latin America. Contrasting land expansion versus more intensified agriculture shows that productivity improvements are generally superior to agricultural land expansion, from an economic and environmental point of view. Finally, our analysis shows that there are trade-offs between environmental and food security goals for all agricultural development paths.
Security Metrics: A Solution in Search of a Problem
ERIC Educational Resources Information Center
Rosenblatt, Joel
2008-01-01
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
The national security systems (NSS) of Russia and the United States have been used for more than three decades to monitor each other's military and economic infrastructure. These high-resolution imaging systems can provide unique data for assessing a wide range of environmental i...
77 FR 12867 - Accreditation of ALTOL Chemical and Environmental Lab Inc., as a Commercial Laboratory
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-02
... accredited to test petroleum, petroleum products, organic chemicals and vegetable oils for customs purposes... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Accreditation of ALTOL Chemical..., Department of Homeland Security. ACTION: Notice of accreditation of Altol Chemical and Environmental Lab Inc...
NASA Astrophysics Data System (ADS)
Haneda, Kiyofumi; Koyama, Tadashi
2005-04-01
We developed a secure system that minimizes staff workload and secures safety of a medical information system. In this study, we assess the legal security requirements and risks occurring from the use of digitized data. We then analyze the security measures for ways of reducing these risks. In the analysis, not only safety, but also costs of security measures and ease of operability are taken into consideration. Finally, we assess the effectiveness of security measures by employing our system in small-sized medical institution. As a result of the current study, we developed and implemented several security measures, such as authentications, cryptography, data back-up, and secure sockets layer protocol (SSL) in our system. In conclusion, the cost for the introduction and maintenance of a system is one of the primary difficulties with its employment by a small-sized institution. However, with recent reductions in the price of computers, and certain advantages of small-sized medical institutions, the development of an efficient system configuration has become possible.
Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.
Caruso, Ronald D
2003-01-01
Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003
Wireless sensor systems and methods, and methods of monitoring structures
Kunerth, Dennis C.; Svoboda, John M.; Johnson, James T.; Harding, L. Dean; Klingler, Kerry M.
2007-02-20
A wireless sensor system includes a passive sensor apparatus configured to be embedded within a concrete structure to monitor infiltration of contaminants into the structure. The sensor apparatus includes charging circuitry and a plurality of sensors respectively configured to measure environmental parameters of the structure which include information related to the infiltration of contaminants into the structure. A reader apparatus is communicatively coupled to the sensor apparatus, the reader apparatus being configured to provide power to the charging circuitry during measurements of the environmental parameters by the sensors. The reader apparatus is configured to independently interrogate individual ones of the sensors to obtain information measured by the individual sensors. The reader apparatus is configured to generate an induction field to energize the sensor apparatus. Information measured by the sensor apparatus is transmitted to the reader apparatus via a response signal that is superimposed on a return induction field generated by the sensor apparatus. Methods of monitoring structural integrity of the structure are also provided.
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project
NASA Astrophysics Data System (ADS)
D'Antonio, Salvatore; Romano, Luigi; Khelil, Abdelmajid; Suri, Neeraj
The INSPIRE project aims at enhancing the European potential in the field of security by ensuring the protection of critical information infrastructures through (a) the identification of their vulnerabilities and (b) the development of innovative techniques for securing networked process control systems. To increase the resilience of such systems INSPIRE will develop traffic engineering algorithms, diagnostic processes and self-reconfigurable architectures along with recovery techniques. Hence, the core idea of the INSPIRE project is to protect critical information infrastructures by appropriately configuring, managing, and securing the communication network which interconnects the distributed control systems. A working prototype will be implemented as a final demonstrator of selected scenarios. Controls/Communication Experts will support project partners in the validation and demonstration activities. INSPIRE will also contribute to standardization process in order to foster multi-operator interoperability and coordinated strategies for securing lifeline systems.
2003-09-01
infrastructure, and providing consequence management and mitigation of man-made and natural disasters. The United States Army, Pacifi c (USARPAC), the Offi...Terrorism, Disaster Response and Consequence Management , and Medical Aspects of Environmental Security. The conference brought together military and...consequence management in maintaining governmental legitimacy, and examine salient military roles in preventing, responding to, and mitigating natural
Condensation Testing - Shelters
2011-12-15
configured as recommended by the manufacturer. b. Instrument the shelter interior with four (4) temperature sensors (thermocouples, thermistors , etc...the chassis or frame secured by one of the following: spot welded terminal lug, soldering lug, screw, nut, and lockwasher? 32. On
Cutburth, Ronald W.; Smauley, David A.
1987-01-01
A clamp or dog is disclosed which preferably comprises a slotted stepped cylindrical body which is inserted into a hole in a workpiece and then fastened to a base or fixture using a screw which is inserted through the slot. The stepped configuration provides an annular clamping surface which securely clamps the workpiece against the base or fixture. The slotted cylindrical configuration permits adjustment of the workpiece and retaining clamp in any direction, i.e., over 360.degree., relative to the mounting position of the screw in the base or fixture.
Karvetski, Christopher W; Lambert, James H; Linkov, Igor
2011-04-01
Military and industrial facilities need secure and reliable power generation. Grid outages can result in cascading infrastructure failures as well as security breaches and should be avoided. Adding redundancy and increasing reliability can require additional environmental, financial, logistical, and other considerations and resources. Uncertain scenarios consisting of emergent environmental conditions, regulatory changes, growth of regional energy demands, and other concerns result in further complications. Decisions on selecting energy alternatives are made on an ad hoc basis. The present work integrates scenario analysis and multiple criteria decision analysis (MCDA) to identify combinations of impactful emergent conditions and to perform a preliminary benefits analysis of energy and environmental security investments for industrial and military installations. Application of a traditional MCDA approach would require significant stakeholder elicitations under multiple uncertain scenarios. The approach proposed in this study develops and iteratively adjusts a scoring function for investment alternatives to find the scenarios with the most significant impacts on installation security. A robust prioritization of investment alternatives can be achieved by integrating stakeholder preferences and focusing modeling and decision-analytical tools on a few key emergent conditions and scenarios. The approach is described and demonstrated for a campus of several dozen interconnected industrial buildings within a major installation. Copyright © 2010 SETAC.
Nevada National Security Site Environmental Report 2016
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills
This Nevada National Security Site Environmental Report (NNSSER) was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSERmore » summarizes data and compliance status for calendar year 2016 at the Nevada National Security Site (NNSS) and its two Nevada-based support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). NNSA/NFO directs the management and operation of the NNSS and six sites across the nation. In addition to the NNSA itself, the six sites include two in Nevada (NLVF and RSL-Nellis) and four in other states (RSL-Andrews in Maryland, Livermore Operations in California, Los Alamos Operations in New Mexico, and Special Technologies Laboratory in California). Los Alamos, Lawrence Livermore, and Sandia National Laboratories are the principal organizations that sponsor and implement the nuclear weapons programs at the NNSS. National Security Technologies, LLC (NSTec), is the current Management and Operating contractor accountable for the successful execution of work and ensuring that work is performed in compliance with environmental regulations. The six sites all provide support to enhance the NNSS as a location for its multiple missions. The three major NNSS missions include National Security/Defense, Environmental Management, and Nondefense. The major programs that support these missions are Stockpile Stewardship and Management, Nonproliferation and Counterterrorism, Nuclear Emergency Response, Strategic Partnership Projects, Environmental Restoration, Waste Management, Conservation and Renewable Energy, Other Research and Development, and Infrastructure. The major facilities that support the programs include the U1a Facility, Big Explosives Experimental Facility (BEEF), Device Assembly Facility, Dense Plasma Focus Facility, Joint Actinide Shock Physics Experimental Research Facility, Radiological/Nuclear Countermeasures Test and Evaluation Complex, Nonproliferation Test and Evaluation Complex (NPTEC), Radiological/Nuclear Weapons of Mass Destruction Incident Exercise Site, the Area 5 Radioactive Waste Management Complex (RWMC), and the Area 3 Radioactive Waste Management Site (RWMS).« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-25
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Camelot Entertainment Group, Inc., Cavico Corp., Global 8 Environmental Technologies, Inc., GTC Telecom Corp., ICF Corporation, and... concerning the securities of GTC Telecom Corp. because it has not filed any periodic reports since the period...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-21
... parts 1500-1508), GSA Order PBS P 1095.1F (Environmental considerations in decision-making, dated... Decision Addendum for the Department of Homeland Security Headquarters Consolidation at St. Elizabeths in...). ACTION: Record of Decision Addendum. SUMMARY: Pursuant to the requirements of the National Environmental...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-09
.... Therefore, pursuant to 10 CFR 51.22(b), no environmental impact statement or environmental assessment need... provisions of the NRC-approved Cyber Security Plan. The proposed change is consistent with Nuclear Energy...-approved Cyber Security Plan. The proposed change is consistent with Nuclear Energy Institute (NEI) 08-09...
Mills, N; Pearce, P; Farrow, J; Thorpe, R B; Kirkby, N F
2014-01-01
The UK Water Industry currently generates approximately 800GWh pa of electrical energy from sewage sludge. Traditionally energy recovery from sewage sludge features Anaerobic Digestion (AD) with biogas utilisation in combined heat and power (CHP) systems. However, the industry is evolving and a number of developments that extract more energy from sludge are either being implemented or are nearing full scale demonstration. This study compared five technology configurations: 1 - conventional AD with CHP, 2 - Thermal Hydrolysis Process (THP) AD with CHP, 3 - THP AD with bio-methane grid injection, 4 - THP AD with CHP followed by drying of digested sludge for solid fuel production, 5 - THP AD followed by drying, pyrolysis of the digested sludge and use of the both the biogas and the pyrolysis gas in a CHP. The economic and environmental Life Cycle Assessment (LCA) found that both the post AD drying options performed well but the option used to create a solid fuel to displace coal (configuration 4) was the most sustainable solution economically and environmentally, closely followed by the pyrolysis configuration (5). Application of THP improves the financial and environmental performance compared with conventional AD. Producing bio-methane for grid injection (configuration 3) is attractive financially but has the worst environmental impact of all the scenarios, suggesting that the current UK financial incentive policy for bio-methane is not driving best environmental practice. It is clear that new and improving processes and technologies are enabling significant opportunities for further energy recovery from sludge; LCA provides tools for determining the best overall options for particular situations and allows innovation resources and investment to be focused accordingly. Copyright © 2013 The Authors. Published by Elsevier Ltd.. All rights reserved.
Risk Assessment of Power System considering the CPS of Transformers
NASA Astrophysics Data System (ADS)
Zhou, Long; Peng, Zewu; Liu, Xindong; Li, Canbing; Chen, Can
2018-02-01
This paper constructs a risk assessment framework of power system for device-level information security, analyzes the typical protection configuration of power transformers, and takes transformer gas protection and differential protection as examples to put forward a method that analyzes the cyber security in electric power system, which targets transformer protection parameters. We estimate the risk of power system accounting for the cyber security of transformer through utilizing Monte Carlo method and two indexes, which are the loss of load probability and the expected demand not supplied. The proposed approach is tested with IEEE 9 bus system and IEEE 118 bus system.
Food and Nutrition Security Trends, Determinants and Challenges in the Ganges-Brahmaputra Delta
NASA Astrophysics Data System (ADS)
Nilsen, K.; van Soesbergen, A.; Matthews, Z.; Burgess, N.
2016-12-01
In the last 20 years many developing countries have made considerable progress towards improving food security and nutrition. However, progress across countries and dimensions of food security have been uneven. While challenges to food security in the context of environmental and climate changes have been studied widely, limited evidence exists for their implications for food and nutrition security in tropical deltaic regions. Delta areas are particularly vulnerable to food insecurity and malnutrition due the specific environmental, climatic and human development factors affecting agricultural production and fisheries. These include coastal flooding and storm surges, deforestation, changes to river flow patterns and water tables, increased soil salinity and water quality degradation. Due to the large number of people living in deltaic regions and their importance in regional food production, there is a pressing need for a better understanding on how environmental factors affect food security and malnutrition. This study explores the potential impacts and challenges posed by environmental and climate change on food and nutrition security in the Ganges-Brahmaputra delta. This delta is one of the world's largest delta's draining land from Bangladesh, Bhutan, China, India and Nepal. The delta makes up around two thirds of the country of Bangladesh, a country facing high levels of child undernutrition, child mortality and a high number of people living under extreme poverty. By combining spatially explicit data from the 2007 and 2011 Demographic and Health Surveys (DHS) for Bangladesh with satellite remote sensing data (Normalised Difference Vegetation Index) for relevant growing seasons of rice, the strength of association between this climate related environmental variable and indicators of child nutrition (wasting and stunting) in the delta were evaluated. Our results show that NDVI for the growing season of rice can be used to determine trends in rice production, picking up on environmental shocks (e.g. floods and cyclones) in the period 2002-2011. Furthermore, we show that NDVI can be used to explain impacts on child nutrition in this delta, even when controlling for background variables such as household wealth, geography and mother's health and education.
A resilient and secure software platform and architecture for distributed spacecraft
NASA Astrophysics Data System (ADS)
Otte, William R.; Dubey, Abhishek; Karsai, Gabor
2014-06-01
A distributed spacecraft is a cluster of independent satellite modules flying in formation that communicate via ad-hoc wireless networks. This system in space is a cloud platform that facilitates sharing sensors and other computing and communication resources across multiple applications, potentially developed and maintained by different organizations. Effectively, such architecture can realize the functions of monolithic satellites at a reduced cost and with improved adaptivity and robustness. Openness of these architectures pose special challenges because the distributed software platform has to support applications from different security domains and organizations, and where information flows have to be carefully managed and compartmentalized. If the platform is used as a robust shared resource its management, configuration, and resilience becomes a challenge in itself. We have designed and prototyped a distributed software platform for such architectures. The core element of the platform is a new operating system whose services were designed to restrict access to the network and the file system, and to enforce resource management constraints for all non-privileged processes Mixed-criticality applications operating at different security labels are deployed and controlled by a privileged management process that is also pre-configuring all information flows. This paper describes the design and objective of this layer.
Utilizing Internet Technologies in Observatory Control Systems
NASA Astrophysics Data System (ADS)
Cording, Dean
2002-12-01
The 'Internet boom' of the past few years has spurred the development of a number of technologies to provide services such as secure communications, reliable messaging, information publishing and application distribution for commercial applications. Over the same period, a new generation of computer languages have also developed to provide object oriented design and development, improved reliability, and cross platform compatibility. Whilst the business models of the 'dot.com' era proved to be largely unviable, the technologies that they were based upon have survived and have matured to the point were they can now be utilized to build secure, robust and complete observatory control control systems. This paper will describe how Electro Optic Systems has utilized these technologies in the development of its third generation Robotic Observatory Control System (ROCS). ROCS provides an extremely flexible configuration capability within a control system structure to provide truly autonomous robotic observatory operation including observation scheduling. ROCS was built using Internet technologies such as Java, Java Messaging Service (JMS), Lightweight Directory Access Protocol (LDAP), Secure Sockets Layer (SSL), eXtendible Markup Language (XML), Hypertext Transport Protocol (HTTP) and Java WebStart. ROCS was designed to be capable of controlling all aspects of an observatory and be able to be reconfigured to handle changing equipment configurations or user requirements without the need for an expert computer programmer. ROCS consists of many small components, each designed to perform a specific task, with the configuration of the system specified using a simple meta language. The use of small components facilitates testing and makes it possible to prove that the system is correct.
Transistor-based particle detection systems and methods
Jain, Ankit; Nair, Pradeep R.; Alam, Muhammad Ashraful
2015-06-09
Transistor-based particle detection systems and methods may be configured to detect charged and non-charged particles. Such systems may include a supporting structure contacting a gate of a transistor and separating the gate from a dielectric of the transistor, and the transistor may have a near pull-in bias and a sub-threshold region bias to facilitate particle detection. The transistor may be configured to change current flow through the transistor in response to a change in stiffness of the gate caused by securing of a particle to the gate, and the transistor-based particle detection system may configured to detect the non-charged particle at least from the change in current flow.
Agents Based e-Commerce and Securing Exchanged Information
NASA Astrophysics Data System (ADS)
Al-Jaljouli, Raja; Abawajy, Jemal
Mobile agents have been implemented in e-Commerce to search and filter information of interest from electronic markets. When the information is very sensitive and critical, it is important to develop a novel security protocol that can efficiently protect the information from malicious tampering as well as unauthorized disclosure or at least detect any malicious act of intruders. In this chapter, we describe robust security techniques that ensure a sound security of information gathered throughout agent’s itinerary against various security attacks, as well as truncation attacks. A sound security protocol is described, which implements the various security techniques that would jointly prevent or at least detect any malicious act of intruders. We reason about the soundness of the protocol usingSymbolic Trace Analyzer (STA), a formal verification tool that is based on symbolic techniques. We analyze the protocol in key configurations and show that it is free of flaws. We also show that the protocol fulfils the various security requirements of exchanged information in MAS, including data-integrity, data-confidentiality, data-authenticity, origin confidentiality and data non-repudiability.
System and method for incremental forming
Beltran, Michael; Cao, Jian; Roth, John T.
2015-12-29
A system includes a frame configured to hold a workpiece and first and second tool positioning assemblies configured to be opposed to each other on opposite sides of the workpiece. The first and second tool positioning assemblies each include a toolholder configured to secure a tool to the tool positioning assembly, a first axis assembly, a second axis assembly, and a third axis assembly. The first, second, and third axis assemblies are each configured to articulate the toolholder along a respective axis. Each axis assembly includes first and second guides extending generally parallel to the corresponding axis and disposed on opposing sides of the toolholder with respect to the corresponding axis. Each axis assembly includes first and second carriages articulable along the first and second guides of the axis assembly, respectively, in the direction of the corresponding axis.
Identifying Regional Key Eco-Space to Maintain Ecological Security Using GIS
Xie, Hualin; Yao, Guanrong; Wang, Peng
2014-01-01
Ecological security and environmental sustainability are the foundations of sustainable development. With the acceleration of urbanization, increasing human activities have promoted greater impacts on the eco-spaces that maintain ecological security. Regional key eco-space has become the primary need to maintain environmental sustainability and can offer society with continued ecosystem services. In this paper, considering the security of water resources, biodiversity conservation, disaster avoidance and protection and natural recreation, an integrated index of eco-space importance was established and a method for identifying key eco-space was created using GIS, with Lanzhou City, China as a case study. The results show that the area of core eco-space in the Lanzhou City is approximately 50,908.7 hm2, accounting for 40% of the region’s total area. These areas mainly consist of geological hazard protection zones and the core zones of regional river systems, wetlands, nature reserves, forest parks and scenic spots. The results of this study provide some guidance for the management of ecological security, ecological restoration and environmental sustainability. PMID:24590051
Updating energy security and environmental policy: Energy security theories revisited.
Proskuryakova, L
2018-06-18
The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Danilova, Olga; Semenova, Zinaida
2018-04-01
The objective of this study is a detailed analysis of physical protection systems development for information resources. The optimization theory and decision-making mathematical apparatus is used to formulate correctly and create an algorithm of selection procedure for security systems optimal configuration considering the location of the secured object’s access point and zones. The result of this study is a software implementation scheme of decision-making system for optimal placement of the physical access control system’s elements.
NASA Astrophysics Data System (ADS)
Huang, Duan; Huang, Peng; Wang, Tao; Li, Huasheng; Zhou, Yingming; Zeng, Guihua
2016-09-01
We propose and experimentally demonstrate a continuous-variable quantum key distribution (CV-QKD) protocol using dual-phase-modulated coherent states. We show that the modulation scheme of our protocol works equivalently to that of the Gaussian-modulated coherent-states (GMCS) protocol, but shows better experimental feasibility in the plug-and-play configuration. Besides, it waives the necessity of propagation of a local oscillator (LO) between legitimate users and generates a real local LO for quantum measurement. Our protocol is proposed independent of the one-way GMCS QKD without sending a LO [Opt. Lett. 40, 3695 (2015), 10.1364/OL.40.003695; Phys. Rev. X 5, 041009 (2015), 10.1103/PhysRevX.5.041009; Phys. Rev. X 5, 041010 (2015), 10.1103/PhysRevX.5.041010]. In those recent works, the system stability will suffer the impact of polarization drifts induced by environmental perturbations, and two independent frequency-locked laser sources are necessary to achieve reliable coherent detection. In the proposed protocol, these previous problems can be resolved. We derive the security bounds for our protocol against collective attacks, and we also perform a proof-of-principle experiment to confirm the utility of our proposal in real-life applications. Such an efficient scheme provides a way of removing the security loopholes associated with the transmitting LO, which have been a notoriously hard problem in continuous-variable quantum communication.
Future Missions for Space Weather Specifications and Forecasts
NASA Astrophysics Data System (ADS)
Onsager, T. G.; Biesecker, D. A.; Anthes, R. A.; Maier, M. W.; Gallagher, F. W., III; St Germain, K.
2017-12-01
The progress of technology and the global integration of our economic and security infrastructures have introduced vulnerabilities to space weather that demand a more comprehensive ability to specify and to predict the dynamics of the space environment. This requires a comprehensive network of real-time space-based and ground-based observations with long-term continuity. In order to determine the most cost effective space architectures for NOAA's weather, space weather, and environmental missions, NOAA conducted the NOAA Satellite Observing System Architecture (NSOSA) study. This presentation will summarize the process used to document the future needs and the relative priorities for NOAA's operational space-based observations. This involves specifying the most important observations, defining the performance attributes at different levels of capability, and assigning priorities for achieving the higher capability levels. The highest priority observations recommended by the Space Platform Requirements Working Group (SPRWG) for improvement above a minimal capability level will be described. Finally, numerous possible satellite architectures have been explored to assess the costs and benefits of various architecture configurations.
Preliminary scramjet design for hypersonic airbreathing missile application
NASA Technical Reports Server (NTRS)
Carlson, C. H.
1983-01-01
A conceptual design study of a scramjet engine was conducted for a hypersonic surface to air missile (HYSAM). The definition of the engine was based upon the requirements of accelerating the HYSAM from Mach 4 at 20,000 feet to Mach 6 at 100,000 feet and the cruise conditions at Mach 6. The resulting external and internal environmental conditions were used by various engineering disciplines performing design, stress and heat transfer analysis. A detailed structural analysis was conducted along with an indepth thermal analysis. Structurally all the components within the system exhibit positive margins of safety. A feasible concept was defined which uses state-of-the-art materials and existing TMC technology. The engine basically consists of a three dimensional carbon/carbon combustor/nozzle secured to an FS-85 columbium inlet. The carbon/carbon liner is sheathed with carbon felt insulation to thermally protect the FS-85 structure and skin. The thermal analysis of the engine indicates that a thermally viable configuration exists.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-21
... DEPARTMENT OF ENERGY National Nuclear Security Administration Extension of the Public Comment... Department of Energy/National Nuclear Security Administration Nevada National Security Site and Off-Site Locations in the State of Nevada AGENCY: National Nuclear Security Administration, U.S. Department of Energy...
Worldwide Emerging Environmental Issues Affecting the U.S. Military. September 2008 Report
2008-09-01
Anticipation and Response System…………………………………………..1 Item 3. First EU-Central Asia Security Forum Included Environmental Security………….2 Item 4. Indonesian ...back seat at EU-Central Asia talks http://euobserver.com/9/26778/?rk=1 Item 4. Indonesian Navy to Tighten Security in Sea Border Areas The... Indonesian Navy announced that it will tighten security in its eastern and western sea border areas to support law enforcement efforts at sea for
Nevada Test Site Environmental Report 2008
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cathy A. Wills
2009-09-01
The Nevada Test Site Environmental Report (NTSER) 2008 was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years’ NTSERs are posted on the NNSA/NSO website at http://www.nv.doe.gov/library/publications/aser.aspx.
Energy and Environmental Insecurity (Joint Force Quarterly, Issue 55, 4th Quarter 2009)
2009-01-01
Energy and Environmental Insecurity By r i c h a r D B . a n D r e s Dr. Richard B. Andres is Energy and Environment Security and Policy Chair in...security, they are as likely referring to carbon emissions as to energy self -reliance and affordable oil. Moreover, the solutions that the international...2009 4. TITLE AND SUBTITLE Energy and Environmental Insecurity 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d
Implementation of QoSS (Quality-of-Security Service) for NoC-Based SoC Protection
NASA Astrophysics Data System (ADS)
Sepúlveda, Johanna; Pires, Ricardo; Strum, Marius; Chau, Wang Jiang
Many of the current electronic systems embedded in a SoC (System-on-Chip) are used to capture, store, manipulate and access critical data, as well as to perform other key functions. In such a scenario, security is considered as an important issue. The Network-on-chip (NoC), as the foreseen communication structure of next-generation SoC devices, can be used to efficiently incorporate security. Our work proposes the implementation of QoSS (Quality of Security Service) to overcome present SoC vulnerabilities. QoSS is a novel concept for data protection that introduces security as a dimension of QoS. In this paper, we present the implementation of two security services (access control and authentication), that may be configured to assume one from several possible levels, the implementation of a technique to avoid denial-of-service (DoS) attacks, evaluate their effectiveness and estimate their impact on NoC performance.
44 CFR 10.11 - Environmental information.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Environmental information. 10... OF HOMELAND SECURITY GENERAL ENVIRONMENTAL CONSIDERATIONS Agency Implementing Procedures § 10.11 Environmental information. Interested persons may contact the Environmental Officer or the Regional...
44 CFR 10.11 - Environmental information.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 44 Emergency Management and Assistance 1 2011-10-01 2011-10-01 false Environmental information. 10... OF HOMELAND SECURITY GENERAL ENVIRONMENTAL CONSIDERATIONS Agency Implementing Procedures § 10.11 Environmental information. Interested persons may contact the Environmental Officer or the Regional...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Miller, Craig; Larmouth, Robert
The project was conceived and executed with the overarching objective to provide cost effective tools to cooperative utilities that enabled them to quickly detect, characterize and take remediative action against cyber attacks.
Technologies to counter aviation security threats
NASA Astrophysics Data System (ADS)
Karoly, Steve
2017-11-01
The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.
Fuel Cycle Technologies 2014 Achievement Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hong, Bonnie C.
2015-01-01
The Fuel Cycle Technologies (FCT) program supports the Department of Energy’s (DOE’s) mission to: “Enhance U.S. security and economic growth through transformative science, technology innovation, and market solutions to meet our energy, nuclear security, and environmental challenges.” Goal 1 of DOE’s Strategic Plan is to innovate energy technologies that enhance U.S. economic growth and job creation, energy security, and environmental quality. FCT does this by investing in advanced technologies that could transform the nuclear fuel cycle in the decades to come. Goal 2 of DOE’s Strategic Plan is to strengthen national security by strengthening key science, technology, and engineering capabilities.more » FCT does this by working closely with the National Nuclear Security Administration and the U.S Department of State to develop advanced technologies that support the Nation’s nuclear nonproliferation goals.« less
U.S.-China Relations: Policy Issues
2010-03-12
China (PRC) include promoting U.S. trade and investment, protecting national security interests, addressing global environmental and climate change...influence and natural resources. Other U.S. concerns include the bilateral trade deficit with China and allegations of PRC unfair trade practices, PRC...with the PRC include promoting U.S. trade and investment, protecting national security interests, addressing global environmental and climate change
Microgrid Study: Energy Security for DoD Installations
2012-06-18
security, efficiency, and the incorporation of renewable and distributed energy resources into microgrids, as well as the factors that might facilitate...better understand how different environmental factors affected the choice of optimal microgrid architecture. Environmental factors in this context...lower costs—Networking generation assets allow for load sharing, allowing fewer generators to run at higher load factors and therefore with greater
Experimental realization of equiangular three-state quantum key distribution
Schiavon, Matteo; Vallone, Giuseppe; Villoresi, Paolo
2016-01-01
Quantum key distribution using three states in equiangular configuration combines a security threshold comparable with the one of the Bennett-Brassard 1984 protocol and a quantum bit error rate (QBER) estimation that does not need to reveal part of the key. We implement an entanglement-based version of the Renes 2004 protocol, using only passive optic elements in a linear scheme for the positive-operator valued measure (POVM), generating an asymptotic secure key rate of more than 10 kbit/s, with a mean QBER of 1.6%. We then demonstrate its security in the case of finite key and evaluate the key rate for both collective and general attacks. PMID:27465643
Configuration Management Plan for K Basins
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weir, W.R.; Laney, T.
This plan describes a configuration management program for K Basins that establishes the systems, processes, and responsibilities necessary for implementation. The K Basins configuration management plan provides the methodology to establish, upgrade, reconstitute, and maintain the technical consistency among the requirements, physical configuration, and documentation. The technical consistency afforded by this plan ensures accurate technical information necessary to achieve the mission objectives that provide for the safe, economic, and environmentally sound management of K Basins and the stored material. The configuration management program architecture presented in this plan is based on the functional model established in the DOE Standard, DOE-STD-1073-93,more » {open_quotes}Guide for Operational Configuration Management Program{close_quotes}.« less
40 CFR 1068.225 - What are the provisions for exempting engines/equipment for national security?
Code of Federal Regulations, 2010 CFR
2010-07-01
... engines/equipment for national security? 1068.225 Section 1068.225 Protection of Environment ENVIRONMENTAL... security? (a) An engine/equipment is exempt without a request if it will be used or owned by an agency of...) Manufacturers may request a national security exemption for engines/equipment not meeting the conditions of...
U.S. Maritime Security: Sustainability Challenges
2011-09-01
Security Council ICE Immigration and Customs Enforcement IOC Interagency Operation Center JHOC Joint Harbor Operation Center JIATF-S Joint...maritime threats into nation threats, transnational criminal and piracy threats, environmental destruction, and illegal seaborne immigration (U.S...safe and secure borders, welcome lawful immigrants and visitors and promote the free-flow of commerce (U.S. Department of Homeland Security, 2011
Upgrading a CD-ROM Network for Multimedia Applications.
ERIC Educational Resources Information Center
Sylvia, Margaret
1995-01-01
Addresses issues to consider when upgrading library CD-ROM networks for multimedia applications. Topics includes security issues; workstation requirements such as soundboards and monitors; local area network configurations that avoid bottlenecks: Asynchronous Transfer Mode, Ethernet, and Integrated Services Digital Network; server performance…
Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks
Vollmer, Todd; Manic, Milos
2014-05-01
A challenge facing industrial control network administrators is protecting the typically large number of connected assets for which they are responsible. These cyber devices may be tightly coupled with the physical processes they control and human induced failures risk dire real-world consequences. Dynamic virtual honeypots are effective tools for observing and attracting network intruder activity. This paper presents a design and implementation for self-configuring honeypots that passively examine control system network traffic and actively adapt to the observed environment. In contrast to prior work in the field, six tools were analyzed for suitability of network entity information gathering. Ettercap, anmore » established network security tool not commonly used in this capacity, outperformed the other tools and was chosen for implementation. Utilizing Ettercap XML output, a novel four-step algorithm was developed for autonomous creation and update of a Honeyd configuration. This algorithm was tested on an existing small campus grid and sensor network by execution of a collaborative usage scenario. Automatically created virtual hosts were deployed in concert with an anomaly behavior (AB) system in an attack scenario. Virtual hosts were automatically configured with unique emulated network stack behaviors for 92% of the targeted devices. The AB system alerted on 100% of the monitored emulated devices.« less
40 CFR 610.50 - Test configurations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 31 2013-07-01 2013-07-01 false Test configurations. 610.50 Section 610.50 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY RETROFIT DEVICES Test Procedures and Evaluation Criteria Durability Test Procedures § 610.50 Test...
40 CFR 610.41 - Test configurations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 31 2013-07-01 2013-07-01 false Test configurations. 610.41 Section 610.41 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY RETROFIT DEVICES Test Procedures and Evaluation Criteria General Vehicle Test Procedures § 610.41...
NASA Astrophysics Data System (ADS)
Li, Wei; Liu, Yan-Ju; Yang, Zhifeng
2012-02-01
The Great Western Development Strategy (GWDS) is a long term national campaign aimed at boosting development of the western area of China and narrowing the economic gap between the western and the eastern parts of China. The Strategic Environmental Assessment (SEA) procedure was employed to assess the environmental challenges brought about by the western development plans. These plans include five key developmental domains (KDDs): water resource exploitation and use, land utilization, energy generation, tourism development, and ecological restoration and conservation. A combination of methods involving matrix assessment, incorporation of expert judgment and trend analysis was employed to analyze and predict the environmental impacts upon eight selected environmental indicators: water resource availability, soil erosion, soil salinization, forest destruction, land desertification, biological diversity, water quality and air quality. Based on the overall results of the assessment, countermeasures for environmental challenges that emerged were raised as key recommendations to ensure ecological security during the implementation of the GWDS. This paper is intended to introduce a consensus-based process for evaluating the complex, long term pressures on the ecological security of large areas, such as western China, that focuses on the use of combined methods applied at the strategic level.
Li, Wei; Liu, Yan-ju; Yang, Zhifeng
2012-02-01
The Great Western Development Strategy (GWDS) is a long term national campaign aimed at boosting development of the western area of China and narrowing the economic gap between the western and the eastern parts of China. The Strategic Environmental Assessment (SEA) procedure was employed to assess the environmental challenges brought about by the western development plans. These plans include five key developmental domains (KDDs): water resource exploitation and use, land utilization, energy generation, tourism development, and ecological restoration and conservation. A combination of methods involving matrix assessment, incorporation of expert judgment and trend analysis was employed to analyze and predict the environmental impacts upon eight selected environmental indicators: water resource availability, soil erosion, soil salinization, forest destruction, land desertification, biological diversity, water quality and air quality. Based on the overall results of the assessment, countermeasures for environmental challenges that emerged were raised as key recommendations to ensure ecological security during the implementation of the GWDS. This paper is intended to introduce a consensus-based process for evaluating the complex, long term pressures on the ecological security of large areas, such as western China, that focuses on the use of combined methods applied at the strategic level.
Endpoint Security Using Biometric Authentication for Secure Remote Mission Operations
NASA Technical Reports Server (NTRS)
Donohue, John T.; Critchfield, Anna R.
2000-01-01
We propose a flexible security authentication solution for the spacecraft end-user, which will allow the user to interact over Internet with the spacecraft, its instruments, or with the ground segment from anywhere, anytime based on the user's pre-defined set of privileges. This package includes biometrics authentication products, such as face, voice or fingerprint recognition, authentication services and procedures, such as: user registration and verification over the Internet and user database maintenance, with a configurable schema of spacecraft users' privileges. This fast and reliable user authentication mechanism will become an integral part of end-to-end ground-to-space secure Internet communications and migration from current practice to the future. All modules and services of the proposed package are commercially available and built to the NIST BioAPI standard, which facilitates "pluggability" and interoperability.
NASA Technical Reports Server (NTRS)
Gunawan, Ryan A.
2016-01-01
With the rapid development of the Internet, the number of malicious threats to organizations is continually increasing. In June of 2015, the United States Office of Personnel Management (OPM) had a data breach resulting in the compromise of millions of government employee records. The National Aeronautics and Space Administration (NASA) is not exempt from these attacks. Cyber security is becoming a critical facet to the discussion of moving forward with projects. The Spaceport Command and Control System (SCCS) project at the Kennedy Space Center (KSC) aims to develop the launch control system for the next generation launch vehicle in the coming decades. There are many ways to increase the security of the network it uses, from vulnerability management to ensuring operating system images are compliant with securely configured baselines recommended by the United States Government.
Antle, John M.; Stoorvogel, Jetse J.; Valdivia, Roberto O.
2014-01-01
This article presents conceptual and empirical foundations for new parsimonious simulation models that are being used to assess future food and environmental security of farm populations. The conceptual framework integrates key features of the biophysical and economic processes on which the farming systems are based. The approach represents a methodological advance by coupling important behavioural processes, for example, self-selection in adaptive responses to technological and environmental change, with aggregate processes, such as changes in market supply and demand conditions or environmental conditions as climate. Suitable biophysical and economic data are a critical limiting factor in modelling these complex systems, particularly for the characterization of out-of-sample counterfactuals in ex ante analyses. Parsimonious, population-based simulation methods are described that exploit available observational, experimental, modelled and expert data. The analysis makes use of a new scenario design concept called representative agricultural pathways. A case study illustrates how these methods can be used to assess food and environmental security. The concluding section addresses generalizations of parametric forms and linkages of regional models to global models. PMID:24535388
Antle, John M; Stoorvogel, Jetse J; Valdivia, Roberto O
2014-04-05
This article presents conceptual and empirical foundations for new parsimonious simulation models that are being used to assess future food and environmental security of farm populations. The conceptual framework integrates key features of the biophysical and economic processes on which the farming systems are based. The approach represents a methodological advance by coupling important behavioural processes, for example, self-selection in adaptive responses to technological and environmental change, with aggregate processes, such as changes in market supply and demand conditions or environmental conditions as climate. Suitable biophysical and economic data are a critical limiting factor in modelling these complex systems, particularly for the characterization of out-of-sample counterfactuals in ex ante analyses. Parsimonious, population-based simulation methods are described that exploit available observational, experimental, modelled and expert data. The analysis makes use of a new scenario design concept called representative agricultural pathways. A case study illustrates how these methods can be used to assess food and environmental security. The concluding section addresses generalizations of parametric forms and linkages of regional models to global models.
40 CFR 205.5-2 - National security exemptions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 25 2011-07-01 2011-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National security...
40 CFR 205.5-2 - National security exemptions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National security...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-17
.... ACTION: Environmental Assessment and Finding of No Significant Impact. FOR FURTHER INFORMATION CONTACT... environmental assessment or an environmental impact statement. This environmental assessment was prepared for... environmental impacts. There will be minor savings of energy and vehicular use associated with the security...
DOE Office of Scientific and Technical Information (OSTI.GOV)
VIGIL, FRANCINE S.; SANCHEZ, REBECCA D.; WAGNER, KATRINA
2002-09-01
Sandia National Laboratories, New Mexico (SNL/NM) is a government-owned, contractor-operated facility overseen by the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA) through the Albuquerque Operations Office (AL), Office of Kirtland Site Operations (OKSO). Sandia Corporation, a wholly-owned subsidiary of Lockheed Martin Corporation, operates SNL/NM. Work performed at SNL/NM is in support of the DOE and Sandia Corporation's mission to provide weapon component technology and hardware for the needs of the nation's security. Sandia Corporation also conducts fundamental research and development (R&D) to advance technology in energy research, computer science, waste management, microelectronics, materials science, and transportation safetymore » for hazardous and nuclear components. In support of Sandia Corporation's mission, the Integrated Safety and Security (ISS) Center and the Environmental Restoration (ER) Project at SNL/NM have established extensive environmental programs to assist Sandia Corporation's line organizations in meeting all applicable local, state, and federal environmental regulations and DOE requirements. This annual report summarizes data and the compliance status of Sandia Corporation's environmental protection and monitoring programs through December 31, 2001. Major environmental programs include air quality, water quality, groundwater protection, terrestrial surveillance, waste management, pollution prevention (P2), environmental remediation, oil and chemical spill prevention, and the National Environmental Policy Act (NEPA). Environmental monitoring and surveillance programs are required by DOE Order 5400.1, General Environmental Protection Program (DOE 1990) and DOE Order 231.1, Environment, Safety, and Health Reporting (DOE 1996).« less
Information risk and security modeling
NASA Astrophysics Data System (ADS)
Zivic, Predrag
2005-03-01
This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hadley, Mark D.; Clements, Samuel L.
2009-01-01
Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets aremore » considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.« less
2000-07-01
Poverty; growing gap between rich and poor 30. Increasing intensive use of chemical fertilizer, pesticides and detergents 31. Destruction of coral reefs ... oceans 24. Fishery depletion due to over-fishing 25. Forest fires like those in Indonesia, Australia, Amazonian and Mediterranean countries 26...to abate eutrophication and acidification , as well as pollution of the marine environment, in particular coastal areas, from land-based sources
NASA Technical Reports Server (NTRS)
1989-01-01
The objective of the Space Transportation Booster Engine (STBE) Configuration Study is to contribute to the Advanced Launch System (ALS) development effort by providing highly reliable, low cost booster engine concepts for both expendable and reusable rocket engines. The objectives of the space Transportation Booster Engine (STBE) Configuration Study were: (1) to identify engine configurations which enhance vehicle performance and provide operational flexibility at low cost, and (2) to explore innovative approaches to the follow-on Full-Scale Development (FSD) phase for the STBE.
32 CFR 989.4 - Initial considerations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... ENVIRONMENTAL IMPACT ANALYSIS PROCESS (EIAP) § 989.4 Initial considerations. Air Force personnel will: (a... CATEX from environmental impact analysis (appendix B). (c) Make environmental documents, comments, and... national security interests while at the same time considering important environmental factors. (g...
32 CFR 989.4 - Initial considerations.
Code of Federal Regulations, 2012 CFR
2012-07-01
... ENVIRONMENTAL IMPACT ANALYSIS PROCESS (EIAP) § 989.4 Initial considerations. Air Force personnel will: (a... CATEX from environmental impact analysis (appendix B). (c) Make environmental documents, comments, and... national security interests while at the same time considering important environmental factors. (g...
32 CFR 989.4 - Initial considerations.
Code of Federal Regulations, 2014 CFR
2014-07-01
... ENVIRONMENTAL IMPACT ANALYSIS PROCESS (EIAP) § 989.4 Initial considerations. Air Force personnel will: (a... CATEX from environmental impact analysis (appendix B). (c) Make environmental documents, comments, and... national security interests while at the same time considering important environmental factors. (g...
Taking Up the Security Challenge of Climate Change
2009-08-01
depletion, anthropogenic pollution , and pandemic disease, among other phenomena, all of which pose significant environmental security risks in their...AUTHOR RYMN J. PARSONS is Assistant Counsel to and Environmental Practice Team Leader for Naval Facilities Engineering Command, Mid- Atlantic , located at...Naval Station, Norfolk, VA. Also a Navy Reservist, with the rank of captain, he is Staff Judge Advocate to Commander, Navy Region Mid- Atlantic
A Mature Maritime Strategy for Africa to Meet National Security Goals
2011-06-17
by corrupt governments, poverty, piracy, poaching in territorial waters, terrorist cells, militant youth activities, environmental violations, illegal...regions with maritime distress that are, or have the potential to impact vital U.S. national interests. Good national strategy that informs combatant and...environmental violations and many other debilitating maritime activities get conveyed ashore and directly impact the security and well-being of the
The multispectral instrument of the Sentinel2 EM program results
NASA Astrophysics Data System (ADS)
Chorvalli, Vincent; Espuche, Stéphane; Delbru, Francis; Martimort, Philippe; Fernandez, Valerie; Kirchner, Volker
2017-11-01
The MSI EM campaign has been conducted before releasing the flight model integration and test. This paper presents the MSI EM configuration and the various tests results. Experience gained through this extensive test program allowed securing the MSI PFM integration and test activities.
DOT National Transportation Integrated Search
2003-10-29
The Beta Test and Baseline Data Collection efforts ensured that the test technologies would successfully operate during the field operational test (FOT) in the designed scenario configurations. These efforts also ensured that FOT systems would succes...
Virtualization Technologies in Information Systems Education
ERIC Educational Resources Information Center
Lunsford, Dale L.
2009-01-01
Information systems educators must balance the need to protect the stability, availability, and security of computer laboratories with the learning objectives of various courses. In advanced courses where students need to install, configure, and otherwise manipulate application and operating system settings, this is especially problematic as these…
Information Security - Data Loss Prevention Procedure
The purpose of this procedure is to extend and provide specificity to the Environmental Protection Agency (EPA) Information Security Policy regarding data loss prevention and digital rights management.
30 CFR 250.1634 - Site security.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 30 Mineral Resources 2 2013-07-01 2013-07-01 false Site security. 250.1634 Section 250.1634 Mineral Resources BUREAU OF SAFETY AND ENVIRONMENTAL ENFORCEMENT, DEPARTMENT OF THE INTERIOR OFFSHORE OIL... security. (a) All locations where sulphur is produced, measured, or stored shall be operated and maintained...
30 CFR 250.1634 - Site security.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 30 Mineral Resources 2 2012-07-01 2012-07-01 false Site security. 250.1634 Section 250.1634 Mineral Resources BUREAU OF SAFETY AND ENVIRONMENTAL ENFORCEMENT, DEPARTMENT OF THE INTERIOR OFFSHORE OIL... security. (a) All locations where sulphur is produced, measured, or stored shall be operated and maintained...
30 CFR 250.1634 - Site security.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 30 Mineral Resources 2 2014-07-01 2014-07-01 false Site security. 250.1634 Section 250.1634 Mineral Resources BUREAU OF SAFETY AND ENVIRONMENTAL ENFORCEMENT, DEPARTMENT OF THE INTERIOR OFFSHORE OIL... security. (a) All locations where sulphur is produced, measured, or stored shall be operated and maintained...
76 FR 6199 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-03
... XI. Voluntary Consensus Standards XII. Finding of No Significant Environmental Impact XIII. Paperwork... potential advantages to NRC licensees and certificate holders to enhance security. The first advantage is... advantage is that security personnel of certain licensees or certificate holders will be permitted to...
Hubbell, Joel M.; Sisson, James B.
2005-07-26
A method of inserting a tensiometer into a sample, comprises providing a drive probe configured to be engaged by direct push equipment; supporting a porous member from the drive probe; and driving the drive probe into the sample using a cone penetrometer. A tensiometer comprises a drive probe configured to be engaged by direct push equipment or a cone penetrometer; a porous member supported by the drive probe; and a pressure sensor in pressure sensing relation to the porous member.
Life cycle impacts of ethanol production from spruce wood chips under high-gravity conditions.
Janssen, Matty; Xiros, Charilaos; Tillman, Anne-Marie
2016-01-01
Development of more sustainable biofuel production processes is ongoing, and technology to run these processes at a high dry matter content, also called high-gravity conditions, is one option. This paper presents the results of a life cycle assessment (LCA) of such a technology currently in development for the production of bio-ethanol from spruce wood chips. The cradle-to-gate LCA used lab results from a set of 30 experiments (or process configurations) in which the main process variable was the detoxification strategy applied to the pretreated feedstock material. The results of the assessment show that a process configuration, in which washing of the pretreated slurry is the detoxification strategy, leads to the lowest environmental impact of the process. Enzyme production and use are the main contributors to the environmental impact in all process configurations, and strategies to significantly reduce this contribution are enzyme recycling and on-site enzyme production. Furthermore, a strong linear correlation between the ethanol yield of a configuration and its environmental impact is demonstrated, and the selected environmental impacts show a very strong cross-correlation ([Formula: see text] in all cases) which may be used to reduce the number of impact categories considered from four to one (in this case, global warming potential). Lastly, a comparison with results of an LCA of ethanol production under high-gravity conditions using wheat straw shows that the environmental performance does not significantly differ when using spruce wood chips. For this comparison, it is shown that eutrophication potential also needs to be considered due to the fertilizer use in wheat cultivation. The LCA points out the environmental hotspots in the ethanol production process, and thus provides input to the further development of the high-gravity technology. Reducing the number of impact categories based only on cross-correlations should be done with caution. Knowledge of the analyzed system provides further input to the choice of impact categories.
Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System
2010-03-01
information /etc/group, passwd ,gshadow,shadow,/security/opasswd 16 User A attempts to access User B directory 17 User A attempts to access User B file w/o...configuration Handled by audit rules for root actions Audit user write attempts to system files -w /etc/group –p wxa -w /etc/ passwd –p wxa -w /etc/gshadow –p...information (/etc/group, /etc/ passwd , /etc/gshadow, /etc/shadow, /etc/sudoers, /etc/security/opasswd) Procedure: 1. User2 logs into the system
2012-12-01
of MARSEC 2 13 Causing a fire or explosion, conducting blasting or setting off fireworks , including setting a flare or other signalling device...or explosion, conducting blasting or setting off fireworks , including setting a flare or other signalling device without port approval X X X X X X...explosion, conducting blasting or setting off fireworks , including setting a flare or other signalling device without port approval X X X X X X X Non
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-24
... the entire information system with respect to computer security, prohibition and detection of any.... Safeguards: --Computer-stored information is protected in accordance with the Agency's security requirements..., loaner car agreement, cash incentives agreement (includes social security number for mandatory tax...
Network configuration management : paving the way to network agility.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Maestas, Joseph H.
2007-08-01
Sandia networks consist of nearly nine hundred routers and switches and nearly one million lines of command code, and each line ideally contributes to the capabilities of the network to convey information from one location to another. Sandia's Cyber Infrastructure Development and Deployment organizations recognize that it is therefore essential to standardize network configurations and enforce conformance to industry best business practices and documented internal configuration standards to provide a network that is agile, adaptable, and highly available. This is especially important in times of constrained budgets as members of the workforce are called upon to improve efficiency, effectiveness, andmore » customer focus. Best business practices recommend using the standardized configurations in the enforcement process so that when root cause analysis results in recommended configuration changes, subsequent configuration auditing will improve compliance to the standard. Ultimately, this minimizes mean time to repair, maintains the network security posture, improves network availability, and enables efficient transition to new technologies. Network standardization brings improved network agility, which in turn enables enterprise agility, because the network touches all facets of corporate business. Improved network agility improves the business enterprise as a whole.« less
Science and Strategic - Climate Implications
NASA Astrophysics Data System (ADS)
Tindall, J. A.; Moran, E. H.
2008-12-01
Energy of weather systems greatly exceeds energy produced and used by humans. Variation in this energy causes climate variability potentially resulting in local, national, and/or global catastrophes beyond our ability to deter the loss of life and economic destabilization. Large scale natural disasters routinely result in shortages of water, disruption of energy supplies, and destruction of infrastructure. The resulting unforeseen and disastrous events occurring beyond national emergency preparation, as related to climate variability, could insight civil unrest due to dwindling and/or inaccessible resources necessary for survival. Lack of these necessary resources in impacted countries often leads to wars. Climate change coupled with population growth, which exposes more of the population to potential risks associated with climate and environmental change, demands faster technological response. Understanding climate/associated environmental changes, the relation to human activity and behavior, and including this in national and international emergency/security management plans would alleviate shortcomings in our present and future technological status. The scale of environmental change will determine the potential magnitude of civil unrest at the local, national, and/or global level along with security issues at each level. Commonly, security issues related to possible civil unrest owing to temporal environmental change is not part of a short and/or long-term strategy, yet recent large-scale disasters are reminders that system failures (as in hurricane Katrina) include acknowledged breaches to individual, community, and infrastructure security. Without advance planning and management concerning environmental change, oncoming and climate related events will intensify the level of devastation and human catastrophe. Depending upon the magnitude and period of catastrophic events and/or environmental changes, destabilization of agricultural systems, energy supplies, and other lines of commodities often results in severely unbalanced supply and demand ratios, which eventually affect the entire global community. National economies potentially risk destabilization, which is especially important since economics plays a major role in strategic planning. This presentation will address these issues and the role that science can play in human sustainability and local, national, and international security.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-23
... incorporate the following novel or unusual design features: Digital systems architecture composed of several connected networks. The proposed architecture and network configuration may be used for, or interfaced with... navigation systems (aircraft control domain), 2. Airline business and administrative support (airline...
ERIC Educational Resources Information Center
Fearon, R. M. Pasco; Van IJzendoorn, Marinus H.; Fonagy, Peter; Bakermans-Kranenburg, Marian J.; Schuengel, Carlo; Bokhorst, Caroline L.
2006-01-01
The current article presents results from a twin study of genetic and environmental components of maternal sensitivity and infant attachment and their association. The sample consisted of 136 twin pairs from 2 sites: Leiden, the Netherlands, and London, UK. Maternal sensitivity was assessed in the home at 9-10 months, and infant attachment…
Nevada National Security Site Environmental Report 2012 Attachment A: Site Description
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, Cathy A
This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, andmore » assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.« less
Nevada National Security Site Environmental Report 2016, Attachment A: Site Description
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, Cathy
This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2016 (prepared by National Security Technologies, LLC [NSTec], 2017). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological settings and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current sitemore » operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.« less
Nevada National Security Site Environmental Report 2013 Attachment A: Site Description
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, C.
This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, andmore » assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.« less
Stonework or Sandcastle? Asia’s Regional Security Forum.
1995-07-01
security without equal security for all," and "with the growing interdependence of states, the differences in economic and social systems, ideologies... social integration, and historical background . . . [W]e cannot directly apply a European model to the different security environment of the Asia...contentious issue of human rights, a prominent theme in CSCE, along with pressures from Western countries on social , political and environmental
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, Cathy
This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2012 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmentalmore » Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NFO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2012 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). Through a Memorandum of Agreement, NNSA/NFO is responsible for the oversight of these ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR and NTTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Morris, John; Gilchrist, Phillip Charles
Processes, systems, devices, and articles of manufacture are provided. Each may include adapting micro-inverters initially configured for frame-mounting to mounting on a frameless solar panel. This securement may include using an adaptive clamp or several adaptive clamps secured to a micro-inverter or its components, and using compressive forces applied directly to the solar panel to secure the adaptive clamp and the components to the solar panel. The clamps can also include compressive spacers and safeties for managing the compressive forces exerted on the solar panels. Friction zones may also be used for managing slipping between the clamp and the solarmore » panel during or after installation. Adjustments to the clamps may be carried out through various means and by changing the physical size of the clamps themselves.« less
Attacks on Bluetooth Security Architecture and Its Countermeasures
NASA Astrophysics Data System (ADS)
Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif
WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.
Tablet based distributed intelligent load management
Lu, Yan; Zhou, Siyuan
2018-01-09
A facility is connected to an electricity utility and is responsive to Demand Response Events. A plurality of devices is each individually connected to the electricity grid via an addressable switch connected to a secure network that is enabled to be individually switched off by a server. An occupant of a room in control of the plurality of devices provides via a Human Machine Interface on a tablet a preferred order of switching off the plurality of devices in case of a Demand Response Event. A configuration file based at least partially on the preferred order and on a severity of the Demand Response Events determines which devices which of the plurality devices will be switched off. The server accesses the configuration file and switches off the devices included in the configuration file.
Cyber secure systems approach for NPP digital control systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
McCreary, T. J.; Hsu, A.
2006-07-01
Whether fossil or nuclear power, the chief operations goal is to generate electricity. The heart of most plant operations is the I and C system. With the march towards open architecture, the I and C system is more vulnerable than ever to system security attacks (denial of service, virus attacks and others), thus jeopardizing plant operations. Plant staff must spend large amounts of time and money setting up and monitoring a variety of security strategies to counter the threats and actual attacks to the system. This time and money is a drain on the financial performance of a plant andmore » distracts valuable operations resources from their real goals: product. The pendulum towards complete open architecture may have swung too far. Not all aspects of proprietary hardware and software are necessarily 'bad'. As the aging U.S. fleet of nuclear power plants starts to engage in replacing legacy control systems, and given the on-going (and legitimate) concern about the security of present digital control systems, decisions about how best to approach cyber security are vital to the specification and selection of control system vendors for these upgrades. The authors maintain that utilizing certain resources available in today's digital technology, plant control systems can be configured from the onset to be inherently safe, so that plant staff can concentrate on the operational issues of the plant. The authors postulate the concept of the plant I and C being bounded in a 'Cyber Security Zone' and present a design approach that can alleviate the concern and cost at the plant level of dealing with system security strategies. Present approaches through various IT cyber strategies, commercial software, and even postulated standards from various industry/trade organizations are almost entirely reactive and simply add to cost and complexity. This Cyber Security Zone design demonstrates protection from the four classes of cyber security attacks: 1)Threat from an intruder attempting to disrupt network communications by entering the system from an attached utility network or utilizing a modem connected to a control system PC that is in turn connected to a publicly accessible phone; 2)Threat from a user connecting an unauthorized computer to the control network; 3)Threat from a security attack when an unauthorized user gains access to a PC connected to the plant network;. 4)Threat from internal disruption (by plant staff, whether, malicious or otherwise) by unauthorized usage of files or file handling media that opens the system to security threat (as typified in current situation in most control rooms). The plant I and C system cyber security design and the plant specific procedures should adequately demonstrate protection from the four pertinent classes of cyber security attacks. The combination of these features should demonstrate that the system is not vulnerable to any analyzed cyber security attacks either from internal sources or through network connections. The authors will provide configurations that will demonstrate the Cyber Security Zone. (authors)« less
Systems and methods for performing wireless financial transactions
DOE Office of Scientific and Technical Information (OSTI.GOV)
McCown, Steven Harvey
2012-07-03
A secure computing module (SCM) is configured for connection with a host device. The SCM includes a processor for performing secure processing operations, a host interface for coupling the processor to the host device, and a memory connected to the processor wherein the processor logically isolates at least some of the memory from access by the host device. The SCM also includes a proximate-field wireless communicator connected to the processor to communicate with another SCM associated with another host device. The SCM generates a secure digital signature for a financial transaction package and communicates the package and the signature tomore » the other SCM using the proximate-field wireless communicator. Financial transactions are performed from person to person using the secure digital signature of each person's SCM and possibly message encryption. The digital signatures and transaction details are communicated to appropriate financial organizations to authenticate the transaction parties and complete the transaction.« less
SPOT: Optimization Tool for Network Adaptable Security
NASA Astrophysics Data System (ADS)
Ksiezopolski, Bogdan; Szalachowski, Pawel; Kotulski, Zbigniew
Recently we have observed the growth of the intelligent application especially with its mobile character, called e-anything. The implementation of these applications provides guarantee of security requirements of the cryptographic protocols which are used in the application. Traditionally the protocols have been configured with the strongest possible security mechanisms. Unfortunately, when the application is used by means of the mobile devices, the strongest protection can lead to the denial of services for them. The solution of this problem is introducing the quality of protection models which will scale the protection level depending on the actual threat level. In this article we would like to introduce the application which manages the protection level of the processes in the mobile environment. The Security Protocol Optimizing Tool (SPOT) optimizes the cryptographic protocol and defines the protocol version appropriate to the actual threat level. In this article the architecture of the SPOT is presented with a detailed description of the included modules.
Verification of Security Policy Enforcement in Enterprise Systems
NASA Astrophysics Data System (ADS)
Gupta, Puneet; Stoller, Scott D.
Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request’s path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforcement of a high-level policy may depend on the system architecture and the configurations of a variety of security mechanisms, such as firewalls, host login permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.
NASA Astrophysics Data System (ADS)
Asteria, Donna; Herdiansyah, Herdis; Wayan Agus Apriana, I.
2016-02-01
This study is about experience of women's role in environmental management to raise environmental security and form of women's emancipation movement. Environmental concerns conducted by residents of urban women who become environmental activists based on environmental literacy. Because of that, women's experience in interacting with both physic and social environment have differences in managing the environment including managing household waste by applying the principles of the 3Rs (reduce, reuse, recycle) and their persuasive efforts on their communities. This is the key to achieving sustainable development by anticipating environmental problem and preserving the environment. This study is conducted qualitative research method and its type is descriptive-explanative. The result of this study is environmental literacy of women activist on pro-environment action in their community that has achieved spiritual environmental literacy. Environmental literacy may differ due to internal and external condition of each individual. Pro-environment activities conducted as a form of responsibility of environmental concern such as eco-management, educational, and economic action, by persuading residents to proactively and consistently continue to do environmental management and develop a sense of community in shaping the networks of environmental concern in local context for global effect.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eric Larson; Robert Williams; Thomas Kreutz
2012-03-11
The overall objective of this project was to quantify the energy, environmental, and economic performance of industrial facilities that would coproduce electricity and transportation fuels or chemicals from a mixture of coal and biomass via co-gasification in a single pressurized, oxygen-blown, entrained-flow gasifier, with capture and storage of CO{sub 2} (CCS). The work sought to identify plant designs with promising (Nth plant) economics, superior environmental footprints, and the potential to be deployed at scale as a means for simultaneously achieving enhanced energy security and deep reductions in U.S. GHG emissions in the coming decades. Designs included systems using primarily already-commercializedmore » component technologies, which may have the potential for near-term deployment at scale, as well as systems incorporating some advanced technologies at various stages of R&D. All of the coproduction designs have the common attribute of producing some electricity and also of capturing CO{sub 2} for storage. For each of the co-product pairs detailed process mass and energy simulations (using Aspen Plus software) were developed for a set of alternative process configurations, on the basis of which lifecycle greenhouse gas emissions, Nth plant economic performance, and other characteristics were evaluated for each configuration. In developing each set of process configurations, focused attention was given to understanding the influence of biomass input fraction and electricity output fraction. Self-consistent evaluations were also carried out for gasification-based reference systems producing only electricity from coal, including integrated gasification combined cycle (IGCC) and integrated gasification solid-oxide fuel cell (IGFC) systems. The reason biomass is considered as a co-feed with coal in cases when gasoline or olefins are co-produced with electricity is to help reduce lifecycle greenhouse gas (GHG) emissions for these systems. Storing biomass-derived CO{sub 2} underground represents negative CO{sub 2} emissions if the biomass is grown sustainably (i.e., if one ton of new biomass growth replaces each ton consumed), and this offsets positive CO{sub 2} emissions associated with the coal used in these systems. Different coal:biomass input ratios will produce different net lifecycle greenhouse gas (GHG) emissions for these systems, which is the reason that attention in our analysis was given to the impact of the biomass input fraction. In the case of systems that produce only products with no carbon content, namely electricity, ammonia and hydrogen, only coal was considered as a feedstock because it is possible in theory to essentially fully decarbonize such products by capturing all of the coal-derived CO{sub 2} during the production process.« less
33 CFR 148.715 - How is an environmental review conducted?
Code of Federal Regulations, 2010 CFR
2010-07-01
... quality of assessment, probable environmental impacts, and identification of procedures or technology that... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false How is an environmental review... SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: GENERAL Environmental Review Criteria for Deepwater...
Corona, Andrea; Ambye-Jensen, Morten; Vega, Giovanna Croxatto; Hauschild, Michael Zwicky; Birkved, Morten
2018-09-01
The Green biorefinery (GBR) is a biorefinery concept that converts fresh biomass into value-added products. The present study combines a Process Flowsheet Simulation (PFS) and Life Cycle Assessment (LCA) to evaluate the technical and environmental performance of different GBR configurations and the cascading utilization of the GBR output. The GBR configurations considered in this study, test alternatives in the three main steps of green-biorefining: fractionation, precipitation, and protein separation. The different cascade utilization alternatives analyse different options for press-pulp utilization, and the LCA results show that the environmental profile of the GBR is highly affected by the utilization of the press-pulp and thus by the choice of conventional product replaced by the press-pulp. Furthermore, scenario analysis of different GBR configurations shows that higher benefits can be achieved by increasing product yields rather than lowering energy consumption. Green biorefining is shown to be an interesting biorefining concept, especially in a Danish context. Biorefining of green biomass is technically feasible and can bring environmental savings, when compared to conventional production methods. However, the savings will be determined by the processing involved in each conversion stage and on the cascade utilization of the different platform products. Copyright © 2018 Elsevier B.V. All rights reserved.
Design and validation of a passive deposition sampler.
Einstein, Stephanie A; Yu, Chang-Ho; Mainelis, Gediminas; Chen, Lung Chi; Weisel, Clifford P; Lioy, Paul J
2012-09-01
A new, passive particle deposition air sampler, called the Einstein-Lioy Deposition Sampler (ELDS), has been developed to fill a gap in passive sampling for near-field particle emissions. The sampler can be configured in several ways: with a protective hood for outdoor sampling, without a protective hood, and as a dust plate. In addition, there is an XRF-ready option that allows for direct sampling onto a filter-mounted XRF cartridge which can be used in conjunction with all configurations. A wind tunnel was designed and constructed to test the performance of different sampler configurations using a test dust with a known particle size distribution. The sampler configurations were also tested versus each other to evaluate whether or not the protective hood would affect the collected particle size distribution. A field study was conducted to test the sampler under actual environmental conditions and to evaluate its ability to collect samples for chemical analysis. Individual experiments for each configuration demonstrated precision of the sampler. The field experiment demonstrated the ability of the sampler to both collect mass and allow for the measurement of an environmental contaminant i.e. Cr(6+). The ELDS was demonstrated to be statistically not different for Hooded and Non-Hooded models, compared to each other and the test dust; thus, it can be used indoors and outdoors in a variety of configurations to suit the user's needs.
49 CFR 571.225 - Standard No. 225; Child restraint anchorage systems.
Code of Federal Regulations, 2013 CFR
2013-10-01
... strength steel tether hook for attachment to the tether anchorage. The tether hook meets the specifications... systems to ensure their proper location and strength for the effective securing of child restraints, to... manufactured on or after September 1, 1999, shall comply with the configuration, location, marking and strength...
49 CFR 571.225 - Standard No. 225; Child restraint anchorage systems.
Code of Federal Regulations, 2014 CFR
2014-10-01
... strength steel tether hook for attachment to the tether anchorage. The tether hook meets the specifications... systems to ensure their proper location and strength for the effective securing of child restraints, to... manufactured on or after September 1, 1999, shall comply with the configuration, location, marking and strength...
49 CFR 571.225 - Standard No. 225; Child restraint anchorage systems.
Code of Federal Regulations, 2012 CFR
2012-10-01
... strength steel tether hook for attachment to the tether anchorage. The tether hook meets the specifications... systems to ensure their proper location and strength for the effective securing of child restraints, to... manufactured on or after September 1, 1999, shall comply with the configuration, location, marking and strength...
Self-assembling membranes and related methods thereof
Capito, Ramille M; Azevedo, Helena S; Stupp, Samuel L
2013-08-20
The present invention relates to self-assembling membranes. In particular, the present invention provides self-assembling membranes configured for securing and/or delivering bioactive agents. In some embodiments, the self-assembling membranes are used in the treatment of diseases, and related methods (e.g., diagnostic methods, research methods, drug screening).
Role-Based Viewing for Secure Collaborative Modeling
2003-02-01
Buchanan, editors, Proceedings of Graphics Interface 2001, pages 9–18, 2001. [18] Sylvia L. Osborn, Ravi S. Sandhu, and Qamar Munawer. Configuring Role...techniques, pages 49–56. ACM Press/Addison-Wesley Publishing Co., 1999. [20] Ravi Sandhu, Bhamidipati, and Qamar Munawer. The ARBAC97 Model for Role
40 CFR 63.773 - Inspection and monitoring requirements.
Code of Federal Regulations, 2011 CFR
2011-07-01
... secured in the non-diverting position using a car-seal or a lock-and-key type configuration, visually... value is greater. The temperature sensor shall be installed at a location in the combustion chamber downstream of the combustion zone. (B) For a catalytic vapor incinerator, a temperature monitoring device...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-15
... design features associated with the architecture and connectivity capabilities of the airplane's computer... novel or unusual design features: digital systems architecture composed of several connected networks. The architecture and network configuration may be used for, or interfaced with, a diverse set of...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-23
... airplane. This airplane will have novel or unusual design features associated with the architecture and... incorporate the following novel or unusual design features: Digital systems architecture composed of several connected networks. The proposed architecture and network configuration may be used for, or interfaced with...
NASA Technical Reports Server (NTRS)
1983-01-01
User alignment plan, physical and life sciences and applications, commercial requirements national security, space operations, user needs, foreign contacts, mission scenario analysis and architectural concepts, alternative systems concepts, mission operations architectural development, architectural analysis trades, evolution, configuration, and technology development are discussed.
Steve Clark is an environmental engineer in EPA’s National Homeland Security Research Center (NHSRC). His research focuses on water security, exploring ways to protect and decontaminate pipes and other water “infrastructure.”
2010-06-01
Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century, 947. 11 Marco A. Ferroni and Ashoka Mody, International Public...Security and Defence Policy, 67–70; Howorth, Security and Defence Policy in the European Union, 152–154. 47 Hubert Zimmermann, “Security Exporters...consilium.europa.eu/showPage.aspx?id=1519&lang=en (accessed 12 March 2010). Ferroni, Marco A. and Ashoka Mody. International Public Goods: Incentives
Mapping Social Ecological Systems Archetypes
NASA Astrophysics Data System (ADS)
Rocha, J. C.; Malmborg, K.; Gordon, L.
2016-12-01
Achieving sustainable development goals requires targeting and monitoring sustainable solutions tailored to different social and ecological contexts. Elinor Ostrom stressed that there is no panaceas or universal solutions to environmental problems, and developed a social-ecological systems' (SES) framework -a nested multi tier set of variables- to help diagnose problems, identify complex interactions, and solutions tailored to each SES arena. However, to our knowledge, the SES framework has only been applied to over a hundred cases, and typically reflect the analysis of local case studies with relatively small coverage in space and time. While case studies are context rich and necessary, their conclusions might not reach policy making instances. Here we develop a data driven method for upscaling Ostrom's SES framework and applied to a context where we expect data is scarce, incomplete, but also where sustainable solutions are badly needed. The purpose of upscaling the framework is to create a tool that facilitates decision making on data scarce environments such as developing countries. We mapped SES by applying the SES framework to poverty alleviation and food security issues in the Volta River basin in Ghana and Burkina Faso. We found archetypical configurations of SES in space given data availability, we study their change over time, and discuss where agricultural innovations such as water reservoirs might have a stronger impact at increasing food security and therefore alleviating poverty and hunger. We conclude outlining how the method can be used in other SES comparative studies.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Social security numbers of... Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.224-70 Social security numbers of consultants and...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-14
... involves important physical modifications to the HNP, Unit 1 security system. There are several issues... in which some important security modifications are planned. A direct outside access route to the... implementation deadline, the licensee currently maintains a security system acceptable to the NRC and that will...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Data Security for Toxic... Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-78 Data Security for Toxic Substances Control Act...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Data Security for Federal... 1552.235-77 Federal Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-77 Data Security for...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Data Security for Toxic... Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-78 Data Security for Toxic Substances Control Act...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Data Security for Federal... 1552.235-77 Federal Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-77 Data Security for...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Data Security for Toxic... Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-78 Data Security for Toxic Substances Control Act...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Toxic... Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-78 Data Security for Toxic Substances Control Act...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Data Security for Federal... 1552.235-77 Federal Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-77 Data Security for...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Data Security for Toxic... Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-78 Data Security for Toxic Substances Control Act...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Data Security for Federal... 1552.235-77 Federal Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-77 Data Security for...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Federal... 1552.235-77 Federal Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-77 Data Security for...
Parametric analysis of ATT configurations.
NASA Technical Reports Server (NTRS)
Lange, R. H.
1972-01-01
This paper describes the results of a Lockheed parametric analysis of the performance, environmental factors, and economics of an advanced commercial transport envisioned for operation in the post-1985 time period. The design parameters investigated include cruise speeds from Mach 0.85 to Mach 1.0, passenger capacities from 200 to 500, ranges of 2800 to 5500 nautical miles, and noise level criteria. NASA high performance configurations and alternate configurations are operated over domestic and international route structures. Indirect and direct costs and return on investment are determined for approximately 40 candidate aircraft configurations. The candidate configurations are input to an aircraft sizing and performance program which includes a subroutine for noise criteria. Comparisons are made between preferred configurations on the basis of maximum return on investment as a function of payload, range, and design cruise speed.
A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network.
Pirbhulal, Sandeep; Zhang, Heye; E Alahi, Md Eshrat; Ghayvat, Hemant; Mukhopadhyay, Subhas Chandra; Zhang, Yuan-Ting; Wu, Wanqing
2016-12-30
Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods.
A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network
Pirbhulal, Sandeep; Zhang, Heye; E Alahi, Md Eshrat; Ghayvat, Hemant; Mukhopadhyay, Subhas Chandra; Zhang, Yuan-Ting; Wu, Wanqing
2016-01-01
Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods. PMID:28042831
Worldwide Emerging Environmental Issues Affecting the U.S. Military
2010-08-01
Brazil protecting non-Amazonian tropical forests . A summary of the consultations across the region are presented in the UNDP LAC Regional...North-American Environmental Integration……..13 6.6 World’s Humid Tropical Forests to Suffer Considerable Biodiversity Change by 2100….…13 6.7 Latin...35456&Cr=sanitation&Cr1 Item 2. Food Security Concerns Increase Around the World The Food Security Risk Index 2010 reveals that the countries most
2006-05-01
breed of ‘refugee’ within international frameworks,” while Dr. Bogardi, Director of UNU’s Institute for Environment and Human Security in Bonn...Modified Organisms (GMOs) Continues FAO calls for an international framework for GM trees GM Crops Created Superweed Europe to Redouble Efforts to...avoid eventual damages to their crops , to protection of endangered species that need special habitat conditions. Enviromatics could impact
NASA Astrophysics Data System (ADS)
Wang, G.; Liu, L.; Chen, G.
2016-12-01
The complex environmental physical and chemical processes and interplay with the associating biological responses are keys to understanding the environmental microbiology ensconced in environmental remediation, water quality control, food safety, nutrient cycling, and etc., yet remain poorly understood. Using experimental micromodels, we study how environmental conditions (e.g., hydration fluctuation, nutrient limitation, pH variation, etc.) affect microbial extracellular polymeric substances (EPS) production and their configuration within various hydrated surfaces, and impacts on microbial motility, surface attachment, aggregation, and other bioremediation activities. To elucidate the potential mechanisms underlying the complex bio-physicochemical processes, we developed an individual-based and spatio-temporally resolved modeling platform that explicitly considers microscale aqueous-phase configuration and nutrient transport/diffusion and associated biophysical processes affecting individual microbial cell life history. We quantitatively explore the effects of the above microscale environmental processes on bio-physicochemical interactions affecting microbial growth, motility, surface attachment and aggregation, and shaping population interactions and functions. Simulation scenarios of microbial induced pollutant (e.g., roxarsone) biotransformation on various hydrated rough surfaces will also be present.
Develop a solution for protecting and securing enterprise networks from malicious attacks
NASA Astrophysics Data System (ADS)
Kamuru, Harshitha; Nijim, Mais
2014-05-01
In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic as they are configured on a per-zone basis. Depending on the type of screen being configured, there may be additional settings beyond simply blocking the traffic. Attack prevention is also a native function of any firewall. Juniper Firewall handles traffic on a per-flow basis. We can use flows or sessions as a way to determine whether traffic attempting to traverse the firewall is legitimate. We control the state-checking components resident in Juniper Firewall by configuring "flow" settings. These settings allow you to configure state checking for various conditions on the device. You can use flow settings to protect against TCP hijacking, and to generally ensure that the fire-wall is performing full state processing when desired. We take a case study of attack on a network and perform study of the detection of the malicious packets on a Net screen Firewall. A new solution for securing enterprise networks will be developed here.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS..., safekeeping, accountability, transmission, disposition, and destruction of classification information and... shall conform with the National Security Council Directive of May 17, 1972, governing the classification...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS..., safekeeping, accountability, transmission, disposition, and destruction of classification information and... shall conform with the National Security Council Directive of May 17, 1972, governing the classification...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS..., safekeeping, accountability, transmission, disposition, and destruction of classification information and... shall conform with the National Security Council Directive of May 17, 1972, governing the classification...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS..., safekeeping, accountability, transmission, disposition, and destruction of classification information and... shall conform with the National Security Council Directive of May 17, 1972, governing the classification...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greenwald, P.T.
In the post Cold War era, the East-West conflict may be succeeded by a new confrontation which pits an industrialized North against a developing South. In June 1992, world attention was fixed on the Earth Summit in Rio de Janeiro. This event marked a milestone in global environmental awareness; but just as the end of the Cold War has provided new opportunities for the US, the world is now faced with new sources of conflict which have advanced to the forefront of the national security debate. Among the new sources of conflict, environmental problems are rapidly becoming preeminent. Within nationalmore » security debates, those environmental problems which respect no international boundary are of particular concern. Worldwide deforestation, and the related issues of global warming and the loss of biodiversity, represent a clear threat to national security. Two percent of the Earth's rainforests are lost each year; one 'football field' is lost each second. Deforestation has already led to conflict and instability within several regions of the world including Southeast Asia. The United States must recognize the character and dynamics of these new sources of conflict in order to successfully realize its policy aims in national security. The US should preempt conflict through cooperation and develop a shared concern for the environment throughout the world. The US military may play a key role in this effort. Rainforest, Deforestation, Tropical timber, Logging, Southeast Asia, Philippines, Malaysia, Indonesia, Thailand, Burma, Laos, Japan Cambodia, Vietnam, Human rights, Plywood, Pulp, Paper, World Bank, U.S. Agency for International Development.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-11
..., Office of Chief Counsel, Federal Emergency Management Agency, Room 835, 500 C Street, SW., Washington, DC... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID FEMA-2010-0022] Environmental Planning and Historic Preservation Compliance Costs Policy; Environmental Planning and Historic...
The Environmental Information Exchange Network (EN) is an Internet-based system used by state, tribal and territorial partners to securely share environmental and health information with one another and EPA.
NASA Astrophysics Data System (ADS)
Cinquini, L.; Bell, G. M.; Williams, D.; Harney, J.
2012-12-01
The Earth System Grid Federation (ESGF) is a multi-agency, international collaboration that aims at developing state-of-the-art services for the management and access of Earth system data. ESGF is currently used to serve the totality of the model output used for the forthcoming IPCC 5th assessment report on climate change, as well as supporting observational and reanalysis datasets. Also, it is been adopted by several other projects that focus on global, regional and local climate modeling. The ESGF software stack is composed of several modular applications that cover related but disjoint areas of functionality: data publishing, data search and discovery, data access, user management, security, and federation. Overall, the ESGF infrastructure offers a configurable end-to-end solution to the problem of enabling web-based access to large amounts of geospatial data. This talk will present the architectural and configuration options that are available to a data provider leveraging ESGF to serve their data: which services to expose, how to scale to larger data collections, how to establish access control, how to customize the user interface, and others. Additionally, the framework provides extension points that allow each site to plug in custom functionality such as crawling of specific metadata repositories, exposing domain-specific analysis and visualization services, developing custom access clients that interact with the system APIs. These configuration and extension capabilities are based on simple but effective domain-specific object models, that underpin the software applications: the data model, the security model, and the federation model. The ESGF software stack is developed collaboratively by software engineers at many institutions around the world, and is made freely available to the community under an open source license to promote adoption, reuse, inspection and continuous improvement.
D'Souza, Clive; Paquet, Victor; Lenker, James A; Steinfeld, Edward
2017-07-01
The emergence of low-floor bus designs and related regulatory standards in the U.S. have resulted in substantial improvements in public transit accessibility. However, passengers using wheeled mobility devices still experience safety concerns and inefficiencies in boarding, disembarking, and interior circulation on low-floor buses. This study investigates effects of low-floor bus interior configuration and passenger crowding on boarding and disembarking efficiency and safety. Users of manual wheelchairs (n = 18), powered wheelchairs (n = 21) and electric scooters (n = 9) simulated boarding and disembarking in three interior layout configurations at low and high passenger crowding conditions on a full-scale laboratory mock-up of a low-floor bus. Dependent measures comprised task times and critical incidents during access ramp use, fare payment, and movement to and from the doorway and wheeled mobility securement area. Individual times for unassisted boarding ranged from 15.2 to 245.3 s and for disembarking ranged from 9.1 to 164.6 s across layout and passenger crowding conditions. Nonparametric analysis of variance showed significant differences and interactions across vehicle design conditions, passenger load and mobility device type on user performance. The configuration having electronic on-board fare payment, rear-bus entrance doorways and adjacent device securement areas demonstrated greatest efficiency and safety. High passenger load adversely impacted efficiency and frequency of critical incidents during on-board circulation across all three layouts. Findings have broader implications for improving transit system efficiency and quality of service across the spectrum of transit users. Copyright © 2017 Elsevier Ltd. All rights reserved.
Polymer Dispersed Liquid Crystal Displays
NASA Astrophysics Data System (ADS)
Doane, J. William
The following sections are included: * INTRODUCTION AND HISTORICAL DEVELOPMENT * PDLC MATERIALS PREPARATION * Polymerization induced phase separation (PIPS) * Thermally induced phase separation (TIPS) * Solvent induced phase separation (SIPS) * Encapsulation (NCAP) * RESPONSE VOLTAGE * Dielectric and resistive effects * Radial configuration * Bipolar configuration * Other director configurations * RESPONSE TIME * DISPLAY CONTRAST * Light scattering and index matching * Incorporation of dyes * Contrast measurements * PDLC DISPLAY DEVICES AND INNOVATIONS * Reflective direct view displays * Large-scale, flexible displays * Switchable windows * Projection displays * High definition spatial light modulator * Haze-free PDLC shutters: wide angle view displays * ENVIRONMENTAL STABILITY * ACKNOWLEDGEMENTS * REFERENCES
Wang, Zhong L [Marietta, GA; Wang, Xudong [Atlanta, GA; Qin, Yong [Atlanta, GA; Yang, Rusen [Atlanta, GA
2011-07-19
A small scale electrical generator includes an elongated substrate and a first piezoelectric fine wire. The first piezoelectric fine wire is disposed along a surface of the substrate. The first piezoelectric fine wire has a first end and a spaced-apart second end. A first conductive contact secures the first end of the fine wire to a first portion of the substrate and a second conductive contact secures the second end of the fine wire to a second portion of the substrate. A fabric made of interwoven strands that includes fibers from which piezoelectric nanowires extend radially therefrom and conductive nanostructures extend therefrom is configured to generate electricity.
Insider Alert 1.0 Beta Version
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abbott, Robert
2004-02-01
Insider Alert 1.0 Beta Version supports interactive selection and graphical display of data generated by the Sandia Cognitive Framework, which simulates the examination of security data by experts of various specialties. Insider Alert also encompasses the configuration and data files input to the Cognitive Framework for this application. Insider Alert 1.0 Beta Version is a computer program for analyzing data indicative of possible espionage or improper handling of data by employees at Sandia National Laboratories (or other facilities with comparable policies and procedures for managing sensitive information) It prioritizes and displays information for review by security analysts.
Controlling multiple security robots in a warehouse environment
NASA Technical Reports Server (NTRS)
Everett, H. R.; Gilbreath, G. A.; Heath-Pastore, T. A.; Laird, R. T.
1994-01-01
The Naval Command Control and Ocean Surveillance Center (NCCOSC) has developed an architecture to provide coordinated control of multiple autonomous vehicles from a single host console. The multiple robot host architecture (MRHA) is a distributed multiprocessing system that can be expanded to accommodate as many as 32 robots. The initial application will employ eight Cybermotion K2A Navmaster robots configured as remote security platforms in support of the Mobile Detection Assessment and Response System (MDARS) Program. This paper discusses developmental testing of the MRHA in an operational warehouse environment, with two actual and four simulated robotic platforms.
Nevada National Security Site Environmental Report Summary 2016
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, Cathy
This document is a summary of the full 2016 Nevada National Security Site Environmental Report (NNSSER) prepared by the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/ NFO). This summary provides an abbreviated and more readable version of the full NNSSER. NNSA/NFO prepares the NNSSER to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the Nevada National Security Site (NNSS) to protect the public and the environment from radiation hazards and from potential nonradiological impacts. It is a comprehensive report of environmental activities performed at the NNSS andmore » offsite facilities over the previous calendar year. The NNSS is currently the nation’s unique site for ongoing national security–related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access as well as by lands that are open to public entry. In 2016, National Security Technologies, LLC (NSTec), was the NNSS Management and Operations Contractor accountable for ensuring work was performed in compliance with environmental regulations. NNSS activities in 2016 continued to be diverse, with the primary goal to ensure that the existing U.S. stockpile of nuclear weapons remains safe and reliable. Other activities included weapons of mass destruction first responder training; the controlled release of hazardous material at the Nonproliferation Test and Evaluation Complex (NPTEC); remediation of legacy contamination sites; characterization of waste destined for the Waste Isolation Pilot Plant in Carlsbad, New Mexico, or the Idaho National Laboratory in Idaho Falls, Idaho; disposal of low-level and mixed low-level radioactive waste; and environmental research. Facilities and centers that support the National Security/Defense mission include the U1a Facility, Big Explosives Experimental Facility (BEEF), Device Assembly Facility (DAF), National Criticality Experiments Research Center (NCERC) located in the DAF, Joint Actinide Shock Physics Experimental Research (JASPER) Facility, Dense Plasma Focus (DPF) Facility located in the Los Alamos Technical Facility (LATF), and the Radiological/ Nuclear Countermeasures Test and Evaluation Complex (RNCTEC). Facilities that support the Environmental Management mission include the Area 5 Radioactive Waste Management Complex (RWMC) and the Area 3 Radioactive Waste Management Site (RWMS), which has been in cold standby since 2006.« less
Application of laser-wakefield-based x-ray source to global food security issues
NASA Astrophysics Data System (ADS)
Kieffer, J. C.; Fourmaux, S.; Hallin, E.; Arnison, P.; Brereton, N.; Pitre, F.; Dixon, M.; Tran, N.
2017-05-01
We present the development of a high throughput phase contrast screening system based on LWFA Xray sources for plant imaging. We upgraded the INRS laser-betatron beam line and we illustrate its imaging potential through the innovative development of new tools for addressing issues relevant to global food security. This initiative, led by the Global Institute of Food Security (GIFS) at the U of Saskatchewan, aims to elucidate that part of the function that maps environmental inputs onto specific plant phenotypes. The prospect of correlating phenotypic expression with adaptation to environmental stresses will provide researchers with a new tool to assess breeding programs for crops meant to thrive under the climate extremes.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Working Group. (a) There is established a Chemical Facility Safety and Security Working Group (Working Group) co-chaired by the Secretary of Homeland Security, the Administrator of the Environmental... Secretary level or higher. In addition, the Working Group shall consist of the head of each of the following...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-22
... to prevent delays in decision-making. The proposed actions grow out of needs identified by USSS... respond to the street closures and re-design of security elements to ensure the iconic historic nature of... security elements in place of the temporary security elements identified above. The intent is to integrate...
Wiebe, David J.; Charron, Richard C.; Morrison, Jay A.
2016-10-18
A gas turbine engine ducting arrangement (10), including: an annular chamber (14) configured to receive a plurality of discrete flows of combustion gases originating in respective can combustors and to deliver the discrete flows to a turbine inlet annulus, wherein the annular chamber includes an inner diameter (52) and an outer diameter (60); an outer diameter mounting arrangement (34) configured to permit relative radial movement and to prevent relative axial and circumferential movement between the outer diameter and a turbine vane carrier (20); and an inner diameter mounting arrangement (36) including a bracket (64) secured to the turbine vane carrier, wherein the bracket is configured to permit the inner diameter to move radially with the outer diameter and prevent axial deflection of the inner diameter with respect to the outer diameter.
2012-11-26
Pleistocene/Early-Holocene Prehistory (12,000 to 7,000 BP). The Lake Mojave Period in the southwestern Great Basin comprises a regional manifestation...adaptive patterns with focal exploitation of such habitats (Tetra Tech 2010). Middle-Holocene Prehistory (8,000 to 4,000 BP). Succeeding Lake Mojave in the...Security Fence at Edwards Air Force Base, California Late Holocene Prehistory (4,000 to Contact). With return to more “favorable” environmental
Dynamically corrected gates for singlet-triplet spin qubits with control-dependent errors
NASA Astrophysics Data System (ADS)
Jacobson, N. Tobias; Witzel, Wayne M.; Nielsen, Erik; Carroll, Malcolm S.
2013-03-01
Magnetic field inhomogeneity due to random polarization of quasi-static local magnetic impurities is a major source of environmentally induced error for singlet-triplet double quantum dot (DQD) spin qubits. Moreover, for singlet-triplet qubits this error may depend on the applied controls. This effect is significant when a static magnetic field gradient is applied to enable full qubit control. Through a configuration interaction analysis, we observe that the dependence of the field inhomogeneity-induced error on the DQD bias voltage can vary systematically as a function of the controls for certain experimentally relevant operating regimes. To account for this effect, we have developed a straightforward prescription for adapting dynamically corrected gate sequences that assume control-independent errors into sequences that compensate for systematic control-dependent errors. We show that accounting for such errors may lead to a substantial increase in gate fidelities. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. DOE's National Nuclear Security Administration under contract DE-AC04-94AL85000.
NASA Astrophysics Data System (ADS)
Veilleux, J. C.; Sullivan, G. S.; Paola, C.; Starget, A.; Watson, J. E.; Hwang, Y. J.; Picucci, J. A.; Choi, C. S.
2014-12-01
The Countries at Risk project is a global assessment of countries with transboundary water resources that are at risk for conflict because of high human security instability. Building upon Basins at Risk (BAR) research, our team used updated Transboundary Freshwater Dispute Database georeferenced social and environmental data, quantitative data from global indices, and qualitative data from news media sources. Our assessment considered a combination of analyzing 15 global indices related to water or human security to identify which countries scored as highest risk in each index. From this information, we were able to assess the highest risk countries' human security risk by using a new human security measurement tool, as well as comparing this analysis to the World Bank's Fragile States Index and the experimental Human Security Index. In addition, we identified which countries have the highest number of shared basins, the highest percentage of territory covered by a transboundary basin, and the highest dependency of withdrawal from transboundary waters from outside their country boundaries. By synthesizing these social and environmental data assessments, we identified five countries to analyze as case studies. These five countries are Afghanistan, China, Iraq, Moldova, and Sudan. We created a series of 30 maps to spatial analyze the relationship between the transboundary basins and social and environmental parameters to include population, institutional capacity, and physical geography by country. Finally, we synthesized our spatial analysis, Human Security Key scores, and current events scored by using the BAR scale to determine what aspects and which basins are most at risk with each country in our case studies and how this concerns future global water resources.
Clinton administration forging population-foreign policy links.
De Sherbinin, A
1994-12-01
In the US, the Clinton administration has renewed the link between global population and national security issues. These so-called "soft security issues" receive attention from the Under-Secretary of State for Global Affairs, Tim Wirth, and the senior director of the Global Environmental Affairs branch of the National Security Council, Eileen Claussen. Wirth and Claussen draft the US response to soft security issues such as environmental security, refugee and migration movements, political instability, and religious and ethnic conflict as well as the other nonmilitary threats of illegal drug trafficking, terrorism, and international organized crime. Population was first considered a foreign policy concern in the 1960s. By 1965, President Johnson decided that the US would provide family planning supplies and technical assistance to any country which asked for help. The initial justification for assuming a leading role in developing innovative population strategies for less developed countries was a humanitarian desire to forward economic development, the self-interest of maintaining access to resources, and concern that rapid growth produced more communists. Today the US remains concerned about resource access and economic development and is also wary of spill-over environmental effects, economic migration, diminished US trade opportunities, political asylum seekers and refugees, and increasing demand for US peacekeepers. It is also believed that rapid population growth leads to political destabilization. Critics of these views blame the development difficulties of less developed countries on poor governing decisions (inadequate institutions, trade barriers, or indifference). Women's reproductive rights advocates fear that using security as a rationale for population assistance could lead to restrictions on women's rights to choose the number and spacing of births. Despite such objections, the belief that population growth is an underlying problem in imploding states like Haiti, Rwanda, and Somalia has turned the attention of US policy-makers to these soft security issues.
Code of Federal Regulations, 2014 CFR
2014-07-01
... of coastal waters. Note: Inland waters are those waters where the Environmental Protection Agency has... for Marine Safety, Security and Environmental Protection means the Coast Guard Officer designated by..., port and environmental safety, and waterways management. (e) Coastal waters means all U.S. waters...
Code of Federal Regulations, 2013 CFR
2013-07-01
... of coastal waters. Note: Inland waters are those waters where the Environmental Protection Agency has... for Marine Safety, Security and Environmental Protection means the Coast Guard Officer designated by..., port and environmental safety, and waterways management. (e) Coastal waters means all U.S. waters...
Code of Federal Regulations, 2011 CFR
2011-07-01
... of coastal waters. Note: Inland waters are those waters where the Environmental Protection Agency has... for Marine Safety, Security and Environmental Protection means the Coast Guard Officer designated by..., port and environmental safety, and waterways management. (e) Coastal waters means all U.S. waters...
Code of Federal Regulations, 2010 CFR
2010-07-01
... of coastal waters. Note: Inland waters are those waters where the Environmental Protection Agency has... for Marine Safety, Security and Environmental Protection means the Coast Guard Officer designated by..., port and environmental safety, and waterways management. (e) Coastal waters means all U.S. waters...
Code of Federal Regulations, 2012 CFR
2012-07-01
... of coastal waters. Note: Inland waters are those waters where the Environmental Protection Agency has... for Marine Safety, Security and Environmental Protection means the Coast Guard Officer designated by..., port and environmental safety, and waterways management. (e) Coastal waters means all U.S. waters...
49 CFR 571.225 - Standard No. 225; Child restraint anchorage systems.
Code of Federal Regulations, 2011 CFR
2011-10-01
... N of preload prior to the test. The strap is fitted at one end with a high strength steel tether... systems to ensure their proper location and strength for the effective securing of child restraints, to... manufactured on or after September 1, 1999, shall comply with the configuration, location, marking and strength...
78 FR 14160 - Airworthiness Directives; Diamond Aircraft Industries GmbH Airplanes
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-05
... aviation product. The MCAI describes the unsafe condition as installation of an unsuitable self-locking nut... fuselage, as a result of installation of a non-suitable self-locking nut. The subsequent design review of... configuration has a failure potential when components such as thin self-securing nuts and bearings are aging and...
40 CFR 63.564 - Monitoring requirements.
Code of Federal Regulations, 2011 CFR
2011-07-01
... all times when the car seals have been broken and the valve position has been changed. Each by-pass line valve shall be secured in the closed position with a car-seal or a lock-and-key type configuration... for this purpose). (e) Combustion device, except flare. For sources complying with § 63.563(b)(4), use...
40 CFR 63.564 - Monitoring requirements.
Code of Federal Regulations, 2010 CFR
2010-07-01
... all times when the car seals have been broken and the valve position has been changed. Each by-pass line valve shall be secured in the closed position with a car-seal or a lock-and-key type configuration... for this purpose). (e) Combustion device, except flare. For sources complying with § 63.563(b)(4), use...
40 CFR 63.148 - Leak inspection provisions.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Standards for Organic Hazardous Air Pollutants From the Synthetic Organic Chemical Manufacturing Industry... line; or (2) Secure the bypass line valve in the closed position with a car-seal or a lock-and-key type... configuration has been checked out, and records of any car-seal that has broken. (4) For each inspection during...
40 CFR 63.148 - Leak inspection provisions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Standards for Organic Hazardous Air Pollutants From the Synthetic Organic Chemical Manufacturing Industry... line; or (2) Secure the bypass line valve in the closed position with a car-seal or a lock-and-key type... configuration has been checked out, and records of any car-seal that has broken. (4) For each inspection during...
40 CFR 63.148 - Leak inspection provisions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Standards for Organic Hazardous Air Pollutants From the Synthetic Organic Chemical Manufacturing Industry... line; or (2) Secure the bypass line valve in the closed position with a car-seal or a lock-and-key type... configuration has been checked out, and records of any car-seal that has broken. (4) For each inspection during...
40 CFR 63.148 - Leak inspection provisions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Standards for Organic Hazardous Air Pollutants From the Synthetic Organic Chemical Manufacturing Industry... line; or (2) Secure the bypass line valve in the closed position with a car-seal or a lock-and-key type... configuration has been checked out, and records of any car-seal that has broken. (4) For each inspection during...
Security Paving Company, Inc.: Consent Agreement and Proposed Final Order
Consent Agreement and Proposed Final Order (“Proposed Consent Agreement”), between the U.S. Environmental Protection Agency, Region 9 (“EPA”), and Security Paving Company (“Respondent”) to resolve a civil administrative penalty proceeding.
Earth Observation for Food Security and Sustainable Agriculture
NASA Astrophysics Data System (ADS)
Bach, Heike; Mauser, Wolfram; Gernot, Klepper
2016-08-01
The global and regional potentials of Earth Observation (EO) to contribute to food security and sustainable agriculture in the 2050-timeframe were analysed in the ESA study EO4Food, whose outcome will be presented (www.EO4Food.org). Emphasis was put on the global societal, economic, environmental and technological megatrends that will create demand for food and shape the future societies. They will also constitute the background for developments in EO for food security and sustainable agriculture. The capabilities of EO in this respect were critically reviewed with three perspectives 1) the role of EO science for society, 2) observables from space and 3) development of future science missions.It was concluded that EO can be pivotal for the further development of food security and sustainable agriculture. EO allows to support the whole economic and societal value chain from farmers through food industry to insurance and financial industry in satisfying demands and at the same time to support society in governing sustainable agriculture through verifyable rules and regulations. It has the potential to become the global source of environmental information that is assimilated into sophisticated environmental management models and is used to make agriculture sustainable.
Hydrogen Production from Nuclear Energy
NASA Astrophysics Data System (ADS)
Walters, Leon; Wade, Dave
2003-07-01
During the past decade the interest in hydrogen as transportation fuel has greatly escalated. This heighten interest is partly related to concerns surrounding local and regional air pollution from the combustion of fossil fuels along with carbon dioxide emissions adding to the enhanced greenhouse effect. More recently there has been a great sensitivity to the vulnerability of our oil supply. Thus, energy security and environmental concerns have driven the interest in hydrogen as the clean and secure alternative to fossil fuels. Remarkable advances in fuel-cell technology have made hydrogen fueled transportation a near-term possibility. However, copious quantities of hydrogen must be generated in a manner independent of fossil fuels if environmental benefits and energy security are to be achieved. The renewable technologies, wind, solar, and geothermal, although important contributors, simply do not comprise the energy density required to deliver enough hydrogen to displace much of the fossil transportation fuels. Nuclear energy is the only primary energy source that can generate enough hydrogen in an energy secure and environmentally benign fashion. Methods of production of hydrogen from nuclear energy, the relative cost of hydrogen, and possible transition schemes to a nuclear-hydrogen economy will be presented.
Lamnatou, Chr; Motte, F; Notton, G; Chemisana, D; Cristofari, C
2018-04-15
Building-integrated solar thermal (BIST) systems are a specific type of solar thermal systems which are integrated into the building and they participate in building functionality. The present article is about the life-cycle assessment of different options of a BIST system (Mediterranean climatic conditions: Ajaccio, France). The environmental profile of the studied configurations is assessed by means of CED (cumulative energy demand), GWP (global warming potential) and EPBT (energy payback time). The proposed configurations (for the collector) include: i) a system without PCM (phase change material) using only rock wool as insulation and ii) a system with PCM (myristic acid) and rock wool. Concerning life-cycle results based on CED and GWP 100a (scenario without recycling), the configuration without PCM shows 0.67 MJ prim /kWh and 0.06 kg CO 2.eq /kWh while the configuration with PCM presents 0.74 MJ prim /kWh and 0.08 kg CO 2.eq /kWh. Regarding EPBT, if the inputs for pumping/auxiliary heating are not taken into account, both configurations (with/without PCM) have almost the same EPBT (about 1.3 years). On the other hand, if the inputs for pumping/auxiliary heating are considered, EPBT is lower for the system with PCM. In addition, scenarios with recycling have been examined and the results demonstrate that recycling considerably improves the environmental profile of the studied configurations. Copyright © 2018 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Li, Z. J.; Tian, Q.; Song, L. L.
2016-08-01
In this study, the analytic hierarchy process (ahp), ecological security index(S) and PSR model were used to evaluate Gansu's ecological security based on the large number of survey data. The results indicated that Gansu's ecological security index increased from 0.31 in 1986 to 0.66 in 2013, which reflected ecological security was in sensitive state (0.7༞S≥⃒0.5). The main reason was that national policy on protecting the ecological environment has played a crucial role, especially the national project of returning farmland to forest and grass carried out in recent years. Moreover, the environmental issues such as the higher PM2.5, sand storms and climate extremes, had significantly improved people's environmental awareness in the study area. The regional difference of ecological security index was significant in Gansu Provinces, and the part of Yangtze river basin was higher than the part of Yellow River basin, whiles the in-land river basin was the lowest value. In a world, Gansu's ecological security had improved in recent years, but there was strong need for paying more attention to policy for ecological environment protection and increasing the propaganda to ensure the Gansu's ecological security in the future. This study will provide a scientific basis for the sustainable development of regional social economy and ecological environment.
Elgenaidi, Walid; Newe, Thomas; O'Connell, Eoin; Toal, Daniel; Dooly, Gerard
2016-12-21
There has been a significant increase in the proliferation and implementation of Wireless Sensor Networks (WSNs) in different disciplines, including the monitoring of maritime environments, healthcare systems, and industrial sectors. It has now become critical to address the security issues of data communication while considering sensor node constraints. There are many proposed schemes, including the scheme being proposed in this paper, to ensure that there is a high level of security in WSNs. This paper presents a symmetric security scheme for a maritime coastal environment monitoring WSN. The scheme provides security for travelling packets via individually encrypted links between authenticated neighbors, thus avoiding a reiteration of a global rekeying process. Furthermore, this scheme proposes a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party. The technique has been implemented in real time on a Waspmote test bed sensor platform and the results from both field testing and indoor bench testing environments are discussed in this paper.
Elgenaidi, Walid; Newe, Thomas; O’Connell, Eoin; Toal, Daniel; Dooly, Gerard
2016-01-01
There has been a significant increase in the proliferation and implementation of Wireless Sensor Networks (WSNs) in different disciplines, including the monitoring of maritime environments, healthcare systems, and industrial sectors. It has now become critical to address the security issues of data communication while considering sensor node constraints. There are many proposed schemes, including the scheme being proposed in this paper, to ensure that there is a high level of security in WSNs. This paper presents a symmetric security scheme for a maritime coastal environment monitoring WSN. The scheme provides security for travelling packets via individually encrypted links between authenticated neighbors, thus avoiding a reiteration of a global rekeying process. Furthermore, this scheme proposes a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party. The technique has been implemented in real time on a Waspmote test bed sensor platform and the results from both field testing and indoor bench testing environments are discussed in this paper. PMID:28009834
Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks
Pinto, Mónica; Gámez, Nadia; Fuentes, Lidia; Amor, Mercedes; Horcas, José Miguel; Ayala, Inmaculada
2015-01-01
Providing security and privacy to wireless sensor nodes (WSNs) is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs) allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies) and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs). We evaluate our approach using a case study from the intelligent transportation system domain. PMID:25746093
Multiple piece turbine engine airfoil with a structural spar
Vance, Steven J [Orlando, FL
2011-10-11
A multiple piece turbine airfoil having an outer shell with an airfoil tip that is attached to a root with an internal structural spar is disclosed. The root may be formed from first and second sections that include an internal cavity configured to receive and secure the one or more components forming the generally elongated airfoil. The internal structural spar may be attached to an airfoil tip and place the generally elongated airfoil in compression. The configuration enables each component to be formed from different materials to reduce the cost of the materials and to optimize the choice of material for each component.
Reducing Food Loss and Waste to Enhance Food Security and Environmental Sustainability.
Shafiee-Jood, Majid; Cai, Ximing
2016-08-16
While food shortage remains a big concern in many regions around the world, almost one-third of the total food production is discarded as food loss and waste (FLW). This is associated with about one-quarter of land, water, and fertilizer used for crop production, even though resources and environmental constraints are expected to limit food production around the world. FLW reduction represents a potential opportunity to enhance both food security and environmental sustainability and therefore has received considerable attention recently. By reviewing the recent progress and new developments in the literature, this paper highlights the importance of FLW prevention as a complementary solution to address the Grand Challenge of global food security and environmental sustainability. However, raising awareness only is not enough to realize the expected FLW reduction. We identify the knowledge gaps and opportunities for research by synthesizing the strategies of FLW reduction and the barriers, including (1) filling the data gaps, (2) quantifying the socioeconomic and environmental impacts of FLW reduction strategies, (3) understanding the scale effects, and (4) exploring the impacts of global transitions. It is urgent to take more aggressive yet scientifically based actions to reduce FLW, which require everyone's involvement along the food supply chain, including policy makers, food producers and suppliers, and food consumers.
Industrial Sites - An Approach to Closure
None
2018-01-16
The Environmental Management (EM) Program at the Nevada Site Office was created by the U.S. Department of Energy (DOE) to address the environmental legacy of contamination resulting from more than 50 years of nuclear weapons research, production and testing. The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NSO) is responsible for remediating portions of the Nevada National Security Site (formerly the Nevada Test Site) and the Tonopah Test Range, which is within the Nevada Test and Training Range.
Marine asset security and tracking (MAST) system
Hanson, Gregory Richard [Clinton, TN; Smith, Stephen Fulton [Loudon, TN; Moore, Michael Roy [Corryton, TN; Dobson, Eric Lesley [Charleston, SC; Blair, Jeffrey Scott [Charleston, SC; Duncan, Christopher Allen [Marietta, GA; Lenarduzzi, Roberto [Knoxville, TN
2008-07-01
Methods and apparatus are described for marine asset security and tracking (MAST). A method includes transmitting identification data, location data and environmental state sensor data from a radio frequency tag. An apparatus includes a radio frequency tag that transmits identification data, location data and environmental state sensor data. Another method includes transmitting identification data and location data from a radio frequency tag using hybrid spread-spectrum modulation. Another apparatus includes a radio frequency tag that transmits both identification data and location data using hybrid spread-spectrum modulation.
EPA Efforts in the Middle East
US EPA’s environmental cooperation in the Middle East focuses on capacity building in environmental governance, water pollution and water security, clean fuels and vehicles, public participation, and pollution prevention.
NASA Technical Reports Server (NTRS)
Swenson, Paul
2017-01-01
Satellite/Payload Ground Systems - Typically highly-customized to a specific mission's use cases - Utilize hundreds (or thousands!) of specialized point-to-point interfaces for data flows / file transfers Documentation and tracking of these complex interfaces requires extensive time to develop and extremely high staffing costs Implementation and testing of these interfaces are even more cost-prohibitive, and documentation often lags behind implementation resulting in inconsistencies down the road With expanding threat vectors, IT Security, Information Assurance and Operational Security have become key Ground System architecture drivers New Federal security-related directives are generated on a daily basis, imposing new requirements on current / existing ground systems - These mandated activities and data calls typically carry little or no additional funding for implementation As a result, Ground System Sustaining Engineering groups and Information Technology staff continually struggle to keep up with the rolling tide of security Advancing security concerns and shrinking budgets are pushing these large stove-piped ground systems to begin sharing resources - I.e. Operational / SysAdmin staff, IT security baselines, architecture decisions or even networks / hosting infrastructure Refactoring these existing ground systems into multi-mission assets proves extremely challenging due to what is typically very tight coupling between legacy components As a result, many "Multi-Mission" ops. environments end up simply sharing compute resources and networks due to the difficulty of refactoring into true multi-mission systems Utilizing continuous integration / rapid system deployment technologies in conjunction with an open architecture messaging approach allows System Engineers and Architects to worry less about the low-level details of interfaces between components and configuration of systems GMSEC messaging is inherently designed to support multi-mission requirements, and allows components to aggregate data across multiple homogeneous or heterogeneous satellites or payloads - The highly-successful Goddard Science and Planetary Operations Control Center (SPOCC) utilizes GMSEC as the hub for it's automation and situational awareness capability Shifts focus towards getting GS to a final configuration-managed baseline, as well as multi-mission / big-picture capabilities that help increase situational awareness, promote cross-mission sharing and establish enhanced fleet management capabilities across all levels of the enterprise.
Chen, Li-Ding; Lu, Yi-He; Tian, Hui-Ying; Shi, Qian
2007-03-01
Global ecological security becomes increasingly important with the intensive human activities. The function of ecological security is influenced by human activities, and in return, the efficiency of human activities will also be affected by the patterns of regional ecological security. Since the 1990s, China has initiated the construction of key projects "Yangtze Three Gorges Dam", "Qinghai-Tibet Railway", "West-to-East Gas Pipeline", "West-to-East Electricity Transmission" and "South-to-North Water Transfer" , etc. The interaction between these projects and regional ecological security has particularly attracted the attention of Chinese government. It is not only important for the regional environmental protection, but also of significance for the smoothly implementation of various projects aimed to develop an ecological rehabilitation system and to design a regional ecological security pattern. This paper made a systematic analysis on the types and characteristics of key project construction and their effects on the environment, and on the basis of this, brought forward the basic principles and methodology for ecological rehabilitation and security pattern design in this construction. It was considered that the following issues should be addressed in the implementation of a key project: 1) analysis and evaluation of current regional ecological environment, 2) evaluation of anthropogenic disturbances and their ecological risk, 3) regional ecological rehabilitation and security pattern design, 4) scenario analysis of environmental benefits of regional ecological security pattern, 5) re-optimization of regional ecological system framework, and 6) establishment of regional ecosystem management plan.
Policy in Conflict: The Struggle Between Environmental Policy and Homeland Security Goals
2013-09-01
security by reducing consumption in the most important petroleum consuming sector, that of automobile transportation. Some U.S. oil dollars may be...sustainable energy security by reducing consumption in the most important petroleum consuming sector, that of automobile transportation. Some U.S...39 A. POLICY CHOICES............................................................................. 39 B. WHY IS THIS PROBLEM IMPORTANT
Naval War College Review. Volume 64, Number 2, Spring 2011
2011-01-01
to revolutionize the African maritime sector holistically, across its entire spectrum—improving safety and security, gover - nance, and industrial...strategy for a maritime economy that includes the enabling elements of gover - nance, infrastructure, trade, safety, and security and plainly tells global...transport in its core function); tourism ; energy; infrastructure (ports); cooperation on safety, security, and environmental protection; tariff harmonization
Environmental Degradation: Implications for National Security
1990-03-30
national interests, one can readily determine the points of confluencP. When the major security implications have been identified. realistic security...planning can be accomplished effectivelv. The major potential threat of East-West confrontation. characterized by massive conventional and nuclear arsenals...degradation. Economic infrastructures, the relative scarcity of resources, and surging population qrowth can combine to create a world not far removed from
NASA Astrophysics Data System (ADS)
Simonneaux, Jean; Simonneaux, Laurence
2012-01-01
Education for Sustainability has become an institutional requirement in many countries. It takes many forms that can integrate the teaching of environmental Socioscientific Issues (SSIs). In this context, we present the French notion of Socially Acute Questions (SAQs). We develop a theoretical frame to analyse educational configurations applied to the teaching of SAQs within the perspective of sustainability. This frame is built with a reference to a matrix integrating attributes of knowledge (universal, plural, engaged or contextualised), teachers' epistemological postures (scientism, utilitarianism, skepticsm or relativism) and various didactic strategies (doctrinal, problematizing, critical or pragmatic). To illustrate this frame, three situations of teaching-learning are compared.
Coons, David A; Barber, F Alan; Herbert, Morley A
2006-11-01
This study evaluated the strength and suture-tendon interface security of different suture configurations from triple-suture-loaded anchors. A juvenile bovine infraspinatus tendon was detached and repaired by use of 4 different suture combinations from 2 suture anchors: 3 simple sutures in each anchor (ThreeVo anchor; Linvatec, Largo, FL); 2 peripheral simple stitches and 1 central horizontal mattress suture passed deeper into the tendon, creating a larger footprint (bigfoot-print anchor); 2 peripheral simple stitches with 1 central horizontal mattress stitch passed through the same holes as the simple sutures (stitch-of-Burns); and 2 simple stitches (TwoVo anchor; Linvatec). The constructs were cyclically loaded between 10 N and 180 N for 3,500 cycles and then destructively tested. The number of cycles required to create a 5-mm gap and a 10-mm gap and the ultimate load to failure and failure mode were recorded. The ThreeVo anchor was strongest and most resistant to cyclic loading (P < .01). The TwoVo anchor was least resistant to cyclic loading. The stitch-of-Burns anchor was more resistant to cyclic loading than both the bigfoot-print anchor and the TwoVo anchor (P < .03). The ThreeVo, stitch-of-Burns, and TwoVo anchors were stronger than the bigfoot-print anchor (P < .05). Three simple sutures in an anchor hold better than two simple sutures. Three simple sutures provide superior suture-tendon security than combinations of one mattress and two simple stitches subjected to cyclic loading. A central mattress stitch placed more medially than two peripheral simple stitches (bigfoot-print anchor) configured to enlarge the tendon-suture footprint was not as resistant to cyclic loading or destructive testing as three simple stitches (ThreeVo anchor). Placing a central mattress stitch more medially than 2 peripheral simple stitches to enlarge the tendon-suture footprint was not as resistant to cyclic loading or destructive testing as 3 simple stitches.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Purpose. 11.1 Section 11.1 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS PURSUANT... the classification and declassification of national security information. They apply also to...
stability Science & Innovation Collaboration Careers Community Environment Science & Innovation . Provide a safe, secure, and effective stockpile Protect against the nuclear threat Counter emerging excellence STRATEGY We will create a modern workplace that is environmentally responsible, safe, and secure
Report: FISMA - Fiscal Year 2004 Status of EPA’s Computer Security Program
Report #2004-S-00007, September 30, 2004. This report synopsizes the results of information technology security work the U.S. Environmental Protection Agency’s Office of Inspector General (OIG) performed during Fiscal Year (FY) 2004.
A security architecture for health information networks.
Kailar, Rajashekar; Muralidhar, Vinod
2007-10-11
Health information network security needs to balance exacting security controls with practicality, and ease of implementation in today's healthcare enterprise. Recent work on 'nationwide health information network' architectures has sought to share highly confidential data over insecure networks such as the Internet. Using basic patterns of health network data flow and trust models to support secure communication between network nodes, we abstract network security requirements to a core set to enable secure inter-network data sharing. We propose a minimum set of security controls that can be implemented without needing major new technologies, but yet realize network security and privacy goals of confidentiality, integrity and availability. This framework combines a set of technology mechanisms with environmental controls, and is shown to be sufficient to counter commonly encountered network security threats adequately.
A Security Architecture for Health Information Networks
Kailar, Rajashekar
2007-01-01
Health information network security needs to balance exacting security controls with practicality, and ease of implementation in today’s healthcare enterprise. Recent work on ‘nationwide health information network’ architectures has sought to share highly confidential data over insecure networks such as the Internet. Using basic patterns of health network data flow and trust models to support secure communication between network nodes, we abstract network security requirements to a core set to enable secure inter-network data sharing. We propose a minimum set of security controls that can be implemented without needing major new technologies, but yet realize network security and privacy goals of confidentiality, integrity and availability. This framework combines a set of technology mechanisms with environmental controls, and is shown to be sufficient to counter commonly encountered network security threats adequately. PMID:18693862
Aristizábal M, Valentina; Gómez P, Álvaro; Cardona A, Carlos A
2015-11-01
This work presents a techno-economic and environmental assessment for a biorefinery based on sugarcane bagasse (SCB), and coffee cut-stems (CCS). Five scenarios were evaluated at different levels, conversion pathways, feedstock distribution, and technologies to produce ethanol, octane, nonane, furfural, and hydroxymethylfurfural (HMF). These scenarios were compared between each other according to raw material, economic, and environmental characteristics. A single objective function combining the Net Present Value and the Potential Environmental Impact was used through the Analytic Hierarchy Process approach to understand and select the best configurations for SCB and CCS cases. The results showed that the configuration with the best economic and environmental performance for SCB and CCS is the one that considers ethanol, furfural, and octane production (scenario 1). The global economic margin was 62.3% and 61.6% for SCB and CCS respectively. The results have shown the potential of these types of biomass to produce fuels and platform products. Copyright © 2015 Elsevier Ltd. All rights reserved.
46 CFR 113.05-7 - Environmental tests.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 4 2010-10-01 2010-10-01 false Environmental tests. 113.05-7 Section 113.05-7 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING COMMUNICATION AND ALARM SYSTEMS AND EQUIPMENT General Provisions § 113.05-7 Environmental tests. Communication, alarm system...
NASA Technical Reports Server (NTRS)
Gatlin, Gregory M.; Vicroy, Dan D.; Carter, Melissa B.
2012-01-01
A low-speed experimental investigation has been conducted on a 5.8-percent scale Hybrid Wing Body configuration in the NASA Langley 14- by 22-Foot Subsonic Tunnel. This Hybrid Wing Body (HWB) configuration was designed with specific intention to support the NASA Environmentally Responsible Aviation (ERA) Project goals of reduced noise, emissions, and fuel burn. This HWB configuration incorporates twin, podded nacelles mounted on the vehicle upper surface between twin vertical tails. Low-speed aerodynamic characteristics were assessed through the acquisition of force and moment, surface pressure, and flow visualization data. Longitudinal and lateral-directional characteristics were investigated on this multi-component model. The effects of a drooped leading edge, longitudinal flow-through nacelle location, vertical tail shape and position, elevon deflection, and rudder deflection have been studied. The basic configuration aerodynamics, as well as the effects of these configuration variations, are presented in this paper.
Single-electron random-number generator (RNG) for highly secure ubiquitous computing applications
NASA Astrophysics Data System (ADS)
Uchida, Ken; Tanamoto, Tetsufumi; Fujita, Shinobu
2007-11-01
Since the security of all modern cryptographic techniques relies on unpredictable and irreproducible digital keys generated by random-number generators (RNGs), the realization of high-quality RNG is essential for secure communications. In this report, a new RNG, which utilizes single-electron phenomena, is proposed. A room-temperature operating silicon single-electron transistor (SET) having nearby an electron pocket is used as a high-quality, ultra-small RNG. In the proposed RNG, stochastic single-electron capture/emission processes to/from the electron pocket are detected with high sensitivity by the SET, and result in giant random telegraphic signals (GRTS) on the SET current. It is experimentally demonstrated that the single-electron RNG generates extremely high-quality random digital sequences at room temperature, in spite of its simple configuration. Because of its small-size and low-power properties, the single-electron RNG is promising as a key nanoelectronic device for future ubiquitous computing systems with highly secure mobile communication capabilities.
Visual identification system for homeland security and law enforcement support
NASA Astrophysics Data System (ADS)
Samuel, Todd J.; Edwards, Don; Knopf, Michael
2005-05-01
This paper describes the basic configuration for a visual identification system (VIS) for Homeland Security and law enforcement support. Security and law enforcement systems with an integrated VIS will accurately and rapidly provide identification of vehicles or containers that have entered, exited or passed through a specific monitoring location. The VIS system stores all images and makes them available for recall for approximately one week. Images of alarming vehicles will be archived indefinitely as part of the alarming vehicle"s or cargo container"s record. Depending on user needs, the digital imaging information will be provided electronically to the individual inspectors, supervisors, and/or control center at the customer"s office. The key components of the VIS are the high-resolution cameras that capture images of vehicles, lights, presence sensors, image cataloging software, and image recognition software. In addition to the cameras, the physical integration and network communications of the VIS components with the balance of the security system and client must be ensured.
78 FR 50052 - Chief of Engineers Environmental Advisory Board; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-16
... environmentally sustainable manner. Discussions and presentations during this meeting will include flow management...., drivers license, state- issued photo ID, or passport), and pass through the security screening station...
Innovations in capture fisheries are an imperative for nutrition security in the developing world.
Hall, Stephen J; Hilborn, Ray; Andrew, Neil L; Allison, Edward H
2013-05-21
This article examines two strands of discourse on wild capture fisheries; one that focuses on resource sustainability and environmental impacts, another related to food and nutrition security and human well-being. Available data and research show that, for countries most dependent on fish to meet the nutritional requirements of their population, wild capture fisheries remain the dominant supplier. Although, contrary to popular narratives, the sustainability of these fisheries is not always and everywhere in crisis, securing their sustainability is essential and requires considerable effort across a broad spectrum of fishery systems. An impediment to achieving this is that the current research and policy discourses on environmental sustainability of fisheries and food security remain only loosely and superficially linked. Overcoming this requires adoption of a broader sustainability science paradigm to help harness synergies and negotiate tradeoffs between food security, resource conservation, and macroeconomic development goals. The way society chooses to govern fisheries is, however, an ethical choice, not just a technical one, and we recommend adding an ethical dimension to sustainability science as applied to fisheries.
Innovations in capture fisheries are an imperative for nutrition security in the developing world
Hall, Stephen J.; Hilborn, Ray; Andrew, Neil L.; Allison, Edward H.
2013-01-01
This article examines two strands of discourse on wild capture fisheries; one that focuses on resource sustainability and environmental impacts, another related to food and nutrition security and human well-being. Available data and research show that, for countries most dependent on fish to meet the nutritional requirements of their population, wild capture fisheries remain the dominant supplier. Although, contrary to popular narratives, the sustainability of these fisheries is not always and everywhere in crisis, securing their sustainability is essential and requires considerable effort across a broad spectrum of fishery systems. An impediment to achieving this is that the current research and policy discourses on environmental sustainability of fisheries and food security remain only loosely and superficially linked. Overcoming this requires adoption of a broader sustainability science paradigm to help harness synergies and negotiate tradeoffs between food security, resource conservation, and macroeconomic development goals. The way society chooses to govern fisheries is, however, an ethical choice, not just a technical one, and we recommend adding an ethical dimension to sustainability science as applied to fisheries. PMID:23671089
Code of Federal Regulations, 2010 CFR
2010-07-01
... further foreign policy and national security interests while at the same time taking into consideration important environmental concerns. (b) The Department of Defense acts with care in the global commons because... be through the Assistant Secretary of Defense (International Security Affairs). (e) Executive Order...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Definitions. 11.4 Section 11.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS.... Confidential refers to that national security information or material which requires protection. The test for...
Hahn, Henning; Hartmann, Kilian; Bühle, Lutz; Wachendorf, Michael
2015-03-01
The environmental performance of biogas plant configurations for a demand - oriented biogas supply for flexible power generation is comparatively assessed in this study. Those configurations indicate an increased energy demand to operate the operational enhancements compared to conventional biogas plants supplying biogas for baseload power generation. However, findings show that in contrast to an alternative supply of power generators with natural gas, biogas supplied on demand by adapted biogas plant configurations saves greenhouse gas emissions by 54-65 g CO(2-eq) MJ(-1) and primary energy by about 1.17 MJ MJ(-1). In this regard, configurations with flexible biogas production profit from reduced biogas storage requirements and achieve higher savings compared to configurations with continuous biogas production. Using thicker biogas storage sheeting material reduces the methane permeability of up to 6m(3) d(-1) which equals a reduction of 8% of the configuration's total methane emissions. Copyright © 2014 Elsevier Ltd. All rights reserved.
A cost effective FBG-based security fence with fire alarm function
NASA Astrophysics Data System (ADS)
Wu, H. J.; Li, S. S.; Lu, X. L.; Wu, Y.; Rao, Y. J.
2012-02-01
Fiber Bragg Grating (FBG) is sensitive to the temperature as well when it is measuring the strain change, which is always avoided in most measurement applications. However, in this paper strain/temperature dual sensitivity is utilized to construct a special security fence with a second function of fire threat prediction. In an FBG-based fiber fence configuration, only by characteristics analysis and identification method, it can intelligently distinguish the different effects of personal threats and fires from their different trends of the wavelength drifts. Thus without any additional temperature sensing fittings or other fire alarm systems integrated, a normal perimeter security system can possess a second function of fire prediction, which can not only monitor the intrusion induced by personal actions but also predict fire threats in advance. The experimental results show the effectiveness of the method.
NASA Astrophysics Data System (ADS)
Tang, Li; Liu, Jing-Ning; Feng, Dan; Tong, Wei
2008-12-01
Existing security solutions in network storage environment perform poorly because cryptographic operations (encryption and decryption) implemented in software can dramatically reduce system performance. In this paper we propose a cryptographic hardware accelerator on dynamically reconfigurable platform for the security of high performance network storage system. We employ a dynamic reconfigurable platform based on a FPGA to implement a PowerPCbased embedded system, which executes cryptographic algorithms. To reduce the reconfiguration latency, we apply prefetch scheduling. Moreover, the processing elements could be dynamically configured to support different cryptographic algorithms according to the request received by the accelerator. In the experiment, we have implemented AES (Rijndael) and 3DES cryptographic algorithms in the reconfigurable accelerator. Our proposed reconfigurable cryptographic accelerator could dramatically increase the performance comparing with the traditional software-based network storage systems.
Nevada National Security Site Environmental Report 2011 Attachment A: Site Description
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cathy Wills, ed.
2012-09-12
This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2011. Included are subsections that summarize the site's geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site's environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operationsmore » on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.« less
NASA Technical Reports Server (NTRS)
Cowan, W.
1974-01-01
Outer planetary probe designs consider mission characteristics, structural configuration, delivery mode, scientific payload, environmental extremes, mass properties, and the launch vehicle and spacecraft interface.
NASA Technical Reports Server (NTRS)
Luckring, James M.; Deere, Karen A.; Childs, Robert E.; Stremel, Paul M.; Long, Kurtis R.
2016-01-01
A hybrid transition trip-dot sizing and placement test technique was developed in support of recent experimental research on a hybrid wing-body configuration under study for the NASA Environmentally Responsible Aviation project. The approach combines traditional methods with Computational Fluid Dynamics. The application had three-dimensional boundary layers that were simulated with either fully turbulent or transitional flow models using established Reynolds-Averaged Navier-Stokes methods. Trip strip effectiveness was verified experimentally using infrared thermography during a low-speed wind tunnel test. Although the work was performed on one specific configuration, the process was based on fundamental flow physics and could be applicable to other configurations.
Review of the FY15 Defense Environmental International Cooperation (DEIC) Program
2016-03-01
Secretary of Defense for Energy, Installations and Environmental, Environmental Safety and Occupational Health [OASD (EI&E/ESOH)]. The views, opinions...DEIC Program The DEIC program, which resides within the Environment, Safety , and Occupational Health (ESOH) office of the Deputy Under Secretary of...resiliency, maritime safety and security, and environmental protection in general. 7 While this
Improving Environmental Model Calibration and Prediction
2011-01-18
REPORT Final Report - Improving Environmental Model Calibration and Prediction 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: First, we have continued to...develop tools for efficient global optimization of environmental models. Our algorithms are hybrid algorithms that combine evolutionary strategies...toward practical hybrid optimization tools for environmental models. 1. REPORT DATE (DD-MM-YYYY) 4. TITLE AND SUBTITLE 18-01-2011 13
Nevada National Security Site Environmental Report 2010
DOE Office of Scientific and Technical Information (OSTI.GOV)
C. Wills, ed.
2011-09-13
This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2010 at the Nevada Nationalmore » Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.« less
Managing the Environment for Older Students.
ERIC Educational Resources Information Center
Gelwicks, Louis E.; Weinstock, Ruth
1980-01-01
The environmental adjustments required to make campuses responsive to the needs of older persons are seen as tending to fall in the realm of environmental management. Security, orientation, sight, sound, ambient temperature, seating, time, transportation, lounges, and campus residence halls are some environmental needs which are discussed. (MLW)
Data security issues arising from integration of wireless access into healthcare networks.
Frenzel, John C
2003-04-01
The versatility of having Ethernet speed connectivity without wires is rapidly driving adoption of wireless data networking by end users across all types of industry. Designed to be easy to configure and work among diverse platforms, wireless brings online data to mobile users. This functionality is particularly useful in modern clinical medicine. Wireless presents operators of networks containing or transmitting sensitive and confidential data with several new types of security vulnerabilities, and potentially opens previously protected core network resources to outside attack. Herein, we review the types of vulnerabilities, the tools necessary to exploit them, and strategies to thwart a successful attack.
Derenzo, Stephen E.; Budinger, Thomas F.
1984-01-01
In brief, the invention is a tomograph modified to be in a clamshell configuration so that the ring or rings may be moved to multiple sampling positions. The tomograph includes an array of detectors arranged in successive adjacent relative locations along a closed curve in a first position in a selected plane, and means for securing the detectors in the relative locations in a first sampling position. The securing means is movable in the plane in two sections and pivotable at one p The U.S. Government has rights in this invention pursuant to Contract No. W-7405-ENG-48 between the U.S. Department of Energy and the University of California.
77 FR 66409 - Airworthiness Directives; Diamond Aircraft Industries GmbH Airplanes
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-05
... of an unsuitable self-locking nut on the bell crank of the elevator push rod that can cause failure... in the tail section of the fuselage, as a result of installation of a non-suitable self-locking nut... identified that its current configuration has a failure potential when components such as thin self-securing...
Code of Federal Regulations, 2010 CFR
2010-01-01
... solid model in the shape of a human head of sizes A, E, J, M, and O as defined in draft ISO/DIS 6220... configure the helmet for a range of different head sizes. (d) Coronal plane is an anatomical plane... to secure its position on the headform. The mass of the preload ballast is 5 kg (11 lb). (j...
Code of Federal Regulations, 2011 CFR
2011-01-01
... solid model in the shape of a human head of sizes A, E, J, M, and O as defined in draft ISO/DIS 6220... configure the helmet for a range of different head sizes. (d) Coronal plane is an anatomical plane... to secure its position on the headform. The mass of the preload ballast is 5 kg (11 lb). (j...
Code of Federal Regulations, 2013 CFR
2013-07-01
... the atmosphere. (ii) Car-seal or lock-and-key valve closures. Secure any bypass line valve in the closed position with a car-seal or a lock-and-key type configuration. You must visually inspect the seal... sensor. (vii) At least monthly, inspect components for integrity and electrical connections for...
Code of Federal Regulations, 2012 CFR
2012-07-01
... device to the atmosphere. (ii) Car-seal or lock-and-key valve closures. Secure any bypass line valve in the closed position with a car-seal or a lock-and-key type configuration. You must visually inspect... components for integrity and electrical connections for continuity, oxidation, and galvanic corrosion. (d...
Code of Federal Regulations, 2014 CFR
2014-07-01
... the atmosphere. (ii) Car-seal or lock-and-key valve closures. Secure any bypass line valve in the closed position with a car-seal or a lock-and-key type configuration. You must visually inspect the seal... sensor. (vii) At least monthly, inspect components for integrity and electrical connections for...
Tactile and Visual Identification of the XM106 Bursting Smoke Grenade: Limited User Evaluation
2010-12-01
situations representing the typical handwear and eyewear configurations of dismounted Warfighters. Thirty-six test Soldiers participated in the evaluation...all handwear and eyewear conditions. 15. SUBJECT TERMS XM106, smoke grenade, tactile/visual identification 16. SECURITY CLASSIFICATION OF: 17...1.3.2 Eyewear Compatibility ........................................................................................3 1.3.3 Physical Load
Carrier Based Air Logistics Study: Maintenance Analysis.
1982-01-01
MONITORING AGENCY NAME & ADDRESS(If dIierent loan Controling 01116.) 1S. SECURITY CLASS. (of Od. report) gel Unclassified IS&. DECL ASSI IlCATION/ OOWNGRAOIN...Management System AECL Avionics Equipment Configuration List AIMD Aircraft Intermediate Maintenance Department ASO Aviation Supply Office ASW...implementation. Component-specific data, and indentured[2] relationships between components extracted from the Aviation Supply Office ( ASO ) weapon
Wireless Cooperative Networks: Self-Configuration and Optimization
2011-09-09
TERMS wireless sensor networks , wireless cooperative networks, resource optimization, ultra-wideband, localization, ranging 16. SECURITY...Communications We consider two prevalent relay protocols for wireless sensor networks : decode-and-forward (DF) and amplify-and-forward (AF). To... sensor networks where each node may have its own sensing data to transmit, since they can maximally conserve energy while helping others as relays
USDA-ARS?s Scientific Manuscript database
Service oriented architectures allow modelling engines to be hosted over the Internet abstracting physical hardware configuration and software deployments from model users. Many existing environmental models are deployed as desktop applications running on user's personal computers (PCs). Migration ...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-09
... wind turbine generators; a substation; administration, operations and maintenance facilities... Action (the ``Refined Project''). Under the Refined Project configuration, only 112 wind turbines... Report for the Pattern Energy Group's Ocotillo Express Wind Energy Project and Proposed California Desert...
ASPECT (Airborne Spectral Photometric Environmental Collection Technology) Fact Sheet
This multi-sensor screening tool provides infrared and photographic images with geospatial, chemical, and radiological data within minutes to support emergency responses, home-land security missions, environmental surveys, and climate monitoring missions.
Environmental security: a geographic information system analysis approach--the case of Kenya.
Bocchi, Stefano; Disperati, Stefano Peppino; Rossi, Simone
2006-02-01
Studies into the relationships between environmental factors and violence or conflicts constitute a very debated research field called environmental security. Several authors think that environmental scarcity, which is scarcity of renewable resources, can contribute to generate violence or social unrest, particularly within states scarcely endowed with technical know-how and social structures, such as developing countries. In this work, we referred to the theoretical model developed by the Environmental Change and Acute Conflict Project. Our goal was to use easily available spatial databases to map the various sources of environmental scarcity through geographic information systems, in order to locate the areas apparently most at risk of suffering negative social effects and their consequences in terms of internal security. The analysis was carried out at a subnational level and applied to the case of Kenya. A first phase of the work included a careful selection of databases relative to renewable resources. Spatial operations among these data allowed us to obtain new information on the availability of renewable resources (cropland, forests, water), on the present and foreseen demographic pressure, as well as on the social and technical ingenuity. The results made it possible to identify areas suffering from scarcity of one or more renewable resources, indicating different levels of gravity. Accounts from Kenya seem to confirm our results, reporting clashes between tribal groups over the access to scarce resources in areas that our work showed to be at high risk.
Hydrocomplexity: Addressing water security and emergent environmental risks
NASA Astrophysics Data System (ADS)
Kumar, Praveen
2015-07-01
Water security and emergent environmental risks are among the most significant societal concerns. They are highly interlinked to other global risks such as those related to climate, human health, food, human migration, biodiversity loss, urban sustainability, etc. Emergent risks result from the confluence of unanticipated interactions from evolving interdependencies between complex systems, such as those embedded in the water cycle. They are associated with the novelty of dynamical possibilities that have significant potential consequences to human and ecological systems, and not with probabilities based on historical precedence. To ensure water security we need to be able to anticipate the likelihood of risk possibilities as they present the prospect of the most impact through cascade of vulnerabilities. They arise due to a confluence of nonstationary drivers that include growing population, climate change, demographic shifts, urban growth, and economic expansion, among others, which create novel interdependencies leading to a potential of cascading network effects. Hydrocomplexity aims to address water security and emergent risks through the development of science, methods, and practices with the potential to foster a "Blue Revolution" akin to the Green revolution for food security. It blends both hard infrastructure based solution with soft knowledge driven solutions to increase the range of planning and design, management, mitigation and adaptation strategies. It provides a conceptual and synthetic framework to enable us to integrate discovery science and engineering, observational and information science, computational and communication systems, and social and institutional approaches to address consequential water and environmental challenges.
75 FR 7297 - Sunshine Act Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-18
... SECURITIES AND EXCHANGE COMMISSION Sunshine Act Meeting Notice is hereby given, pursuant to the provisions of the Government in the Sunshine Act, Public Law 94-409, that the Securities and Exchange... environmental, social, and governance disclosure and on financial reform legislation, and discussion of next...
Keys to a Safe, Secure School.
ERIC Educational Resources Information Center
Kennedy, Mike
2002-01-01
Outlines 10 steps that school administrators can take to make their schools safer and more secure for students and staff. These steps encompass crime prevention through environmental design, crisis planning, entrances, lighting, police presence, prevention programs, rapport with students, smaller schools, technology implementation, and staff…
7 CFR 610.24 - Responsibilities of State Technical Committees.
Code of Federal Regulations, 2011 CFR
2011-01-01
... programs under Title XII of the Food Security Act of 1985 including, but not limited to, the Conservation Reserve Program, Wetlands Reserve Program, Conservation Security Program, Conservation Stewardship Program, Farm and Ranch Lands Protection Program, Grassland Reserve Program, Environmental Quality Incentives...
7 CFR 610.24 - Responsibilities of State Technical Committees.
Code of Federal Regulations, 2010 CFR
2010-01-01
... programs under Title XII of the Food Security Act of 1985 including, but not limited to, the Conservation Reserve Program, Wetlands Reserve Program, Conservation Security Program, Conservation Stewardship Program, Farm and Ranch Lands Protection Program, Grassland Reserve Program, Environmental Quality Incentives...
7 CFR 610.24 - Responsibilities of State Technical Committees.
Code of Federal Regulations, 2012 CFR
2012-01-01
... programs under Title XII of the Food Security Act of 1985 including, but not limited to, the Conservation Reserve Program, Wetlands Reserve Program, Conservation Security Program, Conservation Stewardship Program, Farm and Ranch Lands Protection Program, Grassland Reserve Program, Environmental Quality Incentives...
7 CFR 610.24 - Responsibilities of State Technical Committees.
Code of Federal Regulations, 2013 CFR
2013-01-01
... programs under Title XII of the Food Security Act of 1985 including, but not limited to, the Conservation Reserve Program, Wetlands Reserve Program, Conservation Security Program, Conservation Stewardship Program, Farm and Ranch Lands Protection Program, Grassland Reserve Program, Environmental Quality Incentives...
Application research of rail transit safety protection based on laser detection
NASA Astrophysics Data System (ADS)
Wang, Zhifei
2016-10-01
Platform screen door can not only prevent the passengers fell or jumped the track danger, to passengers bring comfortable waiting environment, but also has the function of environmental protection and energy saving. But platform screen door and train the full-length gap region is insecure in the system design of a hidden, such as passengers for some reason (grab the train) in the interstitial region retention, is sandwiched between the intercity safety door and the door, and such as the region lacks security detection and alarm system, once the passengers in the gap region retention (caught), bring more serious threat to the safety of passengers and traffic safety. This paper from the point of view of the design presents the physical, infrared, laser three safety protection device setting schemes. Domestic intelligence of between rail transit shield door and train security clearance processing used is screen door system standard configuration, the obstacle detection function for avoid passengers stranded in the clearance has strong prevention function. Laser detection research and development projects can access to prevent shield door and train gap clamp safety measures. Rail safety protection method are studied applying laser detection technique. According to the laser reflection equation of foreign body, the characteristics of laser detection of foreign bodies are given in theory. By using statistical analysis method, the workflow of laser detection system is established. On this basis, protection methods is proposed. Finally the simulation and test results show that the laser detection technology in the rail traffic safety protection reliability and stability, And the future laser detection technology in is discussed the development of rail transit.
ERIC Educational Resources Information Center
McLaren, Peter L.
1995-01-01
Gonzalez-Gaudiano abandoned a professorship at the National Autonomous University of Mexico to tackle environmental education and indigenous education. In this interview, he explains the politics of overpopulation; the unsustainable nature of capitalism; and the interrelationships between environmental justice and human security and among poverty,…
The Potential of Free-Choice Learning for Environmental Participation in Greece
ERIC Educational Resources Information Center
Skanavis, Constantina; Sakellari, Maria; Petreniti, Vassiliki
2005-01-01
Citizen participation in environmental decision-making is of extreme importance in securing a good quality of life. Local communities know best what alternate solutions should be implemented for appropriate management of their area. This paper presents findings about the environmental characteristics of various Greek citizens' groups, where…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-02
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Desert Mining, Inc., Eagle Broadband, Inc., Endovasc, Inc., Environmental Oil Processing Technology Corp., Falcon Ridge Development, Inc., Fellows... Environmental Oil Processing Technology Corp. because it has not filed any periodic reports since the period...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-18
...: Disposition of Surplus Highly Enriched Uranium Environmental Impact Statement AGENCY: National Nuclear... decision at that time. The Supplement Analysis analyzed the potential environmental impacts associated with... radioactive waste (LLW). The HEU EIS evaluated the potential environmental impacts of down- blending at up to...
30 CFR 282.13 - Suspension of production or other operations.
Code of Federal Regulations, 2014 CFR
2014-07-01
... environmental evaluation to define mitigation measures to avoid or minimize adverse environmental impacts. (5... deposits (in areas leased or not leased), to the National security or defense, or to the marine, coastal.... 282.13 Section 282.13 Mineral Resources BUREAU OF SAFETY AND ENVIRONMENTAL ENFORCEMENT, DEPARTMENT OF...
30 CFR 282.13 - Suspension of production or other operations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... environmental evaluation to define mitigation measures to avoid or minimize adverse environmental impacts. (5... deposits (in areas leased or not leased), to the National security or defense, or to the marine, coastal.... 282.13 Section 282.13 Mineral Resources BUREAU OF SAFETY AND ENVIRONMENTAL ENFORCEMENT, DEPARTMENT OF...
30 CFR 282.13 - Suspension of production or other operations.
Code of Federal Regulations, 2012 CFR
2012-07-01
... environmental evaluation to define mitigation measures to avoid or minimize adverse environmental impacts. (5... deposits (in areas leased or not leased), to the National security or defense, or to the marine, coastal.... 282.13 Section 282.13 Mineral Resources BUREAU OF SAFETY AND ENVIRONMENTAL ENFORCEMENT, DEPARTMENT OF...
The Soviet Region, The Environment, and U.S. National Security
1992-04-01
environmental pollution is an international problem requiring international solutions. Second, environmental issues are integral to the prospect of economic vitality. Third, the Soviet Union has a history of environmental abuse and is now paying an economic and social price which must be reversed. And finally, since regional
New perspectives in ecosystem services science as instruments to understand environmental securities
Villa, Ferdinando; Voigt, Brian; Erickson, Jon D.
2014-01-01
As societal demand for food, water and other life-sustaining resources grows, the science of ecosystem services (ES) is seen as a promising tool to improve our understanding, and ultimately the management, of increasingly uncertain supplies of critical goods provided or supported by natural ecosystems. This promise, however, is tempered by a relatively primitive understanding of the complex systems supporting ES, which as a result are often quantified as static resources rather than as the dynamic expression of human–natural systems. This article attempts to pinpoint the minimum level of detail that ES science needs to achieve in order to usefully inform the debate on environmental securities, and discusses both the state of the art and recent methodological developments in ES in this light. We briefly review the field of ES accounting methods and list some desiderata that we deem necessary, reachable and relevant to address environmental securities through an improved science of ES. We then discuss a methodological innovation that, while only addressing these needs partially, can improve our understanding of ES dynamics in data-scarce situations. The methodology is illustrated and discussed through an application related to water security in the semi-arid landscape of the Great Ruaha river of Tanzania. PMID:24535393
Environmental cell assembly for use in for use in spectroscopy and microscopy applications
Stowe, Ashley Clinton; Smyrl, Norman; Hallman, Jr., Russell L.
2014-09-02
An environmental cell assembly for use in microscopy and spectroscopy applications, including: an environmentally sealed body assembly configured to selectively hold and contain a sample; a plurality of ports manufactured into one or more surfaces of the body assembly for one or more of evacuating the body assembly and injecting a gas into or removing a gas from the body assembly; a port manufactured into a surface of the body assembly for receiving a translating stage configured to move the sample within the body assembly; and a port manufactured into a surface of the body assembly for receiving one or more lenses utilized in a microscopy or spectroscopy application; wherein the one or more lenses are disposed adjacent the sample without intervening structures disposed there between. The cell assembly also includes a port manufactured into a surface of the body assembly for retaining a window and providing visualization of the sample.
National Centers for Environmental Prediction
Operational Forecast Graphics Experimental Forecast Graphics Verification and Diagnostics Model Configuration consists of the following components: - The NOAA Environmental Modeling System (NEMS) version of the Non updates for the 12 km parent domain and the 3 km CONUS/Alaska nests. The non-cycled nests (Hawaii, Puerto
Environmental Hazards and Systems Schools. Technical Report No. 81.
ERIC Educational Resources Information Center
Dexter, Arthur
The purpose of this study was to ascertain the feasibility of incorporating certain protective concepts into selected systems-constructed schools. These concepts were to be incorporated at a minimal cost increase, with minimal sacrifice of amenities, and with no detrimental effect on facility configuration. The environmental hazards taken into…
Student Attitudes toward and Recall of Outside Day: An Environmental Science Field Trip
ERIC Educational Resources Information Center
Nadelson, Louis S.; Jordan, J. Richard
2012-01-01
Field trips are effective because they situate learning and facilitate knowledge transfer, thereby influencing students learning attitudes, interests, and motivation. Variations in field trip configurations and the subsequent affective and cognitive influences provided the motivation for this study of Outside Day--an environmental education field…
The Greening of Global Security: The U.S. Military and International Environmental Security
1993-12-16
the Cold War . Issues virtually ignored only five years ago now exhibit a new luster, a new importance, a new resonance among countries of the world ...America 283 298 363 0.8 Europe 511 515 516 0.2 Oceania 28 31 39 1.2 World 5420 6292 8545 1.7 Environmental problems are now causing sizable cutbacks in...direct participation and intercession can become blurred. With NATO’s new focus in today’s Post Cold War world --i.e., low intensity peacekeeping
Systems and methods for pressure and temperature measurement
Challener, William Albert; Airey, Li
2016-12-06
A measurement system in one embodiment includes an acquisition module and a determination module. The acquisition module is configured to acquire resonant frequency information corresponding to a sensor disposed in a remote location from the acquisition module. The resonant frequency information includes first resonant frequency information for a first resonant frequency of the sensor corresponding to environmental conditions of the remote location, and also includes second resonant frequency information for a different, second resonant frequency of the sensor corresponding to the environmental conditions of the remote location. The determination module is configured to use the first resonant frequency information and the second resonant frequency information to determine the temperature and the pressure at the remote location.
User's Manual for the Object User Interface (OUI): An Environmental Resource Modeling Framework
Markstrom, Steven L.; Koczot, Kathryn M.
2008-01-01
The Object User Interface is a computer application that provides a framework for coupling environmental-resource models and for managing associated temporal and spatial data. The Object User Interface is designed to be easily extensible to incorporate models and data interfaces defined by the user. Additionally, the Object User Interface is highly configurable through the use of a user-modifiable, text-based control file that is written in the eXtensible Markup Language. The Object User Interface user's manual provides (1) installation instructions, (2) an overview of the graphical user interface, (3) a description of the software tools, (4) a project example, and (5) specifications for user configuration and extension.
Design of materials configurations for enhanced phononic and electronic properties
NASA Astrophysics Data System (ADS)
Daraio, Chiara
The discovery of novel nonlinear dynamic and electronic phenomena is presented for the specific cases of granular materials and carbon nanotubes. This research was conducted for designing and constructing optimized macro-, micro- and nano-scale structural configurations of materials, and for studying their phononic and electronic behavior. Variation of composite arrangements of granular elements with different elastic properties in a linear chain-of-sphere, Y-junction or 3-D configurations led to a variety of novel phononic phenomena and interesting physical properties, which can be potentially useful for security, communications, mechanical and biomedical engineering applications. Mechanical and electronic properties of carbon nanotubes with different atomic arrangements and microstructures were also investigated. Electronic properties of Y-junction configured carbon nanotubes exhibit an exciting transistor switch behavior which is not seen in linear configuration nanotubes. Strongly nonlinear materials were designed and fabricated using novel and innovative concepts. Due to their unique strongly nonlinear and anisotropic nature, novel wave phenomena have been discovered. Specifically, violations of Snell's law were detected and a new mechanism of wave interaction with interfaces between NTPCs (Nonlinear Tunable Phononic Crystals) was established. Polymer-based systems were tested for the first time, and the tunability of the solitary waves speed was demonstrated. New materials with transformed signal propagation speed in the manageable range of 10-100 m/s and signal amplitude typical for audible speech have been developed. The enhancing of the mitigation of solitary and shock waves in 1-D chains were demonstrated and a new protective medium was designed for practical applications. 1-D, 2-D and 3-D strongly nonlinear system have been investigated providing a broad impact on the whole area of strongly nonlinear wave dynamics and creating experimental basis for new theories and models. Potential applications include (1) designing of a sound scrambler/decoder for secure voice communications, (2) improving invisibility of submarine to acoustic detection signal, (3) noise and shock wave mitigation for protection of vibration sensitive devices such as head mounted vision devices, (4) drastic compression of acoustic signals into centimeter regime impulses for artificial ear implants, hearing aid and devices for ease of conversion to electronic signals and processing, and acoustic delay lines for communication applications.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Herron, Kerry Gale; Jenkins-Smith, Hank C.
2008-01-01
We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support formore » domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.« less
75 FR 2445 - Chemical Facility Anti-Terrorism Standards
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-15
... Homeland Security EPA--Environmental Protection Agency RMP--Risk Management Program SSP--Site Security Plan...) under the Clean Air Act's Risk Management Program (RMP) for counting-- or excluding--flammable chemicals... of flammable chemicals in gasoline from the RMP rules was mandated by the Chemical Safety...
DOT National Transportation Integrated Search
1999-11-01
This plan describes coordinated long-term research initiatives to bring about advances in aviation that will be required in the opening decades of the next century. The White House Commission on Aviation Safety and Security and the National Civil Avi...
TECHNOLOGY EVALUATION REPORT CEREX ENVIRONMENTAL SERVICES UV HOUND POINT SAMPLE AIR MONITOR
The USEPA's National Homeland Security Research Center (NHSRC) Technology Testing and Evaluation Program (TTEP) is carrying out performance tests on homeland security technologies. Under TTEP, Battelle evaluated the performance of the Cerex UV Hound point sample air monitor in de...
DOT National Transportation Integrated Search
1999-11-01
This plan describes coordinated long-term research initiatives to bring about advances in aviation that will be required in the opening decades of the next century. The White House Commission on Aviation Safety and Security and the National Civil Avi...
33 CFR 26.08 - Exemption procedures.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Exemption procedures. 26.08 Section 26.08 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY GENERAL VESSEL... redelegated to the Assistant Commandant for Marine Safety, Security and Environmental Protection, U.S. Coast...
33 CFR 26.08 - Exemption procedures.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Exemption procedures. 26.08 Section 26.08 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY GENERAL VESSEL... redelegated to the Assistant Commandant for Marine Safety, Security and Environmental Protection, U.S. Coast...
Project #OA-FY13-0280, May 9, 2013. The Office of Inspector General plans to begin fieldwork for an audit of the U.S. Environmental Protection Agency’s compliance with the Federal Information Security Management Act.
Sensor deployment on unmanned ground vehicles
NASA Astrophysics Data System (ADS)
Gerhart, Grant R.; Witus, Gary
2007-10-01
TARDEC has been developing payloads for small robots as part of its unmanned ground vehicle (UGV) development programs. These platforms typically weigh less than 100 lbs and are used for various physical security and force protection applications. This paper will address a number of technical issues including platform mobility, payload positioning, sensor configuration and operational tradeoffs. TARDEC has developed a number of robots with different mobility mechanisms including track, wheel and hybrid track/wheel running gear configurations. An extensive discussion will focus upon omni-directional vehicle (ODV) platforms with enhanced intrinsic mobility for positioning sensor payloads. This paper also discusses tradeoffs between intrinsic platform mobility and articulated arm complexity for end point positioning of modular sensor packages.
Prototyping manufacturing in the cloud
NASA Astrophysics Data System (ADS)
Ciortea, E. M.
2017-08-01
This paper attempts a theoretical approach to cloud systems with impacts on production systems. I call systems as cloud computing because form a relatively new concept in the field of informatics, representing an overall distributed computing services, applications, access to information and data storage without the user to know the physical location and configuration of systems. The advantages of this approach are especially computing speed and storage capacity without investment in additional configurations, synchronizing user data, data processing using web applications. The disadvantage is that it wants to identify a solution for data security, leading to mistrust users. The case study is applied to a module of the system of production, because the system is complex.
Postirradiation Testing Laboratory (327 Building)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kammenzind, D.E.
A Standards/Requirements Identification Document (S/RID) is the total list of the Environment, Safety and Health (ES and H) requirements to be implemented by a site, facility, or activity. These requirements are appropriate to the life cycle phase to achieve an adequate level of protection for worker and public health and safety, and the environment during design, construction, operation, decontamination and decommissioning, and environmental restoration. S/RlDs are living documents, to be revised appropriately based on change in the site`s or facility`s mission or configuration, a change in the facility`s life cycle phase, or a change to the applicable standards/requirements. S/RIDs encompassmore » health and safety, environmental, and safety related safeguards and security (S and S) standards/requirements related to the functional areas listed in the US Department of Energy (DOE) Environment, Safety and Health Configuration Guide. The Fluor Daniel Hanford (FDH) Contract S/RID contains standards/requirements, applicable to FDH and FDH subcontractors, necessary for safe operation of Project Hanford Management Contract (PHMC) facilities, that are not the direct responsibility of the facility manager (e.g., a site-wide fire department). Facility S/RIDs contain standards/requirements applicable to a specific facility that are the direct responsibility of the facility manager. S/RlDs are prepared by those responsible for managing the operation of facilities or the conduct of activities that present a potential threat to the health and safety of workers, public, or the environment, including: Hazard Category 1 and 2 nuclear facilities and activities, as defined in DOE 5480.23. Selected Hazard Category 3 nuclear, and Low Hazard non-nuclear facilities and activities, as agreed upon by RL. The Postirradiation Testing Laboratory (PTL) S/RID contains standards/ requirements that are necessary for safe operation of the PTL facility, and other building/areas that are the direct responsibility of the specific facility manager. The specific DOE Orders, regulations, industry codes/standards, guidance documents and good industry practices that serve as the basis for each element/subelement are identified and aligned with each subelement.« less
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 29 2010-07-01 2010-07-01 false Calculation and use of FTP-based and HFET-based fuel economy values for vehicle configurations. 600.206-08 Section 600.206-08 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) ENERGY POLICY FUEL ECONOMY AND CARBON-RELATED EXHAUST EMISSIONS OF MOTOR VEHICLES Fuel...
Overview of Low-Speed Aerodynamic Tests on a 5.75% Scale Blended-Wing-Body Twin Jet Configuration
NASA Technical Reports Server (NTRS)
Vicroy, Dan D.; Dickey, Eric; Princen, Norman; Beyar, Michael D.
2016-01-01
The NASA Environmentally Responsible Aviation (ERA) Project sponsored a series of computational and experimental investigations of the propulsion and airframe integration issues associated with Hybrid-Wing-Body (HWB) or Blended-Wing-Body (BWB) configurations. NASA collaborated with Boeing Research and Technology (BR&T) to conduct this research on a new twin-engine Boeing BWB transport configuration. The experimental investigations involved a series of wind tunnel tests with a 5.75-percent scale model conducted in two low-speed wind tunnels. This testing focused on the basic aerodynamics of the configuration and selection of the leading edge Krueger slat position for takeoff and landing. This paper reviews the results and analysis of these low-speed wind tunnel tests.
Lawrence Livermore National Laboratory Environmental Report 2012
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jones, Henry E.; Armstrong, Dave; Blake, Rick G.
Lawrence Livermore National Laboratory (LLNL) is a premier research laboratory that is part of the National Nuclear Security Administration (NNSA) within the U.S. Department of Energy (DOE). As a national security laboratory, LLNL is responsible for ensuring that the nation’s nuclear weapons remain safe, secure, and reliable. The Laboratory also meets other pressing national security needs, including countering the proliferation of weapons of mass destruction and strengthening homeland security, and conducting major research in atmospheric, earth, and energy sciences; bioscience and biotechnology; and engineering, basic science, and advanced technology. The Laboratory is managed and operated by Lawrence Livermore National Security,more » LLC (LLNS), and serves as a scientific resource to the U.S. government and a partner to industry and academia. LLNL operations have the potential to release a variety of constituents into the environment via atmospheric, surface water, and groundwater pathways. Some of the constituents, such as particles from diesel engines, are common at many types of facilities while others, such as radionuclides, are unique to research facilities like LLNL. All releases are highly regulated and carefully monitored. LLNL strives to maintain a safe, secure and efficient operational environment for its employees and neighboring communities. Experts in environment, safety and health (ES&H) support all Laboratory activities. LLNL’s radiological control program ensures that radiological exposures and releases are reduced to as low as reasonably achievable to protect the health and safety of its employees, contractors, the public, and the environment. LLNL is committed to enhancing its environmental stewardship and managing the impacts its operations may have on the environment through a formal Environmental Management System. The Laboratory encourages the public to participate in matters related to the Laboratory’s environmental impact on the community by soliciting citizens’ input on matters of significant public interest and through various communications. The Laboratory also provides public access to information on its ES&H activities. LLNL consists of two sites—an urban site in Livermore, California, referred to as the “Livermore Site,” which occupies 1.3 square miles; and a rural Experimental Test Site, referred to as “Site 300,” near Tracy, California, which occupies 10.9 square miles. In 2012 the Laboratory had a staff of approximately 7000.« less
Lawrence Livermore National Laboratory Environmental Report 2013
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jones, H. E.; Bertoldo, N. A.; Blake, R. G.
Lawrence Livermore National Laboratory (LLNL) is a premier research laboratory that is part of the National Nuclear Security Administration (NNSA) within the U.S. Department of Energy (DOE). As a national security laboratory, LLNL is responsible for ensuring that the nation’s nuclear weapons remain safe, secure, and reliable. The Laboratory also meets other pressing national security needs, including countering the proliferation of weapons of mass destruction and strengthening homeland security, and conducting major research in atmospheric, earth, and energy sciences; bioscience and biotechnology; and engineering, basic science, and advanced technology. The Laboratory is managed and operated by Lawrence Livermore National Security,more » LLC (LLNS), and serves as a scientific resource to the U.S. government and a partner to industry and academia. LLNL operations have the potential to release a variety of constituents into the environment via atmospheric, surface water, and groundwater pathways. Some of the constituents, such as particles from diesel engines, are common at many types of facilities while others, such as radionuclides, are unique to research facilities like LLNL. All releases are highly regulated and carefully monitored. LLNL strives to maintain a safe, secure and efficient operational environment for its employees and neighboring communities. Experts in environment, safety and health (ES&H) support all Laboratory activities. LLNL’s radiological control program ensures that radiological exposures and releases are reduced to as low as reasonably achievable to protect the health and safety of its employees, contractors, the public, and the environment. LLNL is committed to enhancing its environmental stewardship and managing the impacts its operations may have on the environment through a formal Environmental Management System. The Laboratory encourages the public to participate in matters related to the Laboratory’s environmental impact on the community by soliciting citizens’ input on matters of significant public interest and through various communications. The Laboratory also provides public access to information on its ES&H activities. LLNL consists of two sites—an urban site in Livermore, California, referred to as the “Livermore Site,” which occupies 1.3 square miles; and a rural Experimental Test Site, referred to as “Site 300,” near Tracy, California, which occupies 10.9 square miles. In 2013 the Laboratory had a staff of approximately 6,300.« less
Global water risks and national security: Building resilience (Invited)
NASA Astrophysics Data System (ADS)
Pulwarty, R. S.
2013-12-01
The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere, and (3) Identify preventable risks, public leadership and private innovation needed for developing adaptive water resource management institutions that take advantage of climate and hydrologic information and changes. The presentation will conclude with a preliminary framework for assessing and implementing water security measures given insecure conditions introduced by a changing climate and in the context of national security.
Energy efficient engine: Preliminary design and integration studies
NASA Technical Reports Server (NTRS)
Johnston, R. P.; Hirschkron, R.; Koch, C. C.; Neitzel, R. E.; Vinson, P. W.
1978-01-01
Parametric design and mission evaluations of advanced turbofan configurations were conducted for future transport aircraft application. Economics, environmental suitability and fuel efficiency were investigated and compared with goals set by NASA. Of the candidate engines which included mixed- and separate-flow, direct-drive and geared configurations, an advanced mixed-flow direct-drive configuration was selected for further design and evaluation. All goals were judged to have been met except the acoustic goal. Also conducted was a performance risk analysis and a preliminary aerodynamic design of the 10 stage 23:1 pressure ratio compressor used in the study engines.
Verifying the secure setup of UNIX client/servers and detection of network intrusion
NASA Astrophysics Data System (ADS)
Feingold, Richard; Bruestle, Harry R.; Bartoletti, Tony; Saroyan, R. A.; Fisher, John M.
1996-03-01
This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today's global `Infosphere' presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to check on their security configuration. SPI's broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI's use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on the Ethernet broadcast Local Area Network segment and product transcripts of suspicious user connections. NID's retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.
Spatio-temporal dynamics of security investments in an interdependent risk environment
NASA Astrophysics Data System (ADS)
Shafi, Kamran; Bender, Axel; Zhong, Weicai; Abbass, Hussein A.
2012-10-01
In a globalised world where risks spread through contagion, the decision of an entity to invest in securing its premises from stochastic risks no longer depends solely on its own actions but also on the actions of other interacting entities in the system. This phenomenon is commonly seen in many domains including airline, logistics and computer security and is referred to as Interdependent Security (IDS). An IDS game models this decision problem from a game-theoretic perspective and deals with the behavioural dynamics of risk-reduction investments in such settings. This paper enhances this model and investigates the spatio-temporal aspects of the IDS games. The spatio-temporal dynamics are studied using simple replicator dynamics on a variety of network structures and for various security cost tradeoffs that lead to different Nash equilibria in an IDS game. The simulation results show that the neighbourhood configuration has a greater effect on the IDS game dynamics than network structure. An in-depth empirical analysis of game dynamics is carried out on regular graphs, which leads to the articulation of necessary and sufficient conditions for dominance in IDS games under spatial constraints.
Lightweight and confidential data discovery and dissemination for wireless body area networks.
He, Daojing; Chan, Sammy; Zhang, Yan; Yang, Haomiao
2014-03-01
As a special sensor network, a wireless body area network (WBAN) provides an economical solution to real-time monitoring and reporting of patients' physiological data. After a WBAN is deployed, it is sometimes necessary to disseminate data into the network through wireless links to adjust configuration parameters of body sensors or distribute management commands and queries to sensors. A number of such protocols have been proposed recently, but they all focus on how to ensure reliability and overlook security vulnerabilities. Taking into account the unique features and application requirements of a WBAN, this paper presents the design, implementation, and evaluation of a secure, lightweight, confidential, and denial-of-service-resistant data discovery and dissemination protocol for WBANs to ensure the data items disseminated are not altered or tampered. Based on multiple one-way key hash chains, our protocol provides instantaneous authentication and can tolerate node compromise. Besides the theoretical analysis that demonstrates the security and performance of the proposed protocol, this paper also reports the experimental evaluation of our protocol in a network of resource-limited sensor nodes, which shows its efficiency in practice. In particular, extensive security analysis shows that our protocol is provably secure.
30 CFR 250.1615 - Securing of wells.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 30 Mineral Resources 2 2013-07-01 2013-07-01 false Securing of wells. 250.1615 Section 250.1615 Mineral Resources BUREAU OF SAFETY AND ENVIRONMENTAL ENFORCEMENT, DEPARTMENT OF THE INTERIOR OFFSHORE OIL... Manager in lieu of the above requirements if cap rock casing has been set. ...
76 FR 24363 - HUD Multifamily Rental Projects: Regulatory Revisions
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-02
... tenants in common borrowers will have an adverse economic impact on the borrower and result in...) fails to pay before delinquency any Taxes secured by a lien having priority over this Security... consistent with the President's executive order. V. Findings and Certifications Environmental Impact A...
Y-12 Sustainability and Stewardship
John Krueger
2017-12-09
The Y-12 National Security Complex recently won a White House award for its leadership among Government installations for pollution prevention. This video tells the story of the many actions taken by this NNSA National Security Enterprise site towards being a responsible environmental citizen while protecting the national interest.
Y-12 Sustainability and Stewardship
DOE Office of Scientific and Technical Information (OSTI.GOV)
John Krueger
2009-10-06
The Y-12 National Security Complex recently won a White House award for its leadership among Government installations for pollution prevention. This video tells the story of the many actions taken by this NNSA National Security Enterprise site towards being a responsible environmental citizen while protecting the national interest.
Security management based on trust determination in cognitive radio networks
NASA Astrophysics Data System (ADS)
Li, Jianwu; Feng, Zebing; Wei, Zhiqing; Feng, Zhiyong; Zhang, Ping
2014-12-01
Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.
The HEPiX Virtualisation Working Group: Towards a Grid of Clouds
NASA Astrophysics Data System (ADS)
Cass, Tony
2012-12-01
The use of virtual machine images, as for example with Cloud services such as Amazon's Elastic Compute Cloud, is attractive for users as they have a guaranteed execution environment, something that cannot today be provided across sites participating in computing grids such as the Worldwide LHC Computing Grid. However, Grid sites often operate within computer security frameworks which preclude the use of remotely generated images. The HEPiX Virtualisation Working Group was setup with the objective to enable use of remotely generated virtual machine images at Grid sites and, to this end, has introduced the idea of trusted virtual machine images which are guaranteed to be secure and configurable by sites such that security policy commitments can be met. This paper describes the requirements and details of these trusted virtual machine images and presents a model for their use to facilitate the integration of Grid- and Cloud-based computing environments for High Energy Physics.
Security Risks of Cloud Computing and Its Emergence as 5th Utility Service
NASA Astrophysics Data System (ADS)
Ahmad, Mushtaq
Cloud Computing is being projected by the major cloud services provider IT companies such as IBM, Google, Yahoo, Amazon and others as fifth utility where clients will have access for processing those applications and or software projects which need very high processing speed for compute intensive and huge data capacity for scientific, engineering research problems and also e- business and data content network applications. These services for different types of clients are provided under DASM-Direct Access Service Management based on virtualization of hardware, software and very high bandwidth Internet (Web 2.0) communication. The paper reviews these developments for Cloud Computing and Hardware/Software configuration of the cloud paradigm. The paper also examines the vital aspects of security risks projected by IT Industry experts, cloud clients. The paper also highlights the cloud provider's response to cloud security risks.
National Centers for Environmental Prediction
/ VISION | About EMC EMC > NOAH > IMPLEMENTATION SCHEDULLE Home Operational Products Experimental Data Verification Model Configuration Implementation Schedule Collaborators Documentation FAQ Code
National Centers for Environmental Prediction
/ VISION | About EMC EMC > GEFS > IMPLEMENTATION SCHEDULLE Home Operational Products Experimental Data Verification Model Configuration Implementation Schedule Collaborators Documentation FAQ Code
Miniature housing with standard addressable interface for smart sensors and drive electronics
NASA Technical Reports Server (NTRS)
Howard, David E. (Inventor); Smith, Dennis A. (Inventor); Alhorn, Dean C. (Inventor)
2006-01-01
A miniature assembly is disclosed which includes a housing assembly with a cover configured to be sealably secured to a box-like receptacle. The receptacle comprises openings on opposing sides for the seating therein of communications connectors. Enclosed within housing is custom-sized circuit board for supporting, at least, a standard communications interface and at least one electronic device.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Goldberg, Mitchell S.
In July 2015, Los Alamos National Laboratory completed installation of a supplemental cooling system in the structure where remediated nitrate salt waste drums are stored. Although the waste currently is in a safe configuration and is monitored daily,controlling the temperature inside the structure adds another layer of protection for workers, the public,and the environment.This effort is among several layers of precautions designed to secure the waste.
Digital Troposcatter Performance Model. Users Manual.
1983-11-01
and Information Systems - .,- - - UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE (When Data Entered) S REPORT DOCUIAENTATION PAGE READ...Diffraction Multipath Prediction MD-918 Modem Error Rate Prediction AN/TRC-170 Link Analysis 20. ABSTRACT (Continue en reverse esie If neceseay end...configurations used in the Defense Communications System (DCS), and prediction of the performance of both the MD-918 and AN/TRC-170 digital troposcatter modems
Safe Configuration of TLS Connections
2013-10-16
users. All of these points together lead to unprotected communications that are assumed to be protected. What makes this even worse is that not only...Architecture (SOA) is a software engineering technology that is increasingly used in many important military and civilian systems. The features that make ...SOA appealing, like loose coupling, dynamism and composition-oriented system construction, make securing SOA systems complicated. These features ease
DOE Office of Scientific and Technical Information (OSTI.GOV)
Christoph, G.G; Jackson, K.A.; Neuman, M.C.
An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity is reflected in the system audit record, by changes in the vulnerability posture of the system configuration, and in other evidence found through active testing of the system. In 1989 we started developing an automatic misuse detection system for the Integrated Computing Network (ICN) at Los Alamos National Laboratory. Since 1990 this system has been operational, monitoring a variety of network systems and services. We call it the Network Anomaly Detection and Intrusion Reporter, or NADIR. During the last year andmore » a half, we expanded NADIR to include processing of audit and activity records for the Cray UNICOS operating system. This new component is called the UNICOS Real-time NADIR, or UNICORN. UNICORN summarizes user activity and system configuration information in statistical profiles. In near real-time, it can compare current activity to historical profiles and test activity against expert rules that express our security policy and define improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. UNICORN is currently operational on four Crays in Los Alamos` main computing network, the ICN.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-05
... economic blow that would result from an earlier closure and is an appropriate balance of environmental and... BART rules for the Boardman facility achieve the proper balance of environmental benefits, the cost to... secure greater environmental benefits with a better balance of cost and risk by transitioning the...
2007-12-01
Media Issues in Combating Terrorism • International Approaches • Ethics and Combating Terrorism • Restructuring the Security Sector for...Terrorism • Organized Crime and Terrorism • Civil-Military Cooperation and Terrorism • Ethics and Combating Terrorism • Border Control • Consequence...Simon. “Confl ict, Ecology and the Politics of Envrionmental Security.” Global Environmental Politics 2, No. 4 (November 2002): pp 25-130. 28
Crisis-management and the Security in the Internet
NASA Astrophysics Data System (ADS)
Harada, Izumi
This paper discusses about the crisis-management and the security in the Internet. The crime that not is so far occurs during widespread to the society of the Internet, and a big social trouble. Moreover, the problem of a new security such as a cyber war and cyber terrorism appeared, too. It is necessary to recognize such a situation, and to do both correspondences corresponding to the environmental transformation by government and the people.
2009-12-01
a weapon in food and water. The case involved the radiological poisoning of former Russian spy Alexander Litvinenko with Polonium 210 . An article...SECURITY Gary Wayne Elliott Emergency Management Coordinator for Environmental Health and Division of Food Protection Supervisor, South Carolina...31 c. Bioterrorism, Biodefense, and Health Security .....................31 9. Other Barriers to Comprehensible Food Safety/Defense
Parcher, Jean W.; Page, William R.
2013-01-01
Historically, international borders were located far from the major political and economic capitals of their countries and rarely received adequate planning or infrastructure development. Today, as a result of global economics and increased movement of goods between nations, border regions play a much greater role in commerce, tourism, and transportation. For example, Mexico is the second largest destination for United States exports (Woodrow Wilson Center Mexico Institute, 2009). The rapid population and economic growth along the United States–Mexican border, undocumented human border crossings, and the unique natural diversity of resources in the Borderlands present challenges for border security and environmental protection. Assessing risks and implementing sustainable growth policies to protect the environment and quality of life greatly increase in complexity when the issues cross an international border, where social services, environmental regulations, lifestyles, and cultural beliefs are unique for each country. Shared airsheds, water and biological resources, national security issues, and disaster management needs require an integrated binational approach to assess risks and develop binational management strategies.
Lu, Yonglong; Jenkins, Alan; Ferrier, Robert C; Bailey, Mark; Gordon, Iain J; Song, Shuai; Huang, Jikun; Jia, Shaofeng; Zhang, Fusuo; Liu, Xuejun; Feng, Zhaozhong; Zhang, Zhibin
2015-02-01
China's increasingly urbanized and wealthy population is driving a growing and changing demand for food, which might not be met without significant increase in agricultural productivity and sustainable use of natural resources. Given the past relationship between lack of access to affordable food and political instability, food security has to be given a high priority on national political agendas in the context of globalization. The drive for increased food production has had a significant impact on the environment, and the deterioration in ecosystem quality due to historic and current levels of pollution will potentially compromise the food production system in China. We discuss the grand challenges of not only producing more food but also producing it sustainably and without environmental degradation. In addressing these challenges, food production should be considered as part of an environmental system (soil, air, water, and biodiversity) and not independent from it. It is imperative that new ways of meeting the demand for food are developed while safeguarding the natural resources upon which food production is based. We present a holistic approach to both science and policy to ensure future food security while embracing the ambition of achieving environmental sustainability in China. It is a unique opportunity for China to be a role model as a new global player, especially for other emerging economies.
Tradeoff analysis with lithium cells
NASA Technical Reports Server (NTRS)
Bennett, C.
1978-01-01
Characteristic data, primarily on high rate lithium sulfur dioxide design (basically in the D and DD cell configuration), both before and after much exposure to environmental conditions are discussed. The environmental as opposed to signle cells. Discussion was generated among the Workshop participants and comments and questions are reported. Graphical representations of the test data are presented.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-25
... the Public Health Security and Bioterrorism Preparedness and Response Act of 2002: Drinking Water... submitting comments. E-mail: [email protected] . Mail: EPA Water Docket, Environmental Protection Agency... . FOR FURTHER INFORMATION CONTACT: Karen Edwards, Water Security Division, Office of Ground Water and...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Quirk, W.J.; Canada, J.; de Vore, L.
1994-04-01
This issue highlights the Lawrence Livermore National Laboratory`s 1993 accomplishments in our mission areas and core programs: economic competitiveness, national security, energy, the environment, lasers, biology and biotechnology, engineering, physics, chemistry, materials science, computers and computing, and science and math education. Secondary topics include: nonproliferation, arms control, international security, environmental remediation, and waste management.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-06
... DEPARTMENT OF ENERGY National Nuclear Security Administration Extension of the Public Review and... Disposition Supplemental Environmental Impact Statement AGENCY: National Nuclear Security Administration, U.S. Department of Energy. ACTION: Extension of the public review and comment period and announcement of an...
78 FR 27392 - Statement of Organization, Functions, and Delegations of Authority
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-10
... Office (AMSO) provides a safe, secure, healthy, and functional workplace environment for CDC staff by... provides the tools needed for workers to be safe, work in a healthy environment, and ensures environmental... Office of Security and Emergency Preparedness (CAJJ); Office of Safety, Health and Environment (CAJP...
Field demonstration of a continuous-variable quantum key distribution network.
Huang, Duan; Huang, Peng; Li, Huasheng; Wang, Tao; Zhou, Yingming; Zeng, Guihua
2016-08-01
We report on what we believe is the first field implementation of a continuous-variable quantum key distribution (CV-QKD) network with point-to-point configuration. Four QKD nodes are deployed on standard communication infrastructures connected with commercial telecom optical fiber. Reliable key exchange is achieved in the wavelength-division-multiplexing CV-QKD network. The impact of a complex and volatile field environment on the excess noise is investigated, since excess noise controlling and reduction is arguably the major issue pertaining to distance and the secure key rate. We confirm the applicability and verify the maturity of the CV-QKD network in a metropolitan area, thus paving the way for a next-generation global secure communication network.
Interactions between Financial and Environmental Networks in OECD Countries.
Ruzzenenti, Franco; Joseph, Andreas; Ticci, Elisa; Vozzella, Pietro; Gabbi, Giampaolo
2015-01-01
We analysed a multiplex of financial and environmental networks between OECD countries from 2002 to 2010. Foreign direct investments and portfolio investment showing the flows in equity securities, short-term, long-term and total debt, these securities represent the financial layers; emissions of NOx, PM10, SO2, CO2 equivalent and the water footprint associated with international trade represent the environmental layers. We present a new measure of cross-layer correlations between flows in different layers based on reciprocity. For the assessment of results, we implement a null model for this measure based on the exponential random graph theory. We find that short-term financial flows are more correlated with environmental flows than long-term investments. Moreover, the correlations between reverse financial and environmental flows (i.e. the flows of different layers going in opposite directions) are generally stronger than correlations between synergic flows (flows going in the same direction). This suggests a trade-off between financial and environmental layers, where, more financialised countries display higher correlations between outgoing financial flows and incoming environmental flows than from lower financialised countries. Five countries are identified as hubs in this finance-environment multiplex: The United States, France, Germany, Belgium-Luxembourg and United Kingdom.
Interactions between Financial and Environmental Networks in OECD Countries
Ruzzenenti, Franco; Joseph, Andreas; Ticci, Elisa; Vozzella, Pietro; Gabbi, Giampaolo
2015-01-01
We analysed a multiplex of financial and environmental networks between OECD countries from 2002 to 2010. Foreign direct investments and portfolio investment showing the flows in equity securities, short-term, long-term and total debt, these securities represent the financial layers; emissions of NO x, PM10, SO 2, CO 2 equivalent and the water footprint associated with international trade represent the environmental layers. We present a new measure of cross-layer correlations between flows in different layers based on reciprocity. For the assessment of results, we implement a null model for this measure based on the exponential random graph theory. We find that short-term financial flows are more correlated with environmental flows than long-term investments. Moreover, the correlations between reverse financial and environmental flows (i.e. the flows of different layers going in opposite directions) are generally stronger than correlations between synergic flows (flows going in the same direction). This suggests a trade-off between financial and environmental layers, where, more financialised countries display higher correlations between outgoing financial flows and incoming environmental flows than from lower financialised countries. Five countries are identified as hubs in this finance-environment multiplex: The United States, France, Germany, Belgium-Luxembourg and United Kingdom. PMID:26375393
Environmental Assessment of Biofuel Options
The EPA Office of Transportation and Air Quality is responsible for administering the Second Renewable Fuels Standard under the Energy Independence and Security Act of 2007. The progress of these efforts and the associated environmental impacts are assessed in the Triennial Biof...
Enhancing infrastructure resilience through business continuity planning.
Fisher, Ronald; Norman, Michael; Klett, Mary
2017-01-01
Critical infrastructure is crucial to the functionality and wellbeing of the world around us. It is a complex network that works together to create an efficient society. The core components of critical infrastructure are dependent on one another to function at their full potential. Organisations face unprecedented environmental risks such as increased reliance on information technology and telecommunications, increased infrastructure interdependencies and globalisation. Successful organisations should integrate the components of cyber-physical and infrastructure interdependencies into a holistic risk framework. Physical security plans, cyber security plans and business continuity plans can help mitigate environmental risks. Cyber security plans are becoming the most crucial to have, yet are the least commonly found in organisations. As the reliance on cyber continues to grow, it is imperative that organisations update their business continuity and emergency preparedness activities to include this.
NASA Astrophysics Data System (ADS)
Tańczuk, Mariusz; Radziewicz, Wojciech; Olszewski, Eligiusz; Skorek, Janusz
2017-10-01
District heating technologies should be efficient, effective and environmentally friendly. The majority of the communal heating systems in Poland produce district hot water in coal-fired boilers. A large number of them are considerably worn out, low-efficient in the summer time and will not comply with forthcoming regulations. One of the possible solution for such plants is repowering with new CHP systems or new boilers fuelled with fuels alternative to coal. Optimisation analysis of the target configuration of municipal heat generating plant is analysed in the paper. The work concerns repowering the existing conventional heat generating plant according to eight different scenarios of the plant configuration meeting technical and environmental requirements forecasted for the year of 2035. The maximum demand for heat of the system supplied by the plant is 185 MW. Taking into account different technical configurations on one side, and different energy and fuel prices on the other side, the comparative cost-benefits analysis of the assumed scenarios has been made. The basic economical index NPV (net present value) has been derived for each analysed scenario and the results have been compared and discussed. It was also claimed that the scenario with CHP based on ICE engines is optimal.
Building 9401-2 Plating Shop Surveillance and Maintenance Plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
1999-05-01
This document provides a plan for implementing surveillance and maintenance (S and M) activities to ensure that Building 9401-2 Plating Shop is maintained in a cost effective and environmentally secure configuration until subsequent closure during the final disposition phase of decommissioning. U.S. Department of Energy (DOE) G430.1A-2, Surveillance and Maintenance During Facility Disposition (1997), was used as guidance in the development of this plan. The S and M Plan incorporates DOE O 430.1A, Life Cycle Asset Management (LCAM) (1998a) direction to provide for conducting surveillance and maintenance activities required to maintain the facility and remaining hazardous and radioactive materials, wastes,more » and contamination in a stable and known condition pending facility disposition. Recommendations in the S and M plan have been made that may not be requirement-based but would reduce the cost and frequency of surveillance and maintenance activities. During the course of S and M activities, the facility's condition may change so as to present an immediate or developing hazard or unsatisfactory condition. Corrective action should be coordinated with the appropriate support organizations using the requirements and guidance stated in procedure Y10-202, Rev. 1, Integrated Safety Management Program, (Lockheed Martin Energy Systems, Inc. (LMES), 1998a) implemented at the Oak Ridge Y-12 Plant and the methodology of the Nuclear Operations Conduct of Operations Manual (LMES, 1999) for the Depleted Uranium Operations (DUO) organization. The key S and M objectives applicable to the Plating Shop are to: Ensure adequate containment of remaining residual material in exhaust stacks and outside process piping, stored chemicals awaiting offsite shipment, and items located in the Radioactive Material Area (RMA); Provide access control into the facility and physical safety to S and M personnel; Maintain the facility in a manner that will protect the public, the environment, and the S and M personnel; Provide an S and M plan which identifies and complies with applicable environmental, safety, and health safeguards and security requirements; and Provide a cost effective S and M program for the plating shop, Building 9401-2.« less
Sustainability impact assessment to improve food security of smallholders in Tanzania
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schindler, Jana, E-mail: jana.schindler@zalf.de; Humboldt Universität zu Berlin, Faculty of Agriculture and Horticulture, Invalidenstr. 42, 10099 Berlin; Graef, Frieder, E-mail: graef@zalf.de
The objective of this paper was to assess the sustainability impacts of planned agricultural development interventions, so called upgrading strategies (UPS), to enhance food security and to identify what advantages and risks are assessed from the farmer's point of view in regards to social life, the economy and the environment. We developed a participatory methodological procedure that links food security and sustainable development. Farmers in four different case study villages in rural Tanzania chose their priority UPS. For these UPS, they assessed the impacts on locally relevant food security criteria. The positive impacts identified were mainly attributed to increased agriculturalmore » production and its related positive impacts such as increased income and improved access to necessary means to diversify the diet. However, several risks of certain UPS were also indicated by farmers, such as increased workload, high maintenance costs, higher competition among farmers, loss of traditional knowledge and social conflicts. We discussed the strong interdependence of socio-economic and environmental criteria to improve food security for small-scale farmers and analysed several trade-offs in regards to UPS choices and food security criteria. We also identified and discussed the advantages and challenges of our methodological approach. In conclusion, the participatory impact assessment on the farmer level allowed a locally specific analysis of the various positive and negative impacts of UPS on social life, the economy and the environment. We emphasize that only a development approach that considers social, economic and environmental challenges simultaneously can enhance food security.« less
Referent control and motor equivalence of reaching from standing
Tomita, Yosuke; Feldman, Anatol G.
2016-01-01
Motor actions may result from central changes in the referent body configuration, defined as the body posture at which muscles begin to be activated or deactivated. The actual body configuration deviates from the referent configuration, particularly because of body inertia and environmental forces. Within these constraints, the system tends to minimize the difference between these configurations. For pointing movement, this strategy can be expressed as the tendency to minimize the difference between the referent trajectory (RT) and actual trajectory (QT) of the effector (hand). This process may underlie motor equivalent behavior that maintains the pointing trajectory regardless of the number of body segments involved. We tested the hypothesis that the minimization process is used to produce pointing in standing subjects. With eyes closed, 10 subjects reached from a standing position to a remembered target located beyond arm length. In randomly chosen trials, hip flexion was unexpectedly prevented, forcing subjects to take a step during pointing to prevent falling. The task was repeated when subjects were instructed to intentionally take a step during pointing. In most cases, reaching accuracy and trajectory curvature were preserved due to adaptive condition-specific changes in interjoint coordination. Results suggest that referent control and the minimization process associated with it may underlie motor equivalence in pointing. NEW & NOTEWORTHY Motor actions may result from minimization of the deflection of the actual body configuration from the centrally specified referent body configuration, in the limits of neuromuscular and environmental constraints. The minimization process may maintain reaching trajectory and accuracy regardless of the number of body segments involved (motor equivalence), as confirmed in this study of reaching from standing in young healthy individuals. Results suggest that the referent control process may underlie motor equivalence in reaching. PMID:27784802
Wide Area Security Region Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Makarov, Yuri V.; Lu, Shuai; Guo, Xinxin
2010-03-31
This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of systemmore » parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of security hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed technology. Recommendations for the future work have also been formulated.« less
A preliminary cyber-physical security assessment of the Robot Operating System (ROS)
NASA Astrophysics Data System (ADS)
McClean, Jarrod; Stull, Christopher; Farrar, Charles; Mascareñas, David
2013-05-01
Over the course of the last few years, the Robot Operating System (ROS) has become a highly popular software framework for robotics research. ROS has a very active developer community and is widely used for robotics research in both academia and government labs. The prevalence and modularity of ROS cause many people to ask the question: "What prevents ROS from being used in commercial or government applications?" One of the main problems that is preventing this increased use of ROS in these applications is the question of characterizing its security (or lack thereof). In the summer of 2012, a crowd sourced cyber-physical security contest was launched at the cyber security conference DEF CON 20 to begin the process of characterizing the security of ROS. A small-scale, car-like robot was configured as a cyber-physical security "honeypot" running ROS. DEFFCON-20 attendees were invited to find exploits and vulnerabilities in the robot while network traffic was collected. The results of this experiment provided some interesting insights and opened up many security questions pertaining to deployed robotic systems. The Federal Aviation Administration is tasked with opening up the civil airspace to commercial drones by September 2015 and driverless cars are already legal for research purposes in a number of states. Given the integration of these robotic devices into our daily lives, the authors pose the following question: "What security exploits can a motivated person with little-to-no experience in cyber security execute, given the wide availability of free cyber security penetration testing tools such as Metasploit?" This research focuses on applying common, low-cost, low-overhead, cyber-attacks on a robot featuring ROS. This work documents the effectiveness of those attacks.
NASA Astrophysics Data System (ADS)
Doll, William E.; Bell, David T.; Gamey, T. Jeffrey; Beard, Les P.; Sheehan, Jacob R.; Norton, Jeannemarie
2010-04-01
Over the past decade, notable progress has been made in the performance of airborne geophysical systems for mapping and detection of unexploded ordnance in terrestrial and shallow marine environments. For magnetometer systems, the most significant improvements include development of denser magnetometer arrays and vertical gradiometer configurations. In prototype analyses and recent Environmental Security Technology Certification Program (ESTCP) assessments using new production systems the greatest sensitivity has been achieved with a vertical gradiometer configuration, despite model-based survey design results which suggest that dense total-field arrays would be superior. As effective as magnetometer systems have proven to be at many sites, they are inadequate at sites where basalts and other ferrous geologic formations or soils produce anomalies that approach or exceed those of target ordnance items. Additionally, magnetometer systems are ineffective where detection of non-ferrous ordnance items is of primary concern. Recent completion of the Battelle TEM-8 airborne time-domain electromagnetic system represents the culmination of nearly nine years of assessment and development of airborne electromagnetic systems for UXO mapping and detection. A recent ESTCP demonstration of this system in New Mexico showed that it was able to detect 99% of blind-seeded ordnance items, 81mm and larger, and that it could be used to map in detail a bombing target on a basalt flow where previous airborne magnetometer surveys had failed. The probability of detection for the TEM-8 in the blind-seeded study area was better than that reported for a dense-array total-field magnetometer demonstration of the same blind-seeded site, and the TEM-8 system successfully detected these items with less than half as many anomaly picks as the dense-array total-field magnetometer system.
The design and implementation of multi-source application middleware based on service bus
NASA Astrophysics Data System (ADS)
Li, Yichun; Jiang, Ningkang
2017-06-01
With the rapid development of the Internet of Things(IoT), the real-time monitoring data are increasing with different types and large amounts. Aiming at taking full advantages of the data, we designed and implemented an application middleware, which not only supports the three-layer architecture of IoT information system but also enables the flexible configuration of multiple resources access and other accessional modules. The middleware platform shows the characteristics of lightness, security, AoP (aspect-oriented programming), distribution and real-time, which can let application developers construct the information processing systems on related areas in a short period. It focuses not limited to these functions: pre-processing of data format, the definition of data entity, the callings and handlings of distributed service and massive data process. The result of experiment shows that the performance of middleware is more excellent than some message queue construction to some degree and its throughput grows better as the number of distributed nodes increases while the code is not complex. Currently, the middleware is applied to the system of Shanghai Pudong environmental protection agency and achieved a great success.
Jogenfors, Jonathan; Elhassan, Ashraf Mohamed; Ahrens, Johan; Bourennane, Mohamed; Larsson, Jan-Åke
2015-12-01
Photonic systems based on energy-time entanglement have been proposed to test local realism using the Bell inequality. A violation of this inequality normally also certifies security of device-independent quantum key distribution (QKD) so that an attacker cannot eavesdrop or control the system. We show how this security test can be circumvented in energy-time entangled systems when using standard avalanche photodetectors, allowing an attacker to compromise the system without leaving a trace. We reach Bell values up to 3.63 at 97.6% faked detector efficiency using tailored pulses of classical light, which exceeds even the quantum prediction. This is the first demonstration of a violation-faking source that gives both tunable violation and high faked detector efficiency. The implications are severe: the standard Clauser-Horne-Shimony-Holt inequality cannot be used to show device-independent security for energy-time entanglement setups based on Franson's configuration. However, device-independent security can be reestablished, and we conclude by listing a number of improved tests and experimental setups that would protect against all current and future attacks of this type.
Tools for Administration of a UNIX-Based Network
NASA Technical Reports Server (NTRS)
LeClaire, Stephen; Farrar, Edward
2004-01-01
Several computer programs have been developed to enable efficient administration of a large, heterogeneous, UNIX-based computing and communication network that includes a variety of computers connected to a variety of subnetworks. One program provides secure software tools for administrators to create, modify, lock, and delete accounts of specific users. This program also provides tools for users to change their UNIX passwords and log-in shells. These tools check for errors. Another program comprises a client and a server component that, together, provide a secure mechanism to create, modify, and query quota levels on a network file system (NFS) mounted by use of the VERITAS File SystemJ software. The client software resides on an internal secure computer with a secure Web interface; one can gain access to the client software from any authorized computer capable of running web-browser software. The server software resides on a UNIX computer configured with the VERITAS software system. Directories where VERITAS quotas are applied are NFS-mounted. Another program is a Web-based, client/server Internet Protocol (IP) address tool that facilitates maintenance lookup of information about IP addresses for a network of computers.
DIRAC distributed secure framework
NASA Astrophysics Data System (ADS)
Casajus, A.; Graciani, R.; LHCb DIRAC Team
2010-04-01
DIRAC, the LHCb community Grid solution, provides access to a vast amount of computing and storage resources to a large number of users. In DIRAC users are organized in groups with different needs and permissions. In order to ensure that only allowed users can access the resources and to enforce that there are no abuses, security is mandatory. All DIRAC services and clients use secure connections that are authenticated using certificates and grid proxies. Once a client has been authenticated, authorization rules are applied to the requested action based on the presented credentials. These authorization rules and the list of users and groups are centrally managed in the DIRAC Configuration Service. Users submit jobs to DIRAC using their local credentials. From then on, DIRAC has to interact with different Grid services on behalf of this user. DIRAC has a proxy management service where users upload short-lived proxies to be used when DIRAC needs to act on behalf of them. Long duration proxies are uploaded by users to a MyProxy service, and DIRAC retrieves new short delegated proxies when necessary. This contribution discusses the details of the implementation of this security infrastructure in DIRAC.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sauber, A.J.
The National Environmental Policy Act (NEPA) requirement of environmental impact statements for the testing of military equipment, specifically nuclear weapons, conflicts with national security objectives. The author examines NEPA and the Freedom of Information Act (FOIA) in terms of the environmental effects of weapons testing and the relevant case law. The Supreme Court's decision in Catholic Action of Hawaii/Peace Education Project sought to resolve the conflict by distinguishing between a project which is contemplated and one which is proposed. The classification scheme embodied in the FOIA exemption for national security may cause unwarranted frustration of NEPA's goals. The author outlinesmore » a new classification system and review mechanism that could curb military abuse in this area.« less
NASA Astrophysics Data System (ADS)
Plank, G.; Slater, D.; Torrisi, J.; Presser, R.; Williams, M.; Smith, K. D.
2012-12-01
The Nevada Seismological Laboratory (NSL) manages time-series data and high-throughput IP telemetry for the National Center for Nuclear Security (NCNS) Source Physics Experiment (SPE), underway on the Nevada National Security Site (NNSS). During active-source experiments, SPE's heterogeneous systems record over 350 channels of a variety of data types including seismic, infrasound, acoustic, and electro-magnetic. During the interim periods, broadband and short period instruments record approximately 200 channels of continuous, high-sample-rate seismic data. Frequent changes in sensor and station configurations create a challenging meta-data environment. Meta-data account for complete operational histories, including sensor types, serial numbers, gains, sample rates, orientations, instrument responses, data-logger types etc. To date, these catalogue 217 stations, over 40 different sensor types, and over 1000 unique recording configurations (epochs). Facilities for processing, backup, and distribution of time-series data currently span four Linux servers, 60Tb of disk capacity, and two data centers. Bandwidth, physical security, and redundant power and cooling systems for acquisition, processing, and backup servers are provided by NSL's Reno data center. The Nevada System of Higher Education (NSHE) System Computer Services (SCS) in Las Vegas provides similar facilities for the distribution server. NSL staff handle setup, maintenance, and security of all data management systems. SPE PIs have remote access to meta-data, raw data, and CSS3.0 compilations, via SSL-based transfers such as rsync or secure-copy, as well as shell access for data browsing and limited processing. Meta-data are continuously updated and posted on the Las Vegas distribution server as station histories are better understood and errors are corrected. Raw time series and refined CSS3.0 data compilations with standardized formats are transferred to the Las Vegas data server as available. For better data availability and station monitoring, SPE is beginning to leverage NSL's wide-area digital IP network with nine SPE stations and six Rock Valley area stations that stream continuous recordings in real time to the NSL Reno data center. These stations, in addition to eight regional legacy stations supported by National Security Technologies (NSTec), are integrated with NSL's regional monitoring network and constrain a high-quality local earthquake catalog for NNSS. The telemetered stations provide critical capabilities for SPE, and infrastructure for earthquake response on NNSS as well as southern Nevada and the Las Vegas area.
NASA Technical Reports Server (NTRS)
Branch, Drew A.
2014-01-01
Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere has heightened from airports to the communication among the military branches legionnaires. With advanced persistent threats (APT's) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated and secured state in a launch control system environment. FISMA is a law that is mandated by the government to follow when government agencies secure networks and devices. My role on this project is to ensure network devices and systems are in compliance with NIST, as outlined in FISMA. I will achieve this by providing assistance with security plan documentation and collection, system hardware and software inventory, malicious code and malware scanning, and configuration of network devices i.e. routers and IDS's/IPS's. In addition, I will be completing security assessments on software and hardware, vulnerability assessments and reporting, and conducting patch management and risk assessments. A guideline that will help with compliance with NIST is the SANS Top 20 Critical Controls. SANS Top 20 Critical Controls as well as numerous security tools, security software and the conduction of research will be used to successfully complete the tasks given to me. This will ensure compliance with FISMA and NIST, secure systems and a secured network. By the end of this project, I hope to have carried out the tasks stated above as well as gain an immense knowledge about compliance, security tools, networks and network devices, as well as policies and procedures.
NASA Technical Reports Server (NTRS)
Branch, Drew
2013-01-01
Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere was heightened from Airports to the communication among the military branches legionnaires. With advanced persistent threats (APTs) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated and secured state in a launch control system environment. FISMA is a law that is mandated by the government to follow when government agencies secure networks and devices. My role on this project is to ensure network devices and systems are in compliance with NIST, as outlined in FISMA. I will achieve this by providing assistance with security plan documentation and collection, system hardware and software inventory, malicious code and malware scanning and configuration of network devices i.e. routers and IDSsIPSs. In addition I will be completing security assessments on software and hardware, vulnerability assessments and reporting, conducting patch management and risk assessments. A guideline that will help with compliance with NIST is the SANS Top 20 Critical Controls. SANS Top 20 Critical Controls as well as numerous security tools, security software and the conduction of research will be used to successfully complete the tasks given to me. This will ensure compliance with FISMA and NIST, secure systems and a secured network. By the end of this project, I hope to have carried out stated above as well as gain an immense knowledge about compliance, security tools, networks and network devices, policies and procedures.
Enzymatic Decontamination of Environmental Organophosphorus Compounds
2006-12-04
ABSTRACT (Maximum 200 words) The abstract is below since many authors do not follow the 200 word limit 14. SUBJECT TERMS organophosphorus compounds ...5404 Enzymatic decontamination of environmental organophosphorus compounds REPORT DOCUMENTATION PAGE 18. SECURITY CLASSIFICATION ON THIS PAGE...239-18 298-102 15. NUMBER OF PAGES 20. LIMITATION OF ABSTRACT UL - 4-Dec-2006 Enzymatic decontamination of environmental organophosphorus compounds
Environmental Scarcity and Global Security. Headline Series No. 300.
ERIC Educational Resources Information Center
Homer-Dixon, Thomas F.
This book examines the two global trends of rising population and output on environmental change in the 21st century. These environmental changes can be thought of as "scarcities" of vital resources such as soil, water, and a stable climate and may cause widespread social disorder and violence. Contemporary examples of conflict are featured to…
ERIC Educational Resources Information Center
Chan, Tiffany Simons
2009-01-01
Environmental sustainability is one of the most pressing concerns of the twenty-first century, and working toward sustainability will require broad lifestyle and cultural shifts, particularly in industrialized societies. Yet despite a growing recognition of the importance of issues such as climate change, food security, transportation, and…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-06
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Dijji Corp., Hydro Environmental Resources, Inc. (n/k/a EXIM Internet Group, Inc.), Hydrogen Power, Inc., and InsynQ, Inc.; Order of Suspension of... Environmental Resources, Inc. (n/k/a EXIM Internet Group, Inc.) because it has not filed any periodic reports...
The Integrative Studies of Genetic and Environmental Factors in Systemic Sclerosis
2008-05-01
15. SUBJECT TERMS Scleroderma (SSc), fibroblasts, fibrosis, silica, environmental particles, susceptibility. 16. SECURITY CLASSIFICATION OF...factors in a viable system - human fibroblasts. Fibroblasts with a scleroderma (SSc) susceptible genetic background may be more vulnerable to...for understanding environmental contributions to fibrosing diseases such as scleroderma (SSc). Third, in the studies of specific biological
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-16
...- approved Cyber Security Plan. The proposed change is consistent with Nuclear Energy Institute (NEI) 08-09... CFR 51.22(b), no environmental impact statement or environmental assessment need be prepared for these... with 10 CFR 51.22. Therefore, pursuant to 10 CFR 51.22(b), no environmental impact statement or...
Environmental Assessment for Perimeter Security Lighting at Fort MacArthur, California
2007-07-01
transportation, visual resources, cultural resources, socioeconomics, environmental justice, hazardous materials and waste and safety . The environmental...Materials and Wastes 53 3.13 Safety 56 4.0 Environmental Consequences 57 4.1 Air Quality 57 4.2 Noise 58 4.3 Land Use 60 4.4 Geological Resources 61...Socioeconomics 70 4.11 Environmental Justice and Protection of Children 71 4.12 Hazardous Materials and Wastes 73 4.13 Safety 74 5.0 Cumulative
1996-10-01
Diet 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF THIS PAGE...approach, Frank et al. (1993) compared DDE and PCB residues in the general diet with blood levels of Ontario residents. Blood samples were obtained from...sources of PCBs and HCB in this geographical region. In a similar study, Kashyap et al. (1994) monitored DDT levels in duplicate diet samples and
Project #OMS-FY12-0006, February 15, 2012. The U.S. Environmental Protection Agency (EPA) Office of Inspector General plans to begin preliminary research for the subject project, which will be performed by a contractor.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Background. 11.2 Section 11.2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS PURSUANT TO EXECUTIVE ORDER 11652 § 11.2 Background. While the Environmental Protection Agency does not...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-25
... power systems in support of space exploration and national security; and the environmental cleanup of... and industrial equipment and exploration of geologic formations for oil and gas. They are located in...
Seals Flow Code Development 1993
NASA Technical Reports Server (NTRS)
Liang, Anita D. (Compiler); Hendricks, Robert C. (Compiler)
1994-01-01
Seals Workshop of 1993 code releases include SPIRALI for spiral grooved cylindrical and face seal configurations; IFACE for face seals with pockets, steps, tapers, turbulence, and cavitation; GFACE for gas face seals with 'lift pad' configurations; and SCISEAL, a CFD code for research and design of seals of cylindrical configuration. GUI (graphical user interface) and code usage was discussed with hands on usage of the codes, discussions, comparisons, and industry feedback. Other highlights for the Seals Workshop-93 include environmental and customer driven seal requirements; 'what's coming'; and brush seal developments including flow visualization, numerical analysis, bench testing, T-700 engine testing, tribological pairing and ceramic configurations, and cryogenic and hot gas facility brush seal results. Also discussed are seals for hypersonic engines and dynamic results for spiral groove and smooth annular seals.
Panepinto, Deborah; Genon, Giuseppe
2014-07-01
Given the desirability of reducing fossil fuel consumption, together with the increasing production of combustible solid wastes, there is clearly a need for waste treatment systems that achieve both volume reduction and energy recovery. Direct incineration method is one such system. The aim of this work was to analyze the municipal solid waste incineration plant currently under construction in the province of Turin (Piedmont, North Italy), especially the potential for energy recovery, and the consequent environmental effects. We analyzed two kinds of energy recovery: electric energy (electrical configuration) only, and both electric and thermal energy (cogenerative configuration), in this case with a different connection hypothesis to the district heating network. After we had evaluated the potential of the incinerator and considered local demographic, energy and urban planning effects, we assumed different possible connections to the district heating network. We computed the local and global environmental balances based on the characteristics of the flue gas emitted from the stack, taking into consideration the emissions avoided by the substituted sources. The global-scale results provided relevant information on the carbon dioxide emissions parameter. The results on the local scale were used as reference values for the implementation of a Gaussian model (Aermod) that allows evaluation of the actual concentration of the pollutants released into the atmosphere. The main results obtained highlight the high energy efficiency of the combined production of heat and electricity, and the opportunity to minimize the environmental impact by including cogeneration in a district heating scheme. © The Author(s) 2014.
Feng, Hongru; Lin, Yuan; Sun, Yuzhen; Cao, Huiming; Fu, Jianjie; Gao, Ke; Zhang, Aiqian
2017-05-01
Short chain perfluorinated sulfonic acids (PFSAs) that were introduced as alternatives for perfluorooctane sulfonic acid (PFOS) have been widely produced and used. However, few studies have investigated the environmental process of short chain PFSAs, and the related adsorption mechanisms still need to be uncovered. The water-oxide interface is one of the major environmental interfaces that plays an important role in affecting the adsorption behaviour and transport potential of the environmental pollutant. In this study, we performed molecular dynamics simulations and quantum chemistry calculations to investigate the adsorption mechanisms of five PFSAs and their adsorption on hydrated hematite surface as well. Different to the vertical configuration reported for PFOS on titanium oxide, all PFSAs share the same adsorption configuration as the long carbon chains parallel to the surface. The formation of hydrogen bonds between F and inter-surface H helps to stabilize the unique configuration. As a result, the sorption capacity increases with increasing C-F chain length. Moreover, both calculated adsorption energy and partial density of states (PDOS) analysis demonstrate a PFSAs adsorption mechanism in between physical and chemical adsorption because the hydrogen bonds formed by the overlap of F (p) orbital and H (s) orbital are weak intermolecular interactions while the physical adsorption are mainly ascribed to the electrostatic interactions. This massive calculation provides a new insight into the pollutant adsorption behaviour, and in particular, may help to evaluate the environmental influence of pollutants. Copyright © 2017. Published by Elsevier Ltd.
Secure Sensor Platform Software Utilities v.2.0
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hymel, Ross
The SSP Software package allows a user to connect to a CoCIM via a Personality Programmer and: Reset the firmware of the CoCIM using the SSP Personality Programmer. The changes that can be made include things such as: Recovering from a tamper event; Resetting the initialization date and message counter; Change configuration values of the CoCIM using the SSP Seal Configuration or the RMSA Configuration File Editor programs. Configuration values that can be set will depend on what version of the CoCIM firmware is being used, but can include: The IP address of the translator with which this CoCIM (ormore » RMSA) communicates; The number of attempts the CoCIM (or RMSA) will attempt to contact the translator; The primary CoCIM (or RMSA) channel; The secondary CoCIM (or RMSA) channel; Locations of files containing CoCIM (or RMSA) encryption keys SSPSerialDataDumper downloads a CoCIM’s stored messages to a computer connected to the CoCIM via a serial cable; SSPLogAnalyzer decrypts and authenticates messages that have been downloaded using the Serial Data Dumper program and then displays the messages values.« less
Mooring Design Selection of Aquaculture Cage for Indonesian Ocean
NASA Astrophysics Data System (ADS)
Mulyadi, Y.; Syahroni, N.; Sambodho, K.; Zikra, M.; Wahyudi; Adia, H. B. P.
2018-03-01
Fish production is important for the economy in fishing community and for ensuring food security. Climate change will lead a threat to fish productivity. Therefore, a solution offered is to cultivate certain fish, especially those with high economic value by using offshore aquaculture technology. A Sea Station cage is one of the offshore aquaculture cage model that has been used in some locations. As a floating structure, the Sea Station cage need a mooring system to maintain its position. This paper presents the selection analysis of the mooring system designs of the Sea Station cage model that it is suitable with Indonesia Ocean. There are 3 mooring configurations that are linear array, rectangular array, and 4 points mooring type. The nylon mooring rope type has been selected to be used on the 3 mooring configurations and the rope has a diameter of 104 mm with a breaking force of 2.3 MN. Based on results from comparing the 3 mooring configurations, the best mooring configuration is linear array with the tension on the rope of 217 KN and has the safety factor of 0.2 based on DNVGL OS-E301
Simulation Study of Flap Effects on a Commercial Transport Airplane in Upset Conditions
NASA Technical Reports Server (NTRS)
Cunningham, Kevin; Foster, John V.; Shah, Gautam H.; Stewart, Eric C.; Ventura, Robin N.; Rivers, Robert A.; Wilborn, James E.; Gato, William
2005-01-01
As part of NASA's Aviation Safety and Security Program, a simulation study of a twinjet transport airplane crew training simulation was conducted to address fidelity for upset or loss of control conditions and to study the effect of flap configuration in those regimes. Piloted and desktop simulations were used to compare the baseline crew training simulation model with an enhanced aerodynamic model that was developed for high-angle-of-attack conditions. These studies were conducted with various flap configurations and addressed the approach-to-stall, stall, and post-stall flight regimes. The enhanced simulation model showed that flap configuration had a significant effect on the character of departures that occurred during post-stall flight. Preliminary comparisons with flight test data indicate that the enhanced model is a significant improvement over the baseline. Some of the unrepresentative characteristics that are predicted by the baseline crew training simulation for flight in the post-stall regime have been identified. This paper presents preliminary results of this simulation study and discusses key issues regarding predicted flight dynamics characteristics during extreme upset and loss-of-control flight conditions with different flap configurations.
NASA Technical Reports Server (NTRS)
1983-01-01
The overall configuration and modules of the initial and evolved space station are described as well as tended industrial and polar platforms. The mass properties that are the basis for costing are summarized. User friendly attributes (interfaces, resources, and facilities) are identified for commercial; science and applications; industrial park; international participation; national security; and the external tank option. Configuration alternates studied to determine a baseline are examined. Commonality for clustered 3-man and 9-man stations are considered as well as the use of tethered platforms. Requirements are indicated for electrical, communication and tracking; data management Subsystem requirements for electrical, data management, communication and tracking, environment control/life support system; and guidance navigation and control subsystems are identified.
NASA Astrophysics Data System (ADS)
1983-04-01
The overall configuration and modules of the initial and evolved space station are described as well as tended industrial and polar platforms. The mass properties that are the basis for costing are summarized. User friendly attributes (interfaces, resources, and facilities) are identified for commercial; science and applications; industrial park; international participation; national security; and the external tank option. Configuration alternates studied to determine a baseline are examined. Commonality for clustered 3-man and 9-man stations are considered as well as the use of tethered platforms. Requirements are indicated for electrical, communication and tracking; data management Subsystem requirements for electrical, data management, communication and tracking, environment control/life support system; and guidance navigation and control subsystems are identified.
Feasibility of satellite quantum key distribution
NASA Astrophysics Data System (ADS)
Bonato, C.; Tomaello, A.; Da Deppo, V.; Naletto, G.; Villoresi, P.
2009-04-01
In this paper, we present a novel analysis of the feasibility of quantum key distribution between a LEO satellite and a ground station. First of all, we study signal propagation through a turbulent atmosphere for uplinks and downlinks, discussing the contribution of beam spreading and beam wandering. Then we introduce a model for the background noise of the channel during night-time and day-time, calculating the signal-to-noise ratio for different configurations. We also discuss the expected error-rate due to imperfect polarization compensation in the channel. Finally, we calculate the expected key generation rate of a secure key for different configurations (uplink, downlink) and for different protocols (BB84 with and without decoy states, entanglement-based Ekert91 protocol).
NASA Astrophysics Data System (ADS)
Stewart, Alphonso C.
2001-09-01
A Kevlar cord and two thermal knives are key components in the Solar Array Restraint and Release System (SARRS) on the Microwave Anisotropy Probe (MAP) spacecraft at NASA's Goddard Space Flight Center. The SARRS uses a 25-foot (7.62 m) length Kevlar cord that encircles the spacecraft and secures the solar panels in stowed configuration for launch. Once in orbit, one of two redundantly configured thermal knives severs the Kevlar cord and permits the panels to deploy. The purpose of this paper is to present the details of the design, development test results, and the various innovations that were created during the development of this novel use of the thermal knife and Kevlar cord.
1989-03-01
e"-s tcc,: -e .- r reverse of necessary an., ice-tfy by bi.-:’ ru-’ce," 5uz"ou configuration management. Delphi method. Command and Control 19 Ac-s:’a...Aos!,ac: 21 Aostraczt Security Classitcator : R uncassf~’! i~e sa-e as renc- E 0orC users Unclassified 22a Na-e of Respon’s :e iro, v c a 22o Te’eo’one...i!r’ciule A’ea coce’ 22: C’" ce . Thomnas 1’. Mitchell (4081 646-2620 155k.11i DD FORI, 1473.6.: VAR 63 A-- R e-.!c- rnay be usec~ unti exhausted se