Food production & availability--essential prerequisites for sustainable food security.
Swaminathan, M S; Bhavani, R V
2013-09-01
Food and nutrition security are intimately interconnected, since only a food based approach can help in overcoming malnutrition in an economically and socially sustainable manner. Food production provides the base for food security as it is a key determinant of food availability. This paper deals with different aspects of ensuring high productivity and production without associated ecological harm for ensuring adequate food availability. By mainstreaming ecological considerations in technology development and dissemination, we can enter an era of evergreen revolution and sustainable food and nutrition security. Public policy support is crucial for enabling this.
Food production & availability - Essential prerequisites for sustainable food security
Swaminathan, M.S.; Bhavani, R.V.
2013-01-01
Food and nutrition security are intimately interconnected, since only a food based approach can help in overcoming malnutrition in an economically and socially sustainable manner. Food production provides the base for food security as it is a key determinant of food availability. This paper deals with different aspects of ensuring high productivity and production without associated ecological harm for ensuring adequate food availability. By mainstreaming ecological considerations in technology development and dissemination, we can enter an era of evergreen revolution and sustainable food and nutrition security. Public policy support is crucial for enabling this. PMID:24135188
Security Requirements Management in Software Product Line Engineering
NASA Astrophysics Data System (ADS)
Mellado, Daniel; Fernández-Medina, Eduardo; Piattini, Mario
Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current product line practices in requirements engineering do not adequately address security requirements engineering. Therefore, in this chapter we will propose a security requirements engineering process (SREPPLine) driven by security standards and based on a security requirements decision model along with a security variability model to manage the variability of the artefacts related to security requirements. The aim of this approach is to deal with security requirements from the early stages of the product line development in a systematic way, in order to facilitate conformance with the most relevant security standards with regard to the management of security requirements, such as ISO/IEC 27001 and ISO/IEC 15408.
Optical security features for plastic card documents
NASA Astrophysics Data System (ADS)
Hossick Schott, Joachim
1998-04-01
Print-on-demand is currently a major trend in the production of paper based documents. This fully digital production philosophy will likely have ramifications also for the secure identification document market. Here, plastic cards increasingly replace traditionally paper based security sensitive documents such as drivers licenses and passports. The information content of plastic cards can be made highly secure by using chip cards. However, printed and other optical security features will continue to play an important role, both for machine readable and visual inspection. Therefore, on-demand high resolution print technologies, laser engraving, luminescent pigments and laminated features such as holograms, kinegrams or phase gratings will have to be considered for the production of secure identification documents. Very important are also basic optical, surface and material durability properties of the laminates as well as the strength and nature of the adhesion between the layers. This presentation will address some of the specific problems encountered when optical security features such as high resolution printing and laser engraving are to be integrated in the on-demand production of secure plastic card identification documents.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-18
..., other than a single equity option or a security futures product, whose value is based, in whole or in... Change To Amend its Fee Schedule To Assess Fees for Derivative Securities Products January 11, 2012..., effective January 9, 2012, to create a separate fee and rebate structure for Derivative Securities Products...
Bialas, Andrzej
2011-01-01
Intelligent sensors experience security problems very similar to those inherent to other kinds of IT products or systems. The assurance for these products or systems creation methodologies, like Common Criteria (ISO/IEC 15408) can be used to improve the robustness of the sensor systems in high risk environments. The paper presents the background and results of the previous research on patterns-based security specifications and introduces a new ontological approach. The elaborated ontology and knowledge base were validated on the IT security development process dealing with the sensor example. The contribution of the paper concerns the application of the knowledge engineering methodology to the previously developed Common Criteria compliant and pattern-based method for intelligent sensor security development. The issue presented in the paper has a broader significance in terms that it can solve information security problems in many application domains. PMID:22164064
Bialas, Andrzej
2011-01-01
Intelligent sensors experience security problems very similar to those inherent to other kinds of IT products or systems. The assurance for these products or systems creation methodologies, like Common Criteria (ISO/IEC 15408) can be used to improve the robustness of the sensor systems in high risk environments. The paper presents the background and results of the previous research on patterns-based security specifications and introduces a new ontological approach. The elaborated ontology and knowledge base were validated on the IT security development process dealing with the sensor example. The contribution of the paper concerns the application of the knowledge engineering methodology to the previously developed Common Criteria compliant and pattern-based method for intelligent sensor security development. The issue presented in the paper has a broader significance in terms that it can solve information security problems in many application domains.
CORBASec Used to Secure Distributed Aerospace Propulsion Simulations
NASA Technical Reports Server (NTRS)
Blaser, Tammy M.
2003-01-01
The NASA Glenn Research Center and its industry partners are developing a Common Object Request Broker (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines. It was developed by Glenn and is being managed by the NASA Ames Research Center as the lead center reporting directly to NASA Headquarters' Aerospace Technology Enterprise. Glenn is an active domain member of the Object Management Group: an open membership, not-for-profit consortium that produces and manages computer industry specifications (i.e., CORBA) for interoperable enterprise applications. When NPSS is deployed, it will assemble a distributed aerospace propulsion simulation scenario from proprietary analytical CORBA servers and execute them with security afforded by the CORBASec implementation. The NPSS CORBASec test bed was initially developed with the TPBroker Security Service product (Hitachi Computer Products (America), Inc., Waltham, MA) using the Object Request Broker (ORB), which is based on the TPBroker Basic Object Adaptor, and using NPSS software across different firewall products. The test bed has been migrated to the Portable Object Adaptor architecture using the Hitachi Security Service product based on the VisiBroker 4.x ORB (Borland, Scotts Valley, CA) and on the Orbix 2000 ORB (Dublin, Ireland, with U.S. headquarters in Waltham, MA). Glenn, GE Aircraft Engines, and Pratt & Whitney Aircraft are the initial industry partners contributing to the NPSS CORBASec test bed. The test bed uses Security SecurID (RSA Security Inc., Bedford, MA) two-factor token-based authentication together with Hitachi Security Service digital-certificate-based authentication to validate the various NPSS users. The test bed is expected to demonstrate NPSS CORBASec-specific policy functionality, confirm adequate performance, and validate the required Internet configuration in a distributed collaborative aerospace propulsion environment.
15 CFR 700.51 - Requests for priority rating authority.
Code of Federal Regulations, 2010 CFR
2010-01-01
... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE... authorized include: (1) Production or construction equipment; (2) Computers when not used as production items... construction equipment. (1) A request for priority rating authority for production or construction equipment...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Futures contracts on security... Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Narrow-Based Security Indexes § 41.13 Futures contracts on security indexes trading on or subject to the rules of a foreign...
Security Verification Techniques Applied to PatchLink COTS Software
NASA Technical Reports Server (NTRS)
Gilliam, David P.; Powell, John D.; Bishop, Matt; Andrew, Chris; Jog, Sameer
2006-01-01
Verification of the security of software artifacts is a challenging task. An integrated approach that combines verification techniques can increase the confidence in the security of software artifacts. Such an approach has been developed by the Jet Propulsion Laboratory (JPL) and the University of California at Davis (UC Davis). Two security verification instruments were developed and then piloted on PatchLink's UNIX Agent, a Commercial-Off-The-Shelf (COTS) software product, to assess the value of the instruments and the approach. The two instruments are the Flexible Modeling Framework (FMF) -- a model-based verification instrument (JPL), and a Property-Based Tester (UC Davis). Security properties were formally specified for the COTS artifact and then verified using these instruments. The results were then reviewed to determine the effectiveness of the approach and the security of the COTS product.
An approach to quality and security of supply for single-use bioreactors.
Barbaroux, Magali; Gerighausen, Susanne; Hackel, Heiko
2014-01-01
Single-use systems (also referred to as disposables) have become a huge part of the bioprocessing industry, which raised concern in the industry regarding quality and security of supply. Processes must be in place to assure the supply and control of outsourced activities and quality of purchased materials along the product life cycle. Quality and security of supply for single-use bioreactors (SUBs) are based on a multidisciplinary approach. Developing a state-of-the-art SUB-system based on quality by design (QbD) principles requires broad expertise and know-how including the cell culture application, polymer chemistry, regulatory requirements, and a deep understanding of the biopharmaceutical industry. Using standardized products reduces the complexity and strengthens the robustness of the supply chain. Well-established supplier relations including risk mitigation strategies are the basis for achieving long-term security of supply. Well-developed quality systems including change control approaches aligned with the requirements of the biopharmaceutical industry are a key factor in supporting long-term product availability. This chapter outlines the approach to security of supply for key materials used in single-use production processes for biopharmaceuticals from a supplier perspective.
Role of farmer group institutions in increasing farm production and household food security
NASA Astrophysics Data System (ADS)
Rahmadanih; Bulkis, S.; Arsyad, M.; Amrullah, A.; Viantika, N. M.
2018-05-01
Food productions and food security are still becomes serious issue in agriculture development. The research objectives are (1) Examining the role of Farmer Group in increasing farm production and (2) Analyzing the role of Farmer Group in relationship with the household food security. The research was conducted in Soppeng District, South Sulawesi, Indonesia by taking unit of analysis at household level of Farmer Group members. Sample were 6 farmer groups, consisting of 365 households. The Results showed that the Farmer Group has a good role as a production, collaboration and market unit to increase farming production (score 2.3-2.6), but haven’t much impact to increase household food security. Rice production are 4.2 – 6.2 tons per hectare and household food security level are “low and marginal food secure” (mean score 4 and 6). Nevertheless, the role of Farmer Group showed a positive relationship with the level of household food security. So, it is necessarry to increase the role of Farmer Group in order to increase income and household food security based on Farmer Group’s needs and potencies through facilitation of (a) seed and water/irrigation availability, (b) preparing organization rules (AD/ART) and (c) appropriate training and education of food and nutrition.
44 CFR 321.4 - Achieving production readiness.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE... sabotage through adequate physical security measures. (iv) Protection of personnel from widespread...
44 CFR 321.4 - Achieving production readiness.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE... sabotage through adequate physical security measures. (iv) Protection of personnel from widespread...
44 CFR 321.4 - Achieving production readiness.
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE... sabotage through adequate physical security measures. (iv) Protection of personnel from widespread...
44 CFR 321.4 - Achieving production readiness.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE... sabotage through adequate physical security measures. (iv) Protection of personnel from widespread...
9 CFR 121.7 - Registration and related security risk assessments.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Registration and related security risk..., USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 121.7 Registration and related security risk... Administrator or the HHS Secretary based on a security risk assessment by the Attorney General: (i) The...
Secure Web-based Ground System User Interfaces over the Open Internet
NASA Technical Reports Server (NTRS)
Langston, James H.; Murray, Henry L.; Hunt, Gary R.
1998-01-01
A prototype has been developed which makes use of commercially available products in conjunction with the Java programming language to provide a secure user interface for command and control over the open Internet. This paper reports successful demonstration of: (1) Security over the Internet, including encryption and certification; (2) Integration of Java applets with a COTS command and control product; (3) Remote spacecraft commanding using the Internet. The Java-based Spacecraft Web Interface to Telemetry and Command Handling (Jswitch) ground system prototype provides these capabilities. This activity demonstrates the use and integration of current technologies to enable a spacecraft engineer or flight operator to monitor and control a spacecraft from a user interface communicating over the open Internet using standard World Wide Web (WWW) protocols and commercial off-the-shelf (COTS) products. The core command and control functions are provided by the COTS Epoch 2000 product. The standard WWW tools and browsers are used in conjunction with the Java programming technology. Security is provided with the current encryption and certification technology. This system prototype is a step in the direction of giving scientist and flight operators Web-based access to instrument, payload, and spacecraft data.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Futures contracts on security indexes trading on or subject to the rules of a foreign board of trade. 41.13 Section 41.13 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Narrow-Based Security Indexes § 41.13 Futures contracts on...
Computer-Aided Sensor Development Focused on Security Issues.
Bialas, Andrzej
2016-05-26
The paper examines intelligent sensor and sensor system development according to the Common Criteria methodology, which is the basic security assurance methodology for IT products and systems. The paper presents how the development process can be supported by software tools, design patterns and knowledge engineering. The automation of this process brings cost-, quality-, and time-related advantages, because the most difficult and most laborious activities are software-supported and the design reusability is growing. The paper includes a short introduction to the Common Criteria methodology and its sensor-related applications. In the experimental section the computer-supported and patterns-based IT security development process is presented using the example of an intelligent methane detection sensor. This process is supported by an ontology-based tool for security modeling and analyses. The verified and justified models are transferred straight to the security target specification representing security requirements for the IT product. The novelty of the paper is to provide a patterns-based and computer-aided methodology for the sensors development with a view to achieving their IT security assurance. The paper summarizes the validation experiment focused on this methodology adapted for the sensors system development, and presents directions of future research.
Computer-Aided Sensor Development Focused on Security Issues
Bialas, Andrzej
2016-01-01
The paper examines intelligent sensor and sensor system development according to the Common Criteria methodology, which is the basic security assurance methodology for IT products and systems. The paper presents how the development process can be supported by software tools, design patterns and knowledge engineering. The automation of this process brings cost-, quality-, and time-related advantages, because the most difficult and most laborious activities are software-supported and the design reusability is growing. The paper includes a short introduction to the Common Criteria methodology and its sensor-related applications. In the experimental section the computer-supported and patterns-based IT security development process is presented using the example of an intelligent methane detection sensor. This process is supported by an ontology-based tool for security modeling and analyses. The verified and justified models are transferred straight to the security target specification representing security requirements for the IT product. The novelty of the paper is to provide a patterns-based and computer-aided methodology for the sensors development with a view to achieving their IT security assurance. The paper summarizes the validation experiment focused on this methodology adapted for the sensors system development, and presents directions of future research. PMID:27240360
Challenges and Responses to Asian Food Security
NASA Astrophysics Data System (ADS)
Teng, Paul P. S.; Oliveros, Jurise A. P.
2015-10-01
Food security is a complex phenomenon made up of multiple dimensions — food availability, physical access to food, economic access to food, food utilization — each of which has a stability dimension which underpins it. This review provides details on these dimensions and links them to two published indices which provide assessments of the state of food security in a country. The paper further provides analyses of the main supply and demand factors in the food security equation. Food security faces natural and anthropogenic threats such as loss of productive land and water, climate change and declining crop productivity, all of which are potentially amenable to solutions provided by science and technology. Demographic and accompanying diet changes further exacerbate the demands made on the natural resource base for food production. Finally, possible responses to the challenges confronting a secured food future are discussed from technological, policy and system level perspectives.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-21
... Market Maker'') in a derivative securities product (``UTP Derivative Security'') that derives its value... Derivative Security on the Exchange(s) from acting or registering as a market maker on any other exchange in any Reference Asset of that UTP Derivative Security, or any derivative instrument based on a Reference...
Design and Analysis of Secure Routing Protocol for Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Wang, Jiong; Zhang, Hua
2017-09-01
In recent years, with the development of science and technology and the progress of the times, China's wireless network technology has become increasingly prosperous and it plays an important role in social production and life. In this context, in order to further to enhance the stability of wireless network data transmission and security enhancements, the staff need to focus on routing security and carry out related work. Based on this, this paper analyzes the design of wireless sensor based on secure routing protocol.
NASA Astrophysics Data System (ADS)
Polyakov, M.; Odinokov, S.
2017-05-01
The report focuses on special printing industry, which is called secure printing, which uses printing techniques to prevent forgery or falsification of security documents. The report considered the possibility of establishing a spectral device for determining the authenticity of certain documents that are protected by machine-readable luminophor labels. The device works in two spectral ranges - visible and near infrared that allows to register Stokes and anti-Stokes spectral components of protective tags. The proposed device allows verification of the authenticity of security documents based on multiple criteria in different spectral ranges. It may be used at enterprises related to the production of security printing products, expert units of law enforcement bodies at check of authenticity of banknotes and other structures.
Verifying the secure setup of UNIX client/servers and detection of network intrusion
NASA Astrophysics Data System (ADS)
Feingold, Richard; Bruestle, Harry R.; Bartoletti, Tony; Saroyan, R. A.; Fisher, John M.
1996-03-01
This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today's global `Infosphere' presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to check on their security configuration. SPI's broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI's use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on the Ethernet broadcast Local Area Network segment and product transcripts of suspicious user connections. NID's retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.
An IPSO-SVM algorithm for security state prediction of mine production logistics system
NASA Astrophysics Data System (ADS)
Zhang, Yanliang; Lei, Junhui; Ma, Qiuli; Chen, Xin; Bi, Runfang
2017-06-01
A theoretical basis for the regulation of corporate security warning and resources was provided in order to reveal the laws behind the security state in mine production logistics. Considering complex mine production logistics system and the variable is difficult to acquire, a superior security status predicting model of mine production logistics system based on the improved particle swarm optimization and support vector machine (IPSO-SVM) is proposed in this paper. Firstly, through the linear adjustments of inertia weight and learning weights, the convergence speed and search accuracy are enhanced with the aim to deal with situations associated with the changeable complexity and the data acquisition difficulty. The improved particle swarm optimization (IPSO) is then introduced to resolve the problem of parameter settings in traditional support vector machines (SVM). At the same time, security status index system is built to determine the classification standards of safety status. The feasibility and effectiveness of this method is finally verified using the experimental results.
Five Models for European Security: Implications for the United States
1992-01-01
tripolar concept of security. It is the product of Europeans’ search for a third way between the United States and the former Soviet Union-in part to...distinguish the five systems from each other are reasonably clear (ad hoc, bipolar, tripolar , multi-polar collective, and overlapping), there is room...based on a tripolar concept of security. It is the product of Europeans’ search for a third way between the United States and the former Soviet Union-in
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-16
... securities product (``UTP Derivative Security'') that derives its value from one or more currencies or..., proposed EDGA Rule 14.1(c)(5)(A) provides that a Restricted Market Maker in a UTP Derivative Security on... Reference Asset of that UTP Derivative Security, or any derivative instrument based on a Reference Asset of...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-13
...In accordance with section 712(a)(8), section 712(d)(1), sections 712(d)(2)(B) and (C), sections 721(b) and (c), and section 761(b) of the Dodd-Frank Wall Street Reform and Consumer Protection Act (``Dodd-Frank Act''), the Commodity Futures Trading Commission (``CFTC'') and the Securities and Exchange Commission (``SEC'') (collectively, ``Commissions''), in consultation with the Board of Governors of the Federal Reserve System (``Board''), are jointly adopting new rules and interpretations under the Commodity Exchange Act (``CEA'') and the Securities Exchange Act of 1934 (``Exchange Act'') to further define the terms ``swap,'' ``security-based swap,'' and ``security-based swap agreement'' (collectively, ``Product Definitions''); regarding ``mixed swaps;'' and governing books and records with respect to ``security-based swap agreements.'' The CFTC requests comment on its interpretation concerning forwards with embedded volumetric optionality, contained in Section II.B.2.(b)(ii) of this release.
NASA Astrophysics Data System (ADS)
González, M. R.; Lambán, M. P.
2012-04-01
This paper presents the result of designing the subject Quality Engineering and Security of the Product, belonging to the Degree of Engineering in Industrial Design and Product Development, on the basis of the case methodology. Practical sessions of this subject are organized using the whole documents of the Quality System Management of the virtual company BeaLuc S.A.
17 CFR 41.41 - Security futures products accounts.
Code of Federal Regulations, 2010 CFR
2010-04-01
... SECURITY FUTURES PRODUCTS Customer Accounts and Margin Requirements § 41.41 Security futures products... all of a customer's security futures products in a futures account, all of a customer's security futures products in a securities account, or some of a customer's security futures products in a futures...
Security Systems Commissioning: An Old Trick for Your New Dog
ERIC Educational Resources Information Center
Black, James R.
2009-01-01
Sophisticated, software-based security systems can provide powerful tools to support campus security. By nature, such systems are flexible, with many capabilities that can help manage the process of physical protection. However, the full potential of these systems can be overlooked because of unfamiliarity with the products, weaknesses in security…
17 CFR 41.12 - Indexes underlying futures contracts trading for fewer than 30 days.
Code of Federal Regulations, 2014 CFR
2014-04-01
... contracts trading for fewer than 30 days. 41.12 Section 41.12 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION (CONTINUED) SECURITY FUTURES PRODUCTS Narrow-Based Security Indexes § 41.12 Indexes underlying futures contracts trading for fewer than 30 days. (a) An index on which a contract of...
Urquía-Fernández, Nuria
2014-01-01
An overview of food security and nutrition in Mexico is presented, based on the analysis of the four pillars of food security: availability, access, utilization of food, and stability of the food supply. In addition, the two faces of malnutrition in Mexico were analyzed: obesity and undernourishment. Data were gathered from the food security indicators of the United Nations's Food and Agriculture Organization, from the Mexican Scale of Food Security, and from the National Health and Nutrition Survey. Mexico presents an index of availability of 3 145 kilocalories per person per day, one of the highest indexes in the world, including both food production and imports. In contrast, Mexico is affected by a double burden of malnutrition: whereas children under five present 14% of stunt, 30% of the adult population is obese. Also, more than 18% of the population cannot afford the basic food basket (food poverty). Using perception surveys, people reports important levels of food insecurity, which concentrates in seven states of the Mexican Federation. The production structure underlying these indicators shows a very heterogeneous landscape, which translates in to a low productivity growth across the last years. Food security being a multidimensional concept, to ensure food security for the Mexican population requires a revision and redesign of public productive and social policies, placing a particular focus on strengthening the mechanisms of institutional governance.
1995-06-01
required, the Defense Technology Security Administration ( DTSA ) will make a determination on whether or not advanced technologies are being risked by the...sale or transfer of that product. DTSA has this role whether it is a commercial or government-to-government transfer. The Joint Chiefs of Staff also...Office of Defense Relations Security Assistance DSAA Defense Security Assistance Agency DTIB Defense Technological and Industrial Base DTSA Defense
Information Systems Security Products and Services Catalogue.
1992-01-01
pricing information on the Motorola Portable DES Receiver Station and Portable DES Base Station, contact Motorola. The PX-300- S ranges in cost from...C2 Paul Smith (612) 482-2776 Tom Latterner (301) 220-3400 Jeffrey S . Bell (215) 986-6864 John Haggard (312) 714-7604 4-2d.2 GENERAL-PURPOSE...primary software security mechanism of the SCOMP system is the security kernel, based on the Center-approved Bell -LaPadula model of the software portion
USDA-ARS?s Scientific Manuscript database
Assessing and improving the sustainability of dairy production systems is essential to secure future food production. This requires a holistic approach that reveals trade-offs between emissions of the different greenhouse gases (GHG) and nutrient-based pollutants and ensures that interactions betwee...
17 CFR 41.12 - Indexes underlying futures contracts trading for fewer than 30 days.
Code of Federal Regulations, 2011 CFR
2011-04-01
... contracts trading for fewer than 30 days. 41.12 Section 41.12 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Narrow-Based Security Indexes § 41.12 Indexes underlying futures contracts trading for fewer than 30 days. (a) An index on which a contract of sale for...
17 CFR 41.12 - Indexes underlying futures contracts trading for fewer than 30 days.
Code of Federal Regulations, 2012 CFR
2012-04-01
... contracts trading for fewer than 30 days. 41.12 Section 41.12 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Narrow-Based Security Indexes § 41.12 Indexes underlying futures contracts trading for fewer than 30 days. (a) An index on which a contract of sale for...
17 CFR 41.12 - Indexes underlying futures contracts trading for fewer than 30 days.
Code of Federal Regulations, 2013 CFR
2013-04-01
... contracts trading for fewer than 30 days. 41.12 Section 41.12 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Narrow-Based Security Indexes § 41.12 Indexes underlying futures contracts trading for fewer than 30 days. (a) An index on which a contract of sale for...
NASA Astrophysics Data System (ADS)
Jiang, Dong-Huan; Xu, Guang-Bao
2018-07-01
Based on locally indistinguishable orthogonal product states, we propose a novel multiparty quantum key agreement (QKA) protocol. In this protocol, the private key information of each party is encoded as some orthogonal product states that cannot be perfectly distinguished by local operations and classical communications. To ensure the security of the protocol with small amount of decoy particles, the different particles of each product state are transmitted separately. This protocol not only can make each participant fairly negotiate a shared key, but also can avoid information leakage in the maximum extent. We give a detailed security proof of this protocol. From comparison result with the existing QKA protocols, we can know that the new protocol is more efficient.
Remote sensing of global croplands for food security
Thenkabail, Prasad S.; Biradar, Chandrashekhar M.; Turral, Hugh; Lyon, John G.
2009-01-01
Increases in populations have created an increasing demand for food crops while increases in demand for biofuels have created an increase in demand for fuel crops. What has not increased is the amount of croplands and their productivity. These and many other factors such as decreasing water resources in a changing climate have created a crisis like situation in global food security. Decision makers in these situations need accurate information based on science. Remote Sensing of Global Croplands for Food Security provides a comprehensive knowledge base in use of satellite sensor-based maps and statistics that can be used to develop strategies for croplands (irrigated and rainfed) and their water use for food security.
NASA Astrophysics Data System (ADS)
Kumar, Pawan; Singh, Satbir; Gupta, Bipin Kumar
2016-07-01
Counterfeiting of valuable documents, currency and branded products is a challenging problem that has serious economic, security and health ramifications for governments, businesses and consumers all over the world. It is estimated that counterfeiting represents a multi-billion dollar underground economy with counterfeit products being produced on a large scale every year. Counterfeiting is an increasingly high-tech crime and calls for high-tech solutions to prevent and deter the acts of counterfeiting. The present review briefly outlines and addresses the key challenges in this area, including the above mentioned concerns for anti-counterfeiting applications. This article describes a unique combination of all possible kinds of security ink formulations based on lanthanide doped luminescent nanomaterials, quantum dots (semiconductor and carbon based), metal organic frameworks as well as plasmonic nanomaterials for their possible use in anti-counterfeiting applications. Moreover, in this review, we have briefly discussed and described the historical background of luminescent nanomaterials, basic concepts and detailed synthesis methods along with their characterization. Furthermore, we have also discussed the methods adopted for the fabrication and design of luminescent security inks, various security printing techniques and their anti-counterfeiting applications.
17 CFR 41.25 - Additional conditions for trading for security futures products.
Code of Federal Regulations, 2011 CFR
2011-04-01
... trading for security futures products. 41.25 Section 41.25 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Requirements and Standards for Listing Security Futures Products § 41.25 Additional conditions for trading for security futures products. (a) Common...
17 CFR 41.25 - Additional conditions for trading for security futures products.
Code of Federal Regulations, 2012 CFR
2012-04-01
... trading for security futures products. 41.25 Section 41.25 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Requirements and Standards for Listing Security Futures Products § 41.25 Additional conditions for trading for security futures products. (a) Common...
17 CFR 41.25 - Additional conditions for trading for security futures products.
Code of Federal Regulations, 2013 CFR
2013-04-01
... trading for security futures products. 41.25 Section 41.25 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Requirements and Standards for Listing Security Futures Products § 41.25 Additional conditions for trading for security futures products. (a) Common...
17 CFR 41.25 - Additional conditions for trading for security futures products.
Code of Federal Regulations, 2014 CFR
2014-04-01
... trading for security futures products. 41.25 Section 41.25 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION (CONTINUED) SECURITY FUTURES PRODUCTS Requirements and Standards for Listing Security Futures Products § 41.25 Additional conditions for trading for security futures products. (a...
Analysis on the University’s Network Security Level System in the Big Data Era
NASA Astrophysics Data System (ADS)
Li, Tianli
2017-12-01
The rapid development of science and technology, the continuous expansion of the scope of computer network applications, has gradually improved the social productive forces, has had a positive impact on the increase production efficiency and industrial scale of China's different industries. Combined with the actual application of computer network in the era of large data, we can see the existence of influencing factors such as network virus, hacker and other attack modes, threatening network security and posing a potential threat to the safe use of computer network in colleges and universities. In view of this unfavorable development situation, universities need to pay attention to the analysis of the situation of large data age, combined with the requirements of network security use, to build a reliable network space security system from the equipment, systems, data and other different levels. To avoid the security risks exist in the network. Based on this, this paper will analyze the hierarchical security system of cyberspace security in the era of large data.
Giguere, Rebecca; Brown, William; Balán, Ivan C; Dolezal, Curtis; Ho, Titcha; Sheinfil, Alan; Ibitoye, Mobolaji; Lama, Javier R; McGowan, Ian; Cranston, Ross D; Carballo-Diéguez, Alex
2018-04-01
During a Phase 2 rectal microbicide trial, men who have sex with men and transgender women (n = 187) in 4 countries (Peru, South Africa, Thailand, United States) reported product use daily via short message service (SMS). To prevent disclosure of study participation, the SMS system program included privacy and security features. We evaluated participants' perceptions of privacy while using the system and acceptability of privacy/security features. To protect privacy, the SMS system: (1) confirmed participant availability before sending the study questions, (2) required a password, and (3) did not reveal product name or study participation. To ensure security, the system reminded participants to lock phone/delete messages. A computer-assisted self-interview (CASI), administered at the final visit, measured burden of privacy and security features and SMS privacy concerns. A subsample of 33 participants underwent an in-depth interview (IDI). Based on CASI, 85% had no privacy concerns; only 5% were very concerned. Most were not bothered by the need for a password (73%) or instructions to delete messages (82%). Based on IDI, reasons for low privacy concerns included sending SMS in private or feeling that texting would not draw attention. A few IDI participants found the password unnecessary and more than half did not delete messages. Most participants were not concerned that the SMS system would compromise their confidentiality. SMS privacy and security features were effective and not burdensome. Short ID-related passwords, ambiguous language, and reminders to implement privacy and security-enhancing behaviors are recommended for SMS systems.
2011-10-01
Fortunately, some products offer centralized management and deployment tools for local desktop implementation . Figure 5 illustrates the... implementation of a secure desktop infrastructure based on virtualization. It includes an overview of desktop virtualization, including an in-depth...environment in the data centre, whereas LHVD places it on the endpoint itself. Desktop virtualization implementation considerations and potential
Using RFID to Enhance Security in Off-Site Data Storage
Lopez-Carmona, Miguel A.; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R.
2010-01-01
Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system’s benefits in terms of efficiency and failure prevention. PMID:22163638
Using RFID to enhance security in off-site data storage.
Lopez-Carmona, Miguel A; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R
2010-01-01
Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system's benefits in terms of efficiency and failure prevention.
Measuring Stability and Security in Iraq
2009-03-01
faces a budget deficit of $20 billion in 2009 based on a price of $50 per barrel and an export rate of 2.0 million barrels per day. Current oil prices...security details with handguns and assist them in obtaining MoI weapons cards. In addition to protection officers, the Coalition assists with...production throughout 2009. Overall, crude oil production peaked at 2.54 million barrels per day (mbpd) in July 2008 and leveled off at approximately
NASA Astrophysics Data System (ADS)
Budde, M. E.; Rowland, J.; Anthony, M.; Palka, S.; Martinez, J.; Hussain, R.
2017-12-01
The U.S. Geological Survey (USGS) supports the use of Earth observation data for food security monitoring through its role as an implementing partner of the Famine Early Warning Systems Network (FEWS NET). The USGS Earth Resources Observation and Science (EROS) Center has developed tools designed to aid food security analysts in developing assumptions of agro-climatological outcomes. There are four primary steps to developing agro-climatology assumptions; including: 1) understanding the climatology, 2) evaluating current climate modes, 3) interpretation of forecast information, and 4) incorporation of monitoring data. Analysts routinely forecast outcomes well in advance of the growing season, which relies on knowledge of climatology. A few months prior to the growing season, analysts can assess large-scale climate modes that might influence seasonal outcomes. Within two months of the growing season, analysts can evaluate seasonal forecast information as indicators. Once the growing season begins, monitoring data, based on remote sensing and field information, can characterize the start of season and remain integral monitoring tools throughout the duration of the season. Each subsequent step in the process can lead to modifications of the original climatology assumption. To support such analyses, we have created an agro-climatology analysis tool that characterizes each step in the assumption building process. Satellite-based rainfall and normalized difference vegetation index (NDVI)-based products support both the climatology and monitoring steps, sea-surface temperature data and knowledge of the global climate system inform the climate modes, and precipitation forecasts at multiple scales support the interpretation of forecast information. Organizing these data for a user-specified area provides a valuable tool for food security analysts to better formulate agro-climatology assumptions that feed into food security assessments. We have also developed a knowledge base for over 80 countries that provide rainfall and NDVI-based products, including annual and seasonal summaries, historical anomalies, coefficient of variation, and number of years below 70% of annual or seasonal averages. These products provide a quick look for analysts to assess the agro-climatology of a country.
Rapidly Deployable Security System Final Report CRADA No. TC-2030-01
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kohlhepp, V.; Whiteman, B.; McKibben, M. T.
The ultimate objective of the LEADER and LLNL strategic partnership was to develop and commercialize_a security-based system product and platform for the use in protecting the substantial physical and economic assets of the government and commerce of the United States. The primary goal of this project was to integrate video surveillance hardware developed by LLNL with a security software backbone developed by LEADER. Upon completion of the project, a prototype hardware/software security system that is highly scalable was to be demonstrated.
He, Ling; Jia, Qi-jian; Li, Chao; Xu, Hao
2016-01-01
The rapid development of coastal economy in Hebei Province caused rapid transition of coastal land use structure, which has threatened land ecological security. Therefore, calculating ecosystem service value of land use and exploring ecological security baseline can provide the basis for regional ecological protection and rehabilitation. Taking Huanghua, a city in the southeast of Hebei Province, as an example, this study explored the joint point, joint path and joint method between ecological security and food security, and then calculated the ecological security baseline of Huanghua City based on the ecosystem service value and the food safety standard. The results showed that ecosystem service value of per unit area from maximum to minimum were in this order: wetland, water, garden, cultivated land, meadow, other land, salt pans, saline and alkaline land, constructive land. The order of contribution rates of each ecological function value from high to low was nutrient recycling, water conservation, entertainment and culture, material production, biodiversity maintenance, gas regulation, climate regulation and environmental purification. The security baseline of grain production was 0.21 kg · m⁻², the security baseline of grain output value was 0.41 yuan · m⁻², the baseline of ecosystem service value was 21.58 yuan · m⁻², and the total of ecosystem service value in the research area was 4.244 billion yuan. In 2081 the ecological security will reach the bottom line and the ecological system, in which human is the subject, will be on the verge of collapse. According to the ecological security status, Huanghua can be divided into 4 zones, i.e., ecological core protection zone, ecological buffer zone, ecological restoration zone and human activity core zone.
Rep. Issa, Darrell E. [R-CA-49
2012-02-09
House - 02/23/2012 Referred to the Subcommittee on Capital Markets and Government Sponsored Enterprises. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
17 CFR 41.23 - Listing of security futures products for trading.
Code of Federal Regulations, 2014 CFR
2014-04-01
... products for trading. 41.23 Section 41.23 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... Products § 41.23 Listing of security futures products for trading. (a) Initial listing of products for trading. To list new security futures products for trading, a designated contract market shall submit to...
6 CFR 37.43 - Physical security of DMV production facilities.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Physical security of DMV production facilities... Identification Card Production Facilities § 37.43 Physical security of DMV production facilities. (a) States must ensure the physical security of facilities where driver's licenses and identification cards are produced...
17 CFR 229.1204 - (Item 1204) Oil and gas production, production prices and production costs.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false (Item 1204) Oil and gas production, production prices and production costs. 229.1204 Section 229.1204 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF...
Consideration of techniques to mitigate the unauthorized 3D printing production of keys
NASA Astrophysics Data System (ADS)
Straub, Jeremy; Kerlin, Scott
2016-05-01
The illicit production of 3D printed keys based on remote-sensed imagery is problematic as it allows a would-be intruder to access a secured facility without the attack attempt being as obviously detectable as conventional techniques. This paper considers the problem from multiple perspectives. First, it looks at different attack types and considers the prospective attack from a digital information perspective. Second, based on this, techniques for securing keys are considered. Third, the design of keys is considered from the perspective of making them more difficult to duplicate using visible light sensing and 3D printing. Policy and legal considerations are discussed.
Land Ecological Security Evaluation of Underground Iron Mine Based on PSR Model
NASA Astrophysics Data System (ADS)
Xiao, Xiao; Chen, Yong; Ruan, Jinghua; Hong, Qiang; Gan, Yong
2018-01-01
Iron ore mine provides an important strategic resource to the national economy while it also causes many serious ecological problems to the environment. The study summed up the characteristics of ecological environment problems of underground iron mine. Considering the mining process of underground iron mine, we analysis connections between mining production, resource, environment and economical background. The paper proposed a land ecological security evaluation system and method of underground iron mine based on Pressure-State-Response model. Our application in Chengchao iron mine proves its efficiency and promising guide on land ecological security evaluation.
17 CFR 41.23 - Listing of security futures products for trading.
Code of Federal Regulations, 2011 CFR
2011-04-01
... products for trading. 41.23 Section 41.23 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... Listing of security futures products for trading. (a) Initial listing of products for trading. To list new security futures products for trading, a designated contract market or registered derivatives transaction...
17 CFR 41.23 - Listing of security futures products for trading.
Code of Federal Regulations, 2013 CFR
2013-04-01
... products for trading. 41.23 Section 41.23 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... Listing of security futures products for trading. (a) Initial listing of products for trading. To list new security futures products for trading, a designated contract market shall submit to the Commission at its...
17 CFR 41.23 - Listing of security futures products for trading.
Code of Federal Regulations, 2012 CFR
2012-04-01
... products for trading. 41.23 Section 41.23 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... Listing of security futures products for trading. (a) Initial listing of products for trading. To list new security futures products for trading, a designated contract market or registered derivatives transaction...
Osabohien, Romanus; Osabuohien, Evans; Urhie, Ese
2018-01-01
Background: Growth in agricultural science and technology is deemed essential for in-creasing agricultural output; reduce the vulnerability of rural poverty and in turn, food security. Food security and growth in agricultural output depends on technological usages, which enhances the pro-ductive capacity of the agricultural sector. The indicators of food security utilised in this study in-clude: dietary energy supply, average value of food production, prevalence of food inadequacy, among others. Objective: In this paper, we examined the level of technology and how investment in the agriculture and technology can improve technical know-how in Nigeria with a view to achieving food security. Method: We carried out the analysis on how investment in technology and institutional framework can improve the level of food availability (a key component of food security) in Nigeria using econ-ometric technique based on Autoregressive Distribution Lag (ARDL) framework. Results: The results showed, inter alia, that in Nigeria, there is a high level of food insecurity as a result of low attention on food production occasioned by the pervasive influence of oil that become the major export product. Conclusion: It was noted that the availability of arable land was one of the major factors to increase food production to solve the challenge of food insecurity. Thus, the efforts of reducing the rate of food insecurity are essential in this regards. This can also be achieved, among others, by active interactions between government and farmers, to make contribution to important planning issues that relate to food production in the country and above all, social protection policies should be geared or channelled to agricultural sector to protect farmers who are vulnerable to shocks and avert risks associated with agriculture. PMID:29853816
Osabohien, Romanus; Osabuohien, Evans; Urhie, Ese
2018-04-01
Growth in agricultural science and technology is deemed essential for in-creasing agricultural output; reduce the vulnerability of rural poverty and in turn, food security. Food security and growth in agricultural output depends on technological usages, which enhances the pro-ductive capacity of the agricultural sector. The indicators of food security utilised in this study in-clude: dietary energy supply, average value of food production, prevalence of food inadequacy, among others. In this paper, we examined the level of technology and how investment in the agriculture and technology can improve technical know-how in Nigeria with a view to achieving food security. We carried out the analysis on how investment in technology and institutional framework can improve the level of food availability (a key component of food security) in Nigeria using econ-ometric technique based on Autoregressive Distribution Lag (ARDL) framework. The results showed, inter alia, that in Nigeria, there is a high level of food insecurity as a result of low attention on food production occasioned by the pervasive influence of oil that become the major export product. It was noted that the availability of arable land was one of the major factors to increase food production to solve the challenge of food insecurity. Thus, the efforts of reducing the rate of food insecurity are essential in this regards. This can also be achieved, among others, by active interactions between government and farmers, to make contribution to important planning issues that relate to food production in the country and above all, social protection policies should be geared or channelled to agricultural sector to protect farmers who are vulnerable to shocks and avert risks associated with agriculture.
Cheng, Rachel; Mantovani, Alberto; Frazzoli, Chiara
2017-01-01
Challenges posed by changes in livestock production in emerging food producing areas and demographic development and climate change require new approaches and responsibilities in the management of food chains. The increasingly recognized role of primary food producers requires the support of the scientific community to instruct effective approaches based on scientific data, tools, and expertise. Mali is an emerging food producing area, and this review covers (i) the dairy farming scenario and its environment, (ii) the role of dairy production in food security, including the greatly different animal rearing systems in the Sahel and tropical regions, (iii) risk management pillars as modern infrastructures, effective farmer organizations, and institutional systems to guarantee animal health and safety of products, and (iv) feasible interventions based on good practices and risk assessment at the farm level (e.g., sustainable use of fertilizers, feeds, veterinary drugs, and pesticides) to protect consumers from food safety hazards. Social innovation based on the empowerment of the primary food producers emerges as crucial for sustainable and safe food production. Sustainable policies should be supported by the mobilization of stakeholders of One Health, which is a science-based approach to linking human health and nutrition with the health and management of food producing animals and environmental safety. In the context of the complex, multifaceted scenario of Mali dairy production, this article presents how a cost-effective animal health and food safety scheme could be established in the dairy production chain. Because milk is a major commodity in this country, benefits could be derived in food security, public health, the resilience of the farming system, animal husbandry, and international trade.
NASA Astrophysics Data System (ADS)
Cabral, Alexandre; Rebordão, José M.
2011-05-01
In optical security (protection against forgery and counterfeit of products and documents) the problem is not exact reproduction but the production of something sufficiently similar to the original. Currently, Diffractive Optically Variable Image Devices (DOVID), that create dynamic chromatic effects which may be easily recognized but are difficult to reproduce, are often used to protect important products and documents. Well known examples of DOVID for security are 3D or 2D/3D holograms in identity documents and credit cards. Others are composed of shapes with different types of microstructures yielding by diffraction to chromatic dynamic effects. A maskless interferometric lithography technique to generate DOVIDs for optical security is presented and compared to traditional techniques. The approach can be considered as a self-masking focused holography on planes tilted with respect to the reference optical axes of the system, and is based on the Scheimpflug and Hinge rules. No physical masks are needed to ensure optimum exposure of the photosensitive film. The system built to demonstrate the technique relies on the digital mirrors device MOEMS technology from Texas Instruments' Digital Light Processing. The technique is linear on the number of specified colors and does not depend either on the area of the device or the number of pixels, factors that drive the complexity of dot-matrix based systems. The results confirmed the technique innovation and capabilities in the creation of diffractive optical elements for security against counterfeiting and forgery.
Importance of biometrics to addressing vulnerabilities of the U.S. infrastructure
NASA Astrophysics Data System (ADS)
Arndt, Craig M.; Hall, Nathaniel A.
2004-08-01
Human identification technologies are important threat countermeasures in minimizing select infrastructure vulnerabilities. Properly targeted countermeasures should be selected and integrated into an overall security solution based on disciplined analysis and modeling. Available data on infrastructure value, threat intelligence, and system vulnerabilities are carefully organized, analyzed and modeled. Prior to design and deployment of an effective countermeasure; the proper role and appropriateness of technology in addressing the overall set of vulnerabilities is established. Deployment of biometrics systems, as with other countermeasures, introduces potentially heightened vulnerabilities into the system. Heightened vulnerabilities may arise from both the newly introduced system complexities and an unfocused understanding of the set of vulnerabilities impacted by the new countermeasure. The countermeasure's own inherent vulnerabilities and those introduced by the system's integration with the existing system are analyzed and modeled to determine the overall vulnerability impact. The United States infrastructure is composed of government and private assets. The infrastructure is valued by their potential impact on several components: human physical safety, physical/information replacement/repair cost, potential contribution to future loss (criticality in weapons production), direct productivity output, national macro-economic output/productivity, and information integrity. These components must be considered in determining the overall impact of an infrastructure security breach. Cost/benefit analysis is then incorporated in the security technology deployment decision process. Overall security risks based on system vulnerabilities and threat intelligence determines areas of potential benefit. Biometric countermeasures are often considered when additional security at intended points of entry would minimize vulnerabilities.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-22
... customer bases of potential product users have indicated a preference that premium pricing for Mini Options... market participants clarity as to the minimum pricing increments for Mini Options, the filing would harmonize penny pricing between Mini Options and standard options on the same security. \\4\\ See Securities...
27 CFR 73.12 - What security controls must I use for identification codes and passwords?
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false What security controls... controls must I use for identification codes and passwords? If you use electronic signatures based upon use of identification codes in combination with passwords, you must employ controls to ensure their...
Maize lethal necrosis (MLN), an emerging threat to maize-based food security in sub-Saharan Africa
USDA-ARS?s Scientific Manuscript database
In sub-Saharan Africa, maize is a staple food and key determinant of food security for smallholder farming communities. Pest and disease outbreaks are key constraints to maize productivity. In September 2011, a serious disease outbreak, later diagnosed as maize lethal necrosis (MLN), was reported on...
Single Logon: balancing security and healthcare productivity.
Sapp, Margaret J; Behrens, Terrence L
2004-01-01
Mayo Single Logon (MSL) has faced the traditional dilemma that is painful to all IT organizations because it forces the tradeoff between user productivity and security. Recent regulatory initiatives, such as HIPAA, have caused the issue of security to take on more importance, forcing organizations to revisit the balance of security and productivity. MSL is a security application that brokers user credentials and facilitates desktop security. The simple design, functionality and stability have allowed MSL to speed up user productivity, keep satisfaction high and help solve many security initiatives.
17 CFR 41.24 - Rule amendments to security futures products.
Code of Federal Regulations, 2010 CFR
2010-04-01
... rule amendment relating to a security futures product if the registered derivatives transaction... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Rule amendments to security futures products. 41.24 Section 41.24 Commodity and Securities Exchanges COMMODITY FUTURES TRADING...
17 CFR 41.23 - Listing of security futures products for trading.
Code of Federal Regulations, 2010 CFR
2010-04-01
... security futures products for trading, a designated contract market or registered derivatives transaction... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Listing of security futures products for trading. 41.23 Section 41.23 Commodity and Securities Exchanges COMMODITY FUTURES TRADING...
Marketing and Selling CD-ROM Products on the World-Wide Web.
ERIC Educational Resources Information Center
Walker, Becki
1995-01-01
Describes three companies' approaches to marketing and selling CD-ROM products on the World Wide Web. Benefits include low overhead for Internet-based sales, allowance for creativity, and ability to let customers preview products online. Discusses advertising, information delivery, content, information services, and security. (AEF)
NASA Astrophysics Data System (ADS)
Recanati, Francesca; Castelletti, Andrea; Melià, Paco; Dotelli, Giovanni
2013-04-01
Food security is a major issue in Palestine for both political and physical reasons, with direct effects on the local population living conditions: the nutritional level of people in Gaza is classified by FAO as "insecure". As most of the protein supply comes from irrigated agricultural production and aquaculture, freshwater availability is a limiting factor to food security, and the primary reason for frequent conflicts among food production processes (e.g. aquaculture, land livestock or different types of crops). In this study we use Life Cycle Analysis to assess the environmental impacts associated to all the stages of water-based protein production (from agriculture and aquaculture) in the Gaza strip under different agricultural scenarios and hydroclimatic variability. As reported in several recent studies, LCA seems to be an appropriate methodology to analyze agricultural systems and assess associated food security in different socio-economic contexts. However, we argue that the inherently linear and static nature of LCA might prove inadequate to tackle with the complex interaction between water cycle variability and the food production system in water-scarce regions of underdeveloped countries. Lack of sufficient and reliable data to characterize the water cycle is a further source of uncertainty affecting the robustness of the analysis. We investigate pros and cons of LCA and LCA-based option planning in an average size farm in Gaza strip, where farming and aquaculture are family-based and integrated by reuse of fish breeding water for irrigation. Different technological solutions (drip irrigation system, greenhouses etc.) are evaluated to improve protein supply and reduce the pressure on freshwater, particularly during droughts. But this use of technology represent also a contribution in increasing sustainability in agricultural processes, and therefore in economy, of Gaza Strip (reduction in chemical fertilizers and pesticides etc.).
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-29
... derivatives transaction execution facility for transactions for future delivery in any commodity under section... categorical Section 4(c) exemption to permit options and futures on shares of all or some precious metal commodity-based ETFs to be traded and cleared as options on securities and security futures, respectively...
NREL: News - New Energy Systems Enhance National Security
resources, bioenergy and bio-based products, zero energy buildings, wind energy, geothermal energy, solar Energy Systems Enhance National Security Washington D.C., March 14, 2002 Experts from the U.S . Department of Energy's National Renewable Energy Laboratory (NREL) have identified key renewable energy
44 CFR 321.4 - Achieving production readiness.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Achieving production readiness. 321.4 Section 321.4 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE...
Future of Assurance: Ensuring that a System is Trustworthy
NASA Astrophysics Data System (ADS)
Sadeghi, Ahmad-Reza; Verbauwhede, Ingrid; Vishik, Claire
Significant efforts are put in defining and implementing strong security measures for all components of the comput-ing environment. It is equally important to be able to evaluate the strength and robustness of these measures and establish trust among the components of the computing environment based on parameters and attributes of these elements and best practices associated with their production and deployment. Today the inventory of techniques used for security assurance and to establish trust -- audit, security-conscious development process, cryptographic components, external evaluation - is somewhat limited. These methods have their indisputable strengths and have contributed significantly to the advancement in the area of security assurance. However, shorter product and tech-nology development cycles and the sheer complexity of modern digital systems and processes have begun to decrease the efficiency of these techniques. Moreover, these approaches and technologies address only some aspects of security assurance and, for the most part, evaluate assurance in a general design rather than an instance of a product. Additionally, various components of the computing environment participating in the same processes enjoy different levels of security assurance, making it difficult to ensure adequate levels of protection end-to-end. Finally, most evaluation methodologies rely on the knowledge and skill of the evaluators, making reliable assessments of trustworthiness of a system even harder to achieve. The paper outlines some issues in security assurance that apply across the board, with the focus on the trustworthiness and authenticity of hardware components and evaluates current approaches to assurance.
[Modern foreign car safety systems and their forensic-medical significance].
Iakunin, S A
2007-01-01
The author gives a characteristic of active and passive security systems installed in cars of foreign production. These security systems significantly modify the classic car trauma character decreasing frequency of occurrence and dimensions of specific and typical injuries. A new approach based on the theory of probability to estimate these injuries is required. The most common active and passive security systems are described in the article; their principles of operation and influence on the trauma character are estimated.
Land-use and alternative bioenergy pathways for waste biomass.
Campbell, J E; Block, E
2010-11-15
Rapid escalation in biofuels consumption may lead to a trade regime that favors exports of food-based biofuels from tropical developing countries to developed countries. There is growing interest in mitigating the land-use impacts of these potential biofuels exports by converting biorefinery waste streams into cellulosic ethanol, potentially reducing the amount of land needed to meet production goals. This increased land-use efficiency for ethanol production may lower the land-use greenhouse gas emissions of ethanol but would come at the expense of converting the wastes into bioelectricity which may offset fossil fuel-based electricity and could provide a vital source of domestic electricity in developing countries. Here we compare these alternative uses of wastes with respect to environmental and energy security outcomes considering a range of electricity production efficiencies, ethanol yields, land-use scenarios, and energy offset assumptions. For a given amount of waste biomass, we found that using bioelectricity production to offset natural gas achieves 58% greater greenhouse gas reductions than using cellulosic ethanol to offset gasoline but similar emissions when cellulosic ethanol is used to offset the need for more sugar cane ethanol. If bioelectricity offsets low-carbon energy sources such as nuclear power then the liquid fuels pathway is preferred. Exports of cellulosic ethanol may have a small impact on the energy security of importing nations while bioelectricity production may have relatively large impacts on the energy security in developing countries.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-29
... other things, clarify the scope of products proposed to be cleared, add new Rule 207(f) prohibiting FCM.... securities laws (i.e., LIFFE futures and options on equity securities) (the ``LIFFE securities products... facility for purposes of trading such products. In addition, only certain LIFFE securities products are...
17 CFR 41.21 - Requirements for underlying securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Requirements for underlying securities. 41.21 Section 41.21 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Requirements and Standards for Listing Security Futures Products § 41.21...
Exploring water and food security: the water footprint of domestic food production in the Gaza Strip
NASA Astrophysics Data System (ADS)
Recanati, Francesca; Castelletti, Andrea; Dotelli, Giovanni; Melià, Paco
2016-04-01
Water scarcity and food security are major issues in the Gaza Strip. This area is characterized by one of the highest densities in the world and it is affected by both severe scarcity of water resources and limited trading possibilities.Given this context, the enhancement of domestic food production is considered a fundamental strategy in achieving food security in the area. For this reason, rural people play a crucial role in implementing sustainable strategies for enhancing the domestic food production while preserving water resources. In order to investigate the effectiveness of existing agricultural scenarios in achieving food security in a sustainable manner, we propose a framework to assess food production systems in terms of their contribution to the nutritional and economic conditions of rural households and their impact on water resources. In particular, the latter has been carried out through the water footprint indicator proposed by the Water Footprint Network. The case study analyzed is a sample farm located in the Gaza Strip, whose food production is based on horticulture, animal husbandry and aquaculture. The study is articulated into two main parts: first, we compare alternative scenarios of vegetal and animal food production in terms of food supply, water consumption and economic income at the household scale; then, we extend the analysis to evaluate the potential contribution of domestic food production to the food security in the whole Gaza Strip, focusing on the nutritional dimension, and providing a preliminary assessment of the environmental and economic sustainability. In particular, we evaluate water appropriation for domestic food production and compare it with the availability of water resources in the region. The outcomes highlight that the domestic food production can potentially satisfy both a basic diet and economic income for rural household, but the related appropriation of freshwater results unsustainable with respect to the fresh water availability in the Gaza Strip.
40 CFR 211.110-2 - National security exemptions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... ABATEMENT PROGRAMS PRODUCT NOISE LABELING General Provisions § 211.110-2 National security exemptions. (a) A new product which is produced to conform with specifications developed by national security agency... security exemption shall be void ab initio with respect to each new product, originally intended for a...
Landscape ecological security assessment based on projection pursuit in Pearl River Delta.
Gao, Yang; Wu, Zhifeng; Lou, Quansheng; Huang, Huamei; Cheng, Jiong; Chen, Zhangli
2012-04-01
Regional landscape ecological security is an important issue for ecological security, and has a great influence on national security and social sustainable development. The Pearl River Delta (PRD) in southern China has experienced rapid economic development and intensive human activities in recent years. This study, based on landscape analysis, provides a method to discover the alteration of character among different landscape types and to understand the landscape ecological security status. Based on remotely sensed products of the Landsat 5 TM images in 1990 and the Landsat 7 ETM+ images in 2005, landscape classification maps of nine cities in the PRD were compiled by implementing Remote Sensing and Geographic Information System technology. Several indices, including aggregation, crush index, landscape shape index, Shannon's diversity index, landscape fragile index, and landscape security adjacent index, were applied to analyze spatial-temporal characteristics of landscape patterns in the PRD. A landscape ecological security index based on these outcomes was calculated by projection pursuit using genetic algorithm. The landscape ecological security of nine cities in the PRD was thus evaluated. The main results of this research are listed as follows: (1) from 1990 to 2005, the aggregation index, crush index, landscape shape index, and Shannon's diversity index of nine cities changed little in the PRD, while the landscape fragile index and landscape security adjacent index changed obviously. The landscape fragile index of nine cities showed a decreasing trend; however, the landscape security adjacent index has been increasing; (2) from 1990 to 2005, landscape ecology of the cities of Zhuhai and Huizhou maintained a good security situation. However, there was a relatively low value of ecological security in the cities of Dongguan and Foshan. Except for Foshan and Guangzhou, whose landscape ecological security situation were slightly improved, the cities had reduced values in landscape ecological security, with the most decreased number 0.52 in Zhaoqing. Results of this study offer important information for regional eco-construction and natural resource exploitation.
17 CFR 240.15b11-1 - Registration by notice of security futures product broker-dealers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... § 240.15b11-1 Registration by notice of security futures product broker-dealers. (a) A broker or dealer... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Registration by notice of security futures product broker-dealers. 240.15b11-1 Section 240.15b11-1 Commodity and Securities Exchanges...
Hybrid breeding in wheat: technologies to improve hybrid wheat seed production.
Whitford, Ryan; Fleury, Delphine; Reif, Jochen C; Garcia, Melissa; Okada, Takashi; Korzun, Viktor; Langridge, Peter
2013-12-01
Global food security demands the development and delivery of new technologies to increase and secure cereal production on finite arable land without increasing water and fertilizer use. There are several options for boosting wheat yields, but most offer only small yield increases. Wheat is an inbred plant, and hybrids hold the potential to deliver a major lift in yield and will open a wide range of new breeding opportunities. A series of technological advances are needed as a base for hybrid wheat programmes. These start with major changes in floral development and architecture to separate the sexes and force outcrossing. Male sterility provides the best method to block self-fertilization, and modifying the flower structure will enhance pollen access. The recent explosion in genomic resources and technologies provides new opportunities to overcome these limitations. This review outlines the problems with existing hybrid wheat breeding systems and explores molecular-based technologies that could improve the hybrid production system to reduce hybrid seed production costs, a prerequisite for a commercial hybrid wheat system.
Ethical management of food systems: plant based diet as a holistic approach.
Chiu, Tina H T; Lin, Chin-Lon
2009-01-01
While improvement in agricultural technology had enabled the production of abundant food, it has thus far failed to eliminate hunger. Malnutrition is expected to reach an all time high. Evidences have suggested that animal based diet has put immense pressure on the already fragile food system, contributing to problems in terms of global food security, health security, and environmental sustainability. Plant based dietary approaches may therefore, target some of these problems from the roots, and may be a solution to improving ethical issues and equity in the current food system. This paper examines how meat production and consumption contributed to the current crises in the food system through the lens of ethics--the moral compass--to find directions on how the present generation should eat, and how the food system could be maintained for a better future.
Qualification of security printing features
NASA Astrophysics Data System (ADS)
Simske, Steven J.; Aronoff, Jason S.; Arnabat, Jordi
2006-02-01
This paper describes the statistical and hardware processes involved in qualifying two related printing features for their deployment in product (e.g. document and package) security. The first is a multi-colored tiling feature that can also be combined with microtext to provide additional forms of security protection. The color information is authenticated automatically with a variety of handheld, desktop and production scanners. The microtext is authenticated either following magnification or manually by a field inspector. The second security feature can also be tile-based. It involves the use of two inks that provide the same visual color, but differ in their transparency to infrared (IR) wavelengths. One of the inks is effectively transparent to IR wavelengths, allowing emitted IR light to pass through. The other ink is effectively opaque to IR wavelengths. These inks allow the printing of a seemingly uniform, or spot, color over a (truly) uniform IR emitting ink layer. The combination converts a uniform covert ink and a spot color to a variable data region capable of encoding identification sequences with high density. Also, it allows the extension of variable data printing for security to ostensibly static printed regions, affording greater security protection while meeting branding and marketing specifications.
Abu Ghraib Dairy, Abu Ghraib, Iraq
2010-01-14
products, especially milk. Traditionally, a young population consumes a large amount of dairy products, such as milk, yogurt , and processed cheese...security situation and electrical capacity in Iraq continue to improve, there will be a further increase in the demand for milk, yogurt , and cheese. Dairy...based products, such as bottled milk, yogurt , cheese, cream, and butter. The State Company for Dairy Products is a holding company with three
Code of Federal Regulations, 2010 CFR
2010-01-01
... product to a security interest, on EFS and master list-format. 205.102 Section 205.102 Animals and Animal... of person subjecting a farm product to a security interest, on EFS and master list—format. On an EFS, and on a master list, the name of the person subjecting a farm product to a security interest must...
Code of Federal Regulations, 2012 CFR
2012-01-01
... product to a security interest, on EFS and master list-format. 205.102 Section 205.102 Animals and Animal... of person subjecting a farm product to a security interest, on EFS and master list—format. On an EFS, and on a master list, the name of the person subjecting a farm product to a security interest must...
Code of Federal Regulations, 2014 CFR
2014-01-01
... product to a security interest, on EFS and master list-format. 205.102 Section 205.102 Animals and Animal... of person subjecting a farm product to a security interest, on EFS and master list—format. On an EFS, and on a master list, the name of the person subjecting a farm product to a security interest must...
Code of Federal Regulations, 2013 CFR
2013-01-01
... product to a security interest, on EFS and master list-format. 205.102 Section 205.102 Animals and Animal... of person subjecting a farm product to a security interest, on EFS and master list—format. On an EFS, and on a master list, the name of the person subjecting a farm product to a security interest must...
Code of Federal Regulations, 2011 CFR
2011-01-01
... product to a security interest, on EFS and master list-format. 205.102 Section 205.102 Animals and Animal... of person subjecting a farm product to a security interest, on EFS and master list—format. On an EFS, and on a master list, the name of the person subjecting a farm product to a security interest must...
Variability of African Farming Systems from Phenological Analysis of NDVI Time Series
NASA Technical Reports Server (NTRS)
Vrieling, Anton; deBeurs, K. M.; Brown, Molly E.
2011-01-01
Food security exists when people have access to sufficient, safe and nutritious food at all times to meet their dietary needs. The natural resource base is one of the many factors affecting food security. Its variability and decline creates problems for local food production. In this study we characterize for sub-Saharan Africa vegetation phenology and assess variability and trends of phenological indicators based on NDVI time series from 1982 to 2006. We focus on cumulated NDVI over the season (cumNDVI) which is a proxy for net primary productivity. Results are aggregated at the level of major farming systems, while determining also spatial variability within farming systems. High temporal variability of cumNDVI occurs in semiarid and subhumid regions. The results show a large area of positive cumNDVI trends between Senegal and South Sudan. These correspond to positive CRU rainfall trends found and relate to recovery after the 1980's droughts. We find significant negative cumNDVI trends near the south-coast of West Africa (Guinea coast) and in Tanzania. For each farming system, causes of change and variability are discussed based on available literature (Appendix A). Although food security comprises more than the local natural resource base, our results can perform an input for food security analysis by identifying zones of high variability or downward trends. Farming systems are found to be a useful level of analysis. Diversity and trends found within farming system boundaries underline that farming systems are dynamic.
Identifiable piezoelectric security system design
NASA Astrophysics Data System (ADS)
Li, Zhenyu; Zhang, Xiaoming
2017-10-01
Directing at the disadvantages of low environmental suitability, inferior anti-interference ability and being easy to be found and destroyed in existing security product, a kind of identifiable piezoelectric security system based on piezoelectric cable is designed. The present system gathers vibration signals of different moving bodies, such as human, vehicles, animals and so on, with piezoelectric cable buried under -ground and distinguishes the different moving bodies through recognition algorithm and thus giving an alarm. As is shown in experiments, the present system has the features of good concealment and high accuracy in distinguishing moving bodies.
Risk assessment of climate systems for national security.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean
2012-10-01
Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.
Cloud Computing Security Issue: Survey
NASA Astrophysics Data System (ADS)
Kamal, Shailza; Kaur, Rajpreet
2011-12-01
Cloud computing is the growing field in IT industry since 2007 proposed by IBM. Another company like Google, Amazon, and Microsoft provides further products to cloud computing. The cloud computing is the internet based computing that shared recourses, information on demand. It provides the services like SaaS, IaaS and PaaS. The services and recourses are shared by virtualization that run multiple operation applications on cloud computing. This discussion gives the survey on the challenges on security issues during cloud computing and describes some standards and protocols that presents how security can be managed.
2008-05-01
other product areas. Where unmet requirements are identified and where S&T is required to meet cost objectives, the CBRN defense homeland security... industrial base, which has scaled down since the end of the Cold War, has stabilized. Ongoing military operations and homeland defense initiatives...as well as shelf-life expirations for stockpiles built in the 1980s, have contributed to demand for industrial base services and products
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Security. 19.966 Section 19.966 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF... and Security § 19.966 Security. Proprietors shall provide security adequate to deter the unauthorized...
32 CFR Appendix A to Part 50 - Life Insurance Products and Securities
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false Life Insurance Products and Securities A... Part 50—Life Insurance Products and Securities A. Life Insurance Product Content Prerequisites... and cost of government subsidized Servicemen's Group Life Insurance. 2. The address and phone number...
32 CFR Appendix A to Part 50 - Life Insurance Products and Securities
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Life Insurance Products and Securities A... Part 50—Life Insurance Products and Securities A. Life Insurance Product Content Prerequisites... and cost of government subsidized Servicemen's Group Life Insurance. 2. The address and phone number...
6 CFR 25.9 - Procedures for certification of approved products for Homeland Security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Procedures for certification of approved products for Homeland Security. (a) Application Procedure. An applicant seeking a Certification of anti-terrorism Technology as an Approved Product for Homeland Security... application for renewal must be made using the “Application for Certification of an Approved Product for...
The uncertainty of crop yield projections is reduced by improved temperature response functions
USDA-ARS?s Scientific Manuscript database
Increasing the accuracy of crop productivity estimates is a key Increasing the accuracy of crop productivity estimates is a key element in planning adaptation strategies to ensure global food security under climate change. Process-based crop models are effective means to project climate impact on cr...
Monitoring Global Food Security with New Remote Sensing Products and Tools
NASA Astrophysics Data System (ADS)
Budde, M. E.; Rowland, J.; Senay, G. B.; Funk, C. C.; Husak, G. J.; Magadzire, T.; Verdin, J. P.
2012-12-01
Global agriculture monitoring is a crucial aspect of monitoring food security in the developing world. The Famine Early Warning Systems Network (FEWS NET) has a long history of using remote sensing and crop modeling to address food security threats in the form of drought, floods, pests, and climate change. In recent years, it has become apparent that FEWS NET requires the ability to apply monitoring and modeling frameworks at a global scale to assess potential impacts of foreign production and markets on food security at regional, national, and local levels. Scientists at the U.S. Geological Survey (USGS) Earth Resources Observation and Science (EROS) Center and the University of California Santa Barbara (UCSB) Climate Hazards Group have provided new and improved data products as well as visualization and analysis tools in support of the increased mandate for remote monitoring. We present our monitoring products for measuring actual evapotranspiration (ETa), normalized difference vegetation index (NDVI) in a near-real-time mode, and satellite-based rainfall estimates and derivatives. USGS FEWS NET has implemented a Simplified Surface Energy Balance (SSEB) model to produce operational ETa anomalies for Africa and Central Asia. During the growing season, ETa anomalies express surplus or deficit crop water use, which is directly related to crop condition and biomass. We present current operational products and provide supporting validation of the SSEB model. The expedited Moderate Resolution Imaging Spectroradiometer (eMODIS) production system provides FEWS NET with an improved NDVI dataset for crop and rangeland monitoring. eMODIS NDVI provides a reliable data stream with a relatively high spatial resolution (250-m) and short latency period (less than 12 hours) which allows for better operational vegetation monitoring. We provide an overview of these data and cite specific applications for crop monitoring. FEWS NET uses satellite rainfall estimates as inputs for monitoring agricultural food production and driving crop water balance models. We present a series of derived rainfall products and provide an update on efforts to improve satellite-based estimates. We also present advancements in monitoring tools, namely, the Early Warning eXplorer (EWX) and interactive rainfall and NDVI time series viewers. The EWX is a data analysis and visualization tool that allows users to rapidly visualize multiple remote sensing datasets and compare standardized anomaly maps and time series. The interactive time series viewers allow users to analyze rainfall and NDVI time series over multiple spatial domains. New and improved data products and more targeted analysis tools are a necessity as food security monitoring requirements expand and resources become limited.
Verifying the secure setup of Unix client/servers and detection of network intrusion
DOE Office of Scientific and Technical Information (OSTI.GOV)
Feingold, R.; Bruestle, H.R.; Bartoletti, T.
1995-07-01
This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today`s global ``Infosphere`` presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to checkmore » on their security configuration. SPI`s broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI`s use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on an Ethernet broadcast Local Area Network segment and produce transcripts of suspicious user connections. NID`s retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.« less
76 FR 27673 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-12
... futures on individual stocks or on narrow-based stock indexes (collectively, ``security futures products....\\2\\ \\1\\ These matters are higher margin levels, fraud or manipulation, recordkeeping, reporting...
1990-08-13
MARKINGS ./ A n’ ., ___ ___,_ _"_ __ ___,_ __’,,___, 2a. SECURITY CLASSIFICATION AUTHORITY"" DISTRIBUTION/AVAILABILITfe OF REPORT . A . UNCLASSIFIED...of thirteen clinical services in a medium sized Army Community Hospital to provider based productivity standards found in the Joint Healthcare...statistically significant margins. The study concludes that the low productivity is due to a lack of guidance and emphasis in the productivity arena
Achieving food security in times of crisis.
Swaminathan, M S
2010-11-30
In spite of several World Food Summits during the past decade, the number of people going to bed hungry is increasing and now exceeds one billion. Food security strategies should therefore be revisited. Food security systems should begin with local communities who can develop and manage community gene, seed, grain and water banks. At the national level, access to balanced diet and clean drinking water should become a basic human right. Implementation of the right to food will involve concurrent attention to production, procurement, preservation and public distribution. Higher production in perpetuity should be achieved through an ever-green revolution based on the principles of conservation and climate-resilient farming. This will call for a blend of traditional ecological prudence with frontier technologies, particularly biotechnology and information communication technologies. Copyright © 2010. Published by Elsevier B.V.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-28
... Products with that of derivative securities products, like ETFs, that are listed on the Exchange. In this regard, the Exchange believes that derivative securities products and Structured Products share certain... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68280; File No. SR-NYSEArca-2012-127] Self...
Gangwar, Amit Kumar; Gupta, Ashish; Kedawat, Garima; Kumar, Pawan; Singh, Bhanu Pratap; Singh, Nidhi; Srivastava, Avanish K; Dhakate, Sanjay R; Gupta, Bipin Kumar
2018-05-23
Increasing counterfeiting of important data, currency, stamp papers, branded products etc., has become a major security threat which could lead to serious damage to the global economy. Consequences of such damage are compelling for researchers to develop new high-end security features to address full-proof solutions. Herein, we report a dual mode flexible highly luminescent white security paper and nanotaggants composed of nanophosphors incorporated in polymer matrix to form a nanofiber-based mat for anti-counterfeiting applications. The dual mode nanofibers are fabricated by electrospinning technique by admixing the composite of NaYF 4 :Eu 3+ @NaYF 4 :Yb 3+ , Er 3+ nanophosphors in the polyvinyl alcohol solution. This flexible polymer mat derived from nanofibers appears white in daylight, while emitting strong red (NaYF 4 :Eu 3+ ) and green (NaYF 4 :Yb 3+ , Er 3+ ) colors at excitation wavelengths of 254 nm and 980 nm, respectively. These luminescent nanofibers can also be encrypted as a new class of nanotaggants to protect confidential documents. These obtained results suggest that highly luminescent dual mode polymeric nanofiber-based flexible white security paper and nanotaggants could offer next-generation high-end unique security features against counterfeiting. © 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.
NASA Astrophysics Data System (ADS)
Cai, X.; Zhang, X.; Zhu, T.
2014-12-01
Global food security is constrained by local and regional land and water availability, as well as other agricultural input limitations and inappropriate national and global regulations. In a theoretical context, this study assumes that optimal water and land uses in local food production to maximize food security and social welfare at the global level can be driven by global trade. It follows the context of "virtual resources trade", i.e., utilizing international trade of agricultural commodities to reduce dependency on local resources, and achieves land and water savings in the world. An optimization model based on the partial equilibrium of agriculture is developed for the analysis, including local commodity production and land and water resources constraints, demand by country, and global food market. Through the model, the marginal values (MVs) of social welfare for water and land at the level of so-called food production units (i.e., sub-basins with similar agricultural production conditions) are derived and mapped in the world. In this personation, we will introduce the model structure, explain the meaning of MVs at the local level and their distribution around the world, and discuss the policy implications for global communities to enhance global food security. In particular, we will examine the economic values of water and land under different world targets of food security (e.g., number of malnourished population or children in a future year). In addition, we will also discuss the opportunities on data to improve such global modeling exercises.
Space-Derived Phenology, Retrieval and Use for Drought and Food Security Monitoring
NASA Astrophysics Data System (ADS)
Meroni, M.; Kayitakire, F.; Rembold, F.; Urbano, F.; Schucknecht, A.; LEO, O.
2014-12-01
Monitoring vegetation conditions is a critical activity for assessing food security in Africa. Rural populations relying on rain-fed agriculture and livestock grazing are highly exposed to large seasonal and inter-annual fluctuations in water availability. Monitoring the state, evolution, and productivity of vegetation, crops and pastures in particular, is important to conduct food emergency responses and plan for a long-term, resilient, development strategy in this area. The timing of onset, the duration, and the intensity of vegetation growth can be retrieved from space observations and used for food security monitoring to assess seasonal vegetation development and forecast the likely seasonal outcome when the season is ongoing. In this contribution we present a set of phenology-based remote sensing studies in support to food security analysis. Key phenological indicators are retrieved using a model-fit approach applied to SOPT-VEGETATION FAPAR time series. Remote-sensing phenology is first used to estimate i) the impact of the drought in the Horn of Africa, ii) crop yield in Tunisia and, iii) rangeland biomass production in Niger. Then the impact of the start and length of vegetation growing period on the total biomass production is assessed over the Sahel. Finally, a probabilistic approach using phenological information to forecast the occurrence of an end-of-season biomass production deficit is applied over the Sahel to map hot-spots of drought-related risk.
Reforestation strategies amid social instability: lessons from Afghanistan.
Groninger, John W
2012-04-01
Foreign and domestic government agencies and other international organizations pursue reforestation programs in rural upper watershed areas of Afghanistan over the past decade to alleviate poverty, combat the insurgency and rehabilitate a depleted forest resource base. Popular programs incorporate cash-for-work to conduct hillside terracing, check dam construction and tree-planting for nut production, fuel wood, timber, dune stabilization, and erosion abatement. Programmatic approaches have varied as a function of accessibility, security and local objectives. Uncertain land tenure and use rights, weak local environmental management capacity, and a focus on agricultural production to meet immediate needs limit interest, nationally and locally. Unreliable security, a lack of high quality tree planting stock, limited technical knowledge and coordination among government agencies, and poor security hamper program expansion. Reforestation success would be most likely where these issues are least acute. The Afghan government should focus on supporting community based natural resource management, developing and disseminating improved conservation tree nursery strategies, and promoting watershed management schemes that incorporate forestry, range management and agronomic production. Reforestation practitioners could benefit from the human and material resources now present as part of the international war effort. Successes and failures encountered in Afghanistan should be considered in order to address similar problems in insecure regions elsewhere when reforestation may help reverse environmental degradation and contribute to broader social stabilization efforts.
Reforestation Strategies Amid Social Instability: Lessons from Afghanistan
NASA Astrophysics Data System (ADS)
Groninger, John W.
2012-04-01
Foreign and domestic government agencies and other international organizations pursue reforestation programs in rural upper watershed areas of Afghanistan over the past decade to alleviate poverty, combat the insurgency and rehabilitate a depleted forest resource base. Popular programs incorporate cash-for-work to conduct hillside terracing, check dam construction and tree-planting for nut production, fuel wood, timber, dune stabilization, and erosion abatement. Programmatic approaches have varied as a function of accessibility, security and local objectives. Uncertain land tenure and use rights, weak local environmental management capacity, and a focus on agricultural production to meet immediate needs limit interest, nationally and locally. Unreliable security, a lack of high quality tree planting stock, limited technical knowledge and coordination among government agencies, and poor security hamper program expansion. Reforestation success would be most likely where these issues are least acute. The Afghan government should focus on supporting community based natural resource management, developing and disseminating improved conservation tree nursery strategies, and promoting watershed management schemes that incorporate forestry, range management and agronomic production. Reforestation practitioners could benefit from the human and material resources now present as part of the international war effort. Successes and failures encountered in Afghanistan should be considered in order to address similar problems in insecure regions elsewhere when reforestation may help reverse environmental degradation and contribute to broader social stabilization efforts.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-10
... Derivative Securities Products, weight of component stocks of an index or portfolio, averaging minimum... ``Derivative Securities Products'' from Rule 5705(b)(3)(A)(i) a., b., and c. for U.S. Indexes or portfolios.... ``Derivative Securities Products'' include the following types of products: ETFs consisting of PDRs and IFSs...
Turning Access into a web-enabled secure information system for clinical trials.
Dongquan Chen; Chen, Wei-Bang; Soong, Mayhue; Soong, Seng-Jaw; Orthner, Helmuth F
2009-08-01
Organizations that have limited resources need to conduct clinical studies in a cost-effective, but secure way. Clinical data residing in various individual databases need to be easily accessed and secured. Although widely available, digital certification, encryption, and secure web server, have not been implemented as widely, partly due to a lack of understanding of needs and concerns over issues such as cost and difficulty in implementation. The objective of this study was to test the possibility of centralizing various databases and to demonstrate ways of offering an alternative to a large-scale comprehensive and costly commercial product, especially for simple phase I and II trials, with reasonable convenience and security. We report a working procedure to transform and develop a standalone Access database into a secure Web-based secure information system. For data collection and reporting purposes, we centralized several individual databases; developed, and tested a web-based secure server using self-issued digital certificates. The system lacks audit trails. The cost of development and maintenance may hinder its wide application. The clinical trial databases scattered in various departments of an institution could be centralized into a web-enabled secure information system. The limitations such as the lack of a calendar and audit trail can be partially addressed with additional programming. The centralized Web system may provide an alternative to a comprehensive clinical trial management system.
Structural Acoustic Physics Based Modeling of Curved Composite Shells
2017-09-19
Results show that the finite element computational models accurately match analytical calculations, and that the composite material studied in this...products. 15. SUBJECT TERMS Finite Element Analysis, Structural Acoustics, Fiber-Reinforced Composites, Physics-Based Modeling 16. SECURITY...2 4 FINITE ELEMENT MODEL DESCRIPTION
Study on the early warning mechanism for the security of blast furnace hearths
NASA Astrophysics Data System (ADS)
Zhao, Hong-bo; Huo, Shou-feng; Cheng, Shu-sen
2013-04-01
The campaign life of blast furnace (BF) hearths has become the limiting factor for safety and high efficiency production of modern BFs. However, the early warning mechanism of hearth security has not been clear. In this article, based on heat transfer calculations, heat flux and erosion monitoring, the features of heat flux and erosion were analyzed and compared among different types of hearths. The primary detecting elements, mathematical models, evaluating standards, and warning methods were discussed. A novel early warning mechanism with the three-level quantificational standards was proposed for BF hearth security.
NASA Technical Reports Server (NTRS)
1993-01-01
C Language Integration Production System (CLIPS), a NASA-developed expert systems program, has enabled a security systems manufacturer to design a new generation of hardware. C.CURESystem 1 Plus, manufactured by Software House, is a software based system that is used with a variety of access control hardware at installations around the world. Users can manage large amounts of information, solve unique security problems and control entry and time scheduling. CLIPS acts as an information management tool when accessed by C.CURESystem 1 Plus. It asks questions about the hardware and when given the answer, recommends possible quick solutions by non-expert persons.
Life-Cycle Assessment of a Distributed-Scale Thermochemical Bioenergy Conversion System
Hongmei Gu; Richard Bergman
2016-01-01
Expanding bioenergy production from woody biomass has the potential to decrease net greenhouse gas (GHG) emissions and improve the energy security of the United States. Science-based and internationally accepted life-cycle assessment (LCA) is an effective tool for policy makers to make scientifically informed decisions on expanding renewable energy production from...
2005-05-01
form of weapons cleaning products and wastes. State of Florida and Air Force regulations have been implemented 05/31/05 Final Environmental Assessment...Forces Complex will generate hazardous materials in the form of weapons cleaning products and wastes. Break-Free CLP Liquid is a cleaner, lubricant
Life-Cycle Inventory Analysis of Bioproducts from a Modular Advanced Biomass Pyrolysis System
Richard Bergman; Hongmei Gu
2014-01-01
Expanding bioenergy production has the potential to reduce net greenhouse gas (GHG) emissions and improve energy security. Science-based assessments of new bioenergy technologies are essential tools for policy makers dealing with expanding renewable energy production. Using life cycle inventory (LCI) analysis, this study evaluated a 200-kWe...
Design and research on the platform of network manufacture product electronic trading
NASA Astrophysics Data System (ADS)
Zhou, Zude; Liu, Quan; Jiang, Xuemei
2003-09-01
With the rapid globalization of market and business, E-trading affects every manufacture enterprise. However, the security of network manufacturing products of transmission on Internet is very important. In this paper we discussed the protocol of fair exchange and platform for network manufacture products E-trading based on fair exchange protocol and digital watermarking techniques. The platform realized reliable and copyright protection.
Moseley, William G.; Carney, Judith; Becker, Laurence
2010-01-01
This study examines the impact of two decades of neoliberal policy reform on food production and household livelihood security in three West African countries. The rice sectors in The Gambia, Côte d’Ivoire, and Mali are scrutinized as well as cotton and its relationship to sorghum production in Mali. Although market reforms were intended to improve food production, the net result was an increasing reliance on imported rice. The vulnerability of the urban populations in The Gambia and Côte d’Ivoire became especially clear during the 2007–2008 global food crisis when world prices for rice spiked. Urban Mali was spared the worst of this crisis because the country produces more of its own rice and the poorest consumers shifted from rice to sorghum, a grain whose production increased steeply as cotton production collapsed. The findings are based on household and market surveys as well as on an analysis of national level production data. PMID:20339079
Quantum cascade lasers for defense and security
NASA Astrophysics Data System (ADS)
Day, Timothy; Pushkarsky, Michael; Caffey, Dave; Cecchetti, Kristen; Arp, Ron; Whitmore, Alex; Henson, Michael; Takeuchi, Eric B.
2013-10-01
Quantum cascade laser (QCL) systems are mature and at the vanguard of a new generation of products that support military applications such as Infrared Countermeasures (IRCM) and targeting. The demanding product requirements for aircraft platforms that include reduced size, weight, power consumption and cost (SWaP-C) extends to portable, battery powered handheld products. QCL technology operates throughout the mid-wave (MWIR) and long-wave (LWIR) infrared to provide new capabilities that leverage existing thermal imaging cameras. In addition to their suitability for aircraft platforms, QCL products are a natural fit to meet operator demands for small, lightweight pointer and beacon capabilities. Field-testing of high power, lightweight, battery operated devices has demonstrated their utility across a range of air and ground applications. This talk will present an overview of QCL technology and the Defense and Security products and capabilities that are enabled by it. This talk will also provide an overview of the extensive environmental and performance testing associated with products based on QCL technology.
Moseley, William G; Carney, Judith; Becker, Laurence
2010-03-30
This study examines the impact of two decades of neoliberal policy reform on food production and household livelihood security in three West African countries. The rice sectors in The Gambia, Côte d'Ivoire, and Mali are scrutinized as well as cotton and its relationship to sorghum production in Mali. Although market reforms were intended to improve food production, the net result was an increasing reliance on imported rice. The vulnerability of the urban populations in The Gambia and Côte d'Ivoire became especially clear during the 2007-2008 global food crisis when world prices for rice spiked. Urban Mali was spared the worst of this crisis because the country produces more of its own rice and the poorest consumers shifted from rice to sorghum, a grain whose production increased steeply as cotton production collapsed. The findings are based on household and market surveys as well as on an analysis of national level production data.
Luminus: a paper-based optical deterrent to counterfeiting
NASA Astrophysics Data System (ADS)
Nayar, Raman; Butchart, Nancy; Doutre, Denis
1998-04-01
The 'LuminusR' that you see in the title of this paper is a registered trade mark of a security paper product which has patent protection to date in six countries, including the United States. Further patent applications are in progress in over forty other countries. The essential characteristic of LuminusR Paper is that it contains a coloured image that is substantially undetectable when viewed in reflected light but becomes apparent when viewed through transmitted light. The stronger the light source, the more pronounced the image becomes. The purpose of this paper is to explain the technical aspects of the product and to explain, in effect, why it is a patentable, completely new technology for protection against counterfeiting. First, it must be explained that the inventors set out to develop a paper that, in conjunction with the surface print on a document, could not be reproduced by the normal means open to a counterfeiter: especially colour photocopying and Offset printing. During the time that Domtar proceeded to bring the concept to the stage of a commercial product, three other advantages became apparent: (1) Durability in use as proven by lab results and a 'live' circulation trial. (2) Design flexibility: giving a third 'side' to the paper that can receive a design. (3) Processing ability in existing equipment including printing presses and cash handling machinery. I am going to concentrate, however, on the anti-counterfeiting aspects of LuminusR Security Paper as security is the theme of this conference. In this respect, I will cover the following subject areas: (1) Make-up of the product, including production methods; (2) Security elements that can be incorporated to deter counterfeiting; (3) Health and safety aspects; (4) Testing against counterfeiting and simulation; (5) Cost-benefit of the product. I am also going to concentrate on one end-use, bank notes, although LuminusR paper has been tested through use in other security documents, in particular travel documents such as passports and visas.
75 FR 22168 - Global Medical Products Holdings, Inc., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-27
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Global Medical Products Holdings, Inc., Order of Suspension of Trading April 23, 2010. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Global Medical Products...
40 CFR 204.5-2 - National security exemptions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... exemptions. (a) A new product which is produced to conform with specifications developed by a national security agency, and so labeled or marked on the outside of the container and on the product itself, shall... national security exemption shall be void ab initio with respect to each new product, originally intended...
78 FR 18377 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-26
...) permits a self-regulatory organization (``SRO'') to list and trade a new derivative securities product... Commission to maintain an accurate record of all new derivative securities products traded on the SROs, Rule... begins trading a new derivative securities product that is not required to be submitted as a proposed...
NASA Astrophysics Data System (ADS)
Rangga, K. K.; Syarief, Y. A.
2018-03-01
The objectives of this study are to study the participation of paddy farmers in the Special Effort program to increase paddy production, to study the level of household food security of paddy farmers, and to analyze the correlation between farmer participation and food security level of paddy farmers. The location was chosen purposively in Seputih Raman sub-district. The data were collected from December 2016 to February 2017. The population of this study was paddy farmers who participating in Special Effort program. The hypothesis was tested by using Spearman’s Rank correlation test. Farmer household’s food security was measured objectively based on the share of household’s food expenditure and subjectively based on the opinion, views, and attitudes or farmers’ opinions on food availability, food distribution, and household food consumption. This research showed that farmers’ participation in Special Effort program in Seputih Raman Sub Ditrict, Central Lampung Regency belonged to medium classification, household food security either objectively or subjectively was in food resistant condition of medium classification, and there was significant correlation between farmers’ participation and food security level of paddy farmer household.
NASA Astrophysics Data System (ADS)
Giannini, A.; Krishnamurthy, P. K.; Cousin, R.; Choularton, R. J.
2011-12-01
We present results based on an analysis of a 2005 livelihood survey of ~2000 rural households in ~200 villages scattered across Mali, a sparsely populated, large land-locked country in West Africa, to elucidate the role of climate variability and change in shaping availability and access dimensions of food security. The Comprehensive Food Security Vulnerability Analysis is a recurrent survey carried out by the World Food Programme and in-country partners to map out nutritional and socio-economic status during normal (~food secure) conditions in the hope of understanding underlying cause(s) and prevent the next food security crisis. We set the spatial characterization of food security that emerges from the CFSVA against the background of a varying climate, on intra-seasonal, interannual and multi-decadal time scales: through elucidation of the influence of climate on agricultural production we arrive at an interpretation of structural and conjunctural events affecting food security. We conclude with a discussion of possible interventions to reduce vulnerability.
Lu, Yonglong; Jenkins, Alan; Ferrier, Robert C; Bailey, Mark; Gordon, Iain J; Song, Shuai; Huang, Jikun; Jia, Shaofeng; Zhang, Fusuo; Liu, Xuejun; Feng, Zhaozhong; Zhang, Zhibin
2015-02-01
China's increasingly urbanized and wealthy population is driving a growing and changing demand for food, which might not be met without significant increase in agricultural productivity and sustainable use of natural resources. Given the past relationship between lack of access to affordable food and political instability, food security has to be given a high priority on national political agendas in the context of globalization. The drive for increased food production has had a significant impact on the environment, and the deterioration in ecosystem quality due to historic and current levels of pollution will potentially compromise the food production system in China. We discuss the grand challenges of not only producing more food but also producing it sustainably and without environmental degradation. In addressing these challenges, food production should be considered as part of an environmental system (soil, air, water, and biodiversity) and not independent from it. It is imperative that new ways of meeting the demand for food are developed while safeguarding the natural resources upon which food production is based. We present a holistic approach to both science and policy to ensure future food security while embracing the ambition of achieving environmental sustainability in China. It is a unique opportunity for China to be a role model as a new global player, especially for other emerging economies.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-19
... and Annual Fee Applicable to Derivative Securities Products January 12, 2010. On November 24, 2009... Services (``Fee Schedule'') to revise the listing and annual fees applicable to Derivative Securities... Schedule, the term ``Derivative Securities Products'' includes securities described in NYSE Arca Equities...
Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks
Pinto, Mónica; Gámez, Nadia; Fuentes, Lidia; Amor, Mercedes; Horcas, José Miguel; Ayala, Inmaculada
2015-01-01
Providing security and privacy to wireless sensor nodes (WSNs) is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs) allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies) and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs). We evaluate our approach using a case study from the intelligent transportation system domain. PMID:25746093
Food security and sustainability: can one exist without the other?
Berry, Elliot M; Dernini, Sandro; Burlingame, Barbara; Meybeck, Alexandre; Conforti, Piero
2015-09-01
To position the concept of sustainability within the context of food security. An overview of the interrelationships between food security and sustainability based on a non-systematic literature review and informed discussions based principally on a quasi-historical approach from meetings and reports. International and global food security and nutrition. The Rome Declaration on World Food Security in 1996 defined its three basic dimensions as: availability, accessibility and utilization, with a focus on nutritional well-being. It also stressed the importance of sustainable management of natural resources and the elimination of unsustainable patterns of food consumption and production. In 2009, at the World Summit on Food Security, the concept of stability/vulnerability was added as the short-term time indicator of the ability of food systems to withstand shocks, whether natural or man-made, as part of the Five Rome Principles for Sustainable Global Food Security. More recently, intergovernmental processes have emphasized the importance of sustainability to preserve the environment, natural resources and agro-ecosystems (and thus the overlying social system), as well as the importance of food security as part of sustainability and vice versa. Sustainability should be considered as part of the long-term time dimension in the assessment of food security. From such a perspective the concept of sustainable diets can play a key role as a goal and a way of maintaining nutritional well-being and health, while ensuring the sustainability for future food security. Without integrating sustainability as an explicit (fifth?) dimension of food security, today's policies and programmes could become the very cause of increased food insecurity in the future.
Factors affecting food security and contribution of modern technologies in food sustainability.
Premanandh, Jagadeesan
2011-12-01
The concept of food insecurity is complex and goes beyond the simplistic idea of a country's inability to feed its population. The global food situation is redefined by many driving forces such as population growth, availability of arable lands, water resources, climate change and food availability, accessibility and loss. The combined effect of these factors has undeniably impacted global food production and security. This article reviews the key factors influencing global food insecurity and emphasises the need to adapt science-based technological innovations to address the issue. Although anticipated benefits of modern technologies suggest a level of food production that will sustain the global population, both political will and sufficient investments in modern agriculture are needed to alleviate the food crisis in developing countries. In this globalised era of the 21st century, many determinants of food security are trans-boundary and require multilateral agreements and actions for an effective solution. Food security and hunger alleviation on a global scale are within reach provided that technological innovations are accepted and implemented at all levels. Copyright © 2011 Society of Chemical Industry.
17 CFR 41.27 - Prohibition of dual trading in security futures products by floor brokers.
Code of Federal Regulations, 2011 CFR
2011-04-01
... predetermined algorithm, a transaction for the same security futures product on the same designated contract... place advantage or the ability to override a predetermined algorithm must submit an appropriate rule... predetermined algorithm from trading a security futures product for accounts in which these same participants...
17 CFR 41.27 - Prohibition of dual trading in security futures products by floor brokers.
Code of Federal Regulations, 2012 CFR
2012-04-01
... predetermined algorithm, a transaction for the same security futures product on the same designated contract... place advantage or the ability to override a predetermined algorithm must submit an appropriate rule... predetermined algorithm from trading a security futures product for accounts in which these same participants...
17 CFR 41.27 - Prohibition of dual trading in security futures products by floor brokers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... predetermined algorithm, a transaction for the same security futures product on the same designated contract... place advantage or the ability to override a predetermined algorithm must submit an appropriate rule... predetermined algorithm from trading a security futures product for accounts in which these same participants...
78 FR 29162 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-17
... list and trade a new derivative securities product without submitting a proposed rule change pursuant... derivative securities products traded on the SROs, Rule 19b-4(e) requires an SRO to file a summary form, Form 19b- 4(e), to notify the Commission when the SRO begins trading a new derivative securities product...
76 FR 24848 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-03
...: USDA Web Based Supply Chain Management System (WBSCMs). OMB Control Number: 0581--NEW. Summary of... using the secure Web Based Supply Chain Management System (WBSCM). Vendors must be registered, and have... assists AMS with making a determination whether a business is viable and capable of supplying product to...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-04
... financial products such as securities index options, index futures, and options on index futures to be... futures, options on S&P 500 futures or any other instrument that tracks the performance of or is based on... 24.4.05(A). These definitions would allow financial products such as ETF options, index futures...
Power Converters Secure Electronics in Harsh Environments
NASA Technical Reports Server (NTRS)
2013-01-01
In order to harden power converters for the rigors of space, NASA awarded multiple SBIR contracts to Blacksburg, Virginia-based VPT Inc. The resulting hybrid DC-DC converters have proven valuable in aerospace applications, and as a result the company has generated millions in revenue from the product line and created four high-tech jobs to handle production.
NASA Astrophysics Data System (ADS)
Murti, Sigit Heru
2017-10-01
Food security is one of the most important issue for Indonesia. The huge population number and high population growing rate has made the food security a critical issue. This paper describe the application of remote sensing data to (1) map agroecosystem zones in Bantul District, Special Region of Yogyakarta, Indonesia in 2012 and (2) analyze the food security in the study area based on the resulting agro-ecosystem map. Bantul District is selected as the pilot area because this area is among the highest food crop production area in the Province. ALOS AVNIR-2 image accquired on 15 June 2010 was integrated with Indonesian Surface map (RBI map), soil types map, and slope steepness map. Population statistics data was also used to calculate the food needs. Field survey was conducted to obtain the crop field productivity information on each agro-ecosystem zone and assess the accuracy of the model. This research indicates that (1) Bantul District can be divided into three agroecosystem zones, where each zone has unique topograhic configuration and soil types composition, and (2) Bantul Distict is categorized as food secure area since the rice production in 2012 managed to cover the food needs of the people with the surplus of 33,208.6 tonnes of rice. However, when the analysis was conducted at sub-district level, there are four subdistrict with food insecurity where the food needs surpass the rice production. These sub-district are Kasihan Sub-district (-5,598.4 t), Banguntapan Sub-district (-2,483.4 t), Pajangan Sub-district (-1,039.6 t) and Dlingo Sub-district (-798.7 t).
Code of Federal Regulations, 2010 CFR
2010-04-01
... and trading of new derivative securities products by self-regulatory organizations that are not deemed... Forms for Self-Regulatory Organization Rule Changes and Forms for Registration of and Reporting by... listing and trading of new derivative securities products by self-regulatory organizations that are not...
Code of Federal Regulations, 2014 CFR
2014-04-01
... and trading of new derivative securities products by self-regulatory organizations that are not deemed... Forms for Self-Regulatory Organization Rule Changes and Forms for Registration of and Reporting by... listing and trading of new derivative securities products by self-regulatory organizations that are not...
Code of Federal Regulations, 2013 CFR
2013-04-01
... and trading of new derivative securities products by self-regulatory organizations that are not deemed... Forms for Self-Regulatory Organization Rule Changes and Forms for Registration of and Reporting by... listing and trading of new derivative securities products by self-regulatory organizations that are not...
Code of Federal Regulations, 2012 CFR
2012-04-01
... and trading of new derivative securities products by self-regulatory organizations that are not deemed... Forms for Self-Regulatory Organization Rule Changes and Forms for Registration of and Reporting by... listing and trading of new derivative securities products by self-regulatory organizations that are not...
Code of Federal Regulations, 2011 CFR
2011-04-01
... and trading of new derivative securities products by self-regulatory organizations that are not deemed... Forms for Self-Regulatory Organization Rule Changes and Forms for Registration of and Reporting by... listing and trading of new derivative securities products by self-regulatory organizations that are not...
27 CFR 41.120 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Products § 41.120 Deposit of securities in lieu of corporate surety. In lieu of corporate surety, the... 27 Alcohol, Tobacco Products and Firearms 2 2014-04-01 2014-04-01 false Deposit of securities in lieu of corporate surety. 41.120 Section 41.120 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 41.120 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Products § 41.120 Deposit of securities in lieu of corporate surety. In lieu of corporate surety, the... 27 Alcohol, Tobacco Products and Firearms 2 2011-04-01 2011-04-01 false Deposit of securities in lieu of corporate surety. 41.120 Section 41.120 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 41.120 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Products § 41.120 Deposit of securities in lieu of corporate surety. In lieu of corporate surety, the... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Deposit of securities in lieu of corporate surety. 41.120 Section 41.120 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 41.120 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Products § 41.120 Deposit of securities in lieu of corporate surety. In lieu of corporate surety, the... 27 Alcohol, Tobacco Products and Firearms 2 2012-04-01 2011-04-01 true Deposit of securities in lieu of corporate surety. 41.120 Section 41.120 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 41.120 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Products § 41.120 Deposit of securities in lieu of corporate surety. In lieu of corporate surety, the... 27 Alcohol, Tobacco Products and Firearms 2 2013-04-01 2013-04-01 false Deposit of securities in lieu of corporate surety. 41.120 Section 41.120 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
NASA Astrophysics Data System (ADS)
Wada, Y.; Luan, Y.; Fischer, G.; Sun, L.; Shi, P.
2015-12-01
Forcing with the population growth and consequently increasing food requirement, food security in sub-Saharan Africa is one of the most emergent and challenging issues. The purposes of this work are 1) what's the future food requirement and their food security status in each sub-Saharan African countries? What is the distance from current and future food security status, corresponding to the food requirement, to the targeted food security status? 2) To what extent Sub-Saharan countries could meet their present and future food requirement, and whether they have potential to improve their food insecurity status on currently cultivated land? 3) Whether or, if there have, how the pressures on land resources from meeting the food requirements? To figure those questions out, we firstly use socio-economic pathways datasets, and historical food diet pattern classification to forecast the 2010-2050 food commodity and feed calories demand per country. A new food security indicator, which considered the influences of both the food energy and quality intake, was used to evaluate the food insecurity status and the distances to different targeted statuses of the specific country. The latest Global Agro-Ecological Zones (GAEZ) databases were used to estimate the current and future crop yield gap and crop potential production. For current to future scenario analysis, we considered population growth, dietary change, climate change, agricultural input level, and target food security status. Then the balance of food requirement with the current and potential crop production was analyzed for different scenarios. Land requirements were calculated for meeting those food requirements, and the pressures on land resources are evaluated. Our works are hoping to provide scientific-based evidences for policy recommendations for local government to tackle food insecurity problems in Sub-Saharan Africa.
Promoting Productive Urban Green Open Space Towards Food Security: Case Study Taman Sari, Bandung
NASA Astrophysics Data System (ADS)
Ridwan, M.; Sinatra, Fran; Natalivan, Petrus
2017-10-01
The common trend of urban population has been growing significantly in Indonesia for decades, are affected by urban green space conversion. Generally, this area is utilized for urban infrastructures and residences. Furthermore, urban area has grown uncontrollably that could enhance the phenomenon of urban sprawl. The conversion of green urban area and agricultural area will significantly decrease urban food security and quality of urban environment. This problem becomes a serious issue for urban sustainability. Bandung is a city with dense population where there are many poor inhabitants. Families living in poverty are subjected to food insecurity caused by the rise of food prices. Based on the urgency of urban food security and urban environment quality the local government has to achieve comprehensive solutions. This research aims to formulate the policy of productive green open space towards food security for poor people in Bandung. This research not only examines the role played by productive green open space to supply food for the urban poor but also how to govern urban areas sustainably and ensure food security. This research uses descriptive explanatory methodology that describes and explains how to generate policy and strategic planning for edible landscape to promote urban food security. Taman Sari is the location of this research, this area is a populous area that has amount of poor people and has a quite worse quality of urban environment. This study shows that urban green open space has the potential to be utilized as an urban farming land, which poor inhabitants could be main actors to manage urban agriculture to provide their food. Meanwhile, local government could contribute to subsidize the financial of urban farming activities.
17 CFR 41.22 - Required certifications.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Section 41.22 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Requirements and Standards for Listing Security Futures Products § 41.22 Required certifications. It shall be unlawful for a designated contract market or registered derivatives transaction execution...
Mitchell, Claudia; Chege, Fatuma; Maina, Lucy; Rothman, Margot
2016-01-01
This article studies the ways in which researchers working in the area of health and social research and using participatory visual methods might extend the reach of participant-generated creations such as photos and drawings to engage community leaders and policy-makers. Framed as going 'beyond engagement', the article explores the idea of the production of researcher-led digital dialogue tools, focusing on one example, based on a series of visual arts-based workshops with children from eight slums in Nairobi addressing issues of safety, security, and well-being in relation to housing. The authors conclude that there is a need for researchers to embark upon the use of visual tools to expand the life and use of visual productions, and in particular to ensure meaningful participation of communities in social change.
Chemical supply chain modeling for analysis of homeland security events
Ehlen, Mark A.; Sun, Amy C.; Pepple, Mark A.; ...
2013-09-06
The potential impacts of man-made and natural disasters on chemical plants, complexes, and supply chains are of great importance to homeland security. To be able to estimate these impacts, we developed an agent-based chemical supply chain model that includes: chemical plants with enterprise operations such as purchasing, production scheduling, and inventories; merchant chemical markets, and multi-modal chemical shipments. Large-scale simulations of chemical-plant activities and supply chain interactions, running on desktop computers, are used to estimate the scope and duration of disruptive-event impacts, and overall system resilience, based on the extent to which individual chemical plants can adjust their internal operationsmore » (e.g., production mixes and levels) versus their external interactions (market sales and purchases, and transportation routes and modes). As a result, to illustrate how the model estimates the impacts of a hurricane disruption, a simple example model centered on 1,4-butanediol is presented.« less
[Discussion on agricultural product quality and safety problem from ecological view].
Xiao, Ming; Dong, Nan; Lyu, Xin
2015-08-01
There are many different perspectives about the sustainable agriculture, which had been proposed since the last three decades in the world. While China's ecologists and agronomists proposed a similar concept named 'ecological agriculture'. Although ecological agriculture in China has achieved substantial progress, including theory, models and supporting technologies nearly several decades of practice and development, its application guidance still is not yet clear. The organic agriculture model proposed by European Union is popular, but it is limited in the beneficiary groups and the social and ecological responsibility. In this context, the article based on an ecological point of view, analyzed the shortcomings of ecological imbalance caused by a single mode of agricultural production and the negative impact on the quality of agricultural products, and discussed the core values of ecological agriculture. On this basis, we put forward the concept of sustainable security of agricultural products. Based on this concept, an agricultural platform was established under the healthy ecosysphere environment, and from this agricultural platform, agricultural products could be safely and sustainably obtained. Around the central value of the concept, we designed the agricultural sustainable and security production model. Finally, we compared the responsibility, benefiting groups, agronomic practices selection and other aspects of sustainable agriculture with organic agriculture, and proved the advancement of sustainable agricultural model in agricultural production quality and safety.
NASA Astrophysics Data System (ADS)
Bermeo, A.; Couturier, S.
2017-01-01
Because of its renewed importance in international agendas, food security in sub-tropical countries has been the object of studies at different scales, although the spatial components of food security are still largely undocumented. Among other aspects, food security can be assessed using a food selfsufficiency index. We propose a spatial representation of this assessment in the densely populated rural area of the Huasteca Poblana, Mexico, where there is a known tendency towards the loss of selfsufficiency of basic grains. The main agricultural systems in this area are the traditional milpa (a multicrop practice with maize as the main basic crop) system, coffee plantations and grazing land for bovine livestock. We estimate a potential additional milpa - based maize production by smallholders identifying the presence of extensive coffee and pasture systems in the production data of the agricultural census. The surface of extensive coffee plantations and pasture land were estimated using the detailed coffee agricultural census data, and a decision tree combining unsupervised and supervised spectral classification techniques of medium scale (Landsat) satellite imagery. We find that 30% of the territory would benefit more than 50% increment in food security and 13% could theoretically become maize self-sufficient from the conversion of extensive systems to the traditional multicrop milpa system.
Water security for productive economies: Applying an assessment framework in southern Africa
NASA Astrophysics Data System (ADS)
Holmatov, Bunyod; Lautze, Jonathan; Manthrithilake, Herath; Makin, Ian
2017-08-01
Achieving water security has emerged as a major objective in Africa, yet an analytical or diagnostic framework for assessing water security in African countries is not known to exist. This paper applies one key dimension of the 2016 Asian Development Bank's (ADB) Asian Water Development Outlook (AWDO) to assess levels of water security for productive economies in countries of the Southern African Development Community (SADC). Economic aspects of water security cover four areas: economic activities in the broad sense, agriculture, electricity, and industry. Water security in each area is measured through application of a set of indicators; results of indicator application are then aggregated to determine economic water security at a country-level. Results show that economic water security in SADC is greatest in the Seychelles and South Africa, and lowest in Madagascar and Malawi. Opportunities for strengthening economic water security in the majority of SADC countries exist through improving agricultural water productivity, strengthening resilience, and expanding sustainable electricity generation. More profoundly, this paper suggests that there is clear potential and utility in applying approaches used elsewhere to assess economic water security in southern Africa.
Global climate policy impacts on livestock, land use, livelihoods, and food security.
Golub, Alla A; Henderson, Benjamin B; Hertel, Thomas W; Gerber, Pierre J; Rose, Steven K; Sohngen, Brent
2013-12-24
Recent research has shed light on the cost-effective contribution that agriculture can make to global greenhouse gas abatement; however, the resulting impacts on agricultural production, producer livelihoods, and food security remain largely unexplored. This paper provides an integrated assessment of the linkages between land-based climate policies, development, and food security, with a particular emphasis on abatement opportunities and impacts in the livestock sector. Targeting Annex I countries and exempting non-Annex I countries from land-based carbon policies on equity or food security grounds may result in significant leakage rates for livestock production and agriculture as a whole. We find that such leakage can be eliminated by supplying forest carbon sequestration incentives to non-Annex I countries. Furthermore, substantial additional global agricultural abatement can be attained by extending a greenhouse gas emissions tax to non-Annex I agricultural producers, while compensating them for their additional tax expenses. Because of their relatively large emissions intensities and limited abatement possibilities, ruminant meat producers face the greatest market adjustments to land-based climate policies. We also evaluate the impacts of climate policies on livelihoods and food consumption in developing countries. In the absence of non-Annex I abatement policies, these impacts are modest. However, strong income and food consumption impacts surface because of higher food costs after forest carbon sequestration is promoted at a global scale. Food consumption among unskilled labor households falls but rises for the representative farm households, because global agricultural supplies are restricted and farm prices rise sharply in the face of inelastic food demands.
Global climate policy impacts on livestock, land use, livelihoods, and food security
Golub, Alla A.; Henderson, Benjamin B.; Hertel, Thomas W.; Gerber, Pierre J.; Rose, Steven K.; Sohngen, Brent
2013-01-01
Recent research has shed light on the cost-effective contribution that agriculture can make to global greenhouse gas abatement; however, the resulting impacts on agricultural production, producer livelihoods, and food security remain largely unexplored. This paper provides an integrated assessment of the linkages between land-based climate policies, development, and food security, with a particular emphasis on abatement opportunities and impacts in the livestock sector. Targeting Annex I countries and exempting non-Annex I countries from land-based carbon policies on equity or food security grounds may result in significant leakage rates for livestock production and agriculture as a whole. We find that such leakage can be eliminated by supplying forest carbon sequestration incentives to non-Annex I countries. Furthermore, substantial additional global agricultural abatement can be attained by extending a greenhouse gas emissions tax to non-Annex I agricultural producers, while compensating them for their additional tax expenses. Because of their relatively large emissions intensities and limited abatement possibilities, ruminant meat producers face the greatest market adjustments to land-based climate policies. We also evaluate the impacts of climate policies on livelihoods and food consumption in developing countries. In the absence of non-Annex I abatement policies, these impacts are modest. However, strong income and food consumption impacts surface because of higher food costs after forest carbon sequestration is promoted at a global scale. Food consumption among unskilled labor households falls but rises for the representative farm households, because global agricultural supplies are restricted and farm prices rise sharply in the face of inelastic food demands. PMID:23019587
A feedback-based secure path approach for wireless sensor network data collection.
Mao, Yuxin; Wei, Guiyi
2010-01-01
The unattended nature of wireless sensor networks makes them very vulnerable to malicious attacks. Therefore, how to preserve secure data collection is an important issue to wireless sensor networks. In this paper, we propose a novel approach of secure data collection for wireless sensor networks. We explore secret sharing and multipath routing to achieve secure data collection in wireless sensor network with compromised nodes. We present a novel tracing-feedback mechanism, which makes full use of the routing functionality of wireless sensor networks, to improve the quality of data collection. The major advantage of the approach is that the secure paths are constructed as a by-product of data collection. The process of secure routing causes little overhead to the sensor nodes in the network. Compared with existing works, the algorithms of the proposed approach are easy to implement and execute in resource-constrained wireless sensor networks. According to the result of a simulation experiment, the performance of the approach is better than the recent approaches with a similar purpose.
ERIC Educational Resources Information Center
Turner, Sean Gregory
2013-01-01
This study examines a multimodal arts-based inquiry that took place within a secure detention center. The inquiry was inclusive of design, rehearsal, and production activities that culminated into a final theatre production. The methods for this study included pulling from multiple disciplines to develop multiple perspectives towards the data as…
78 FR 26406 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-06
..., Copies Available From: Securities and Exchange Commission, Office of Investor Education and Advocacy... trade security futures products to establish listing standards that, among other things, require that... which the security futures product trades has in place procedures to coordinate trading halts with the...
Water availability and management for food security
USDA-ARS?s Scientific Manuscript database
Food security is directly linked to water security for food production. Water availability for crop production will be dependent upon precipitation or irrigation, soil water holding capacity, and crop water demand. The linkages among these components in rainfed agricultural systems shows the impact ...
75 FR 4883 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-29
... self-regulatory organization (``SRO'') to immediately list and trade a new derivative securities..., in order for the Commission to maintain an accurate record of all new derivative securities products... Commission, within five business days after the commencement of trading a new derivative securities product...
Lu, Yonglong; Jenkins, Alan; Ferrier, Robert C.; Bailey, Mark; Gordon, Iain J.; Song, Shuai; Huang, Jikun; Jia, Shaofeng; Zhang, Fusuo; Liu, Xuejun; Feng, Zhaozhong; Zhang, Zhibin
2015-01-01
China’s increasingly urbanized and wealthy population is driving a growing and changing demand for food, which might not be met without significant increase in agricultural productivity and sustainable use of natural resources. Given the past relationship between lack of access to affordable food and political instability, food security has to be given a high priority on national political agendas in the context of globalization. The drive for increased food production has had a significant impact on the environment, and the deterioration in ecosystem quality due to historic and current levels of pollution will potentially compromise the food production system in China. We discuss the grand challenges of not only producing more food but also producing it sustainably and without environmental degradation. In addressing these challenges, food production should be considered as part of an environmental system (soil, air, water, and biodiversity) and not independent from it. It is imperative that new ways of meeting the demand for food are developed while safeguarding the natural resources upon which food production is based. We present a holistic approach to both science and policy to ensure future food security while embracing the ambition of achieving environmental sustainability in China. It is a unique opportunity for China to be a role model as a new global player, especially for other emerging economies. PMID:26601127
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-08
... DEPARTMENT OF JUSTICE Antitrust Division Notice Pursuant to the National Cooperative Research and Production Act of 1993--Secure Content Storage Association, LLC Notice is hereby given that, on May 3, 2012, pursuant to Section 6(a) of the National Cooperative Research and Production Act of 1993, 15 U.S.C. 4301 et seq. (``the Act''), the Secure...
JPRS Report, Soviet Union: Political Affairs
1988-03-22
or to secure high profits. The decisions that are made frequently differ from one another, heated debates ensue, and, as we know, the truth emerges... securely attached to production. An analysis conducted among workers in Frunze who were discharged showed that they were usually young people between...no improvement in contract discipline, the necessary growth rates of labor productivity and improvement in product quality are not secured , the
17 CFR 41.32 - Continuing obligations.
Code of Federal Regulations, 2014 CFR
2014-04-01
... the Securities and Exchange Commission or with a futures association registered under section 17 of... board of trade lists a security futures product for trading; (iii) Provide the Commission with any new rules or rule amendments that relate to the trading of security futures products, including both...
75 FR 16528 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-01
... self-regulatory organization (``SRO'') to immediately list and trade a new derivative securities..., in order for the Commission to maintain an accurate record of all new derivative securities products... Commission, within five business days after the commencement of trading a new derivative securities product...
A Security Monitoring Framework For Virtualization Based HEP Infrastructures
NASA Astrophysics Data System (ADS)
Gomez Ramirez, A.; Martinez Pedreira, M.; Grigoras, C.; Betev, L.; Lara, C.; Kebschull, U.;
2017-10-01
High Energy Physics (HEP) distributed computing infrastructures require automatic tools to monitor, analyze and react to potential security incidents. These tools should collect and inspect data such as resource consumption, logs and sequence of system calls for detecting anomalies that indicate the presence of a malicious agent. They should also be able to perform automated reactions to attacks without administrator intervention. We describe a novel framework that accomplishes these requirements, with a proof of concept implementation for the ALICE experiment at CERN. We show how we achieve a fully virtualized environment that improves the security by isolating services and Jobs without a significant performance impact. We also describe a collected dataset for Machine Learning based Intrusion Prevention and Detection Systems on Grid computing. This dataset is composed of resource consumption measurements (such as CPU, RAM and network traffic), logfiles from operating system services, and system call data collected from production Jobs running in an ALICE Grid test site and a big set of malware samples. This malware set was collected from security research sites. Based on this dataset, we will proceed to develop Machine Learning algorithms able to detect malicious Jobs.
Livestock and food security: vulnerability to population growth and climate change
Godber, Olivia F; Wall, Richard
2014-01-01
Livestock production is an important contributor to sustainable food security for many nations, particularly in low-income areas and marginal habitats that are unsuitable for crop production. Animal products account for approximately one-third of global human protein consumption. Here, a range of indicators, derived from FAOSTAT and World Bank statistics, are used to model the relative vulnerability of nations at the global scale to predicted climate and population changes, which are likely to impact on their use of grazing livestock for food. Vulnerability analysis has been widely used in global change science to predict impacts on food security and famine. It is a tool that is useful to inform policy decision making and direct the targeting of interventions. The model developed shows that nations within sub-Saharan Africa, particularly in the Sahel region, and some Asian nations are likely to be the most vulnerable. Livestock-based food security is already compromised in many areas on these continents and suffers constraints from current climate in addition to the lack of economic and technical support allowing mitigation of predicted climate change impacts. Governance is shown to be a highly influential factor and, paradoxically, it is suggested that current self-sufficiency may increase future potential vulnerability because trade networks are poorly developed. This may be relieved through freer trade of food products, which is also associated with improved governance. Policy decisions, support and interventions will need to be targeted at the most vulnerable nations, but given the strong influence of governance, to be effective, any implementation will require considerable care in the management of underlying structural reform. PMID:24692268
Climate Change and Food Safety: Beyond Production
NASA Astrophysics Data System (ADS)
Ziska, L. H.; Crimmins, A. R.
2016-12-01
There is merited interest in determining the extent of climate disruption on agricultural production and food security. However, additional aspects of food security, including food safety, nutrition and distribution have, overall, received less attention. Beginning in 2013, the U.S. Global Change Research Program as part of the ongoing National Climate Assessment, began a directed effort to evaluate the vulnerability of climate change to these under-represented aspects of food security for developed countries. Based on this extensive review of current science, several key findings were developed: (a) Climate change, including rising temperatures and changes in weather extremes, is expected to increase the exposure of food to certain pathogens and toxins; (b) Climate change will increase human exposure to chemical contaminants in food through several pathways; (c) The nutritional value of agriculturally important food crops, including cereals, will decrease in response to the ongoing increase in atmospheric carbon dioxide; (d) Increases in the frequency or intensity of extreme weather events associated with climate change may disrupt food distribution. These findings will be presented as a means to describe the state of the science and expand on food security research in the broader context of public health and climate change.
44 CFR 331.4 - Special consideration.
Code of Federal Regulations, 2010 CFR
2010-10-01
... HOMELAND SECURITY PREPAREDNESS PRESERVATION OF THE MOBILIZATION BASE THROUGH THE PLACEMENT OF PROCUREMENT... sells a significant proportion of its production to the Government is generally depressed or has a... hearing of interested parties, will give consideration to appropriate measures applicable to the entire...
ERIC Educational Resources Information Center
College Planning & Management, 1999
1999-01-01
Presents administrator's views on possible trends in college and universities. Addresses: hazardous waste disposal; privatization of custodial services; libraries and technology; building product purchases based on life-cycle cost; continuing education for employees; armed campus security; fees and tuition collection via online transactions; and…
A Security Architecture for Grid-enabling OGC Web Services
NASA Astrophysics Data System (ADS)
Angelini, Valerio; Petronzio, Luca
2010-05-01
In the proposed presentation we describe an architectural solution for enabling a secure access to Grids and possibly other large scale on-demand processing infrastructures through OGC (Open Geospatial Consortium) Web Services (OWS). This work has been carried out in the context of the security thread of the G-OWS Working Group. G-OWS (gLite enablement of OGC Web Services) is an international open initiative started in 2008 by the European CYCLOPS , GENESI-DR, and DORII Project Consortia in order to collect/coordinate experiences in the enablement of OWS's on top of the gLite Grid middleware. G-OWS investigates the problem of the development of Spatial Data and Information Infrastructures (SDI and SII) based on the Grid/Cloud capacity in order to enable Earth Science applications and tools. Concerning security issues, the integration of OWS compliant infrastructures and gLite Grids needs to address relevant challenges, due to their respective design principles. In fact OWS's are part of a Web based architecture that demands security aspects to other specifications, whereas the gLite middleware implements the Grid paradigm with a strong security model (the gLite Grid Security Infrastructure: GSI). In our work we propose a Security Architectural Framework allowing the seamless use of Grid-enabled OGC Web Services through the federation of existing security systems (mostly web based) with the gLite GSI. This is made possible mediating between different security realms, whose mutual trust is established in advance during the deployment of the system itself. Our architecture is composed of three different security tiers: the user's security system, a specific G-OWS security system, and the gLite Grid Security Infrastructure. Applying the separation-of-concerns principle, each of these tiers is responsible for controlling the access to a well-defined resource set, respectively: the user's organization resources, the geospatial resources and services, and the Grid resources. While the gLite middleware is tied to a consolidated security approach based on X.509 certificates, our system is able to support different kinds of user's security infrastructures. Our central component, the G-OWS Security Framework, is based on the OASIS WS-Trust specifications and on the OGC GeoRM architectural framework. This allows to satisfy advanced requirements such as the enforcement of specific geospatial policies and complex secure web service chained requests. The typical use case is represented by a scientist belonging to a given organization who issues a request to a G-OWS Grid-enabled Web Service. The system initially asks the user to authenticate to his/her organization's security system and, after verification of the user's security credentials, it translates the user's digital identity into a G-OWS identity. This identity is linked to a set of attributes describing the user's access rights to the G-OWS services and resources. Inside the G-OWS Security system, access restrictions are applied making use of the enhanced Geospatial capabilities specified by the OGC GeoXACML. If the required action needs to make use of the Grid environment the system checks if the user is entitled to access a Grid infrastructure. In that case his/her identity is translated to a temporary Grid security token using the Short Lived Credential Services (IGTF Standard). In our case, for the specific gLite Grid infrastructure, some information (VOMS Attributes) is plugged into the Grid Security Token to grant the access to the user's Virtual Organization Grid resources. The resulting token is used to submit the request to the Grid and also by the various gLite middleware elements to verify the user's grants. Basing on the presented framework, the G-OWS Security Working Group developed a prototype, enabling the execution of OGC Web Services on the EGEE Production Grid through the federation with a Shibboleth based security infrastructure. Future plans aim to integrate other Web authentication services such as OpenID, Kerberos and WS-Federation.
Bialas, Andrzej
2010-01-01
The paper discusses the security issues of intelligent sensors that are able to measure and process data and communicate with other information technology (IT) devices or systems. Such sensors are often used in high risk applications. To improve their robustness, the sensor systems should be developed in a restricted way to provide them with assurance. One of assurance creation methodologies is Common Criteria (ISO/IEC 15408), used for IT products and systems. The contribution of the paper is a Common Criteria compliant and pattern-based method for the intelligent sensors security development. The paper concisely presents this method and its evaluation for the sensor detecting methane in a mine, focusing on the security problem of the intelligent sensor definition and solution. The aim of the validation is to evaluate and improve the introduced method.
Endpoint Security Using Biometric Authentication for Secure Remote Mission Operations
NASA Technical Reports Server (NTRS)
Donohue, John T.; Critchfield, Anna R.
2000-01-01
We propose a flexible security authentication solution for the spacecraft end-user, which will allow the user to interact over Internet with the spacecraft, its instruments, or with the ground segment from anywhere, anytime based on the user's pre-defined set of privileges. This package includes biometrics authentication products, such as face, voice or fingerprint recognition, authentication services and procedures, such as: user registration and verification over the Internet and user database maintenance, with a configurable schema of spacecraft users' privileges. This fast and reliable user authentication mechanism will become an integral part of end-to-end ground-to-space secure Internet communications and migration from current practice to the future. All modules and services of the proposed package are commercially available and built to the NIST BioAPI standard, which facilitates "pluggability" and interoperability.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-10
... capabilities, components thereof, and products containing the same. The complaint names Apple Inc. of Cupertino..., Components Thereof, and Products Containing the Same; Receipt of Complaint; Solicitation of Comments Relating... Certain Devices with Secure Communication Capabilities, Components Thereof, and Products Containing the...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Security. 18.19 Section 18.19 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE... Provisions Document Requirements § 18.19 Security. The concentrate plant and equipment will be so constructed...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2013-04-01 2013-04-01 false Security. 18.19 Section 18.19 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE... Provisions Document Requirements § 18.19 Security. The concentrate plant and equipment will be so constructed...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2014-04-01 2014-04-01 false Security. 18.19 Section 18.19 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE... Provisions Document Requirements § 18.19 Security. The concentrate plant and equipment will be so constructed...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2012-04-01 2012-04-01 false Security. 18.19 Section 18.19 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE... Provisions Document Requirements § 18.19 Security. The concentrate plant and equipment will be so constructed...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2011-04-01 2011-04-01 false Security. 18.19 Section 18.19 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE... Provisions Document Requirements § 18.19 Security. The concentrate plant and equipment will be so constructed...
Advanced uncooled infrared system electronics
NASA Astrophysics Data System (ADS)
Neal, Henry W.
1998-07-01
Over the past two decades, Raytheon Systems Company (RSC), formerly Texas Instruments Defense Systems & Electronics Group, developed a robust family of products based on a low- cost, hybrid ferroelectric (FE) uncooled focal-plane array (FPA) aimed at meeting the needs for thermal imaging products across both military and commercial markets. Over the years, RSC supplied uncooled infrared (IR) sensors for applications such as in combat vehicles, man-portable weaponry, personnel helmets, and installation security. Also, various commercial IR systems for use in automobiles, boats, law enforcement, hand-held applications, building/site security, and fire fighting have been developed. These products resulted in a high degree of success where cooled IR platforms are too bulky and costly, and other uncooled implementations are less reliable or lack significant cost advantage. Proof of this great success is found in the large price reductions, the unprecedented monthly production rates, and the wide diversity of products and customers realized in recent years. The ever- changing needs of these existing and potential customers continue to fuel the advancement of both the primary technologies and the production capabilities of uncooled IR systems at RSC. This paper will describe a development project intended to further advance the system electronics capabilities of future uncooled IR products.
Natural Gas Based Electricity Production and Low Carbon Technology Options
Concerns regarding air quality, global climate change, and the national energy security impacts of the intensive use of fossil fuels and their environmental impacts in the power generation sector have raised interest in alternative low carbon electricity generation technology and...
Urban Household Characteristics and Dietary Diversity: An Analysis of Food Security in Accra, Ghana.
Codjoe, Samuel Nii Ardey; Okutu, David; Abu, Mumuni
2016-06-01
The world's population is increasingly becoming urbanized. If the current urban growth rate is to continue, new and unprecedented challenges for food security will be inevitable. Dietary diversity has been used to ascertain food security status albeit at the multicountry and country levels. Thus, household-level studies in urban settings, particularly in sub-Sahara African, are few. Yet, it is imperative that assessments of food security are undertaken particularly in urban settings, due to the projected fast rate of urbanization and the challenges of attaining food security. To examine household characteristics and dietary diversity. The study uses data from 452 households from the second round of the Regional Institute for Population Studies (RIPS) EDULINK urban poverty and health study. Bivariate and multivariate analyses are undertaken. Mean dietary diversity for all households is 6.8. Vegetables have the highest diversity, followed by cereal-based and grain products. Household characteristics that have statistically significant associations with dietary diversity include sex and level of education of household head, household wealth quintile, and source of food. There is high dietary diversity in the study communities of Accra but low consumption of foods rich in micronutrient, such as fruits and milk/dairy products. The study brings to fore issues related to resource-disadvantaged entities of the urban system, namely, females, poor households, and the non-educated who have food insecurity problems. © The Author(s) 2016.
2012-11-01
All countries face challenges in making sufficient supplies of blood and blood products available and sustainable, while also ensuring the quality and safety of these products in the face of known and emerging threats to public health. Since 1975, the World Health Assembly (WHA) has highlighted the global need for blood safety and availability. WHA resolutions 63·12, 58·13 and 28·72, The Melbourne Declaration on 100% Voluntary Non-Remunerated Donation of Blood and Blood Components and WHO Global Blood Safety Network recommendations have reaffirmed the achievement of 'Self-sufficiency in blood and blood products based on voluntary non-remunerated blood donation (VNRBD)' as the important national policy direction for ensuring a safe, secure and sufficient supply of blood and blood products, including labile blood components and plasma-derived medicinal products. Despite some successes, self-sufficiency is not yet a reality in many countries. A consultation of experts, convened by the World Health Organization (WHO) in September 2011 in Geneva, Switzerland, addressed the urgent need to establish strategies and mechanisms for achieving self-sufficiency. Information on the current situation, and country perspectives and experiences were shared. Factors influencing the global implementation of self-sufficiency, including safety, ethics, security and sustainability of supply, trade and its potential impact on public health, availability and access for patients, were analysed to define strategies and mechanisms and provide practical guidance on achieving self-sufficiency. Experts developed a consensus statement outlining the rationale and definition of self-sufficiency in safe blood and blood products based on VNRBD and made recommendations to national health authorities and WHO. © 2012 World Health Organization. Vox Sanguinis © 2012 International Society of Blood Transfusion.
Agrawal, Ganesh Kumar; Sarkar, Abhijit; Righetti, Pier Giorgio; Pedreschi, Romina; Carpentier, Sebastien; Wang, Tai; Barkla, Bronwyn J; Kohli, Ajay; Ndimba, Bongani Kaiser; Bykova, Natalia V; Rampitsch, Christof; Zolla, Lello; Rafudeen, Mohamed Suhail; Cramer, Rainer; Bindschedler, Laurence Veronique; Tsakirpaloglou, Nikolaos; Ndimba, Roya Janeen; Farrant, Jill M; Renaut, Jenny; Job, Dominique; Kikuchi, Shoshi; Rakwal, Randeep
2013-01-01
Tremendous progress in plant proteomics driven by mass spectrometry (MS) techniques has been made since 2000 when few proteomics reports were published and plant proteomics was in its infancy. These achievements include the refinement of existing techniques and the search for new techniques to address food security, safety, and health issues. It is projected that in 2050, the world's population will reach 9-12 billion people demanding a food production increase of 34-70% (FAO, 2009) from today's food production. Provision of food in a sustainable and environmentally committed manner for such a demand without threatening natural resources, requires that agricultural production increases significantly and that postharvest handling and food manufacturing systems become more efficient requiring lower energy expenditure, a decrease in postharvest losses, less waste generation and food with longer shelf life. There is also a need to look for alternative protein sources to animal based (i.e., plant based) to be able to fulfill the increase in protein demands by 2050. Thus, plant biology has a critical role to play as a science capable of addressing such challenges. In this review, we discuss proteomics especially MS, as a platform, being utilized in plant biology research for the past 10 years having the potential to expedite the process of understanding plant biology for human benefits. The increasing application of proteomics technologies in food security, analysis, and safety is emphasized in this review. But, we are aware that no unique approach/technology is capable to address the global food issues. Proteomics-generated information/resources must be integrated and correlated with other omics-based approaches, information, and conventional programs to ensure sufficient food and resources for human development now and in the future. © 2013 Wiley Periodicals, Inc.
17 CFR 240.3a51-1 - Definition of “penny stock”.
Code of Federal Regulations, 2010 CFR
2010-04-01
...), including hybrid products and derivative securities products, the national securities exchange or registered... Company Act of 1940; (c) That is a put or call option issued by the Options Clearing Corporation; (d... that are not warrants, options, rights, or similar securities must be five dollars or more, as...
27 CFR 40.132 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2012 CFR
2012-04-01
....132 Deposit of securities in lieu of corporate surety. In lieu of corporate surety the manufacturer of... 27 Alcohol, Tobacco Products and Firearms 2 2012-04-01 2011-04-01 true Deposit of securities in lieu of corporate surety. 40.132 Section 40.132 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 46.12 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2011 CFR
2011-04-01
... securities in lieu of corporate surety. In lieu of corporate surety, the principal may pledge and deposit... 27 Alcohol, Tobacco Products and Firearms 2 2011-04-01 2011-04-01 false Deposit of securities in lieu of corporate surety. 46.12 Section 46.12 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 40.132 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2011 CFR
2011-04-01
....132 Deposit of securities in lieu of corporate surety. In lieu of corporate surety the manufacturer of... 27 Alcohol, Tobacco Products and Firearms 2 2011-04-01 2011-04-01 false Deposit of securities in lieu of corporate surety. 40.132 Section 40.132 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 40.403 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Qualification Requirements for Manufacturers § 40.403 Deposit of securities in lieu of corporate surety. In lieu... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Deposit of securities in lieu of corporate surety. 40.403 Section 40.403 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 40.132 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2010 CFR
2010-04-01
....132 Deposit of securities in lieu of corporate surety. In lieu of corporate surety the manufacturer of... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Deposit of securities in lieu of corporate surety. 40.132 Section 40.132 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 46.12 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2014 CFR
2014-04-01
... securities in lieu of corporate surety. In lieu of corporate surety, the principal may pledge and deposit... 27 Alcohol, Tobacco Products and Firearms 2 2014-04-01 2014-04-01 false Deposit of securities in lieu of corporate surety. 46.12 Section 46.12 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 40.403 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Qualification Requirements for Manufacturers § 40.403 Deposit of securities in lieu of corporate surety. In lieu... 27 Alcohol, Tobacco Products and Firearms 2 2011-04-01 2011-04-01 false Deposit of securities in lieu of corporate surety. 40.403 Section 40.403 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 46.12 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2013 CFR
2013-04-01
... securities in lieu of corporate surety. In lieu of corporate surety, the principal may pledge and deposit... 27 Alcohol, Tobacco Products and Firearms 2 2013-04-01 2013-04-01 false Deposit of securities in lieu of corporate surety. 46.12 Section 46.12 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 46.12 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2012 CFR
2012-04-01
... securities in lieu of corporate surety. In lieu of corporate surety, the principal may pledge and deposit... 27 Alcohol, Tobacco Products and Firearms 2 2012-04-01 2011-04-01 true Deposit of securities in lieu of corporate surety. 46.12 Section 46.12 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 40.132 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2013 CFR
2013-04-01
....132 Deposit of securities in lieu of corporate surety. In lieu of corporate surety the manufacturer of... 27 Alcohol, Tobacco Products and Firearms 2 2013-04-01 2013-04-01 false Deposit of securities in lieu of corporate surety. 40.132 Section 40.132 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 40.403 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Qualification Requirements for Manufacturers § 40.403 Deposit of securities in lieu of corporate surety. In lieu... 27 Alcohol, Tobacco Products and Firearms 2 2012-04-01 2011-04-01 true Deposit of securities in lieu of corporate surety. 40.403 Section 40.403 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 46.12 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2010 CFR
2010-04-01
... securities in lieu of corporate surety. In lieu of corporate surety, the principal may pledge and deposit... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Deposit of securities in lieu of corporate surety. 46.12 Section 46.12 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 40.132 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2014 CFR
2014-04-01
....132 Deposit of securities in lieu of corporate surety. In lieu of corporate surety the manufacturer of... 27 Alcohol, Tobacco Products and Firearms 2 2014-04-01 2014-04-01 false Deposit of securities in lieu of corporate surety. 40.132 Section 40.132 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 40.403 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Qualification Requirements for Manufacturers § 40.403 Deposit of securities in lieu of corporate surety. In lieu... 27 Alcohol, Tobacco Products and Firearms 2 2013-04-01 2013-04-01 false Deposit of securities in lieu of corporate surety. 40.403 Section 40.403 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 40.403 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Qualification Requirements for Manufacturers § 40.403 Deposit of securities in lieu of corporate surety. In lieu... 27 Alcohol, Tobacco Products and Firearms 2 2014-04-01 2014-04-01 false Deposit of securities in lieu of corporate surety. 40.403 Section 40.403 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-08
... eliminate references in Sections E.1 and E.8 to ``Derivative Securities Products'' (``DSPs'') and ``Non-Derivative Securities Products'' (``Non-DSPs'') and to eliminate references in Section E.1 to ``Regular... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69903; File No. SR-CHX-2013-12] Self-Regulatory...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Security plan. 37.41 Section 37.41 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Security at DMVs and Driver's License and Identification Card Production Facilities § 37.41...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Security plan. 37.41 Section 37.41 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Security at DMVs and Driver's License and Identification Card Production Facilities § 37.41...
A Feedback-Based Secure Path Approach for Wireless Sensor Network Data Collection
Mao, Yuxin; Wei, Guiyi
2010-01-01
The unattended nature of wireless sensor networks makes them very vulnerable to malicious attacks. Therefore, how to preserve secure data collection is an important issue to wireless sensor networks. In this paper, we propose a novel approach of secure data collection for wireless sensor networks. We explore secret sharing and multipath routing to achieve secure data collection in wireless sensor network with compromised nodes. We present a novel tracing-feedback mechanism, which makes full use of the routing functionality of wireless sensor networks, to improve the quality of data collection. The major advantage of the approach is that the secure paths are constructed as a by-product of data collection. The process of secure routing causes little overhead to the sensor nodes in the network. Compared with existing works, the algorithms of the proposed approach are easy to implement and execute in resource-constrained wireless sensor networks. According to the result of a simulation experiment, the performance of the approach is better than the recent approaches with a similar purpose. PMID:22163424
An RFID-based luggage and passenger tracking system for airport security control applications
NASA Astrophysics Data System (ADS)
Vastianos, George E.; Kyriazanos, Dimitris M.; Kountouriotis, Vassilios I.; Thomopoulos, Stelios C. A.
2014-06-01
Market analysis studies of recent years have shown a steady and significant increase in the usage of RFID technology. Key factors for this growth were the decreased costs of passive RFIDs and their improved performance compared to the other identification technologies. Besides the benefits of RFID technologies into the supply chains, warehousing, traditional inventory and asset management applications, RFID has proven itself worth exploiting on experimental, as well as on commercial level in other sectors, such as healthcare, transport and security. In security sector, airport security is one of the biggest challenges. Airports are extremely busy public places and thus prime targets for terrorism, with aircraft, passengers, crew and airport infrastructure all subject to terrorist attacks. Inside this labyrinth of security challenges, the long range detection capability of the UHF passive RFID technology can be turned into a very important tracking tool that may outperform all the limitations of the barcode tracking inside the current airport security control chain. The Integrated Systems Lab of NCSR Demokritos has developed an RFID based Luggage and Passenger tracking system within the TASS (FP7-SEC-2010-241905) EU research project. This paper describes application scenarios of the system categorized according to the structured nature of the environment, the system architecture and presents evaluation results extracted from measurements with a group of different massive production GEN2 UHF RFID tags that are widely available in the world market.
Department of Defense Chemical and Biological Defense Program. Annual Report to Congress
2008-05-01
defense system acquisition costs through collaboration in the areas of development, production , and support, and to enhance interoperability with...security area leverages S&T efforts of the other product areas. Where unmet requirements are identified and where S&T is required to meet cost ...Defense Program Inventory Requirements The industrial base, which has scaled down since the end of the Cold War, has stabilized. Ongoing military
Delormier, Treena; Horn-Miller, Kahente; McComber, Alex M; Marquis, Kaylia
2017-11-01
Indigenous Peoples are reclaiming their food security, nutrition, and well-being by revitalizing food systems, livelihoods, knowledge-systems, and governance. Our food security research is guided by sustainable self-determination that focuses on restoring Indigenous cultural responsibilities and relationships to land, each other, and the natural world (Corntassel, 2008). Our Kanien'kehá:ka (Mohawk) research team from Kahnawà:ke, in Quebec, Canada, examines food insecurity experiences in our community to explore ways of upholding our Haudenosaunee responsibilities and enhancing local food security. We collaboratively designed the study and interviewed Kahnawakehró:non (people from the Kahnawake community) with traditional knowledge, extensive community experience, and interests in food and culture. Interviews were audio-recorded, transcribed, and analysed by the team. Analysis characterized food insecurity experiences and conditions that challenge and enable food security with attention to traditional food systems, relationships to land, and gender-related responsibilities. Findings show that communal responsibilities generate resilient strategies that provide for all in times of crisis, and long-term food insecurity is managed through social programs, organized charities, and family support. Enhancing food security involves healing and protecting a limited land-base for food production, integrating food production with community priorities for education, training, health, economic development, and scientific innovation. Nurturing spiritual connections with tionhnhéhkwen (life sustaining foods), the natural world, and each other calls for accelerated teaching and practicing our original instructions. Challenges in developing food security leadership, balancing capitalism and subsistence economies, and strengthening social relationships are rooted in the historical colonial and current settler-colonial context that disrupts all aspects of Kanien'kehá:ka society. © 2018 John Wiley & Sons Ltd.
NASA Astrophysics Data System (ADS)
Graham, Christopher J.
2012-05-01
Success in the future battle space is increasingly dependent on rapid access to the right information. Faced with a shrinking budget, the Government has a mandate to improve intelligence productivity, quality, and reliability. To achieve increased ISR effectiveness, leverage of tactical edge mobile devices via integration with strategic cloud-based infrastructure is the single, most likely candidate area for dramatic near-term impact. This paper discusses security, collaboration, and usability components of this evolving space. These three paramount tenets outlined below, embody how mission information is exchanged securely, efficiently, with social media cooperativeness. Tenet 1: Complete security, privacy, and data integrity, must be ensured within the net-centric battle space. This paper discusses data security on a mobile device, data at rest on a cloud-based system, authorization and access control, and securing data transport between entities. Tenet 2: Lack of collaborative information sharing and content reliability jeopardizes mission objectives and limits the end user capability. This paper discusses cooperative pairing of mobile devices and cloud systems, enabling social media style interaction via tagging, meta-data refinement, and sharing of pertinent data. Tenet 3: Fielded mobile solutions must address usability and complexity. Simplicity is a powerful paradigm on mobile platforms, where complex applications are not utilized, and simple, yet powerful, applications flourish. This paper discusses strategies for ensuring mobile applications are streamlined and usable at the tactical edge through focused features sets, leveraging the power of the back-end cloud, minimization of differing HMI concepts, and directed end-user feedback.teInput=
Social Security Contribution to Productivity and Wages in Labour Organization Perspective
NASA Astrophysics Data System (ADS)
Supriadi, Y. N.
2017-03-01
This research is investigating the discrepancy fulfilment of the right to social security and decent wages to increase labour productivity in the perspective of labour organizations, in which the company provides social security, and wages have not been able to meet the needs of workers, on the other hand, the workers are always required to increase productivity. Therefore, this study aims to identify the social security and wages that affect labour productivity. So this research will provide input to the company to undertake effective measures and efficient for the company’s sustainability. This research was conducted using a survey method approach and quantitative data analysis techniques that are causal comparative sample of 223 respondents from 504 study population includes all labour organization’s District and municipal in Banten Province. The results showed the significant influence of social security and wages to increase labour productivity. Therefore, companies are required to act strategically in maintaining prohibitionists labour through re-design of the work environment, increase workers’ participation, intervention, and satisfy the needs of workers whose impact will be realized understanding between workers and companies in maintaining the company’s business.
Creation of hybrid optoelectronic systems for document identification
NASA Astrophysics Data System (ADS)
Muravsky, Leonid I.; Voronyak, Taras I.; Kulynych, Yaroslav P.; Maksymenko, Olexander P.; Pogan, Ignat Y.
2001-06-01
Use of security devices based on a joint transform correlator (JTC) architecture for identification of credit cards and other products is very promising. The experimental demonstration of the random phase encoding technique for security verification shows that hybrid JTCs can be successfully utilized. The random phase encoding technique provides a very high protection level of products and things to be identified. However, the realization of this technique is connected with overcoming of the certain practical problems. To solve some of these problems and simultaneously to improve the security of documents and other products, we propose to use a transformed phase mask (TPM) as an input object in an optical correlator. This mask is synthesized from a random binary pattern (RBP), which is directly used to fabricate a reference phase mask (RPM). To obtain the TPM, we previously separate the RBP on a several parts (for example, K parts) of an arbitrary shape and further fabricate the TPM from this transformed RBP. The fabricated TPM can be bonded as the optical mark to any product or thing to be identified. If the RPM and the TPM are placed on the optical correlator input, the first diffracted order of the output correlation signal is containing the K narrow autocorrelation peaks. The distances between the peaks and the peak's intensities can be treated as the terms of the identification feature vector (FV) for the TPM identification.
Threat to future global food security from climate change and ozone air pollution
NASA Astrophysics Data System (ADS)
Tai, Amos P. K.; Martin, Maria Val; Heald, Colette L.
2014-09-01
Future food production is highly vulnerable to both climate change and air pollution with implications for global food security. Climate change adaptation and ozone regulation have been identified as important strategies to safeguard food production, but little is known about how climate and ozone pollution interact to affect agriculture, nor the relative effectiveness of these two strategies for different crops and regions. Here we present an integrated analysis of the individual and combined effects of 2000-2050 climate change and ozone trends on the production of four major crops (wheat, rice, maize and soybean) worldwide based on historical observations and model projections, specifically accounting for ozone-temperature co-variation. The projections exclude the effect of rising CO2, which has complex and potentially offsetting impacts on global food supply. We show that warming reduces global crop production by >10% by 2050 with a potential to substantially worsen global malnutrition in all scenarios considered. Ozone trends either exacerbate or offset a substantial fraction of climate impacts depending on the scenario, suggesting the importance of air quality management in agricultural planning. Furthermore, we find that depending on region some crops are primarily sensitive to either ozone (for example, wheat) or heat (for example, maize) alone, providing a measure of relative benefits of climate adaptation versus ozone regulation for food security in different regions.
Homeland Defense and Homeland Security: Creating Unity of Effort
2009-02-12
MDMA (3,4- methylenedioxymethamphetamine, also known as ecstasy) market that was greatly diminished after many of the principal organizations that...supplied the drug to U.S. distributors were dismantled by law enforcement in 2002. Canada-based Asian DTOs have greatly increased MDMA production in
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-16
... Agreement''; Mixed Swaps; Security- Based Swap Agreement Recordkeeping: Book-out Agreement Confirmation... Protection Act (``Dodd-Frank Act''), requiring that oral book- out agreements must be followed in a..., ``Product Definitions''); regarding ``mixed swaps;'' and governing books and records with respect to...
Bialas, Andrzej
2010-01-01
The paper discusses the security issues of intelligent sensors that are able to measure and process data and communicate with other information technology (IT) devices or systems. Such sensors are often used in high risk applications. To improve their robustness, the sensor systems should be developed in a restricted way to provide them with assurance. One of assurance creation methodologies is Common Criteria (ISO/IEC 15408), used for IT products and systems. The contribution of the paper is a Common Criteria compliant and pattern-based method for the intelligent sensors security development. The paper concisely presents this method and its evaluation for the sensor detecting methane in a mine, focusing on the security problem of the intelligent sensor definition and solution. The aim of the validation is to evaluate and improve the introduced method. PMID:22399888
49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 7 2010-10-01 2010-10-01 false Secure Printing Processes and Other Secure... DISCLOSURE REQUIREMENTS Pt. 580, App. A Appendix A to Part 580—Secure Printing Processes and Other Secure... printing—a printing process utilized in the production of bank-notes and other security documents whereby...
Zhao, Hong-Bo; Ma, Yan-Ji
2014-02-01
According to the cultivated land ecological security in major grain production areas of Northeast China, this paper selected 48 counties of Jilin Province as the research object. Based on the PSR-EES conceptual framework model, an evaluation index system of cultivated land ecological security was built. By using the improved TOPSIS, Markov chains, GIS spatial analysis and obstacle degree models, the spatial-temporal pattern of cultivated land ecological security and the obstacle factors were analyzed from 1995 to 2011 in Jilin Province. The results indicated that, the composite index of cultivated land ecological security appeared in a rising trend in Jilin Province from 1995 to 2011, and the cultivated land ecological security level changed from being sensitive to being general. There was a pattern of 'Club Convergence' in cultivated land ecological security level in each county and the spatial discrepancy tended to become larger. The 'Polarization' trend of cultivated land ecological security level was obvious. The distributions of sensitive level and critical security level with ribbon patterns tended to be dispersed, the general security level and relative security levels concentrated, and the distributions of security level scattered. The unstable trend of cultivated land ecological security level was more and more obvious. The main obstacle factors that affected the cultivated land ecological security level in Jilin Province were rural net income per capita, economic density, the proportion of environmental protection investment in GDP, degree of machinery cultivation and the comprehensive utilization rate of industrial solid wastes.
NASA Astrophysics Data System (ADS)
Bodin, P.; Olin, S.; Pugh, T. A. M.; Arneth, A.
2014-12-01
Food security can be defined as stable access to food of good nutritional quality. In Sub Saharan Africa access to food is strongly linked to local food production and the capacity to generate enough calories to sustain the local population. Therefore it is important in these regions to generate not only sufficiently high yields but also to reduce interannual variability in food production. Traditionally, climate impact simulation studies have focused on factors that underlie maximum productivity ignoring the variability in yield. By using Modern Portfolio Theory, a method stemming from economics, we here calculate optimum current and future crop selection that maintain current yield while minimizing variance, vs. maintaining variance while maximizing yield. Based on simulated yield using the LPJ-GUESS dynamic vegetation model, the results show that current cropland distribution for many crops is close to these optimum distributions. Even so, the optimizations displayed substantial potential to either increase food production and/or to decrease its variance regionally. Our approach can also be seen as a method to create future scenarios for the sown areas of crops in regions where local food production is important for food security.
17 CFR 240.6h-1 - Settlement and regulatory halt requirements for security futures products.
Code of Federal Regulations, 2010 CFR
2010-04-01
... investors and the public interest, taking into account such factors as fairness to buyers and sellers of the affected security futures product, the maintenance of a fair and orderly market in such security futures... with the protection of investors. An exemption granted pursuant to this paragraph shall not operate as...
27 CFR 19.234 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Consents of Surety § 19.234 Deposit of securities in lieu of corporate surety. In lieu of corporate surety... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Deposit of securities in lieu of corporate surety. 19.234 Section 19.234 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 26.63 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2013 CFR
2013-04-01
... securities in lieu of corporate surety. In lieu of corporate surety, the principal may pledge and deposit, as... 27 Alcohol, Tobacco Products and Firearms 1 2013-04-01 2013-04-01 false Deposit of securities in lieu of corporate surety. 26.63 Section 26.63 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 28.53 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2013 CFR
2013-04-01
... of Surety § 28.53 Deposit of securities in lieu of corporate surety. In lieu of corporate surety, the... 27 Alcohol, Tobacco Products and Firearms 1 2013-04-01 2013-04-01 false Deposit of securities in lieu of corporate surety. 28.53 Section 28.53 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 28.53 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2012 CFR
2012-04-01
... of Surety § 28.53 Deposit of securities in lieu of corporate surety. In lieu of corporate surety, the... 27 Alcohol, Tobacco Products and Firearms 1 2012-04-01 2012-04-01 false Deposit of securities in lieu of corporate surety. 28.53 Section 28.53 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 26.63 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2011 CFR
2011-04-01
... securities in lieu of corporate surety. In lieu of corporate surety, the principal may pledge and deposit, as... 27 Alcohol, Tobacco Products and Firearms 1 2011-04-01 2011-04-01 false Deposit of securities in lieu of corporate surety. 26.63 Section 26.63 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 28.53 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2010 CFR
2010-04-01
... of Surety § 28.53 Deposit of securities in lieu of corporate surety. In lieu of corporate surety, the... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Deposit of securities in lieu of corporate surety. 28.53 Section 28.53 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 28.53 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2011 CFR
2011-04-01
... of Surety § 28.53 Deposit of securities in lieu of corporate surety. In lieu of corporate surety, the... 27 Alcohol, Tobacco Products and Firearms 1 2011-04-01 2011-04-01 false Deposit of securities in lieu of corporate surety. 28.53 Section 28.53 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 26.63 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2010 CFR
2010-04-01
... securities in lieu of corporate surety. In lieu of corporate surety, the principal may pledge and deposit, as... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Deposit of securities in lieu of corporate surety. 26.63 Section 26.63 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 26.63 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2012 CFR
2012-04-01
... securities in lieu of corporate surety. In lieu of corporate surety, the principal may pledge and deposit, as... 27 Alcohol, Tobacco Products and Firearms 1 2012-04-01 2012-04-01 false Deposit of securities in lieu of corporate surety. 26.63 Section 26.63 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 28.53 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2014 CFR
2014-04-01
... of Surety § 28.53 Deposit of securities in lieu of corporate surety. In lieu of corporate surety, the... 27 Alcohol, Tobacco Products and Firearms 1 2014-04-01 2014-04-01 false Deposit of securities in lieu of corporate surety. 28.53 Section 28.53 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
27 CFR 26.63 - Deposit of securities in lieu of corporate surety.
Code of Federal Regulations, 2014 CFR
2014-04-01
... securities in lieu of corporate surety. In lieu of corporate surety, the principal may pledge and deposit, as... 27 Alcohol, Tobacco Products and Firearms 1 2014-04-01 2014-04-01 false Deposit of securities in lieu of corporate surety. 26.63 Section 26.63 Alcohol, Tobacco Products and Firearms ALCOHOL AND...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-17
... disseminated as required (Rule 4120(a)(9)); a halt in a Derivative Securities Product (as defined in Rule 4120... trading halt in a Derivative Security Product traded pursuant to unlisted trading privileges for which a... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69563; File No. SR-NASDAQ-2013-073] Self...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-15
....0022/share in all Derivative Securities Products priced $1.00/share or more executed in the Regular....0022/share in all Derivative Securities Products priced $1.00/share or more executed in the Regular... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68894; File No. SR-CHX-2013-06] Self-Regulatory...
Livestock and food security: vulnerability to population growth and climate change.
Godber, Olivia F; Wall, Richard
2014-10-01
Livestock production is an important contributor to sustainable food security for many nations, particularly in low-income areas and marginal habitats that are unsuitable for crop production. Animal products account for approximately one-third of global human protein consumption. Here, a range of indicators, derived from FAOSTAT and World Bank statistics, are used to model the relative vulnerability of nations at the global scale to predicted climate and population changes, which are likely to impact on their use of grazing livestock for food. Vulnerability analysis has been widely used in global change science to predict impacts on food security and famine. It is a tool that is useful to inform policy decision making and direct the targeting of interventions. The model developed shows that nations within sub-Saharan Africa, particularly in the Sahel region, and some Asian nations are likely to be the most vulnerable. Livestock-based food security is already compromised in many areas on these continents and suffers constraints from current climate in addition to the lack of economic and technical support allowing mitigation of predicted climate change impacts. Governance is shown to be a highly influential factor and, paradoxically, it is suggested that current self-sufficiency may increase future potential vulnerability because trade networks are poorly developed. This may be relieved through freer trade of food products, which is also associated with improved governance. Policy decisions, support and interventions will need to be targeted at the most vulnerable nations, but given the strong influence of governance, to be effective, any implementation will require considerable care in the management of underlying structural reform. © 2014 The Authors. Global Change Biology Published by John Wiley & Sons Ltd.
Famine Early Warning Systems and Their Use of Satellite Remote Sensing Data
NASA Technical Reports Server (NTRS)
Brown, Molly E.; Essam, Timothy; Leonard, Kenneth
2011-01-01
Famine early warning organizations have experience that has much to contribute to efforts to incorporate climate and weather information into economic and political systems. Food security crises are now caused almost exclusively by problems of food access, not absolute food availability, but the role of monitoring agricultural production both locally and globally remains central. The price of food important to the understanding of food security in any region, but it needs to be understood in the context of local production. Thus remote sensing is still at the center of much food security analysis, along with an examination of markets, trade and economic policies during food security analyses. Technology including satellite remote sensing, earth science models, databases of food production and yield, and modem telecommunication systems contributed to improved food production information. Here we present an econometric approach focused on bringing together satellite remote sensing and market analysis into food security assessment in the context of early warning.
Global Food Security-support data at 30 m (GFSAD30)
NASA Astrophysics Data System (ADS)
Thenkabail, P. S.
2013-12-01
Monitoring global croplands (GCs) is imperative for ensuring sustainable water and food security to the people of the world in the Twenty-first Century. However, the currently available cropland products suffer from major limitations such as: (1) Absence of precise spatial location of the cropped areas; (b) Coarse resolution nature of the map products with significant uncertainties in areas, locations, and detail; (b) Uncertainties in differentiating irrigated areas from rainfed areas; (c) Absence of crop types and cropping intensities; and (e) Absence of a dedicated webdata portal for the dissemination of cropland products. Therefore, our project aims to close these gaps through a Global Food Security-support data at 30 m (GFSAD30) with 4 distinct products: 1. Cropland extentarea, 2. Crop types with focus on 8 crops that occupy 70% of the global cropland areas, 3. Irrigated versus rainfed, and 4. Cropping intensities: single, double, triple, and continuous cropping. The above 4 products will be generated for GFSAD for nominal year 2010 (GFSAD2010) based on Landsat 30m Global Land Survey 2010 (GLS2010) fused with Moderate Resolution Imaging Spectroradiometer (MODIS) 250m NDVI monthly maximum value composites (MVC) of 2009-2011 data, and suite of secondary data (e.g., long-term precipitation, temperature, GDEM elevation). GFSAD30 will be produced using three mature cropland mapping algorithms (CMAs): 1. Spectral matching techniques; 2. A cropland classification algorithm (ACCA) that is rule-based; and 3. Hierarchical segmentation (HSeg) algorithm. Funded by NASA MEaSUREs, GFSAD30 will make significant contributions to Earth System Data Records (ESDRs), Group on Earth Observations (GEO) Agriculture and Water Societal Beneficial Areas (GEO Ag. SBAs), GEO Global Agricultural Monitoring Initiative (GEO GLAM), and the recent 'Big Data' initiative by the White House. The project has the support of USGS Working Group on Global Croplands (https://powellcenter.usgs.gov/globalcroplandwater/).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bosas, Joseph
The National Security Campus (NSC) collects a large amount of test data used The National Security Campus (NSC) collects a large amount of test data used to accept high value and high rigor product. The data has been used historically to support root cause analysis when anomalies are detected in down-stream processes. The opportunity to use the data for predictive failure analysis however, had never been exploited. The primary goal of the Test Data Monitor (TDM) software is to provide automated capabilities to analyze data in near-real-time and report trends that foreshadow actual product failures. To date, the aerospace industrymore » as a whole is challenged at utilizing collected data to the degree that modern technology allows. As a result of the innovation behind TDM, Honeywell is able to monitor millions of data points through a multitude of SPC algorithms continuously and autonomously so that our personnel resources can more efficiently and accurately direct their attention to suspect processes or features. TDM’s capabilities have been recognized by our U.S. Department of Energy National Nuclear Security Administration (NNSA) sponsor for potential use at other sites within the NNSA. This activity supports multiple initiatives including expectations of the NNSA and broader corporate goals that center around data-based quality controls on production.« less
Reducing Food Loss and Waste to Enhance Food Security and Environmental Sustainability.
Shafiee-Jood, Majid; Cai, Ximing
2016-08-16
While food shortage remains a big concern in many regions around the world, almost one-third of the total food production is discarded as food loss and waste (FLW). This is associated with about one-quarter of land, water, and fertilizer used for crop production, even though resources and environmental constraints are expected to limit food production around the world. FLW reduction represents a potential opportunity to enhance both food security and environmental sustainability and therefore has received considerable attention recently. By reviewing the recent progress and new developments in the literature, this paper highlights the importance of FLW prevention as a complementary solution to address the Grand Challenge of global food security and environmental sustainability. However, raising awareness only is not enough to realize the expected FLW reduction. We identify the knowledge gaps and opportunities for research by synthesizing the strategies of FLW reduction and the barriers, including (1) filling the data gaps, (2) quantifying the socioeconomic and environmental impacts of FLW reduction strategies, (3) understanding the scale effects, and (4) exploring the impacts of global transitions. It is urgent to take more aggressive yet scientifically based actions to reduce FLW, which require everyone's involvement along the food supply chain, including policy makers, food producers and suppliers, and food consumers.
77 FR 2308 - Approval of Altol Petroleum Product Service, as a Commercial Gauger
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-17
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Approval of Altol Petroleum... Security. ACTION: Notice of approval of Altol Petroleum Product Service, as a commercial gauger. SUMMARY: Notice is hereby given that, pursuant to 19 CFR 151.13, Altol Petroleum Product Service, Calle Gregorio...
17 CFR 40.2 - Listing products for trading by certification.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Listing products for trading by certification. 40.2 Section 40.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PROVISIONS COMMON TO REGISTERED ENTITIES § 40.2 Listing products for trading by certification. (a...
17 CFR 40.2 - Listing products for trading by certification.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Listing products for trading by certification. 40.2 Section 40.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PROVISIONS COMMON TO REGISTERED ENTITIES § 40.2 Listing products for trading by certification. (a...
17 CFR 40.2 - Listing products for trading by certification.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Listing products for trading by certification. 40.2 Section 40.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PROVISIONS COMMON TO REGISTERED ENTITIES § 40.2 Listing products for trading by certification. (a...
New technology for food systems and security.
Yau, N J Newton
2009-01-01
In addition to product trade, technology trade has become one of the alternatives for globalization action around the world. Although not all technologies employed on the technology trade platform are innovative technologies, the data base of international technology trade still is a good indicator for observing innovative technologies around world. The technology trade data base from Sinew Consulting Group (SCG) Ltd. was employed as an example to lead the discussion on security or safety issues that may be caused by these innovative technologies. More technologies related to processing, functional ingredients and quality control technology of food were found in the data base of international technology trade platform. The review was conducted by categorizing technologies into the following subcategories in terms of safety and security issues: (1) agricultural materials/ingredients, (2) processing/engineering, (3) additives, (4) packaging/logistics, (5) functional ingredients, (6) miscellaneous (include detection technology). The author discusses examples listed for each subcategory, including GMO technology, nanotechnology, Chinese medicine based functional ingredients, as well as several innovative technologies. Currently, generation of innovative technology advance at a greater pace due to cross-area research and development activities. At the same time, more attention needs to be placed on the employment of these innovative technologies.
Impact of climate change on crop yield and role of model for achieving food security.
Kumar, Manoj
2016-08-01
In recent times, several studies around the globe indicate that climatic changes are likely to impact the food production and poses serious challenge to food security. In the face of climate change, agricultural systems need to adapt measures for not only increasing food supply catering to the growing population worldwide with changing dietary patterns but also to negate the negative environmental impacts on the earth. Crop simulation models are the primary tools available to assess the potential consequences of climate change on crop production and informative adaptive strategies in agriculture risk management. In consideration with the important issue, this is an attempt to provide a review on the relationship between climate change impacts and crop production. It also emphasizes the role of crop simulation models in achieving food security. Significant progress has been made in understanding the potential consequences of environment-related temperature and precipitation effect on agricultural production during the last half century. Increased CO2 fertilization has enhanced the potential impacts of climate change, but its feasibility is still in doubt and debates among researchers. To assess the potential consequences of climate change on agriculture, different crop simulation models have been developed, to provide informative strategies to avoid risks and understand the physical and biological processes. Furthermore, they can help in crop improvement programmes by identifying appropriate future crop management practises and recognizing the traits having the greatest impact on yield. Nonetheless, climate change assessment through model is subjected to a range of uncertainties. The prediction uncertainty can be reduced by using multimodel, incorporating crop modelling with plant physiology, biochemistry and gene-based modelling. For devloping new model, there is a need to generate and compile high-quality field data for model testing. Therefore, assessment of agricultural productivity to sustain food security for generations is essential to maintain a collective knowledge and resources for preventing negative impact as well as managing crop practises.
7 CFR 764.255 - Security requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.255 Section 764.255... AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Operating Loan Program § 764.255 Security requirements. An OL... operating purposes, loans must be secured by a first lien on farm property or products having a security...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2014-04-01 2014-04-01 false Security. 19.704 Section... Construction, Equipment, and Security § 19.704 Security. (a) General. The proprietor of an alcohol fuel plant must provide adequate security measures at the alcohol fuel plant in order to protect against the...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 9 Animals and Animal Products 1 2011-01-01 2011-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2012-04-01 2012-04-01 false Security. 19.704 Section... Construction, Equipment, and Security § 19.704 Security. (a) General. The proprietor of an alcohol fuel plant must provide adequate security measures at the alcohol fuel plant in order to protect against the...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 9 Animals and Animal Products 1 2012-01-01 2012-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2011-04-01 2011-04-01 false Security. 19.704 Section... Construction, Equipment, and Security § 19.704 Security. (a) General. The proprietor of an alcohol fuel plant must provide adequate security measures at the alcohol fuel plant in order to protect against the...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2013-04-01 2013-04-01 false Security. 19.704 Section... Construction, Equipment, and Security § 19.704 Security. (a) General. The proprietor of an alcohol fuel plant must provide adequate security measures at the alcohol fuel plant in order to protect against the...
ERIC Educational Resources Information Center
Edwards, Gregory
2011-01-01
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Code of Federal Regulations, 2014 CFR
2014-01-01
... 9 Animals and Animal Products 1 2014-01-01 2014-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 9 Animals and Animal Products 1 2013-01-01 2013-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...
Climate Change and Food Security: The View from Space
NASA Technical Reports Server (NTRS)
Brown, Molly E.
2012-01-01
Global satellite data provides information on land use, rainfall, soil moisture, vegetation vigor and crop yields. Process-based products allows transformation of these data into information that can be used to assess impact of weather on commodity prices and local economic health. Trends and impact of climate change
U.S. Energy Prospects: An Engineering Viewpoint.
ERIC Educational Resources Information Center
National Academy of Engineering, Washington, DC. Commission on Education.
With the Arab oil embargo of 1973, the United States became aware of its dependence on foreign fuel to maintain its productive capacity, employment base, political autonomy, strategic security, and living standard. An engineering Task Force on Energy was appointed to provide an informed assessment of the realistic strategies that could be…
Trust and Privacy Solutions Based on Holistic Service Requirements.
Sánchez Alcón, José Antonio; López, Lourdes; Martínez, José-Fernán; Rubio Cifuentes, Gregorio
2015-12-24
The products and services designed for Smart Cities provide the necessary tools to improve the management of modern cities in a more efficient way. These tools need to gather citizens' information about their activity, preferences, habits, etc. opening up the possibility of tracking them. Thus, privacy and security policies must be developed in order to satisfy and manage the legislative heterogeneity surrounding the services provided and comply with the laws of the country where they are provided. This paper presents one of the possible solutions to manage this heterogeneity, bearing in mind these types of networks, such as Wireless Sensor Networks, have important resource limitations. A knowledge and ontology management system is proposed to facilitate the collaboration between the business, legal and technological areas. This will ease the implementation of adequate specific security and privacy policies for a given service. All these security and privacy policies are based on the information provided by the deployed platforms and by expert system processing.
Trust and Privacy Solutions Based on Holistic Service Requirements
Sánchez Alcón, José Antonio; López, Lourdes; Martínez, José-Fernán; Rubio Cifuentes, Gregorio
2015-01-01
The products and services designed for Smart Cities provide the necessary tools to improve the management of modern cities in a more efficient way. These tools need to gather citizens’ information about their activity, preferences, habits, etc. opening up the possibility of tracking them. Thus, privacy and security policies must be developed in order to satisfy and manage the legislative heterogeneity surrounding the services provided and comply with the laws of the country where they are provided. This paper presents one of the possible solutions to manage this heterogeneity, bearing in mind these types of networks, such as Wireless Sensor Networks, have important resource limitations. A knowledge and ontology management system is proposed to facilitate the collaboration between the business, legal and technological areas. This will ease the implementation of adequate specific security and privacy policies for a given service. All these security and privacy policies are based on the information provided by the deployed platforms and by expert system processing. PMID:26712752
17 CFR 240.3a68-2 - Requests for interpretation of swaps, security-based swaps, and mixed swaps.
Code of Federal Regulations, 2014 CFR
2014-04-01
... swaps, security-based swaps, and mixed swaps. 240.3a68-2 Section 240.3a68-2 Commodity and Securities..., Security-Based Swap, and Security-Based Swap Agreement; Mixed Swaps; Security-Based Swap Agreement Recordkeeping § 240.3a68-2 Requests for interpretation of swaps, security-based swaps, and mixed swaps. (a) In...
17 CFR 240.3a68-2 - Requests for interpretation of swaps, security-based swaps, and mixed swaps.
Code of Federal Regulations, 2013 CFR
2013-04-01
... swaps, security-based swaps, and mixed swaps. 240.3a68-2 Section 240.3a68-2 Commodity and Securities..., Security-Based Swap, and Security-Based Swap Agreement; Mixed Swaps; Security-Based Swap Agreement Recordkeeping § 240.3a68-2 Requests for interpretation of swaps, security-based swaps, and mixed swaps. (a) In...
Soil Security Assessment of Tasmania
NASA Astrophysics Data System (ADS)
Field, Damien; Kidd, Darren; McBratney, Alex
2017-04-01
The concept of soil security aligns well with the aspirational and marketing policies of the Tasmanian Government, where increased agricultural expansion through new irrigation schemes and multiple-use State managed production forests co-exists beside pristine World Heritage conservation land, a major drawcard of the economically important tourism industry . Regarding the Sustainable Development Gaols (SDG's) this could be seen as a exemplar of the emerging tool for quantification of spatial soil security to effectively protect our soil resource in terms of food (SDG 2.4, 3.9) and water security (SDG 6.4, 6.6), biodiversity maintenance and safeguarding fragile ecosystems (SDG 15.3, 15.9). The recent development and application of Digital Soil Mapping and Assessment capacities in Tasmania to stimulate agricultural production and better target appropriate soil resources has formed the foundational systems that can enable the first efforts in quantifying and mapping Tasmanian Soil Security, in particular the five Soil Security dimensions (Capability, Condition, Capital, Codification and Connectivity). However, to provide a measure of overall soil security, it was necessary to separately assess the State's three major soil uses; Agriculture, Conservation and Forestry. These products will provide an indication of where different activities are sustainable or at risk, where more soil data is needed, and provide a tool to better plan for a State requiring optimal food and fibre production, without depleting its natural soil resources and impacting on the fragile ecosystems supporting environmental benefits and the tourism industry.
Bode, Ingvild
2017-01-01
The United Nations Security Council passed its first resolution on children in armed conflict in 1999, making it one of the oldest examples of Security Council engagement with a thematic mandate and leading to the creation of a dedicated working group in 2005. Existing theoretical accounts of the Security Council cannot account for the developing substance of the children and armed conflict agenda as they are macro-oriented and focus exclusively on states. I argue that Security Council decision-making on thematic mandates is a productive process whose outcomes are created by and through practices of actors across the three United Nations: member states (the first United Nations), United Nations officials (the second United Nations) and non-governmental organizations (the third United Nations). In presenting a practice-based, micro-oriented analysis of the children and armed conflict agenda, the article aims to deliver on the empirical promise of practice theories in International Relations. I make two contributions to practice-based understandings: first, I argue that actors across the three United Nations engage in reflective practices of a strategic or tactical nature to manage, arrange or create space in Security Council decision-making. Portraying practices as reflective rather than as only based on tacit knowledge highlights how actors may creatively adapt their practices to social situations. Second, I argue that particular individuals from the three United Nations are more likely to become recognized as competent performers of practices because of their personality, understood as plural socialization experiences. This adds varied individual agency to practice theories that, despite their micro-level interests, have focused on how agency is relationally constituted. PMID:29782586
Bode, Ingvild
2018-06-01
The United Nations Security Council passed its first resolution on children in armed conflict in 1999, making it one of the oldest examples of Security Council engagement with a thematic mandate and leading to the creation of a dedicated working group in 2005. Existing theoretical accounts of the Security Council cannot account for the developing substance of the children and armed conflict agenda as they are macro-oriented and focus exclusively on states. I argue that Security Council decision-making on thematic mandates is a productive process whose outcomes are created by and through practices of actors across the three United Nations: member states (the first United Nations), United Nations officials (the second United Nations) and non-governmental organizations (the third United Nations). In presenting a practice-based, micro-oriented analysis of the children and armed conflict agenda, the article aims to deliver on the empirical promise of practice theories in International Relations. I make two contributions to practice-based understandings: first, I argue that actors across the three United Nations engage in reflective practices of a strategic or tactical nature to manage, arrange or create space in Security Council decision-making. Portraying practices as reflective rather than as only based on tacit knowledge highlights how actors may creatively adapt their practices to social situations. Second, I argue that particular individuals from the three United Nations are more likely to become recognized as competent performers of practices because of their personality, understood as plural socialization experiences. This adds varied individual agency to practice theories that, despite their micro-level interests, have focused on how agency is relationally constituted.
Wang, Liangmin
2018-01-01
Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node’s transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing), which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network). The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical. PMID:29538314
Sohail, Muhammad; Wang, Liangmin
2018-03-14
Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node's transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing), which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network). The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical.
Women and family poultry production in rural Africa.
Gueye, E H
2000-02-01
Poultry production has existed for many generations in Africa, and almost every village household keeps chickens. The rural family poultry (RFP) are generally raised in free-range and/or backyard systems, which are traditional extensive husbandry systems. The development of an intensive poultry production has been the goal of the African government over the years. Despite efforts aiming for such goal, RFP is still very important in African countries that are both poor and net importers of food. It is a valuable asset because it can contribute significantly in alleviating poverty, securing food supply, and promoting gender equality. In view of this, interventions to improve RFP production systems should take into account the sociocultural issues, specifically gender-based aspects. It is noted that such interventions might, in addition to food security and poverty alleviation, also serve to promote gender equality. RFP development programs should be more women-friendly in order to facilitate women's participation, as RFP production in the region is generally a woman's business. Moreover, efforts to empower village women has to be envisaged cautiously as there is a serious risk of men taking over once the poultry sector becomes more profitable.
Developing a computer security training program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1990-01-01
We all know that training can empower the computer protection program. However, pushing computer security information outside the computer security organization into the rest of the company is often labeled as an easy project or a dungeon full of dragons. Used in part or whole, the strategy offered in this paper may help the developer of a computer security training program ward off dragons and create products and services. The strategy includes GOALS (what the result of training will be), POINTERS (tips to ensure survival), and STEPS (products and services as a means to accomplish the goals).
Report #2006-P-00019, March 28, 2006. OSWER’s implemented practices to ensure production servers were being monitored for known vulnerabilities and personnel with significant security responsibility completed the Agency’s recommended security training.
15 CFR 705.4 - Criteria for determining effect of imports on the national security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... economic welfare of any domestic industry essential to our national security; (2) The displacement of any..., products, raw materials, production equipment and facilities, and other supplies and services essential to...
NASA Astrophysics Data System (ADS)
Humber, M. L.; Becker-Reshef, I.; Nordling, J.; Barker, B.; McGaughey, K.
2014-12-01
The GEOGLAM Crop Monitor's Crop Assessment Tool was released in August 2013 in support of the GEOGLAM Crop Monitor's objective to develop transparent, timely crop condition assessments in primary agricultural production areas, highlighting potential hotspots of stress/bumper crops. The Crop Assessment Tool allows users to view satellite derived products, best available crop masks, and crop calendars (created in collaboration with GEOGLAM Crop Monitor partners), then in turn submit crop assessment entries detailing the crop's condition, drivers, impacts, trends, and other information. Although the Crop Assessment Tool was originally intended to collect data on major crop production at the global scale, the types of data collected are also relevant to the food security and rangelands monitoring communities. In line with the GEOGLAM Countries at Risk philosophy of "foster[ing] the coordination of product delivery and capacity building efforts for national and regional organizations, and the development of harmonized methods and tools", a modified version of the Crop Assessment Tool is being developed for the USAID Famine Early Warning Systems Network (FEWS NET). As a member of the Countries at Risk component of GEOGLAM, FEWS NET provides agricultural monitoring, timely food security assessments, and early warnings of potential significant food shortages focusing specifically on countries at risk of food security emergencies. While the FEWS NET adaptation of the Crop Assessment Tool focuses on crop production in the context of food security rather than large scale production, the data collected is nearly identical to the data collected by the Crop Monitor. If combined, the countries monitored by FEWS NET and GEOGLAM Crop Monitor would encompass over 90 countries representing the most important regions for crop production and food security.
Achieving household nutrition security in societies in transition: an overview.
Gopalan, C
2001-01-01
The achievement of nutrition security at the household level involves adequacy of food supply at the national level and equitable distribution of food among the population in accordance with their physiological needs. The emergence of globalization and market liberalization and the increasing power of some transnational corporations that are advocating pharmaceutical shortcuts have raised concerns in many developing countries. In order to achieve adequacy of food production, earlier mistakes (such as a reliance on unsustainable new technologies) need to be corrected and the resultant imbalances with respect to food production need to be reversed. Emerging new technologies, including genetic modifications, need to be effectively harnessed and adapted with due consideration to safety and sustainability. There is a need to collect convincing evidence of the efficacy and safety of genetically modified foods before they can gain general public acceptance. Information technology will play an important role in future programmes of food production and developing countries must strive to achieve access to this technology. There is considerable scope and need for the expansion of agro-based industries in villages and townships. This could create job opportunities and could also lead to better production and more effective utilization of local food resources by the community and reduce the present considerable loss of perishable food items. Household nutrition security means more than avoidance of chronic starvation. Policy makers of developing countries should set, as their target in the next century, the achievement of adequate nutrition rather than mere survival.
Code of Federal Regulations, 2010 CFR
2010-04-01
... as being willing to buy and sell security futures for its own account on a regular or continuous... for security futures-authority, purpose, interpretation, and scope. 41.42 Section 41.42 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Customer Accounts and...
NASA Astrophysics Data System (ADS)
Sklavos, N.; Selimis, G.; Koufopavlou, O.
2005-01-01
The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.
How do you select the right security features for your company's products
NASA Astrophysics Data System (ADS)
Pickett, Gordon E.
1998-04-01
If your company manufacturers, supplies, or distributes products of almost any type, style, shape, or for any usage, they may become the objective of fraudulent activities from one or more sources. Therefore, someone at your company should be concerned about how these activities may affect the company's future. This paper/presentation will provide information about where these 'threats' may come from, what products have been compromised in the past, and what steps might be taken to deter these threats. During product security conferences, conversations, and other sources of information, you'll hear about many different types of security features that can be incorporated into monetary and identification documents, packaging, labeling, and other products/systems to help protect against counterfeiting, unauthorized tampering, or to identify 'genuine' products. Many of these features have been around for some time (which means that they may have lost at least some of their effectiveness) while others, or improved versions of some of the more mature features, have been or are being developed. This area is a 'moving target' and re-examination of the threats and counterthreats needs to be an ongoing activity. The 'value' and the capabilities of these features can sometimes be overstated, i.e. that a feature/system can solve all of the security-related problems that you may (or may not) have with your products. A couple of things to always keep in mind is that no feature(s) is universally effective and none of the features, or even combinations of features, is totally 'tamperproof' or counterfeitproof, irrespective of what may be said or claimed. So how do you go about determining if you have a product security problem and what, if any, security features might be used to reduce the threat(s) to your products? This paper will attempt to provide information to help you separate the 'wheat from the chaff' in these considerations. Specifically, information to be discussed in this paper will attempt to assist you and your associates define (1) what products are or may be under threat and how many different ways the product(s) might be compromised, (2) who might attempt to compromise your company's product(s), (3) what product security features may be effective in deterring the perceived threats, (4) how many deterrent features are needed, and should the features be overt, covert, or a combination of the two, (5) how will the candidate features hold up in the 'usage' environment, and (6) who will 'validate' the features and what skill levels, or auxiliary equipment, will be needed? Obviously, the cost effectiveness for adding possible security features to the product(s) needs to be considered, but more than just the cost of the feature, or the value of the product, needs to be factored into these considerations. For example, the effect of any compromise on the company's reputation and legal liabilities. This paper obviously can not provide all of the 'answers' but will attempt to provide you with 'food for thought.'
Code of Federal Regulations, 2013 CFR
2013-07-01
... dissemination of unclassified information pertaining to security measures, including security plans, procedures... security by significantly increasing the likelihood of the illegal production of nuclear weapons or the... the public or the common defense and security. (d) This part and title 10 of the Code of Federal...
Code of Federal Regulations, 2014 CFR
2014-07-01
... dissemination of unclassified information pertaining to security measures, including security plans, procedures... security by significantly increasing the likelihood of the illegal production of nuclear weapons or the... the public or the common defense and security. (d) This part and title 10 of the Code of Federal...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2012-04-01 2012-04-01 false Security. 19.192 Section... THE TREASURY LIQUORS DISTILLED SPIRITS PLANTS Construction, Equipment, and Security Requirements Other Plant Requirements § 19.192 Security. (a) General. The proprietor of a distilled spirits plant must...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2011-04-01 2011-04-01 false Security. 19.192 Section... THE TREASURY LIQUORS DISTILLED SPIRITS PLANTS Construction, Equipment, and Security Requirements Other Plant Requirements § 19.192 Security. (a) General. The proprietor of a distilled spirits plant must...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2013-04-01 2013-04-01 false Security. 19.192 Section... THE TREASURY ALCOHOL DISTILLED SPIRITS PLANTS Construction, Equipment, and Security Requirements Other Plant Requirements § 19.192 Security. (a) General. The proprietor of a distilled spirits plant must...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2014-04-01 2014-04-01 false Security. 19.192 Section... THE TREASURY ALCOHOL DISTILLED SPIRITS PLANTS Construction, Equipment, and Security Requirements Other Plant Requirements § 19.192 Security. (a) General. The proprietor of a distilled spirits plant must...
48 CFR 32.304-6 - Other collateral security.
Code of Federal Regulations, 2010 CFR
2010-10-01
... GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Loan Guarantees for Defense Production 32.304-6 Other collateral security. The following are examples of other forms of security that, although seldom invoked...
48 CFR 32.304-6 - Other collateral security.
Code of Federal Regulations, 2011 CFR
2011-10-01
... GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Loan Guarantees for Defense Production 32.304-6 Other collateral security. The following are examples of other forms of security that, although seldom invoked...
1990-05-01
FFRDC); and the Systems Engineering Technical Assistance (SETA) contractor to selected Air Force bases including: Vandenberg AFB California; March AFB...05/21/90 comptroller, acquisition civil engineering , legal, security, communications-computer systems, product assurance, and safety, among others...housing units were constructed in 1983. The Fort MacArthur Housing Area also includes administrative offices, several warehouses, and civil engineering
NASA Astrophysics Data System (ADS)
Meglinski, Igor; Popov, Alexey; Bykov, Alexander
2017-03-01
Biophotonics-based diagnostic and imaging modalities have been widely used in various applications associated with the non-invasive imaging of the internal structure of a range biological media from a range of cells cultures to biological tissues. With the fast growing interest in food securities there remains strong demand to apply reliable and cost effective biophotonics-based technologies for rapid screening of freshness, internal defects and quality of major agricultural products. In current presentation the results of application of optical coherence tomography (OCT) and encapsulated optical bio-sensors for quantitative assessment of freshness of agricultural products, such as meat and sea foods, are presented, and their further perspectives are discussed.
Fraga, Eric S; Ng, Melvin
2015-01-01
Recent developments in catalysts have enhanced the potential for the utilisation of carbon dioxide as a chemical feedstock. Using the appropriate energy efficient catalyst enables a range of chemical pathways leading to desirable products. In doing so, CO2 provides an economically and environmentally beneficial source of C1 feedstock, while improving the issues relating to security of supply that are associated with fossil-based feedstocks. However, the dependence on catalysts brings other supply chains into consideration, supply chains that may also have security of supply issues. The choice of chemical pathways for specific products will therefore entail an assessment not only of economic factors but also the security of supply issues for the catalysts. This is a multi-criteria decision making problem. In this paper, we present a modified 4A framework based on the framework suggested by the Asian Pacific Energy Research centre for macro-economic applications. The 4A methodology is named after the criteria used to compare alternatives: availability, acceptability, applicability and affordability. We have adapted this framework for the consideration of alternative chemical reaction processes using a micro-economic outlook. Data from a number of sources were collected and used to quantify each of the 4A criteria. A graphical representation of the assessments is used to support the decision maker in comparing alternatives. The framework not only allows for the comparison of processes but also highlights current limitations in the CCU processes. The framework presented can be used by a variety of stakeholders, including regulators, investors, and process industries, with the aim of identifying promising routes within a broader multi-criteria decision making process.
49 CFR 33.40 - General provisions.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Priorities Assistance § 33.40 General provisions. (a) TPAS is designed to be largely self-executing. However... immediately contact DOT's Defense Production Act Activities Coordinator, Office of Intelligence, Security, and... rule) to the Defense Production Act Activities Coordinator, Office of Intelligence, Security, and...
49 CFR 33.40 - General provisions.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Priorities Assistance § 33.40 General provisions. (a) TPAS is designed to be largely self-executing. However... immediately contact DOT's Defense Production Act Activities Coordinator, Office of Intelligence, Security, and... rule) to the Defense Production Act Activities Coordinator, Office of Intelligence, Security, and...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-18
... research, development, engineering and production of border security-related systems; and (iii) to insert.... Patricia A. Brink, Director of Civil Enforcement, Antitrust Division. [FR Doc. 2012-14766 Filed 6-15-12; 8...
Global Climate Change, Food Security and the U.S. Food System
NASA Technical Reports Server (NTRS)
Brown, Molly Elizabeth; Walsh, Margaret; Hauser, Rachel; Murray, Anthony; Jadin, Jenna; Baklund, Peter; Robinson, Paula
2013-01-01
Climate change influences on the major pillars of food security. Each of the four elements of food security (availability,access,utilization,andstability) is vulnerable to changes in climate. For example,reductions in production related to regional drought influence food availability at multiple scales. Changes in price influences the ability of certain populations to purchase food (access). Utilization maybe affected when production zones shift, reducing the availability of preferred or culturally appropriate types of food within a region. Stability of the food supply may be highly uncertain given an increased incidence of extreme climatic events and their influence on production patterns.
Chlorine (CI2), a high-production volume air pollutant, is an irritant of interest to homeland security. Risk assessment approaches to establish egress or re-entry levels typically use an assumption based on Haber's Rule and apply a concentration times duration ("C x t") adjustme...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-25
... with customer bases of potential product users have indicated a preference that premium pricing for... options on the same security. In addition to giving market participants clarity as to the minimum pricing increments for Mini Options, the filing would harmonize penny pricing between Mini Options and standard...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-26
... with customer bases of potential product users have indicated a preference that premium pricing for... clarity as to the minimum pricing increments for Mini Options, the filing would harmonize penny pricing... symbol'' of an underlying security and cannot differentiate, for purposes of minimum variation pricing...
The North Carolina Department of Commerce: a healthy workforce promotes economic security.
Smith, Libby; Morck, John
2012-01-01
To thrive economically, North Carolina needs a healthy, productive workforce. The public and private sectors should collaborate on the prevention and management of chronic diseases, which significantly impact the state's economy. Evidence-based prevention strategies should be prioritized, and communities should be designed with public health considerations in mind.
Securing quality of camera-based biomedical optics
NASA Astrophysics Data System (ADS)
Guse, Frank; Kasper, Axel; Zinter, Bob
2009-02-01
As sophisticated optical imaging technologies move into clinical applications, manufacturers need to guarantee their products meet required performance criteria over long lifetimes and in very different environmental conditions. A consistent quality management marks critical components features derived from end-users requirements in a top-down approach. Careful risk analysis in the design phase defines the sample sizes for production tests, whereas first article inspection assures the reliability of the production processes. We demonstrate the application of these basic quality principles to camera-based biomedical optics for a variety of examples including molecular diagnostics, dental imaging, ophthalmology and digital radiography, covering a wide range of CCD/CMOS chip sizes and resolutions. Novel concepts in fluorescence detection and structured illumination are also highlighted.
Energy Independence and Security Act of 2007
This page provides an overview of the Energy Independence and Security Act (EISA) of 2007, which aims to increase U.S. energy security, develop renewable energy production, and improve vehicle fuel economy.
Security inspection in ports by anomaly detection using hyperspectral imaging technology
NASA Astrophysics Data System (ADS)
Rivera, Javier; Valverde, Fernando; Saldaña, Manuel; Manian, Vidya
2013-05-01
Applying hyperspectral imaging technology in port security is crucial for the detection of possible threats or illegal activities. One of the most common problems that cargo suffers is tampering. This represents a danger to society because it creates a channel to smuggle illegal and hazardous products. If a cargo is altered, security inspections on that cargo should contain anomalies that reveal the nature of the tampering. Hyperspectral images can detect anomalies by gathering information through multiple electromagnetic bands. The spectrums extracted from these bands can be used to detect surface anomalies from different materials. Based on this technology, a scenario was built in which a hyperspectral camera was used to inspect the cargo for any surface anomalies and a user interface shows the results. The spectrum of items, altered by different materials that can be used to conceal illegal products, is analyzed and classified in order to provide information about the tampered cargo. The image is analyzed with a variety of techniques such as multiple features extracting algorithms, autonomous anomaly detection, and target spectrum detection. The results will be exported to a workstation or mobile device in order to show them in an easy -to-use interface. This process could enhance the current capabilities of security systems that are already implemented, providing a more complete approach to detect threats and illegal cargo.
17 CFR 41.14 - Transition period for indexes that cease being narrow-based security indexes.
Code of Federal Regulations, 2011 CFR
2011-04-01
... provision. An index that is a narrow-based security index that becomes a broad-based security index for no...-five days. An index that is a narrow-based security index that becomes a broad-based security index for...
17 CFR 41.14 - Transition period for indexes that cease being narrow-based security indexes.
Code of Federal Regulations, 2010 CFR
2010-04-01
... provision. An index that is a narrow-based security index that becomes a broad-based security index for no...-five days. An index that is a narrow-based security index that becomes a broad-based security index for...
17 CFR 41.14 - Transition period for indexes that cease being narrow-based security indexes.
Code of Federal Regulations, 2013 CFR
2013-04-01
... provision. An index that is a narrow-based security index that becomes a broad-based security index for no...-five days. An index that is a narrow-based security index that becomes a broad-based security index for...
17 CFR 41.14 - Transition period for indexes that cease being narrow-based security indexes.
Code of Federal Regulations, 2012 CFR
2012-04-01
... provision. An index that is a narrow-based security index that becomes a broad-based security index for no...-five days. An index that is a narrow-based security index that becomes a broad-based security index for...
[Analysis of the security risk in home medical equipment].
Peng, Xiaolong; Xu, Honglei; Tian, Xiaojun
2014-01-01
The popularization of home medical equipment facilitates the treatment and management of many diseases, improving the patient compliance. However, due to the absence of medical background, most of their users have various security risk in the course of reorganization, choosing, using and maintenance of the products. This paper analyzed the property of security risk in home medical equipment, and described the matters needing attention in the using of several common products.
School Violence: Physical Security.
ERIC Educational Resources Information Center
Utah State Office of Education, Salt Lake City.
This booklet provides an overview of security technology product areas that might be appropriate and affordable for school applications. Topics cover security concepts and operational issues; security issues when designing for new schools; the role of maintenance; video camera use; walk-through metal detectors; duress alarm devices; and a partial…
76 FR 27671 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-12
... limit their business to the sale and redemption of securities of registered investment companies and... required to register only because they effect transactions in securities futures products. The information... securities business or do not hold inventories of securities. For these reasons, the staff estimates that the...
17 CFR 41.25 - Additional conditions for trading for security futures products.
Code of Federal Regulations, 2010 CFR
2010-04-01
... security outstanding, the designated contract market or registered derivatives transaction execution... securities. (3) Notwithstanding paragraphs (b)(1) or (b)(2) of this section, if a derivatives clearing... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Additional conditions for...
Econutrition and utilization of food-based approaches for nutritional health.
Blasbalg, Tanya L; Wispelwey, Bram; Deckelbaum, Richard J
2011-03-01
Macronutrient and micronutrient deficiencies continue to have a detrimental impact in lower-income countries, with significant costs in morbidity, mortality, and productivity. Food is the primary source of the nutrients needed to sustain life, and it is the essential component that links nutrition, agriculture, and ecology in the econutrition framework. To present evidence and analysis of food-based approaches for improving nutritional and health outcomes in lower-income countries. Review of existing literature. The benefits of food-based approaches may include nutritional improvement, food security, cost-effectiveness, sustainability, and human productivity. Food-based approaches require additional inputs, including nutrition education, gender considerations, and agricultural planning. Although some forms of malnutrition can be addressed via supplements, food-based approaches are optimal to achieve sustainable solutions to multiple nutrient deficiencies.
Fast parallel molecular algorithms for DNA-based computation: factoring integers.
Chang, Weng-Long; Guo, Minyi; Ho, Michael Shan-Hui
2005-06-01
The RSA public-key cryptosystem is an algorithm that converts input data to an unrecognizable encryption and converts the unrecognizable data back into its original decryption form. The security of the RSA public-key cryptosystem is based on the difficulty of factoring the product of two large prime numbers. This paper demonstrates to factor the product of two large prime numbers, and is a breakthrough in basic biological operations using a molecular computer. In order to achieve this, we propose three DNA-based algorithms for parallel subtractor, parallel comparator, and parallel modular arithmetic that formally verify our designed molecular solutions for factoring the product of two large prime numbers. Furthermore, this work indicates that the cryptosystems using public-key are perhaps insecure and also presents clear evidence of the ability of molecular computing to perform complicated mathematical operations.
Defect evolution and pore collapse in crystalline energetic materials
NASA Astrophysics Data System (ADS)
Barton, Nathan R.; Winter, Nicholas W.; Reaugh, John E.
2009-04-01
This work examines the use of crystal based continuum mechanics in the context of dynamic loading. In particular, we examine model forms and simulations which are relevant to pore collapse in crystalline energetic materials. Strain localization and the associated generation of heat are important for the initiation of chemical reactions in this context. The crystal mechanics based model serves as a convenient testbed for the interactions among wave motion, slip kinetics, defect generation kinetics and physical length scale. After calibration to available molecular dynamics and single crystal gas gun data for HMX (octahydro-1,3,5,7-tetranitro-1,3,5,7-tetrazocine), the model is used to predict behaviors for the collapse of pores under various conditions. Implications for experimental observations are discussed. This document was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor Lawrence Livermore National Security, LLC, nor any of their employees makes any warranty, expressed or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States government or Lawrence Livermore National Security, LLC. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States government or Lawrence Livermore National Security, LLC, and shall not be used for advertising or product endorsement purposes.
A vital link: water and vegetation in the Anthropocene
NASA Astrophysics Data System (ADS)
Gerten, D.
2013-10-01
This paper argues that the interplay of water, carbon and vegetation dynamics fundamentally links some global trends in the current and conceivable future Anthropocene, such as cropland expansion, freshwater use, and climate change and its impacts. Based on a review of recent literature including geographically explicit simulation studies with the process-based LPJmL global biosphere model, it demonstrates that the connectivity of water and vegetation dynamics is vital for water security, food security and (terrestrial) ecosystem dynamics alike. The water limitation of net primary production of both natural and agricultural plants - already pronounced in many regions - is shown to increase in many places under projected climate change, though this development is partially offset by water-saving direct CO2 effects. Natural vegetation can to some degree adapt dynamically to higher water limitation, but agricultural crops usually require some form of active management to overcome it - among them irrigation, soil conservation and eventually shifts of cropland to areas that are less water-limited due to more favourable climatic conditions. While crucial to secure food production for a growing world population, such human interventions in water-vegetation systems have, as also shown, repercussions on the water cycle. Indeed, land use changes are shown to be the second-most important influence on the terrestrial water balance in recent times. Furthermore, climate change (warming and precipitation changes) will in many regions increase irrigation demand and decrease water availability, impeding rainfed and irrigated food production (if not CO2 effects counterbalance this impact - which is unlikely at least in poorly managed systems). Drawing from these exemplary investigations, some research perspectives on how to further improve our knowledge of human-water-vegetation interactions in the Anthropocene are outlined.
Using climate model simulations to assess the current climate risk to maize production
NASA Astrophysics Data System (ADS)
Kent, Chris; Pope, Edward; Thompson, Vikki; Lewis, Kirsty; Scaife, Adam A.; Dunstone, Nick
2017-05-01
The relationship between the climate and agricultural production is of considerable importance to global food security. However, there has been relatively little exploration of climate-variability related yield shocks. The short observational yield record does not adequately sample natural inter-annual variability thereby limiting the accuracy of probability assessments. Focusing on the United States and China, we present an innovative use of initialised ensemble climate simulations and a new agro-climatic indicator, to calculate the risk of severe water stress. Combined, these regions provide 60% of the world’s maize, and therefore, are crucial to global food security. To probe a greater range of inter-annual variability, the indicator is applied to 1400 simulations of the present day climate. The probability of severe water stress in the major maize producing regions is quantified, and in many regions an increased risk is found compared to calculations from observed historical data. Analysis suggests that the present day climate is also capable of producing unprecedented severe water stress conditions. Therefore, adaptation plans and policies based solely on observed events from the recent past may considerably under-estimate the true risk of climate-related maize shocks. The probability of a major impact event occurring simultaneously across both regions—a multi-breadbasket failure—is estimated to be up to 6% per decade and arises from a physically plausible climate state. This novel approach highlights the significance of climate impacts on crop production shocks and provides a platform for considerably improving food security assessments, in the present day or under a changing climate, as well as development of new risk based climate services.
Opportunities and challenges of sustainable agricultural development in China.
Zhao, Jingzhu; Luo, Qishan; Deng, Hongbing; Yan, Yan
2008-02-27
This paper introduces the concepts and aims of sustainable agriculture in China. Sustainable agricultural development comprises sustainability of agricultural production, sustainability of the rural economy, ecological and environmental sustainability within agricultural systems and sustainability of rural society. China's prime aim is to ensure current and future food security. Based on projections of China's population, its economy, societal factors and agricultural resources and inputs between 2000 and 2050, total grain supply and demand has been predicted and the state of food security analysed. Total and per capita demand for grain will increase continuously. Total demand will reach 648 Mt in 2020 and 700 Mt in 2050, while total grain yield of cultivated land will reach 470 Mt in 2010, 585 Mt in 2030 and 656 Mt in 2050. The per capita grain production will be around 360kg in the period 2000-2030 and reach 470kg in 2050. When productivities of cultivated land and other agricultural resources are all taken into consideration, China's food self-sufficiency ratio will increase from 94.4% in 2000 to 101.3% in 2030, suggesting that China will meet its future demand for food and need for food security. Despite this positive assessment, the country's sustainable agricultural development has encountered many obstacles. These include: agricultural water-use shortage; cultivated land loss; inappropriate usage of fertilizers and pesticides, and environmental degradation.
Research of Energy Substitution Strategy of China
NASA Astrophysics Data System (ADS)
Zhang, Lifeng; kai, Chen
For a long time, China's energy endowment structure determines the production structure and consumption structure of energy are coal-based.This situation is difficult to change for quite a long time. With the rapid economic growth, industrialization and urbanization, the demand for energy, especially for oil, natural gas will continue to increase. But the oil and gas supply can not meet the needs of rapid growth. The most direct way is to import, and imports will be charged by the international energy situation, and will affect energy and economic security. In view of our country abundant coal resources, we can consider to use coal substituting oil and natural gas to reduce dependence on foreign energy, to strengthen energy and economic security. Therefore, using translog production function, the text forecasts substitution elasticity and the marginal substitution rate between the capital, coal, oil and natural gas, and puts forward substitution program.
Foreign (Turbine Powered) Helicopter Production; A Threat to the United States Production Base.
1982-04-28
AO-AI16 755 ARMY WAR COLL CARLISLE BARRACKS PA F/6 5/3 FOREIBN (TURBINE POWERED) HELICOPTER PROOUCTION1 A THREAT To TH--ETCIU) APR 82 J E...NUMBERS ITS ARMY WAR COLLEGE Carlisle Barracks, PA 17053 II. CONTROLLING OFFICE NAME AND ADDRESS 12. REPORT DATE 28 April 1982 Same 13. NUMBER OF PAGES 30...14. MONITORING AGENCY NAME & ADDRESS(If different from Controlling Office) IS . SECURITY CLASS. (of this report) Unclassified ISa. DECL ASSI FI CATION
75 FR 64643 - Reporting of Security-Based Swap Transaction Data
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-20
... information relating to pre-enactment security-based swaps to a registered security-based swap data repository... within 60 days after a registered security- based swap data repository commences operations to receive... repository,\\8\\ and security- based swap execution facility.\\9\\ The Commission has issued an advance notice of...
Opportunities in the industrial biobased products industry.
Carole, Tracy M; Pellegrino, Joan; Paster, Mark D
2004-01-01
Approximately 89 million metric t of organic chemicals and lubricants, the majority of which are fossil based, are produced annually in the United States. The development of new industrial bioproducts, for production in stand-alone facilities or biorefineries, has the potential to reduce our dependence on imported oil and improve energy security. Advances in biotechnology are enabling the optimization of feedstock composition and agronomic characteristics and the development of new and improved fermentation organisms for conversion of biomass to new end products or intermediates. This article reviews recent biotechnology efforts to develop new industrial bioproducts and improve renewable feedstocks and key market opportunities.
27 CFR 19.153 - Statement of physical security.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Statement of physical... Plants § 19.153 Statement of physical security. (a) Content. The statement of security shall include: (1) A general description of the physical security at the distilled spirits plant, including methods...
27 CFR 24.151 - Deposit of collateral security.
Code of Federal Regulations, 2013 CFR
2013-04-01
... pledged and deposited as collateral security in lieu of corporate sureties in accordance with the... furnished as collateral security in lieu of corporate sureties. (b) Treasury Department Circular No. 154 is... security. 24.151 Section 24.151 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE...
27 CFR 24.151 - Deposit of collateral security.
Code of Federal Regulations, 2010 CFR
2010-04-01
... pledged and deposited as collateral security in lieu of corporate sureties in accordance with the... furnished as collateral security in lieu of corporate sureties. (b) Treasury Department Circular No. 154 is... security. 24.151 Section 24.151 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE...
27 CFR 24.151 - Deposit of collateral security.
Code of Federal Regulations, 2011 CFR
2011-04-01
... pledged and deposited as collateral security in lieu of corporate sureties in accordance with the... furnished as collateral security in lieu of corporate sureties. (b) Treasury Department Circular No. 154 is... security. 24.151 Section 24.151 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE...
27 CFR 24.151 - Deposit of collateral security.
Code of Federal Regulations, 2012 CFR
2012-04-01
... pledged and deposited as collateral security in lieu of corporate sureties in accordance with the... furnished as collateral security in lieu of corporate sureties. (b) Treasury Department Circular No. 154 is... security. 24.151 Section 24.151 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE...
27 CFR 24.151 - Deposit of collateral security.
Code of Federal Regulations, 2014 CFR
2014-04-01
... pledged and deposited as collateral security in lieu of corporate sureties in accordance with the... furnished as collateral security in lieu of corporate sureties. (b) Treasury Department Circular No. 154 is... security. 24.151 Section 24.151 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE...
75 FR 75207 - Regulation SBSR-Reporting and Dissemination of Security-Based Swap Information
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-02
...In accordance with Section 763 (``Section 763'') and Section 766 (``Section 766'') of Title VII (``Title VII'') of the Dodd-Frank Wall Street Reform and Consumer Protection Act (the ``Dodd-Frank Act''), the Securities and Exchange Commission (``SEC'' or ``Commission'') is proposing Regulation SBSR--Reporting and Dissemination of Security-Based Swap Information (``Regulation SBSR'') under the Securities Exchange Act of 1934 (``Exchange Act'').\\1\\ Proposed Regulation SBSR would provide for the reporting of security- based swap information to registered security-based swap data repositories or the Commission and the public dissemination of security-based swap transaction, volume, and pricing information. Registered security-based swap data repositories would be required to establish and maintain certain policies and procedures regarding how transaction data are reported and disseminated, and participants of registered security-based swap data repositories that are security- based swap dealers or major security-based swap participants would be required to establish and maintain policies and procedures that are reasonably designed to ensure that they comply with applicable reporting obligations. Finally, proposed Regulation SBSR also would require a registered SDR to register with the Commission as a securities information processor on existing Form SIP. ---------------------------------------------------------------------------
Bennett, Elena M.
2018-01-01
As the production of non-traditional export (NTX) crops by smallholder households in developing countries expands, there is a compelling need to understand the potential effects of this type of agricultural production on household food security and nutrition. We use two household surveys with a sample of 52 households, interviews, and focus groups to examine whether smallholder farmers who produce broccoli for export in a rural Guatemalan community have different household food security than farmers in the same community who are still growing traditional maize and bean crops. We explore and compare the food security status of broccoli farmers (adopters) and traditional farmers (non-adopters) across four dimensions of food security: availability, access, utilization, and stability. Adopters earned significantly more income (40%) than non-adopters, but higher incomes did not coincide with improvements in food availability, food access, or food utilization. Results indicate that adopters and non-adopters alike struggle with access to food, while the intensity of broccoli production may be undermining the ability of local agricultural systems to naturally control pests and regulate nutrients. More systematic approaches to food security assessment, especially those that consider all four dimensions of food security, are needed to better target interventions designed to alleviate food insecurity among rural smallholders. PMID:29795691
Méthot, Josée; Bennett, Elena M
2018-01-01
As the production of non-traditional export (NTX) crops by smallholder households in developing countries expands, there is a compelling need to understand the potential effects of this type of agricultural production on household food security and nutrition. We use two household surveys with a sample of 52 households, interviews, and focus groups to examine whether smallholder farmers who produce broccoli for export in a rural Guatemalan community have different household food security than farmers in the same community who are still growing traditional maize and bean crops. We explore and compare the food security status of broccoli farmers (adopters) and traditional farmers (non-adopters) across four dimensions of food security: availability, access, utilization, and stability. Adopters earned significantly more income (40%) than non-adopters, but higher incomes did not coincide with improvements in food availability, food access, or food utilization. Results indicate that adopters and non-adopters alike struggle with access to food, while the intensity of broccoli production may be undermining the ability of local agricultural systems to naturally control pests and regulate nutrients. More systematic approaches to food security assessment, especially those that consider all four dimensions of food security, are needed to better target interventions designed to alleviate food insecurity among rural smallholders.
Tobacco Use and Attachment Style in Appalachia.
Wise, Mary Heath; Weierbach, Florence; Cao, Yan; Phillips, Ken
2017-07-01
Tobacco has been recognized as the number one cause of preventable death in America and results in almost 5.2 million years of potential life lost each year. The use of tobacco products is highly correlated with pulmonary disease, cardiovascular disease, and other forms of chronic illness in America. New tobacco products are trending in the tobacco market such as the water pipe/hookah and e-cigarettes. With e-cigarettes and other newer forms of tobacco on the rise, it is important to look at the underlying factors for using all kinds of tobacco products as a means of prevention. Certain adult attachment styles (secure, preoccupied, dismissing-avoidant, and fearful-avoidant) in emotionally meaningful relationships could be indicators for physical illness, mental illness, and even addiction. This study investigated whether or not there is a relationship between tobacco use and attachment style. Based on a university-wide survey that was sent out at a university in Appalachia with 522 participants, demographic data revealed 68.5% (n = 358) did not currently use tobacco products. Of those who did currently use tobacco products 54.5% (n = 90) were male, 84.8% (n = 140) were undergraduate students, and 66.7% (n = 110) were between the ages of 18-25. For individuals who used tobacco 23.5% (n = 38) were in the secure attachment group, 27.8% (n = 45) were in the dismissing-avoidant attachment group, 30.2% (n = 49) were in the fearful-avoidant attachment group, and 18.5% (n = 30) were in the preoccupied attachment group. Chi Square analysis demonstrated that attachment style was significantly (p < 0.001) different between tobacco users and non-users revealing that there is a possibility for prevention of smoking initiation through the development of a secure attachment style.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-22
... Communication Capabilities, Components Thereof, and Products Containing Same; Institution of Investigation... VirnetX, Inc., of Zephyr Cove, Nevada and Science Applications International Corporation of McLean... sale within the United States after importation of certain devices with secure communication...
Moving toward energy security and sustainability in 2050 by reconfiguring biofuel production
USDA-ARS?s Scientific Manuscript database
To achieve energy security and sustainability by 2050 requires reconfiguring biofuel production both by building on current infrastructure and existing technology and also by making substantial improvements and changes in the feedstocks used, the process technologies applied, and the fuels produced....
27 CFR 19.967 - Additional security.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Additional security. 19.967 Section 19.967 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS DISTILLED SPIRITS PLANTS Distilled Spirits For Fuel Use Construction...
Spatially Explicit Life Cycle Assessment of Biofuel Feedstock Production
Biofuels derived from renewable resources have gained increased research and development priority due to increasing energy demand and national security concerns. In the US, the Energy Independence and Security Act (EISA) of 2007 mandated the annual production of 56.8 billion L of...
Bayesian performance metrics of binary sensors in homeland security applications
NASA Astrophysics Data System (ADS)
Jannson, Tomasz P.; Forrester, Thomas C.
2008-04-01
Bayesian performance metrics, based on such parameters, as: prior probability, probability of detection (or, accuracy), false alarm rate, and positive predictive value, characterizes the performance of binary sensors; i.e., sensors that have only binary response: true target/false target. Such binary sensors, very common in Homeland Security, produce an alarm that can be true, or false. They include: X-ray airport inspection, IED inspections, product quality control, cancer medical diagnosis, part of ATR, and many others. In this paper, we analyze direct and inverse conditional probabilities in the context of Bayesian inference and binary sensors, using X-ray luggage inspection statistical results as a guideline.
Safety Psychology Applicating on Coal Mine Safety Management Based on Information System
NASA Astrophysics Data System (ADS)
Hou, Baoyue; Chen, Fei
In recent years, with the increase of intensity of coal mining, a great number of major accidents happen frequently, the reason mostly due to human factors, but human's unsafely behavior are affected by insecurity mental control. In order to reduce accidents, and to improve safety management, with the help of application security psychology, we analyse the cause of insecurity psychological factors from human perception, from personality development, from motivation incentive, from reward and punishment mechanism, and from security aspects of mental training , and put forward countermeasures to promote coal mine safety production,and to provide information for coal mining to improve the level of safety management.
Survey of holographic security systems
NASA Astrophysics Data System (ADS)
Kontnik, Lewis T.; Lancaster, Ian M.
1990-04-01
The counterfeiting of products and financial instruments is a major problem throughout the world today. The dimensions of the problem are growing, accelerated by the expanding availability of production technologies to sophisticated counterfeiters and the increasing capabilities of these technologies. Various optical techniques, including holography, are beingused in efforts to mark authentic products and to distinguish them from copies. Industry is recognizing that the effectiveness of these techniques depends on such factors as the economics of the counterfeiting process and the distribution channels for the products involved, in addition to the performance of the particular optical security technologies used. This paper surveys the nature of the growing counterfeit market place and reviews the utility of holographic optical security systems. In particular, we review the use of holograms on credit cards and other products; and outline certain steps the holography industry should take to promote these application.
Code of Federal Regulations, 2010 CFR
2010-04-01
... narrow-based security index for indexes composed of debt securities. 240.3a55-4 Section 240.3a55-4... Miscellaneous Exemptions § 240.3a55-4 Exclusion from definition of narrow-based security index for indexes composed of debt securities. (a) An index is not a narrow-based security index if: (1)(i) Each of the...
NASA Astrophysics Data System (ADS)
Sembiring, S. A.
2018-02-01
The objective of this research is to analyze the impacts of rice policy on the household food security. The research used cross section data, were collected from 74 respondent as determined by purposive sampling in Sei Rejo villages, the Sub District of Sei Rampah, Serdang Bedagai District in the Province of North Sumatera. Rice policy model specification uses the simultaneous equations consisting of 6 structural equations and 6 identity equations which was estimated using Two Stages Least Squares (2SLS) method. The results show that the effectiveness of government purchase price of dried harvest paddy gave a positive impact on paddy planted area and lead to an increase paddy production and an increase of the rice production gave a positive impact on household rice availability and household rice surplus, and the increase of household rice surplus gave the quantity of Raskin decrease, whereas the increase of fertilizers gave a negative impact on paddy planted area and lead to decrease paddy production and to decrease in rice production was followed by an decrease in household rice availability and household rice surplus, and the decrease of household rice surplus gave the quantity of Raskin increase.
Fisk-based criteria to support validation of detection methods for drinking water and air.
DOE Office of Scientific and Technical Information (OSTI.GOV)
MacDonell, M.; Bhattacharyya, M.; Finster, M.
2009-02-18
This report was prepared to support the validation of analytical methods for threat contaminants under the U.S. Environmental Protection Agency (EPA) National Homeland Security Research Center (NHSRC) program. It is designed to serve as a resource for certain applications of benchmark and fate information for homeland security threat contaminants. The report identifies risk-based criteria from existing health benchmarks for drinking water and air for potential use as validation targets. The focus is on benchmarks for chronic public exposures. The priority sources are standard EPA concentration limits for drinking water and air, along with oral and inhalation toxicity values. Many contaminantsmore » identified as homeland security threats to drinking water or air would convert to other chemicals within minutes to hours of being released. For this reason, a fate analysis has been performed to identify potential transformation products and removal half-lives in air and water so appropriate forms can be targeted for detection over time. The risk-based criteria presented in this report to frame method validation are expected to be lower than actual operational targets based on realistic exposures following a release. Note that many target criteria provided in this report are taken from available benchmarks without assessing the underlying toxicological details. That is, although the relevance of the chemical form and analogues are evaluated, the toxicological interpretations and extrapolations conducted by the authoring organizations are not. It is also important to emphasize that such targets in the current analysis are not health-based advisory levels to guide homeland security responses. This integrated evaluation of chronic public benchmarks and contaminant fate has identified more than 200 risk-based criteria as method validation targets across numerous contaminants and fate products in drinking water and air combined. The gap in directly applicable values is considerable across the full set of threat contaminants, so preliminary indicators were developed from other well-documented benchmarks to serve as a starting point for validation efforts. By this approach, at least preliminary context is available for water or air, and sometimes both, for all chemicals on the NHSRC list that was provided for this evaluation. This means that a number of concentrations presented in this report represent indirect measures derived from related benchmarks or surrogate chemicals, as described within the many results tables provided in this report.« less
Code of Federal Regulations, 2010 CFR
2010-04-01
... options with persons other than brokers, dealers, futures commission merchants, floor brokers, or floor... securities, commodity futures, or commodity options with persons other than brokers, dealers, persons....43 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS...
Code of Federal Regulations, 2010 CFR
2010-04-01
...' Benefits SOCIAL SECURITY ADMINISTRATION TESTIMONY BY EMPLOYEES AND THE PRODUCTION OF RECORDS AND... Security Administration, 300 Altmeyer Building, 6401 Security Blvd., Baltimore, MD 21235-6401. ...
Rural income transfer programs and rural household food security in Ethiopia.
Uraguchi, Zenebe B
2012-01-01
Based on household food security surveys conducted in Ethiopia, this study seeks to understand the roles and limitations of income transfer projects as determinants of households’ food security. By covering the Food-For-Work Programs (FFWPs) and the Productive Safety Net Programs (PSNPs), the study shows that these programs served as temporary safety nets for food availability, but they were limited in boosting the dietary diversity of households and their coping strategies. Households which participated in the programs increased their supply of food as a temporary buffer to seasonal asset depletion. However, participation in the programs was marred by inclusion error (food-secure households were included) and exclusion error (food-insecure households were excluded). Income transfer projects alone were not robust determinants of household food security. Rather, socio-demographic variables of education and family size as well as agricultural input of land size were found to be significant in accounting for changes in households’ food security. The programs in the research sites were funded through foreign aid, and the findings of the study imply the need to reexamine the approaches adopted by bilateral donors in allocating aid to Ethiopia. At the same time the study underscores the need to improve domestic policy framework in terms of engendering rural local institutional participation in project management.
IT Security Support for the Spaceport Command Control System Development
NASA Technical Reports Server (NTRS)
Varise, Brian
2014-01-01
My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.
Xu, Jianling; Ding, Yi
2015-01-01
Analyzing the early warning of food security, this paper sets the self-sufficiency rate as the principal indicator in a standpoint of supplement. It is common to use the quantitative methods to forecast and warning the insecurity. However, this paper considers more about the probable outcome when the government intervenes. By constructing the causal feedbacks among grain supplement, demand, productive input, and the policy factors to simulate the future food security in Jiangsu province, conclusions can be drawn as the following: (1) The situation of food security is insecure if the self-sufficiency rate is under 68.3% according to the development of system inertia. (2) it is difficult to guarantee the food security in Jiangsu just depending on the increase of grain sown area. (3) The valid solution to ensure the food security in Jiangsu is to improve the productivity. © 2015 Institute of Food Technologists®
Qi, Xiaoxing; Wang, Raymond Yu; Li, Jianchun; Zhang, Tao; Liu, Liming; He, Yanling
2018-05-01
Rapid population growth and environmental deterioration make ensuring food security with lower environmental costs fundamental to realizing sustainable development in China and other developing countries. The conceptual framework used in this paper integrates the major consequences of intensive agricultural land use and the diverse objectives of policymakers and farmers. It also offers an operational approach, based on farmers' diverse performance in grain production and farmland productivity, to assess food production and environmental impacts under foci-differentiated scenarios. Using data from farmer household surveys, soil surveys, land use images, and statistical yearbooks, this approach was tested using a regional case in China. The results indicate that, among all farmer types, the medium-scale farmers had a better comprehensive performance for grain production for yield, fertilizer and pesticide inputs, labor productivity, and sustainability. Therefore, grain yields can be increased and environmental costs reduced simultaneously through the use of policy instruments that encourage the transformation of trapped farmers into medium-scale farmers and balancing the proportion of single and double cropped rice. In addition, and in order to reduce grain losses caused by natural disasters and to prevent environmental degradation, robust policy measures should be developed to avoid the currently predominant cropping patterns that erode biodiversity. Copyright © 2018 Elsevier Ltd. All rights reserved.
The Policy Trade-off Between Energy Security and Climate Change in the GCC States
NASA Astrophysics Data System (ADS)
Shahbek, Shaikha Ali
Developing policies for energy security and climate change simultaneously can be very challenging as there is a trade-off. This research project strives to analyze the policies regarding the same that should be developed in the Gulf Co-operation Council (GCC) States which are; Saudi Arabia, Kuwait, Qatar, United Arab Emirates, Bahrain and Oman. Energy security is important in these countries because it is the prominent sector of their economies. Yet, the environment is being negatively impacted because of the energy production. There has been lot of international pressure on the GCC to divert its production and move towards clean energy production. It needs more research and development, as well as better economic diversification to maintain and improve the economic growth. Along with the literature review that has been used to study the cases and impacts of the GCC states, six in-depth interviews were conducted with professors, scholars and specialists in the environment and natural science fields to discuss about the GCC's situation. It has been alluded that the GCC states cannot be held solely responsible about the climate change because they are not the only energy producing nations in the world. Based on OPEC, there are 14 countries including the United States and China that also have prominent energy sectors. They should also be held accountable for the causes of environmental and climate change. This research provides recommendations for the GCC states to follow and apply in order to move forward with clean energy production, economic diversification and develop better policies.
A New Security Paradigm for Anti-Counterfeiting: Guidelines and an Implementation Roadmap
NASA Astrophysics Data System (ADS)
Lehtonen, Mikko
Product counterfeitingand piracy continue to plague brand and trademark owners across industry sectors. This chapter analyses the reasons for ineffectiveness of past technical anti-counterfeitingstrategies and formulates managerial guidelines for effective use of RFID in anti-counterfeiting. An implementation roadmap toward secure authentication of products tagged with EPC Gen-2 tags is proposed and possible supply chain locations for product checks are discussed.
Advances in Raman spectroscopy for explosive identification in aviation security
NASA Astrophysics Data System (ADS)
Santillán, Javier D.; Brown, Christopher D.; Jalenak, Wayne
2007-04-01
In the operational airport environment, the rapid identification of potentially hazardous materials such as improvised explosive devices, chemical warfare agents and flammable and explosive liquids is increasingly critical. Peroxide-based explosives pose a particularly insidious threat because they can be made from commonly available and relatively innocuous household chemicals, such as bleach and hydrogen peroxide. Raman spectroscopy has been validated as a valuable tool for rapid identification of chemicals, explosives, and narcotics and their precursors while allowing "line-of-sight" interrogation through bottles or other translucent containers. This enables safe identification of both precursor substances, such as acetone, and end-products, such as TATP, without direct sampling, contamination and exposure by security personnel. To date, Raman systems have been laboratory-based, requiring careful operation and maintenance by technology experts. The capital and ongoing expenses of these systems is also significant. Recent advances in Raman component technologies have dramatically reduced the footprint and cost, while improving the reliability and ease of use of Raman spectroscopy systems. Such technologies are not only bringing the lab to the field, but are also protecting civilians and security personnel in the process.
1999-01-01
This article reports on the PEDA (population changes, environment, socioeconomic development and agriculture) model and its implication for policy-making in Africa. PEDA is an interactive computer simulation model (developed for a Windows environment) demonstrating the long-term impacts of alternative national policies on food security status of the population. The model is based on multistate demographic techniques, projecting at the same time 8 different subgroups (by age and sex) in the population, and based on 3 dichotomous individual characteristics: urban/rural place of residence; literacy status; and food security status. Through the manipulation of scenario variables, the model enables the user to project the proportion of the population that will be food secure and food insecure for a chosen point in time. This model developed by Dr. W. Lutz, Director of the International Institute for Applied Systems Analysis, will serve as an advocacy tool to help convince policy-makers and country experts in Africa of the negative synergy arising from the interconnections of population growth, environmental deterioration, and declining agricultural production.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-04
... clarify that 2102(e) applies to trading halts in new derivative securities, so as to not be confused with... derivative securities products when a temporary interruption occurs in the calculation or wide dissemination... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65425; File No. SR-ISE-2011-61] Self-Regulatory...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-26
... Tapes, eliminated the distinction between Derivative Securities Products and Non-Derivative Securities... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71137; File No. SR-CHX-2013-22] Self-Regulatory...) \\1\\ of the Securities Exchange Act of 1934 (``Act'') \\2\\ and Rule 19b-4 thereunder,\\3\\ notice is...
Gruber, T
1996-01-01
The author presents guidelines to help a security department select a computer system to track security activities--whether it's a commercial software product, an in-house developed program, or a do-it-yourself designed system. Computerized security activity reporting, he believes, is effective and beneficial.
New color-shifting security devices
NASA Astrophysics Data System (ADS)
Moia, Franco
2004-06-01
The unbroken global increase of forgery and counterfeiting of valuable documents and products steadily requires improved types of optical security devices. Hence, the "security world" is actively seeking for new features which meet high security standards, look attractively and allow easy recognition. One special smart security device created by ROLIC's technology represents a cholesteric device combined with a phase image. On tilting, such devices reveal strong color shifts which are clearly visible to the naked eye. The additional latent image is invisible under normal lighting conditions but can be revealed to human eyes by means of a simple, commercially available linear sheet polarizer. Based on our earlier work, first published in 1981, we now have developed phase change guest-host devices combined with dye-doped cholesteric material for application in new security features. ROLIC has developed sophisticated material systems of cross-linkable cholesteric liquid crystals and suitable cross-linkable dyes which allow to create outstanding cholesteric color-shifting effects not only on light absorbing dark backgrounds but also on bright or even white backgrounds preserving the circularly polarizing state. The new security devices combine unambiguously 1st and 2nd level inspection features and show brilliant colors on black as well as on white substrates. On tilting, the security devices exhibit remarkable color shifts while the integrated hidden images can be revealed by use of a sheet polarizer. Furthermore, due to its very thin material layers, even demanding applications, such as on banknotes can be considered.
Methods of Organizational Information Security
NASA Astrophysics Data System (ADS)
Martins, José; Dos Santos, Henrique
The principle objective of this article is to present a literature review for the methods used in the security of information at the level of organizations. Some of the principle problems are identified and a first group of relevant dimensions is presented for an efficient management of information security. The study is based on the literature review made, using some of the more relevant certified articles of this theme, in international reports and in the principle norms of management of information security. From the readings that were done, we identified some of the methods oriented for risk management, norms of certification and good practice of security of information. Some of the norms are oriented for the certification of the product or system and others oriented to the processes of the business. There are also studies with the proposal of Frameworks that suggest the integration of different approaches with the foundation of norms focused on technologies, in processes and taking into consideration the organizational and human environment of the organizations. In our perspective, the biggest contribute to the security of information is the development of a method of security of information for an organization in a conflicting environment. This should make available the security of information, against the possible dimensions of attack that the threats could exploit, through the vulnerability of the organizational actives. This method should support the new concepts of "Network centric warfare", "Information superiority" and "Information warfare" especially developed in this last decade, where information is seen simultaneously as a weapon and as a target.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-04
... or options on futures, or any other related derivatives, which the ETP Holder acting as registered... or commodity, related futures or options on futures, or any other related derivatives, in an account... option or a security futures product, whose value is based, in whole or in part, upon the performance of...
Information Assurance Tasks Supporting the Processing of Electronic Records Archives
2007-03-01
3 Table 2. OpenVPN evaluation results...........................................................................................10 iv 1...operation of necessary security features and compare the network performance under OpenVPN (openvpn.net) operation with the network performance under no...VPN operation (non-VPN) in a gigabit network environment. The reason for selecting OpenVPN product was based on the previous findings of Khanvilkar
ERIC Educational Resources Information Center
Gleghorn, Gregory D.
2011-01-01
Human capital theory suggests the knowledge, skills, and abilities one obtains through experience, on-the-job training, or education enhances one's productivity. This research was based on human capital theory and promotability (i.e., upward mobility). The research offered in this dissertation shows what effect obtaining information security…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-07
... index? If there are trading pauses in an ETF but not in the stocks that underlie that ETF, what... price discovery for the ETF, the underlying stocks and other products? Are there other market-based... Exchange Traded Funds (``ETF''),\\3\\ Exchange Traded Vehicles (``ETV''),\\4\\ and Exchange Traded Notes (``ETN...
ERIC Educational Resources Information Center
Kaya, Sinem; Avci, Rasit
2016-01-01
Problem Statement: Future Anxiety (FA) and Trait Anxiety (TA) have negative effects on individuals' productivity, which can lead them to feelings of insecurity and eventually depression. Knowing more about future anxiety helps people feel more secure and produce more effectively for themselves, and eventually for society. This research examined…
How 21st century droughts affect food and environmental security
NASA Astrophysics Data System (ADS)
Kogan, Felix
The first 13th years of the 21st century has begun with a series of widespread, long and intensive droughts around the world. Extreme and severe-to-extreme intensity droughts covered 2-6% and 7-16% of the world land, respectively, affecting environment, economies and humans. These droughts reduced agricultural production, leading to food shortages, human health deterioration, poverty, regional disturbances, population migration and death. This presentation is a travelogue of the 21st century global and regional droughts during the warmest years of the past 100 years. These droughts were identified and monitored with the NOAA operational space technology, called Vegetation Health (VH), which has the longest period of observation and provide good data quality. The VH method was used for assessment of vegetation condition or health, including drought early detection and monitoring. The VH method is based on operational satellites data estimating both land surface greenness (NDVI) and thermal conditions. The 21st century droughts in the USA, Russia, Australia Argentina, Brazil, China, India and other principal grain producing countries were intensive, long, covered large areas and caused huge losses in agricultural production, which affected food and environmental security and led to food riots in some countries. This presentation investigate how droughts affect food and environmental security, if they can be detected earlier, how to monitor their area, intensity, duration and impacts and also their dynamics during the climate warming era with satellite-based vegetation health technology.
Amplitude-Phase Modulation, Topological Horseshoe and Scaling Attractor of a Dynamical System
NASA Astrophysics Data System (ADS)
Li, Chun-Lai; Li, Wen; Zhang, Jing; Xie, Yuan-Xi; Zhao, Yi-Bo
2016-09-01
A three-dimensional autonomous chaotic system is discussed in this paper. Some basic dynamical properties of the system, including phase portrait, Poincaré map, power spectrum, Kaplan-Yorke dimension, Lyapunov exponent spectra, signal amplitude and topological horseshoe are studied theoretically and numerically. The main finding by analysis is that the signal amplitude can be modulated via controlling the coefficients of the linear term, cross-product term and squared term simultaneously or respectively, and the phase of x3 can be modulated by the product of the coefficients of the linear term and cross-product term. Furthermore, scaling chaotic attractors of this system are achieved by modified projective synchronization with an optimization-based linear coupling method, which is safer for secure communications than the existed synchronization scheme since the scaling factors can be regarded as the security encoding key. Supported by Hunan Provincial Natural Science Foundation of China under Grant No. 2016JJ4036, University Natural Science Foundation of Jiangsu Province under Grant No. 14KJB120007 and the National Natural Science Foundation of China under Grant Nos. 11504176 and 11602084
NASA Astrophysics Data System (ADS)
Qiao, Jianmin; Yu, Deyong; Wang, Qianfeng; Liu, Yupeng
2018-06-01
Both crop distribution and climate change are important drivers for crop production and can affect food security, which is an important requirement for sustainable development. However, their effects on crop production are confounded and warrant detailed investigation. As a key area for food production that is sensitive to climate change, the agro-pastoral transitional zone (APTZ) plays a significant role in regional food security. To investigate the respective effects of crop distribution and climate change on crop production, the well-established GIS-based Environmental Policy Integrated Climate (EPIC) model was adopted with different scenario designs in this study. From 1980 to 2010, the crop distribution for wheat, maize, and rice witnessed a dramatic change due to agricultural policy adjustments and ecological engineering-related construction in the APTZ. At the same time, notable climate change was observed. The simulation results indicated that the climate change had a positive impact on the crop production of wheat, maize, and rice, while the crop distribution change led to an increase in the production of maize and rice, but a decrease in the wheat production. Comparatively, crop distribution change had a larger impact on wheat (-1.71 × 106 t) and maize (8.53 × 106 t) production, whereas climate change exerted a greater effect on rice production (0.58 × 106 t), during the period from 1980 to 2010 in the APTZ. This study is helpful to understand the mechanism of the effects of crop distribution and climate change on crop production, and aid policy makers in reducing the threat of future food insecurity.
NASA Astrophysics Data System (ADS)
Qiao, Jianmin; Yu, Deyong; Wang, Qianfeng; Liu, Yupeng
2017-07-01
Both crop distribution and climate change are important drivers for crop production and can affect food security, which is an important requirement for sustainable development. However, their effects on crop production are confounded and warrant detailed investigation. As a key area for food production that is sensitive to climate change, the agro-pastoral transitional zone (APTZ) plays a significant role in regional food security. To investigate the respective effects of crop distribution and climate change on crop production, the well-established GIS-based Environmental Policy Integrated Climate (EPIC) model was adopted with different scenario designs in this study. From 1980 to 2010, the crop distribution for wheat, maize, and rice witnessed a dramatic change due to agricultural policy adjustments and ecological engineering-related construction in the APTZ. At the same time, notable climate change was observed. The simulation results indicated that the climate change had a positive impact on the crop production of wheat, maize, and rice, while the crop distribution change led to an increase in the production of maize and rice, but a decrease in the wheat production. Comparatively, crop distribution change had a larger impact on wheat (-1.71 × 106 t) and maize (8.53 × 106 t) production, whereas climate change exerted a greater effect on rice production (0.58 × 106 t), during the period from 1980 to 2010 in the APTZ. This study is helpful to understand the mechanism of the effects of crop distribution and climate change on crop production, and aid policy makers in reducing the threat of future food insecurity.
Bialas, Andrzej
2010-01-01
The paper is focused on the security issues of sensors provided with processors and software and used for high-risk applications. Common IT related threats may cause serious consequences for sensor system users. To improve their robustness, sensor systems should be developed in a restricted way that would provide them with assurance. One assurance creation methodology is Common Criteria (ISO/IEC 15408) used for IT products and systems. The paper begins with a primer on the Common Criteria, and then a general security model of the intelligent sensor as an IT product is discussed. The paper presents how the security problem of the intelligent sensor is defined and solved. The contribution of the paper is to provide Common Criteria (CC) related security design patterns and to improve the effectiveness of the sensor development process. PMID:22315571
Water footprint as an indicator of agricultural productivity in African countries
NASA Astrophysics Data System (ADS)
Chico Zamanillo, Daniel; Zhang, Guoping; Mathews, Ruth
2017-04-01
Sub-Saharan Africa is one of the regions with the largest scope for improved agricultural development that would contribute to global food security while respecting environmental boundaries. More importantly, undernourishment is a challenge for many African countries and needs to be addressed to achieve the 2030 Agenda for Sustainable Development. This study was conducted to support the Netherlands Ministry of Foreign Affair's Inclusive Green Growth aim of increasing water use efficiency by 25% in Dutch financed projects. A water footprint profile was developed for 7 Sub-Saharan countries; Benin, Ethiopia, Ghana, Kenya, Mali, Mozambique and Rwanda. The profiles provide an overview of water use from the perspective of the goods produced within the country, the consumption of goods, in particular agricultural crops, whether these goods are produced domestically or imported from other countries and the level of blue water scarcity experienced in the country. Across all countries, key food crops such as maize, and sorghum have low water productivity relative to the global water footprint benchmark. Export crops such as tea in Kenya or cocoa in Ghana show a good performance over global production. Furthermore, the water footprint of crops over the period 2006-2013 was compared to data from the period 1996-2005. Changes in yield and the resulting changes in the water footprint were assessed for both food and export crops. Yields in food crops improved in some countries, and in some years, but not consistently across all countries and years. The greatest gains in water productivity were in key export crops. The results provide insights into whether improvements have been made in water productivity in recent years and through comparison with the global water footprint benchmark, remaining opportunities for further gains in water productivity were identified. Going forward, policies that will enhance further improvement in water productivity and support greater food and water security should be considered. Agricultural practices that have improved yields and reduced water footprints should be identified and evaluated for their relative contribution to higher water productivity and to guide investments in agricultural extension and technology. Crops should be selected based on their comparative advantage relative to the water footprint and yields as well as their contribution to livelihoods and economic growth. Water resource management and planning needs to meet water demands for economic development while protecting and enhancing ecosystem services. Trade-offs between water resources allocation to grow food crops versus export crops and resulting reliance on internal versus external water resources for food security should be assessed and used to guide decisions. Achievement of the Sustainable Development Goals will require a multi-pronged approach to improving agricultural practices, strengthening farmers' livelihoods, increasing food security and protecting water security. The water footprint as it has been used in this study can support sustainable development by building an understanding of the water consumed and polluted in producing goods and identifying the opportunities for improving water efficiency and land productivity.
Report: Information Security Series: Security Practices Safe Drinking Water Information System
Report #2006-P-00021, March 30, 2006. We found that the Office of Water (OW) substantially complied with many of the information security controls reviewed and had implemented practices to ensure production servers are monitored.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-12
...] Index and other specified exchange traded products.\\5\\ \\3\\ See ISE Rule 2100(c)(13). \\4\\ See Securities... that this threshold differentiation is appropriate because lower priced securities tend to be more...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-23
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Aspen Group Resources Corp., Commercial Concepts, Inc., Desert Health Products, Inc., Equalnet Communications Corp., Geneva Steel Holdings Corp... securities of Commercial Concepts, Inc. because it has not filed any periodic reports since the period ended...
Productivity and Job Security: Attrition--Benefits and Problems.
ERIC Educational Resources Information Center
National Center for Productivity and Quality of Working Life, Washington, DC.
Three case studies are presented to document different approaches to providing the job security which would encourage acceptance of technological changes that could result in productivity improvements. The intent is to assist union and management practitioners in handling similar problems in their own firms. Focus is on the utility of attrition…
30 CFR 250.1205 - Site security.
Code of Federal Regulations, 2014 CFR
2014-07-01
... security? You must: (1) Protect Federal production against production loss or theft; (2) Post a sign at... Supervisor as soon as possible, but no later than the next business day after discovery: (i) Theft or... on lines leaving a royalty or inventory storage tank, including load-out line valves, drain-line...
30 CFR 250.1205 - Site security.
Code of Federal Regulations, 2013 CFR
2013-07-01
... security? You must: (1) Protect Federal production against production loss or theft; (2) Post a sign at... Supervisor as soon as possible, but no later than the next business day after discovery: (i) Theft or... on lines leaving a royalty or inventory storage tank, including load-out line valves, drain-line...
30 CFR 250.1205 - Site security.
Code of Federal Regulations, 2011 CFR
2011-07-01
... site security? You must: (1) Protect Federal production against production loss or theft; (2) Post a... Regional Supervisor as soon as possible, but no later than the next business day after discovery: (i) Theft...) All valves on lines leaving a royalty or inventory storage tank, including load-out line valves, drain...
30 CFR 250.1205 - Site security.
Code of Federal Regulations, 2012 CFR
2012-07-01
... security? You must: (1) Protect Federal production against production loss or theft; (2) Post a sign at... Supervisor as soon as possible, but no later than the next business day after discovery: (i) Theft or... on lines leaving a royalty or inventory storage tank, including load-out line valves, drain-line...
Thinking big: Towards ideal strains and processes for large-scale aerobic biofuels production
DOE Office of Scientific and Technical Information (OSTI.GOV)
McMillan, James D.; Beckham, Gregg T.
In this study, global concerns about anthropogenic climate change, energy security and independence, and environmental consequences of continued fossil fuel exploitation are driving significant public and private sector interest and financing to hasten development and deployment of processes to produce renewable fuels, as well as bio-based chemicals and materials, towards scales commensurate with current fossil fuel-based production. Over the past two decades, anaerobic microbial production of ethanol from first-generation hexose sugars derived primarily from sugarcane and starch has reached significant market share worldwide, with fermentation bioreactor sizes often exceeding the million litre scale. More recently, industrial-scale lignocellulosic ethanol plants aremore » emerging that produce ethanol from pentose and hexose sugars using genetically engineered microbes and bioreactor scales similar to first-generation biorefineries.« less
Thinking big: Towards ideal strains and processes for large-scale aerobic biofuels production
McMillan, James D.; Beckham, Gregg T.
2016-12-22
In this study, global concerns about anthropogenic climate change, energy security and independence, and environmental consequences of continued fossil fuel exploitation are driving significant public and private sector interest and financing to hasten development and deployment of processes to produce renewable fuels, as well as bio-based chemicals and materials, towards scales commensurate with current fossil fuel-based production. Over the past two decades, anaerobic microbial production of ethanol from first-generation hexose sugars derived primarily from sugarcane and starch has reached significant market share worldwide, with fermentation bioreactor sizes often exceeding the million litre scale. More recently, industrial-scale lignocellulosic ethanol plants aremore » emerging that produce ethanol from pentose and hexose sugars using genetically engineered microbes and bioreactor scales similar to first-generation biorefineries.« less
Chasing helminths and their economic impact on farmed ruminants.
Charlier, Johannes; van der Voort, Mariska; Kenyon, Fiona; Skuce, Philip; Vercruysse, Jozef
2014-07-01
Global agriculture will be required to intensify production from a shrinking natural resource base. Helminth infections of ruminants are a major constraint on efficient livestock production. The current challenge is to develop diagnostic methods that detect the production impact of helminth infections on farms in order to target control measures and contribute to the global challenge of preserving food security. We review here our understanding of the effects of helminth infections and control practices on productivity and the diagnostic tools that can inform on this. By combining advances in helminth laboratory diagnostics and animal health economics, sustainable management of helminth infections can be integrated into the whole-farm economic context. Copyright © 2014 Elsevier Ltd. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
In October 2011, the UN Committee on World Food Security (CFS) recommended a ''review of biofuels policies -- where applicable and if necessary -- according to balanced science-based assessments of the opportunities and challenges that they may represent for food security so that biofuels can be produced where it is socially, economically and environmentally feasible to do so''. In line with this, the CFS requested the HLPE (High Level Panel of Experts) to ''conduct a science-based comparative literature analysis taking into consideration the work produced by the FAO and Global Bioenergy Partnership (GBEP) of the positive and negative effects ofmore » biofuels on food security''. Recommendations from the report include the following. Food security policies and biofuel policies cannot be separated because they mutually interact. Food security and the right to food should be priority concerns in the design of any biofuel policy. Governments should adopt the principle: biofuels shall not compromise food security and therefore should be managed so that food access or the resources necessary for the production of food, principally land, biodiversity, water and labour are not put at risk. The CFS should undertake action to ensure that this principle is operable in the very varied contexts in which all countries find themselves. Given the trend to the emergence of a global biofuels market, and a context moving from policy-driven to market-driven biofuels, there is an urgent need for close and pro-active coordination of food security, biofuel/bioenergy policies and energy policies, at national and international levels, as well as rapid response mechanisms in case of crisis. There is also an urgent need to create an enabling, responsible climate for food and non-food investments compatible with food security. The HLPE recommends that governments adopt a coordinated food security and energy security strategy, which would require articulation around the following five axes/dimensions: Adapt to the change to global, market-driven dynamics; Address the land, water and resource implications of biofuel policies; Foster the transition from biofuels to comprehensive food-energy policies; Promote research and development; and, Develop methods and guidelines for coordinated food, Biofuels, and bio-energy policies at national and international levels.« less
Orrell, Peter; Bennett, Alison E.
2013-01-01
Can above–belowground interactions help address issues of food security? We address this question in this manuscript, and review the intersection of above–belowground interactions and food security. We propose that above–belowground interactions could address two strategies identified by Godfray etal. (2010): reducing the Yield Gap, and Increasing Production Limits. In particular, to minimize the difference between potential and realized production (The Yield Gap) above–belowground interactions could be manipulated to reduce losses to pests and increase crop growth (and therefore yields). To Increase Production Limits we propose two mechanisms: utilizing intercropping (which uses multiple aspects of above–belowground interactions) and breeding for traits that promote beneficial above–belowground interactions, as well as breeding mutualistic organisms to improve their provided benefit. As a result, if they are managed correctly, there is great potential for above–belowground interactions to contribute to food security. PMID:24198821
Food security and cardioprotection: the polar lipid link.
Zabetakis, Ioannis
2013-08-01
The projected increase in world population and therefore demand for food in the foreseeable future pose some risks on how secure is the food production system today. Millions of people are threatened by malnutrition, cardiovascular diseases (CVDs), diabetes, and obesity. This is a multidimensional challenge: the production of food needs to be increased but also the quality of food needs to be improved so less people suffer from undernourishment and CVDs. This hypothesis paper addresses this problem by critically evaluating recent developments on the role of food components against CVDs, presenting recent insights for assessing the nutritional value of food and suggesting novel approaches toward the sustainable production of food that would, in turn, lead to increased food security. The issue of the sustainability of lipid sources and genetically modified crops is also discussed from a food security point of view. © 2013 Institute of Food Technologists®
Food security -- an insurance approach.
1979-01-01
An adequate standard of nutrition at national and individual level is a basic -- and not wholly altruistic -- objective for mankind. Its ingredients are food production and distribution. Of these the latter is currently considered the more limiting, but fluctuations in the former -- over various geographical and time scales -- can be the overriding factor when national supplies are critical. Under these conditions the automatic operations of a legal mandatory food support system -- free from political strings or connotations of welfare -- would be advantageous. A system for providing a measure of food security, using insurance principles and based on a compromise between international stockpiling and direct financial subventions, is outlined in a recent publication of the International Food Policy Research Institute. Essentially it is a means by which the international community could contribute to the food security of food deficit, developing countries without having to create large buffer stocks and stabilize world grain prices. Extracts from this publication are given below.
NASA Astrophysics Data System (ADS)
Ali, Hatamirad; Hasan, Mehrjerdi
Automotive industry and car production process is one of the most complex and large-scale production processes. Today, information technology (IT) and ERP systems incorporates a large portion of production processes. Without any integrated systems such as ERP, the production and supply chain processes will be tangled. The ERP systems, that are last generation of MRP systems, make produce and sale processes of these industries easier and this is the major factor of development of these industries anyhow. Today many of large-scale companies are developing and deploying the ERP systems. The ERP systems facilitate many of organization processes and make organization to increase efficiency. The security is a very important part of the ERP strategy at the organization, Security at the ERP systems, because of integrity and extensive, is more important of local and legacy systems. Disregarding of this point can play a giant role at success or failure of this kind of systems. The IRANKHODRO is the biggest automotive factory in the Middle East with an annual production over 600.000 cars. This paper presents ERP security deployment experience at the "IRANKHODRO Company". Recently, by launching ERP systems, it moved a big step toward more developments.
Guidelines for computer security in general practice.
Schattner, Peter; Pleteshner, Catherine; Bhend, Heinz; Brouns, Johan
2007-01-01
As general practice becomes increasingly computerised, data security becomes increasingly important for both patient health and the efficient operation of the practice. To develop guidelines for computer security in general practice based on a literature review, an analysis of available information on current practice and a series of key stakeholder interviews. While the guideline was produced in the context of Australian general practice, we have developed a template that is also relevant for other countries. Current data on computer security measures was sought from Australian divisions of general practice. Semi-structured interviews were conducted with general practitioners (GPs), the medical software industry, senior managers within government responsible for health IT (information technology) initiatives, technical IT experts, divisions of general practice and a member of a health information consumer group. The respondents were asked to assess both the likelihood and the consequences of potential risks in computer security being breached. The study suggested that the most important computer security issues in general practice were: the need for a nominated IT security coordinator; having written IT policies, including a practice disaster recovery plan; controlling access to different levels of electronic data; doing and testing backups; protecting against viruses and other malicious codes; installing firewalls; undertaking routine maintenance of hardware and software; and securing electronic communication, for example via encryption. This information led to the production of computer security guidelines, including a one-page summary checklist, which were subsequently distributed to all GPs in Australia. This paper maps out a process for developing computer security guidelines for general practice. The specific content will vary in different countries according to their levels of adoption of IT, and cultural, technical and other health service factors. Making these guidelines relevant to local contexts should help maximise their uptake.
17 CFR 240.15c3-3 - Customer protection-reserves and custody of securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... or dealer has received or acquired or holds funds or securities for the account of that person. The... extent that broker or dealer maintains an omnibus account for the account of customers with the broker or... person has a claim for security futures products held in a futures account, or any security futures...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-25
... same underlying security would be detrimental to the success of this new product offering and would... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69161; File No. SR-NYSEArca-2013-26] Self... Certain Securities March 18, 2013. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Act of 1934...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-16
... (``Restricted Market Maker'') in a derivative securities product (``UTP Derivative Security'') that derives its... in a UTP Derivative Security on the Exchange is prohibited from acting or registering as a Market Maker on any other exchange in any Reference Asset of that UTP Derivative Security, or any derivative...
Natural language processing-based COTS software and related technologies survey.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stickland, Michael G.; Conrad, Gregory N.; Eaton, Shelley M.
Natural language processing-based knowledge management software, traditionally developed for security organizations, is now becoming commercially available. An informal survey was conducted to discover and examine current NLP and related technologies and potential applications for information retrieval, information extraction, summarization, categorization, terminology management, link analysis, and visualization for possible implementation at Sandia National Laboratories. This report documents our current understanding of the technologies, lists software vendors and their products, and identifies potential applications of these technologies.
Microbial bio-fuels: a solution to carbon emissions and energy crisis.
Kumar, Arun; Kaushal, Sumit; Saraf, Shubhini A; Singh, Jay Shankar
2018-06-01
Increasing energy demand, limited fossil fuel resources and climate change have prompted development of alternative sustainable and economical fuel resources such as crop-based bio-ethanol and bio-diesel. However, there is concern over use of arable land that is used for food agriculture for creation of biofuel. Thus, there is a renewed interest in the use of microbes particularly microalgae for bio-fuel production. Microbes such as micro-algae and cyanobacteria that are used for biofuel production also produce other bioactive compounds under stressed conditions. Microbial agents used for biofuel production also produce bioactive compounds with antimicrobial, antiviral, anticoagulant, antioxidant, antifungal, anti-inflammatory and anticancer activity. Because of importance of such high-value compounds in aquaculture and bioremediation, and the potential to reduce carbon emissions and energy security, the biofuels produced by microbial biotechnology might substitute the crop-based bio-ethanol and bio-diesel production.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-03
... SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 240 [Release No. 34-64766; File No. S7-25-11] RIN 3235-AL10 Business Conduct Standards for Security-Based Swap Dealers and Major Security-Based Swap Participants Correction In proposed rule document number 2011-16758, appearing on pages 42396-42455 in the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-23
... context of the security-based swap dealer definition, for affiliated groups with a registered security... for Affiliated Groups with Registered Security-Based Swap Dealers); Rule 3a71-5 (Substituted... 13n-12 (Exemption from Requirements Governing Security-Based Swap Data Repositories for Certain Non-U...
The role of grasslands in food security and climate change
O'Mara, F. P.
2012-01-01
Background Grasslands are a major part of the global ecosystem, covering 37 % of the earth's terrestrial area. For a variety of reasons, mostly related to overgrazing and the resulting problems of soil erosion and weed encroachment, many of the world's natural grasslands are in poor condition and showing signs of degradation. This review examines their contribution to global food supply and to combating climate change. Scope Grasslands make a significant contribution to food security through providing part of the feed requirements of ruminants used for meat and milk production. Globally, this is more important in food energy terms than pig meat and poultry meat. Grasslands are considered to have the potential to play a key role in greenhouse gas mitigation, particularly in terms of global carbon storage and further carbon sequestration. It is estimated that grazing land management and pasture improvement (e.g. through managing grazing intensity, improved productivity, etc) have a global technical mitigation potential of almost 1·5 Gt CO2 equivalent in 2030, with additional mitigation possible from restoration of degraded lands. Milk and meat production from grassland systems in temperate regions has similar emissions of carbon dioxide per kilogram of product as mixed farming systems in temperate regions, and, if carbon sinks in grasslands are taken into account, grassland-based production systems can be as efficient as high-input systems from a greenhouse gas perspective. Conclusions Grasslands are important for global food supply, contributing to ruminant milk and meat production. Extra food will need to come from the world's existing agricultural land base (including grasslands) as the total area of agricultural land has remained static since 1991. Ruminants are efficient converters of grass into humanly edible energy and protein and grassland-based food production can produce food with a comparable carbon footprint as mixed systems. Grasslands are a very important store of carbon, and they are continuing to sequester carbon with considerable potential to increase this further. Grassland adaptation to climate change will be variable, with possible increases or decreases in productivity and increases or decreases in soil carbon stores. PMID:23002270
The role of grasslands in food security and climate change.
O'Mara, F P
2012-11-01
Grasslands are a major part of the global ecosystem, covering 37 % of the earth's terrestrial area. For a variety of reasons, mostly related to overgrazing and the resulting problems of soil erosion and weed encroachment, many of the world's natural grasslands are in poor condition and showing signs of degradation. This review examines their contribution to global food supply and to combating climate change. Grasslands make a significant contribution to food security through providing part of the feed requirements of ruminants used for meat and milk production. Globally, this is more important in food energy terms than pig meat and poultry meat. Grasslands are considered to have the potential to play a key role in greenhouse gas mitigation, particularly in terms of global carbon storage and further carbon sequestration. It is estimated that grazing land management and pasture improvement (e.g. through managing grazing intensity, improved productivity, etc) have a global technical mitigation potential of almost 1·5 Gt CO(2) equivalent in 2030, with additional mitigation possible from restoration of degraded lands. Milk and meat production from grassland systems in temperate regions has similar emissions of carbon dioxide per kilogram of product as mixed farming systems in temperate regions, and, if carbon sinks in grasslands are taken into account, grassland-based production systems can be as efficient as high-input systems from a greenhouse gas perspective. Grasslands are important for global food supply, contributing to ruminant milk and meat production. Extra food will need to come from the world's existing agricultural land base (including grasslands) as the total area of agricultural land has remained static since 1991. Ruminants are efficient converters of grass into humanly edible energy and protein and grassland-based food production can produce food with a comparable carbon footprint as mixed systems. Grasslands are a very important store of carbon, and they are continuing to sequester carbon with considerable potential to increase this further. Grassland adaptation to climate change will be variable, with possible increases or decreases in productivity and increases or decreases in soil carbon stores.
Survey of Machine Learning Methods for Database Security
NASA Astrophysics Data System (ADS)
Kamra, Ashish; Ber, Elisa
Application of machine learning techniques to database security is an emerging area of research. In this chapter, we present a survey of various approaches that use machine learning/data mining techniques to enhance the traditional security mechanisms of databases. There are two key database security areas in which these techniques have found applications, namely, detection of SQL Injection attacks and anomaly detection for defending against insider threats. Apart from the research prototypes and tools, various third-party commercial products are also available that provide database activity monitoring solutions by profiling database users and applications. We present a survey of such products. We end the chapter with a primer on mechanisms for responding to database anomalies.
Inland capture fishery contributions to global food security and threats to their future
Youn, So-Jung; Taylor, William W.; Lynch, Abigail J.; Cowx, Ian G.; Beard, T. Douglas; Bartley, Devin; Wu, Felicia
2014-01-01
Inland fish and fisheries play important roles in ensuring global food security. They provide a crucial source of animal protein and essential micronutrients for local communities, especially in the developing world. Data concerning fisheries production and consumption of freshwater fish are generally inadequately assessed, often leading decision makers to undervalue their importance. Modification of inland waterways for alternative uses of freshwater (particularly dams for hydropower and water diversions for human use) negatively impacts the productivity of inland fisheries for food security at local and regional levels. This paper highlights the importance of inland fisheries to global food security, the challenges they face due to competing demands for freshwater, and possible solutions.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-29
... to security futures), and in either case cleared through the Options Clearing Corporation (``OCC... contract market or derivatives transaction execution facility for transactions for future delivery in any... of the Options and Security Futures on Gold and Silver Products. In enacting Section 4(c), Congress...
17 CFR 41.31 - Notice-designation requirements.
Code of Federal Regulations, 2014 CFR
2014-04-01
... designated contract market in security futures products under section 5f of the Act, shall so notify the Commission. Such notification shall be filed with the Secretary of the Commission at its Washington, D.C... Market in Security Futures Products,” and shall include: (1) The name and address of the board of trade...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] American Energy Production, Inc., Best Energy Services, Inc., Community Central Bank Corporation, Explortex Energy, Inc., HemoBioTech, Inc., Larrea... securities of HemoBioTech, Inc. because it has not filed any periodic reports since the period ended December...
Productivity and Job Security: Retraining to Adapt to Technological Change.
ERIC Educational Resources Information Center
National Center for Productivity and Quality of Working Life, Washington, DC.
This report, the first of a series on productivity and job security, presents five case studies to illustrate retraining to achieve worker's adjustment to technology. The first of seven chapters addresses the following issues: the availability of job training/retraining data, the desirability of informing workers in advance of technological…
The role of plant pathology and plant pathology journals in future food security
USDA-ARS?s Scientific Manuscript database
The world's population is expected to exceed 9 billion by 2050 and this will require a significant increase in crop production for global food security. Future increases in crop production will require limiting the effects of weeds, insects, and diseases incited by fungi, viruses, nematodes, and ba...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Procedures for implementing derivatives clearing organization rules and clearing new products. 39.4 Section 39.4 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION DERIVATIVES CLEARING ORGANIZATIONS § 39.4 Procedures for...
20 CFR 498.103 - Amount of penalty.
Code of Federal Regulations, 2011 CFR
2011-04-01
... media regarding products or services provided free of charge by the Social Security Administration and a... Employees' Benefits SOCIAL SECURITY ADMINISTRATION CIVIL MONETARY PENALTIES, ASSESSMENTS AND RECOMMENDED... of the Social Security Act for the use and benefit of another individual, and who converts such...
20 CFR 498.103 - Amount of penalty.
Code of Federal Regulations, 2013 CFR
2013-04-01
... media regarding products or services provided free of charge by the Social Security Administration and a... Employees' Benefits SOCIAL SECURITY ADMINISTRATION CIVIL MONETARY PENALTIES, ASSESSMENTS AND RECOMMENDED... of the Social Security Act for the use and benefit of another individual, and who converts such...
20 CFR 498.103 - Amount of penalty.
Code of Federal Regulations, 2014 CFR
2014-04-01
... media regarding products or services provided free of charge by the Social Security Administration and a... Employees' Benefits SOCIAL SECURITY ADMINISTRATION CIVIL MONETARY PENALTIES, ASSESSMENTS AND RECOMMENDED... of the Social Security Act for the use and benefit of another individual, and who converts such...
20 CFR 498.103 - Amount of penalty.
Code of Federal Regulations, 2012 CFR
2012-04-01
... media regarding products or services provided free of charge by the Social Security Administration and a... Employees' Benefits SOCIAL SECURITY ADMINISTRATION CIVIL MONETARY PENALTIES, ASSESSMENTS AND RECOMMENDED... of the Social Security Act for the use and benefit of another individual, and who converts such...
20 CFR 498.103 - Amount of penalty.
Code of Federal Regulations, 2010 CFR
2010-04-01
... media regarding products or services provided free of charge by the Social Security Administration and a... Employees' Benefits SOCIAL SECURITY ADMINISTRATION CIVIL MONETARY PENALTIES, ASSESSMENTS AND RECOMMENDED... of the Social Security Act for the use and benefit of another individual, and who converts such...
17 CFR 41.2 - Required records.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Required records. 41.2 Section 41.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS General Provisions § 41.2 Required records. A designated contract market or registered derivatives...
Holographic optical security systems
NASA Astrophysics Data System (ADS)
Fagan, William F.
1990-06-01
One of the most successful applications of Holography,in recent years,has been its use as an optical security technique.Indeed the general public's awareness of holograms has been greatly enhanced by the incorporation of holographic elements into the VISA and MASTERCHARGE credit cards.Optical techniques related to Holography,are also being used to protect the currencies of several countries against the counterfeiter. The mass production of high quality holographic images is by no means a trivial task as a considerable degree of expertise is required together with an optical laboratory and embossing machinery.This paper will present an overview of the principal holographic and related optical techniques used for security purposes.Worldwide, over thirty companies are involved in the production of security elements utilising holographic and related optical technologies.Counterfeiting of many products is a major criminal activity with severe consequences not only for the manufacturer but for the public in general as defective automobile parts,aircraft components,and pharmaceutical products, to cite only a few of the more prominent examples,have at one time or another been illegally copied.
A vital link: water and vegetation in the Anthropocene
NASA Astrophysics Data System (ADS)
Gerten, D.
2013-04-01
This paper argues that the interplay of water, carbon and vegetation dynamics is fundamental to some global trends in the current and conceivable future Anthropocene. Supported by simulations with a process-based biosphere model and a literature review, it demonstrates that the connectivity of freshwater and vegetation dynamics is vital for water security, food security and (terrestrial) ecosystem integrity alike. The water limitation of net primary production of both natural and agricultural plants - already pronounced in many regions - is shown to increase in many places under projected climate change, though this development is partially offset by water-saving direct CO2 effects. Natural vegetation can to some degree adapt dynamically to higher water limitation, but agricultural crops require some form of active management to overcome it - among them irrigation, soil conservation and expansion into still uncultivated areas. While crucial to secure food production for a growing world population, such human interventions in water-vegetation systems have, as also shown, repercussions to the water cycle. Indeed, land use changes have been shown to be the second-most important influence on the terrestrial water balance in recent times. Furthermore, climate change regionally increases irrigation demand and decreases freshwater availability, impeding on rainfed and irrigated food production (if not CO2 effects counterbalance this impact - which is unlikely at least in poorly managed systems). Drawing from these exemplary investigations, some research perspectives on how to further improve our quantitative knowledge of human-water-vegetation interactions in the Anthropocene are outlined.
Future sustainability forecasting by exchange markets: basic theory and an application.
Malyshkina, Nataliya; Niemeier, Deb
2010-12-01
Setting sustainability targets and evaluating systems progress are of great importance nowadays due to threats to the human society, to economic development and to ecosystems, posed by unsustainable human activities. This research establishes a probabilistic theoretical approach based on market expectations reflected in prices of publicly traded securities to estimate the time horizon until the appearance of new technologies related to replacement of nonrenewable resources, for example, crude oil and oil products. To assess time T when technological innovations are likely to appear, we apply advanced pricing equations, based on a stochastic discount factor to those traded securities whose future cash flows critically depend on appearance of such innovations. In a simple approximation of the proposed approach applied to replacement of crude oil and oil products, we obtain T ≈ (P(0)(oil)/C(0))·ln (Δ·P(0)(oil)/P(0)(alt)), where P(0)(oil) and P(0)(alt) are the current aggregate market capitalizations of oil and alternative-energy companies, C(0) is the annual aggregate dividends that oil companies pay to their shareholders at the present, and Δ is the fraction of the oil (oil products) replaced at time T. This formula gives T ≈ 131 years for replacement of gasoline and diesel. The proposed market-expectations approach may allow policymakers to effectively develop policies and plan for long-term changes.
Doyle, K A
1995-12-01
The increasing range and complexity of biologicals, and the greater demand for these products, have resulted in a greater volume of trade in animal-based biological material. This has given rise, in turn, to many approaches to the regulation of importation of these materials, as countries seek protection against the introduction of disease. Harmonization of these regulatory approaches would contribute significantly to the availability of veterinary biologicals, to their manufacture and trade, and to disease security. Australia has developed systems for the categorisation and evaluation of biologicals, control by import permits, and specific procedures at point-of-entry and in institutions where these products are used. Computerised records and precedents assist in evaluation and in the issuing of permits. Recognition that some materials must be subject to further control has led to a system of registration of institutions based on levels of biosecurity, and approved use and disposal programmes. Institutions vary from high-security animal health laboratories to human in vitro fertilisation clinics, which use animal-derived media and materials. Such institutions are regulated through quality assurance contracts. Quarantine authorities have linkages with other agencies which have an interest in these products. These linkages reflect the administrative structures of government in Australia, and provide for management of all forms of risk. The author describes these systems and overviews their biological basis.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-05
... chapter. * * * * * 0 3. On page 30747, in the third column, correct paragraph (hhh)(6)(iii)(B)(2) to read as follows: Sec. 1.3 Definitions. * * * * * (hhh) * * * (6) * * * (iii) * * * (B) * * * (2) The sum of the amount calculated under paragraph (hhh)(6)(iii)(B)(1) of this section and the product of the...
Securing World-Class Research in UK Universities: Exploring the Impact of Block Grant Funding
ERIC Educational Resources Information Center
Universities UK, 2009
2009-01-01
The UK research base is world class. It is second only to the USA on leading scientific indicators and crucially, during the current economic climate, ranks first on publication productivity and citations in relation to research and development public spend. Commonly known as quality-related (QR) funding because it is allocated selectively on the…
Impacts of Floods Events on Food Security
NASA Astrophysics Data System (ADS)
Caporali, E.; Pacetti, T.; Rulli, M. C.
2017-12-01
The analysis of the interactions among natural disasters and food security is particularly significant for developing countries where food availability (one of the four pillars of food security together with access, utilization and stability) can be highly jeopardize by extreme events that damage the primary access to food, i.e. the agriculture. The main objective of this study is to analyze the impact of flood events on food security for two disastrous flood events in Bangladesh on 2007 and in Pakistan on 2010, selected here as case studies based on the existing literature related to extreme floods.The adopted methodology integrates remote sensing data, agricultural statistics, and water footprint values in order to (i) evaluating the potentially affected agricultural areas; (ii) converting the affected areas into crop loss; (iii) estimating the associated calories and water footprint losses. In Bangladesh, the estimated lost rice is around 12.5% of the total potential production, which implies a 5.3% calories loss with respect to the total potential energy provided by rice and 4.4% of total WF associated to national food supply. In Pakistan, the results show a crops loss of 19% for sugarcane and 40% for rice, with a related calories loss of 8.5% and a WF loss of 13.5%.The results highlight the countries vulnerability to flood, being both countries strongly dependent on local agricultural production. The 2007 flood event reflected critically upon Bangladeshi food security, almost doubling the existing food deficit. The same happened in Pakistan where an already scarce food supply has been worsened by the 2010 flood.Method results are fully repeatable; whereas, for remote sensed data the sources of data are valid worldwide and the data regarding land use and crops characteristics are strongly site specific, which need to be carefully evaluated.These case studies stress the importance of integrating different analysis approaches to carry out an assessment of the meaningful connections between flood and food security and to enhance the resilience of territories.
Secure Encapsulation and Publication of Biological Services in the Cloud Computing Environment
Zhang, Weizhe; Wang, Xuehui; Lu, Bo; Kim, Tai-hoon
2013-01-01
Secure encapsulation and publication for bioinformatics software products based on web service are presented, and the basic function of biological information is realized in the cloud computing environment. In the encapsulation phase, the workflow and function of bioinformatics software are conducted, the encapsulation interfaces are designed, and the runtime interaction between users and computers is simulated. In the publication phase, the execution and management mechanisms and principles of the GRAM components are analyzed. The functions such as remote user job submission and job status query are implemented by using the GRAM components. The services of bioinformatics software are published to remote users. Finally the basic prototype system of the biological cloud is achieved. PMID:24078906
Secure encapsulation and publication of biological services in the cloud computing environment.
Zhang, Weizhe; Wang, Xuehui; Lu, Bo; Kim, Tai-hoon
2013-01-01
Secure encapsulation and publication for bioinformatics software products based on web service are presented, and the basic function of biological information is realized in the cloud computing environment. In the encapsulation phase, the workflow and function of bioinformatics software are conducted, the encapsulation interfaces are designed, and the runtime interaction between users and computers is simulated. In the publication phase, the execution and management mechanisms and principles of the GRAM components are analyzed. The functions such as remote user job submission and job status query are implemented by using the GRAM components. The services of bioinformatics software are published to remote users. Finally the basic prototype system of the biological cloud is achieved.
SRI PUFF 8 Computer Program for One-Dimensional Stress Wave Propagation
1980-03-01
raial product. UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE (Tfhen Data Entered) REPORT DOCUMENTATION PAGE READ INSTRUCTIONS BEFORE COMPLETING...EDITION OF I NOV 6S (S OBSOLETE UNCLASSIFIED SECURITY CLASSIFICATIOK OF THIS PAGE (When Data Entered) UNCLASSIFIED SECURITY CLASSIFICATION OF THIS...aspects of wave propagation calculations. UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGEfWhen Data Entered) FOREWORD This volume constitutes a
A MEMS-based, wireless, biometric-like security system
NASA Astrophysics Data System (ADS)
Cross, Joshua D.; Schneiter, John L.; Leiby, Grant A.; McCarter, Steven; Smith, Jeremiah; Budka, Thomas P.
2010-04-01
We present a system for secure identification applications that is based upon biometric-like MEMS chips. The MEMS chips have unique frequency signatures resulting from fabrication process variations. The MEMS chips possess something analogous to a "voiceprint". The chips are vacuum encapsulated, rugged, and suitable for low-cost, highvolume mass production. Furthermore, the fabrication process is fully integrated with standard CMOS fabrication methods. One is able to operate the MEMS-based identification system similarly to a conventional RFID system: the reader (essentially a custom network analyzer) detects the power reflected across a frequency spectrum from a MEMS chip in its vicinity. We demonstrate prototype "tags" - MEMS chips placed on a credit card-like substrate - to show how the system could be used in standard identification or authentication applications. We have integrated power scavenging to provide DC bias for the MEMS chips through the use of a 915 MHz source in the reader and a RF-DC conversion circuit on the tag. The system enables a high level of protection against typical RFID hacking attacks. There is no need for signal encryption, so back-end infrastructure is minimal. We believe this system would make a viable low-cost, high-security system for a variety of identification and authentication applications.
Clark, Heather; Whybrow, Stephen; de Ruiter, Henri; McNeill, Geraldine
2018-01-01
Nutrition security describes the adequacy of the food supply to meet not only energy but also macronutrient and micronutrient requirements for the population. The aim of this study was to develop a method to assess trends in national nutrition security and the contribution of imports to nutrition security, using the UK as a case study. Food supply data from FAO food balance sheets and national food composition tables were used to estimate the nutrient content of domestically produced food, imported food and exported food. Nutrition security was defined as the total nutrient supply (domestic production, minus exports, plus imports) to meet population-level nutrient requirements. The results showed that the UK was nutrition secure over the period 1961–2011 for energy, macronutrients and key micronutrients, with the exception of total carbohydrates and fibre, which may be due to the loss of fibre incurred by processing cereals into refined products. The supply of protein exceeded population requirements and could be met with domestic production alone. Even excluding all meat there was sufficient protein for population requirements. The supply of total fat, saturated fat and sugar considerably exceeded the current dietary recommendation. As regards nutrition security in 2010, the UK was reliant on imported foods to meet energy, fibre, total carbohydrate, iron, zinc and vitamin A requirements. This analysis demonstrates the importance of including nutrients other than energy to determine the adequacy of the food supply. The methodology also provides an alternative perspective on food security and self-sufficiency by assessing the dependency on imports to meet population level nutritional requirements. PMID:29489830
Macdiarmid, Jennie I; Clark, Heather; Whybrow, Stephen; de Ruiter, Henri; McNeill, Geraldine
2018-01-01
Nutrition security describes the adequacy of the food supply to meet not only energy but also macronutrient and micronutrient requirements for the population. The aim of this study was to develop a method to assess trends in national nutrition security and the contribution of imports to nutrition security, using the UK as a case study. Food supply data from FAO food balance sheets and national food composition tables were used to estimate the nutrient content of domestically produced food, imported food and exported food. Nutrition security was defined as the total nutrient supply (domestic production, minus exports, plus imports) to meet population-level nutrient requirements. The results showed that the UK was nutrition secure over the period 1961-2011 for energy, macronutrients and key micronutrients, with the exception of total carbohydrates and fibre, which may be due to the loss of fibre incurred by processing cereals into refined products. The supply of protein exceeded population requirements and could be met with domestic production alone. Even excluding all meat there was sufficient protein for population requirements. The supply of total fat, saturated fat and sugar considerably exceeded the current dietary recommendation. As regards nutrition security in 2010, the UK was reliant on imported foods to meet energy, fibre, total carbohydrate, iron, zinc and vitamin A requirements. This analysis demonstrates the importance of including nutrients other than energy to determine the adequacy of the food supply. The methodology also provides an alternative perspective on food security and self-sufficiency by assessing the dependency on imports to meet population level nutritional requirements.
Code of Federal Regulations, 2011 CFR
2011-04-01
... such security future is a stock, the product of the daily settlement price of such security future as shown by any regularly published reporting or quotation service, and the applicable number of shares per... regulations applicable to financial relations between a security futures intermediary and a customer with...
78 FR 77173 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-20
... because they effect transactions in securities futures products. The information obtained from Rule 17a-13... time complying with the rule, given that they do not do a public securities business or do not hold... SECURITIES AND EXCHANGE COMMISSION Proposed Collection; Comment Request Upon Written Request...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-08
... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services Agency Information... service delivery, the Department of Homeland Security, U.S. Citizenship and Immigration Services (USCIS... Homeland Security (DHS), USCIS, Sunday Aigbe, Chief, Regulatory Products Division, Office of the Executive...
78 FR 42113 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-15
... Securities and Exchange Commission (``Commission'') has submitted to the Office of Management and Budget... settlement price for each cash-settled security futures product fairly reflect the opening price of the... Securities and Exchange Commission, Office of Information and Regulatory Affairs, Office of Management and...
Indian parliamentarians meet to discuss population and food security.
1996-01-01
96 parliamentarians and state legislators attended a seminar on November 8 on food security, population, and development. The one-day meeting was held at the Parliament House Annex in New Delhi and organized by the Indian Association of Parliamentarians on Population and Development as part of a regional campaign to highlight the relationship between population and food security. The first session of the day focused upon the impact of population on food security and nutrition, the second session was on the strategy for food security through poverty alleviation, and the third session discussed food security through trade and self-sufficiency. The participants believe that population size is growing faster than food production. Furthermore, it is important to view both food production and the capacity of people to buy food. Poverty is rooted in unemployment and unemployment is the result of overpopulation. As such, overpopulation causes unemployment which results in the inability of the poor to buy food. A declaration was adopted at the seminar.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-07
... COMMODITY FUTURES TRADING COMMISSION 17 CFR Part 1 RIN 3038-AD46 SECURITIES AND EXCHANGE...-Based Swap Agreement Recordkeeping AGENCY: Commodity Futures Trading Commission; Securities and Exchange... Futures Trading Commission and the Securities and Exchange Commission published a document in the Federal...
17 CFR 230.239 - Exemption for offers and sales of certain security-based swaps.
Code of Federal Regulations, 2013 CFR
2013-04-01
... specified Internet address or includes in its agreement covering the security-based swap that the eligible... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Exemption for offers and sales of certain security-based swaps. 230.239 Section 230.239 Commodity and Securities Exchanges...
17 CFR 230.239 - Exemption for offers and sales of certain security-based swaps.
Code of Federal Regulations, 2014 CFR
2014-04-01
... specified Internet address or includes in its agreement covering the security-based swap that the eligible... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Exemption for offers and sales of certain security-based swaps. 230.239 Section 230.239 Commodity and Securities Exchanges...
Jones, Jason D; Cassidy, Jude
2014-01-01
The secure base construct represents one of attachment theory's most important contributions to our understanding of parent-child relationships and child development. The present study represents the first examination of how parents' self-reported attachment styles relate to parental secure base provision and adolescent (mean age = 16.6 years, SE = .59) secure base use during an observed parent-adolescent interaction. Further, the present study is the first to examine how fathers', as well as mothers', attachment styles relate to observed behavior in a parent-child interaction. At the bivariate level, maternal avoidance, but not anxiety, was negatively associated with observed adolescent secure base use. In addition, path analysis revealed that maternal avoidance was indirectly related to less adolescent secure base use through mothers' self-reported hostile behavior toward their adolescents and through adolescents' less positive perceptions of their mothers. Further, paternal anxiety, but not avoidance, was indirectly related to less adolescent secure base use through fathers' self-reported hostile behavior toward their adolescents. No significant findings emerged in relation to parental secure base provision. We discuss these results in the context of attachment theory and suggest directions for future research.
An E-Hospital Security Architecture
NASA Astrophysics Data System (ADS)
Tian, Fang; Adams, Carlisle
In this paper, we introduce how to use cryptography in network security and access control of an e-hospital. We first define the security goal of the e-hospital system, and then we analyze the current application system. Our idea is proposed on the system analysis and the related regulations of patients' privacy protection. The security of the whole application system is strengthened through layered security protection. Three security domains in the e-hospital system are defined according to their sensitivity level, and for each domain, we propose different security protections. We use identity based cryptography to establish secure communication channel in the backbone network and policy based cryptography to establish secure communication channel between end users and the backbone network. We also use policy based cryptography in the access control of the application system. We use a symmetric key cryptography to protect the real data in the database. The identity based and policy based cryptography are all based on elliptic curve cryptography—a public key cryptography.
A Secure Base in Adolescence: Markers of Attachment Security in the Mother–Adolescent Relationship
Allen, Joseph P.; McElhaney, Kathleen Boykin; Land, Deborah J.; Kuperminc, Gabriel P.; Moore, Cynthia W.; O’Beirne-Kelly, Heather; Kilmer, Sarah Liebman
2017-01-01
This study sought to identify ways in which adolescent attachment security, as assessed via the Adult Attachment Interview, is manifest in qualities of the secure base provided by the mother–adolescent relationship. Assessments included data coded from mother–adolescent interactions, test-based data, and adolescent self-reports obtained from an ethnically and socioeconomically diverse sample of moderately at-risk 9th and 10th graders. This study found several robust markers of adolescent attachment security in the mother–adolescent relationship. Each of these markers was found to contribute unique variance to explaining adolescent security, and in combination, they accounted for as much as 40% of the raw variance in adolescent security. These findings suggest that security is closely connected to the workings of the mother–adolescent relationship via a secure-base phenomenon, in which the teen can explore independence in thought and speech from the secure base of a maternal relationship characterized by maternal attunement to the adolescent and maternal supportiveness. PMID:12625451
The ethical aspects of regulating production.
Swanson, J C
2008-02-01
Polls and surveys conducted within the United States show general agreement that there is public support for the protection of farm livestock and poultry. Concurrent with the growing public sentiment is the recent adoption of socially responsible corporate policies by major food retailers relative to animal welfare. The animal welfare assurance and audit programs developed by the private sector are an attempt to assure consumers that best practice measures and independent oversight result in a reasonable quality of life for food-producing animals. These programs represent voluntary self-regulation and arguably a market-based approach to secure the welfare of food-producing animals. Animal advocacy organizations historically seek regulatory oversight of animal care practice. Legislative routes that require government promulgation and enforcement of animal care regulations represent an involuntary form of animal welfare assurance. There are ethical considerations concerning the employment of voluntary or involuntary regulation of the welfare of food-producing animals. For example, degree of public endangerment, economic impact, viability of small to medium producers, food price, food quality, and food security are prominent among the ethical considerations in deliberating whether to impose regulatory mandates on production. In either regulatory approach, the public must be convinced that the welfare of food-producing animals can be secured in a transparent and convincing manner.
Wamalwa, Emily N; Muoma, John; Wekesa, Clabe
2016-01-01
Increased agricultural production is an urgent issue. Projected global population is 9 million people by mid of this century. Estimation projects death of 1 million people for lack of food quality (micronutrient deficit) and quantity (protein deficit). Majority of these people will be living in developing countries. Other global challenges include shrinking cultivable lands, salinity, and flooding due to climate changes, new emerging pathogens, and pests. These affect crop production. Furthermore, they are major threats to crop genetic resources and food security. Genetic diversity in cultivated crops indicates gene pool richness. It is the greatest resource for plant breeders to select lines that enhance food security. This study was conducted by Masinde Muliro University to evaluate genetic diversity in 19 cowpea accessions from Kenya national gene bank. Accessions clustered into two major groups. High divergence was observed between accessions from Ethiopia and Australia and those from Western Kenya. Upper Volta accessions were closely related to those from Western Kenya. Low variation was observed between accessions from Eastern and Rift Valley than those from Western and Coastal regions of Kenya. Diversity obtained in this study can further be exploited for the improvement of cowpea in Kenya as a measure of food security.
Global food and fibre security threatened by current inefficiencies in fungal identification.
Crous, Pedro W; Groenewald, Johannes Z; Slippers, Bernard; Wingfield, Michael J
2016-12-05
Fungal pathogens severely impact global food and fibre crop security. Fungal species that cause plant diseases have mostly been recognized based on their morphology. In general, morphological descriptions remain disconnected from crucially important knowledge such as mating types, host specificity, life cycle stages and population structures. The majority of current fungal species descriptions lack even the most basic genetic data that could address at least some of these issues. Such information is essential for accurate fungal identifications, to link critical metadata and to understand the real and potential impact of fungal pathogens on production and natural ecosystems. Because international trade in plant products and introduction of pathogens to new areas is likely to continue, the manner in which fungal pathogens are identified should urgently be reconsidered. The technologies that would provide appropriate information for biosecurity and quarantine already exist, yet the scientific community and the regulatory authorities are slow to embrace them. International agreements are urgently needed to enforce new guidelines for describing plant pathogenic fungi (including key DNA information), to ensure availability of relevant data and to modernize the phytosanitary systems that must deal with the risks relating to trade-associated plant pathogens.This article is part of the themed issue 'Tackling emerging fungal threats to animal health, food security and ecosystem resilience'. © 2016 The Author(s).
2016-01-01
Objectives: Human immunodeficiency virus (HIV)/acquired immunodeficiency syndrome (AIDS) adversely impacts food security in households of people living with HIV/AIDS (PLWHA). Little research has focused on food insecurity among PLWHA in India. The purpose of this study was to identify the prevalence of and factors relating to food security in households of PLWHA in the Siliguri subdivision of Darjeeling, West Bengal, India. Methods: A cross-sectional community-based study was carried out among 173 PLWHA residing in Siliguri and registered at the Anti-retroviral Therapy Centre of North Bengal Medical College & Hospital. Data was collected at the household level with interviews of PLWHA using a food security survey instrument. We analyzed the associations using logistic regression. Results: The prevalence of household food security among the participants was 50.9% (88/173). Five years or more of schooling, higher socioeconomic class and males were found to be significantly associated with a higher likelihood of food security. A later stage of the disease and the presence of other family members with HIV/AIDS were significantly associated with a lower likelihood of food security. The major coping strategies to deal with food insecurity in the acute phase HIV infection included borrowing money (56.1%), followed by spousal support, loans from microfinance institutions, banks, or money lenders, borrowing food, or selling agricultural products. Conclusions: The present study revealed that only about half of households with PLWHA were food secure. Prior interventions relating to periods of food and economic crisis as well as strategies for sustaining food security and economic status are needed in this area. PMID:27499166
Measuring Global Water Security Towards Sustainable Development Goals
NASA Technical Reports Server (NTRS)
Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide
2016-01-01
Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience 'low water security' over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated-physical and socio-economic-approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.
Dasgupta, Pallabi; Bhattacherjee, Sharmistha; Das, Dilip Kumar
2016-07-01
Human immunodeficiency virus (HIV)/acquired immunodeficiency syndrome (AIDS) adversely impacts food security in households of people living with HIV/AIDS (PLWHA). Little research has focused on food insecurity among PLWHA in India. The purpose of this study was to identify the prevalence of and factors relating to food security in households of PLWHA in the Siliguri subdivision of Darjeeling, West Bengal, India. A cross-sectional community-based study was carried out among 173 PLWHA residing in Siliguri and registered at the Anti-retroviral Therapy Centre of North Bengal Medical College & Hospital. Data was collected at the household level with interviews of PLWHA using a food security survey instrument. We analyzed the associations using logistic regression. The prevalence of household food security among the participants was 50.9% (88/173). Five years or more of schooling, higher socioeconomic class and males were found to be significantly associated with a higher likelihood of food security. A later stage of the disease and the presence of other family members with HIV/AIDS were significantly associated with a lower likelihood of food security. The major coping strategies to deal with food insecurity in the acute phase HIV infection included borrowing money (56.1%), followed by spousal support, loans from microfinance institutions, banks, or money lenders, borrowing food, or selling agricultural products. The present study revealed that only about half of households with PLWHA were food secure. Prior interventions relating to periods of food and economic crisis as well as strategies for sustaining food security and economic status are needed in this area.
Cryptographically supported NFC tags in medication for better inpatient safety.
Özcanhan, Mehmet Hilal; Dalkılıç, Gökhan; Utku, Semih
2014-08-01
Reliable sources report that errors in drug administration are increasing the number of harmed or killed inpatients, during healthcare. This development is in contradiction to patient safety norms. A correctly designed hospital-wide ubiquitous system, using advanced inpatient identification and matching techniques, should provide correct medicine and dosage at the right time. Researchers are still making grouping proof protocol proposals based on the EPC Global Class 1 Generation 2 ver. 1.2 standard tags, for drug administration. Analyses show that such protocols make medication unsecure and hence fail to guarantee inpatient safety. Thus, the original goal of patient safety still remains. In this paper, a very recent proposal (EKATE) upgraded by a cryptographic function is shown to fall short of expectations. Then, an alternative proposal IMS-NFC which uses a more suitable and newer technology; namely Near Field Communication (NFC), is described. The proposed protocol has the additional support of stronger security primitives and it is compliant to ISO communication and security standards. Unlike previous works, the proposal is a complete ubiquitous system that guarantees full patient safety; and it is based on off-the-shelf, new technology products available in every corner of the world. To prove the claims the performance, cost, security and scope of IMS-NFC are compared with previous proposals. Evaluation shows that the proposed system has stronger security, increased patient safety and equal efficiency, at little extra cost.
17 CFR 41.27 - Prohibition of dual trading in security futures products by floor brokers.
Code of Federal Regulations, 2013 CFR
2013-04-01
... through a trading system that electronically matches bids and offers pursuant to a predetermined algorithm... participants with a time or place advantage or the ability to override a predetermined algorithm must submit an... override a predetermined algorithm from trading a security futures product for accounts in which these same...
17 CFR 41.27 - Prohibition of dual trading in security futures products by floor brokers.
Code of Federal Regulations, 2014 CFR
2014-04-01
... through a trading system that electronically matches bids and offers pursuant to a predetermined algorithm... participants with a time or place advantage or the ability to override a predetermined algorithm must submit an... override a predetermined algorithm from trading a security futures product for accounts in which these same...
NASA Astrophysics Data System (ADS)
Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede
2015-12-01
Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy proposed in this study, Indonesia energy security for 2025 could be improved to ranked 8 of 11 countries, better than Malaysia, Thailand and Singapore.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki
Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Selfmore » Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy proposed in this study, Indonesia energy security for 2025 could be improved to ranked 8 of 11 countries, better than Malaysia, Thailand and Singapore.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-23
... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services Agency Information... Naturalization/Citizenship Document; OMB Control No. 1615-0091. The Department of Homeland Security, U.S... Security (DHS), USCIS, Chief, Regulatory Products Division, 20 Massachusetts Avenue, NW., Washington, DC...
Experiments in Globalisation, Food Security and Land Use Decision Making
Brown, Calum; Murray-Rust, Dave; van Vliet, Jasper; Alam, Shah Jamal; Verburg, Peter H.; Rounsevell, Mark D.
2014-01-01
The globalisation of trade affects land use, food production and environments around the world. In principle, globalisation can maximise productivity and efficiency if competition prompts specialisation on the basis of productive capacity. In reality, however, such specialisation is often constrained by practical or political barriers, including those intended to ensure national or regional food security. These are likely to produce globally sub-optimal distributions of land uses. Both outcomes are subject to the responses of individual land managers to economic and environmental stimuli, and these responses are known to be variable and often (economically) irrational. We investigate the consequences of stylised food security policies and globalisation of agricultural markets on land use patterns under a variety of modelled forms of land manager behaviour, including variation in production levels, tenacity, land use intensity and multi-functionality. We find that a system entirely dedicated to regional food security is inferior to an entirely globalised system in terms of overall production levels, but that several forms of behaviour limit the difference between the two, and that variations in land use intensity and functionality can substantially increase the provision of food and other ecosystem services in both cases. We also find emergent behaviour that results in the abandonment of productive land, the slowing of rates of land use change and the fragmentation or, conversely, concentration of land uses following changes in demand levels. PMID:25437010
Experiments in globalisation, food security and land use decision making.
Brown, Calum; Murray-Rust, Dave; van Vliet, Jasper; Alam, Shah Jamal; Verburg, Peter H; Rounsevell, Mark D
2014-01-01
The globalisation of trade affects land use, food production and environments around the world. In principle, globalisation can maximise productivity and efficiency if competition prompts specialisation on the basis of productive capacity. In reality, however, such specialisation is often constrained by practical or political barriers, including those intended to ensure national or regional food security. These are likely to produce globally sub-optimal distributions of land uses. Both outcomes are subject to the responses of individual land managers to economic and environmental stimuli, and these responses are known to be variable and often (economically) irrational. We investigate the consequences of stylised food security policies and globalisation of agricultural markets on land use patterns under a variety of modelled forms of land manager behaviour, including variation in production levels, tenacity, land use intensity and multi-functionality. We find that a system entirely dedicated to regional food security is inferior to an entirely globalised system in terms of overall production levels, but that several forms of behaviour limit the difference between the two, and that variations in land use intensity and functionality can substantially increase the provision of food and other ecosystem services in both cases. We also find emergent behaviour that results in the abandonment of productive land, the slowing of rates of land use change and the fragmentation or, conversely, concentration of land uses following changes in demand levels.
The Latent Structure of Secure Base Script Knowledge
ERIC Educational Resources Information Center
Waters, Theodore E. A.; Fraley, R. Chris; Groh, Ashley M.; Steele, Ryan D.; Vaughn, Brian E.; Bost, Kelly K.; Veríssimo, Manuela; Coppola, Gabrielle; Roisman, Glenn I.
2015-01-01
There is increasing evidence that attachment representations abstracted from childhood experiences with primary caregivers are organized as a cognitive script describing secure base use and support (i.e., the "secure base script"). To date, however, the latent structure of secure base script knowledge has gone unexamined--this despite…
Magnetic induction tomography of objects for security applications
NASA Astrophysics Data System (ADS)
Ward, Rob; Joseph, Max; Langley, Abbi; Taylor, Stuart; Watson, Joe C.
2017-10-01
A coil array imaging system has been further developed from previous investigations, focusing on designing its application for fast screening of small bags or parcels, with a view to the production of a compact instrument for security applications. In addition to reducing image acquisition times, work was directed toward exploring potential cost effective manufacturing routes. Based on magnetic induction tomography and eddy-current principles, the instrument captured images of conductive targets using a lock-in amplifier, individually multiplexing signals between a primary driver coil and a 20 by 21 imaging array of secondary passive coils constructed using a reproducible multiple tile design. The design was based on additive manufacturing techniques and provided 2 orthogonal imaging planes with an ability to reconstruct images in less than 10 seconds. An assessment of one of the imaging planes is presented. This technique potentially provides a cost effective threat evaluation technique that may compliment conventional radiographic approaches.
Applications of VIC for Climate Land Cover Change Imapacts
NASA Technical Reports Server (NTRS)
Markert, Kel
2017-01-01
Study focuses on the Lower Mekong Basin (LMB), the LMB is an economically and ecologically important region: (1) One of the largest exporters of rice and fish products, (2) Within top three most biodiverse river basins in the world. Natural climate variability plays an important role in water supply within the region: (1) Short-term climate variability (ENSO, MJO), (2) Long-term climate variability (climate change). Projections of climate change show there will be a decrease in water availability world wide which has implications for food security and ecology. Additional studies show there may be socioeconomic turmoil due to water wars and food security in developing regions such as the Mekong Basin. Southeast Asia has experienced major changes in land use and land cover from 1980 – 2000. Major economic reforms resulting in shift from subsistence farming to market-based agricultural production. Changes in land cover continue to occur which have an important role within the land surface aspect of hydrology.
Distributed Operations Planning
NASA Technical Reports Server (NTRS)
Fox, Jason; Norris, Jeffrey; Powell, Mark; Rabe, Kenneth; Shams, Khawaja
2007-01-01
Maestro software provides a secure and distributed mission planning system for long-term missions in general, and the Mars Exploration Rover Mission (MER) specifically. Maestro, the successor to the Science Activity Planner, has a heavy emphasis on portability and distributed operations, and requires no data replication or expensive hardware, instead relying on a set of services functioning on JPL institutional servers. Maestro works on most current computers with network connections, including laptops. When browsing down-link data from a spacecraft, Maestro functions similarly to being on a Web browser. After authenticating the user, it connects to a database server to query an index of data products. It then contacts a Web server to download and display the actual data products. The software also includes collaboration support based upon a highly reliable messaging system. Modifications made to targets in one instance are quickly and securely transmitted to other instances of Maestro. The back end that has been developed for Maestro could benefit many future missions by reducing the cost of centralized operations system architecture.
NASA Astrophysics Data System (ADS)
Zhou, Yuepeng; Ma, Xianlei; Shi, Xiaoping
2017-04-01
How to increase production efficiency, guarantee grain security, and increase farmers' income using the limited farmland is a great challenge that China is facing. Although theory predicts that secure property rights and moderate scale management of farmland can increase land productivity, reduce farm-related costs, and raise farmer's income, empirical studies on the size and magnitude of these effects are scarce. A number of studies have examined the impacts of land tenure or farm size on productivity or efficiency, respectively. There are also a few studies linking farm size, land tenure and efficiency together. However, to our best knowledge, there are no studies considering tenure security and farm efficiency together for different farm scales in China. In addition, there is little study analyzing the profit frontier. In this study, we particularly focus on the impacts of land tenure security and farm size on farm profit efficiency, using farm level data collected from 23 villages, 811 households in Liaoning in 2015. 7 different farm scales have been identified to further represent small farms, median farms, moderate-scale farms, and large farms. Technical efficiency is analyzed with stochastic frontier production function. The profit efficiency is regressed on a set of explanatory variables which includes farm size dummies, land tenure security indexes, and household characteristics. We found that: 1) The technical efficiency scores for production efficiency (average score = 0.998) indicate that it is already very close to the production frontier, and thus there is little room to improve production efficiency. However, there is larger space to raise profit efficiency (average score = 0.768) by investing more on farm size expansion, seed, hired labor, pesticide, and irrigation. 2) Farms between 50-80 mu are most efficient from the viewpoint of profit efficiency. The so-called moderate-scale farms (100-150 mu) according to the governmental guideline show no advantage in efficiency. 3) Formal land certificates and farmer's participation in land rental market are found to be important determinants of the profit efficiency across different scale of farms. 4) Fertilizer use has been excessive in Liaoning and could lead to the decline of crop profit.
Burisch, Johan; Cukovic-Cavka, Silvija; Kaimakliotis, Ioannis; Shonová, Olga; Andersen, Vibeke; Dahlerup, Jens F; Elkjaer, Margarita; Langholz, Ebbe; Pedersen, Natalia; Salupere, Riina; Kolho, Kaija-Leena; Manninen, Pia; Lakatos, Peter Laszlo; Shuhaibar, Mary; Odes, Selwyn; Martinato, Matteo; Mihu, Ion; Magro, Fernando; Belousova, Elena; Fernandez, Alberto; Almer, Sven; Halfvarson, Jonas; Hart, Ailsa; Munkholm, Pia
2011-08-01
The EpiCom-study investigates a possible East-West-gradient in Europe in the incidence of IBD and the association with environmental factors. A secured web-based database is used to facilitate and centralize data registration. To construct and validate a web-based inception cohort database available in both English and Russian language. The EpiCom database has been constructed in collaboration with all 34 participating centers. The database was translated into Russian using forward translation, patient questionnaires were translated by simplified forward-backward translation. Data insertion implies fulfillment of international diagnostic criteria, disease activity, medical therapy, quality of life, work productivity and activity impairment, outcome of pregnancy, surgery, cancer and death. Data is secured by the WinLog3 System, developed in cooperation with the Danish Data Protection Agency. Validation of the database has been performed in two consecutive rounds, each followed by corrections in accordance with comments. The EpiCom database fulfills the requirements of the participating countries' local data security agencies by being stored at a single location. The database was found overall to be "good" or "very good" by 81% of the participants after the second validation round and the general applicability of the database was evaluated as "good" or "very good" by 77%. In the inclusion period January 1st -December 31st 2010 1336 IBD patients have been included in the database. A user-friendly, tailor-made and secure web-based inception cohort database has been successfully constructed, facilitating remote data input. The incidence of IBD in 23 European countries can be found at www.epicom-ecco.eu. Copyright © 2011 European Crohn's and Colitis Organisation. All rights reserved.
Theory and application for the promotion of wheat production in China: past, present and future.
Xu, Zhenzhu; Yu, Zhenwen; Zhao, Junye
2013-08-15
Food security is becoming a crucial concern worldwide. In this study, we focus on wheat - a staple crop in China - as a model to review its history, status quo and future scenarios, with regard to key production technologies and management practices for wheat production and associated food security issues since the new era in China: the post-1949 era. First, the dominant technologies and management practices over the past 60 years are reviewed. Secondly, we outline several key innovative technologies and their theoretical bases over the last decade, including (i) prohibiting excessively early senescence at a later growth stage to maintain viable leaves with higher photosynthetic capacity, (ii) postponing top dressing nitrogen application to balance carbon and nitrogen nutrition, and (iii) achieving both high yield and better grain quality mainly by increasing soil productivity and balancing the ratio of nutrient elements. Finally, concerns such as water shortages and excessive application of chemical fertilizers are presented. Nevertheless, under high negative conditions, including global warming, rapid population growth, decreasing amounts of arable land, increasing competition with cash crops and severe environmental pollution, we conclude that domestic food production will be able to meet Chinese demand in the mid to long term, because increasingly innovative technologies and improved management practices have been and may continue to be applied appropriately. © 2013 Society of Chemical Industry.
Diet change and food loss reduction: What is their combined impact on global water use and scarcity?
NASA Astrophysics Data System (ADS)
Jalava, Mika; Guillaume, Joseph H. A.; Kummu, Matti; Porkka, Miina; Siebert, Stefan; Varis, Olli
2016-03-01
There is a pressing need to improve food security and reduce environmental impacts of agricultural production globally. Two of the proposed measures are diet change from animal-based to plant-based foodstuffs and reduction of food losses and waste. These two measures are linked, as diet change affects production and consumption of foodstuffs and consequently loss processes through their different water footprints and loss percentages. This paper takes this link into account for the first time and provides an assessment of the combined potential contribution of diet change and food loss reduction for reducing water footprints and water scarcity. We apply scenarios in which we change diets to follow basic dietary recommendations, limit animal-based protein intake to 25% of total protein intake, and halve food losses to study single and combined effects of diet change and loss reduction. Dietary recommendations alone would achieve 6% and 7% reductions of blue and green water consumption, respectively, while changing diets to contain less animal products would result in savings of 11% and 18%, respectively. Halving food loss would alone achieve 12% reductions for both blue and green water. Combining the measures would reduce water consumption by 23% and 28%, respectively, lowering water scarcity in areas with a population of over 600 million. At a global scale, effects of diet change and loss reduction were synergistic with loss reductions being more effective under changed diet. This demonstrates the importance of considering the link between diet change and loss reduction in assessments of food security and resource use.
Burmester, Mike; Munilla, Jorge; Ortiz, Andrés; Caballero-Gil, Pino
2017-07-04
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifies two primary goals for strengthening global supply chains: first, to promote the efficient and secure movement of goods, and second to foster a resilient supply chain. The Internet of Things (IoT), and in particular Radio Frequency Identification (RFID) technology, can be used to realize these goals. For product identification, tracking and real-time awareness, RFID tags are attached to goods. As tagged goods move along the supply chain from the suppliers to the manufacturers, and then on to the retailers until eventually they reach the customers, two major security challenges can be identified: (I) to protect the shipment of goods that are controlled by potentially untrusted carriers; and (II) to secure the transfer of ownership at each stage of the chain. For the former, grouping proofs in which the tags of the scanned goods generate a proof of "simulatenous" presence can be employed, while for the latter, ownership transfer protocols (OTP) are used. This paper describes enhanced security solutions for both challenges. We first extend earlier work on grouping proofs and group codes to capture resilient group scanning with untrusted readers; then, we describe a modified version of a recently published OTP based on channels with positive secrecy capacity adapted to be implemented on common RFID systems in the supply chain. The proposed solutions take into account the limitations of low cost tags employed in the supply chain, which are only required to generate pseudorandom numbers and compute one-way hash functions.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-30
... SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 240 [Release No. 34-68071; File No. S7-08-12] RIN 3235-AL12 Capital, Margin, and Segregation Requirements for Security-Based Swap Dealers and Major Security-Based Swap Participants and Capital Requirements for Broker-Dealers Correction In proposed rule...
Smith, Pete; Haberl, Helmut; Popp, Alexander; Erb, Karl-Heinz; Lauk, Christian; Harper, Richard; Tubiello, Francesco N; de Siqueira Pinto, Alexandre; Jafari, Mostafa; Sohi, Saran; Masera, Omar; Böttcher, Hannes; Berndes, Göran; Bustamante, Mercedes; Ahammad, Helal; Clark, Harry; Dong, Hongmin; Elsiddig, Elnour A; Mbow, Cheikh; Ravindranath, Nijavalli H; Rice, Charles W; Robledo Abad, Carmenza; Romanovskaya, Anna; Sperling, Frank; Herrero, Mario; House, Joanna I; Rose, Steven
2013-08-01
Feeding 9-10 billion people by 2050 and preventing dangerous climate change are two of the greatest challenges facing humanity. Both challenges must be met while reducing the impact of land management on ecosystem services that deliver vital goods and services, and support human health and well-being. Few studies to date have considered the interactions between these challenges. In this study we briefly outline the challenges, review the supply- and demand-side climate mitigation potential available in the Agriculture, Forestry and Other Land Use AFOLU sector and options for delivering food security. We briefly outline some of the synergies and trade-offs afforded by mitigation practices, before presenting an assessment of the mitigation potential possible in the AFOLU sector under possible future scenarios in which demand-side measures codeliver to aid food security. We conclude that while supply-side mitigation measures, such as changes in land management, might either enhance or negatively impact food security, demand-side mitigation measures, such as reduced waste or demand for livestock products, should benefit both food security and greenhouse gas (GHG) mitigation. Demand-side measures offer a greater potential (1.5-15.6 Gt CO2 -eq. yr(-1) ) in meeting both challenges than do supply-side measures (1.5-4.3 Gt CO2 -eq. yr(-1) at carbon prices between 20 and 100 US$ tCO2 -eq. yr(-1) ), but given the enormity of challenges, all options need to be considered. Supply-side measures should be implemented immediately, focussing on those that allow the production of more agricultural product per unit of input. For demand-side measures, given the difficulties in their implementation and lag in their effectiveness, policy should be introduced quickly, and should aim to codeliver to other policy agenda, such as improving environmental quality or improving dietary health. These problems facing humanity in the 21st Century are extremely challenging, and policy that addresses multiple objectives is required now more than ever. © 2013 John Wiley & Sons Ltd.
Pray, Carl; Ledermann, Samuel
2016-01-01
In Africa and South Asia, where nutrition insecurity is severe, two of the most prominent production technologies are genetically modified (GM) crops and certified organic agriculture. We analyze the potential impact pathways from agricultural production to nutrition. Our review of data and the literature reveals increasing farm-level income from cash crop production as the main pathway by which organic agriculture and GM agriculture improve nutrition. Potential secondary pathways include reduced prices of important food crops like maize due to GM maize production and increased food production using organic technology. Potential tertiary pathways are improvements in health due to reduced insecticide use. Challenges to the technologies achieving their impact include the politics of GM agriculture and the certification costs of organic agriculture. Given the importance of agricultural production in addressing nutrition security, accentuated by the post-2015 sustainable development agenda, the chapter concludes by stressing the importance of private and public sector research in improving the productivity and adoption of both GM and organic crops. In addition, the chapter reminds readers that increased farm income and productivity require complementary investments in health, education, food access and women's empowerment to actually improve nutrition security. © 2016 S. Karger AG, Basel.
Ullman, Amanda J; Kleidon, Tricia; Gibson, Victoria; McBride, Craig A; Mihala, Gabor; Cooke, Marie; Rickard, Claire M
2017-08-30
Central venous access device (CVAD) associated complications are a preventable source of patient harm, frequently resulting in morbidity and delays to vital treatment. Dressing and securement products are used to prevent infectious and mechanical complications, however current complication rates suggest customary practices are inadequate. The aim of this study was to evaluate the feasibility of launching a full-scale randomized controlled efficacy trial of innovative dressing and securement products for pediatric tunneled CVAD to prevent complication and failure. An external, pilot, four-group randomized controlled trial of standard care (bordered polyurethane dressing and suture), in comparison to integrated securement-dressing, suture-less securement device, and tissue adhesive was undertaken across two large, tertiary referral pediatric hospitals in Australia. Forty-eight pediatric participants with newly inserted tunneled CVADs were consecutively recruited. The primary outcome of study feasibility was established by elements of eligibility, recruitment, attrition, protocol adherence, missing data, parent and healthcare staff satisfaction and acceptability, and effect size estimates for CVAD failure (cessation of function prior to completion of treatment) and complication (associated bloodstream infection, thrombosis, breakage, dislodgement or occlusion). Dressing integrity, product costs and site complications were also examined. Protocol feasibility was established. CVAD failure was: 17% (2/12) integrated securement-dressing; 8% (1/13) suture-less securement device; 0% tissue adhesive (0/12); and, 0% standard care (0/11). CVAD complications were: 15% (2/13) suture-less securement device (CVAD associated bloodstream infection, and occlusion and partial dislodgement); 8% (1/12) integrated securement-dressing (partial dislodgement); 0% tissue adhesive (0/12); and, 0% standard care (0/11). One CVAD-associated bloodstream infection occurred, within the suture-less securement device group. Overall satisfaction was highest in the integrated securement-dressing (mean 8.5/10; standard deviation 1.2). Improved dressing integrity was evident in the intervention arms, with the integrated securement-dressing associated with prolonged time to first dressing change (mean days 3.5). Improving the security and dressing integrity of tunneled CVADs is likely to improve outcomes for pediatric patients. Further research is necessary to identify novel, effective CVAD securement to reduce complications, and provide reliable vascular access for children. ACTRN12614000280606 ; prospectively registered on 17/03/2014.
Special report. New products that improve officer performance, safety.
1991-12-01
The need for products that improve performance of security officers is counterbalanced these days by budgetary constraints. While this may limit major investments in security systems and personnel, less costly improvements or innovations might be worth considering. In this report, we will discuss four advances that may be valuable not only in hospital security, but in other industries as well. One of them, a smoke filter, was originally developed for the hotel industry. Another, a drug detection device, may replace the use of undercover agents or drug-sniffing' dogs in certain circumstances. The third new product is an economical patrol vehicle for parking facilities which might replace more costly vehicles such as golf carts or cars. The fourth product, a roving CCTV camera, is actually being tested at a Midwest medical center and may allow you to monitor areas of parking garages with cameras instead of officers on patrol.
Potential and attainable food production and food security in different regions
Vries, F. W. T. Penning de; Rabbinge, R.; Groot, J. J. R.
1997-01-01
Growing prosperity in the South is accompanied by human diets that will claim more natural resources per capita. This reality, combined with growing populations, may raise the global demand for food crops two- to four-fold within two generations. Considering the large volume of natural resources and potential crop yields, it seems that this demand can be met smoothly. However, this is a fallacy for the following reasons. (i) Geographic regions differ widely in their potential food security: policy choices for agricultural use of natural resources are limited in Asia. For example, to ensure national self-sufficiency and food security, most of the suitable land (China) and nearly all of the surface water (India) are needed. Degradation restricts options further. (ii) The attainable level of agricultural production depends also on socio-economic conditions. Extensive poverty keeps the attainable food production too low to achieve food security, even when the yield gap is wide, as in Africa. (iii) Bio-energy, non-food crops and nature compete with food crops for natural resources. Global and regional food security are attainable, but only with major efforts. Strategies to achieve alternative aims will be discussed.
Data Privacy and Security in Higher Education
ERIC Educational Resources Information Center
Williams, Tracy
2003-01-01
As institutions review and strengthen their plans to secure confidential data, what proactive role does the human resource professional play as a strategic partner? Why are employees a critical part of the solution? And how are they educated regarding their responsibilities with data security? Datatel's HR product manager shares some…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-19
... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services Agency Information...-0022. The Department of Homeland Security, U.S. Citizenship and Immigration Services (USCIS) will be... directed to the Department of Homeland Security (DHS), USCIS, Chief, Regulatory Products Division, Office...
17 CFR 248.126 - Delivery of opt out notices.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Delivery of opt out notices. 248.126 Section 248.126 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer obtained a product or service electronically and requires the...
17 CFR 248.124 - Reasonable opportunity to opt out.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Reasonable opportunity to opt out. 248.124 Section 248.124 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer has obtained a product or service. The consumer acknowledges...
17 CFR 248.124 - Reasonable opportunity to opt out.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Reasonable opportunity to opt out. 248.124 Section 248.124 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer has obtained a product or service. The consumer acknowledges...
17 CFR 248.126 - Delivery of opt out notices.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Delivery of opt out notices. 248.126 Section 248.126 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer obtained a product or service electronically and requires the...
17 CFR 248.124 - Reasonable opportunity to opt out.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Reasonable opportunity to opt out. 248.124 Section 248.124 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer has obtained a product or service. The consumer acknowledges...
17 CFR 248.126 - Delivery of opt out notices.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Delivery of opt out notices. 248.126 Section 248.126 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer obtained a product or service electronically and requires the...
17 CFR 248.124 - Reasonable opportunity to opt out.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Reasonable opportunity to opt out. 248.124 Section 248.124 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer has obtained a product or service. The consumer acknowledges...
17 CFR 248.126 - Delivery of opt out notices.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Delivery of opt out notices. 248.126 Section 248.126 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer obtained a product or service electronically and requires the...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Discovery. 13.21 Section 13.21 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.21 Discovery. (a) In general. (1) The following types of discovery are authorized: (i) Requests for production of...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Discovery. 13.21 Section 13.21 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.21 Discovery. (a) In general. (1) The following types of discovery are authorized: (i) Requests for production of...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Discovery. 13.21 Section 13.21 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.21 Discovery. (a) In general. (1) The following types of discovery are authorized: (i) Requests for production of...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Discovery. 13.21 Section 13.21 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.21 Discovery. (a) In general. (1) The following types of discovery are authorized: (i) Requests for production of...
28 CFR 16.74 - Exemption of National Security Division Systems-limited access.
Code of Federal Regulations, 2010 CFR
2010-07-01
... National Security Division Systems—limited access. (a) The following system of records is exempted from... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of National Security Division Systems-limited access. 16.74 Section 16.74 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR...
17 CFR 248.124 - Reasonable opportunity to opt out.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Reasonable opportunity to opt out. 248.124 Section 248.124 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer has obtained a product or service. The consumer acknowledges...
32 CFR Appendix A to Part 223 - Procedures for Identifying and Controlling DoD UCNI
Code of Federal Regulations, 2011 CFR
2011-07-01
... security measures, including security plans, procedures, and equipment, for the physical protection of DoD... stand-alone personal computers, or shared-logic work processing systems, if protection from unauthorized... and security by increasing significantly the likelihood of the illegal production of nuclear weapons...
Warfield, James J; Kondo-Ikemura, Kiyomi; Waters, Everett
2011-02-01
John Bowlby defined offspring-parent attachment as a relationship in which an infant or child uses one or a few preferred adults as a secure base from which to explore and as a haven of safety. He defined attachment security in terms of confidence in the adult's availability and responsiveness and the smooth organization of exploration and proximity seeking. Developmental psychologists have found this perspective productive in both observational and laboratory research. At the same time, they emphasize that such a construct cannot be operationalized in terms of one or a few behaviors. Instead, naturalistic observations of human infant attachment typically employ the Q-sort method to develop the Attachment q-set (AQS), 90 behaviorally descriptive items sorted in terms of how characteristic each item is of the infant's typical behavior. Meta-analyses of research using the AQS attest to its reliability and validity. This article reports an adaptation of the AQS to the task of assessing infant attachment security in nonhuman primates and illustrates its use. The availability of comparable measures of attachment security will contribute to an expanded understanding of patterns of attachment behavior in nonhuman primate societies and will facilitate interaction between comparative and developmental psychologists. © 2010 Wiley-Liss, Inc.
Research on information security in big data era
NASA Astrophysics Data System (ADS)
Zhou, Linqi; Gu, Weihong; Huang, Cheng; Huang, Aijun; Bai, Yongbin
2018-05-01
Big data is becoming another hotspot in the field of information technology after the cloud computing and the Internet of Things. However, the existing information security methods can no longer meet the information security requirements in the era of big data. This paper analyzes the challenges and a cause of data security brought by big data, discusses the development trend of network attacks under the background of big data, and puts forward my own opinions on the development of security defense in technology, strategy and product.
Nanoparticles in forensic science
NASA Astrophysics Data System (ADS)
Cantu, Antonio A.
2008-10-01
Nanoparticles appear in several areas of forensic science including security documents, paints, inks, and reagents that develop latent prints. One reagent (known as the silver physical developer) that visualizes the water insoluble components of latent print residue is based on the formation of highly charged silver nanoparticles. These attach to and grow on the residue and generate a silver image. Another such reagent involves highly charged gold nanoparticles. These attach to the residue forming a weak gold image which can be amplified with a silver physical developer. Nanoparaticles are also used in items such as paints, printing inks, and writing inks. Paints and most printing inks consist of nano-sized pigments in a vehicle. However, certain modern ink jet printing inks now contain nano-sized pigments to improve their light fastness and most gel inks are also based on nano scale pigments. These nanoparticlecontaining materials often appear as evidence and are thus subject to forensic characterization. Both luminescent (quantum dots), up-converting nano scale phosphors, and non luminescent nanoparticles are used as security tags to label product, add security to documents, and as anti counterfeiting measures. These assist in determining if an item is fraudulently made.
Jones, Jason D.; Cassidy, Jude
2014-01-01
The secure base construct is a core aspect of attachment theory and, according to Bowlby (1988), represents one of attachment theory’s most important contributions to our understanding of parent-child relationships and child development. The present study represents the first examination of how parents’ self-reported attachment styles relate to parental secure base provision and adolescent (Mage = 16.6 years, SE = .59) secure base use during an observed parent-adolescent interaction. Further, the present study is the first to examine how fathers’, as well as mothers’, attachment styles relate to observed behavior in a parent-child interaction. At the bivariate level, maternal avoidance, but not anxiety, was negatively associated with observed adolescent secure base use. In addition, path analysis revealed that maternal avoidance was indirectly related to less adolescent secure base use through mothers’ self-reported hostile behavior toward their adolescents and through adolescents’ less positive perceptions of their mothers. Further, paternal anxiety, but not avoidance, was indirectly related to less adolescent secure base use through fathers’ self-reported hostile behavior toward their adolescents. No significant findings emerged in relation to parental secure base provision. We discuss these results in the context of attachment theory and suggest directions for future research. PMID:24897927
ERIC Educational Resources Information Center
Danziger, Sheldon, Ed.; Waldfogel, Jane, Ed.
Noting that the human capital of a nation is a primary determinant of its strength, this book reviews what is known about the processes that affect child development and how public and private investments in children might be increased to promote their well-being and to enhance the economic productivity of the next generation in America. Based on…
Deception Based Intrusion Detection & Prevention for SCADA Environments -
the case of the Ukraine incident, the substations. So here's the idea. Number one, understand from idea is that one of the quotes that he made in that book, it's actually a famous quote, is that all security products. Case in point, I'll be at RSA in February. There's over 2,600 vendors at RSA all solving
ERIC Educational Resources Information Center
Fonchingong, Charles C.
2005-01-01
As a response to the trappings of globalisation and the commoditisation of the sphere of production, women continue to play a crucial role in securing livelihoods by guaranteeing access to food in rural, peri-urban, and urban areas. Based on a survey of food vendors, this paper evaluates women's input through informal earnings, the coping…
Application of simulation models for the optimization of business processes
NASA Astrophysics Data System (ADS)
Jašek, Roman; Sedláček, Michal; Chramcov, Bronislav; Dvořák, Jiří
2016-06-01
The paper deals with the applications of modeling and simulation tools in the optimization of business processes, especially in solving an optimization of signal flow in security company. As a modeling tool was selected Simul8 software that is used to process modeling based on discrete event simulation and which enables the creation of a visual model of production and distribution processes.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Seestrom, Susan Joyce
The Nuclear Science Advisory Committee (NSAC) 99Molybdenum ( 99Mo) Subcommittee met December 14-15, 2017 to address the charge to NSAC requesting that a fourth annual review of the National Nuclear Security Administration (NNSA) 99Mo program be performed. The Subcommittee found that the NNSA has continued to make progress over the course of the year based on the specific American Medical Isotopes Production Act of 2012 (AMIPA) requirements.
NASA Astrophysics Data System (ADS)
Budde, M. E.; Rowland, J.; Senay, G. B.; Funk, C. C.; Pedreros, D.; Husak, G. J.; Bohms, S.
2011-12-01
The high global food prices in 2008 led to the acknowledgement that there is a need to monitor the inter-connectivity of global and regional markets and their potential impacts on food security in many more regions than previously considered. The crisis prompted an expansion of monitoring by the Famine Early Warning Systems Network (FEWS NET) to include additional countries, beyond those where food security has long been of concern. Scientists at the U.S. Geological Survey (USGS) Earth Resources Observation and Science (EROS) Center and the University of California Santa Barbara Climate Hazards Group have provided new and improved data products as well as visualization and analysis tools in support of this increased mandate for remote monitoring. We present a new product for measuring actual evapotranspiration (ETa) based on the implementation of a surface energy balance model and site improvements of two standard FEWS NET monitoring products: normalized difference vegetation index (NDVI) and satellite-based rainfall estimates. USGS FEWS NET has implemented a simplified surface energy balance model to produce operational ETa anomalies for Africa. During the growing season, ETa anomalies express surplus or deficit crop water use which is directly related to crop condition and biomass. The expedited Moderate Resolution Imaging Spectroradiometer (eMODIS) production system provides FEWS NET with a much improved NDVI dataset for crop and rangeland monitoring. eMODIS NDVI provides a reliable data stream with a vastly improved spatial resolution (250-m) and short latency period (less than 12 hours) which allows for better operational vegetation monitoring. FEWS NET uses satellite rainfall estimates as inputs for monitoring agricultural food production. By combining high resolution (0.05 deg) rainfall mean fields with Tropical Rainfall Measuring Mission rainfall estimates and infrared temperature data, we provide pentadal (5-day) rainfall fields suitable for crop monitoring and modeling. We also present two new monitoring tools, the Early Warning eXplorer (EWX) and the Decision Support Interface (DSI). The EWX is a data analysis tool which provides the ability to rapidly visualize multiple remote sensing datasets and compare standardized anomaly maps and time series. The DSI uses remote sensing data in an automated fashion to map areas of drought concern and ranks their severity at both crop zone and administrative levels. New and improved data products and more targeted analysis tools are a necessity as food security monitoring requirements expand and resources become limited.
Linking water resources to food security through virtual water
NASA Astrophysics Data System (ADS)
Tamea, Stefania
2014-05-01
The largest use of global freshwater resources is related to food production. While each day we drink about 2 liters of water, we consume (eating) about 4000 liters of ''virtual water'', which represents the freshwater used to produce crop-based and livestock-based food. Considering human water consumption as a whole, most part originates from agriculture (85.8%), and only minor parts come from industry (9.6%) or households (4.6%). These numbers shed light on the great pressure of humanity on global freshwater resources and justify the increasing interest towards this form of environmental impact, usually known as ''water footprint''. Virtual water is a key variable in establishing the nexus between water and food. In fact, water resources used for agricultural production determine local food availability, and impact the international trade of agricultural goods. Trade, in turn, makes food commodities available to nations which are not otherwise self-sufficient, in terms of water resources or food, and it establishes an equilibrium between food demand and production at the global scale. Therefore, food security strongly relies on international food trade, but also on the use of distant and foreign water resources, which need to be acknowledged and investigated. Virtual water embedded in production and international trade follows the fate of food on the trade network, generating virtual flows of great magnitude (e.g., 2800 km3 in 2010) and defining local and global virtual water balances worldwide. The resulting water-food nexus is critical for the societal and economic development, and it has several implications ranging from population dynamics to the competing use of freshwater resources, from dietary guidelines to globalization of trade, from externalization of pollution to policy making and to socio-economic wealth. All these implications represent a great challenge for future research, not only in hydrology but in the many fields related to this interdisciplinary topic. Virtual water and water footprint accounting provide the tools for understanding such implications and to describe, quantify, and investigate the inextricable link existing between water resources and food security.
A Community-Based Approach to Leading the Nation in Smart Energy Use
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
2013-12-31
Project Objectives The AEP Ohio gridSMART® Demonstration Project (Project) achieved the following objectives: • Built a secure, interoperable, and integrated smart grid infrastructure in northeast central Ohio that demonstrated the ability to maximize distribution system efficiency and reliability and consumer use of demand response programs that reduced energy consumption, peak demand, and fossil fuel emissions. • Actively attracted, educated, enlisted, and retained consumers in innovative business models that provided tools and information reducing consumption and peak demand. • Provided the U.S. Department of Energy (DOE) information to evaluate technologies and preferred smart grid business models to be extended nationally. Projectmore » Description Ohio Power Company (the surviving company of a merger with Columbus Southern Power Company), doing business as AEP Ohio (AEP Ohio), took a community-based approach and incorporated a full suite of advanced smart grid technologies for 110,000 consumers in an area selected for its concentration and diversity of distribution infrastructure and consumers. It was organized and aligned around: • Technology, implementation, and operations • Consumer and stakeholder acceptance • Data management and benefit assessment Combined, these functional areas served as the foundation of the Project to integrate commercially available products, innovative technologies, and new consumer products and services within a secure two-way communication network between the utility and consumers. The Project included Advanced Metering Infrastructure (AMI), Distribution Management System (DMS), Distribution Automation Circuit Reconfiguration (DACR), Volt VAR Optimization (VVO), and Consumer Programs (CP). These technologies were combined with two-way consumer communication and information sharing, demand response, dynamic pricing, and consumer products, such as plug-in electric vehicles and smart appliances. In addition, the Project incorporated comprehensive cyber security capabilities, interoperability, and a data assessment that, with grid simulation capabilities, made the demonstration results an adaptable, integrated solution for AEP Ohio and the nation.« less
Code of Federal Regulations, 2010 CFR
2010-04-01
... B. Item 2 shall include the amount of options-related or security futures product-related Letters of...-1) or a derivatives clearing organization registered with the Commodity Futures Trading Commission... related to security futures products on deposit with: (1) A registered clearing agency or derivatives...
P.L. 110-140, "Energy Independence and Security Act of 2007" (2007)
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2007-12-13
An act to move the United States toward greater energy independence and security, to increase the production of clean renewable fuels, to protect consumers, to increase the efficiency of products, buildings, and vehicles, to promote research on and deploy greenhouse gas capture and storage options, and to improve the energy performance of the Federal Government, and for other purposes.