Sample records for safe secure trailer

  1. Determination of influence factors and accident rates for the Armored Tractor/Safe Secure Trailer

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Phillips, J.S.; Clauss, D.B.; Blower, D.F.

    1994-04-01

    Operating environments, such as road type, road location, and time of day, play an important role in the observed accident rates of heavy trucks used in general commerce. These same factors influence the accident rate of the Armored Tractor/Safe Secure Trailer (AT/SST) used by the Department of Energy to transport hazardous cargos within the continental United States. This report discusses the development of accident rate influence factors. These factors, based on heavy trucks used in general commerce, are used to modify the observed overall AT/SST accident rate to account for the different operating environments.

  2. Trailer siting issues: BP Texas City.

    PubMed

    Kaszniak, Mark; Holmstrom, Donald

    2008-11-15

    On 23 March, 2005, a series of explosions and fires occurred at the BP Texas City refinery during the startup of an isomerization (ISOM) process unit. Fifteen workers were killed and about 180 others were injured. All of the fatalities were contract workers; the deaths and most of the serious injuries occurred in and around temporary office trailers that had been sited near a blowdown drum and stack open to the atmosphere as part of ongoing turnaround activities in an adjacent unit. Due to problems that developed during the ISOM startup, flammable hydrocarbon liquid overfilled the blowdown drum and stack which resulted in a geyser-like release out the top into the atmosphere. The flammable hydrocarbons fell to the ground releasing vapors that were likely ignited from a nearby idling diesel pickup truck. A total of 44 trailers were damaged by the blast pressure wave that propagated through the refinery when the vapor cloud exploded. Thirteen trailers were totally destroyed and workers were injured in trailers as far as 479ft away from the release. The focus of this paper will be on trailer siting issues, including: need for work/office trailers within process units, adequacy of risk analysis methods in API RP 752, and minimum safe distance requirements

  3. Streamlined Livestock Trailer

    NASA Technical Reports Server (NTRS)

    1980-01-01

    Bull Nose livestock trailer, manufactured by American Trailer, Inc. is one of a line of highway transport vehicles manufactured by American Trailers, Inc. The slant side front end is a streamlining feature based on a NASA Research Program which investigated the aerodynamic characteristics of trailer/tractor combinations and suggested ways of reducing air resistance. Application of NASA's aerodynamic research technology to the bull nose design resulted in a 10 percent reduction in air drag, which translates into annual fuel savings of several hundred dollars.

  4. Tractor Trailer Driver's Training Programs. Performance Report.

    ERIC Educational Resources Information Center

    New Hampshire Vocational Technical Coll., Nashua.

    This document describes a project to develop a 320-hour tractor trailer driver training program and a 20-hour commercial driver licensing upgrade training program. Of 34 graduates from the training program, 28 secured employment in the trucking industry. From August 1989 to June 1990, 725 students were trained in the upgrade training program with…

  5. View of EPA Farm Sioux silo, facing east. Radsafe trailer ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    View of EPA Farm Sioux silo, facing east. Rad-safe trailer is to the left - Nevada Test Site, Environmental Protection Agency Farm, Silo Type, Area 15, Yucca Flat, 10-2 Road near Circle Road, Mercury, Nye County, NV

  6. Secured Advanced Federated Environment (SAFE): A NASA Solution for Secure Cross-Organization Collaboration

    NASA Technical Reports Server (NTRS)

    Chow, Edward; Spence, Matthew Chew; Pell, Barney; Stewart, Helen; Korsmeyer, David; Liu, Joseph; Chang, Hsin-Ping; Viernes, Conan; Gogorth, Andre

    2003-01-01

    This paper discusses the challenges and security issues inherent in building complex cross-organizational collaborative projects and software systems within NASA. By applying the design principles of compartmentalization, organizational hierarchy and inter-organizational federation, the Secured Advanced Federated Environment (SAFE) is laying the foundation for a collaborative virtual infrastructure for the NASA community. A key element of SAFE is the Micro Security Domain (MSD) concept, which balances the need to collaborate and the need to enforce enterprise and local security rules. With the SAFE approach, security is an integral component of enterprise software and network design, not an afterthought.

  7. Safety and Hazard Analysis for the Coherent/Acculite Laser Based Sandia Remote Sensing System (Trailer B70).

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Augustoni, Arnold L.

    A laser safety and hazard analysis is presented, for the Coherent(r) driven Acculite(r) laser central to the Sandia Remote Sensing System (SRSS). The analysis is based on the 2000 version of the American National Standards Institute's (ANSI) Standard Z136.1, for Safe Use of Lasers and the 2000 version of the ANSI Standard Z136.6, for Safe Use of Lasers Outdoors. The trailer (B70) based SRSS laser system is a mobile platform which is used to perform laser interaction experiments and tests at various national test sites. The trailer based SRSS laser system is generally operated on the United State Air Forcemore » Starfire Optical Range (SOR) at Kirtland Air Force Base (KAFB), New Mexico. The laser is used to perform laser interaction testing inside the laser trailer as well as outside the trailer at target sites located at various distances. In order to protect personnel who work inside the Nominal Hazard Zone (NHZ) from hazardous laser exposures, it was necessary to determine the Maximum Permissible Exposure (MPE) for each laser wavelength (wavelength bands) and calculate the appropriate minimum Optical Density (ODmin) necessary for the laser safety eyewear used by authorized personnel. Also, the Nominal Ocular Hazard Distance (NOHD) and The Extended Ocular Hazard Distance (EOHD) are calculated in order to protect unauthorized personnel who may have violated the boundaries of the control area and might enter into the laser's NHZ for testing outside the trailer. 4Page intentionally left blank« less

  8. Quick-Fit Trailer Coupling For A Grader

    NASA Technical Reports Server (NTRS)

    Soper, Terry A.; Moulton, Calvin T.

    1992-01-01

    Ripper attachment on grading tractor adapted to lift tongue of trailer tow bar hydraulically. Unnecessary for tractor operator to use jack or fork, lift to raise tongue. Enables tractor operator, acting alone, to hitch trailer to tractor, without expense and complication of dedicated hydraulic lifting mechanism for trailer hitch.

  9. Requirements for munitions lift trailers to support strategic bombers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1985-05-21

    Munitions lift trailers are large support vehicles used to transport and load air launched cruise missiles and other nuclear weapons onto strategic bombers. The Air Force has identified total requirements for 245 trailers for B-52 and B-1B bombers. About one-third of these trailers have been acquired. The Air Force Aeronautical Systems Command is considering remanufacturing 80 of the lift trailers it has acquired for B-52s to incorporate recent design improvements which are expected to make these trailers easier to operate and less costly to support. GAO believes Air Force requirements for new trailers may be overstated by as many asmore » 39 trailers. This could result in the unnecessary expenditure of up to $13 million. GAO also questions the cost effectiveness of remanufacturing the 80 trailers, which would cost $20 million.« less

  10. Safe and Secure Services Based on NGN

    NASA Astrophysics Data System (ADS)

    Fukazawa, Tomoo; Nisase, Takemi; Kawashima, Masahisa; Hariu, Takeo; Oshima, Yoshihito

    Next Generation Network (NGN), which has been undergoing standardization as it has developed, is expected to create new services that converge the fixed and mobile networks. This paper introduces the basic requirements for NGN in terms of security and explains the standardization activities, in particular, the requirements for the security function described in Y.2701 discussed in ITU-T SG-13. In addition to the basic NGN security function, requirements for NGN authentication are also described from three aspects: security, deployability, and service. As examples of authentication implementation, three profiles-namely, fixed, nomadic, and mobile-are defined in this paper. That is, the “fixed profile” is typically for fixed-line subscribers, the “nomadic profile” basically utilizes WiFi access points, and the “mobile profile” provides ideal NGN mobility for mobile subscribers. All three of these profiles satisfy the requirements from security aspects. The three profiles are compared from the viewpoint of requirements for deployability and service. After showing that none of the three profiles can fulfill all of the requirements, we propose that multiple profiles should be used by NGN providers. As service and application examples, two promising NGN applications are proposed. The first is a strong authentication mechanism that makes Web applications more safe and secure even against password theft. It is based on NGN ID federation function. The second provides an easy peer-to-peer broadband virtual private network service aimed at safe and secure communication for personal/SOHO (small office, home office) users, based on NGN SIP (session initiation protocol) session control.

  11. WILDLIFE - ALLIGATOR STRADDLES TWO PARKING SPACES IN FRONT OF OFFICE TRAILER

    NASA Technical Reports Server (NTRS)

    1982-01-01

    Double-parked, an angry alligator straddles two parking spaces outside an office trailer at NASA's Launch Complex 17. Hank Curtin of Pan Am watches from a safe perch as John Tanner gets ready to wrap a rope around the snout of the 10-foot, 9-inch beast. It's all in a day's work for Tanner, who has a contract with the state of Florida to remove nuisance alligators.

  12. Televised movie trailers: undermining restrictions on advertising tobacco to youth.

    PubMed

    Healton, Cheryl G; Watson-Stryker, Ella S; Allen, Jane Appleyard; Vallone, Donna M; Messeri, Peter A; Graham, Philip R; Stewart, Anna M; Dobbins, M David; Glantz, Stanton A

    2006-09-01

    To determine the proportion of televised movie trailers that included images of tobacco use during 1 year and the extent of youth exposure to those trailers. Content analysis combined with Nielsen data measuring media exposure. All movie trailers (N = 216) shown on television from August 1, 2001, through July 31, 2002. Exposure among youth aged 12 to 17 years to televised movie trailers that included smoking imagery. Of the movie trailers televised during the study period, 14.4% (31 trailers) included images of tobacco use. Tobacco use was shown in 24.0% of the 23 trailers for R-rated (restricted) movies and 7.5% of the 8 trailers for PG-13- and PG-rated (parental guidance) movies. Ninety-five percent of all youth aged 12 to 17 years in the United States saw at least 1 movie trailer depicting tobacco use on television during this 1 year, and 88.8% saw at least 1 of these trailers 3 or more times. Nearly all US youth aged 12 to 17 years were exposed to images of tobacco use on television in the context of a movie trailer during the study period. Given the relationship between youth exposure to tobacco use in movies and smoking initiation, the public health community should work to enact policy to reduce or eliminate the influence of tobacco use in televised movie trailers.

  13. Driver assistance system for passive multi-trailer vehicles with haptic steering limitations on the leading unit.

    PubMed

    Morales, Jesús; Mandow, Anthony; Martínez, Jorge L; Reina, Antonio J; García-Cerezo, Alfonso

    2013-04-03

    Driving vehicles with one or more passive trailers has difficulties in both forward and backward motion due to inter-unit collisions, jackknife, and lack of visibility. Consequently, advanced driver assistance systems (ADAS) for multi-trailer combinations can be beneficial to accident avoidance as well as to driver comfort. The ADAS proposed in this paper aims to prevent unsafe steering commands by means of a haptic handwheel. Furthermore, when driving in reverse, the steering-wheel and pedals can be used as if the vehicle was driven from the back of the last trailer with visual aid from a rear-view camera. This solution, which can be implemented in drive-by-wire vehicles with hitch angle sensors, profits from two methods previously developed by the authors: safe steering by applying a curvature limitation to the leading unit, and a virtual tractor concept for backward motion that includes the complex case of set-point propagation through on-axle hitches. The paper addresses system requirements and provides implementation details to tele-operate two different off- and on-axle combinations of a tracked mobile robot pulling and pushing two dissimilar trailers.

  14. Driver Assistance System for Passive Multi-Trailer Vehicles with Haptic Steering Limitations on the Leading Unit

    PubMed Central

    Morales, Jesús; Mandow, Anthony; Martínez, Jorge L.; Reina, Antonio J.; García-Cerezo, Alfonso

    2013-01-01

    Driving vehicles with one or more passive trailers has difficulties in both forward and backward motion due to inter-unit collisions, jackknife, and lack of visibility. Consequently, advanced driver assistance systems (ADAS) for multi-trailer combinations can be beneficial to accident avoidance as well as to driver comfort. The ADAS proposed in this paper aims to prevent unsafe steering commands by means of a haptic handwheel. Furthermore, when driving in reverse, the steering-wheel and pedals can be used as if the vehicle was driven from the back of the last trailer with visual aid from a rear-view camera. This solution, which can be implemented in drive-by-wire vehicles with hitch angle sensors, profits from two methods previously developed by the authors: safe steering by applying a curvature limitation to the leading unit, and a virtual tractor concept for backward motion that includes the complex case of set-point propagation through on-axle hitches. The paper addresses system requirements and provides implementation details to tele-operate two different off- and on-axle combinations of a tracked mobile robot pulling and pushing two dissimilar trailers. PMID:23552102

  15. Weaving a Virtual Story--Creating Book Trailers 101

    ERIC Educational Resources Information Center

    Bates, Naomi

    2012-01-01

    Book trailers are fast becoming today's marketing technique for newly published books. They have changed the way students select books, and trailers meet the expectations of today's teens who have been brought up on graphic visuals. Book trailers are also quite new, starting as a trend only about four years ago. Since then, they have proliferated,…

  16. 49 CFR 238.413 - End structures of trailer cars.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false End structures of trailer cars. 238.413 Section... II Passenger Equipment § 238.413 End structures of trailer cars. (a) Except as provided in paragraph (b) of this section, the end structure of a trailer car shall be designed to include the following...

  17. 49 CFR 238.413 - End structures of trailer cars.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false End structures of trailer cars. 238.413 Section... II Passenger Equipment § 238.413 End structures of trailer cars. (a) Except as provided in paragraph (b) of this section, the end structure of a trailer car shall be designed to include the following...

  18. 49 CFR 238.413 - End structures of trailer cars.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false End structures of trailer cars. 238.413 Section... II Passenger Equipment § 238.413 End structures of trailer cars. (a) Except as provided in paragraph (b) of this section, the end structure of a trailer car shall be designed to include the following...

  19. 49 CFR 238.413 - End structures of trailer cars.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false End structures of trailer cars. 238.413 Section... II Passenger Equipment § 238.413 End structures of trailer cars. (a) Except as provided in paragraph (b) of this section, the end structure of a trailer car shall be designed to include the following...

  20. 49 CFR 238.413 - End structures of trailer cars.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false End structures of trailer cars. 238.413 Section... II Passenger Equipment § 238.413 End structures of trailer cars. (a) Except as provided in paragraph (b) of this section, the end structure of a trailer car shall be designed to include the following...

  1. Lunar surface operations. Volume 4: Lunar rover trailer

    NASA Technical Reports Server (NTRS)

    Shields, William; Feteih, Salah; Hollis, Patrick

    1993-01-01

    The purpose of the project was to design a lunar rover trailer for exploration missions. The trailer was designed to carry cargo such as lunar geological samples, mining equipment and personnel. It is designed to operate in both day and night lunar environments. It is also designed to operate with a maximum load of 7000 kilograms. The trailer has a ground clearance of 1.0 meters and can travel over obstacles 0.75 meters high at an incline of 45 degrees. It can be transported to the moon fully assembled using any heavy lift vehicle with a storage compartment diameter of 5.0 meters. The trailer has been designed to meet or exceed the performance of any perceivable lunar vehicle.

  2. Freight Wing Trailer Aerodynamics Final Technical Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sean Graham

    2007-10-31

    Freight Wing Incorporated utilized the opportunity presented by a DOE category two Inventions and Innovations grant to commercialize and improve upon aerodynamic technology for semi-tuck trailers, capable of decreasing heavy vehicle fuel consumption, related environmental damage, and U.S. consumption of foreign oil. Major project goals included the demonstration of aerodynamic trailer technology in trucking fleet operations, and the development and testing of second generation products. A great deal of past scientific research has demonstrated that streamlining box shaped semi-trailers can significantly reduce a truck’s fuel consumption. However, significant design challenges have prevented past concepts from meeting industry needs. Freight Wingmore » utilized a 2003 category one Inventions and Innovations grant to develop practical solutions to trailer aerodynamics. Fairings developed for the front, rear, and bottom of standard semi-trailers together demonstrated a 7% improvement to fuel economy in scientific tests conducted by the Transportation Research Center (TRC). Operational tests with major trucking fleets proved the functionality of the products, which were subsequently brought to market. This category two grant enabled Freight Wing to further develop, test and commercialize its products, resulting in greatly increased understanding and acceptance of aerodynamic trailer technology. Commercialization was stimulated by offering trucking fleets 50% cost sharing on trial implementations of Freight Wing products for testing and evaluation purposes. Over 230 fairings were implemented through the program with 35 trucking fleets including industry leaders such as Wal-Mart, Frito Lay and Whole Foods. The feedback from these testing partnerships was quite positive with product performance exceeding fleet expectations in many cases. Fleet feedback also was also valuable from a product development standpoint and assisted the design of several second generation

  3. 49 CFR 1039.16 - Exemption of new highway trailers or containers.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 8 2014-10-01 2014-10-01 false Exemption of new highway trailers or containers. 1039.16 Section 1039.16 Transportation Other Regulations Relating to Transportation (Continued) SURFACE... of new highway trailers or containers. The rail transportation of new highway trailers or containers...

  4. 49 CFR 1039.16 - Exemption of new highway trailers or containers.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 8 2011-10-01 2011-10-01 false Exemption of new highway trailers or containers. 1039.16 Section 1039.16 Transportation Other Regulations Relating to Transportation (Continued) SURFACE... of new highway trailers or containers. The rail transportation of new highway trailers or containers...

  5. 49 CFR 1039.16 - Exemption of new highway trailers or containers.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 8 2013-10-01 2013-10-01 false Exemption of new highway trailers or containers. 1039.16 Section 1039.16 Transportation Other Regulations Relating to Transportation (Continued) SURFACE... of new highway trailers or containers. The rail transportation of new highway trailers or containers...

  6. 49 CFR 1039.16 - Exemption of new highway trailers or containers.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 8 2012-10-01 2012-10-01 false Exemption of new highway trailers or containers. 1039.16 Section 1039.16 Transportation Other Regulations Relating to Transportation (Continued) SURFACE... of new highway trailers or containers. The rail transportation of new highway trailers or containers...

  7. 49 CFR 1039.16 - Exemption of new highway trailers or containers.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 8 2010-10-01 2010-10-01 false Exemption of new highway trailers or containers. 1039.16 Section 1039.16 Transportation Other Regulations Relating to Transportation (Continued) SURFACE... of new highway trailers or containers. The rail transportation of new highway trailers or containers...

  8. The Citizen Sky Planetarium Trailer

    NASA Astrophysics Data System (ADS)

    Turner, Rebecca; Price, A.; Wyatt, R.

    2011-05-01

    Citizen Sky is a multi-year, citizen science project focusing on the bright variable star, epsilon Aurigae. We have developed a six-minute video presentation describing eclipsing binary stars, light curves, and the Citizen Sky project. Designed like a short movie trailer, the video can be shown at planetariums before their regular, feature shows or integrated into a longer presentation. The trailer is available in a wide range of formats for viewing on laptops all the way up to state-of-the-art planetariums. The show is narrated by Timothy Ferris and was produced by the Morrison Planetarium and Visualization Studio at the California Academy of Sciences. This project has been made possible by the National Science Foundation.

  9. The Citizen Sky Planetarium Trailer

    NASA Astrophysics Data System (ADS)

    Turner, R.; Price, A.; Wyatt, R.

    2012-06-01

    (Abstract only) Citizen Sky is a multi-year, citizen science project focusing on the bright variable star e Aurigae. We have developed a six-minute video presentation describing eclipsing binary stars, light curves, and the Citizen Sky project. Designed like a short movie trailer, the video can be shown at planetariums before their regular, feature shows or integrated into a longer presentation. The trailer is available in a wide range of formats for viewing on laptops all the way up to state-of-the-art planetariums. The show is narrated by Timothy Ferris and was produced by the Morrison Planetarium and Visualization Studio at the California Academy of Sciences. This project has been made possible by the National Science Foundation.

  10. Pegasus ICON Lift onto Assembly Integration Trailer (AIT)

    NASA Image and Video Library

    2017-08-23

    The Orbital ATK Pegasus XL rocket, with NASA's Ionospheric Connection Explorer (ICON) spacecraft attached, is secured on an assembly integration trailer Aug. 23, 2017, inside Building 1555 at Vandenberg Air Force Base in California. The Pegasus rocket is being prepared for the ICON mission. The explorer will launch on June 15, 2018, from Kwajalein Atoll in the Marshall Islands (June 14 in the continental United States) on the Pegasus XL, which is attached to the company's L-1011 Stargazer aircraft. ICON will study the frontier of space - the dynamic zone high in Earth's atmosphere where terrestrial weather from below meets space weather above. The explorer will help determine the physics of Earth's space environment and pave the way for mitigating its effects on our technology and communications systems.

  11. Service Test of the Airfield Specialized Trailer System

    DTIC Science & Technology

    1966-10-31

    universal trailer is a lightweight, air-transportable, four- wheel trailer. It is capable of transferring loads to compatible main- tenance and storage...transverse beams). The suspension sys- tem is a specially designed, three-point system which protects loads from excessive wheel displacement when...lightweight steel and can accommodate hoist and lift facilities. Sockets are provided to permit attachment of several accessory kits (running gear caster

  12. Cigarette smoking and perception of a movie character in a film trailer.

    PubMed

    Hanewinkel, Reiner

    2009-01-01

    To study the effects of smoking in a film trailer. Experimental study. Ten secondary schools in Northern Germany. A sample of 1051 adolescents with a mean (SD) age of 14.2 (1.8) years. Main Exposures Participants were randomized to view a 42-second film trailer in which the attractive female character either smoked for about 3 seconds or did not smoke. Perception of the character was measured via an 8-item semantic differential scale. Each item consisted of a polar-opposite pair (eg, "sexy/unsexy") divided on a 7-point scale. Responses to individual items were summed and averaged. This scale was named "attractiveness." The Cronbach alpha for the attractiveness rating was 0.85. Multilevel mixed-effects linear regression was used to test the effect of smoking in a film trailer. Smoking in the film trailer did not reach significance in the linear regression model (z = 0.73; P = .47). Smoking status of the recipient (z = 3.81; P < .001) and the interaction between smoking in the film trailer and smoking status of the recipient (z = 2.21; P = .03) both reached statistical significance. Ever smokers and never smokers did not differ in their perception of the female character in the nonsmoking film trailer. In the smoking film trailer, ever smokers judged the character significantly more attractive than never smokers. Even incidental smoking in a very short film trailer might strengthen the attractiveness of smokers in youth who have already tried their first cigarettes.

  13. Ultra Safe And Secure Blasting System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hart, M M

    2009-07-27

    The Ultra is a blasting system that is designed for special applications where the risk and consequences of unauthorized demolition or blasting are so great that the use of an extraordinarily safe and secure blasting system is justified. Such a blasting system would be connected and logically welded together through digital code-linking as part of the blasting system set-up and initialization process. The Ultra's security is so robust that it will defeat the people who designed and built the components in any attempt at unauthorized detonation. Anyone attempting to gain unauthorized control of the system by substituting components or tappingmore » into communications lines will be thwarted in their inability to provide encrypted authentication. Authentication occurs through the use of codes that are generated by the system during initialization code-linking and the codes remain unknown to anyone, including the authorized operator. Once code-linked, a closed system has been created. The system requires all components connected as they were during initialization as well as a unique code entered by the operator for function and blasting.« less

  14. Freight Wing Trailer Aerodynamics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Graham, Sean; Bigatel, Patrick

    2004-10-17

    Freight Wing Incorporated utilized the opportunity presented by this DOE category one Inventions and Innovations grant to successfully research, develop, test, patent, market, and sell innovative fuel and emissions saving aerodynamic attachments for the trucking industry. A great deal of past scientific research has demonstrated that streamlining box shaped semi-trailers can significantly reduce a truck's fuel consumption. However, significant design challenges have prevented past concepts from meeting industry needs. Market research early in this project revealed the demands of truck fleet operators regarding aerodynamic attachments. Products must not only save fuel, but cannot interfere with the operation of the truck,more » require significant maintenance, add significant weight, and must be extremely durable. Furthermore, SAE/TMC J1321 tests performed by a respected independent laboratory are necessary for large fleets to even consider purchase. Freight Wing used this information to create a system of three practical aerodynamic attachments for the front, rear and undercarriage of standard semi trailers. SAE/TMC J1321 Type II tests preformed by the Transportation Research Center (TRC) demonstrated a 7% improvement to fuel economy with all three products. If Freight Wing is successful in its continued efforts to gain market penetration, the energy and environmental savings would be considerable. Each truck outfitted saves approximately 1,100 gallons of fuel every 100,000 miles, which prevents over 12 tons of CO2 from entering the atmosphere. If all applicable trailers used the technology, the country could save approximately 1.8 billion gallons of diesel fuel, 18 million tons of emissions and 3.6 billion dollars annually.« less

  15. Outlook for trucks and trailers

    DOT National Transportation Integrated Search

    2005-11-01

    Demand for commercial trucks and trailers scored impressive gains last year as a vibrant : economy, strong customer markets, relatively modest levels of inflation and interest rates, : and the accelerated depreciation provisions of the Tax Stimulus p...

  16. 77 FR 14425 - Notice of Lodging of Consent Decree Under the Safe Drinking Water Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-09

    ... DEPARTMENT OF JUSTICE Notice of Lodging of Consent Decree Under the Safe Drinking Water Act Notice... penalties under the Safe Drinking Water Act (``SDWA''), 42 U.S.C. 300f-300j-26, resulting from violations of the National Primary Drinking Water Regulations (``NPDWRs'') at two trailer courts that Stricklin owns...

  17. Fleet Evaluation and Factory Installation of Aerodynamic Heavy Duty Truck Trailers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Beck, Jason; Salari, Kambiz; Ortega, Jason

    2013-09-30

    The purpose of DE-EE0001552 was to develop and deploy a combination of trailer aerodynamic devices and low rolling resistance tires that reduce fuel consumption of a class 8 heavy duty tractor-trailer combination vehicle by 15%. There were 3 phases of the project: Phase 1 – Perform SAE Typed 2 track tests with multiple device combinations. Phase 2 – Conduct a fleet evaluation with selected device combination. Phase 3 – Develop the devices required to manufacture the aerodynamic trailer. All 3 phases have been completed. There is an abundance of available trailer devices on the market, and fleets and owner operatorsmore » have awareness of them and are purchasing them. The products developed in conjunction with this project are at least in their second round of refinement. The fleet test undertaken showed an improvement of 5.5 – 7.8% fuel economy with the devices (This does not include tire contribution).« less

  18. 78 FR 51724 - California State Motor Vehicle Pollution Control Standards; Tractor-Trailer Greenhouse Gas...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-21

    ... applicable to new and in-use 53-foot and longer box-type trailers and to new and in-use tractors that haul... Tractor-Trailer GHG Regulation pertaining to new tractors (2011 through 2013 model years) and new trailers (2011 and subsequent model years). This notice announces that EPA has scheduled a public hearing...

  19. 26 CFR 48.4052-1 - Heavy trucks and trailers; certification requirement.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 26 Internal Revenue 16 2010-04-01 2010-04-01 true Heavy trucks and trailers; certification requirement. 48.4052-1 Section 48.4052-1 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY..., Tread Rubber, and Taxable Fuel Automotive and Related Items § 48.4052-1 Heavy trucks and trailers...

  20. Safe and Secure Schools Assessment. Public School Information. Legislative Report, 2008

    ERIC Educational Resources Information Center

    Idaho State Department of Education, 2008

    2008-01-01

    As a result of high profile shootings and critical incidents in schools on a national level, combined with the lack of a cohesive, standardized approach to safety and security in Idaho Schools, Superintendent Tom Luna requested an appropriation to address this issue and the Legislature allocated 5150.000 in FY 2008 for the Safe and Secure…

  1. Learn about SmartWay Tractors and Trailers

    EPA Pesticide Factsheets

    Companies that lease or purchase tractors or trailers that meet EPA's designated SmartWay standards are using more efficient equipment and may be eligible to put the SmartWay logo on the exterior of their equipment.

  2. Drag Reduction CFD Simulations and Flow Visualization of Light Vehicle-Trailer Systems

    NASA Astrophysics Data System (ADS)

    Sigurdson, Lorenz; Boyer, Henry; Lange, Carlos F.

    2016-11-01

    Experiments and CFD were performed to study the effect a deflector had on the flow and drag force associated with a 2010 F-150 truck and cargo trailer Light Vehicle-Trailer System (LVTS). Image Correlation Velocimetry (ICV) on smokewire streaklines measured the velocity field on the model mid-plane. CFD estimated the drag reduction as 13% at a Re of 14,900 with a moving ground-plane, and 17% without. Experiments suggested that the low Re does not diminish the full-scale relevance of the drag reduction results. One low Re effect was the presence of a separation bubble on the hood of the tow vehicle whose size reduced with an increase in Re. Three other characteristic flow patterns were identified: separation off the lead vehicle cab, stagnation of the free-stream on the trailer face for the no-deflector case, and subsequent separation at the trailer front corner. Comparisons of the ICV and CFD results with no deflector indicated good agreement in the direction of the velocity vectors, and the smoke streaklines and CFD streamlines also agreed well. However, for the deflector case, the CFD found an entirely different topological solution absent in the experiment. A pair of vertically-oriented mid-plane vortices were wrapped around the front of the trailer. Support from the Canadian Natural Sciences and Engineering Research Council Grant 41747 is gratefully acknowledged.

  3. 26 CFR 145.4051-1 - Imposition of tax on heavy trucks and trailers sold at retail.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...) Automobile truck chassis and bodies; (ii) Truck trailer and semitrailer chassis and bodies; and (iii.... A sale of an automobile truck, truck trailer or semitrailer, shall be considered to be a sale of a... is an automobile truck, truck trailer or semitrailer, or a tractor of the kind chiefly used for...

  4. 26 CFR 145.4051-1 - Imposition of tax on heavy trucks and trailers sold at retail.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...) Automobile truck chassis and bodies; (ii) Truck trailer and semitrailer chassis and bodies; and (iii.... A sale of an automobile truck, truck trailer or semitrailer, shall be considered to be a sale of a... is an automobile truck, truck trailer or semitrailer, or a tractor of the kind chiefly used for...

  5. 26 CFR 145.4051-1 - Imposition of tax on heavy trucks and trailers sold at retail.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...) Automobile truck chassis and bodies; (ii) Truck trailer and semitrailer chassis and bodies; and (iii.... A sale of an automobile truck, truck trailer or semitrailer, shall be considered to be a sale of a... is an automobile truck, truck trailer or semitrailer, or a tractor of the kind chiefly used for...

  6. 26 CFR 145.4051-1 - Imposition of tax on heavy trucks and trailers sold at retail.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...) Automobile truck chassis and bodies; (ii) Truck trailer and semitrailer chassis and bodies; and (iii.... A sale of an automobile truck, truck trailer or semitrailer, shall be considered to be a sale of a... is an automobile truck, truck trailer or semitrailer, or a tractor of the kind chiefly used for...

  7. SmartWay Mark Signature Page: Tractors & Trailers

    EPA Pesticide Factsheets

    This SmartWay agreement is for companies and organizations who wish to comply with the SmartWay Graphic Standards and Usage Guide guidelines and requirements for using the SmartWay logos on SmartWay designated Tractors and Trailers.

  8. A Survey of Commercial Local Delivery Security Methods and Their Potential for Application at NSC (Naval Supply Center), San Diego, California.

    DTIC Science & Technology

    1986-12-01

    Dry Provisions 35 ft. 4 40 ft. 3 --Trailer, 40 ft., flatbed 20 GSK --Trailer, 35 ft., lowboy 1 Bulk 55 ft., 1 Commercial Hire --Stake Truck, 2 / ton 2...wn r r r r------------ *0 warehouse area have plastic laminated badges. Visitors are also issued plastic identification badges after gate clearance...GSK material in warehouses is, therefore, considered very secure. In transit, GSK generally travels by flatbed trailer. Vans are not used because

  9. Children affected by HIV/AIDS: SAFE, a model for promoting their security, health, and development.

    PubMed

    Betancourt, Theresa S; Fawzi, Mary K S; Bruderlein, Claude; Desmond, Chris; Kim, Jim Y

    2010-05-01

    A human security framework posits that individuals are the focus of strategies that protect the safety and integrity of people by proactively promoting children's well being, placing particular emphasis on prevention efforts and health promotion. This article applies this framework to a rights-based approach in order to examine the health and human rights of children affected by HIV/AIDS. The SAFE model describes sources of insecurity faced by children across four fundamental dimensions of child well-being and the survival strategies that children and families may employ in response. The SAFE model includes: Safety/protection; Access to health care and basic physiological needs; Family/connection to others; and Education/livelihoods. We argue that it is critical to examine the situation of children through an integrated lens that effectively looks at human security and children's rights through a holistic approach to treatment and care rather than artificially limiting our scope of work to survival-oriented interventions for children affected by HIV/AIDS. Interventions targeted narrowly at children, in isolation of their social and communal environment as outlined in the SAFE model, may in fact undermine protective resources in operation in families and communities and present additional threats to children's basic security. An integrated approach to the basic security and care of children has implications for the prospects of millions of children directly infected or indirectly affected by HIV/AIDS around the world. The survival strategies that young people and their families engage in must be recognized as a roadmap for improving their protection and promoting healthy development. Although applied to children affected by HIV/AIDS in the present analysis, the SAFE model has implications for guiding the care and protection of children and families facing adversity due to an array of circumstances from armed conflict and displacement to situations of extreme poverty.

  10. Safe Grid

    NASA Technical Reports Server (NTRS)

    Chow, Edward T.; Stewart, Helen; Korsmeyer, David (Technical Monitor)

    2003-01-01

    The biggest users of GRID technologies came from the science and technology communities. These consist of government, industry and academia (national and international). The NASA GRID is moving into a higher technology readiness level (TRL) today; and as a joint effort among these leaders within government, academia, and industry, the NASA GRID plans to extend availability to enable scientists and engineers across these geographical boundaries collaborate to solve important problems facing the world in the 21 st century. In order to enable NASA programs and missions to use IPG resources for program and mission design, the IPG capabilities needs to be accessible from inside the NASA center networks. However, because different NASA centers maintain different security domains, the GRID penetration across different firewalls is a concern for center security people. This is the reason why some IPG resources are been separated from the NASA center network. Also, because of the center network security and ITAR concerns, the NASA IPG resource owner may not have full control over who can access remotely from outside the NASA center. In order to obtain organizational approval for secured remote access, the IPG infrastructure needs to be adapted to work with the NASA business process. Improvements need to be made before the IPG can be used for NASA program and mission development. The Secured Advanced Federated Environment (SAFE) technology is designed to provide federated security across NASA center and NASA partner's security domains. Instead of one giant center firewall which can be difficult to modify for different GRID applications, the SAFE "micro security domain" provide large number of professionally managed "micro firewalls" that can allow NASA centers to accept remote IPG access without the worry of damaging other center resources. The SAFE policy-driven capability-based federated security mechanism can enable joint organizational and resource owner approved remote

  11. Space-Inspired Trailers Encourage Exploration on Earth

    NASA Technical Reports Server (NTRS)

    2013-01-01

    Architect Garret Finney joined Johnson Space Center's Habitability Design Center to work on creating comfortable, efficiently designed crew quarters for the ISS. Drawing directly on that experience, Finney founded Houston-based Cricket and set about creating unique, versatile recreational trailers that incorporate space habitat principles and features.

  12. SmartWay Tractor and Trailer Logo Usage Instructions

    EPA Pesticide Factsheets

    View a presentation provides guidelines for SmartWay Partners on tractor and trailer logo usage, including SmartWay designated technical specifications and requirements, importance of logo display, how to obtain the logo, and logo placement.

  13. Safe and Secure Virtualization: Answers for IMA next Generation and Beyond

    NASA Astrophysics Data System (ADS)

    Almeida, Jose; Vatrinet, Francis

    2010-08-01

    This paper presents some of the challenges the aerospace industry is facing for the future and explains why and how a safe and secured virtualization technology can help solving these challenges Efforts around the next generation of IMA have already started, like the European FP7 funded project SCARLETT or the IDEE5 project and many avionics players and working groupware focused on how the new technologies like SMP capabilities introduced in latest CPU architectures, can help increasing system performances in future avionics system. We present PikeOS, a separation micro-kernel, which applies the state-of-the-art techniques and widely recognized standards such as ARINC 653 and MILS in order to guarantee safety and security properties, and still improve overall performance.

  14. Characteristics of Trailer Thermal Environment during Commercial Swine Transport Managed under U.S. Industry Guidelines

    PubMed Central

    Xiong, Yijie; Green, Angela; Gates, Richard S.

    2015-01-01

    Simple Summary Temperature and thermal conditions of the interior of a swine trailer during transport were monitored over a broad range of outdoor conditions (34 trips total) managed according to industry best practice (Transport Quality Assurance (TQA) guidelines (NPB, 2008)). For the outdoor temperature range of 5 °C (40 °F) to 27 °C (80 °F), generally acceptable trailer thermal conditions were observed according to the TQA. Beyond this outdoor temperature range, undesirable conditions within the trailer were prevalent. Areas for potential improvement in transport management were identified. Stops resulted in rapid increases in temperature, which could be beneficial during cooler outdoor temperatures, but detrimental for warmer outdoor temperatures. Abstract Transport is a critical factor in modern pork production and can seriously affect swine welfare. While previous research has explored thermal conditions during transport, the impact of extreme weather conditions on the trailer thermal environment under industry practices has not been well documented; and the critical factors impacting microclimate are not well understood. To assess the trailer microclimate during transport events, an instrumentation system was designed and installed at the central ceiling level, pig level and floor-level in each of six zones inside a commercial swine trailer. Transport environmental data from 34 monitoring trips (approximately 1–4 h in duration each) were collected from May, 2012, to February, 2013, with trailer management corresponding to the National Pork Board Transport Quality Assurance (TQA) guidelines in 31 of these trips. According to the TQA guidelines, for outdoor temperature ranging from 5 °C (40 °F) to 27 °C (80 °F), acceptable thermal conditions were observed based on the criteria that no more than 10% of the trip duration was above 35 °C (95 °F) or below 0 °C (32 °F). Recommended bedding, boarding and water application were sufficient in this range

  15. Optimization of vehicle-trailer connection systems

    NASA Astrophysics Data System (ADS)

    Sorge, F.

    2016-09-01

    The three main requirements of a vehicle-trailer connection system are: en route stability, over- or under-steering restraint, minimum off-tracking along curved path. Linking the two units by four-bar trapeziums, wider stability margins may be attained in comparison with the conventional pintle-hitch for both instability types, divergent or oscillating. The stability maps are traced applying the Hurwitz method or the direct analysis of the characteristic equation at the instability threshold. Several types of four-bar linkages may be quickly tested, with the drawbars converging towards the trailer or the towing unit. The latter configuration appears preferable in terms of self-stability and may yield high critical speeds by optimising the geometrical and physical properties. Nevertheless, the system stability may be improved in general by additional vibration dampers in parallel with the connection linkage. Moreover, the four-bar connection may produce significant corrections of the under-steering or over-steering behaviour of the vehicle-train after a steering command from the driver. The off- tracking along the curved paths may be also optimized or kept inside prefixed margins of acceptableness. Activating electronic stability systems if necessary, fair results are obtainable for both the steering conduct and the off-tracking.

  16. Enhanced methods for operating refueling station tube-trailers to reduce refueling cost

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Elgowainy, Amgad; Reddi, Krishna

    A method and apparatus are provided for operating a refueling station including source tube-trailers and at least one compressor to reduce refueling cost. The refueling station includes a gaseous fuel supply source including a plurality of tanks on a tube trailer coupled to a first control unit, and high pressure buffer storage having predefined capacity coupled to a second control unit and the first tanks by a pressure control valve and the first control unit, and at least one compressor. The refueling station is operated at different modes depending on a state of the refueling station at the beginning ofmore » each operational mode. The refueling system is assessed at the end of each operational mode to identify the state of the system and select a next mode of operation. The operational modes include consolidating hydrogen, or any gaseous fuel, within the tubes mounted on the trailer.« less

  17. Tyre induced vibrations of the car-trailer system

    NASA Astrophysics Data System (ADS)

    Beregi, S.; Takács, D.; Stépán, G.

    2016-02-01

    The lateral and yaw dynamics of the car-trailer combination are analysed by means of a single track model. The equations of motion are derived rigorously by means of the Appell-Gibbs equations for constant longitudinal velocity of the vehicle. The tyres are described with the help of the so-called delayed tyre model, which is based on a brush model with pure rolling contact. The lateral forces and aligning torques of the tyre/road interaction are calculated via the instantaneous lateral deformations in the contact patches. The linear stability analysis of the rectilinear motion is performed via the analytically determined characteristic function of the system. Stability charts are constructed with respect to the vehicle longitudinal velocity and the payload position on the trailer. Self-excited lateral vibrations are detected with different vibration modes at low and at high longitudinal speeds of the vehicle. The effects of the tyre parameters are also investigated.

  18. Lance Handbook, Firing Team Leader’s

    DTIC Science & Technology

    1983-03-01

    Matches Crimpers Electrical Tape Blasting Caps Sandbags NOTE: Blasting caps should not be carried near troops. Sandbag in a trailer when possible. 11...cover should be kept inside the safe-arm lockbox and the key in the possession of the senior person in charge. 14. M2A3/ M2A4 SHAPE CHARGES...secured; blasting caps can be carried in k-ton trailer). m. Extra BA-30 batteries. n. VRC-46 radio. 0. RC 292 antenna. p. CDS card. q. 1150 for round

  19. Safe and Secure

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2010-01-01

    The education headlines have been filled with grim news about facility closings, teacher layoffs and program cutbacks. When the economic climate is gloomy, few areas of schools and universities are spared. In areas outside the classroom, such as safety and security, the cuts may be larger and come more quickly. When money is scarce, education…

  20. View of EPA Farm cattle shelter (featuring horse trailer), facing ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    View of EPA Farm cattle shelter (featuring horse trailer), facing northwest - Nevada Test Site, Environmental Protection Agency Farm, Shelter Unit Type, Area 15, Yucca Flat, 10-2 Road near Circle Road, Mercury, Nye County, NV

  1. Safe and Secure

    ERIC Educational Resources Information Center

    Cavanagh, Sean

    2004-01-01

    Since the Sept. 11, 2001, terrorist attacks, student interest in school programs dealing with careers in law, public safety, and national security is on the rise. This article describes students' experiences at the Academy for Law and Public Safety at Butler High School in Butler, New Jersey. This vocational academy is one of a number of career…

  2. The Mobile Educational Trailer Unit in Outdoor Teaching.

    ERIC Educational Resources Information Center

    Rillo, Thomas J.

    The concept of achieving mobility for outdoor teaching using a small mobile educational unit and the techniques of facilitating the mobility of equipment and supplies are discussed in this article. A small trailer unit can be used to enrich the learning experiences of students. Since the mobile educational unit is adaptable, it can be used as a…

  3. Driver Training Simulator for Backing Up Commercial Vehicles with Trailers

    NASA Astrophysics Data System (ADS)

    Berg, Uwe; Wojke, Philipp; Zöbel, Dieter

    Backing up tractors with trailers is a difficult task since the kinematic behavior of articulated vehicles is complex and hard to control. Especially unskilled drivers are overstrained with the complicated steering process. To learn and practice the steering behavior of articulated vehicles, we developed a 3D driving simulator. The simulator can handle different types of articulated vehicles like semi-trailers, one- and two-axle trailers, or gigaliners. The use of a driving simulator offers many advantages over the use of real vehicles. One of the main advantages is the possibility to learn the steering behavior of all vehicle types. Drivers can be given more and better driving instructions like collision warnings or steering hints. Furthermore, the driver training costs can be reduced. Moreover, mistakes of the student do not lead to real damages and costly repairs. The hardware of the simulator consists of a low cost commercial driving stand with original truck parts, a projection of the windshield and two flat panel monitors for the left and right exterior mirrors. Standard PC hardware is used for controlling the driving stand and for generating the realtime 3D environment. Each aspect of the simulation like realistic vehicle movements or generation of different views, is handled by a specific software module. This flexible system can be easily extended which offers the opportunity for other uses than just driver training. Therefore, we use the simulator for the development and test of driver assistance systems.

  4. Pathways of Youth Development in a Rural Trailer Park

    ERIC Educational Resources Information Center

    MacTavish, Katherine A.; Salamon, Sonya

    2006-01-01

    Limited empirical documentation exists for the developmental pathways available to "rural" youth growing up in low-resource community settings. Drawing on ethnographic data, this article examines the developmental pathways experienced by youth in a rural trailer park. Findings reveal how various factors, some inherent to working poor class status…

  5. Secure, safe, and sensitive solutions.

    PubMed

    Hughan, Tina

    2012-04-01

    Tabloid sensationalism aside, the increase in attacks on health service workers has led to many hospitals and healthcare facilities re-assessing their security systems. Here, Tina Hughan, head of marketing for specialist in door opening systems, Assa Abloy, gives her view on how security providers can help healthcare estates and facilities teams to cope with this disturbing trend.

  6. Strategies for Countering Terrorist Safe Havens

    DTIC Science & Technology

    2014-02-20

    within safe havens, tactical containment, pseudo operations, and surrogate security forces. The thesis draws from four historical case studies to...leadership targeting within safe havens, tactical containment, pseudo operations, and surrogate security forces. The thesis draws from four historical case ...surrogate forces and pseudo operations—provide viable potential options for USSOF to counter the complex problem of safe havens. Overall, the case

  7. PRELAUNCH - GEMINI-TITAN (GT)-12 - LEAVE TRAILER - CAPE

    NASA Image and Video Library

    1966-11-11

    S66-59916 (11 Nov. 1966) --- Prime crew for the Gemini-12 spaceflight, astronauts James A. Lovell Jr. (leading), command pilot, and Edwin E. Aldrin Jr., pilot, leave the suiting trailer at Launch Complex 16 during prelaunch countdown. Moments later they entered a transport van which carried them to Pad 19 and their waiting spacecraft. The liftoff was at 3:46 p.m. (EST), Nov. 11, 1966. Photo credit: NASA

  8. Variation of Farmer Stock Grade Factors in Semi-Drying Trailers

    USDA-ARS?s Scientific Manuscript database

    Peanuts are increasingly being loaded into flat bottom semi-drying trailers in the field and transported to peanut buying points for curing, grading, and marketing. Conveyances in excess of 15 t are probed 15 times using the pneumatic sampler requiring considerable time for probing and reducing the...

  9. Fast neutron counting in a mobile, trailer-based search platform

    NASA Astrophysics Data System (ADS)

    Hayward, Jason P.; Sparger, John; Fabris, Lorenzo; Newby, Robert J.

    2017-12-01

    Trailer-based search platforms for detection of radiological and nuclear threats are often based upon coded aperture gamma-ray imaging, because this method can be rendered insensitive to local variations in gamma background while still localizing the source well. Since gamma source emissions are rather easily shielded, in this work we consider the addition of fast neutron counting to a mobile platform for detection of sources containing Pu. A proof-of-concept system capable of combined gamma and neutron coded-aperture imaging was built inside of a trailer and used to detect a 252Cf source while driving along a roadway. Neutron detector types employed included EJ-309 in a detector plane and EJ-299-33 in a front mask plane. While the 252Cf gamma emissions were not readily detectable while driving by at 16.9 m standoff, the neutron emissions can be detected while moving. Mobile detection performance for this system and a scaled-up system design are presented, along with implications for threat sensing.

  10. Study of Aerodynamic Drag Reduction on a Full-Scale Tractor-Trailer

    DOT National Transportation Integrated Search

    1976-04-01

    Aerodynamic drag tests were performed on a tractor-trailer combination using the coast-down method on a smooth, nearly level runway. The tests included an investigation of drag reduction obtained with add-on devices that are commercially available or...

  11. 49 CFR Figure 3 to Subpart E of... - Trailer Car End Structure Conceptual Implementation 1-to Subpart E

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Trailer Car End Structure Conceptual Implementation 1-to Subpart E 3 Figure 3 to Subpart E of Part 238 Transportation Other Regulations Relating to... to Subpart E of Part 238—Trailer Car End Structure Conceptual Implementation 1—to Subpart E ER12MY99...

  12. 49 CFR Figure 3 to Subpart E of... - Trailer Car End Structure Conceptual Implementation 1-to Subpart E

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Trailer Car End Structure Conceptual Implementation 1-to Subpart E 3 Figure 3 to Subpart E of Part 238 Transportation Other Regulations Relating to... to Subpart E of Part 238—Trailer Car End Structure Conceptual Implementation 1—to Subpart E ER12MY99...

  13. 15. Photocopy of drawing of battery control trailer from 'Procedures ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    15. Photocopy of drawing of battery control trailer from 'Procedures and Drills for the NIKE Ajax System,' Department of the Army Field Manual, FM-44-80 from Institute for Military History, Carlisle Barracks, Carlisle, PA, 1956 - NIKE Missile Battery PR-79, East Windsor Road south of State Route 101, Foster, Providence County, RI

  14. Advertising Citizen Science: A Trailer for the Citizen Sky Project

    NASA Astrophysics Data System (ADS)

    Wyatt, Ryan; Price, A.

    2012-01-01

    Citizen Sky is a multi-year, NSF funded citizen science project involving the bright and mysterious variable star epsilon Aurigae. The project was conceived by the IYA 2009 working group on Research Experiences for Students, Teachers, and Citizen-Scientists. Citizen Sky goes beyond simple observing to include a major data analysis component, introducing participants to the full scientific process from background research to paper writing for a peer-reviewed journal. As a means of generating interest in the project, the California Academy of Sciences produced a six-minute "trailer” formatted for both traditional and fulldome planetariums as well as HD and web applications. This talk will review the production process for the trailer as well as the methods of distribution via planetariums, social media, and other venues_along with an update on the Citizen Sky Project as a whole. We will show how to use a small, professionally-produced planetarium trailer to help spread word on a citizen science project. We will also show preliminary results on a study about how participation level/type in the project affects science learning.

  15. Effects of trailer design on animal welfare parameters and carcass and meat quality of three Pietrain crosses being transported over a long distance.

    PubMed

    Weschenfelder, A V; Torrey, S; Devillers, N; Crowe, T; Bassols, A; Saco, Y; Piñeiro, M; Saucier, L; Faucitano, L

    2012-09-01

    This study aimed at evaluating the effects of trailer design on stress responses and meat quality traits of 3 different pig crosses: 50% Pietrain breeding with halothane (HAL)(Nn) (50Nn); 50% Pietrain breeding with HAL(NN) (50NN); and 25% Pietrain breeding with HAL(NN) genotype (25NN). Over a 6-wk period, pigs (120 pigs/crossbreed) were transported for 7 h in either a pot-belly (PB) or flat-deck (FD) trailer (10 pigs/crossbreed(-1)·trailer(-1)·wk(-1)). Temperature (T) and relative humidity (RH) were monitored in each trailer. Behaviors during loading and unloading, time to load and unload, and latency to rest in lairage were recorded, whereas a sub-population of pigs (4 pigs/crossbreed(-1)·trailer(-1)·wk(-1)) was equipped with gastro-intestinal tract (GIT) temperature monitors. Blood samples were collected at exsanguination for measurement of cortisol, creatine kinase (CK), lactate, haptoglobin, and Pig-MAP concentrations. Meat quality data were collected at 24 h postmortem from the LM and semimembranosus (SM) and adductor (AD) muscles of all 360 pigs. Greater T were recorded in the PB trailer during transportation (P = 0.006) and unloading (P < 0.001). Delta GIT temperature was greater (P = 0.01) in pigs unloaded from the PB. At loading, pigs tended to move backwards more (P = 0.06) when loaded on the FD than the PB trailer. At unloading, an interaction was found between trailer type and crossbreed type, with a greater (P < 0.01) frequency of overlaps in 50NN and 25NN pigs and slips/falls in 50Nn and 50NN pigs from the FD than the PB trailer. Cortisol concentrations at slaughter were greater (P = 0.02) in pigs transported in the PB than FD trailer. Greater lactate concentrations were found in 50Nn and 50NN pigs (P = 0.003) and greater CK concentrations (P < 0.001) in 50Nn pigs. As expected, 50Nn pigs produced leaner (P < 0.001) carcasses, with greater (P = 0.01) dressing percentages, as well as lower (P < 0.001) ultimate pH values and greater (P < 0.001) drip

  16. Quarantined Apollo 11 Astronauts Loaded Onto Trailer For Transport

    NASA Technical Reports Server (NTRS)

    1969-01-01

    The Apollo 11 mission, the first manned lunar mission, launched from the Kennedy Space Center, Florida via the Marshall Space Flight Center (MSFC) developed Saturn V launch vehicle on July 16, 1969 and safely returned to Earth on July 24, 1969. Aboard the space craft were astronauts Neil A. Armstrong, commander; Michael Collins, Command Module (CM) pilot; and Edwin E. Aldrin Jr., Lunar Module (LM) pilot. The CM, piloted by Michael Collins remained in a parking orbit around the Moon while the LM, named 'Eagle'', carrying astronauts Neil Armstrong and Edwin Aldrin, landed on the Moon. During 2½ hours of surface exploration, the crew collected 47 pounds of lunar surface material for analysis back on Earth. The recovery operation took place in the Pacific Ocean where Navy para-rescue men recovered the capsule housing the 3-man Apollo 11 crew. The crew was airlifted to safety aboard the U.S.S. Hornet recovery ship, where they were quartered in a Mobile Quarantine Facility (MQF) which served as their home for 21 days. In this photo taken at Pearl Harbor, Hawaii, the quarantined housing facility is being lowered from the U.S.S. Hornet, onto a trailer for transport to Hickam Field. From there, it was loaded aboard an Air Force C-141 jet and flown back to Ellington Air Force Base Texas, and then on to the NASA Manned Spacecraft Center (MSC) Lunar Receiving Laboratory in Houston, Texas.

  17. Analytical approach to determine vertical dynamics of a semi-trailer truck from the point of view of goods protection

    NASA Astrophysics Data System (ADS)

    Pidl, Renáta

    2018-01-01

    The overwhelming majority of intercontinental long-haul transportations of goods are usually carried out on road by semi-trailer trucks. Vibration has a major effect regarding the safety of the transport, the load and the transported goods. This paper deals with the logistics goals from the point of view of vibration and summarizes the methods to predict or measure the vibration load in order to design a proper system. From these methods, the focus of this paper is on the computer simulation of the vibration. An analytical method is presented to calculate the vertical dynamics of a semi-trailer truck containing general viscous damping and exposed to harmonic base excitation. For the purpose of a better understanding, the method will be presented through a simplified four degrees-of-freedom (DOF) half-vehicle model, which neglects the stiffness and damping of the tires, thus the four degrees-of-freedom are the vertical and angular displacements of the truck and the trailer. From the vertical and angular accelerations of the trailer, the vertical acceleration of each point of the platform of the trailer can easily be determined, from which the forces acting on the transported goods are given. As a result of this paper the response of the full platform-load-packaging system to any kind of vehicle, any kind of load and any kind of road condition can be analyzed. The peak acceleration of any point on the platform can be determined by the presented analytical method.

  18. Strategies for Countering Terrorist Safe Havens

    DTIC Science & Technology

    2013-12-01

    tactical containment, pseudo operations, and surrogate security forces. The thesis draws from four historical case studies to examine these strategies...safe havens, tactical containment, pseudo operations, and surrogate security forces. The thesis draws from four historical case studies to examine...pseudo operations—provide viable potential options for USSOF to counter the complex problem of safe havens. Overall, the case studies will demonstrate

  19. GEMINI-TITAN (GT)-7 - PRELAUNCH ACTIVITY - COMMAND PILOT (LEAVES SUITING TRAILER) - CAPE

    NASA Image and Video Library

    1965-12-04

    S65-59932 (4 Dec. 1965) --- Prime crew for the Gemini-7 spaceflight astronauts James A. Lovell Jr. (front), pilot, and Frank Borman, command pilot, leave the suiting trailer at Launch Complex 16 during prelaunch countdown at Cape Kennedy, Florida. Photo credit: NASA

  20. How Safe Are Our Libraries?

    ERIC Educational Resources Information Center

    St. Lifer, Evan

    1994-01-01

    Addresses issues of safety and security in libraries. Topics discussed include keeping library collections safe; patron behavioral problems; factoring loss into the budget; staff theft; access versus security; apathy regarding library crime; a need for a unified security apparatus; preventive measures; staff and patron safety; and a…

  1. Keeping Students Safe: Introducing the Monolithic Dome

    ERIC Educational Resources Information Center

    Lanham, Carol

    2009-01-01

    The tiny town of Niangua, Missouri, made national headlines in 2008 when a rare cluster of winter tornadoes tore across the state on an unseasonably warm January night. The twisters killed a Niangua woman in her trailer home and destroyed numerous other structures. News photos of the trailer debris were a sobering reminder of the vulnerability of…

  2. Video Book Trailers: Coming to a Library Near You! Spotlight Feature

    ERIC Educational Resources Information Center

    Dopke-Wilson, MariRae

    2009-01-01

    This article features two library media specialists who discovered a way to motivate high school students to read. When most people go to the movies, the "coming attractions" or movie trailers are as anticipated as the popcorn! This Americana movie tradition hooks people again and again on what they will come back to see next. So, it's no surprise…

  3. 8. VIEW, LOOKING NORTHEAST, FROM THE T371 TRAILERS. IN THE ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    8. VIEW, LOOKING NORTHEAST, FROM THE T371 TRAILERS. IN THE FOREGROUND IS BUILDING 371, BUILT IN 1981 TO REPLACE BUILDING 771 FOR PLUTONIUM RECOVERY OPERATIONS. IN THE BACKGROUND, TO THE EAST OF BUILDING 371, ARE THE 700 - AREA BUILDINGS, PLUTONIUM OPERATIONS. - Rocky Flats Plant, Bounded by Indiana Street & Routes 93, 128 & 72, Golden, Jefferson County, CO

  4. Seed spillage from grain trailers on road verges during oilseed rape harvest: an experimental survey.

    PubMed

    Bailleul, Diane; Ollier, Sébastien; Huet, Sylvie; Gardarin, Antoine; Lecomte, Jane

    2012-01-01

    Anthropogenic vectors enhance the natural dispersal capacity of plant seeds significantly in terms of quantity and distance. Human-mediated seed dispersal (i.e. anthropochory) greatly increases the dispersal of crop species across agroecosystems. In the case of oilseed rape (OSR), spillage of seeds from grain trailers during harvest has never been quantified. Our experimental approach involved establishing 85 seed trap-sites on the road verges of an agricultural area around the grain silo of Selommes (Loir-et-Cher, France). We recorded OSR spillage during harvest and applied a linear model to the data. The amount of seed spilled was related positively to the area of the OSR fields served by the road, whereas the amount of seed spilled decreased with other variables, such as distance from the trap-site to the verge of the road and to the nearest field. The distance to the grain silo, through local and regional effects, affected seed loss. Local effects from fields adjacent to the road resulted in a cumulative spillage on one-lane roads. On two-lane roads, spillage was nearly constant whatever the distance to the silo due to a mixture of these local effects and of grain trailers that joined the road from more distant fields. From the data, we predicted the number of seeds lost from grain trailers on one road verge in the study area. We predicted a total spillage of 2.05 × 10(6) seeds (± 4.76 × 10(5)) along the road length, which represented a mean of 404 ± 94 seeds per m(2). Containment of OSR seeds will always be challenging. However, seed spillage could be reduced if grain trailers were covered and filled with less seed. Reducing distances travelled between fields and silos could also limit seed loss.

  5. Safe-haven locking device

    DOEpatents

    Williams, J.V.

    1984-04-26

    Disclosed is a locking device for eliminating external control of a secured space formed by fixed and movable barriers. The locking device uses externally and internally controlled locksets and a movable strike, operable from the secured side of the movable barrier, to selectively engage either lockset. A disengagement device, for preventing forces from being applied to the lock bolts is also disclosed. In this manner, a secured space can be controlled from the secured side as a safe-haven. 4 figures.

  6. Evaluation of the new Virginia Dept. of Highways and Transportation skid testing trailer.

    DOT National Transportation Integrated Search

    1975-01-01

    The purpose of this study was to evaluate the new skid trailer obtained by the Virginia Department of Highways & Transportation and to determine how the survey skid testing program should be conducted in light of the findings. Specifically, those thi...

  7. Low-drag ground vehicle particularly suited for use in safely transporting livestock

    NASA Technical Reports Server (NTRS)

    Saltzman, E. J. (Inventor)

    1982-01-01

    A low-drag truck consisting of a tractor-trailer rig characterized by a rounded forebody and a protective fairing for the gap conventionally found to exist between the tractor and the trailer is described. The fairing particularly suited for establishing an attached flow of ambient air along its surfaces. The truck is also comprised of a forward facing, ram air inlet and duct and a plurality of submerged inlets and outflow ports communicating with the trailer for continuously flushing heated gases from the trailer as the rig is propelled at highway speeds.

  8. Time and Space Partition Platform for Safe and Secure Flight Software

    NASA Astrophysics Data System (ADS)

    Esquinas, Angel; Zamorano, Juan; de la Puente, Juan A.; Masmano, Miguel; Crespo, Alfons

    2012-08-01

    There are a number of research and development activities that are exploring Time and Space Partition (TSP) to implement safe and secure flight software. This approach allows to execute different real-time applications with different levels of criticality in the same computer board. In order to do that, flight applications must be isolated from each other in the temporal and spatial domains. This paper presents the first results of a partitioning platform based on the Open Ravenscar Kernel (ORK+) and the XtratuM hypervisor. ORK+ is a small, reliable realtime kernel supporting the Ada Ravenscar Computational model that is central to the ASSERT development process. XtratuM supports multiple virtual machines, i.e. partitions, on a single computer and is being used in the Integrated Modular Avionics for Space study. ORK+ executes in an XtratuM partition enabling Ada applications to share the computer board with other applications.

  9. Development of Self-Remediating Packaging for Safe and Secure Transport of Infectious Substances.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Guilinger, Terry Rae; Gaudioso, Jennifer M; Aceto, Donato Gonzalo

    As George W. Bush recognized in November 2001, "Infectious diseases make no distinctions among people and recognize no borders." By their very nature, infectious diseases of natural or intentional (bioterrorist) origins are capable of threatening regional health systems and economies. The best mechanism for minimizing the spread and impact of infectious disease is rapid disease detection and diagnosis. For rapid diagnosis to occur, infectious substances (IS) must be transported very quickly to appropriate laboratories, sometimes located across the world. Shipment of IS is problematic since many carriers, concerned about leaking packages, refuse to ship this material. The current packaging doesmore » not have any ability to neutralize or kill leaking IS. The technology described here was developed by Sandia National Laboratories to provide a fail-safe packaging system for shipment of IS that will increase the likelihood that critical material can be shipped to appropriate laboratories following a bioterrorism event or the outbreak of an infectious disease. This safe and secure packaging method contains a novel decontaminating material that will kill or neutralize any leaking infectious organisms; this feature will decrease the risk associated with shipping IS, making transport more efficient. 3 DRAFT4« less

  10. Security Evolution.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  11. June 7, 2017 Webinar: Heavy-Duty Highway Trailers Verify Certification Module and Manufacturer Testing Information

    EPA Pesticide Factsheets

    This EPA webinar provides information on the Verify module for heavy-duty highway trailer manufacturers including introduction, user registration process, submitting certification information, request for certificate, testing and deployment information.

  12. 41 CFR 302-7.20 - If my HHG shipment includes an item (e.g., boat, trailer, ultralight vehicle) for which a weight...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... includes an item (e.g., boat, trailer, ultralight vehicle) for which a weight additive is assessed by the... which a weight additive is assessed by the HHG carrier, am I responsible for payment? If your HHG shipment includes an item (e.g., boat or trailer of reasonable size) for which a weight additive is...

  13. 41 CFR 302-7.20 - If my HHG shipment includes an item (e.g., boat, trailer, ultralight vehicle) for which a weight...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... includes an item (e.g., boat, trailer, ultralight vehicle) for which a weight additive is assessed by the... which a weight additive is assessed by the HHG carrier, am I responsible for payment? If your HHG shipment includes an item (e.g., boat or trailer of reasonable size) for which a weight additive is...

  14. A Summary of the Experimental Results for a Generic Tractor-Trailer in the Ames Research Center 7- by 10-Foot and 12-Foot Wind Tunnels

    NASA Technical Reports Server (NTRS)

    Storms, Bruce L.; Satran, Dale R.; Heineck, James T.; Walker, Stephen M.

    2006-01-01

    Experimental measurements of a generic tractor-trailer were obtained in two wind tunnels at Ames Research Center. After a preliminary study at atmospheric conditions in the 7- by 10-Foot Wind Tunnel, additional testing was conducted at Reynolds numbers corresponding to full-scale highway speeds in the 12-Foot Pressure Wind Tunnel. To facilitate computational modeling, the 1:8-scale geometry, designated the Generic Conventional Model, included a simplified underbody and omitted many small-scale details. The measurements included overall and component forces and moments, static and dynamic surface pressures, and three-component particle image velocimetry. This summary report highlights the effects of numerous drag reduction concepts and provides details of the model installation in both wind tunnels. To provide a basis for comparison, the wind-averaged drag coefficient was tabulated for all configurations tested. Relative to the baseline configuration representative of a modern class-8 tractor-trailer, the most effective concepts were the trailer base flaps and trailer belly box providing a drag-coefficient reduction of 0.0855 and 0.0494, respectively. Trailer side skirts were less effective yielding a drag reduction of 0.0260. The database of this experimental effort is publicly available for further analysis.

  15. ASTRONAUT JAMES A. LOVELL, JR. - PRELAUNCH - GT-12 - LEAVE TRAILER - CAPE

    NASA Image and Video Library

    1966-11-11

    S66-59974 (11 Nov. 1966) --- Prime crew for the Gemini-12 spaceflight, astronauts James A. Lovell Jr., (leading), command pilot, and Edwin E. Aldrin Jr., pilot, leave the suiting trailer at Launch Complex 16 during prelaunch countdown. Moments later they entered a transport van which carried them to Pad 19 and their waiting spacecraft. The liftoff was at 3:46 p.m. (EST), Nov. 11, 1966. Photo credit: NASA

  16. Information security : is your information safe?

    DOT National Transportation Integrated Search

    1999-01-01

    This article characterizes the problem of cyber-terrorism, outlines the Federal government's response to several security-related concerns, and describes the Volpe Center's critical support to this response. The possibility of catastrophic terrorist ...

  17. A small stem-loop structure of the Ebola virus trailer is essential for replication and interacts with heat-shock protein A8

    PubMed Central

    Sztuba-Solinska, Joanna; Diaz, Larissa; Kumar, Mia R.; Kolb, Gaëlle; Wiley, Michael R.; Jozwick, Lucas; Kuhn, Jens H.; Palacios, Gustavo; Radoshitzky, Sheli R.; J. Le Grice, Stuart F.; Johnson, Reed F.

    2016-01-01

    Ebola virus (EBOV) is a single-stranded negative-sense RNA virus belonging to the Filoviridae family. The leader and trailer non-coding regions of the EBOV genome likely regulate its transcription, replication, and progeny genome packaging. We investigated the cis-acting RNA signals involved in RNA–RNA and RNA–protein interactions that regulate replication of eGFP-encoding EBOV minigenomic RNA and identified heat shock cognate protein family A (HSC70) member 8 (HSPA8) as an EBOV trailer-interacting host protein. Mutational analysis of the trailer HSPA8 binding motif revealed that this interaction is essential for EBOV minigenome replication. Selective 2′-hydroxyl acylation analyzed by primer extension analysis of the secondary structure of the EBOV minigenomic RNA indicates formation of a small stem-loop composed of the HSPA8 motif, a 3′ stem-loop (nucleotides 1868–1890) that is similar to a previously identified structure in the replicative intermediate (RI) RNA and a panhandle domain involving a trailer-to-leader interaction. Results of minigenome assays and an EBOV reverse genetic system rescue support a role for both the panhandle domain and HSPA8 motif 1 in virus replication. PMID:27651462

  18. Fuel Consumption of Tractor-Trailer Trucks as Affected by Speed Limit and Payload Weight

    DOT National Transportation Integrated Search

    1975-11-01

    The effect of speed limit and payload weight on fuel consumption was determined in tests of tractor-trailer rigs. Two virtually identical vehicles were used, one loaded with a 28,000 lb payload and the other carrying 42,000 lbs; each was driven over ...

  19. Safe teleradiology: information assurance as project planning methodology

    NASA Astrophysics Data System (ADS)

    Collmann, Jeff R.; Alaoui, Adil; Nguyen, Dan; Lindisch, David

    2003-05-01

    This project demonstrates use of OCTAVE, an information security risk assessment method, as an approach to the safe design and planning of a teleradiology system. By adopting this approach to project planning, we intended to provide evidence that including information security as an intrinsic component of project planning improves information assurance and that using information assurance as a planning tool produces and improves the general system management plan. Several considerations justify this approach to planning a safe teleradiology system. First, because OCTAVE was designed as a method for retrospectively assessing and proposing enhancements for the security of existing information management systems, it should function well as a guide to prospectively designing and deploying a secure information system such as teleradiology. Second, because OCTAVE provides assessment and planning tools for use primarily by interdisciplinary teams from user organizations, not consultants, it should enhance the ability of such teams at the local level to plan safe information systems. Third, from the perspective of sociological theory, OCTAVE explicitly attempts to enhance organizational conditions identified as necessary to safely manage complex technologies. Approaching information system design from the perspective of information security risk management proactively integrates health information assurance into a project"s core. This contrasts with typical approaches that perceive "security" as a secondary attribute to be "added" after designing the system and with approaches that identify information assurance only with security devices and user training. The perspective of health information assurance embraces so many dimensions of a computerized health information system"s design that one may successfully deploy a method for retrospectively assessing information security risk as a prospective planning tool. From a sociological perspective, this approach enhances the

  20. Two-tier tube-trailer pressure consolidation operation method for hydrogen refueling station cost reduction

    DOE PAGES

    Reddi, Krishna; Elgowainy, Amgad; Rustagi, Neha; ...

    2018-01-10

    An operation strategy known as two-tier “pressure consolidation” of delivered tube-trailers (or equivalent supply storage) has been developed to maximize the throughput at gaseous hydrogen refueling stations (HRSs) for fuel cell electric vehicles (FCEVs). The high capital costs of HRSs and the consequent high investment risk are deterring growth of the infrastructure needed to promote the deployment of FCEVs. Stations supplied by gaseous hydrogen will be necessary for FCEV deployment in both the near and long term. Here, the two-tier pressure consolidation method enhances gaseous HRSs in the following ways: (1) reduces the capital cost compared with conventional stations, asmore » well as those operating according to the original pressure consolidation approach described by Elgowainy et al. (2014) [1], (2) minimizes pressure cycling of HRS supply storage relative to the original pressure consolidation approach; and (3) increases use of the station’s supply storage (or delivered tube-trailers) while maintaining higher state-of-charge vehicle fills.« less

  1. Two-tier tube-trailer pressure consolidation operation method for hydrogen refueling station cost reduction

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Reddi, Krishna; Elgowainy, Amgad; Rustagi, Neha

    An operation strategy known as two-tier “pressure consolidation” of delivered tube-trailers (or equivalent supply storage) has been developed to maximize the throughput at gaseous hydrogen refueling stations (HRSs) for fuel cell electric vehicles (FCEVs). The high capital costs of HRSs and the consequent high investment risk are deterring growth of the infrastructure needed to promote the deployment of FCEVs. Stations supplied by gaseous hydrogen will be necessary for FCEV deployment in both the near and long term. Here, the two-tier pressure consolidation method enhances gaseous HRSs in the following ways: (1) reduces the capital cost compared with conventional stations, asmore » well as those operating according to the original pressure consolidation approach described by Elgowainy et al. (2014) [1], (2) minimizes pressure cycling of HRS supply storage relative to the original pressure consolidation approach; and (3) increases use of the station’s supply storage (or delivered tube-trailers) while maintaining higher state-of-charge vehicle fills.« less

  2. Novel method for on-road emission factor measurements using a plume capture trailer.

    PubMed

    Morawska, L; Ristovski, Z D; Johnson, G R; Jayaratne, E R; Mengersen, K

    2007-01-15

    The method outlined provides for emission factor measurements to be made for unmodified vehicles driving under real world conditions at minimal cost. The method consists of a plume capture trailer towed behind a test vehicle. The trailer collects a sample of the naturally diluted plume in a 200 L conductive bag and this is delivered immediately to a mobile laboratory for subsequent analysis of particulate and gaseous emissions. The method offers low test turnaround times with the potential to complete much larger numbers of emission factor measurements than have been possible using dynamometer testing. Samples can be collected at distances up to 3 m from the exhaust pipe allowing investigation of early dilution processes. Particle size distribution measurements, as well as particle number and mass emission factor measurements, based on naturally diluted plumes are presented. A dilution profile relating the plume dilution ratio to distance from the vehicle tail pipe for a diesel passenger vehicle is also presented. Such profiles are an essential input for new mechanistic roadway air quality models.

  3. How To Keep Your Schools Safe and Secure.

    ERIC Educational Resources Information Center

    Gilbert, Christopher B.

    1996-01-01

    Discusses unforeseen costs (including potential litigation expenses), benefits, and consequences of adopting security measures (such as metal detectors, drug dogs, security cameras, campus police, dress codes, crime watch programs, and communication devices) to counter on-campus violence and gang activity. High-tech gadgetry alone is insufficient.…

  4. 33 CFR 62.27 - Safe water marks.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Safe water marks. 62.27 Section 62.27 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION UNITED STATES AIDS TO NAVIGATION SYSTEM The U.S. Aids to Navigation System § 62.27 Safe water marks. Safe...

  5. Piezoelectric-based actuators for improved tractor-trailer performance (Conference Presentation)

    NASA Astrophysics Data System (ADS)

    Menicovich, David; Amitay, Michael; Gallardo, Daniele

    2017-04-01

    The application of piezo-electrically-driven synthetic-jet-based active flow control to reduce drag on tractor-trailers and to improve thermal mixing in refrigerated trailers was explored on full-scale tests. The active flow control technique that is being used relies on a modular system comprised of distributed, small, highly efficient actuators. These actuators, called synthetic jets, are jets that are synthesized at the edge of an orifice by a periodic motion of a piezoelectric diaphragm(s) mounted on one (or more) walls of a sealed cavity. The synthetic jet is zero net mass flux (ZNMF), but it allows momentum transfer to flow. It is typically driven near diaphragm and/or cavity resonance, and therefore, small electric input [O(10W)] is required. Another advantage of this actuator is that no plumbing is required. The system doesn't require changes to the body of the truck, can be easily reconfigured to various types of vehicles, and consumes small amounts of electrical power from the existing electrical system of the truck. The actuators are operated in a closed feedback loop based on inputs received from the tractor's electronic control unit, various system components and environmental sensors. The data are collected and processed on-board and transmitted to a cloud-based data management platform for further big data analytics and diagnostics. The system functions as a smart connected product through the interchange of data between the physical truck-mounted system and its cloud platform.

  6. Keys to a Safe, Secure School.

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2002-01-01

    Outlines 10 steps that school administrators can take to make their schools safer and more secure for students and staff. These steps encompass crime prevention through environmental design, crisis planning, entrances, lighting, police presence, prevention programs, rapport with students, smaller schools, technology implementation, and staff…

  7. JPSS-1 Spacecraft Canning and Lift to Transport Trailer

    NASA Image and Video Library

    2017-10-23

    In the Astrotech Processing Facility at Vandenberg Air Force Base in California, technicians and engineers place the Joint Polar Satellite System-1, or JPSS-1, spacecraft in a protective container. It then will be mounted on a transport trailer for its move to Space Launch Complex 2. At the pad, JPSS-1 will be lifted for mating atop a United Launch Alliance Delta II rocket. Built by Ball Aerospace and Technologies Corp. of Boulder, Colorado, JPSS is the first in a series four next-generation environmental satellites in a collaborative program between the NOAA and NASA. Liftoff is scheduled to take place from Vandenberg's Space Launch Complex 2.

  8. JPSS-1 Spacecraft Canning and Lift to Transport Trailer

    NASA Image and Video Library

    2017-10-23

    At Vandenberg Air Force Base in California, technicians and engineers have placed the Joint Polar Satellite System-1, or JPSS-1, spacecraft in a protective container. It then will be mounted on a transport trailer for its move from the Astrotech Processing Facility to Space Launch Complex 2. At the pad, JPSS-1 will be lifted for mating atop a United Launch Alliance Delta II rocket. Built by Ball Aerospace and Technologies Corp. of Boulder, Colorado, JPSS is the first in a series four next-generation environmental satellites in a collaborative program between the NOAA and NASA. Liftoff is scheduled to take place from Vandenberg's Space Launch Complex 2.

  9. JPSS-1 Spacecraft Canning and Lift to Transport Trailer

    NASA Image and Video Library

    2017-10-23

    In the Astrotech Processing Facility at Vandenberg Air Force Base in California, technicians and engineers place the Joint Polar Satellite System-1, or JPSS-1, spacecraft in a protective container. It is then mounted on a transport trailer for its move to Space Launch Complex 2. At the pad, JPSS-1 will be lifted for mating atop a United Launch Alliance Delta II rocket. Built by Ball Aerospace and Technologies Corp. of Boulder, Colorado, JPSS is the first in a series four next-generation environmental satellites in a collaborative program between the NOAA and NASA. Liftoff is scheduled to take place from Vandenberg's Space Launch Complex 2.

  10. Trailer temperature and humidity during winter transport of cattle in Canada and evaluation of indicators used to assess the welfare of cull beef cows before and after transport.

    PubMed

    Goldhawk, C; Janzen, E; González, L A; Crowe, T; Kastelic, J; Kehler, C; Siemens, M; Ominski, K; Pajor, E; Schwartzkopf-Genswein, K S

    2015-07-01

    The current study evaluated 17 loads of cull beef cows transported in Canadian winter conditions to assess in-transit temperature and humidity, evaluation of events during loading and unloading, and animal condition and bruising. Regardless of the use of boards to block ventilation holes in trailers, temperatures were higher within trailers than at ambient locations during both travel and stationary periods (P < 0.01). Boarding was associated with smaller differences in trailer temperature, compared with ambient conditions, while the trailer was traveling at highway speeds versus when trailers were stationary (P < 0.01). Moisture levels within trailers were not different from ambient conditions when loads using boarding were traveling (P < 0.01), whereas loads without boarding had a larger difference (P < 0.01). The moisture within trailers relative to ambient conditions increased when trailers were stationary compared with traveling when boarding was used (P < 0.01). The majority of cattle transported were in good body condition (97.4% within BCS of 2 to 3.5) and had calm temperaments (96.7%). Although all comparisons were made, only the doghouse compartment had an increased risk of severe bruising compared with all other compartments (odds ratio [95% confidence interval]: 3.0 [1.6–5.5], 3.7 [2.1–6.4], 2.2 [1.3–3.7] and 3.8 [1.5–9.6] in comparison with the back, belly, deck, and nose compartments, respectively; P < 0.05). Increasing the duration of waiting to unload 30 min relative to a 1 h duration increased the odds of severe bruising by 1.18 times (95% confidence interval: 1.09–1.29; P < 0.01). Scoring systems that have been developed for auditing unloading of cattle had limited variation across loads at both loading and unloading. Pretransport assessment of animal condition using the American Meat Institute’s compromised animal score was the only scoring system that was consistent with posttransport scores. We inferred from the temperature and

  11. Concept Design of Trailor Ferry Service to Carry 150 Trailers Between Jacksonville, FL and Bridgeport, CT of USA

    NASA Astrophysics Data System (ADS)

    Sindagi, S. C.; Sandhu, B. S.

    2015-04-01

    With the increased load on highways, today there is a need to develop alternate ways to transport goods within the sovereignty. The use of ships to transport goods has always been the primary method of transporting goods across the seas but it can also be used to transport goods within the country. This way we can reduce the load on highways which at this point of time serve as the primary method of transportation. Worldwide very few ferries are in operation which transports 100-150 Trailers between two ports. Catching on this opportunity for design, construction and operation of vessels, a survey for possible routes in United States of America which will transport 150 Trailers has been conducted by various authorities and organizations. The challenge here is to determine the parameters of the vessel and design a fleet of vessels that could carry trailers along with their tractors within the least possible time and in with least possible freight between Jacksonville, FL and Bridgeport, CT of United States of America. The primary aim of the work presented here is to propose a design with fleet in such a way that each day 150 trailers could be loaded and unloaded at each of the two mentioned ports. An analysis of the route between the ports brought out various primary parameters like the distance, weather, different load lines to be encountered and also several size constraints that the vessel needs to adhere to, in order to ply smoothly on this route. The vessel is designed as per the Guidelines for ships operating in international waters. The economic analysis of the project was performed spanning over 20 years and the best freight was found out which would be most profitable for the company as well as be a good value for money for the customers.

  12. A study on single lane-change manoeuvres for determining rearward amplification of multi-trailer articulated heavy vehicles with active trailer steering systems

    NASA Astrophysics Data System (ADS)

    Wang, Qiushi; He, Yuping

    2016-01-01

    The Society of Automotive Engineers issued a test procedure, SAE-J2179, to determine the rearward amplification (RA) of multi-trailer articulated heavy vehicles (MTAHVs). Built upon the procedure, the International Organization for Standardization released the test manoeuvres, ISO-14791, for evaluating directional performance of MTAHVs. For the RA measures, ISO-14791 recommends two single lane-change manoeuvres: (1) an open-loop procedure with a single sine-wave steering input; and (2) a closed-loop manoeuvre with a single sine-wave lateral acceleration input. For an articulated vehicle with active trailer steering (ATS), the RA measure in lateral acceleration under the open-loop manoeuvre was not in good agreement with that under the closed-loop manoeuvre. This observation motivates the research on the applicability of the two manoeuvres for the RA measures of MTAHVs with ATS. It is reported that transient response under the open-loop manoeuvre often leads to asymmetric curve of tractor lateral acceleration [Winkler CB, Fancher PS, Bareket Z, Bogard S, Johnson G, Karamihas S, Mink C. Heavy vehicle size and weight - test procedures for minimum safety performance standards. Final technical report, NHTSA, US DOT, contract DTNH22-87-D-17174, University of Michigan Transportation Research Institute, Report No. UMTRI-92-13; 1992]. To explore the effect of the transient response, a multiple cycle sine-wave steering input (MCSSI) manoeuvre is proposed. Simulation demonstrates that the steady-state RA measures of an MTAHV with and without ATS under the MCSSI manoeuvre are in excellent agreement with those under the closed-loop manoeuvre. It is indicated that between the two manoeuvres by ISO-14791, the closed-loop manoeuvre is more applicable for determining the RA measures of MTAHVs with ATS.

  13. 33 CFR 62.27 - Safe water marks.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Safe water marks. 62.27 Section 62.27 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION UNITED STATES AIDS TO NAVIGATION SYSTEM The U.S. Aids to Navigation System § 62.27 Safe water marks. Safe water marks indicate that there is...

  14. Practical School Security: Basic Guidelines for Safe and Secure Schools.

    ERIC Educational Resources Information Center

    Trump, Kenneth S.

    This book is written primarily for elementary and secondary school administrators and teachers, but college faculty involved in providing teacher or administrator education would also benefit from the practical approach to issues of school security. Chapters 1 through 3 establish a framework for dealing with the myths and realities of school…

  15. A small stem-loop structure of the Ebola virus trailer is essential for replication and interacts with heat-shock protein A8.

    PubMed

    Sztuba-Solinska, Joanna; Diaz, Larissa; Kumar, Mia R; Kolb, Gaëlle; Wiley, Michael R; Jozwick, Lucas; Kuhn, Jens H; Palacios, Gustavo; Radoshitzky, Sheli R; J Le Grice, Stuart F; Johnson, Reed F

    2016-11-16

    Ebola virus (EBOV) is a single-stranded negative-sense RNA virus belonging to the Filoviridae family. The leader and trailer non-coding regions of the EBOV genome likely regulate its transcription, replication, and progeny genome packaging. We investigated the cis-acting RNA signals involved in RNA-RNA and RNA-protein interactions that regulate replication of eGFP-encoding EBOV minigenomic RNA and identified heat shock cognate protein family A (HSC70) member 8 (HSPA8) as an EBOV trailer-interacting host protein. Mutational analysis of the trailer HSPA8 binding motif revealed that this interaction is essential for EBOV minigenome replication. Selective 2'-hydroxyl acylation analyzed by primer extension analysis of the secondary structure of the EBOV minigenomic RNA indicates formation of a small stem-loop composed of the HSPA8 motif, a 3' stem-loop (nucleotides 1868-1890) that is similar to a previously identified structure in the replicative intermediate (RI) RNA and a panhandle domain involving a trailer-to-leader interaction. Results of minigenome assays and an EBOV reverse genetic system rescue support a role for both the panhandle domain and HSPA8 motif 1 in virus replication. Published by Oxford University Press on behalf of Nucleic Acids Research 2016. This work is written by (a) US Government employee(s) and is in the public domain in the US.

  16. Keeping Campuses Safe.

    ERIC Educational Resources Information Center

    Kennedy, Mike

    1999-01-01

    Describes how colleges and universities are using technology, as well as traditional methods, to keep campuses safe and reduce crime. Topics include using free pizza in a successful contest to teach students about campus safety, installing security cameras, using access-control cards, providing adequate lighting, and creating a bicycle patrol…

  17. 49 CFR 1242.44 - Trucks, trailers, and containers (revenue service) and floating equipment (revenue service...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) and floating equipment (revenue service) (accounts XX-23-43 and XX-23-44). 1242.44 Section 1242.44... Trucks, trailers, and containers (revenue service) and floating equipment (revenue service) (accounts XX-23-43 and XX-23-44). These accounts pertain solely to freight service and contain no common expenses...

  18. Pegasus ICON Lift onto Assembly Integration Trailer (AIT)

    NASA Image and Video Library

    2017-08-23

    The Orbital ATK Pegasus XL rocket, with NASA's Ionospheric Connection Explorer (ICON) spacecraft attached, is moved on an assembly integration trailer from one high bay to another Aug. 23, 2017, at Building 1555 at Vandenberg Air Force Base in California. The Pegasus rocket is being prepared for the ICON mission. The explorer will launch on June 15, 2018, from Kwajalein Atoll in the Marshall Islands (June 14 in the continental United States) on the Pegasus XL, which is attached to the company's L-1011 Stargazer aircraft. ICON will study the frontier of space - the dynamic zone high in Earth's atmosphere where terrestrial weather from below meets space weather above. The explorer will help determine the physics of Earth's space environment and pave the way for mitigating its effects on our technology and communications systems.

  19. Pegasus ICON Lift onto Assembly Integration Trailer (AIT)

    NASA Image and Video Library

    2017-08-23

    The Orbital ATK Pegasus XL rocket, with NASA's Ionospheric Connection Explorer (ICON) spacecraft attached, is being moved on an assembly integration trailer from one high bay to another Aug. 23, 2017, at Building 1555 at Vandenberg Air Force Base in California. The Pegasus rocket is being prepared for the ICON mission. The explorer will launch on June 15, 2018, from Kwajalein Atoll in the Marshall Islands (June 14 in the continental United States) on the Pegasus XL, which is attached to the company's L-1011 Stargazer aircraft. ICON will study the frontier of space - the dynamic zone high in Earth's atmosphere where terrestrial weather from below meets space weather above. The explorer will help determine the physics of Earth's space environment and pave the way for mitigating its effects on our technology and communications systems.

  20. Pegasus ICON Lift onto Assembly Integration Trailer (AIT)

    NASA Image and Video Library

    2017-08-23

    The Orbital ATK Pegasus XL rocket, with NASA's Ionospheric Connection Explorer (ICON) spacecraft attached, is moved on an assembly integration trailer into another high bay Aug. 23, 2017, at Building 1555 at Vandenberg Air Force Base in California. The Pegasus rocket is being prepared for the ICON mission. The explorer will launch on June 15, 2018, from Kwajalein Atoll in the Marshall Islands (June 14 in the continental United States) on the Pegasus XL, which is attached to the company's L-1011 Stargazer aircraft. ICON will study the frontier of space - the dynamic zone high in Earth's atmosphere where terrestrial weather from below meets space weather above. The explorer will help determine the physics of Earth's space environment and pave the way for mitigating its effects on our technology and communications systems.

  1. JPSS-1 Spacecraft Canning and Lift to Transport Trailer

    NASA Image and Video Library

    2017-10-23

    In the Astrotech Processing Facility at Vandenberg Air Force Base in California, the Joint Polar Satellite System-1, or JPSS-1, spacecraft is wrapped in a protective covering prior to technicians and engineers placing it in a protective container. It then will be mounted on a transport trailer for its move to Space Launch Complex 2. At the pad, JPSS-1 will be lifted for mating atop a United Launch Alliance Delta II rocket. Built by Ball Aerospace and Technologies Corp. of Boulder, Colorado, JPSS is the first in a series four next-generation environmental satellites in a collaborative program between the NOAA and NASA. Liftoff is scheduled to take place from Vandenberg's Space Launch Complex 2.

  2. Aerodynamic forces on freight trains : volume 1. wind tunnel tests of containers and trailers on flatcars

    DOT National Transportation Integrated Search

    1976-12-01

    The aerodynamic forces on trailers and containers on flatcars have been measured in wind tunnel tests. The forces were measured on the central car of a five-car train consisting of a locomotive, three flatcars with various loadings and a boxcar. Test...

  3. Report: Information Security Series: Security Practices Safe Drinking Water Information System

    EPA Pesticide Factsheets

    Report #2006-P-00021, March 30, 2006. We found that the Office of Water (OW) substantially complied with many of the information security controls reviewed and had implemented practices to ensure production servers are monitored.

  4. 49 CFR 393.13 - Retroreflective sheeting and reflex reflectors, requirements for semitrailers and trailers...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... have an overall width of 2,032 mm (80 inches) or more and a gross vehicle weight rating of 4,536 kg (10... as part of a red and white pattern. Retroreflective sheeting shall have a width of at least 50 mm (2... 375 mm (15 inches) and 1,525 mm (60 inches) above the road surface when measured with the trailer...

  5. 49 CFR 393.13 - Retroreflective sheeting and reflex reflectors, requirements for semitrailers and trailers...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... have an overall width of 2,032 mm (80 inches) or more and a gross vehicle weight rating of 4,536 kg (10... as part of a red and white pattern. Retroreflective sheeting shall have a width of at least 50 mm (2... 375 mm (15 inches) and 1,525 mm (60 inches) above the road surface when measured with the trailer...

  6. How to Be Safe and Secure against School Vandalism.

    ERIC Educational Resources Information Center

    Stover, Del

    1990-01-01

    During 1990-91, vandals will cost the public schools $250 million. To battle vandalism, school executives are relying on numerous security techniques that police use to foil burglaries, including locks, alarms, electronic security systems, and antivandalism programs. Tips are provided for enlisting others' aid and checking a school's security…

  7. GT-6 PREFLIGHT ACTIVITY (LEAVE SUITING TRAILER) - ASTRONAUT WALTER M. SCHIRRA, JR. - SUIT

    NASA Image and Video Library

    1965-12-15

    S65-59974 (15 Dec. 1965) --- Astronauts Walter M. Schirra Jr. (leading), command pilot; and Thomas P. Stafford, pilot, leave the suiting trailer at Launch Complex 16 during the Gemini-6 prelaunch countdown at Cape Kennedy, Florida. They entered a special transport van which carried them to Pad 19 and their spacecraft. Gemini-6 lifted off at 8:37 a.m. (EST) on Dec. 15, 1965. Photo credit: NASA or National Aeronautics and Space Administration

  8. Safe and Secure America Act of 2009

    THOMAS, 111th Congress

    Rep. Smith, Lamar [R-TX-21

    2009-03-12

    House - 04/27/2009 Referred to the Subcommittee on Crime, Terrorism, and Homeland Security. (All Actions) Notes: For further action, see H.R.3961, which became Public Law 111-141 on 2/27/2010. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  9. Safe Entry, Easy Exit

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2008-01-01

    After violent episodes too numerous to list and too terrible to forget, schools and universities have been focused for several years on enhancing security in their facilities. Doors are among the most critical points of concern for school personnel responsible for keeping buildings safe. Education institutions want doors that let the right people…

  10. NHTSA's heavy duty vehicle brake research program report number 11 : evaluation of stopping performance of trailer antilock brake systems

    DOT National Transportation Integrated Search

    1997-04-01

    In order to better understand the functioning of antilock brake systems on pneumatically braked trailers, a series of tests were conducted to evaluate different ABS control strategies, performance variations among systems supplied by different manufa...

  11. Enhanced fuel efficiency on tractor-trailers using synthetic jet-based active flow control

    NASA Astrophysics Data System (ADS)

    Amitay, Michael; Menicovich, David; Gallardo, Daniele

    2016-04-01

    The application of piezo-electrically-driven synthetic-jet-based active flow control to reduce drag on tractor-trailers was explored experimentally in wind tunnel testing as well as full-scale road tests. Aerodynamic drag accounts for more than 50% of the usable energy at highway speeds, a problem that applies primarily to trailer trucks. Therefore, a reduction in aerodynamic drag results in large saving of fuel and reduction in CO2 emissions. The active flow control technique that is being used relies on a modular system comprised of distributed, small, highly efficient actuators. These actuators, called synthetic jets, are jets that are synthesized at the edge of an orifice by a periodic motion of a piezoelectric diaphragm(s) mounted on one (or more) walls of a sealed cavity. The synthetic jet is zero net mass flux (ZNMF), but it allows momentum transfer to flow. It is typically driven near diaphragm and/or cavity resonance, and therefore, small electric input [O(10W)] is required. Another advantage of this actuator is that no plumbing is required. The system doesn't require changes to the body of the truck, can be easily reconfigured to various types of vehicles, and consumes small amounts of electrical power from the existing electrical system of the truck. Preliminary wind tunnel results showed up to 18% reduction in fuel consumption, whereas road tests also showed very promising results.

  12. 78 FR 22941 - Sidump'r Trailer Company, Inc., Grant of Petition for Decision of Inconsequential Noncompliance

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-17

    ... performance requirements. Finite element modeling is a mature science and appropriately accurate for modeling... interpretation letter to Jason Backs (CPS Trailers, May 28, 1998). \\3\\ Finite element analysis can be used as a... FMVSS No. 224 that the guard-like structure can serve as a rear impact guard.\\2\\ Sidump'r used a finite...

  13. Data Safe Havens and Trust: Toward a Common Understanding of Trusted Research Platforms for Governing Secure and Ethical Health Research

    PubMed Central

    Nicholls, Jacqueline; Dobbs, Christine; Sethi, Nayha; Cunningham, James; Ainsworth, John; Heaven, Martin; Peacock, Trevor; Peacock, Anthony; Jones, Kerina; Laurie, Graeme; Kalra, Dipak

    2016-01-01

    In parallel with the advances in big data-driven clinical research, the data safe haven concept has evolved over the last decade. It has led to the development of a framework to support the secure handling of health care information used for clinical research that balances compliance with legal and regulatory controls and ethical requirements while engaging with the public as a partner in its governance. We describe the evolution of 4 separately developed clinical research platforms into services throughout the United Kingdom-wide Farr Institute and their common deployment features in practice. The Farr Institute is a case study from which we propose a common definition of data safe havens as trusted platforms for clinical academic research. We use this common definition to discuss the challenges and dilemmas faced by the clinical academic research community, to help promote a consistent understanding of them and how they might best be handled in practice. We conclude by questioning whether the common definition represents a safe and trustworthy model for conducting clinical research that can stand the test of time and ongoing technical advances while paying heed to evolving public and professional concerns. PMID:27329087

  14. 26 CFR 145.4051-1 - Imposition of tax on heavy trucks and trailers sold at retail.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 26 Internal Revenue 17 2010-04-01 2010-04-01 false Imposition of tax on heavy trucks and trailers sold at retail. 145.4051-1 Section 145.4051-1 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF... THE HIGHWAY REVENUE ACT OF 1982 (PUB. L. 97-424) § 145.4051-1 Imposition of tax on heavy trucks and...

  15. The Role of Schools and their Capabilities to Ensure Safe Sheltering During a Storm

    DTIC Science & Technology

    2017-03-01

    and security aspects include establishing a safe environment in a confined space. While absent from Florida’s 2016 Statewide Emergency Shelter Plan...offer a safe environment for sheltering, and new building codes have been created for this purpose. The northern school districts in Texas sit in...Special Feature 2: Building a Safe and Secure Educational Environment ,” accessed January 15, 2017, http://www.mext.go.jp/b_menu/hakusho/html/hpab201201

  16. Supporting Safe, Secure and Caring Schools in Alberta.

    ERIC Educational Resources Information Center

    McMullen, Dean

    Alberta Learning expects all schools to have a safe and caring teaching and learning environment to ensure students have the opportunity to meet the standards of education set by the Minister of Learning. The primary objectives of this manual are to facilitate action that is legally, professionally, and educationally sound; identify and support…

  17. Aviation security : terrorist acts demonstrate urgent need to improve security at the nation's airports

    DOT National Transportation Integrated Search

    2001-09-20

    A safe and secure civil aviation system is a critical component of the nation's overall security, physical infrastructure, and economic foundation. Billions of dollars and a myriad of programs and policies have been devoted to achieving such a system...

  18. Safe and Secure Federal Websites Act of 2014

    THOMAS, 113th Congress

    Rep. Bentivolio, Kerry L. [R-MI-11

    2013-12-03

    Senate - 07/29/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  19. Securing Cyberspace: Approaches to Developing an Effective Cyber-Security Strategy

    DTIC Science & Technology

    2011-05-15

    attackers, cyber - criminals or even teenage hackers. Protecting cyberspace is a national security priority. President Obama’s National Security...prefers to engage international law enforcement to investigate and catch cyber criminals .40 International cooperation could resolve jurisdictional...sheltered them. Similarly, a state that fails to prosecute cyber - criminals , or who gives safe haven to individuals or groups that conduct cyber-attacks

  20. Multi-objective aerodynamic shape optimization of small livestock trailers

    NASA Astrophysics Data System (ADS)

    Gilkeson, C. A.; Toropov, V. V.; Thompson, H. M.; Wilson, M. C. T.; Foxley, N. A.; Gaskell, P. H.

    2013-11-01

    This article presents a formal optimization study of the design of small livestock trailers, within which the majority of animals are transported to market in the UK. The benefits of employing a headboard fairing to reduce aerodynamic drag without compromising the ventilation of the animals' microclimate are investigated using a multi-stage process involving computational fluid dynamics (CFD), optimal Latin hypercube (OLH) design of experiments (DoE) and moving least squares (MLS) metamodels. Fairings are parameterized in terms of three design variables and CFD solutions are obtained at 50 permutations of design variables. Both global and local search methods are employed to locate the global minimum from metamodels of the objective functions and a Pareto front is generated. The importance of carefully selecting an objective function is demonstrated and optimal fairing designs, offering drag reductions in excess of 5% without compromising animal ventilation, are presented.

  1. 49 CFR 571.110 - Tire selection and rims and motor home/recreation vehicle trailer load carrying capacity...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., equipped with passenger car tires, the vehicle normal load on the tire shall be no greater than 94 percent..., the vehicle normal load on the tire shall be no greater than 94 percent of the load rating at the... vehicle trailer load carrying capacity information for motor vehicles with a GVWR of 4,536 kilograms (10...

  2. 49 CFR 571.110 - Tire selection and rims and motor home/recreation vehicle trailer load carrying capacity...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., equipped with passenger car tires, the vehicle normal load on the tire shall be no greater than 94 percent..., the vehicle normal load on the tire shall be no greater than 94 percent of the load rating at the... vehicle trailer load carrying capacity information for motor vehicles with a GVWR of 4,536 kilograms (10...

  3. 49 CFR 571.110 - Tire selection and rims and motor home/recreation vehicle trailer load carrying capacity...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., equipped with passenger car tires, the vehicle normal load on the tire shall be no greater than 94 percent..., the vehicle normal load on the tire shall be no greater than 94 percent of the load rating at the... vehicle trailer load carrying capacity information for motor vehicles with a GVWR of 4,536 kilograms (10...

  4. 49 CFR 571.110 - Tire selection and rims and motor home/recreation vehicle trailer load carrying capacity...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., equipped with passenger car tires, the vehicle normal load on the tire shall be no greater than 94 percent..., the vehicle normal load on the tire shall be no greater than 94 percent of the load rating at the... vehicle trailer load carrying capacity information for motor vehicles with a GVWR of 4,536 kilograms (10...

  5. 49 CFR 571.110 - Tire selection and rims and motor home/recreation vehicle trailer load carrying capacity...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., equipped with passenger car tires, the vehicle normal load on the tire shall be no greater than 94 percent..., the vehicle normal load on the tire shall be no greater than 94 percent of the load rating at the... vehicle trailer load carrying capacity information for motor vehicles with a GVWR of 4,536 kilograms (10...

  6. 12 CFR 1.5 - Safe and sound banking practices; credit information required.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...

  7. 12 CFR 1.5 - Safe and sound banking practices; credit information required.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...

  8. 12 CFR 1.5 - Safe and sound banking practices; credit information required.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...

  9. 12 CFR 1.5 - Safe and sound banking practices; credit information required.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...

  10. 12 CFR 1.5 - Safe and sound banking practices; credit information required.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...

  11. Bench vise adapter grips tubing securely and safely

    NASA Technical Reports Server (NTRS)

    Howland, B. T.; Jones, A. S., Jr.

    1966-01-01

    Plastic self-compressing adapter with grooves, attached to the jaws of a bench vise, secures thin-wall tubing vertically or horizontally during cutting and flaring operations without marring or damaging it. Magnets incorporated in both sections of the adapter prevent detachment from the jaws when the vise is opened.

  12. How To Modify a Trailer for Accessibility (Up to a Point) [and] Accessibility Considerations for Home Buyers. Key Notes.

    ERIC Educational Resources Information Center

    Access Group, Atlanta, GA.

    Two brief fact sheets for people with disabilities provide information on: (1) modifying a trailer to make it accessible for persons with mobility impairments, especially those in wheelchairs, and (2) accessibility considerations for home buyers or home owners with mobility impairments. The first fact sheet identifies inherent problems in…

  13. 76 FR 38463 - SAFE Mortgage Licensing Act: Minimum Licensing Standards and Oversight Responsibilities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-30

    ... Parts 30 and 3400 SAFE Mortgage Licensing Act: Minimum Licensing Standards and Oversight... No. FR-5271-F-03] RIN 2502-A170 SAFE Mortgage Licensing Act: Minimum Licensing Standards and... pursuant to the Secure and Fair Enforcement Mortgage Licensing Act of 2008 (SAFE Act or Act), to ensure...

  14. US Capitol Security - Our Nation's Capitol - A Safe Place for All?

    DOT National Transportation Integrated Search

    2000-08-01

    This article describes the Volpe Centrer's role in developing a new security system for the US Capitol. The US Capitol Police turned to the Center because of our proven capabilities as security experts. We brought to the project: our knowledge of sec...

  15. Architecture of security management unit for safe hosting of multiple agents

    NASA Astrophysics Data System (ADS)

    Gilmont, Tanguy; Legat, Jean-Didier; Quisquater, Jean-Jacques

    1999-04-01

    In such growing areas as remote applications in large public networks, electronic commerce, digital signature, intellectual property and copyright protection, and even operating system extensibility, the hardware security level offered by existing processors is insufficient. They lack protection mechanisms that prevent the user from tampering critical data owned by those applications. Some devices make exception, but have not enough processing power nor enough memory to stand up to such applications (e.g. smart cards). This paper proposes an architecture of secure processor, in which the classical memory management unit is extended into a new security management unit. It allows ciphered code execution and ciphered data processing. An internal permanent memory can store cipher keys and critical data for several client agents simultaneously. The ordinary supervisor privilege scheme is replaced by a privilege inheritance mechanism that is more suited to operating system extensibility. The result is a secure processor that has hardware support for extensible multitask operating systems, and can be used for both general applications and critical applications needing strong protection. The security management unit and the internal permanent memory can be added to an existing CPU core without loss of performance, and do not require it to be modified.

  16. EVALUATION OF THE EFFECTIVENESS OF TRUCK EFFICIENCY TECHNOLOGIES IN CLASS 8 TRACTOR-TRAILERS BASED ON A TRACTIVE ENERGY ANALYSIS USING MEASURED DRIVE CYCLE DATA

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    LaClair, Tim J; Gao, Zhiming; Fu, Joshua S.

    2014-01-01

    Quantifying the fuel savings that can be achieved from different truck fuel efficiency technologies for a fleet s specific usage allows the fleet to select the combination of technologies that will yield the greatest operational efficiency and profitability. This paper presents an analysis of vehicle usage in a commercial vehicle fleet and an assessment of advanced efficiency technologies using an analysis of measured drive cycle data for a class 8 regional commercial shipping fleet. Drive cycle measurements during a period of a full year from six tractor-trailers in normal operations in a less-than-truckload (LTL) carrier were analyzed to develop amore » characteristic drive cycle that is highly representative of the fleet s usage. The vehicle mass was also estimated to account for the variation of loads that the fleet experienced. The drive cycle and mass data were analyzed using a tractive energy analysis to quantify the fuel efficiency and CO2 emissions benefits that can be achieved on class 8 tractor-trailers when using advanced efficiency technologies, either individually or in combination. Although differences exist among class 8 tractor-trailer fleets, this study provides valuable insight into the energy and emissions reduction potential that various technologies can bring in this important trucking application.« less

  17. U.S. Maritime Security: Sustainability Challenges

    DTIC Science & Technology

    2011-09-01

    Security Council ICE Immigration and Customs Enforcement IOC Interagency Operation Center JHOC Joint Harbor Operation Center JIATF-S Joint...maritime threats into nation threats, transnational criminal and piracy threats, environmental destruction, and illegal seaborne immigration (U.S...safe and secure borders, welcome lawful immigrants and visitors and promote the free-flow of commerce (U.S. Department of Homeland Security, 2011

  18. A Safe School's Top 10 Needs

    ERIC Educational Resources Information Center

    Brunner, Judy; Lewis, Dennis

    2005-01-01

    An environment of safety in the school seldom comes down to any one particular component or plan; it is a combination of strategies and ideas that makes a school safe and secure for everyone. In this article, the authors provide practical information to educators who are already working to capacity in terms of time allocation and monetary…

  19. An Automated Sample Divider for Farmers Stock Peanuts

    USDA-ARS?s Scientific Manuscript database

    In-shell peanuts are harvested, loaded into drying trailers, and delivered to a central facility where they are dried to a moisture content safe for long term storage, sampled, graded, then unloaded into bulk storage. Drying trailers have capacities ranging from five to twenty-five tons of dry farme...

  20. An automated sample divider for farmers stock peanuts

    USDA-ARS?s Scientific Manuscript database

    In-shell peanuts are harvested, loaded into drying trailers, and delivered to a central facility where they are dried to a moisture content safe for long term storage, sampled, graded, then unloaded into bulk storage. Drying trailers have capacities ranging from five to twenty-five tons of dry farme...

  1. Maritime security report

    DOT National Transportation Integrated Search

    1996-04-01

    The first article in this report deals with the rising theft and in-transit hijacking of entire containers and trailers in port cities and adjacent areas in the United States. Cargo thefts are occurring most frequently in Florida, California, New Yor...

  2. Truck Rollover Characterization for Class-8 Tractor-Trailers Utilizing Standard Dual Tires and New-Generation Single Tires

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Capps, Gary; Knee, Bill; Franzese, Oscar

    2005-07-30

    The Heavy Truck Rollover Characterization Project is a major research effort conducted by the National Transportation Research Center, Inc. (NTRCI) in partnership with Oak Ridge National Laboratory (ORNL), Dana Corporation (Dana), Michelin Americas Research and Development Corporation (Michelin) and Clemson University (Clemson), under the NTRCIs Heavy Vehicle Safety Research Center (HVSRC) for the Federal Highway Administration (FHWA). ORNL provided the day-to-day management of the project. The expertise mix of this team coupled with complementary research needs and interests, and a positive can-do attitude provided an extremely positive experimental research opportunity for all involved. Furthermore, this team supplied significant and valuablemore » resources that provided a strong positive benchmark regarding the ability to conduct research within a public-private partnership. The work conducted by this team focused on initial efforts to generate data and information on heavy truck rollover not currently available in the industry. It reflects efforts within Phases 1 and 2 of a longer-term four-phase research program. A 1999 Peterbilt 379 class-8 tractor and 2004 Wabash dry freight van trailer were the test vehicles utilized in this effort. Both were instrumented with a number of sensors to capture the dynamics of the tractor and trailer as it engaged in various testing maneuvers that included: an evasive maneuver, swept sine, constant radius, and a run-off-the-road maneuver. The run-off-the-road maneuver was discontinued because the test track could not safety accommodate such a maneuver. These maneuvers were carried out utilizing both standard dual tires and new-generation dual tires in six test series. Two test series also included the use of a wider-slider suspension. Outriggers were placed on the test vehicle to assure that an actual rollover would not occur, however, the tests were designed to generate lift-off of tires during the tests. One of the main

  3. 78 FR 78807 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-27

    ... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-122-N...

  4. 77 FR 76434 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-28

    ... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-121-N...

  5. Safely Enabling UAS Operations in Low-Altitude Airspace

    NASA Technical Reports Server (NTRS)

    Kopardekar, Parimal H.

    2016-01-01

    Flexibility where possible, and structure where necessary. Consider the needs of national security, safe airspace operations, economic opportunities, and emerging technologies. Risk-based approach based on population density, assets on the ground, density of operations, etc. Digital, virtual, dynamic, and as needed UTM services to manage operations.

  6. Disabled Children: The Right to Feel Safe

    ERIC Educational Resources Information Center

    Mepham, Sarah

    2010-01-01

    This article explores the fundamental right of disabled children to feel safe and be free from bullying, harassment and abuse. The article proposes that, 20 years since the United Nations Convention on the Rights of the Child, disabled children are still facing barriers to securing this right. The article focuses on recent Mencap research that…

  7. Safe: a status update on information security and the hospital community.

    PubMed

    Fundner, Rita

    2003-01-01

    IT Security and Privacy are becoming increasingly visible "hot topics" across the full spectrum of industry and service sectors. Legislation and global "best practices" are working hard to defend organizations and individuals against escalating, rapidly evolving cyber-threats. Predictably, the threat landscape is having an impact on all levels to varying degrees: governmental, organizational and individual. This article introduces the basic context for information security and offers insight into how a number of hospitals are addressing the situation, what barriers they currently face and what opportunities they see unfolding.

  8. Command, Control, Communications And Intelligence (C3I) Project Book, Fiscal Year 1993

    DTIC Science & Technology

    1992-10-30

    trailers . PM MILSTAR will integrate the GNDCPs into the Army force structure. , . A /" " 1 9S. N/TRC -194 HISTORICAL BACKGROUND: Feb 89 - Army assigns...configuration consists of an S-250 shelter mounted on a truck with a trailer and generator. SCOTT is the ground segment terminal . of the Milstar system...WITH A TRAILER MOUNTED THREE KILOWATT GENERATOR AND ANTENNA. MILSCOTT/11 11-2 PM. MILSTAR (ARMY) SECURE MOBILE ANTI-JAM RELIABLE TACTICAL TERMINAL

  9. Aerodynamic drag reduction tests on a full-scale tractor-trailer combination with several add-on devices

    NASA Technical Reports Server (NTRS)

    Montoya, L. C.; Steers, L. L.

    1974-01-01

    Aerodynamic drag tests were performed on a conventional cab-over-engine tractor with a 45-foot trailer and five commercially available or potentially available add-on devices using the coast-down method. The tests ranged in velocity from approximately 30 miles per hour to 65 miles per hour and included some flow visualization. A smooth, level runway at Edwards Air Force Base was used for the tests, and deceleration measurements were taken with both accelerometers and stopwatches. An evaluation of the drag reduction results obtained with each of the five add-on devices is presented.

  10. Changing Homeland Security: The Year in Review - 2008

    DTIC Science & Technology

    2009-01-01

    new opportunities for terrorist safe havens. The specter of homegrown terrorism has not abated. Naturalized citizens of Somali descent traveled to...34 • The Nature of Homeland Security: Now a Second Tier Policy Issue? • Organizing for Homeland Security: Possible Futures, Emerging Issues • The...emerging definitions of the homeland security mission space in 2009. The Nature of Homeland Security: Now a Second Tier Policy Issue? Has the bar

  11. Student Perceptions of High-Security School Environments

    ERIC Educational Resources Information Center

    Bracy, Nicole L.

    2011-01-01

    Public schools have transformed significantly over the past several decades in response to concerns about rising school violence. Today, most public schools are high-security environments employing police officers, security cameras, and metal detectors, as well as strict discipline policies to keep students in line and maintain safe campuses.…

  12. Feeling safe during an inpatient hospitalization: a concept analysis.

    PubMed

    Mollon, Deene

    2014-08-01

    This paper aims to explore the critical attributes of the concept feeling safe. The safe delivery of care is a high priority; however; it is not really known what it means to the patient to 'feel safe' during an inpatient hospitalization. This analysis explores the topic of safety from the patient's perspective. Concept analysis. The data bases of CINAHL, Medline, PsychInfo and Google Scholar for the years 1995-2012 were searched using the terms safe and feeling safe. The eight-step concept analysis method of Walker and Avant was used to analyse the concept of feeling safe. Uses and defining attributes, as well as identified antecedents, consequences and empirical referents, are presented. Case examples are provided to assist in the understanding of defining attributes. Feeling safe is defined as an emotional state where perceptions of care contribute to a sense of security and freedom from harm. Four attributes were identified: trust, cared for, presence and knowledge. Relationship, environment and suffering are the antecedents of feeling safe, while control, hope and relaxed or calm are the consequences. Empirical referents and early development of a theory of feeling safe are explored. This analysis begins the work of synthesizing qualitative research already completed around the concept of feeling safe by defining the key attributes of the concept. Support for the importance of developing patient-centred models of care and creating positive environments where patients receive high-quality care and feel safe is provided. © 2014 John Wiley & Sons Ltd.

  13. Implementing the global health security agenda: lessons from global health and security programs.

    PubMed

    Paranjape, Suman M; Franz, David R

    2015-01-01

    The Global Health Security Agenda (GHSA) describes a vision for a world that is safe and secure from infectious disease threats; it underscores the importance of developing the international capacity to prevent, detect, and respond to pandemic agents. In February 2014, the United States committed to support the GHSA by expanding and intensifying ongoing efforts across the US government. Implementing these goals will require interagency coordination and harmonization of diverse health security elements. Lessons learned from the Global Health Initiative (GHI), the President's Emergency Program for AIDS Relief (PEPFAR), and the Cooperative Threat Reduction (CTR) program underscore that centralized political, technical, and fiscal authority will be key to developing robust, sustainable, and integrated global health security efforts across the US government. In this article, we review the strengths and challenges of GHI, PEPFAR, and CTR and develop recommendations for implementing a unified US global health security program.

  14. High-Tech Security Help.

    ERIC Educational Resources Information Center

    Flanigan, Robin L.

    2000-01-01

    Advocates embrace high-tech security measures as necessary to avoid Columbine-style massacres. Critics contend that school systems can go overboard, making students feel less safe and too closely scrutinized. Current electronic, biometric, and computer-mapping devices and school applications are discussed. Vendors are listed. (MLH)

  15. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations

    ERIC Educational Resources Information Center

    Tanner-Smith, Emily E.; Fisher, Benjamin W.

    2015-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance,…

  16. Safe and secure at work?: findings from the 2002 Workplace Risk Supplement.

    PubMed

    Jenkins, E Lynn; Fisher, Bonnie S; Hartley, Dan

    2012-01-01

    To examine employee's perception of safety and related workplace safety and prevention issues, including their use of self-protection measures and victimization experience. The Workplace Risk Supplement (WRS) to the National Crime Victimization Survey (NCVS) was administered to 55,158 employed respondents who were 16 years or older. Trained U.S. Census Bureau interviewers administered the WRS in all households selected for the NCVS during the 6-month reference period from January through June 2002. Responses from the 55,158 WRS respondents were weighted to obtain national estimates, resulting in 142,410,858 cases. The demographic distribution of WRS respondents is very similar to that of the U.S. labor force. Seven percent of respondents reported that they worried about someone in their workplace attacking them, while nearly 4% experienced victimization. The majority indicated that they felt that their workplace, the neighborhood around their workplace, and places they traveled to as part of their job were either "Very Safe" or "Somewhat Safe" from crime. Six percent carried some type of self protection while at work although this varied by occupation. Employees largely feel safe from violence while working. Differences in victimization by occupation bolster efforts to focus workplace violence prevention in high-risk occupations.

  17. Learning with Security

    ERIC Educational Resources Information Center

    Jokela, Paivi; Karlsudd, Peter

    2007-01-01

    The current higher education, both distance education and traditional campus courses, relies more and more on modern information and communication technologies (ICT). The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment. In this work, we study the…

  18. A study of the security technology and a new security model for WiFi network

    NASA Astrophysics Data System (ADS)

    Huang, Jing

    2013-07-01

    The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.

  19. Securing the appendiceal stump with the Gea extracorporeal sliding knot during laparoscopic appendectomy is safe and economical.

    PubMed

    Arcovedo, R; Barrera, H; Reyes, H S

    2007-10-01

    Laparoscopic appendectomy (LA) has become very popular. One criticism of this approach is the high cost of the disposable equipment such as the linear stapler. An alternative would be suture ligation of the appendiceal base. To prove the safety of the Gea extracorporeal sliding knot (GESK) for closure of the stump after LA, a retrospective study was conducted. For this study, 63 LA procedures performed by one surgeon using the Gea knot (group A) were reviewed and compared with 63 LA procedures performed by two other surgeons (group B) using the linear stapler. The GESK is created with 0-prolene in the manner already described. The main variable was the presence or absence of blowout, leak, or fistula from the appendiceal stump. The secondary variables were abdominal abscess, wound infection, and need for readmission or reoperation. The results were analyzed using the appropriate statistical methods. Both groups were similar in terms of age, gender, and pathologic diagnosis. No patient in group A or B experienced a colonic fistula, stump blowout, or leak. In group A, one patient experienced interloop abscesses. There were two wound infections. In group B, one patient experienced a wound infection, and another patient had a wound dehiscence of the umbilical port, which required reoperation. No statistical differences were noted between the two groups. There are surgeons who routinely use sutures to secure the stump of the appendectomy. This study aimed to demonstrate that the GESK is as secure as the stapler for closure of the appendiceal stump. The GESK could be passed through a 5-mm trocar, potentially avoiding complications of a larger trocar site. The GESK seems to be an economic and safe alternative to the stapler.

  20. Infectious disease protection for healthcare security officers.

    PubMed

    D'Angelo, Michael S; Arias, Jean

    2015-01-01

    Healthcare Security should be considered an active component in an infectious disease event, the authors maintain, and security officers must be included in an Employee Health screening and N95 fit testing initiative to safely welcome the incoming infected patients. In this article, they spell out the different levels of precautions officers should become familiar with in order to protect themselves.

  1. Improved security monitoring method for network bordary

    NASA Astrophysics Data System (ADS)

    Gao, Liting; Wang, Lixia; Wang, Zhenyan; Qi, Aihua

    2013-03-01

    This paper proposes a network bordary security monitoring system based on PKI. The design uses multiple safe technologies, analysis deeply the association between network data flow and system log, it can detect the intrusion activities and position invasion source accurately in time. The experiment result shows that it can reduce the rate of false alarm or missing alarm of the security incident effectively.

  2. Integrity and security in an Ada runtime environment

    NASA Technical Reports Server (NTRS)

    Bown, Rodney L.

    1991-01-01

    A review is provided of the Formal Methods group discussions. It was stated that integrity is not a pure mathematical dual of security. The input data is part of the integrity domain. The group provided a roadmap for research. One item of the roadmap and the final position statement are closely related to the space shuttle and space station. The group's position is to use a safe subset of Ada. Examples of safe sets include the Army Secure Operating System and the Penelope Ada verification tool. It is recommended that a conservative attitude is required when writing Ada code for life and property critical systems.

  3. The effects of prompting and reinforcement on safe behavior of bicycle and motorcycle riders.

    PubMed

    Okinaka, Takeru; Shimazaki, Tsuneo

    2011-01-01

    A reversal design was used to evaluate the effects of vocal and written prompts as well as reinforcement on safe behavior (dismounting and walking bicycles or motorcycles on a sidewalk) on a university campus. Results indicated that an intervention that consisted of vocal and written prompts and reinforcement delivered by security guards was effective at increasing safe behavior exhibited by bicycle and motorcycle riders. No differences were observed between vehicle type or gender with regard to engagement in safe behavior.

  4. Better Safe than Sorry: Panic Buttons as a Security Measure in an Academic Medical Library

    ERIC Educational Resources Information Center

    McMullen, Karen D.; Kane, Laura Townsend

    2008-01-01

    In the wake of recent tragedies, campus security has become a hot issue nationwide. Campus libraries, as traditional meeting spots for varied groups of people, are particularly vulnerable to security issues. Safety and security problems that can occur at any library generally include theft, vandalism, arson, antisocial behavior, and assaults on…

  5. Quantitative Estimate of the Relation Between Rolling Resistance on Fuel Consumption of Class 8 Tractor Trailers Using Both New and Retreaded Tires (SAE Paper 2014-01-2425)

    EPA Science Inventory

    Road tests of class 8 tractor trailers were conducted by the US Environmental Protection Agency on new and retreaded tires of varying rolling resistance in order to provide estimates of the quantitative relationship between rolling resistance and fuel consumption.

  6. Safe and Secure Partitioning with Pikeos: Towards Integrated Modular Avionics in Space

    NASA Astrophysics Data System (ADS)

    Almeida, J.; Prochazka, M.

    2009-05-01

    This paper presents our approach to logical partitioning of spacecraft onboard software. We present PikeOS, a separation micro-kernel which applies the state-of-the- art techniques and widely recognised standards such as ARINC 653 and MILS in order to guarantee safety and security properties of partitions executing software with different criticality and confidentiality. We provide an overview of our approach, also used in the Securely Partitioning Spacecraft Computing Resources project, an ESA TRP contract, which shifts spacecraft onboard software development towards the Integrated Modular Avionics concept with relevance for dual-use military and civil missions.

  7. Security Measures to Protect Mobile Agents

    NASA Astrophysics Data System (ADS)

    Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh

    2010-11-01

    The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.

  8. 77 FR 25721 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-01

    ... meeting will be closed to the public. (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) the Coast Guard consults with the NMSAC on the Global Supply Chain Security... submitting comments. Mail: Docket Management Facility (M-30), U.S. Department of Transportation, West...

  9. Be-safe travel, a web-based geographic application to explore safe-route in an area

    NASA Astrophysics Data System (ADS)

    Utamima, Amalia; Djunaidy, Arif

    2017-08-01

    In large cities in developing countries, the various forms of criminality are often found. For instance, the most prominent crimes in Surabaya, Indonesia is 3C, that is theft with violence (curas), theft by weighting (curat), and motor vehicle theft (curanmor). 3C case most often occurs on the highway and residential areas. Therefore, new entrants in an area should be aware of these kind of crimes. Route Planners System or route planning system such as Google Maps only consider the shortest distance in the calculation of the optimal route. The selection of the optimal path in this study not only consider the shortest distance, but also involves other factors, namely the security level. This research considers at the need for an application to recommend the safest road to be passed by the vehicle passengers while drive an area. This research propose Be-Safe Travel, a web-based application using Google API that can be accessed by people who like to drive in an area, but still lack of knowledge of the pathways which are safe from crime. Be-Safe Travel is not only useful for the new entrants, but also useful for delivery courier of valuables goods to go through the safest streets.

  10. 75 FR 67634 - Parts and Accessories Necessary for Safe Operation: Antilock Brake Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-03

    ... trailer with an antilock brake system be equipped with an external malfunction indicator lamp. DATES: This... malfunction indicator lamp. FMCSA used the Agency's direct final rule procedures (75 FR 29915, May 28, 2010...

  11. Implementing AORN recommended practices for a safe environment of care, part II.

    PubMed

    Kennedy, Lynne

    2014-09-01

    Construction in and around a working perioperative suite is a challenge beyond merely managing traffic patterns and maintaining the sterile field. The AORN "Recommended practices for a safe environment of care, part II" provides guidance on building design; movement of patients, personnel, supplies, and equipment; environmental controls; safety and security; and control of noise and distractions. Whether the OR suite evolves through construction, reconstruction, or remodeling, a multidisciplinary team of construction experts and health care professionals should create a functional plan and communicate at every stage of the project to maintain a safe environment and achieve a well-designed outcome. Emergency preparedness, a facility-wide security plan, and minimization of noise and distractions in the OR also help enhance the safety of the perioperative environment. Copyright © 2014 AORN, Inc. Published by Elsevier Inc. All rights reserved.

  12. Custodians/Security Program Evaluation.

    ERIC Educational Resources Information Center

    Ennis, Bob

    The Custodians/Security Department is a support service of the Des Moines (Iowa) Independent Community School District. Responsibilities of the department do not stop with the care of the facility, but extend to providing a clean, safe environment for all who use school facilities. Program evaluation in the 1993-94 school year reveals a total…

  13. Fuel Economy and Emissions Effects of Low Tire Pressure, Open Windows, Roof Top and Hitch-Mounted Cargo, and Trailer

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thomas, John F; Huff, Shean P; West, Brian H

    To quantify the fuel economy (FE) effect of some common vehicle accessories or alterations, a compact passenger sedan and a sport utility vehicle (SUV) were subjected to SAE J2263 coastdown procedures. Coastdowns were conducted with low tire pressure, all windows open, with a roof top or hitch-mounted cargo carrier, and with the SUV pulling an enclosed cargo trailer. From these coastdowns, vehicle dynamometer coefficients were developed which enabled the execution of vehicle dynamometer experiments to determine the effect of these changes on vehicle FE and emissions over standard drive cycles and at steady highway speeds. The FE penalty associated withmore » the rooftop cargo box mounted on the compact sedan was as high as 25-27% at higher speeds, where the aerodynamic drag is most pronounced. For both vehicles, use of a hitch mounted cargo tray carrying a similar load resulted in very small FE penalties, unlike the rooftop cargo box. The results for the SUV pulling a 3500 pound enclosed cargo trailer were rather dramatic, resulting in FE penalties ranging from 30%, for the city cycle, to 50% at 80 mph, at which point significant CO generation indicated protective enrichment due to high load. Low tire pressure cases resulted in negligible to 10% FE penalty depending on the specific case and test point. Driving with all four windows open decreased FE by 4-8.5% for the compact sedan, and 1-4% for the SUV.« less

  14. Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy

    NASA Astrophysics Data System (ADS)

    Basu, Srijita; Sengupta, Anirban; Mazumdar, Chandan

    2016-11-01

    Enterprises are increasingly using cloud computing for hosting their applications. Availability of fast Internet and cheap bandwidth are causing greater number of people to use cloud-based services. This has the advantage of lower cost and minimum maintenance. However, ensuring security of user data and proper management of cloud infrastructure remain major areas of concern. Existing techniques are either too complex, or fail to properly represent the actual cloud scenario. This article presents a formal cloud model using the constructs of Z-notation. Principles of the Chinese Wall security policy have been applied to design secure cloud-specific operations. The proposed methodology will enable users to safely host their services, as well as process sensitive data, on cloud.

  15. Research and realization of info-net security controlling system

    NASA Astrophysics Data System (ADS)

    Xu, Tao; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-03-01

    The thesis introduces some relative concepts about Network Cybernetics, and we design and realize a new info-net security controlling system based on Network Cybernetics. The system can control the endpoints, safely save files, encrypt communication, supervise actions of users and show security conditions, in order to realize full-scale security management. At last, we simulate the functions of the system. The results show, the system can ensure the controllability of users and devices, and supervise them real-time. The system can maximize the security of the network and users.

  16. Development of a Short-Duration Drive Cycle to Represent Long-Term Measured Drive Cycle Data: Evaluation of Truck Efficiency Technologies in Class 8 Tractor Trailers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    LaClair, Tim; Gao, Zhiming; Fu, Joshua

    Quantifying the fuel savings and emissions reductions that can be achieved from truck fuel efficiency technologies for a fleet's specific usage allows the fleet to select a combination of technologies that will yield the greatest operational efficiency and profitability. An accurate characterization of usage for the fleet is critical for such an evaluation; however, short-term measured drive cycle data do not generally reflect overall usage very effectively. This study presents a detailed analysis of vehicle usage in a commercial vehicle fleet and demonstrates the development of a short-duration synthetic drive cycle with measured drive cycle data collected over an extendedmore » period of time. The approach matched statistical measures of the vehicle speed with acceleration history and integrated measured grade data to develop a compressed drive cycle that accurately represents total usage. Drive cycle measurements obtained during a full year from six tractor trailers in normal operations in a less-than-truckload carrier were analyzed to develop a synthetic drive cycle. The vehicle mass was also estimated to account for the variation of loads that the fleet experienced. These drive cycle and mass data were analyzed with a tractive energy analysis to quantify the benefits in terms of fuel efficiency and reduced carbon dioxide emissions that can be achieved on Class 8 tractor trailers by using advanced efficiency technologies, either individually or in combination. Although differences exist between Class 8 tractor trailer fleets, this study provides valuable insight into the energy and emissions reduction potential that various technologies can bring in this important trucking application. Finally, the methodology employed for generating the synthetic drive cycle serves as a rigorous approach to develop an accurate usage characterization that can be used to effectively compress large quantities of drive cycle data.« less

  17. Development of a Short-Duration Drive Cycle to Represent Long-Term Measured Drive Cycle Data: Evaluation of Truck Efficiency Technologies in Class 8 Tractor Trailers

    DOE PAGES

    LaClair, Tim; Gao, Zhiming; Fu, Joshua; ...

    2014-12-01

    Quantifying the fuel savings and emissions reductions that can be achieved from truck fuel efficiency technologies for a fleet's specific usage allows the fleet to select a combination of technologies that will yield the greatest operational efficiency and profitability. An accurate characterization of usage for the fleet is critical for such an evaluation; however, short-term measured drive cycle data do not generally reflect overall usage very effectively. This study presents a detailed analysis of vehicle usage in a commercial vehicle fleet and demonstrates the development of a short-duration synthetic drive cycle with measured drive cycle data collected over an extendedmore » period of time. The approach matched statistical measures of the vehicle speed with acceleration history and integrated measured grade data to develop a compressed drive cycle that accurately represents total usage. Drive cycle measurements obtained during a full year from six tractor trailers in normal operations in a less-than-truckload carrier were analyzed to develop a synthetic drive cycle. The vehicle mass was also estimated to account for the variation of loads that the fleet experienced. These drive cycle and mass data were analyzed with a tractive energy analysis to quantify the benefits in terms of fuel efficiency and reduced carbon dioxide emissions that can be achieved on Class 8 tractor trailers by using advanced efficiency technologies, either individually or in combination. Although differences exist between Class 8 tractor trailer fleets, this study provides valuable insight into the energy and emissions reduction potential that various technologies can bring in this important trucking application. Finally, the methodology employed for generating the synthetic drive cycle serves as a rigorous approach to develop an accurate usage characterization that can be used to effectively compress large quantities of drive cycle data.« less

  18. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets aremore » considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.« less

  19. Quantum-secured blockchain

    NASA Astrophysics Data System (ADS)

    Kiktenko, E. O.; Pozhar, N. O.; Anufriev, M. N.; Trushechkin, A. S.; Yunusov, R. R.; Kurochkin, Y. V.; Lvovsky, A. I.; Fedorov, A. K.

    2018-07-01

    Blockchain is a distributed database which is cryptographically protected against malicious modifications. While promising for a wide range of applications, current blockchain platforms rely on digital signatures, which are vulnerable to attacks by means of quantum computers. The same, albeit to a lesser extent, applies to cryptographic hash functions that are used in preparing new blocks, so parties with access to quantum computation would have unfair advantage in procuring mining rewards. Here we propose a possible solution to the quantum era blockchain challenge and report an experimental realization of a quantum-safe blockchain platform that utilizes quantum key distribution across an urban fiber network for information-theoretically secure authentication. These results address important questions about realizability and scalability of quantum-safe blockchains for commercial and governmental applications.

  20. Security Management and Safeguards Office

    NASA Technical Reports Server (NTRS)

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are

  1. The Handbook for Campus Safety and Security Reporting. 2016 Edition

    ERIC Educational Resources Information Center

    US Department of Education, 2016

    2016-01-01

    Campus security and safety is an important feature of postsecondary education. The Department of Education is committed to assisting schools in providing students nationwide a safe environment in which to learn and to keep students, parents and employees well informed about campus security. These goals were advanced by the Crime Awareness and…

  2. Foundational Security Principles for Medical Application Platforms* (Extended Abstract)

    PubMed Central

    Vasserman, Eugene Y.; Hatcliff, John

    2014-01-01

    We describe a preliminary set of security requirements for safe and secure next-generation medical systems, consisting of dynamically composable units, tied together through a real-time safety-critical middleware. We note that this requirement set is not the same for individual (stand-alone) devices or for electronic health record systems, and we must take care to define system-level requirements rather than security goals for components. The requirements themselves build on each other such that it is difficult or impossible to eliminate any one of the requirements and still achieve high-level security goals. PMID:25599096

  3. Security culture for nuclear facilities

    NASA Astrophysics Data System (ADS)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  4. Assurance: the power behind PCASSO security.

    PubMed Central

    Baker, D. B.; Masys, D. R.; Jones, R. L.; Barnhart, R. M.

    1999-01-01

    The need for security protection in Internet-based healthcare applications is generally acknowledged. Most healthcare applications that use the Internet have at least implemented some kind of encryption. Most applications also enforce user authentication and access control policies, and many audit user actions. However, most fall short on providing strong assurances that the security mechanisms are behaving as expected and that they cannot be subverted. While no system can claim to be totally "bulletproof," PCASSO provides assurance of correct operation through formal, disciplined design and development methodologies, as well as through functional and penetration testing. Through its security mechanisms, backed by strong system assurances, PCASSO is demonstrating "safe" use of public data networks for health care. PMID:10566443

  5. Mitigating Cyber Security Risk in Satellite Ground Systems

    DTIC Science & Technology

    2015-04-01

    because cyber security in government remains shrouded in secrecy. However, using the Defense Operational Test and Evaluation Office’s (DOT& E ) FY14...report on cybersecurity one grasps the seriousness of the problem. DOT& E reported only 85% of networks in DoD were compliant with the cyber...security regulations discussed later in this paper. Not until compliance is near 100% could DOT& E conceive with confidence that DoD networks were safe

  6. Safe sex

    MedlinePlus

    ... sex; Sexually transmitted - safe sex; GC - safe sex; Gonorrhea - safe sex; Herpes - safe sex; HIV - safe sex; ... contact. STIs include: Chlamydia Genital herpes Genital warts Gonorrhea Hepatitis HIV HPV Syphilis STIs are also called ...

  7. Tracking Next-Generation Automatic Identification Technology (AIT) into 2035

    DTIC Science & Technology

    2010-04-01

    Non-proliferation and Treaty inspections  Shielding / EMI issues  Security/Integrity/Encryption  Taiwan Shipment Fact Sheet http...followed the technical data, but had no idea that they had a live nuclear warhead. While the nuclear ALCM was loaded on the munitions trailer , the...three-man team continued to assemble the other seven ALCMs. As the end of shift neared, all eight ALCMs were loaded on the munitions trailers and the

  8. 24 CFR 3400.305 - Data security.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 5 2012-04-01 2012-04-01 false Data security. 3400.305 Section... DEVELOPMENT SAFE MORTGAGE LICENSING ACT Minimum Requirements for Administration of the NMLSR § 3400.305 Data... registrants whose data may have been compromised, and the employer of the loan originator or registrant, if...

  9. Department of Defense Energy Security Initiatives

    DTIC Science & Technology

    2009-01-01

    Ventura County installed an 87 kW rooftop amorphous silicon thin-film photovoltaic (PV) laminate system on a building in Port Hueneme, California, and...of waste into energy equal to about 100 gallons of JP-8. It is skid mounted and deployable on a military 5-ton flatbed trailer. Solid Oxide Fuel

  10. Home-SAFE: A New Approach in Day Care for the Young Child.

    ERIC Educational Resources Information Center

    Kornfeld, Maurine

    The Los Angeles Section, National Council of Jewish Women, has developed an innovative pilot program in day care geared to the changing life style of child rearing by single parents. Home-SAFE provides children a warm, secure environment in supervised, subsidized, licensed day care homes, and includes enrichment activities by trained volunteers;…

  11. Efficient Aviation Security: Strengthening the Analytic Foundation for Making Air Transportation Security Decisions

    DTIC Science & Technology

    2012-01-01

    Martin B. Zimmerman, “Market Incentives for Safe Commercial Airline Operation,” American Economic Review, Vol. 78, No. 5, 1988, pp. 913–935. Bosch...Modeling,” in Stuart Johnson, Martin C. Libicki, and Gregory F. Treverton, eds., New Challenges, New Tools for Defense Decisionmaking, Santa Monica, Calif...677–725. Persico, Nicola, and Petra E. Todd, “Passenger Profiling, Imperfect Screening, and Airport Security,” American Economic Review, Vol. 95

  12. Security Is Not an Option--Learning in a Safe Environment. FEDA Paper.

    ERIC Educational Resources Information Center

    Coe, Beatrice

    1997-01-01

    A study examined what further education colleges in Britain were doing about security and what they planned for the future. A literature search found that a PEST (Political/legal, Economic, Sociocultural, and Technological) analysis was one way to examine the differential impact of external influences. A PEST analysis offered a strategy for…

  13. Ensuring the security and availability of a hospital wireless LAN system.

    PubMed

    Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku

    2013-01-01

    Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. Herein we discuss security countermeasures that must be taken and issues concerning availability that must be considered to ensure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at a university hospital. Security countermeasures differ according to their purpose, such as preventing illegal use or ensuring availability, both of which are discussed. The main focus of the availability discussion is on signal reach, electromagnetic noise elimination, and maintaining power supply to the network apparatus. It is our hope that this information will assist others in their efforts to ensure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety.

  14. Trailer microclimate and calf welfare during fall-run transportation of beef calves in Alberta.

    PubMed

    Goldhawk, C; Janzen, E; González, L A; Crowe, T; Kastelic, J; Pajor, E; Schwartzkopf-Genswein, K S

    2014-11-01

    Twenty-four commercial loads of beef calves (BW 300 ± 52 kg, mean ± SD) were evaluated for associations among transportation factors, in-transit microclimate, and calf welfare. Transport factors evaluated included vehicle speed, space allowance, compartment within trailer, and transit duration. Calves were transported for 7 h 44 min ± 4 h 15 min, with space allowances ranging from 0.56 to 1.17 m(2)/animal. Compartment within trailer, space allowance, and vehicle speed did not affect the difference between compartment ceiling-level and ambient temperatures during a 30-min period of steady-state microclimate. During the steady-state period, a 1°C increase in ambient temperature above the mean of 5.6°C was associated with a 0.62°C decrease in the difference between ceiling-level and ambient temperature (P < 0.01). Ceiling-level temperature and humidity during the first 400 min of transport could be predicted by ambient conditions and vehicle speed (pseudo-r(2) of 0.91 and 0.82 for temperature and humidity ratio; P < 0.01). Events when animal-level temperature-humidity index (THI) was classified as above the "danger" level lasted for 10.2 ± 4.1 consecutive minutes. Ambient and ceiling-level THI values were not classified as above "danger" for 90.0 and 84.9% of animal-level events. Ambient and ceiling-level THI were 5.0 ± 2.1 and 4.7 ± 2.0° Flower than animal-level THI during periods of disagreement, respectively. The majority of calves arrived in good condition and biochemical indicators of calf welfare were within reference ranges for healthy cattle. Within the study population, high pre-transport cortisol and hematocrit were associated with elevated post-transport values (P < 0.01). A 1% increase in shrink during the weaning to loading interval (24 or 48 h) decreased transportation shrink by 0.26 ± 0.04% when average animal-level temperature was greater than 5°C and decreased transportation shrink by 0.11 ± 0.04% when average animal-level temperature was

  15. Safety and Security Concerns of Nurses Working in the Intensive Care Unit: A Qualitative Study.

    PubMed

    Keys, Yolanda; Stichler, Jaynelle F

    Intensive care units (ICUs) exist to serve as a safe place for critically ill patients to receive care from skilled practitioners. In this qualitative study, ICU nurses shared their perspectives on elements that promote safety and security on their units. After obtaining institutional review board approval, participants participated in telephone interviews with a nurse researcher who has experience as a bedside ICU nurse. Five categories and 14 themes were identified and then confirmed using member checking. Results indicate that participants prefer to provide care in ICUs with no more than 12 to 14 beds and provide the following: visibility of patients and coworkers; more than 1 way to exit; and can be locked in case of emergency or threat. Nearly all respondents mentioned adequate staffing as the most important attribute of a safe, secure care environment for patients and families. More research is needed to identify design features that make the most impact on providing a safe, secure ICU environment.

  16. 76 FR 7623 - Parts and Accessories Necessary for Safe Operation; Brakes; Application for Exemption From...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-10

    ... Innovative Electronics AGENCY: Federal Motor Carrier Safety Administration (FMCSA), DOT. ACTION: Notice of... exemption from Innovative Electronics regarding the use of trailer-mounted electric brake controllers, which... brake controllers on commercial motor vehicles is currently prohibited. Innovative Electronics is...

  17. Report to Congress on Energy Security Initiatives

    DTIC Science & Technology

    2008-10-01

    the Department. Naval Base Ventura County installed an 87 kilowatt rooftop amorphous silicon thin-film photovoltaic (PV) laminate system on a...on a military 5-ton flatbed trailer. The units were deployed in May 2008 and are undergoing a 90 day evaluation in theater. The demonstration is off

  18. Re-designing the PhEDEx Security Model

    NASA Astrophysics Data System (ADS)

    C-H, Huang; Wildish, T.; X, Zhang

    2014-06-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.

  19. Using the Method of Water Poverty Index (WPI) to Evaluate the Region Water Security

    NASA Astrophysics Data System (ADS)

    Fu, Q.; Kachanoski, G.

    2008-12-01

    Water security is a widely concerned issue in the world nowadays. A new method, water poverty index (WPI), has been used to evaluate the regional water security. Twelve state farms in Heilongjiang Province, Northeastern China were selected to evaluate water security status based on the data of 2006 by using WPI and mean deviation grading method. The method of WPI includes five key indexes, such as resources(R), access (A), capacity(C), utilization (U) and environment (E). Each key index includes several sub-indexes. According to the results of WPI, the grade of each farm has been calculated by using the method of mean deviation grading. Thus, the radar images can be protracted of each farm. From the radar images, the conclusions can be drawn that the WPI values of Farms 853 and Hongqiling were in very safe status, while that of Farm Raohe was in safe status, those of Farms Youyi, 597, 852, 291 and Jiangchuan were in moderate safe status, that of Farm Beixing was in low safe status and those of Farms Shuangyashan, Shuguang and Baoshan were in unsafe status. The results from this study can provide basic information for decision making on rational use of water resources and regulations for regional water safety guarantee system.

  20. Characterizing a Wake-Free Safe Zone for the Simplified Aircraft-Based Paired Approach Concept

    NASA Technical Reports Server (NTRS)

    Guerreiro, Nelson M.; Neitzke, Kurt W.; Johnson, Sally C.; Stough, H. Paul, III; McKissick, Burnell T.; Syed, Hazari I.

    2010-01-01

    The Federal Aviation Administration (FAA) has proposed a concept of operations geared towards achieving increased arrival throughput at U.S. Airports, known as the Simplified Aircraft-based Paired Approach (SAPA) concept. In this study, a preliminary characterization of a wake-free safe zone (WFSZ) for the SAPA concept has been performed. The experiment employed Monte-Carlo simulations of varying approach profiles by aircraft pairs to closely-spaced parallel runways. Three different runway lateral spacings were investigated (750 ft, 1000 ft and 1400 ft), along with no stagger and 1500 ft stagger between runway thresholds. The paired aircraft were flown in a leader/trailer configuration with potential wake encounters detected using a wake detection surface translating with the trailing aircraft. The WFSZ is characterized in terms of the smallest observed initial in-trail distance leading to a wake encounter anywhere along the approach path of the aircraft. The results suggest that the WFSZ can be characterized in terms of two primary altitude regions, in ground-effect (IGE) and out of ground-effect (OGE), with the IGE region being the limiting case with a significantly smaller WFSZ. Runway stagger was observed to only modestly reduce the WFSZ size, predominantly in the OGE region.

  1. Unmanned Aerial Systems Traffic Management (UTM): Safely Enabling UAS Operations in Low-Altitude Airspace

    NASA Technical Reports Server (NTRS)

    Jung, Jaewoo; Kopardekar, Parimal H.

    2016-01-01

    Flexibility where possible, and structure where necessary. Consider the needs of national security, safe airspace operations, economic opportunities, and emerging technologies. Risk-based approach based on population density, assets on the ground, density of operations, etc. Digital, virtual, dynamic, and as needed UTM services to manage operations.

  2. Unmanned Aerial Systems Traffic Management (UTM): Safely Enabling UAS Operations in Low-Altitude Airspace

    NASA Technical Reports Server (NTRS)

    Kopardekar, Parimal H.; Cavolowsky, John

    2015-01-01

    Flexibility where possible, and structure where necessary. Consider the needs of national security, safe airspace operations, economic opportunities, and emerging technologies. Risk-based approach based on population density, assets on the ground, density of operations, etc. Digital, virtual, dynamic, and as needed UTM services to manage operations.

  3. Early Arrival or Trespassing? Leadership, School Security, and the Right to the School

    ERIC Educational Resources Information Center

    Irby, Decoteau J.; Thomas, Christopher

    2013-01-01

    School leaders are under constant pressure to ensure that schools are safe and to demonstrate that student safety and discipline are priorities. In many districts, schools rely on local law enforcement, school police, or security personnel to assist with promoting and maintaining safe schools. To encourage school leaders to think critically about…

  4. Mining Security Pipe(TSM)with Underground GPS Global(RSPG)Escape Security Device in Underground Mining

    NASA Astrophysics Data System (ADS)

    Giménez, Rafael Barrionuevo

    2016-06-01

    TSM is escape pipe in case of collapse of terrain. The TSM is a passive security tool placed underground to connect the work area with secure area (mining gallery mainly). TSM is light and hand able pipe made with aramid (Kevlar), carbon fibre, or other kind of new material. The TSM will be placed as a pipe line network with many in/out entrances/exits to rich and connect problem work areas with another parts in a safe mode. Different levels of instrumentation could be added inside such as micro-led escape way suggested, temperature, humidity, level of oxygen, etc.). The open hardware and software like Arduino will be the heart of control and automation system.

  5. Cyber security evaluation of II&C technologies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thomas, Ken

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) tomore » address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted

  6. Organizational Culture for Safety, Security, and Safeguards in New Nuclear Power Countries

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kovacic, Donald N

    2015-01-01

    This chapter will contain the following sections: Existing international norms and standards for developing the infrastructure to support new nuclear power programs The role of organizational culture and how it supports the safe, secure, and peaceful application of nuclear power Identifying effective and efficient strategies for implementing safety, security and safeguards in nuclear operations Challenges identified in the implementation of safety, security and safeguards Potential areas for future collaboration between countries in order to support nonproliferation culture

  7. ASIS healthcare security benchmarking study.

    PubMed

    2001-01-01

    Effective security has aligned itself into the everyday operations of a healthcare organization. This is evident in every regional market segment, regardless of size, location, and provider clinical expertise or organizational growth. This research addresses key security issues from an acute care provider to freestanding facilities, from rural hospitals and community hospitals to large urban teaching hospitals. Security issues and concerns are identified and addressed daily by senior and middle management. As provider campuses become larger and more diverse, the hospitals surveyed have identified critical changes and improvements that are proposed or pending. Mitigating liabilities and improving patient, visitor, and/or employee safety are consequential to the performance and viability of all healthcare providers. Healthcare organizations have identified the requirement to compete for patient volume and revenue. The facility that can deliver high-quality healthcare in a comfortable, safe, secure, and efficient atmosphere will have a significant competitive advantage over a facility where patient or visitor security and safety is deficient. Continuing changes in healthcare organizations' operating structure and healthcare geographic layout mean changes in leadership and direction. These changes have led to higher levels of corporate responsibility. As a result, each organization participating in this benchmark study has added value and will derive value for the overall benefit of the healthcare providers throughout the nation. This study provides a better understanding of how the fundamental security needs of security in healthcare organizations are being addressed and its solutions identified and implemented.

  8. 76 FR 4123 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-24

    .... The closed portions of the meeting will address threats to our homeland security, results of a cyber... designed to keep our country safe. A briefing on the Cyber Storm III Exercise will include lessons learned and vulnerabilities of cyber assets, as well as potential methods to improve a Federal response to a...

  9. 77 FR 46633 - Parts and Accessories Necessary for Safe Operation: Brakes; Adjustment Limits

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-06

    ... the online instructions for submitting comments. Mail: Docket Management Facility: U.S. Department of... rather than the June 1991 edition. No commenters to the docket for that rulemaking addressed the proposed... (FMVSS) citations include the reference to trailers and read, ``49 CFR 571.121, S5.1.8 or S5.2.2.'' On...

  10. Re-designing the PhEDEx Security Model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Huang, C.-H.; Wildish, T.; Zhang, X.

    2014-01-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintainingmore » code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.« less

  11. 12 CFR 226.2 - Definitions and rules of construction.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... an individual condominium unit, cooperative unit, mobile home, and trailer, if it is used as a... means a transaction in which a mortgage, deed of trust, purchase money security interest arising under...

  12. Closure Report for Corrective Action Unit 465: Hydronuclear Nevada National Security Site, Nevada, Revision 0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mark Burmeister and Patrick Matthews

    2012-11-01

    The corrective action sites (CASs) within CAU 465 are located within Areas 6 and 27 of the NNSS. CAU 465 comprises the following CASs: • 00-23-01, Hydronuclear Experiment, located in Area 27 of the NNSS and known as the Charlie site. • 00-23-02, Hydronuclear Experiment, located in Area 27 of the NNSS and known as the Dog site. • 00-23-03, Hydronuclear Experiment, located in Area 27 of the NNSS and known as the Charlie Prime and Anja sites. • 06-99-01, Hydronuclear, located in Area 6 of the NNSS and known as the Trailer 13 site. The purpose of this CRmore » is to provide documentation supporting the completed corrective actions and provide data confirming that the closure objectives for CASs within CAU 465 were met. From September 2011 through July 2012, closure activities were performed as set forth in the Streamlined Approach for Environmental Restoration Plan for CAU 465: Hydronuclear, Nevada National Security Site, Nevada.« less

  13. 12 CFR 1026.2 - Definitions and rules of construction.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... unit, cooperative unit, mobile home, and trailer, if it is used as a residence. (20) Open-end credit... which a mortgage, deed of trust, purchase money security interest arising under an installment sales...

  14. 12 CFR 1026.2 - Definitions and rules of construction.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... unit, cooperative unit, mobile home, and trailer, if it is used as a residence. (20) Open-end credit... which a mortgage, deed of trust, purchase money security interest arising under an installment sales...

  15. 12 CFR 1026.2 - Definitions and rules of construction.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... unit, cooperative unit, mobile home, and trailer, if it is used as a residence. (20) Open-end credit... which a mortgage, deed of trust, purchase money security interest arising under an installment sales...

  16. 75 FR 14330 - Transitional Safe Harbor Protection for Treatment by the Federal Deposit Insurance Corporation as...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-25

    ... Assets Transferred by an Insured Depository Institution in Connection With a Securitization or... limited time the safe harbor provision for securitizations that would be affected by recent changes to... securitizations for which financial assets were transferred or, for revolving trusts, for which securities were...

  17. Subscale Validation of the Subsurface Active Filtration of Exhaust (SAFE) Approach to the NTP Ground Testing

    NASA Technical Reports Server (NTRS)

    Marshall, William M.; Borowski, Stanley K.; Bulman, Mel; Joyner, Russell; Martin, Charles R.

    2015-01-01

    Nuclear thermal propulsion (NTP) has been recognized as an enabling technology for missions to Mars and beyond. However, one of the key challenges of developing a nuclear thermal rocket is conducting verification and development tests on the ground. A number of ground test options are presented, with the Sub-surface Active Filtration of Exhaust (SAFE) method identified as a preferred path forward for the NTP program. The SAFE concept utilizes the natural soil characteristics present at the Nevada National Security Site to provide a natural filter for nuclear rocket exhaust during ground testing. A validation method of the SAFE concept is presented, utilizing a non-nuclear sub-scale hydrogen/oxygen rocket seeded with detectible radioisotopes. Additionally, some alternative ground test concepts, based upon the SAFE concept, are presented. Finally, an overview of the ongoing discussions of developing a ground test campaign are presented.

  18. Voices from the Field: Working Together for Safe and Secure Schools. Summary of Findings from Florida Education Commissioner Charlie Crist's School Safety and Security Summits.

    ERIC Educational Resources Information Center

    Florida State Dept. of Education, Tallahassee.

    During summer and fall 2001, the Florida Commissioner of Education conducted eight regional meetings, open to the public, on school safety and security. The purpose of the meetings was to explore safety issues faced by districts and schools, share best safety practices, and generate local discussion on matters of school safety and security. This…

  19. Organizing Safe Transitions from Intensive Care

    PubMed Central

    Häggström, Marie; Bäckström, Britt

    2014-01-01

    Background. Organizing and performing patient transfers in the continuum of care is part of the work of nurses and other staff of a multiprofessional healthcare team. An understanding of discharge practices is needed in order to ultimate patients' transfers from high technological intensive care units (ICU) to general wards. Aim. To describe, as experienced by intensive care and general ward staff, what strategies could be used when organizing patient's care before, during, and after transfer from intensive care. Method. Interviews of 15 participants were conducted, audio-taped, transcribed verbatim, and analyzed using qualitative content analysis. Results. The results showed that the categories secure, encourage, and collaborate are strategies used in the three phases of the ICU transitional care process. The main category; a safe, interactive rehabilitation process, illustrated how all strategies were characterized by an intention to create and maintain safety during the process. A three-way interaction was described: between staff and patient/families, between team members and involved units, and between patient/family and environment. Discussion/Conclusions. The findings highlight that ICU transitional care implies critical care rehabilitation. Discharge procedures need to be safe and structured and involve collaboration, encouraging support, optimal timing, early mobilization, and a multidiscipline approach. PMID:24782924

  20. Installation of secure, always available wireless LAN systems as a component of the hospital communication infrastructure.

    PubMed

    Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku

    2013-06-01

    Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. In addition, insuring that the network is always available is important. Herein, we discuss security countermeasures and points to insure availability that must be taken to insure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at Shimane University Hospital. Security countermeasures differ according to their purpose, such as for preventing illegal use or insuring availability, both of which are discussed. It is our hope that this information will assist others in their efforts to insure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety.

  1. Secure Container For Discarded Hypodermic Needles

    NASA Technical Reports Server (NTRS)

    Lee, Angelene M.

    1992-01-01

    Container designed for safe retention of discarded blood-collecting hypodermic needles and similar sharp objects used in life-science experiments aboard spacecraft. Needles inserted through self-closing lid and retained magnetically. They are inserted, sharp end first, through spring-loaded flap. Long needles and needles on syringes cannot turn around in container. Can be emptied, cleaned, and reused. Used on Earth to provide unusually secure containment of sharp objects.

  2. Earth Observations for Global Water Security

    NASA Technical Reports Server (NTRS)

    Lawford, Richard; Strauch, Adrian; Toll, David; Fekete, Balazs; Cripe, Douglas

    2013-01-01

    The combined effects of population growth, increasing demands for water to support agriculture, energy security, and industrial expansion, and the challenges of climate change give rise to an urgent need to carefully monitor and assess trends and variations in water resources. Doing so will ensure that sustainable access to adequate quantities of safe and useable water will serve as a foundation for water security. Both satellite and in situ observations combined with data assimilation and models are needed for effective, integrated monitoring of the water cycle's trends and variability in terms of both quantity and quality. On the basis of a review of existing observational systems, we argue that a new integrated monitoring capability for water security purposes is urgently needed. Furthermore, the components for this capability exist and could be integrated through the cooperation of national observational programmes. The Group on Earth Observations should play a central role in the design, implementation, management and analysis of this system and its products.

  3. PREFACE: Nanosafe 2008: International Conference on Safe production and use of nanomaterials

    NASA Astrophysics Data System (ADS)

    Sentein, Carole; Schuster, Frédéric; Tardif, Francois

    2009-07-01

    The first international conference on 'Safe production and use of nanomaterials': NanoSafe2008 was held on 3-7 November at the Minatec congress center located in Grenoble, France. As recognised, the rapidly developing field of nanotechnologies presents many opportunities and benefits for new materials with significantly improved properties as well as revolutionary applications in the fields of energy, environment, medicine, etc. However, the potential impact of these new materials on human health and the environment is viewed with apprehension. All the security aspects have to be solved in order to reach an acceptable level of risk. The new nano industry can only develop dynamically if these legitimate fears are satisfactory allayed. This event was organized by the French Commissariat à l'Energie Atomique (CEA) in the frame of the Integrated European project NanoSafe2 funded by the European Commission under FP6 programs. NanoSafe2008 had broad international participation from 25 countries representing the 5 continents, with registered delegates numbering over 250. The scientific program involved the presentation and discussion of 112 papers, classified as 8 plenary lectures, 65 oral and 39 posters. The conference attracted many of the best known leading scientists and specialists in almost all the different fields of expertise covering nanosafety issues: Exposure, Characterisation, Detection, Monitoring, Life cycle, Toxicology, Personal protection, Secure industrial production, Safety parameter evaluation, Standardization, Regulation and Education. In parallel with the conference an exhibition took place where 10 exhibitors presented the commercial equipment available today in relation to safety during the production or the use of nanomaterials. We believe that this conference, with the above topics, has provided a forum where the many matters of interest to the NanoSafety community have been debated. The success of the conference was such that attendees asked the

  4. Learning to provide children with a secure base and a safe haven: The Circle of Security-Parenting (COS-P) group intervention.

    PubMed

    Kim, Monica; Woodhouse, Susan S; Dai, Chenchen

    2018-05-21

    Insecure attachment is linked to a host of negative child outcomes, including internalizing and externalizing behavior problems. Circle of Security-Parenting (COS-P) is a manualized, video-based, eight unit, group parenting intervention to promote children's attachment security. COS-P was designed to be easily implemented, so as to make attachment interventions more widely available to families. We present the theoretical background of COS-P, research evidence supporting the COS approach, as well as a description of the COS-P intervention protocol. The case example of "Alexa," mother of three children (aged 7, 6, and 4 years), illustrates how parents can make use of the COS-P intervention to better understand children's needs, build skills in observing and interpreting children's signals, learn to recognize and regulate their own responses to their children, and learn new ways of responding to children's needs. © 2018 Wiley Periodicals, Inc.

  5. Cool and Safe: Multiplicity in Safe Innovation at Unilever

    ERIC Educational Resources Information Center

    Penders, Bart

    2011-01-01

    This article presents the making of a safe innovation: the application of ice structuring protein (ISP) in edible ices. It argues that safety is not the absence of risk but is an active accomplishment; innovations are not "made safe afterward" but "safe innovations are made". Furthermore, there are multiple safeties to be accomplished in the…

  6. Combating Terrorism: U.S. Government Strategies and Efforts to Deny Terrorists Safe Haven

    DTIC Science & Technology

    2011-06-03

    havens—such as activities funded through State’s Peacekeeping Operations and State-funded DHS training to combat money laundering and bulk cash...Management, Committee on Homeland Security House of Representatives COMBATING TERRORISM U.S. Government Strategies and Efforts to Deny Terrorists... Combating Terrorism: U.S. Government Strategies and Efforts to Deny Terrorists Safe Haven 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT

  7. Diagnosing water security in the rural North with an environmental security framework.

    PubMed

    Penn, Henry J F; Loring, Philip A; Schnabel, William E

    2017-09-01

    This study explores the nature of water security challenges in rural Alaska, using a framework for environmental security that entails four interrelated concepts: availability, access, utility, and stability of water resources. Many researchers and professionals agree that water insecurity is a problem in rural Alaska, although the scale and nature of the problem is contested. Some academics have argued that the problem is systemic, and rooted in an approach to water security by the state that prioritizes economic concerns over public health concerns. Health practitioners and state agencies, on the other hand, contend that much progress has been made, and that nearly all rural households have access to safe drinking water, though many are still lacking 'modern' in-home water service. Here, we draw on a synthesis of ethnographic research alongside data from state agencies to show that the persistent water insecurity problems in rural Alaska are not a problem of access to or availability of clean water, or a lack of 'modern' infrastructure, but instead are rooted in complex human dimensions of water resources management, including the political legacies of state and federal community development schemes that did not fully account for local needs and challenges. The diagnostic approach we implement here helps to identify solutions to these challenges, which accordingly focus on place-based needs and empowering local actors. The framework likewise proves to be broadly applicable to exploring water security concerns elsewhere in the world. Copyright © 2017 Elsevier Ltd. All rights reserved.

  8. Port Security in the Persian Gulf

    DTIC Science & Technology

    2008-06-01

    drafters of ISPS for secure, standardized documents to be issued to the world’s merchant seamen, another arm of the UN, the International Labour ...Revised), 2003," International Labour Organization, http://www.ilo.org/ilolex/cgi-lex/convde.pl?C185 (accessed March 11, 2008). 5 The convention has...identity documents for a particularly impoverished portion of their workforce . 2. MTSA (2002) and SAFE-Port (2006) The two primary pieces of

  9. Informatics in Radiology (infoRAD): personal computer security: part 2. Software Configuration and file protection.

    PubMed

    Caruso, Ronald D

    2004-01-01

    Proper configuration of software security settings and proper file management are necessary and important elements of safe computer use. Unfortunately, the configuration of software security options is often not user friendly. Safe file management requires the use of several utilities, most of which are already installed on the computer or available as freeware. Among these file operations are setting passwords, defragmentation, deletion, wiping, removal of personal information, and encryption. For example, Digital Imaging and Communications in Medicine medical images need to be anonymized, or "scrubbed," to remove patient identifying information in the header section prior to their use in a public educational or research environment. The choices made with respect to computer security may affect the convenience of the computing process. Ultimately, the degree of inconvenience accepted will depend on the sensitivity of the files and communications to be protected and the tolerance of the user. Copyright RSNA, 2004

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Verce, M. F.; Schwartz, L. I.

    This was a collaborative effort between LLNL and STE to investigate the use of vaporized hydrogen peroxide (VHP®) to decontaminate spore-contaminated heating, ventilation, and cooling (HV AC) systems in a trailer sized room. LLNL's effort under this CRADA was funded by DOE's Chemical and Biological National Security Program (CBNP), which later became part of Department of Homeland Security in 2004.

  11. [Safe school].

    PubMed

    Liberal, Edson Ferreira; Aires, Roberto Tschoepke; Aires, Mariana Tschoepke; Osório, Ana Carla de Albuquerque

    2005-11-01

    To review the strategies to make school a safe environment. The paper first addresses the social context of accidents and violence in the school environment, and makes recommendations, based on the literature data, for the implementation of safe schools. Articles published between 1993 and 2005 in the MEDLINE database. Brazilian epidemiological and literature data have also been searched. There is growing evidence that intervention has multiple components, focusing on health education practices, with the participation of the whole community. The aim of those interventions is to help students and community members to adopt healthy and safe behaviors. Schools are taking on an increasing role in health promotion, disease prevention, and injury prevention. In the context of prevention of external causes of morbidity and mortality, it is important to recognize a risky environment, places, and risk behaviors as favorable to injury and violence, as well as the concept of accident as something one can avoid. Implementation of safe schools represents a promising new direction for school-based preventive work. It is important to note that a safe school should intervene not only in its physical structure, but it should also make it as safe as possible by gathering the school community through health education, and mainly encouraging healthy behavior.

  12. 77 FR 66351 - Establishing the White House Homeland Security Partnership Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-02

    ... resources more efficiently, build on one another's expertise, drive innovation, engage in collective action... utilizing diverse perspectives, skills, tools, and resources. The National Security Strategy emphasizes the importance of partnerships, underscoring that to keep our Nation safe ``we must tap the ingenuity outside...

  13. Investigation of safe-life fail-safe criteria for the space shuttle

    NASA Technical Reports Server (NTRS)

    1972-01-01

    An investigation was made to determine the effects of a safe-life design approach and a fail-safe design approach on the space shuttle booster vehicle structure, and to recommend any changes to the structural design criteria. Two configurations of the booster vehicle were considered, one incorporating a delta wing (B-9U configuration) and the other a swept wing (B-16B configuration). Several major structural components of the booster were studied to determine the fatigue life, safe-life, and fail-safe capabilities of the baseline design. Each component was investigated to determine the practicability of applying a safe-life or fail-safe design philosophy, the changes such design approaches might require, and the impact of these changes on weight, cost, development plans, and performance.

  14. Safe School Design: A Handbook for Educational Leaders Applying the Principles of Crime Prevention through Environmental Design.

    ERIC Educational Resources Information Center

    Schneider, Tod; Walker, Hill; Sprague, Jeffrey

    This document seeks to synthesize, integrate, and make available to school personnel solid information regarding Crime Prevention through Environmental Design (CPTED). Chapter 1, "The Changed Landscape of School Safety and Security," examines characteristics of safe and unsafe schools, causes of vulnerability, and the role of design and technology…

  15. Organising a safe space for navigating social-ecological transformations to sustainability.

    PubMed

    Pereira, Laura; Karpouzoglou, Timothy; Doshi, Samir; Frantzeskaki, Niki

    2015-05-28

    The need for developing socially just living conditions for the world's growing population whilst keeping human societies within a 'safe operating space' has become a modern imperative. This requires transformative changes in the dominant social norms, behaviours, governance and management regimes that guide human responses in areas such as urban ecology, public health, resource security (e.g., food, water, energy access), economic development and biodiversity conservation. However, such systemic transformations necessitate experimentation in public arenas of exchange and a deepening of processes that can widen multi-stakeholder learning. We argue that there is an emergent potential in bridging the sustainability transitions and resilience approaches to create new scientific capacity that can support large-scale social-ecological transformations (SETs) to sustainability globally, not just in the West. In this article, we elucidate a set of guiding principles for the design of a 'safe space' to encourage stronger interactions between these research areas and others that are relevant to the challenges faced. We envisage new opportunities for transdisciplinary collaboration that will develop an adaptive and evolving community of practice. In particular, we emphasise the great opportunity for engaging with the role of emerging economies in facilitating safe space experimentation.

  16. Reviews on Security Issues and Challenges in Cloud Computing

    NASA Astrophysics Data System (ADS)

    An, Y. Z.; Zaaba, Z. F.; Samsudin, N. F.

    2016-11-01

    Cloud computing is an Internet-based computing service provided by the third party allowing share of resources and data among devices. It is widely used in many organizations nowadays and becoming more popular because it changes the way of how the Information Technology (IT) of an organization is organized and managed. It provides lots of benefits such as simplicity and lower costs, almost unlimited storage, least maintenance, easy utilization, backup and recovery, continuous availability, quality of service, automated software integration, scalability, flexibility and reliability, easy access to information, elasticity, quick deployment and lower barrier to entry. While there is increasing use of cloud computing service in this new era, the security issues of the cloud computing become a challenges. Cloud computing must be safe and secure enough to ensure the privacy of the users. This paper firstly lists out the architecture of the cloud computing, then discuss the most common security issues of using cloud and some solutions to the security issues since security is one of the most critical aspect in cloud computing due to the sensitivity of user's data.

  17. OverView of Space Applications for Environment (SAFE) initiative

    NASA Astrophysics Data System (ADS)

    Hamamoto, Ko; Fukuda, Toru; Tajima, Yoshimitsu; Takeuchi, Wataru; Sobue, Shinichi; Nukui, Tomoyuki

    2014-06-01

    Climate change and human activities have a direc or indirect influence on the acceleration of environmental problems and natural hazards such as forest fires, draughts and floods in the Asia-Pacific countries. Satellite technology has become one of the key information sources in assessment, monitoring and mitigation of these disasters and related phenomenon. However, there are still gaps between science and application of satellite technology in real-world usage. Asia-Pacific Regional Space Agency Forum (APRSAF) recommended to initiate the Space Applications for Environment (SAFE) proposal providing opportunity to potential user agencies in the Asia Pacific region to develop prototype applications of satellite technology for number of key issues including forest resources management, coastal monitoring and management, agriculture and food security, water resource management and development user-friendly tools for application of satellite technology. This paper describes the overview of SAFE initiative and outcomes of two selected prototypes; agricultural drought monitoring in Indonesia and coastal management in Sri Lanka, as well as the current status of on-going prototypes.

  18. Safe and secure. How to create an effective OSHA compliance program in your practice.

    PubMed

    Anderson, Douglas G

    2007-08-01

    Medical group practice administrators have a responsibility to provide a safe working environment for their employees and patients. You must create an effective Occupational Safety and Health Administration (OSHA) compliance program in your organization. The complexity and diversity of OSHA standards are significant, and developing an effective program requires more than a cut-and-paste approach. This article describes the scope of the task, the steps to take and tools you can use.

  19. SAFETY, SECURITY, HYGIENE AND PRIVACY IN MIGRANT FARMWORKER HOUSING

    PubMed Central

    Arcury, Thomas A.; Weir, Maria M.; Summers, Phillip; Chen, Haiying; Bailey, Melissa; Wiggins, Melinda F.; Bischoff, Werner E.; Quandt, Sara A.

    2013-01-01

    Safety, security, hygiene, and privacy in migrant farmworker housing have not previously been documented, yet these attributes are important for farmworker quality of life and dignity. This analysis describes the safety, security, hygiene, and privacy of migrant farmworker housing and delineates camp characteristics that are associated with these attributes, using data collected in 183 eastern North Carolina migrant farmworker camps in 2010. Migrant farmworker housing is deficient. For example, 73.8 percent of housing had structural damage and 52.7 percent had indoor temperatures that were not safe. Farmworkers in 83.5 percent of the housing reported that they did not feel they or their possessions were secure. Bathing or toileting privacy was absent in 46.2 percent of the housing. Camps with residents having H-2A visas or North Carolina Department of Labor certificates of inspection posted had better safety, security, and hygiene. Regulations addressing the quality of migrant farmworker housing are needed. PMID:22776578

  20. Safe Zones: Creating LGBT Safe Space Ally Programs

    ERIC Educational Resources Information Center

    Poynter, Kerry John; Tubbs, Nancy Jean

    2008-01-01

    This article discusses model LGBT Safe Space Ally programs. These programs, often called "Safe Zones," include self selected students, faculty, and employees who publicly show support by displaying stickers, signs, and other identifiable items. Issues covered in the article include history, development, training, membership, assessment, and…

  1. All the World’s a Stage

    DTIC Science & Technology

    1994-01-01

    Wodf , 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF THIS...then there was a knock on the rickety aluminum door of the trailer. She got up and put on the faded rose-colored terry cloth robe and slippers she had...Summer 1990, p. 2. 20. Dennis M. Drew, "How Television Shapes Foreign Policy ," AirFore.. Mime, November 29, 1993, p. 39. 21. Peter Brock, "Dateline

  2. Safe at Any Speed: Securing Your Wi-Fi Network Is Easier and More Important than You Might Think

    ERIC Educational Resources Information Center

    Branzburg, Jeffrey

    2007-01-01

    In this article, the author relates how he discovered that not all Wi-Fi networks are secure. As such, he developed several strategies on how he can be secured whenever he connects to the Internet through a Wi-Fi connection. He discusses how one can change passwords, explains the process of encryption, and provides suggestions on other security…

  3. 360 PORT MDA - A Strategy to Improve Port Security

    DTIC Science & Technology

    2006-09-01

    Participating Agencies (After: Executive Briefing..........................27 Table 6. Designated Joint Operations Center Participants (From: SAFE...Investigations CGIP Coast Guard Intelligence Program CHOC Charleston Harbor Operations Center CIO Command Intelligence Officer CMT Combating Maritime... EXECUTIVE SUMMARY Ports are critical to our economy and national security. Key hubs in the international trade network, U.S. ports accounted for more than

  4. Safe Environment Training: Effects on Catholic Schoolteachers' and Administrators' School Security and Satisfaction

    ERIC Educational Resources Information Center

    Teague, James Brian

    2013-01-01

    In 2002, in light of the sexual abuse crisis in the Catholic church, The United States Conference of Catholic Bishops established "The charter for the Protection of Children and Young People" that mandated safe environment training for clergy personnel, and volunteers working in the Catholic church. In this study, under the auspices of a…

  5. Trailer microclimate during commercial transportation of feeder cattle and relationship to indicators of cattle welfare.

    PubMed

    Goldhawk, C; Crowe, T; Janzen, E; González, L A; Kastelic, J; Pajor, E; Schwartzkopf-Genswein, K S

    2014-11-01

    Nineteen loads of commercial feeder cattle (BW 376 ± 39 kg, mean ± SD) transported for 18 ± 4.5 h in summer and winter seasons were used to collect data on internal temperature and humidity conditions in the deck and belly compartment of pot-bellied trailers and their relationship with shrink, cortisol, and morbidity. Measurements of temperature or humidity at ceiling or animal level did not vary with transportation factors. Temperature and humidity ratio was greater at animal-level than ambient conditions during nonhighway travel and stationary periods (P < 0.01). During the 3 time periods evaluated within journeys, there was a larger difference between animal-level and ambient conditions during the winter than during the summer (P < 0.01); however, this difference was not associated with other transport factors (P > 0.05). Evening loads (1700 and 2100 h) experienced more shrink in the summer than in the winter (11.2 ± 0.5 vs. 9.0 ± 0.5% of BW; P = 0.03). A 1°C increase in difference between average animal-level temperature in transit and the mean ambient temperature during the 10 d before transport was associated with a 0.11 ± 0.03% of BW increase in shrink (P < 0.01) and 0.006 ± 0.002 ng/mL increase in posttransport cortisol concentration (P = 0.05). Animal-level temperature-humidity index (THI) events (consecutive observations of THI greater than 78°F) were more likely to last for longer than 1 h when the trailer was stationary vs. traveling (mean = 1.8, confidence level 95% = 1.33, 2.52). During THI events at animal level, the disagreement with ambient temperature regarding THI classification was lower when the vehicle was traveling vs. stationary (95.5 ± 0.01% vs. 99.7 ± 0.002% of THI event in disagreement; P < 0.01) and was greatest in events less than 1 h (99.8 ± 0.0% vs. 91.7 ± 0.03% of THI event in disagreement; P < 0.01). The average magnitude of the difference during these events was 11.4 ± 7.6°F and was not affected by transportation

  6. CE: Can Your Older Patients Drive Safely?

    PubMed

    Staplin, Loren; Lococo, Kathy H; Mastromatto, Tia; Sifrit, Kathy J; Trazzera, Kathleen M

    2017-09-01

    : In many areas of the world, driving is an essential part of life and for reasons of comfort, convenience, and security remains the primary mode of transportation among older adults. Both normal aging and diseases that are more prevalent in advanced age can substantially reduce older drivers' functional abilities, elevating their risk of involvement in motor vehicle accidents and serious injury or death. Identifying and intervening with older drivers at increased crash risk is an important aspect of preventive medicine. The authors discuss the specific driving risks adults face as they age and how nurses can raise older patients' awareness of these risks. They also discuss the importance of connecting older adults to community resources that may help them continue driving safely for a longer period or find alternative transportation options.

  7. Controlling Crime and Delinquency in the Schools: An Exploratory Study of Student Perceptions of School Security Measures

    ERIC Educational Resources Information Center

    Brown, Ben

    2005-01-01

    This paper provides an analysis of data on school security measures which were obtained from a survey administered to a sample of 230 high school students. The majority of students indicated that the school police officers and security officers help keep the schools safe and that the drug-sniffing dogs help reduce drugs in the schools, but there…

  8. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations.

    PubMed

    Tanner-Smith, Emily E; Fisher, Benjamin W

    2016-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance, and postsecondary educational aspirations. The data for this study came from two large national surveys--the School Crime Supplement to the National Crime Victimization Survey (N = 38,707 students; 51% male, 77% White, MAge = 14.72) and the School Survey on Crime and Safety (N = 10,340 schools; average student composition of 50% male, 57% White). The results provided no evidence that visible security measures had consistent beneficial effects on adolescents' academic outcomes; some security utilization patterns had modest detrimental effects on adolescents' academic outcomes, particularly the heavy surveillance patterns observed in a small subset of high schools serving predominantly low socioeconomic students. The findings of this study provide no evidence that visible security measures have any sizeable effects on academic performance, attendance, or postsecondary aspirations among U.S. middle and high school students.

  9. Maximum Security. The Culture of Violence in Inner-City Schools.

    ERIC Educational Resources Information Center

    Devine, John

    In an ethnographic reflection on 10 years experience working in the high schools of inner-city New York, issues of school safety, discipline, and violence are explored. The central proposition is that the mentality that relies on paramilitary security measures and technological devices, such as metal detectors, to achieve safe schools is only an…

  10. Safe Schools, Safe Communities.

    ERIC Educational Resources Information Center

    Lewis, Julie E.; Pickett, Dean; Pulliam, Janet L.; Schwartz, Richard A.; St. Germaine, Anne-Marie; Underwood, Julie; Worona, Jay

    Schools must work together with agencies, groups, and individuals to eliminate the forces leading children to violence. Chapter 1, "School Safety: Working Together to Keep Schools Safe," stresses the importance of community collaboration in violence prevention. Effective prevention requires sharing information about students, consistent…

  11. Provably Secure Password-based Authentication in TLS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier

    2005-12-20

    In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised tomore » the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.« less

  12. Building a Successful Security Infrastructure: What You Want vs. What You Need vs. What You Can Afford

    NASA Technical Reports Server (NTRS)

    Crabb, Michele D.; Woodrow, Thomas S. (Technical Monitor)

    1995-01-01

    With the fast growing popularity of the Internet, many organizations are racing to get onto the on-ramp to the Information Superhighway. However, with frequent headlines such as 'Hackers' break in at General Electric raises questions about the Net's Security', 'Internet Security Imperiled - Hackers steal data that could threaten computers world-wide' and 'Stanford Computer system infiltrated; Security fears grow', organizations find themselves rethinking their approach to the on-ramp. Is the Internet safe? What do I need to do to protect my organization? Will hackers try to break into my systems? These are questions many organizations are asking themselves today. In order to safely travel along the Information Superhighway, organizations need a strong security framework. Developing such a framework for a computer site, whether it be just a few dozen hosts or several thousand hosts is not an easy task. The security infrastructure for a site is often developed piece-by-piece in response to security incidents which have affected that site over time. Or worse yet, no coordinated effort has been dedicated toward security. The end result is that many sites are still poorly prepared to handle the security dangers of the Internet. This paper presents guidelines for building a successful security infrastructure. The problem is addressed in a cookbook style method. First is a discussion on how to identify your assets and evaluate the threats to those assets; next are suggestions and tips for identifying the weak areas in your security armor. Armed with this information we can begin to think about what you really need for your site and what you can afford. In this stage of the process we examine the different categories of security tools and products that are available and then present some tips for deciding what is best for your site.

  13. Development of an Internet Security Policy for health care establishments.

    PubMed

    Ilioudis, C; Pangalos, G

    2000-01-01

    The Internet provides unprecedented opportunities for interaction and data sharing among health care providers, patients and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality and integrity of information. This paper defines the basic security requirements that must be addressed in order to use the Internet to safely transmit patient and/or other sensitive Health Care information. It describes a suitable Internet Security Policy for Health Care Establishments and provides the set of technical measures that are needed for its implementation. The proposed security policy and technical approaches have been based on an extensive study of the related recommendations from the security and standard groups both in EU amid USA and our related work and experience. The results have been utilized in the framework of the Intranet Health Clinic project, where the use of the Internet for the transmission of sensitive Health Care information is of vital importance.

  14. Organising a Safe Space for Navigating Social-Ecological Transformations to Sustainability

    PubMed Central

    Pereira, Laura; Karpouzoglou, Timothy; Doshi, Samir; Frantzeskaki, Niki

    2015-01-01

    The need for developing socially just living conditions for the world’s growing population whilst keeping human societies within a ‘safe operating space’ has become a modern imperative. This requires transformative changes in the dominant social norms, behaviours, governance and management regimes that guide human responses in areas such as urban ecology, public health, resource security (e.g., food, water, energy access), economic development and biodiversity conservation. However, such systemic transformations necessitate experimentation in public arenas of exchange and a deepening of processes that can widen multi-stakeholder learning. We argue that there is an emergent potential in bridging the sustainability transitions and resilience approaches to create new scientific capacity that can support large-scale social-ecological transformations (SETs) to sustainability globally, not just in the West. In this article, we elucidate a set of guiding principles for the design of a ‘safe space’ to encourage stronger interactions between these research areas and others that are relevant to the challenges faced. We envisage new opportunities for transdisciplinary collaboration that will develop an adaptive and evolving community of practice. In particular, we emphasise the great opportunity for engaging with the role of emerging economies in facilitating safe space experimentation. PMID:26030471

  15. Integrating Security in Real-Time Embedded Systems

    DTIC Science & Technology

    2017-04-26

    b) detect any intrusions/a ttacks once tl1ey occur and (c) keep the overall system safe in the event of an attack. 4. Analysis and evaluation of...beyond), we expanded our work in both security integration and attack mechanisms, and worked on demonstrations and evaluations in hardware. Year I...scheduling for each busy interval w ith the calculated arrival time w indow. Step 1 focuses on the problem of finding the quanti ty of each task

  16. Mobile Technology: The Foundation for an Engaged and Secure Campus Community

    ERIC Educational Resources Information Center

    Chapel, Edward

    2008-01-01

    Montclair State University, a public New Jersey institution with more than 17,000 students enrolled, has harnessed the cell phone and cellular broadband technology to foster a stronger sense of community and provide students with a safe, secure, and rich learning environment. This paper discusses the potential for new technologies to foster…

  17. A security framework for nationwide health information exchange based on telehealth strategy.

    PubMed

    Zaidan, B B; Haiqi, Ahmed; Zaidan, A A; Abdulnabi, Mohamed; Kiah, M L Mat; Muzamel, Hussaen

    2015-05-01

    This study focuses on the situation of health information exchange (HIE) in the context of a nationwide network. It aims to create a security framework that can be implemented to ensure the safe transmission of health information across the boundaries of care providers in Malaysia and other countries. First, a critique of the major elements of nationwide health information networks is presented from the perspective of security, along with such topics as the importance of HIE, issues, and main approaches. Second, a systematic evaluation is conducted on the security solutions that can be utilized in the proposed nationwide network. Finally, a secure framework for health information transmission is proposed within a central cloud-based model, which is compatible with the Malaysian telehealth strategy. The outcome of this analysis indicates that a complete security framework for a global structure of HIE is yet to be defined and implemented. Our proposed framework represents such an endeavor and suggests specific techniques to achieve this goal.

  18. Secure Embedded System Design Methodologies for Military Cryptographic Systems

    DTIC Science & Technology

    2016-03-31

    Fault- Tree Analysis (FTA); Built-In Self-Test (BIST) Introduction Secure access-control systems restrict operations to authorized users via methods...failures in the individual software/processor elements, the question of exactly how unlikely is difficult to answer. Fault- Tree Analysis (FTA) has a...Collins of Sandia National Laboratories for years of sharing his extensive knowledge of Fail-Safe Design Assurance and Fault- Tree Analysis

  19. The US Army and Future Security Force Assistance Operations

    DTIC Science & Technology

    2013-04-01

    havens. It addresses the recent evolution of SFA doctrine, guidance and authorities, and the role of interagency cooperation related to the future...safe havens. It addresses the recent evolution of SFA doctrine, guidance and authorities, and the role of interagency cooperation related to the...organizations at all levels. 5 SFA extends well beyond military-to-military training and conceptually addresses security as a system of

  20. One Health in food safety and security education: Subject matter outline for a curricular framework.

    PubMed

    Angelos, John A; Arens, Amanda L; Johnson, Heather A; Cadriel, Jessica L; Osburn, Bennie I

    2017-06-01

    Educating students in the range of subjects encompassing food safety and security as approached from a One Health perspective requires consideration of a variety of different disciplines and the interrelationships among disciplines. The Western Institute for Food Safety and Security developed a subject matter outline to accompany a previously published One Health in food safety and security curricular framework. The subject matter covered in this outline encompasses a variety of topics and disciplines related to food safety and security including effects of food production on the environment. This subject matter outline should help guide curriculum development and education in One Health in food safety and security and provides useful information for educators, researchers, students, and public policy-makers facing the inherent challenges of maintaining and/or developing safe and secure food supplies without destroying Earth's natural resources.

  1. Power Product Equipment Technician: Outboard-Engine Boat Systems. Teacher Edition [and] Student Edition.

    ERIC Educational Resources Information Center

    Hilley, Robert

    This curriculum guide contains teacher and student materials for a course on outboard-engine boat systems for power product equipment technician occupations. The course contains the following three units of instruction: (1) Orientation to Outboard-Engine Boat Systems and Rigging; (2) Trailers and Safe Towing and Boat Operation; and (3) Seasonal…

  2. 49 CFR 393.50 - Reservoirs required.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... NECESSARY FOR SAFE OPERATION Brakes § 393.50 Reservoirs required. (a) Reservoir capacity for air-braked... 49 Transportation 5 2011-10-01 2011-10-01 false Reservoirs required. 393.50 Section 393.50... trailers manufactured on or after January 1, 1975, must meet the reservoir requirements of FMVSS No. 121...

  3. 49 CFR 393.50 - Reservoirs required.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... NECESSARY FOR SAFE OPERATION Brakes § 393.50 Reservoirs required. (a) Reservoir capacity for air-braked... 49 Transportation 5 2010-10-01 2010-10-01 false Reservoirs required. 393.50 Section 393.50... trailers manufactured on or after January 1, 1975, must meet the reservoir requirements of FMVSS No. 121...

  4. Safe sex self-efficacy and safe sex practice in a Southern United States College

    PubMed Central

    Addoh, Ovuokerie; Sng, Eveleen; Loprinzi, Paul D.

    2017-01-01

    Background: The purpose of this study was to assess the association between safe sex self-efficacy and safe-sex practice in a Southern college setting. Methods: Multivariable logistic regression models were used to examine the association between safe sex self-efficacy in four domains (mechanics, partner disapproval, assertiveness, intoxicants) and safe sex practice (outcome variable). Results: For every 1-unit increase in the composite condom use self-efficacy score, there was an 8% increase in the odds of being beyond the median safe-sex practice score (odds ration [OR]: 1.08, 95% CI: 1.02-1.15). Additionally, for every 1-unit increase in intoxicants self-efficacy score, there was a 31% increase in the odds of being beyond the median safe-sex practice score (OR: 1.31, 95% CI: 1.08-1.58). Conclusion: A greater degree of safe-sex self-efficacy is associated with increased odds of safe-sex practice. These findings are informative for the development of targeted approaches to foster safe-sex behavior in Southern US colleges. PMID:28326287

  5. DroidSafe

    DTIC Science & Technology

    2016-12-01

    branches of our work . 3.1 Understanding Sensitive API Call and API Information Usage Android applications are written in a type- safe language (Java...directly invoke resolved targets. Because DroidSafe works with a comprehensive model of the Android environment , it supports precise resolution of...STATEMENT. FOR THE CHIEF ENGINEER: / S / / S / MARK K. WILLIAMS WARREN H. DEBANY, JR. Work Unit Manager

  6. A Safe Ride to School; A Safe Ride Home.

    ERIC Educational Resources Information Center

    Illinois State Board of Education, Springfield.

    Text and illustrations are used to teach safe school bus riding practices. The guide begins with instructions to parents or guardians to set a good example of safe behavior, and to help children learn safety rules and be on time. Instructions to children concern obeying the bus driver, boarding the bus, riding the bus, crossing the road, and using…

  7. Remote secure observing for the Faulkes Telescopes

    NASA Astrophysics Data System (ADS)

    Smith, Robert J.; Steele, Iain A.; Marchant, Jonathan M.; Fraser, Stephen N.; Mucke-Herzberg, Dorothea

    2004-09-01

    Since the Faulkes Telescopes are to be used by a wide variety of audiences, both powerful engineering level and simple graphical interfaces exist giving complete remote and robotic control of the telescope over the internet. Security is extremely important to protect the health of both humans and equipment. Data integrity must also be carefully guarded for images being delivered directly into the classroom. The adopted network architecture is described along with the variety of security and intrusion detection software. We use a combination of SSL, proxies, IPSec, and both Linux iptables and Cisco IOS firewalls to ensure only authenticated and safe commands are sent to the telescopes. With an eye to a possible future global network of robotic telescopes, the system implemented is capable of scaling linearly to any moderate (of order ten) number of telescopes.

  8. Analysis on the University’s Network Security Level System in the Big Data Era

    NASA Astrophysics Data System (ADS)

    Li, Tianli

    2017-12-01

    The rapid development of science and technology, the continuous expansion of the scope of computer network applications, has gradually improved the social productive forces, has had a positive impact on the increase production efficiency and industrial scale of China's different industries. Combined with the actual application of computer network in the era of large data, we can see the existence of influencing factors such as network virus, hacker and other attack modes, threatening network security and posing a potential threat to the safe use of computer network in colleges and universities. In view of this unfavorable development situation, universities need to pay attention to the analysis of the situation of large data age, combined with the requirements of network security use, to build a reliable network space security system from the equipment, systems, data and other different levels. To avoid the security risks exist in the network. Based on this, this paper will analyze the hierarchical security system of cyberspace security in the era of large data.

  9. Use Medicines Safely

    MedlinePlus

    ... Medicines Safely Print This Topic En español Use Medicines Safely Browse Sections The Basics Overview Prescription Medicines ... Medicines 1 of 7 sections The Basics: Prescription Medicines There are different types of medicine. The 2 ...

  10. Airport Viz - a 3D Tool to Enhance Security Operations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Koch, Daniel B

    2006-01-01

    In the summer of 2000, the National Safe Skies Alliance (NSSA) awarded a project to the Applied Visualization Center (AVC) at the University of Tennessee, Knoxville (UTK) to develop a 3D computer tool to assist the Federal Aviation Administration security group, now the Transportation Security Administration (TSA), in evaluating new equipment and procedures to improve airport checkpoint security. A preliminary tool was demonstrated at the 2001 International Aviation Security Technology Symposium. Since then, the AVC went on to construct numerous detection equipment models as well as models of several airports. Airport Viz has been distributed by the NSSA to amore » number of airports around the country which are able to incorporate their own CAD models into the software due to its unique open architecture. It provides a checkpoint design and passenger flow simulation function, a layout design and simulation tool for checked baggage and cargo screening, and a means to assist in the vulnerability assessment of airport access points for pedestrians and vehicles.« less

  11. Picture Me Safe

    ERIC Educational Resources Information Center

    Irvin, Daniel W.

    1977-01-01

    The validity of well-written articles can be destroyed by poor illustration, especially when the pictures show unsafe practices. The responsibility lies with the author to provide clear printable pictures showing safe working environments and safe practices. (Editor)

  12. Reviews of the Comprehensive Nuclear-Test-Ban Treaty and U.S. security

    NASA Astrophysics Data System (ADS)

    Jeanloz, Raymond

    2017-11-01

    Reviews of the Comprehensive Nuclear-Test-Ban Treaty (CTBT) by the National Academy of Sciences concluded that the United States has the technical expertise and physical means to i) maintain a safe, secure and reliable nuclear-weapons stockpile without nuclear-explosion testing, and ii) effectively monitor global compliance once the Treaty enters into force. Moreover, the CTBT is judged to help constrain proliferation of nuclear-weapons technology, so it is considered favorable to U.S. security. Review of developments since the studies were published, in 2002 and 2012, show that the study conclusions remain valid and that technical capabilities are better than anticipated.

  13. Security architecture for HL/7 message interchange.

    PubMed

    Chen, T S; Liao, B S; Lin, M G; Gough, T G

    2001-01-01

    The promotion of quality medical treatment is very important to the healthcare providers as well as to patients. It requires that the medical resources of different hospitals be combined to ensure that medical information is shared and that resources are not wasted. A computer-based patient record is one of the best methods to accomplish the interchange of the patient's clinical data. In our system, the Health Level/Seven (HL/7) format is used for the interchange of the clinical data, as it has been supported by many healthcare providers and become a â standard'. The security of the interchange of clinical data is a serious issue for people using the Internet for data communication. Several international well-developed security algorithms, models and secure policies are adopted in the design of a security handler for an HL/7 architecture. The goal of our system is to combine our security system with the end-to-end communication systems constructed from the HL/7 format to establish a safe delivery channel. A suitable security interchange environment is implemented to address some shortcomings in clinical data interchange. located at the application layer of the ISO/OSI reference model. The medical message components, sub-components, and related types of message event are the primary goals of the HL/7 protocols. The patient management system, the doctor's system for recording his advice, examination and diagnosis as well as any financial management system are all covered by the HL/7 protocols. Healthcare providers and hospitals in Taiwan are very interested in developing the HL/7 protocols as a common standard for clinical data interchange.

  14. Los Alamos Shows Airport Security Technology at Work

    ScienceCinema

    Espy, Michelle; Schultz, Larry; Hunter, James

    2018-05-30

    Los Alamos scientists have advanced a Magnetic Resonance Imaging (MRI) technology that may provide a breakthrough for screening liquids at airport security. They've added low-power X-ray data to the mix, and as a result have unlocked a new detection technology. Funded in part by the Department of Homeland Security's Science and Technology Directorate, the new system is named MagRay. The goal is to quickly and accurately distinguish between liquids that visually appear identical. For example, what appears to be a bottle of white wine could potentially be nitromethane, a liquid that could be used to make an explosive. Both are clear liquids, one would be perfectly safe on a commercial aircraft, the other would be strictly prohibited. How to tell them apart quickly without error at an airport security area is the focus of Michelle Espy, Larry Schultz and their team. In this video, Espy and the MagRay team explain how the new technology works, how they've developed an easy operator interface, and what the next steps might be in transitioning this technology to the private sector.

  15. WIPP

    Science.gov Websites

    waste Semi Truck with trailer hauling two TRUPACT-II containers Safely disposed of more than 170,000 waste containers WIPP has been disposing of legacy transuranic (TRU) waste since 1999, cleaning up 22 once waste... [January 17, 2018] read more... Semi Truck hauling three TRUPACT-II containers THE WIPP

  16. Smart Push, Smart Pull, Sensor to Shooter in a Multi-Level Secure/Safe (MLS) Infrastructure

    DTIC Science & Technology

    2006-05-04

    policy violation with respect to: Security Safety Financial Posture Infrastructure The IATF identifies five levels: V1: Negligible effect V2: Minimal...MLS) Infrastructure Step 2: Determine Threat Levels Best practices also in the IATF Threats are ranked by assessing: Capability Resources Motivation...Risk Willingness The IATF identifies seven levels: T1: Inadvertent or accidental events Tripping over a power cord T2: Minimal resources – willing to

  17. Semantically Aware Foundation Environment (SAFE) for Clean-Slate Design of Resilient, Adaptive Secure Hosts (CRASH)

    DTIC Science & Technology

    2016-02-01

    system consists of a high-fidelity hardware simulation using field programmable gate arrays (FPGAs), with a set of runtime services (ConcreteWare...perimeter protection, patch, and pray” is not aligned with the threat. Programmers will not bail us out of this situation (by writing defect free code...hosted on a Field Programmable Gate Array (FPGA), with a set of runtime services (concreteware) running on the hardware. Secure applications can be

  18. Safe Schools/Safe Communities: A Directory of Resources for Pennsylvania.

    ERIC Educational Resources Information Center

    Pennsylvania State Dept. of Education, Harrisburg.

    This document contains a directory of resources available in Pennsylvania to help achieve the goal of safe schools. Following a copy of the Safe Schools Act of 1993, nine sections list agencies that provide services and products under the headings of: conflict resolution/mediation, gangs, suicide, crisis response, family violence, diversity,…

  19. Lessons Learned from Safe Kids/Safe Streets. Juvenile Justice Bulletin

    ERIC Educational Resources Information Center

    Cronin, Roberta; Gragg, Frances; Schultz, Dana; Eisen, Karla

    2006-01-01

    This bulletin reports results from an evaluation of six sites of the Safe Kids/Safe Streets (SK/SS) program, which applies a comprehensive, collaborative approach to the child maltreatment field. The bulletin provides insights into collaboration building, systems reform, service options, and other strategies. Among the findings were that the SK/SS…

  20. Comprehensive evaluation of ecological security in mining area based on PSR-ANP-GRAY.

    PubMed

    He, Gang; Yu, Baohua; Li, Shuzhou; Zhu, Yanna

    2017-09-06

    With the large exploitation of mineral resources, a series of problems have appeared in the ecological environment of the mining area. Therefore, evaluating the ecological security of mining area is of great significance to promote its healthy development. In this paper, the evaluation index system of ecological security in mining area was constructed from three dimensions of nature, society and economy, combined with Pressure-State-Response framework model. Then network analytic hierarchy process and GRAY relational analysis method were used to evaluate the ecological security of the region, and the weighted correlation degree of ecological security was calculated through the index data of a coal mine from 2012 to 2016 in China. The results show that the ecological security in the coal mine area is on the rise as a whole, though it alternatively rose and dropped from 2012 to 2016. Among them, the ecological security of the study mining area is at the general security level from 2012 to 2015, and at a relatively safe level in 2016. It shows that the ecological environment of the study mining area can basically meet the requirement of the survival and development of the enterprises.

  1. 76 FR 12719 - Safe Schools/Healthy Students Program; Office of Safe and Drug-Free Schools; Safe Schools/Healthy...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-08

    ... official version of this document is the document published in the Federal Register. Free Internet access... DEPARTMENT OF EDUCATION Safe Schools/Healthy Students Program; Office of Safe and Drug- Free... telecommunications device for the deaf (TDD), call the Federal Relay Service (FRS), toll free, at 1-800-877-8339...

  2. Safe syringe disposal is related to safe syringe access among HIV-positive injection drug users.

    PubMed

    Coffin, Phillip O; Latka, Mary H; Latkin, Carl; Wu, Yingfeng; Purcell, David W; Metsch, Lisa; Gomez, Cynthia; Gourevitch, Marc N

    2007-09-01

    We evaluated the effect of syringe acquisition on syringe disposal among HIV-positive injection drug users (IDUs) in Baltimore, New York City, and San Francisco (N = 680; mean age 42 years, 62% male, 59% African-American, 21% Hispanic, 12% White). Independent predictors of safe disposal were acquiring syringes through a safe source and ever visiting a syringe exchange program. Weaker predictors included living in San Francisco, living in the area longer, less frequent binge drinking, injecting with an HIV+ partner, peer norms supporting safe injection, and self-empowerment. Independent predictors of safe "handling"-both acquiring and disposing of syringes safely-also included being from New York and being older. HIV-positive IDUs who obtain syringes from a safe source are more likely to safely dispose; peer norms contribute to both acquisition and disposal. Interventions to improve disposal should include expanding sites of safe syringe acquisition while enhancing disposal messages, alternatives, and convenience.

  3. 12 CFR 34.203 - Appraisals for higher-priced mortgage loans.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ....203 Section 34.203 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY REAL... et seq.), and any implementing regulations, in effect at the time the appraiser signs the appraiser's... secured by a mobile home, boat, or trailer. (4) A transaction to finance the initial construction of a...

  4. Surveillance of ground vehicles for airport security

    NASA Astrophysics Data System (ADS)

    Blasch, Erik; Wang, Zhonghai; Shen, Dan; Ling, Haibin; Chen, Genshe

    2014-06-01

    Future surveillance systems will work in complex and cluttered environments which require systems engineering solutions for such applications such as airport ground surface management. In this paper, we highlight the use of a L1 video tracker for monitoring activities at an airport. We present methods of information fusion, entity detection, and activity analysis using airport videos for runway detection and airport terminal events. For coordinated airport security, automated ground surveillance enhances efficient and safe maneuvers for aircraft, unmanned air vehicles (UAVs) and unmanned ground vehicles (UGVs) operating within airport environments.

  5. AR.Drone: security threat analysis and exemplary attack to track persons

    NASA Astrophysics Data System (ADS)

    Samland, Fred; Fruth, Jana; Hildebrandt, Mario; Hoppe, Tobias; Dittmann, Jana

    2012-01-01

    In this article we illustrate an approach of a security threat analysis of the quadrocopter AR.Drone, a toy for augmented reality (AR) games. The technical properties of the drone can be misused for attacks, which may relate security and/or privacy aspects. Our aim is to sensitize for the possibility of misuses and the motivation for an implementation of improved security mechanisms of the quadrocopter. We focus primarily on obvious security vulnerabilities (e.g. communication over unencrypted WLAN, usage of UDP, live video streaming via unencrypted WLAN to the control device) of this quadrocopter. We could practically verify in three exemplary scenarios that this can be misused by unauthorized persons for several attacks: high-jacking of the drone, eavesdropping of the AR.Drones unprotected video streams, and the tracking of persons. Amongst other aspects, our current research focuses on the realization of the attack of tracking persons and objects with the drone. Besides the realization of attacks, we want to evaluate the potential of this particular drone for a "safe-landing" function, as well as potential security enhancements. Additionally, in future we plan to investigate an automatic tracking of persons or objects without the need of human interactions.

  6. Security Policies for Mitigating the Risk of Load Altering Attacks on Smart Grid Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ryutov, Tatyana; AlMajali, Anas; Neuman, Clifford

    2015-04-01

    While demand response programs implement energy efficiency and power quality objectives, they bring potential security threats to the Smart Grid. The ability to influence load in a system enables attackers to cause system failures and impacts the quality and integrity of power delivered to customers. This paper presents a security mechanism to monitor and control load according to a set of security policies during normal system operation. The mechanism monitors, detects, and responds to load altering attacks. We examined the security requirements of Smart Grid stakeholders and constructed a set of load control policies enforced by the mechanism. We implementedmore » a proof of concept prototype and tested it using the simulation environment. By enforcing the proposed policies in this prototype, the system is maintained in a safe state in the presence of load drop attacks.« less

  7. Climate Change and Global Food Security: Food Access, Utilization, and the US Food System

    NASA Astrophysics Data System (ADS)

    Brown, M. E.; Antle, J. M.; Backlund, P. W.; Carr, E. R.; Easterling, W. E.; Walsh, M.; Ammann, C. M.; Attavanich, W.; Barrett, C. B.; Bellemare, M. F.; Dancheck, V.; Funk, C.; Grace, K.; Ingram, J. S. I.; Jiang, H.; Maletta, H.; Mata, T.; Murray, A.; Ngugi, M.; Ojima, D. S.; O'Neill, B. C.; Tebaldi, C.

    2015-12-01

    This paper will summarize results from the USDA report entitled 'Climate change, Global Food Security and the U.S. Food system'. The report focuses on the impact of climate change on global food security, defined as "when all people at all times have physical, social, and economic access to sufficient, safe, and nutritious food to meet their dietary needs and food preferences for an active and healthy life". The assessment brought together authors and contributors from twenty federal, academic, nongovernmental, intergovernmental, and private organizations in four countries to identify climate change effects on food security through 2100, and analyze the U.S.'s likely connections with that world. This talk will describe how climate change will likely affect food access and food utilization, and summarize how the U.S. food system contributes to global food security, and will be affected by climate change.

  8. The Skipper's Course.

    ERIC Educational Resources Information Center

    Coast Guard, Washington, DC.

    This book is a self-instructional program for learning boating safety rules and practices. A "quick quiz" is presented at the end of each topic of information (usually every page), and a review concludes each of the major sections, which are: (1) Prelude to Boating--overview, classes of boats, safe boat trailering; (2) Safety Afloat--presailing…

  9. IT Security Support for the Spaceport Command Control System Development

    NASA Technical Reports Server (NTRS)

    Varise, Brian

    2014-01-01

    My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.

  10. Used fuel extended storage security and safeguards by design roadmap

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Durbin, Samuel G.; Lindgren, Eric Richard; Jones, Robert

    2016-05-01

    In the United States, spent nuclear fuel (SNF) is safely and securely stored in spent fuel pools and dry storage casks. The available capacity in spent fuel pools across the nuclear fleet has nearly reached a steady state value. The excess SNF continues to be loaded in dry storage casks. Fuel is expected to remain in dry storage for periods beyond the initial dry cask certification period of 20 years. Recent licensing renewals have approved an additional 40 years. This report identifies the current requirements and evaluation techniques associated with the safeguards and security of SNF dry cask storage. Amore » set of knowledge gaps is identified in the current approaches. Finally, this roadmap identifies known knowledge gaps and provides a research path to deliver the tools and models needed to close the gaps and allow the optimization of the security and safeguards approaches for an interim spent fuel facility over the lifetime of the storage site.« less

  11. Handling small arbovirus vectors safely during biosafety level 3 containment: Culicoides variipennis sonorensis (Diptera:Ceratopogonidae) and exotic bluetongue viruses.

    PubMed

    Hunt, G J; Tabachnick, W J

    1996-05-01

    Equipment and procedures are described for biosafety level 3 (BL-3) containment work with small, zoophilic arthropods. BL-3 classified pathogens always must be manipulated in biological safety cabinets. Procedures, including physical barriers and handling methods, that prevent the escape of potentially virus-infected insects are discussed, and the use of a monitoring system for insect security is explained. The inability to recover escaped minute, flying insects poses a major difference from similar work with larger insects, such as mosquitoes. Methods were developed for the safe and secure handling of Culicoides variipennis sonorensis Wirth & Jones infected with exotic bluetongue viruses during BL-3 containment.

  12. Breaching the security of the Kaiser Permanente Internet patient portal: the organizational foundations of information security.

    PubMed

    Collmann, Jeff; Cooper, Ted

    2007-01-01

    This case study describes and analyzes a breach of the confidentiality and integrity of personally identified health information (e.g. appointment details, answers to patients' questions, medical advice) for over 800 Kaiser Permanente (KP) members through KP Online, a web-enabled health care portal. The authors obtained and analyzed multiple types of qualitative data about this incident including interviews with KP staff, incident reports, root cause analyses, and media reports. Reasons at multiple levels account for the breach, including the architecture of the information system, the motivations of individual staff members, and differences among the subcultures of individual groups within as well as technical and social relations across the Kaiser IT program. None of these reasons could be classified, strictly speaking, as "security violations." This case study, thus, suggests that, to protect sensitive patient information, health care organizations should build safe organizational contexts for complex health information systems in addition to complying with good information security practice and regulations such as the Health Insurance Portability and Accountability Act (HIPAA) of 1996.

  13. Review of evaluations of educational approaches to promote safe storage of firearms

    PubMed Central

    McGee, K; Coyne-Beasley, T; Johnson, R

    2003-01-01

    Objective: To systematically review evaluation studies of educational interventions promoting safe firearm storage. Methods: Medline, ERIC, PsycINFO, Criminal Justice Periodicals Index, Cumulative Index of Nursing and Allied Health Literature, and Sociofile were searched. The references from each potentially eligible study were checked, and experts in the field were contacted for additional reports. In addition, an internet search was performed to identify programs not published in the conventional literature. Sources relevant to safe firearm storage promotion were selected and evaluated. Results: Seven studies met inclusion criteria: adult subjects, program description was included, and firearm storage outcomes were measured. One was a randomized controlled trial and the other six were one group pre-test and/or post-test. The studies were classified into the following categories based on the intervention strategies used: (1) counseling and firearm safety materials (n=3); (2) counseling/educational message (n=3); and (3) firearm safety materials distribution (n=1).The outcomes were safe firearms storage (firearms locked up and unloaded or removal from home) after intervention. Four studies, three using counseling and materials distribution, reported improved storage after the interventions. Conclusions: It is not yet clear what types of interventions, or which specific intervention components, prompt gun owners to securely store their weapons. Increased understanding of gun storage behaviors and stronger evaluation designs will aid further understanding of this important issue. PMID:12810734

  14. Tiedown Bracket

    NASA Technical Reports Server (NTRS)

    Mashburn, D.; Wald, J. E.; Helmsin, F. K.

    1982-01-01

    Tiedown bracket secured to concrete slab with lag anchor and lag bolt. A trailer or other heavy equipment can be anchored by tethering it to strapping bolt. When bracket is no longer needed, it can be removed, leaving behind only lag anchor. Bracket is easily installed and removed without damage to concrete slab.

  15. Being in a safe and thus secure place, the core of early labour: A secondary analysis in a Swedish context

    PubMed Central

    Carlsson, Ing-Marie

    2016-01-01

    Background Early labour is the very first phase of the labour process and is considered to be a period of time when no professional attendance is needed. However there is a high frequency of women who seek care at the delivery wards during this phase. When a woman is admitted to the delivery ward, one role for midwives is to determine whether the woman is in established labour or not. If the woman is assessed as being in early labour she will probably then be advised to return home. This recommendation is made due to past research that found that the longer a woman is in hospital the higher the risk for complications for her and her child. Women have described how this situation leaves them in a vulnerable situation where their preferences are not always met and where they are not always included in the decision-making process. Aim The aim of this study was to generate a theory based on where a woman chooses to be during the early labour process and to increase our understanding about how experiences can differ from place to place. Methods The method was a secondary analysis with grounded theory. The data used in the analysis was from two qualitative interview studies and 37 transcripts. Conclusion The findings revealed a substantive theory that women needed to be in a safe and thus secure place during early labour. This theory also describes the interplay between how women ascribed their meaning of childbirth as either a natural live event or a medical one, how this influenced where they wanted to be during early labour, and how that chosen place influenced their experiences of labour and birth. PMID:27172510

  16. Safe Manual Jettison

    NASA Technical Reports Server (NTRS)

    Barton, Jay

    2008-01-01

    In space, the controlled release of certain cargoes is no less useful than the maritime jettisons from which they take their name but is also much more dangerous. Experience has shown that jettisons can be performed safely, but the process is complicated with the path to performing a jettison taking months or even years. In the background, time is also required to write procedures, train the crew, configure the vehicle, and many other activities. This paper outlines the current process used by the National Aeronautics and Space Administration (NASA) for manual jettisons, detailing the methods used to assure that the jettisons and the jettisoned objects are as safe as achievable and that the crew is adequately trained to be able to affect the safe jettison. The goal of this paper is not only to capture what it takes to perform safe jettisons in the near Earth environment but to extrapolate this knowledge to future space exploration scenarios that will likely have Extravehicular Activity (EVA) and International Partner (IP) interfaces.

  17. Going Beyond Compliance: A Strategic Framework for Promoting Information Security in Hospitals.

    PubMed

    Zandona, David J; Thompson, Jon M

    In the past decade, public and private organizations have experienced a significant and alarming rise in the number of data breaches. Across all sectors, there seems to be no safe haven for the protection of information. In the health care industry, the trend is even worse. Information security is at an unbelievable low point, and it is unlikely that government oversight can fix this issue. Health care organizations have ramped up their approaches to addressing the problem; however, these initiatives are often incremental rather than transformational. Hospitals need an overall organization-wide strategy to prevent breaches from occurring and to minimize effects if they do occur. This article provides an analysis of the literature related to health information security and offers a suggested strategy for hospital administrators to follow in order to create a more secure environment for patient health information.

  18. A multi-institutional mobility model for regional deployment of Telesynergy telemedicine systems

    PubMed Central

    Schenken, Larry L; Heron, Dwight E; Saw, Cheng B; Proctor, Julian W

    2010-01-01

    Summary The Telesynergy workstation is a remote medical consultation system that provides medical staff with the means to collaborate with one another on cancer research and treatment. There are about 25 systems in use around the world. In order to share the equipment with five community hospital partners in Western Pennsylvania, we designed and implemented a transport system for the workstation. Small groups can be accommodated within the trailer and larger groups can participate inside a building when the system is offloaded at a suitable site. We designed special transport cases for the main components and chose a trailer suitable to move them by road. The transport cases were secured by inexpensive, ratchet style tiedown devices made of woven nylon webbing with steel end hooks. Calculations suggest that these restraints are sufficient to protect the equipment in a 48 km/h vehicle collision. During the first 12 months, we moved the trailer more than 700 km without system damage. Mobile videoconferencing seems to be successful on both environmental and cost grounds. PMID:19948703

  19. Prediction of safe driving Behaviours based on health belief model: the case of taxi drivers in Bandar Abbas, Iran.

    PubMed

    Razmara, Asghar; Aghamolaei, Teamur; Madani, Abdoulhossain; Hosseini, Zahra; Zare, Shahram

    2018-03-20

    Road accidents are among the main causes of mortality. As safe and secure driving is a key strategy to reduce car injuries and offenses, the present research aimed to explore safe driving behaviours among taxi drivers based on the Health Belief Model (HBM). This study was conducted on 184 taxi drivers in Bandar Abbas who were selected based on a multiple stratified sampling method. Data were collected by a questionnaire comprised of a demographic information section along with the constructs of the HBM. Data were analysed by SPSS ver19 via a Pearson's correlation coefficient and multiple regressions. The mean age of the participants was 45.1 years (SD = 11.1). They all had, on average, 10.3 (SD = 7/5) years of taxi driving experience. Among the HBM components, cues to action and perceived benefits were shown to be positively correlated with safe driving behaviours, while perceived barriers were negatively correlated. Cues to action, perceived barriers and perceived benefits were shown to be the strongest predictors of a safe drivers' behaviour. Based on the results of this study in designing health promotion programmes to improve safe driving behaviours among taxi drivers, cues to action, perceived benefits and perceived barriers are important. Therefore, advertising, the design of information campaigns, emphasis on the benefits of safe driving behaviours and modification barriers are recommended.

  20. Perceptions of health care professionals on the safety and security at Odi District Hospital, Gauteng, South Africa

    PubMed Central

    Okeke, Sunday O.

    2017-01-01

    Background For optimum delivery of service, an establishment needs to ensure a safe and secure environment. In 2011, the South African government promulgated the National Core Standards for Health Establishments for safety and security for all employees in all establishments. Little is known about whether these standards are being complied to. Aim and setting: To assess the perceptions of health care professionals (HCPs) on safety and security at Odi District Hospital. Methodology A sample of 181 out of a total of 341 HCPs was drawn through a systematic sampling method from each HCP category. Data were collected through a self-administered questionnaire. The SPSS® statistical software version 22 was used for data analysis. The level of statistical significance was set at < 0.05. Results There were more female respondents than male respondents (136; 75.10%). The dominant age group was 28–47 years (114; 57.46%). Perceptions on security personnel, their efficiency and the security system were significantly affirmed (p = 0.0001). The hospital infrastructure, surroundings and plan in emergencies were perceived to be safe (p < 0.0001). The hospital lighting system was perceived as inadequate (p = 0.0041). Only 36 (20.2%) HCPs perceived that hospital authorities were concerned about employees’ safety (p < 0.0001). Conclusion HCPs had positive perceptions regarding the hospital’s security system. Except for the negative perceptions of the lighting system and the perceived lack of hospital authorities’ concern for staff safety, perceptions of the HCPs on the hospital working environment were positive. The hospital authorities need to establish the basis of negative perceptions and enforce remedial measures to redress them. PMID:29113444

  1. Los Alamos Shows Airport Security Technology at Work

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Espy, Michelle; Schultz, Larry; Hunter, James

    Los Alamos scientists have advanced a Magnetic Resonance Imaging (MRI) technology that may provide a breakthrough for screening liquids at airport security. They've added low-power X-ray data to the mix, and as a result have unlocked a new detection technology. Funded in part by the Department of Homeland Security's Science and Technology Directorate, the new system is named MagRay. The goal is to quickly and accurately distinguish between liquids that visually appear identical. For example, what appears to be a bottle of white wine could potentially be nitromethane, a liquid that could be used to make an explosive. Both aremore » clear liquids, one would be perfectly safe on a commercial aircraft, the other would be strictly prohibited. How to tell them apart quickly without error at an airport security area is the focus of Michelle Espy, Larry Schultz and their team. In this video, Espy and the MagRay team explain how the new technology works, how they've developed an easy operator interface, and what the next steps might be in transitioning this technology to the private sector.« less

  2. Evaluation and Analysis of Eco-Security in Environmentally Sensitive Areas Using an Emergy Ecological Footprint.

    PubMed

    Chen, Han-Shen

    2017-01-30

    In this paper, the overall ecological and environmental sustainability in the Cing-Jing region in Taiwan is examined. As land use and cover change has been found to be an important analysis method, an emergy ecological footprint model was applied and the eco-security assessed to ensure authorities maintain a balance between ecological preservation and tourism development. While the ecological environment in the Cing-Jing region from 2008 to 2014 was found to be within safe levels, all related indices had increased considerably. A Grey model was used to predict the 2015-2024 ecological carrying capacities, from which it was found that there is expected to be a large increase in per capita ecological footprints (EFs), meaning that in the future there is going to be a larger ecological deficit and a higher ecological pressure index (EFI), with the eco-security predicted to reach a Grade 2 intermediate level in 2022. As the Cing-Jing region is predicted to become ecologically unsustainable, local, regional, and national governments need to implement regulations to strictly control the land use in the Cing-Jing region. This study demonstrated that emergy EF (EEF) theory application can give objective guidance to decision-makers to ensure that recreational non-urban eco-security can be maintained at a safe level.

  3. European Security in the Balkans: The Case of Macedonia

    DTIC Science & Technology

    2013-03-01

    for the Republic of Macedonia; it is the problem of the European Union as well, due to the historical fact that the European Great Powers had...integration of Bulgaria and Romania in the European Union was based on the short term political interests of the EU - to create a safe ring toward... Union in the Security of Europe: From Cold War to Terror War, 117. 28 Nicola Guy, The Birth of Albania, “Ethnic Nationalism, the Great Powers of World

  4. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: A privacy-protecting remote access system for health-related research and evaluation☆

    PubMed Central

    Jones, Kerina H.; Ford, David V.; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J.; Heaven, Martin L.; Thayer, Daniel S.; McNerney, Cynthia L.; Lyons, Ronan A.

    2014-01-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. PMID:24440148

  5. Leveraging the laboratory response network model for the global health security agenda.

    PubMed

    Mangal, Chris N; Maryogo-Robinson, Lucy

    2014-01-01

    Promoting global health security as an international priority is a challenge; the US Centers for Disease Control and Prevention (CDC) in its Global Health Security Agenda has articulated the importance of accelerating progress toward a world safe and secure from infectious disease threats. The goals are to (1) prevent and reduce the likelihood of outbreaks-natural, accidental, or intentional; (2) detect threats early to save lives; and (3) respond rapidly and effectively using multisectoral, international coordination and communication. Foundational to this agenda is the World Health Organization (WHO) Revised International Health Regulations (IHR) of 2005, which provide the legal framework for countries to strengthen their health systems in order to be able to respond to any public health emergency of international concern. This article proposes leveraging the distributed structure of the US-managed Laboratory Response Network for Biological Threats Preparedness (LRN-B) to develop the core capacity of laboratory testing and to fulfill the laboratory-strengthening component of the Global Health Security Agenda. The LRN model offers an effective mechanism to detect and respond to public health emergencies of international concern.

  6. Leveraging the Laboratory Response Network Model for the Global Health Security Agenda

    PubMed Central

    Maryogo-Robinson, Lucy

    2014-01-01

    Promoting global health security as an international priority is a challenge; the US Centers for Disease Control and Prevention (CDC) in its Global Health Security Agenda has articulated the importance of accelerating progress toward a world safe and secure from infectious disease threats. The goals are to (1) prevent and reduce the likelihood of outbreaks—natural, accidental, or intentional; (2) detect threats early to save lives; and (3) respond rapidly and effectively using multisectoral, international coordination and communication. Foundational to this agenda is the World Health Organization (WHO) Revised International Health Regulations (IHR) of 2005, which provide the legal framework for countries to strengthen their health systems in order to be able to respond to any public health emergency of international concern. This article proposes leveraging the distributed structure of the US-managed Laboratory Response Network for Biological Threats Preparedness (LRN-B) to develop the core capacity of laboratory testing and to fulfill the laboratory-strengthening component of the Global Health Security Agenda. The LRN model offers an effective mechanism to detect and respond to public health emergencies of international concern. PMID:25254916

  7. Buying & Using Medicine Safely

    MedlinePlus

    ... Generic Drugs - Patient Education Resources Patient and Prescriber materials: Videos, PSAs, factsheets and more. Spotlight Drugs@FDA Index to Drug-Specific Information Protecting Yourself Safe Disposal of Medicines Generic Medicines – safe, effective and ...

  8. 75 FR 23212 - Security Zone; U.S. Coast Guard BSU Seattle, Pier 36, Seattle, WA

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-03

    ... FR 3316). Public Meeting We do not now plan to hold a public meeting. But you may submit a request... reason: Vessel traffic can pass safely around the security zone. If you think that your business... do not individually or cumulatively have a significant effect on the human environment. A preliminary...

  9. openPDS: protecting the privacy of metadata through SafeAnswers.

    PubMed

    de Montjoye, Yves-Alexandre; Shmueli, Erez; Wang, Samuel S; Pentland, Alex Sandy

    2014-01-01

    The rise of smartphones and web services made possible the large-scale collection of personal metadata. Information about individuals' location, phone call logs, or web-searches, is collected and used intensively by organizations and big data researchers. Metadata has however yet to realize its full potential. Privacy and legal concerns, as well as the lack of technical solutions for personal metadata management is preventing metadata from being shared and reconciled under the control of the individual. This lack of access and control is furthermore fueling growing concerns, as it prevents individuals from understanding and managing the risks associated with the collection and use of their data. Our contribution is two-fold: (1) we describe openPDS, a personal metadata management framework that allows individuals to collect, store, and give fine-grained access to their metadata to third parties. It has been implemented in two field studies; (2) we introduce and analyze SafeAnswers, a new and practical way of protecting the privacy of metadata at an individual level. SafeAnswers turns a hard anonymization problem into a more tractable security one. It allows services to ask questions whose answers are calculated against the metadata instead of trying to anonymize individuals' metadata. The dimensionality of the data shared with the services is reduced from high-dimensional metadata to low-dimensional answers that are less likely to be re-identifiable and to contain sensitive information. These answers can then be directly shared individually or in aggregate. openPDS and SafeAnswers provide a new way of dynamically protecting personal metadata, thereby supporting the creation of smart data-driven services and data science research.

  10. openPDS: Protecting the Privacy of Metadata through SafeAnswers

    PubMed Central

    de Montjoye, Yves-Alexandre; Shmueli, Erez; Wang, Samuel S.; Pentland, Alex Sandy

    2014-01-01

    The rise of smartphones and web services made possible the large-scale collection of personal metadata. Information about individuals' location, phone call logs, or web-searches, is collected and used intensively by organizations and big data researchers. Metadata has however yet to realize its full potential. Privacy and legal concerns, as well as the lack of technical solutions for personal metadata management is preventing metadata from being shared and reconciled under the control of the individual. This lack of access and control is furthermore fueling growing concerns, as it prevents individuals from understanding and managing the risks associated with the collection and use of their data. Our contribution is two-fold: (1) we describe openPDS, a personal metadata management framework that allows individuals to collect, store, and give fine-grained access to their metadata to third parties. It has been implemented in two field studies; (2) we introduce and analyze SafeAnswers, a new and practical way of protecting the privacy of metadata at an individual level. SafeAnswers turns a hard anonymization problem into a more tractable security one. It allows services to ask questions whose answers are calculated against the metadata instead of trying to anonymize individuals' metadata. The dimensionality of the data shared with the services is reduced from high-dimensional metadata to low-dimensional answers that are less likely to be re-identifiable and to contain sensitive information. These answers can then be directly shared individually or in aggregate. openPDS and SafeAnswers provide a new way of dynamically protecting personal metadata, thereby supporting the creation of smart data-driven services and data science research. PMID:25007320

  11. Security Systems Consideration: A Total Security Approach

    NASA Astrophysics Data System (ADS)

    Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.

    2007-12-01

    The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.

  12. CLARUS as a Cloud Security Framework: e-Health Use Case.

    PubMed

    Vidal, David; Iriso, Santiago; Mulero, Rafael

    2017-01-01

    Maintaining Passive Medical Health Records (PMHR) is an increasing cost and resource consumption problem. Moving to the cloud is the clearest solution to solve the problem as it offers a high amount of space and computation power. But the cloud is not safe enough when dealing with this kind of information because it can be easily accessed by attackers. The European Commission funded research project CLARUS contributes to protect healthcare-sensitive information in a secure way.

  13. An ethics safe harbor for international genomics research?

    PubMed Central

    2013-01-01

    Background Genomics research is becoming increasingly globally connected and collaborative, contesting traditional ethical and legal boundaries between global and local research practice. As well, global data-driven genomics research holds great promise for health discoveries. Yet, paradoxically, current research ethics review systems around the world challenge potential improvements in human health from such research and thus undermine respect for research participants. Case reports illustrate that the current system is costly, fragmented, inefficient, inadequate, and inconsistent. There is an urgent need to improve the governance system of ethics review to enable secure and seamless genomic and clinical data sharing across jurisdictions. Discussion Building on the international privacy 'safe harbor’ model that was developed following the adoption of the European Privacy Directive, we propose an international infrastructure. The goal is to create a streamlined and harmonized ethics governance system for international, data-driven genomics research projects. The proposed 'Safe Harbor Framework for International Ethics Equivalency’ would consist in part of an agency supporting an International Federation for Ethics Review (IFER), formed by a voluntary agreement among countries, granting agencies, philanthropies, institutions, and healthcare, patient advocacy, and research organizations. IFER would be both a central ethics review body and also a forum for review and follow-up of policies concerning ethics norms for international genomics research projects. It would be built on five principle elements: (1) registration; (2) compliance review; (3) recognition; (4) monitoring and enforcement; and (5) public participation. Summary A Safe Harbor Framework for International Ethics Equivalency would create many benefits for researchers, countries, and the general public, and may eventually have application beyond genomics to other areas of biomedical research that

  14. An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1.

    PubMed

    Kiah, M L Mat; Nabi, Mohamed S; Zaidan, B B; Zaidan, A A

    2013-10-01

    This study aims to provide security solutions for implementing electronic medical records (EMRs). E-Health organizations could utilize the proposed method and implement recommended solutions in medical/health systems. Majority of the required security features of EMRs were noted. The methods used were tested against each of these security features. In implementing the system, the combination that satisfied all of the security features of EMRs was selected. Secure implementation and management of EMRs facilitate the safeguarding of the confidentiality, integrity, and availability of e-health organization systems. Health practitioners, patients, and visitors can use the information system facilities safely and with confidence anytime and anywhere. After critically reviewing security and data transmission methods, a new hybrid method was proposed to be implemented on EMR systems. This method will enhance the robustness, security, and integration of EMR systems. The hybrid of simple object access protocol/extensible markup language (XML) with advanced encryption standard and secure hash algorithm version 1 has achieved the security requirements of an EMR system with the capability of integrating with other systems through the design of XML messages.

  15. Cultivating the Art of Safe Space

    ERIC Educational Resources Information Center

    Hunter, Mary Ann

    2008-01-01

    Performance-making and peace-building are processes predicated on the production of safe space. But what is "safe space"? In performance-making, what is it that makes space safe without losing the creative potential of tension? What role is there for risk? And, once achieved, how does safe space become meaningful beyond its immediate…

  16. Safe Affordable Fission Engine-(SAFE-) 100a Heat Exchanger Thermal and Structural Analysis

    NASA Technical Reports Server (NTRS)

    Steeve, B. E.

    2005-01-01

    A potential fission power system for in-space missions is a heat pipe-cooled reactor coupled to a Brayton cycle. In this system, a heat exchanger (HX) transfers the heat of the reactor core to the Brayton gas. The Safe Affordable Fission Engine- (SAFE-) 100a is a test program designed to thermally and hydraulically simulate a 95 Btu/s prototypic heat pipe-cooled reactor using electrical resistance heaters on the ground. This Technical Memorandum documents the thermal and structural assessment of the HX used in the SAFE-100a program.

  17. Nutrition and food security policy in the Islamic Republic of Iran: situation analysis and roadmap towards 2021.

    PubMed

    Damari, Behzad; Abdollahi, Zahra; Hajifaraji, Majid; Rezazadeh, Arezoo

    2018-05-03

    All government policies and programmes for food and nutrition security should include providing healthy food, as well as providing economic and social availability for all people. This study aimed to analyse the current situation of Iranian food and nutrition security and establish a road map towards 2021. The applied methods were situation analysis and a mixed qualitative-quantitative method. The conceptual method used for developing this national document encompassed three areas: sustainable food supply, food safety and nutrition. The outcomes of the Iranian food and nutrition security system in the past three decades include development of management infrastructure and improvement in food and nutrition security status. However, analysis of current programmes showed that there were some overlapping, intertwining and parallel works in the responsibilities of related organizations in the field of supervision of food safety (from production to supply). The national document produced as the outcome of this paper was communicated by the Iranian Ministry of Health in 2012 and has been running for 2 years. Selected ministries are responsible for implementation of 20 national programmes by the end of the 5th Economic, Social and Cultural Development Programme (2016-2011). The consensus of stakeholders by the end of the 6th Development Programme (2021) is to put all of the provinces in a safe or very safe situation in terms of food and nutrition security. The most important challenge in establishing national documents is to make them operational. This aim was achieved by an intersectoral nutrition and food security working group, which produced a general memorandum of understanding with the main organizations, the media, universities and private sector. Copyright © World Health Organization (WHO) 2018. Some rights reserved. This work is available under the CC BY-NC-SA 3.0 IGO license (https://creativecommons.org/licenses/by-nc-sa/3.0/igo).

  18. Changes in Suicide Methods in Quebec between 1987 and 2000: The Possible Impact of Bill C-17 Requiring Safe Storage of Firearms

    ERIC Educational Resources Information Center

    Caron, Jean; Julien, Marie; Huang, Jean Hua

    2008-01-01

    This study presents the changes in the overall and firearm suicide rates for Quebec (Canada) before and after Bill C-17, which was implemented to secure safe storage of firearms. It covers 20,009 suicide cases reported to the coroner's office. Interrupted time series analysis is used to compare suicide rates in the two periods. Firearm suicide…

  19. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: a privacy-protecting remote access system for health-related research and evaluation.

    PubMed

    Jones, Kerina H; Ford, David V; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J; Heaven, Martin L; Thayer, Daniel S; McNerney, Cynthia L; Lyons, Ronan A

    2014-08-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. Copyright © 2014 The Aurthors. Published by Elsevier Inc. All rights reserved.

  20. Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions

    PubMed Central

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied. PMID:23762851

  1. Secure method for biometric-based recognition with integrated cryptographic functions.

    PubMed

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.

  2. Breastfeeding FAQs: Safely Storing Breast Milk

    MedlinePlus

    ... Staying Safe Videos for Educators Search English Español Breastfeeding FAQs: Safely Storing Breast Milk KidsHealth / For Parents / Breastfeeding FAQs: Safely Storing Breast Milk What's in this ...

  3. Data Safe Havens in health research and healthcare.

    PubMed

    Burton, Paul R; Murtagh, Madeleine J; Boyd, Andy; Williams, James B; Dove, Edward S; Wallace, Susan E; Tassé, Anne-Marie; Little, Julian; Chisholm, Rex L; Gaye, Amadou; Hveem, Kristian; Brookes, Anthony J; Goodwin, Pat; Fistein, Jon; Bobrow, Martin; Knoppers, Bartha M

    2015-10-15

    The data that put the 'evidence' into 'evidence-based medicine' are central to developments in public health, primary and hospital care. A fundamental challenge is to site such data in repositories that can easily be accessed under appropriate technical and governance controls which are effectively audited and are viewed as trustworthy by diverse stakeholders. This demands socio-technical solutions that may easily become enmeshed in protracted debate and controversy as they encounter the norms, values, expectations and concerns of diverse stakeholders. In this context, the development of what are called 'Data Safe Havens' has been crucial. Unfortunately, the origins and evolution of the term have led to a range of different definitions being assumed by different groups. There is, however, an intuitively meaningful interpretation that is often assumed by those who have not previously encountered the term: a repository in which useful but potentially sensitive data may be kept securely under governance and informatics systems that are fit-for-purpose and appropriately tailored to the nature of the data being maintained, and may be accessed and utilized by legitimate users undertaking work and research contributing to biomedicine, health and/or to ongoing development of healthcare systems. This review explores a fundamental question: 'what are the specific criteria that ought reasonably to be met by a data repository if it is to be seen as consistent with this interpretation and viewed as worthy of being accorded the status of 'Data Safe Haven' by key stakeholders'? We propose 12 such criteria. paul.burton@bristol.ac.uk. © The Author 2015. Published by Oxford University Press.

  4. Smart security system for Indian rail wagons using IOT

    NASA Astrophysics Data System (ADS)

    Bhanuteja, S.; Shilpi, S.; Pragna, K.; Arun, M.

    2017-11-01

    The objective of this project is to create a Security System for the goods that are carried in open top freight trains. The most efficient way to secure anything from thieves is to have a continuous observation. So for continuous observation of the open top freight train, Camera module2 has been used. Passive Infrared Sensor (PIR) 1 has been used to detect the motion or to sense movement of people, animals, or any object. So whenever a motion is detected by the PIR sensor, the Camera takes a picture of that particular instance. That picture will be send to the Raspberry PI which does Skin Detection Algorithm and specifies whether that motion was created by a human or not. If a human makes it, then that picture will send to the drop box. Any Official can have a look at the same. The existing system has a CCTV installed at various critical locations like bridges, railway stations etc. but they does not provide a continuous observation. This paper describes about the Security System that provides continuous observation for open top freight trains so that goods can be carried safely to its destination.

  5. FOILFEST :community enabled security.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how themore » public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs

  6. Why Do Some First Nations Communities Have Safe Water and Others Not? Socioeconomic Determinants of Drinking Water Risk

    PubMed Central

    Brown, Brandon; Wachowiak-Smolíková, Renata; Spence, Nicholas D.; Wachowiak, Mark P.; Walters, Dan F.

    2016-01-01

    Securing safe and adequate drinking water is an ongoing issue for many Canadian First Nations communities despite nearly 15 years of reports, studies, policy changes, financial commitments, and regulations. The federal drinking water evaluation scheme is narrowly scoped, ignoring community level social factors, which may play a role in access to safe water in First Nations. This research used the 2006 Aboriginal Affairs and Northern Development Canada First Nations Drinking Water System Risk Survey data and the Community Well-Being Index, including labour force, education, housing, and income, from the 2006 Census. Bivariate analysis was conducted using the Spearman’s correlation, Kendall’s tau correlation, and Pearson’s correlation. Multivariable analysis was conducted using an ordinal (proportional or cumulative odds) regression model. Results showed that the regression model was significant. Community socioeconomic indicators had no relationship with drinking water risk characterization in both the bivariate and multivariable models, with the sole exception of labour force, which had a significantly positive effect on drinking water risk rankings. Socioeconomic factors were not important in explaining access to safe drinking water in First Nations communities. Improvements in the quality of safe water data as well as an examination of other community processes are required to address this pressing policy issue. PMID:27157172

  7. Why Do Some First Nations Communities Have Safe Water and Others Not? Socioeconomic Determinants of Drinking Water Risk.

    PubMed

    Brown, Brandon; Wachowiak-Smolíková, Renata; Spence, Nicholas D; Wachowiak, Mark P; Walters, Dan F

    2016-09-01

    Securing safe and adequate drinking water is an ongoing issue for many Canadian First Nations communities despite nearly 15 years of reports, studies, policy changes, financial commitments, and regulations. The federal drinking water evaluation scheme is narrowly scoped, ignoring community level social factors, which may play a role in access to safe water in First Nations. This research used the 2006 Aboriginal Affairs and Northern Development Canada First Nations Drinking Water System Risk Survey data and the Community Well-Being Index, including labour force, education, housing, and income, from the 2006 Census. Bivariate analysis was conducted using the Spearman's correlation, Kendall's tau correlation, and Pearson's correlation. Multivariable analysis was conducted using an ordinal (proportional or cumulative odds) regression model. Results showed that the regression model was significant. Community socioeconomic indicators had no relationship with drinking water risk characterization in both the bivariate and multivariable models, with the sole exception of labour force, which had a significantly positive effect on drinking water risk rankings. Socioeconomic factors were not important in explaining access to safe drinking water in First Nations communities. Improvements in the quality of safe water data as well as an examination of other community processes are required to address this pressing policy issue.

  8. The safe home project.

    PubMed

    Arphorn, Sara; Jiraniratisai, Sopaphan; Rungtakul, Rungsri; Phutta, Nikom

    2011-12-01

    The Thai Health Promotion Foundation supported the Improvement of Quality of Life of Informal Workers project in Ban Luang District, Amphur Photaram, Ratchaburi Province. There were many informal workers in Ban Luang District. Sweet-crispy fish producers in Ban Luang were the largest group among the sweet-crispy fish producers in Thailand. This project was aimed at improving living and working conditions of informal workers, with a focus on the sweet-crispy fish group. Good practices of improved living and working conditions were used to help informal workers build safe, healthy and productive work environments. These informal workers often worked in substandard conditions and were exposed to various hazards in the working area. These hazards included risk of exposure to hot work environment, ergonomics-related injuries, chemical hazards, electrical hazards etc. Ergonomics problems were commonly in the sweet-crispy fish group. Unnatural postures such as prolonged sitting were performed dominantly. One hundred and fifty informal workers participated in this project. Occupational health volunteers were selected to encourage occupational health and safety in four groups of informal workers in 2009. The occupational health volunteers trained in 2008 were farmers, beauty salon workers and doll makers. The occupational health and safety knowledge is extended to a new informal worker group: sweet-crispy fish producer, in 2009. The occupational health and safety training for sweet-crispy fish group is conducted by occupational health volunteers. The occupational health volunteers increased their skills and knowledge assist in to make safe home and safe community through participatory oriented training. The improvement of living and working condition is conducted by using a modified WISH, Work Improvement for Safe Home, checklist. The plans of improvement were recorded. The informal workers showed improvement mostly on material handling and storage. The safe uses and safe

  9. What is Security? A perspective on achieving security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Atencio, Julian J.

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  10. Evaluation and Analysis of Eco-Security in Environmentally Sensitive Areas Using an Emergy Ecological Footprint

    PubMed Central

    Chen, Han-Shen

    2017-01-01

    In this paper, the overall ecological and environmental sustainability in the Cing-Jing region in Taiwan is examined. As land use and cover change has been found to be an important analysis method, an emergy ecological footprint model was applied and the eco-security assessed to ensure authorities maintain a balance between ecological preservation and tourism development. While the ecological environment in the Cing-Jing region from 2008 to 2014 was found to be within safe levels, all related indices had increased considerably. A Grey model was used to predict the 2015–2024 ecological carrying capacities, from which it was found that there is expected to be a large increase in per capita ecological footprints (EFs), meaning that in the future there is going to be a larger ecological deficit and a higher ecological pressure index (EFI), with the eco-security predicted to reach a Grade 2 intermediate level in 2022. As the Cing-Jing region is predicted to become ecologically unsustainable, local, regional, and national governments need to implement regulations to strictly control the land use in the Cing-Jing region. This study demonstrated that emergy EF (EEF) theory application can give objective guidance to decision-makers to ensure that recreational non-urban eco-security can be maintained at a safe level. PMID:28146086

  11. Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm

    NASA Astrophysics Data System (ADS)

    Rachmawati, D.; Budiman, M. A.; Aulya, L.

    2018-02-01

    Confidentiality, integrity, and efficiency are the crucial aspects of data security. Among the other digital data, image data is too prone to abuse of operation like duplication, modification, etc. There are some data security techniques, one of them is cryptography. The security of Vernam Cipher cryptography algorithm is very dependent on the key exchange process. If the key is leaked, security of this algorithm will collapse. Therefore, a method that minimizes key leakage during the exchange of messages is required. The method which is used, is known as Three-Pass Protocol. This protocol enables message delivery process without the key exchange. Therefore, the sending messages process can reach the receiver safely without fear of key leakage. The system is built by using Java programming language. The materials which are used for system testing are image in size 200×200 pixel, 300×300 pixel, 500×500 pixel, 800×800 pixel and 1000×1000 pixel. The result of experiments showed that Vernam Cipher algorithm in Three-Pass Protocol scheme could restore the original image.

  12. Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan.

    PubMed

    Sahi, Aqeel; Lai, David; Li, Yan

    2016-11-01

    Cloud computing was introduced as an alternative storage and computing model in the health sector as well as other sectors to handle large amounts of data. Many healthcare companies have moved their electronic data to the cloud in order to reduce in-house storage, IT development and maintenance costs. However, storing the healthcare records in a third-party server may cause serious storage, security and privacy issues. Therefore, many approaches have been proposed to preserve security as well as privacy in cloud computing projects. Cryptographic-based approaches were presented as one of the best ways to ensure the security and privacy of healthcare data in the cloud. Nevertheless, the cryptographic-based approaches which are used to transfer health records safely remain vulnerable regarding security, privacy, or the lack of any disaster recovery strategy. In this paper, we review the related work on security and privacy preserving as well as disaster recovery in the eHealth cloud domain. Then we propose two approaches, the Security-Preserving approach and the Privacy-Preserving approach, and a disaster recovery plan. The Security-Preserving approach is a robust means of ensuring the security and integrity of Electronic Health Records, and the Privacy-Preserving approach is an efficient authentication approach which protects the privacy of Personal Health Records. Finally, we discuss how the integrated approaches and the disaster recovery plan can ensure the reliability and security of cloud projects. Copyright © 2016 Elsevier Ltd. All rights reserved.

  13. Security Policy and Infrastructure in the Context of a Multi-Centeric Information System Dedicated to Autism Spectrum Disorder.

    PubMed

    Ben Said, Mohamed; Robel, Laurence; Golse, Bernard; Jais, Jean Philippe

    2017-01-01

    Autism spectrum disorders (ASD) are complex neuro-developmental disorders affecting children in their early age. The diagnosis of ASD relies on multidisciplinary investigations, in psychiatry, neurology, genetics, electrophysiology, neuro-imagery, audiology and ophthalmology. In order to support clinicians, researchers and public health decision makers, we designed an information system dedicated to ASD, called TEDIS. TEDIS was designed to manage systematic, exhaustive and continuous multi-centric patient data collection via secured Internet connections. In this paper, we present the security policy and security infrastructure we developed to protect ASD' patients' clinical data and patients' privacy. We tested our system on 359 ASD patient records in a local secured intranet environment and showed that the security system is functional, with a consistent, transparent and safe encrypting-decrypting behavior. It is ready for deployment in the nine ASD expert assessment centers in the Ile de France district.

  14. A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing

    PubMed Central

    Měsíček, Libor; Choi, Jongsun

    2018-01-01

    Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely. PMID:29796233

  15. A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing.

    PubMed

    Ko, Hoon; Měsíček, Libor; Choi, Jongsun; Hwang, Seogchan

    2018-01-01

    Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely.

  16. Enabling SDN in VANETs: What is the Impact on Security?

    PubMed

    Di Maio, Antonio; Palattella, Maria Rita; Soua, Ridha; Lamorte, Luca; Vilajosana, Xavier; Alonso-Zarate, Jesus; Engel, Thomas

    2016-12-06

    The demand for safe and secure journeys over roads and highways has been growing at a tremendous pace over recent decades. At the same time, the smart city paradigm has emerged to improve citizens' quality of life by developing the smart mobility concept. Vehicular Ad hoc NETworks (VANETs) are widely recognized to be instrumental in realizing such concept, by enabling appealing safety and infotainment services. Such networks come with their own set of challenges, which range from managing high node mobility to securing data and user privacy. The Software Defined Networking (SDN) paradigm has been identified as a suitable solution for dealing with the dynamic network environment, the increased number of connected devices, and the heterogeneity of applications. While some preliminary investigations have been already conducted to check the applicability of the SDN paradigm to VANETs, and its presumed benefits for managing resources and mobility, it is still unclear what impact SDN will have on security and privacy. Security is a relevant issue in VANETs, because of the impact that threats can have on drivers' behavior and quality of life. This paper opens a discussion on the security threats that future SDN-enabled VANETs will have to face, and investigates how SDN could be beneficial in building new countermeasures. The analysis is conducted in real use cases (smart parking, smart grid of electric vehicles, platooning, and emergency services), which are expected to be among the vehicular applications that will most benefit from introducing an SDN architecture.

  17. Designing Safe Facilities

    ERIC Educational Resources Information Center

    McLester, Susan

    2011-01-01

    In the spring of 1999, 12 students and a teacher were killed by two gun-toting teenage boys at Columbine High School in Littleton, Colorado, making school safety and security an overnight priority in communities across the nation. Many schools are starting to borrow security methods and technology from the business world such as video intercoms,…

  18. Security Verification of Secure MANET Routing Protocols

    DTIC Science & Technology

    2012-03-22

    SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Matthew F. Steele, Captain, USAF AFIT/GCS/ ENG /12-03 DEPARTMENT OF THE AIR FORCE AIR...States AFIT/GCS/ ENG /12-03 SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Presented to the Faculty Department of Electrical and Computer...DISTRIBUTION UNLIMITED AFIT/GCS/ ENG /12-03 SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS Matthew F. Steele, B.S.E.E. Captain, USAF

  19. Methods and protocol of a mixed method quasi-experiment to evaluate the effects of a structural economic and food security intervention on HIV vulnerability in rural Malawi: The SAGE4Health Study.

    PubMed

    Weinhardt, Lance S; Galvao, Loren W; Mwenyekonde, Thokozani; Grande, Katarina M; Stevens, Patricia; Yan, Alice F; Mkandawire-Valhmu, Lucy; Masanjala, Winford; Kibicho, Jennifer; Ngui, Emmanuel; Emer, Lindsay; Watkins, Susan C

    2014-01-01

    Poverty and lack of a predictable, stable source of food are two fundamental determinants of ill health, including HIV/AIDS. Conversely, episodes of poor health and death from HIV can disrupt the ability to maintain economic stability in affected households, especially those that rely on subsistence farming. However, little empirical research has examined if, and how, improvements in people's economic status and food security translate into changes in HIV vulnerability. In this paper, we describe in detail the methods and protocol of an academic-NGO collaboration on a quasi-experimental, longitudinal study of the mechanisms and magnitude of the impact of a multilevel economic and food security program (Support to Able-Bodied Vulnerable Groups to Achieve Food Security; SAFE), as implemented by CARE. Primary outcomes include HIV vulnerability (i.e., HIV risk behaviors, HIV infection), economic status (i.e., income, household assets) and food security (including anthropometric measures). We recruited participants from two types of areas of rural central Malawi: traditional authorities (TA) selected by CARE to receive the SAFE program (intervention group) and TAs receiving other unrelated CARE programming (controls). In the intervention TAs, we recruited 598 program participants (398 women, 200 men) and interviewed them at baseline and 18- and 36-month follow-ups; we interviewed 301 control households. In addition, we conducted random surveys (n = 1002) in the intervention and control areas with a 36-month assessment interval, prior to and after implementation of SAFE. Thus, we are examining intervention outcomes both in direct SAFE program participants and their larger communities. We are using multilevel modeling to examine mediators and moderators of the effects of SAFE on HIV outcomes at the individual and community levels and determine the ways in which changes in HIV outcomes feed back into economic outcomes and food security at later interviews. Finally, we

  20. School Safety and Security Best Practices Approved by the Commissioner of Education. Information Brief. Report.

    ERIC Educational Resources Information Center

    Florida State Legislature, Tallahassee. Office of Program Policy Analysis and Government Accountability.

    The 2001 Florida Legislature passed Ch. 2001-125, Laws of Florida, Section 40, which is often referred to as the Safe Passage Act. It requires all school districts to conduct a self-assessment of their school safety and security using best practices developed by the Office of Program Policy Analysis and Government Accountability (OPPAGA). It also…

  1. Interrelatedness of child health, protection and well-being: an application of the SAFE model in Rwanda.

    PubMed

    Betancourt, Theresa S; Williams, Timothy P; Kellner, Sarah E; Gebre-Medhin, Joy; Hann, Katrina; Kayiteshonga, Yvonne

    2012-05-01

    This study examines the core components of children's basic security and well-being in order to examine issues central to improving child protection in Rwanda. Sources of data included 15 focus groups with adults, 7 focus groups with children ages 10-17, and 11 key informant interviews with child protection stakeholders, including representatives from international NGOs, community-based groups, and the Rwandan Government, all of which took place in April and May of 2010. Participants painted a complex picture of threats to children's basic security in Rwanda. Three key themes were pervasive across all interviews: (1) deterioration of social and community cohesion in post-genocide Rwanda; (2) the cascading effects of poverty; and (3) the impact of caregiver illness and death on the caregiving environment. Consistent with the SAFE (Safety/freedom from harm; Access to basic physiological needs and healthcare; Family and connection to others; Education and economic security) model of child protection, participants rarely elaborated on a child protection threat independent of other basic security needs and rights. Findings suggest a need for integrated approaches to child protection that recognize this interrelatedness and extend beyond issue-specific child protection responses. This study contributes to a growing body of work highlighting the interrelated nature of child protection threats and the implications of adaptive and dangerous survival strategies that children and families engage in to meet their basic security needs. Analysis of this interrelatedness provides a roadmap for improving policies and implementing integrated and robust child protection strategies in Rwanda and other settings. Copyright © 2012 Elsevier Ltd. All rights reserved.

  2. How Safe Are Kid-Safe Search Engines?

    ERIC Educational Resources Information Center

    Masterson-Krum, Hope

    2001-01-01

    Examines search tools available to elementary and secondary school students, both human-compiled and crawler-based, to help direct them to age-appropriate Web sites; analyzes the procedures of search engines labeled family-friendly or kid safe that use filters; and tests the effectiveness of these services to students in school libraries. (LRW)

  3. Tents and Shelters

    DTIC Science & Technology

    2010-07-15

    Electromagnetic Interference ( EMI ), Transportability, Environmental, Human Factors Engineering (HFE), Reliability, Availability and Maintainability (RAM), and...vehicles and trailers to store, protect, and secure equipment, tools, and other theft-prone items. CBCs are designed not to interfere with the carrier’s...Transportability Test Facility. d. Electromagnetic Interference ( EMI ) Test Facility. e. Areas capable of conducting Blackout, Sound, Sand and Dust tests

  4. Analysis of information security management systems at 5 domestic hospitals with more than 500 beds.

    PubMed

    Park, Woo-Sung; Seo, Sun-Won; Son, Seung-Sik; Lee, Mee-Jeong; Kim, Shin-Hyo; Choi, Eun-Mi; Bang, Ji-Eon; Kim, Yea-Eun; Kim, Ok-Nam

    2010-06-01

    The information security management systems (ISMS) of 5 hospitals with more than 500 beds were evaluated with regards to the level of information security, management, and physical and technical aspects so that we might make recommendations on information security and security countermeasures which meet both international standards and the needs of individual hospitals. The ISMS check-list derived from international/domestic standards was distributed to each hospital to complete and the staff of each hospital was interviewed. Information Security Indicator and Information Security Values were used to estimate the present security levels and evaluate the application of each hospital's current system. With regard to the moderate clause of the ISMS, the hospitals were determined to be in compliance. The most vulnerable clause was asset management, in particular, information asset classification guidelines. The clauses of information security incident management and business continuity management were deemed necessary for the establishment of successful ISMS. The level of current ISMS in the hospitals evaluated was determined to be insufficient. Establishment of adequate ISMS is necessary to ensure patient privacy and the safe use of medical records for various purposes. Implementation of ISMS which meet international standards with a long-term and comprehensive perspective is of prime importance. To reflect the requirements of the varied interests of medical staff, consumers, and institutions, the establishment of political support is essential to create suitable hospital ISMS.

  5. SOME PROBLEMS OF "SAFE DOSE" ESTIMATION

    EPA Science Inventory

    In environmental carcinogenic risk assessment, the usually defined "safe doses" appear subjective in some sense. n this paper a method of standardizing "safe doses" based on some objective parameters is introduced and a procedure of estimating safe doses under the competing risks...

  6. Providing security assurance in line with national DBT assumptions

    NASA Astrophysics Data System (ADS)

    Bajramovic, Edita; Gupta, Deeksha

    2017-01-01

    As worldwide energy requirements are increasing simultaneously with climate change and energy security considerations, States are thinking about building nuclear power to fulfill their electricity requirements and decrease their dependence on carbon fuels. New nuclear power plants (NPPs) must have comprehensive cybersecurity measures integrated into their design, structure, and processes. In the absence of effective cybersecurity measures, the impact of nuclear security incidents can be severe. Some of the current nuclear facilities were not specifically designed and constructed to deal with the new threats, including targeted cyberattacks. Thus, newcomer countries must consider the Design Basis Threat (DBT) as one of the security fundamentals during design of physical and cyber protection systems of nuclear facilities. IAEA NSS 10 describes the DBT as "comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated". Nowadays, many threat actors, including hacktivists, insider threat, cyber criminals, state and non-state groups (terrorists) pose security risks to nuclear facilities. Threat assumptions are made on a national level. Consequently, threat assessment closely affects the design structures of nuclear facilities. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to nuclear facilities. Therefore, the cybersecurity context is essential for secure and safe use of nuclear power. In addition, States should include multiple DBT scenarios in order to protect various target materials, types of facilities, and adversary objectives. Development of a comprehensive DBT is a precondition for the establishment and further improvement of domestic state nuclear-related regulations in the

  7. Defense Transportation: DOD Needs to Improve the Evaluation of Safety and Performance Information for Carriers Transporting Security-Sensitive Materials

    DTIC Science & Technology

    2015-12-01

    caught on fire in September 2014 near Crawfordville, Georgia. The tires and the trailer were burned off. See figure 11. There were no reported...Connect with GAO To Report Fraud, Waste, and Abuse in Federal Programs Congressional Relations Public Affairs Please Print on Recycled Paper.

  8. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  9. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  10. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  11. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  12. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  13. Creating a Safe Place: SRE Teaching as an Act of Security and Identity Formation in Government Schools in Australia

    ERIC Educational Resources Information Center

    Gross, Zehavit; Rutland, Suzanne D.

    2016-01-01

    This study seeks to analyse the components that contribute to Special Religious Education (SRE) classes in government schools in Australia being considered as a "safe place" and the ways in which they facilitate an understanding of the students' own religious and cultural identity. Our research focuses on one of the small faiths,…

  14. Dual-surface dielectric depth detector for holographic millimeter-wave security scanners

    NASA Astrophysics Data System (ADS)

    McMakin, Douglas L.; Keller, Paul E.; Sheen, David M.; Hall, Thomas E.

    2009-05-01

    The Transportation Security Administration (TSA) is presently deploying millimeter-wave whole body scanners at over 20 airports in the United States. Threats that may be concealed on a person are displayed to the security operator of this scanner. "Passenger privacy is ensured through the anonymity of the image. The officer attending the passenger cannot view the image, and the officer viewing the image is remotely located and cannot see the passenger. Additionally, the image cannot be stored, transmitted or printed and is deleted immediately after being viewed. Finally, the facial area of the image has been blurred to further ensure privacy." Pacific Northwest National Laboratory (PNNL) originated research into this novel security technology which has been independently commercialized by L-3 Communications, SafeView, Inc. PNNL continues to perform fundamental research into improved software techniques which are applicable to the field of holographic security screening technology. This includes performing significant research to remove human features from the imagery. Both physical and software imaging techniques have been employed. The physical imaging techniques include polarization diversity illumination and reception, dual frequency implementation, and high frequency imaging at 100 GHz. This paper will focus on a software privacy technique using a dual surface dielectric depth detector method.

  15. Secure steganographic communication algorithm based on self-organizing patterns.

    PubMed

    Saunoriene, Loreta; Ragulskis, Minvydas

    2011-11-01

    A secure steganographic communication algorithm based on patterns evolving in a Beddington-de Angelis-type predator-prey model with self- and cross-diffusion is proposed in this paper. Small perturbations of initial states of the system around the state of equilibrium result in the evolution of self-organizing patterns. Small differences between initial perturbations result in slight differences also in the evolving patterns. It is shown that the generation of interpretable target patterns cannot be considered as a secure mean of communication because contours of the secret image can be retrieved from the cover image using statistical techniques if only it represents small perturbations of the initial states of the system. An alternative approach when the cover image represents the self-organizing pattern that has evolved from initial states perturbed using the dot-skeleton representation of the secret image can be considered as a safe visual communication technique protecting both the secret image and communicating parties.

  16. Alternative security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Weston, B.H.

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview.

  17. Using Opioids Safely After Surgery

    MedlinePlus

    ... Adult , Geriatric Using Opioids Safely After Surgery Using Opioids Safely After Surgery Stick to the lowest dose ... need opioid pain medicine. If your doctor says opioids aren’t necessary. If your doctor thinks you ...

  18. How Safe Is Safe Enough for Self-Driving Vehicles?

    PubMed

    Liu, Peng; Yang, Run; Xu, Zhigang

    2018-05-21

    Self-driving vehicles (SDVs) promise to considerably reduce traffic crashes. One pressing concern facing the public, automakers, and governments is "How safe is safe enough for SDVs?" To answer this question, a new expressed-preference approach was proposed for the first time to determine the socially acceptable risk of SDVs. In our between-subject survey (N = 499), we determined the respondents' risk-acceptance rate of scenarios with varying traffic-risk frequencies to examine the logarithmic relationships between the traffic-risk frequency and risk-acceptance rate. Logarithmic regression models of SDVs were compared to those of human-driven vehicles (HDVs); the results showed that SDVs were required to be safer than HDVs. Given the same traffic-risk-acceptance rates for SDVs and HDVs, their associated acceptable risk frequencies of SDVs and HDVs were predicted and compared. Two risk-acceptance criteria emerged: the tolerable risk criterion, which indicates that SDVs should be four to five times as safe as HDVs, and the broadly acceptable risk criterion, which suggests that half of the respondents hoped that the traffic risk of SDVs would be two orders of magnitude lower than the current estimated traffic risk. The approach and these results could provide insights for government regulatory authorities for establishing clear safety requirements for SDVs. © 2018 Society for Risk Analysis.

  19. Data Safe Havens in health research and healthcare

    PubMed Central

    Burton, Paul R.; Murtagh, Madeleine J.; Boyd, Andy; Williams, James B.; Dove, Edward S.; Wallace, Susan E.; Tassé, Anne-Marie; Little, Julian; Chisholm, Rex L.; Gaye, Amadou; Hveem, Kristian; Brookes, Anthony J.; Goodwin, Pat; Fistein, Jon; Bobrow, Martin; Knoppers, Bartha M.

    2015-01-01

    Motivation: The data that put the ‘evidence’ into ‘evidence-based medicine’ are central to developments in public health, primary and hospital care. A fundamental challenge is to site such data in repositories that can easily be accessed under appropriate technical and governance controls which are effectively audited and are viewed as trustworthy by diverse stakeholders. This demands socio-technical solutions that may easily become enmeshed in protracted debate and controversy as they encounter the norms, values, expectations and concerns of diverse stakeholders. In this context, the development of what are called ‘Data Safe Havens’ has been crucial. Unfortunately, the origins and evolution of the term have led to a range of different definitions being assumed by different groups. There is, however, an intuitively meaningful interpretation that is often assumed by those who have not previously encountered the term: a repository in which useful but potentially sensitive data may be kept securely under governance and informatics systems that are fit-for-purpose and appropriately tailored to the nature of the data being maintained, and may be accessed and utilized by legitimate users undertaking work and research contributing to biomedicine, health and/or to ongoing development of healthcare systems. Results: This review explores a fundamental question: ‘what are the specific criteria that ought reasonably to be met by a data repository if it is to be seen as consistent with this interpretation and viewed as worthy of being accorded the status of ‘Data Safe Haven’ by key stakeholders’? We propose 12 such criteria. Contact: paul.burton@bristol.ac.uk PMID:26112289

  20. Application of Framework for Integrating Safety, Security and Safeguards (3Ss) into the Design Of Used Nuclear Fuel Storage Facility

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Badwan, Faris M.; Demuth, Scott F

    Department of Energy’s Office of Nuclear Energy, Fuel Cycle Research and Development develops options to the current commercial fuel cycle management strategy to enable the safe, secure, economic, and sustainable expansion of nuclear energy while minimizing proliferation risks by conducting research and development focused on used nuclear fuel recycling and waste management to meet U.S. needs. Used nuclear fuel is currently stored onsite in either wet pools or in dry storage systems, with disposal envisioned in interim storage facility and, ultimately, in a deep-mined geologic repository. The safe management and disposition of used nuclear fuel and/or nuclear waste is amore » fundamental aspect of any nuclear fuel cycle. Integrating safety, security, and safeguards (3Ss) fully in the early stages of the design process for a new nuclear facility has the potential to effectively minimize safety, proliferation, and security risks. The 3Ss integration framework could become the new national and international norm and the standard process for designing future nuclear facilities. The purpose of this report is to develop a framework for integrating the safety, security and safeguards concept into the design of Used Nuclear Fuel Storage Facility (UNFSF). The primary focus is on integration of safeguards and security into the UNFSF based on the existing Nuclear Regulatory Commission (NRC) approach to addressing the safety/security interface (10 CFR 73.58 and Regulatory Guide 5.73) for nuclear power plants. The methodology used for adaptation of the NRC safety/security interface will be used as the basis for development of the safeguards /security interface and later will be used as the basis for development of safety and safeguards interface. Then this will complete the integration cycle of safety, security, and safeguards. The overall methodology for integration of 3Ss will be proposed, but only the integration of safeguards and security will be applied to the design

  1. Trust Model to Enhance Security and Interoperability of Cloud Environment

    NASA Astrophysics Data System (ADS)

    Li, Wenjuan; Ping, Lingdi

    Trust is one of the most important means to improve security and enable interoperability of current heterogeneous independent cloud platforms. This paper first analyzed several trust models used in large and distributed environment and then introduced a novel cloud trust model to solve security issues in cross-clouds environment in which cloud customer can choose different providers' services and resources in heterogeneous domains can cooperate. The model is domain-based. It divides one cloud provider's resource nodes into the same domain and sets trust agent. It distinguishes two different roles cloud customer and cloud server and designs different strategies for them. In our model, trust recommendation is treated as one type of cloud services just like computation or storage. The model achieves both identity authentication and behavior authentication. The results of emulation experiments show that the proposed model can efficiently and safely construct trust relationship in cross-clouds environment.

  2. From Secure Memories to Smart Card Security

    NASA Astrophysics Data System (ADS)

    Handschuh, Helena; Trichina, Elena

    Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.

  3. How to Safely Give Acetaminophen

    MedlinePlus

    ... Educators Search English Español How to Safely Give Acetaminophen KidsHealth / For Parents / How to Safely Give Acetaminophen ... without getting a doctor's OK first. What Is Acetaminophen Also Called? Acetaminophen is the generic name of ...

  4. Enabling SDN in VANETs: What is the Impact on Security?

    PubMed Central

    Di Maio, Antonio; Palattella, Maria Rita; Soua, Ridha; Lamorte, Luca; Vilajosana, Xavier; Alonso-Zarate, Jesus; Engel, Thomas

    2016-01-01

    The demand for safe and secure journeys over roads and highways has been growing at a tremendous pace over recent decades. At the same time, the smart city paradigm has emerged to improve citizens’ quality of life by developing the smart mobility concept. Vehicular Ad hoc NETworks (VANETs) are widely recognized to be instrumental in realizing such concept, by enabling appealing safety and infotainment services. Such networks come with their own set of challenges, which range from managing high node mobility to securing data and user privacy. The Software Defined Networking (SDN) paradigm has been identified as a suitable solution for dealing with the dynamic network environment, the increased number of connected devices, and the heterogeneity of applications. While some preliminary investigations have been already conducted to check the applicability of the SDN paradigm to VANETs, and its presumed benefits for managing resources and mobility, it is still unclear what impact SDN will have on security and privacy. Security is a relevant issue in VANETs, because of the impact that threats can have on drivers’ behavior and quality of life. This paper opens a discussion on the security threats that future SDN-enabled VANETs will have to face, and investigates how SDN could be beneficial in building new countermeasures. The analysis is conducted in real use cases (smart parking, smart grid of electric vehicles, platooning, and emergency services), which are expected to be among the vehicular applications that will most benefit from introducing an SDN architecture. PMID:27929443

  5. Security Perspectives and Policies: Lebanon, Syria, Israel, and the Palestinians. Conference Papers

    DTIC Science & Technology

    1991-05-01

    long life standing up to Arab demands than the Likud. expectancy rate in power, similarly, there are few Labor’s stated goals in 1988 were security...positions, such successful vote in Israel’s history), it was patronage to-renard a g.’% rate supporters, safe widely suggested b) leaders in other...Arafat and-his senior influence within the PLO’s various councils political advisors have elaborated upon- the PLO’s incommensurate with their

  6. The Interface of Safety and Security in Transport: A Regional Perspective

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Welch, Tim; Duhamel, David A; Nandakumar, A. N.

    Security of nuclear and other radioactive material in transport continues to be a challenge for States that are working on strengthening their nuclear security regime. One reason for this is that State regulatory agencies and other organizations lack the resources and trained personnel to dedicate to this field. For over 50 years safety has been a major focus in the use, storage and transport of radioactive material. Only recently, since the late 1990s, has dedicated focus been given to the field of security. One way to assist States to advance nuclear security is to reach out to safety workers (regulators,more » inspectors, and safety compliance personnel) and showcase the need to better integrate safety and security practices. A recent IAEA regional workshop in Bangkok, Thailand (June 2015) yielded profound results when subject matter experts lectured on both the safety and the security of radioactive material in transport. These experts presented and discussed experiences and best practices for: 1) developing and implementing safety requirements and security recommendations for radioactive material in transport; 2) national and international cooperation; and 3) preventing shipment delays/denials of radioactive material. The workshop participants, who were predominantly from safety organizations, shared that they received the following from this event: 1. A clear understanding of the objectives of the IAEA safety requirements and security recommendations for radioactive material in transport. 2. A general understanding of and appreciation for the similarities and differences between safety requirements and security recommendations for radioactive material in transport. 3. A greater appreciation of the interface between transport safety and security and potential impacts of this interface on the efforts to strengthen the compliance assurance regime for the safe transport of radioactive material. 4. A general understanding of assessing the transport security

  7. InaSAFE applications in disaster preparedness

    NASA Astrophysics Data System (ADS)

    Pranantyo, Ignatius Ryan; Fadmastuti, Mahardika; Chandra, Fredy

    2015-04-01

    Disaster preparedness activities aim to reduce the impact of disasters by being better prepared to respond when a disaster occurs. In order to better anticipate requirements during a disaster, contingency planning activities can be undertaken prior to a disaster based on a realistic disaster scenario. InaSAFE is a tool that can inform this process. InaSAFE is a free and open source software that estimates the impact to people and infrastructure from potential hazard scenarios. By using InaSAFE, disaster managers can develop scenarios of disaster impacts (people and infrastructures affected) to inform their contingency plan and emergency response operation plan. While InaSAFE provides the software framework exposure data and hazard data are needed as inputs to run this software. Then InaSAFE can be used to forecast the impact of the hazard scenario to the exposure data. InaSAFE outputs include estimates of the number of people, buildings and roads are affected, list of minimum needs (rice and clean water), and response checklist. InaSAFE is developed by Indonesia's National Disaster Management Agency (BNPB) and the Australian Government, through the Australia-Indonesia Facility for Disaster Reduction (AIFDR), in partnership with the World Bank - Global Facility for Disaster Reduction and Recovery (GFDRR). This software has been used in many parts of Indonesia, including Padang, Maumere, Jakarta, and Slamet Mountain for emergency response and contingency planning.

  8. Analysis of Information Security Management Systems at 5 Domestic Hospitals with More than 500 Beds

    PubMed Central

    Park, Woo-Sung; Son, Seung-Sik; Lee, Mee-Jeong; Kim, Shin-Hyo; Choi, Eun-Mi; Bang, Ji-Eon; Kim, Yea-Eun; Kim, Ok-Nam

    2010-01-01

    Objectives The information security management systems (ISMS) of 5 hospitals with more than 500 beds were evaluated with regards to the level of information security, management, and physical and technical aspects so that we might make recommendations on information security and security countermeasures which meet both international standards and the needs of individual hospitals. Methods The ISMS check-list derived from international/domestic standards was distributed to each hospital to complete and the staff of each hospital was interviewed. Information Security Indicator and Information Security Values were used to estimate the present security levels and evaluate the application of each hospital's current system. Results With regard to the moderate clause of the ISMS, the hospitals were determined to be in compliance. The most vulnerable clause was asset management, in particular, information asset classification guidelines. The clauses of information security incident management and business continuity management were deemed necessary for the establishment of successful ISMS. Conclusions The level of current ISMS in the hospitals evaluated was determined to be insufficient. Establishment of adequate ISMS is necessary to ensure patient privacy and the safe use of medical records for various purposes. Implementation of ISMS which meet international standards with a long-term and comprehensive perspective is of prime importance. To reflect the requirements of the varied interests of medical staff, consumers, and institutions, the establishment of political support is essential to create suitable hospital ISMS. PMID:21818429

  9. Control and Non-Payload Communications (CNPC) Prototype Radio - Generation 2 Security Flight Test Report

    NASA Technical Reports Server (NTRS)

    Iannicca, Dennis C.; Ishac, Joseph A.; Shalkhauser, Kurt A.

    2015-01-01

    NASA Glenn Research Center (GRC), in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the Federal Aviation Administration (FAA) and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the GRC prototype CNPC architecture as a demonstration platform. The proposed security controls were integrated into the GRC flight test system aboard our S-3B Viking surrogate aircraft and several network tests were conducted during a flight on November 15th, 2014 to determine whether the controls were working properly within the flight environment. The flight test was also the first to integrate Robust Header Compression (ROHC) as a means of reducing the additional overhead introduced by the security controls and Mobile IPv6. The effort demonstrated the complete end-to-end secure CNPC link in a relevant flight environment.

  10. How To Create Safe Schools: Action Steps for the Community. A Workshop and Planning Guide To Help Communities Bring Security and Peace to Their Schools.

    ERIC Educational Resources Information Center

    National Educational Service, Bloomington, IN.

    This workshop and planning guide is designed to help stakeholders create safe schools for students. The guide is intended to be used with three 20-minute videotape programs that feature an inside look at two schools that actively involved their communities in improving school safety. The three videos--"Building the Team,""The Safe School…

  11. Verbal abuse and physical assault in the emergency department: Rates of violence, perceptions of safety, and attitudes towards security.

    PubMed

    Partridge, Bradley; Affleck, Julia

    2017-08-01

    Emergency Department (ED) workers are prone to occupational violence, however the extent and impact of this may not be evenly felt across all roles in the ED. Explore: 1) the rate of verbal abuse and physical assaults experienced by ED staff, 2) perceptions of safety, 3) attitudes towards security officers, and 4) formal reporting of incidents. 330 ED workers were surveyed at four public hospitals in one metropolitan health service district in Queensland, Australia, including 179 nurses, 83 medical staff, 44 administration staff, 14 allied health, and 9 operational. Nurses were more likely to have been physically assaulted in the last six months and were less likely to feel safe. Most ED staff across all roles experienced verbal abuse. Nurses were better than medical staff at reporting instances of occupational violence although overall reporting across all roles was low. Staff who thought that security officers respond to incidents quickly and are a visible presence in the ED were more likely to feel safe in the ED. Workers in the ED, particularly nurses, experience high rates of verbal abuse and physical aggression and there may be a case for having designated security guards in the ED. Copyright © 2017 College of Emergency Nursing Australasia. Published by Elsevier Ltd. All rights reserved.

  12. Security, safety, and related technology - the triangle of eHealth service provision.

    PubMed

    Savastano, Mario; Hovsto, Asbjorn; Pharow, Peter; Blobel, Bernd

    2008-01-01

    The developing of innovative solutions in the emerging eHealth market requires strong economic efforts which may be justified only in presence of particularly suitable boundary conditions. Among the factors retained of primary importance for the development of eHealth, a correct approach to id-management is unanimously considered fundamental. Three keywords in the id-management context appear particularly important: standardization, security and safety. Standardization may contribute to increase the size and duration of the eHealth market, while security and safety may encourage all the stakeholders to trust in a appropriate and safe management of all the very sensitive personal data involved in the eHealth applications. The aim of the present paper is analyzing some security and safety issues in eHealth from the particular prospective of the identity management and standardization. The paper highlights the mission of the EU funded "BioHealth" project whose mission is to increase the stakeholders' knowledge about existing and emerging standards in eHealth with particular reference to identity management.

  13. Software Security Practices: Integrating Security into the SDLC

    DTIC Science & Technology

    2011-05-01

    Software Security Practices Integrating Security into the SDLC Robert A. Martin HS SEDI is a trademark of the U.S. Department of Homeland Security...2011 to 00-00-2011 4. TITLE AND SUBTITLE Software Security Practices Integrating Security into the SDLC 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...SEDI FFRDC is managed and operated by The MITRE Corporation for DHS. 4 y y w SDLC Integrating Security into a typical software development lifecycle

  14. 2009 Tactical Wheeled Vehicles Conference (TWV)

    DTIC Science & Technology

    2009-02-03

    Concept / Status / Joint Effort Between TARDEC & CERDEC • Leverage Military / Commercial vehicular technologies to equip tactical vehicles with a common... Vehicles Trailer (HEMAT) Heavy Equipment Transport (HETS) Container Handling Unit (CHU) Armored Security Vehicle Over 1200 systems fielded 978...Important Note: While EMIP is an excellent means to introduce new technologies to the Military , it can not change vehicle systems. Army PM’s are

  15. To reauthorize the matching grant program for school security in the Omnibus Crime Control and Safe Streets Act of 1968.

    THOMAS, 113th Congress

    Rep. Barrow, John [D-GA-12

    2013-06-28

    House - 07/15/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  16. Exploring the youth experience about sense of social security: a qualitative study

    PubMed Central

    Chinekesh, Ahdieh; Mohammadi, Farahnaz; Motlagh, Mohammad Esmael; Eftekhari, Monir Baradaran; Ardalan, Gelayol; Djalalinia, Shirin

    2017-01-01

    Background Undoubtedly, one of the vital needs of man is security. Determinants and related factors to sense of social security is one of the most important research priorities, especially in adolescents and young people. Objective To identify the factors affecting the social security of the youth. Methods In 2017, using conventional content analysis, and benefiting from semi-structured in-depth interviews, we conducted a qualitative study exploring the opinions of young people about their feelings regarding social security. First, a targeted sampling method was determined to collect the data. Participants were young volunteers aged 18 to 30 who were selected from Tehran, the capital of Iran. Inclusion criteria for participants were willingness to participate in the study and ability to express their experiences. Data was extracted from 21 participants. Results The participants consisted of 21 young people who met the study inclusion criteria, of whom 12 participants were male. Their mean age was 24.4±0.41 years and their education varied from primary school to master’s degree. Under two main categories of the need for economic and financial security and the need for a safe society, we extracted 11 subcategories following 32 codes. According to the findings, most participants agreed on the important role that sense of social security has in their lives and their health. Conclusion The important role of sense of social security in participant’s lives and health was the main important point of our findings, emphasized by most of participants. Based on the results; the assessment of the specific needs of different target groups, the design, development and implementation of health programs led to more effective interventions. PMID:29560155

  17. Exploring the youth experience about sense of social security: a qualitative study.

    PubMed

    Chinekesh, Ahdieh; Hosseini, Seyed Ali; Mohammadi, Farahnaz; Motlagh, Mohammad Esmael; Eftekhari, Monir Baradaran; Ardalan, Gelayol; Djalalinia, Shirin

    2017-12-01

    Undoubtedly, one of the vital needs of man is security. Determinants and related factors to sense of social security is one of the most important research priorities, especially in adolescents and young people. To identify the factors affecting the social security of the youth. In 2017, using conventional content analysis, and benefiting from semi-structured in-depth interviews, we conducted a qualitative study exploring the opinions of young people about their feelings regarding social security. First, a targeted sampling method was determined to collect the data. Participants were young volunteers aged 18 to 30 who were selected from Tehran, the capital of Iran. Inclusion criteria for participants were willingness to participate in the study and ability to express their experiences. Data was extracted from 21 participants. The participants consisted of 21 young people who met the study inclusion criteria, of whom 12 participants were male. Their mean age was 24.4±0.41 years and their education varied from primary school to master's degree. Under two main categories of the need for economic and financial security and the need for a safe society, we extracted 11 subcategories following 32 codes. According to the findings, most participants agreed on the important role that sense of social security has in their lives and their health. The important role of sense of social security in participant's lives and health was the main important point of our findings, emphasized by most of participants. Based on the results; the assessment of the specific needs of different target groups, the design, development and implementation of health programs led to more effective interventions.

  18. Aware, motivated and striving for a 'safe tan': an exploratory mixed-method study of sun-protection during holidays.

    PubMed

    Rodrigues, Angela M; Sniehotta, Falko F; Birch-Machin, Mark A; Araujo-Soares, Vera

    2017-01-01

    Background: This article presents an exploratory study, aiming to explore the correspondence between knowledge, motivation and sun-protection practices during holidays. Methods: Seventeen participants aged 21-62 years old, recruited from community settings took part in individual face-to-face semi-structured interviews, completed sun sensitivity questions and an objective assessment of sunscreen use. Holidaymakers' knowledge about sun-safe messages, intentions and perceptions of barriers and facilitators for sun-protection were assessed. Qualitative data were analysed using thematic analysis and integrated with quantitative data, using a pragmatic theory-informed approach to synthesise the findings. Results: Participants were well informed about sun-safe messages, highly motivated to protect themselves from solar UV radiation (UVR) and they perceived themselves as well protected. However, they did not seem to use effective protective practices. Sunscreen was the preferred method of sun-protection, but most participants used considerably less than the recommended amount and significantly overestimated the amount of time they could be safely exposed. Seeking shade was the least used method of sun-protection and covering-up strategies were mostly implemented as a partial protection (i.e. hats or sunglasses). The desire to reach an optimal balance between getting a tan and using sun-protection to avoid sunburns was preeminent. Several additional barriers and facilitators for sun-protection were identified. Conclusions: Holidaymakers might have a false sense of security when it comes to sun-exposure. They are aware of the need to protect from solar UVR, but the motive for a safe tan, the overreliance on sunscreen, the overestimation of the safe sun-exposure time for their skin type and the insufficient application of sunscreen leaves holidaymakers motivated to protect their skin at significant risk of overexposure, sunburn and skin cancer. Public health messages need to

  19. KSC-04pd1658

    NASA Image and Video Library

    2004-08-05

    KENNEDY SPACE CENTER, FLA. - After the ribbon cutting for the Enhanced Firing Range on Schwartz Rd. at Kennedy Space Center, guests get a close look at the new “rifle-grade” shoot house. NASA’s Federal Law Enforcement Training Academy’s firing range upgrades also include a portable, tactical “shoot-back” trailer for cover and concealment drills, automated running targets and a new classroom. They are added to the existing three firearms ranges, “pistol-grade” shoot house, obstacle course and rappel tower. NASA’s Security Management and Safeguards Office funded the enhancements in order to improve ability to train the KSC security force and to support local, state and federal law enforcement agencies in Homeland Security.

  20. Safe Schools, Safe Students. Proceedings of the National Education Goals Panel/National Alliance of Pupil Services Organizations Conference on "Safe Schools, Safe Students: A Collaborative Approach to Achieving Safe, Disciplined, and Drug-free Schools Conducive to Learning" (Washington, D.C., October 28-29, 1994).

    ERIC Educational Resources Information Center

    Talley, Ronda C., Ed.; Walz, Garry R., Ed.

    The "Safe Schools, Safe Students" conference brought together leading researchers and practitioners in order to share knowledge about innovative safety strategies being used in America's schools. The papers here represent the thinking of scientific experts and school-based pupil service providers who are implementing programs to prevent…

  1. Steering teens safe: a randomized trial of a parent-based intervention to improve safe teen driving.

    PubMed

    Peek-Asa, Corinne; Cavanaugh, Joseph E; Yang, Jingzhen; Chande, Vidya; Young, Tracy; Ramirez, Marizen

    2014-07-31

    Crashes are the leading cause of death for teens, and parent-based interventions are a promising approach. We assess the effectiveness of Steering Teens Safe, a parent-focused program to increase safe teen driving. Steering Teens Safe aimed to improve parental communication with teens about safe driving using motivational interviewing techniques in conjunction with 19 safe driving lessons. A randomized controlled trial involved 145 parent-teen dyads (70 intervention and 75 control). Intervention parents received a 45-minute session to learn the program with four follow-up phone sessions, a DVD, and a workbook. Control parents received a standard brochure about safe driving. Scores were developed to measure teen-reported quantity and quality of parental communication about safe driving. The main outcome measure was a previously validated Risky Driving Score reported by teens. Because the Score was highly skewed, a generalized linear model based on a gamma distribution was used for analysis. Intervention teens ranked their parent's success in talking about driving safety higher than control teens (p = 0.035) and reported that their parents talked about more topics (non-significant difference). The Risky Driving Score was 21% lower in intervention compared to control teens (85% CI = 0.60, 1.00). Interaction between communication quantity and the intervention was examined. Intervention teens who reported more successful communication had a 42% lower Risky Driving Score (95% CI = 0.37, 0.94) than control parents with less successful communication. This program had a positive although not strong effect, and it may hold the most promise in partnership with other programs, such as Driver's Education or Graduated Driver's License policies. ClinicalTrials.gov NCT01014923. Registered Nov. 16, 2009.

  2. The enhancement of security in healthcare information systems.

    PubMed

    Liu, Chia-Hui; Chung, Yu-Fang; Chen, Tzer-Shyong; Wang, Sheng-De

    2012-06-01

    With the progress and the development of information technology, the internal data in medical organizations have become computerized and are further established the medical information system. Moreover, the use of the Internet enhances the information communication as well as affects the development of the medical information system that a lot of medical information is transmitted with the Internet. Since there is a network within another network, when all networks are connected together, they will form the "Internet". For this reason, the Internet is considered as a high-risk and public environment which is easily destroyed and invaded so that a relevant protection is acquired. Besides, the data in the medical network system are confidential that it is necessary to protect the personal privacy, such as electronic patient records, medical confidential information, and authorization-controlled data in the hospital. As a consequence, a medical network system is considered as a network requiring high security that excellent protections and managerial strategies are inevitable to prevent illegal events and external attacks from happening. This study proposes secure medical managerial strategies being applied to the network environment of the medical organization information system so as to avoid the external or internal information security events, allow the medical system to work smoothly and safely that not only benefits the patients, but also allows the doctors to use it more conveniently, and further promote the overall medical quality. The objectives could be achieved by preventing from illegal invasion or medical information being stolen, protecting the completeness and security of medical information, avoiding the managerial mistakes of the internal information system in medical organizations, and providing the highly-reliable medical information system.

  3. Safe biodegradable fluorescent particles

    DOEpatents

    Martin, Sue I [Berkeley, CA; Fergenson, David P [Alamo, CA; Srivastava, Abneesh [Santa Clara, CA; Bogan, Michael J [Dublin, CA; Riot, Vincent J [Oakland, CA; Frank, Matthias [Oakland, CA

    2010-08-24

    A human-safe fluorescence particle that can be used for fluorescence detection instruments or act as a safe simulant for mimicking the fluorescence properties of microorganisms. The particle comprises a non-biological carrier and natural fluorophores encapsulated in the non-biological carrier. By doping biodegradable-polymer drug delivery microspheres with natural or synthetic fluorophores, the desired fluorescence can be attained or biological organisms can be simulated without the associated risks and logistical difficulties of live microorganisms.

  4. Safe Haven.

    ERIC Educational Resources Information Center

    Bush, Gail

    2003-01-01

    Discusses school libraries as safe havens for teenagers and considers elements that foster that atmosphere, including the physical environment, lack of judgments, familiarity, leisure, and a welcoming nature. Focuses on the importance of relationships, and taking the time to listen to teens and encourage them. (LRW)

  5. Securing Sensitive Flight and Engine Simulation Data Using Smart Card Technology

    NASA Technical Reports Server (NTRS)

    Blaser, Tammy M.

    2003-01-01

    NASA Glenn Research Center has developed a smart card prototype capable of encrypting and decrypting disk files required to run a distributed aerospace propulsion simulation. Triple Data Encryption Standard (3DES) encryption is used to secure the sensitive intellectual property on disk pre, during, and post simulation execution. The prototype operates as a secure system and maintains its authorized state by safely storing and permanently retaining the encryption keys only on the smart card. The prototype is capable of authenticating a single smart card user and includes pre simulation and post simulation tools for analysis and training purposes. The prototype's design is highly generic and can be used to protect any sensitive disk files with growth capability to urn multiple simulations. The NASA computer engineer developed the prototype on an interoperable programming environment to enable porting to other Numerical Propulsion System Simulation (NPSS) capable operating system environments.

  6. Provision of safe domestic water for the promotion and protection of public health: a case study of the city of Beirut, Lebanon.

    PubMed

    Korfali, Samira Ibrahim; Jurdi, Mey

    2009-04-01

    Securing adequate safe drinking water and proper sanitation is a major challenge facing the developing world. The "Water for Life Decade" emphasizes the importance of upgrading national water quality and sanitation services. This study assessed the domestic water profile in the city of Beirut. Samples were collected from three types of household water sources (municipality, private wells, and vended water bottles) and assessed for their physiochemical and microbiological profile. At the same time, a cross-sectional survey assessing water consumption patterns and the prevalence of water-borne diseases was conducted. The results showed a deficient water quality profile in all three water sources. The measured physiochemical and bacteriological parameters reflected the high frequency of water-borne diseases. Action to secure a safe domestic water supply is essential. The plan should guarantee the protection of water sources, ensure sufficient treatment of domestic water and upgrade the national program for potable water quality control. Periodic quality monitoring and legislating the chaotic water-vending sector are indispensable. Additionally, the deterioration of private well sources by sea and wastewater infiltration necessitates the enforcement of legislation associated with the use and management of private wells. Consumer awareness and active contributions to promote and protect public health are important.

  7. More than a Safe Space

    ERIC Educational Resources Information Center

    Sadowski, Michael

    2016-01-01

    Over the past three decades, much of the conversation about LGBTQ students in schools has centered on safety--anti-bullying policies, the "safe space" of gay-straight alliances, and "safe zones" marked by rainbow-colored stickers on classroom doors. In this article, Michael Sadowski argues that it's time to move beyond safety…

  8. Control and Non-Payload Communications (CNPC) Prototype Radio - Generation 2 Security Architecture Lab Test Report

    NASA Technical Reports Server (NTRS)

    Iannicca, Dennis C.; McKim, James H.; Stewart, David H.; Thadhani, Suresh K.; Young, Daniel P.

    2015-01-01

    NASA Glenn Research Center, in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the FAA and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the current GRC prototype CNPC architecture as a demonstration platform. The security controls were integrated into a lab test bed mock-up of the Mobile IPv6 architecture currently being used for NASA flight testing, and a series of network tests were conducted to evaluate the security overhead of the controls compared to the baseline CNPC link without any security. The aim of testing was to evaluate the performance impact of the additional security control overhead when added to the Mobile IPv6 architecture in various modes of operation. The statistics collected included packet captures at points along the path to gauge packet size as the sample data traversed the CNPC network, round trip latency, jitter, and throughput. The effort involved a series of tests of the baseline link, a link with Robust Header Compression (ROHC) and without security controls, a link with security controls and without ROHC, and finally a link with both ROHC and security controls enabled. The effort demonstrated that ROHC is both desirable and necessary to offset the additional expected overhead of applying security controls to the CNPC link.

  9. Securing the User's Work Environment

    NASA Technical Reports Server (NTRS)

    Cardo, Nicholas P.

    2004-01-01

    High performance computing at the Numerical Aerospace Simulation Facility at NASA Ames Research Center includes C90's, J90's and Origin 2000's. Not only is it necessary to protect these systems from outside attacks, but also to provide a safe working environment on the systems. With the right tools, security anomalies in the user s work environment can be deleted and corrected. Validating proper ownership of files against user s permissions, will reduce the risk of inadvertent data compromise. The detection of extraneous directories and files hidden amongst user home directories is important for identifying potential compromises. The first runs of these utilities detected over 350,000 files with problems. With periodic scans, automated correction of problems takes only minutes. Tools for detecting these types of problems as well as their development techniques will be discussed with emphasis on consistency, portability and efficiency for both UNICOS and IRIX.

  10. KSC-04pd1653

    NASA Image and Video Library

    2004-08-05

    KENNEDY SPACE CENTER, FLA. - Dave Saleeba, assistant administrator with the Office of Security Management and Safeguards at NASA Headquarters, speaks to guests at the ribbon cutting for the Enhanced Firing Range on Schwartz Rd. at Kennedy Space Center. NASA’s Federal Law Enforcement Training Academy’s firing range has been upgraded to include a “rifle-grade” shoot house, a portable, tactical “shoot-back” trailer for cover and concealment drills, automated running targets and a new classroom facility. They are added to the existing three firearms ranges, “pistol-grade” shoot house, obstacle course and rappel tower. NASA’s Security Management and Safeguards Office funded the enhancements in order to improve ability to train the KSC security force and to support local, state and federal law enforcement agencies in Homeland Security.

  11. Evolution of the Hubble Space Telescope Safing Systems

    NASA Technical Reports Server (NTRS)

    Pepe, Joyce; Myslinski, Michael

    2006-01-01

    The Hubble Space Telescope (HST) was launched on April 24 1990, with an expected lifespan of 15 years. Central to the spacecraft design was the concept of a series of on-orbit shuttle servicing missions permitting astronauts to replace failed equipment, update the scientific instruments and keep the HST at the forefront of astronomical discoveries. One key to the success of the Hubble mission has been the robust Safing systems designed to monitor the performance of the observatory and to react to keep the spacecraft safe in the event of equipment anomaly. The spacecraft Safing System consists of a range of software tests in the primary flight computer that evaluate the performance of mission critical hardware, safe modes that are activated when the primary control mode is deemed inadequate for protecting the vehicle, and special actions that the computer can take to autonomously reconfigure critical hardware. The HST Safing System was structured to autonomously detect electrical power system, data management system, and pointing control system malfunctions and to configure the vehicle to ensure safe operation without ground intervention for up to 72 hours. There is also a dedicated safe mode computer that constantly monitors a keep-alive signal from the primary computer. If this signal stops, the safe mode computer shuts down the primary computer and takes over control of the vehicle, putting it into a safe, low-power configuration. The HST Safing system has continued to evolve as equipment has aged, as new hardware has been installed on the vehicle, and as the operation modes have matured during the mission. Along with the continual refinement of the limits used in the safing tests, several new tests have been added to the monitoring system, and new safe modes have been added to the flight software. This paper will focus on the evolution of the HST Safing System and Safing tests, and the importance of this evolution to prolonging the science operations of the

  12. Good Manufacturing Practices (GMP) / Good Laboratory Practices (GLP) Review and Applicability for Chemical Security Enhancements

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Iveson, Steven W.

    Global chemical security has been enhanced through the determined use and integration of both voluntary and legislated standards. Many popular standards contain components that specifically detail requirements for the security of materials, facilities and other vital assets. In this document we examine the roll of quality management standards and how they affect the security culture within the institutions that adopt these standards in order to conduct business within the international market place. Good manufacturing practices and good laboratory practices are two of a number of quality management systems that have been adopted as law in many nations. These standards aremore » designed to protect the quality of drugs, medicines, foods and analytical test results in order to provide the world-wide consumer with safe and affective products for consumption. These standards provide no established security protocols and yet manage to increase the security of chemicals, materials, facilities and the supply chain via the effective and complete control over the manufacturing, the global supply chains and testing processes. We discuss the means through which these systems enhance security and how nations can further improve these systems with additional regulations that deal specifically with security in the realm of these management systems. We conclude with a discussion of new technologies that may cause disruption within the industries covered by these standards and how these issues might be addressed in order to maintain or increase the level of security within the industries and nations that have adopted these standards.« less

  13. Managing Cassini Safe Mode Attitude at Saturn

    NASA Technical Reports Server (NTRS)

    Burk, Thomas A.

    2010-01-01

    The Cassini spacecraft was launched on October 15, 1997 and arrived at Saturn on June 30, 2004. It has performed detailed observations and remote sensing of Saturn, its rings, and its satellites since that time. In the event safe mode interrupts normal orbital operations, Cassini has flight software fault protection algorithms to detect, isolate, and recover to a thermally safe and commandable attitude and then wait for further instructions from the ground. But the Saturn environment is complex, and safety hazards change depending on where Cassini is in its orbital trajectory around Saturn. Selecting an appropriate safe mode attitude that insures safe operation in the Saturn environment, including keeping the star tracker field of view clear of bright bodies, while maintaining a quiescent, commandable attitude, is a significant challenge. This paper discusses the Cassini safe table management strategy and the key criteria that must be considered, especially during low altitude flybys of Titan, in deciding what spacecraft attitude should be used in the event of safe mode.

  14. Cyber secure systems approach for NPP digital control systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McCreary, T. J.; Hsu, A.

    2006-07-01

    Whether fossil or nuclear power, the chief operations goal is to generate electricity. The heart of most plant operations is the I and C system. With the march towards open architecture, the I and C system is more vulnerable than ever to system security attacks (denial of service, virus attacks and others), thus jeopardizing plant operations. Plant staff must spend large amounts of time and money setting up and monitoring a variety of security strategies to counter the threats and actual attacks to the system. This time and money is a drain on the financial performance of a plant andmore » distracts valuable operations resources from their real goals: product. The pendulum towards complete open architecture may have swung too far. Not all aspects of proprietary hardware and software are necessarily 'bad'. As the aging U.S. fleet of nuclear power plants starts to engage in replacing legacy control systems, and given the on-going (and legitimate) concern about the security of present digital control systems, decisions about how best to approach cyber security are vital to the specification and selection of control system vendors for these upgrades. The authors maintain that utilizing certain resources available in today's digital technology, plant control systems can be configured from the onset to be inherently safe, so that plant staff can concentrate on the operational issues of the plant. The authors postulate the concept of the plant I and C being bounded in a 'Cyber Security Zone' and present a design approach that can alleviate the concern and cost at the plant level of dealing with system security strategies. Present approaches through various IT cyber strategies, commercial software, and even postulated standards from various industry/trade organizations are almost entirely reactive and simply add to cost and complexity. This Cyber Security Zone design demonstrates protection from the four classes of cyber security attacks: 1)Threat from an intruder

  15. Aware, motivated and striving for a ‘safe tan’: an exploratory mixed-method study of sun-protection during holidays

    PubMed Central

    Rodrigues, Angela M.; Sniehotta, Falko F.; Birch-Machin, Mark A.; Araujo-Soares, Vera

    2017-01-01

    ABSTRACT Background: This article presents an exploratory study, aiming to explore the correspondence between knowledge, motivation and sun-protection practices during holidays. Methods: Seventeen participants aged 21–62 years old, recruited from community settings took part in individual face-to-face semi-structured interviews, completed sun sensitivity questions and an objective assessment of sunscreen use. Holidaymakers’ knowledge about sun-safe messages, intentions and perceptions of barriers and facilitators for sun-protection were assessed. Qualitative data were analysed using thematic analysis and integrated with quantitative data, using a pragmatic theory-informed approach to synthesise the findings. Results: Participants were well informed about sun-safe messages, highly motivated to protect themselves from solar UV radiation (UVR) and they perceived themselves as well protected. However, they did not seem to use effective protective practices. Sunscreen was the preferred method of sun-protection, but most participants used considerably less than the recommended amount and significantly overestimated the amount of time they could be safely exposed. Seeking shade was the least used method of sun-protection and covering-up strategies were mostly implemented as a partial protection (i.e. hats or sunglasses). The desire to reach an optimal balance between getting a tan and using sun-protection to avoid sunburns was preeminent. Several additional barriers and facilitators for sun-protection were identified. Conclusions: Holidaymakers might have a false sense of security when it comes to sun-exposure. They are aware of the need to protect from solar UVR, but the motive for a safe tan, the overreliance on sunscreen, the overestimation of the safe sun-exposure time for their skin type and the insufficient application of sunscreen leaves holidaymakers motivated to protect their skin at significant risk of overexposure, sunburn and skin cancer. Public health

  16. "Safe Schools within Safe Communities: A Regional Summit in the Heartland." Policy Briefs Special Report.

    ERIC Educational Resources Information Center

    Huertas, Aurelio, Jr.; Sullivan, Carol

    This report documents the proceedings of a regional policy seminar hosted by the Iowa Department of Education with support from the North Central Regional Educational Laboratory (NCREL) and the Midwest Regional Center for Drug-Free Schools and Communities (MRC). The seminar, "Safe Schools Within Safe Communities," was held on September 19-20,…

  17. Safe Use Practices for Pesticides

    Science.gov Websites

    ; Environment Human Health Animal Health Safe Use Practices Food Safety Environment Air Water Soil Wildlife Ingredients Low-Risk Pesticides Organic Pesticide Ingredients Pesticide Incidents Human Exposure Pet Exposure Home Page Pesticide Health and Safety Information Safe Use Practices for Pesticides Related Topics

  18. Is Prevent a Safe Space?

    ERIC Educational Resources Information Center

    Ramsay, Peter

    2017-01-01

    In this article, I test the claims of the UK government and universities that the Prevent programme aims to create a safe space for the discussion of "extremist" ideas in universities. I do this by comparing the main elements of the Prevent duty that has been imposed on universities with those of safe spaces as imagined by student…

  19. 75 FR 29391 - National Safe Boating Week, 2010

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-26

    ... Safe Boating Week, 2010 By the President of the United States of America A Proclamation Our Nation's... National Safe Boating Week to practicing safe techniques so boaters of all ages can enjoy this pastime... annually the 7-day period prior to Memorial Day weekend as ``National Safe Boating Week.'' NOW, THEREFORE...

  20. Military Review: The Professional Journal of the U.S. Army, June 2008. Special Edition: Interagency Reader

    DTIC Science & Technology

    2008-06-01

    Company for Mechanical Ind. - Trailers , Taji 12. Nassr State Company for Mechanical Ind. - Foundry, Taji 13. Nassr State Company for Mechanical Ind...Initiatives (oTI).44 Prior to military operations in Afghanistan and Iraq, the DG worked primarily in transitional countries that had secure, receptive ...April 2002 Zogby International survey (mentioned in the GAo report) showing that Arabs and muslims had a favorable view of American movies , television

  1. 30 CFR 77.312 - Fail safe monitoring systems.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Fail safe monitoring systems. 77.312 Section 77... Thermal Dryers § 77.312 Fail safe monitoring systems. Thermal dryer systems and controls shall be protected by a fail safe monitoring system which will safely shut down the system and any related equipment...

  2. 30 CFR 77.312 - Fail safe monitoring systems.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 1 2011-07-01 2011-07-01 false Fail safe monitoring systems. 77.312 Section 77... Thermal Dryers § 77.312 Fail safe monitoring systems. Thermal dryer systems and controls shall be protected by a fail safe monitoring system which will safely shut down the system and any related equipment...

  3. 30 CFR 77.312 - Fail safe monitoring systems.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Fail safe monitoring systems. 77.312 Section 77... Thermal Dryers § 77.312 Fail safe monitoring systems. Thermal dryer systems and controls shall be protected by a fail safe monitoring system which will safely shut down the system and any related equipment...

  4. 30 CFR 77.312 - Fail safe monitoring systems.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Fail safe monitoring systems. 77.312 Section 77... Thermal Dryers § 77.312 Fail safe monitoring systems. Thermal dryer systems and controls shall be protected by a fail safe monitoring system which will safely shut down the system and any related equipment...

  5. 30 CFR 77.312 - Fail safe monitoring systems.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 1 2013-07-01 2013-07-01 false Fail safe monitoring systems. 77.312 Section 77... Thermal Dryers § 77.312 Fail safe monitoring systems. Thermal dryer systems and controls shall be protected by a fail safe monitoring system which will safely shut down the system and any related equipment...

  6. 29 CFR 1915.15 - Maintenance of safe conditions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Enclosed Spaces and Other Dangerous Atmospheres in Shipyard Employment § 1915.15 Maintenance of safe... into spaces that have been certified “Safe for Workers” or “Safe for Hot Work” shall be disconnected... certificates. A competent person shall visually inspect and test each space certified as “Safe for Workers” or...

  7. 29 CFR 1915.15 - Maintenance of safe conditions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Enclosed Spaces and Other Dangerous Atmospheres in Shipyard Employment § 1915.15 Maintenance of safe... into spaces that have been certified “Safe for Workers” or “Safe for Hot Work” shall be disconnected... certificates. A competent person shall visually inspect and test each space certified as “Safe for Workers” or...

  8. Staying Healthy and Safe at Work

    MedlinePlus

    ... The Prematurity Campaign About us Annual report Our work Community impact Global programs Research Need help? Frequently ... safe at work Staying healthy and safe at work E-mail to a friend Please fill in ...

  9. Comparison of the classic TVT and TVT-Secur.

    PubMed

    Abduljabbar, H S O; Al-Shamrany, H M A; Al-Basri, S F; Abduljabar, H H; Tawati, D A; Owidhah, S P

    2013-01-01

    Tension-free vaginal tape (TVT) is a well-established surgical procedure for the treatment of female stress urinary incontinence (SUI) and TVT-Secur was designed to reduce the undesired complications and to minimize the operative procedure as much as possible. To present the authors' experience in using the classic TVT and TVT-Secur and to evaluate and compare complications and short- and long-term results. A retrospective study and analysis of 230 patients presented with SUI at King Abdulaziz University Hospital (KAUH) and United Doctor Hospital (UDH) from March 1, 2007 until July 3, 2010. Classical TVT and TVT-Secur with or without associated operation were performed. All patients were controlled at six months and complications, as well as objective results, have been reported. The study was approved by ethical committee of KAUH. All patients with SUI admitted to KAUH and UDH for sub-urethral tape were analyzed (230 patients); 149 had classical TVT and 81 had TVT-Secur. Their age ranged from 30 years to 73 years with a mean of 49.8 years and std of 9.4. Their parity ranged from two to 15 with a mean of 6.2 and std of 2.4. One hundred eighty patients had SUI and 50 patients had mixed incontinence. The type of anesthesia used was general anesthesia in 69.6% (160) of cases and regional anesthesia in form of epidural or spine in 30.4% (70) of cases. Operative complications revealed a bladder perforation in 3.5% (eight) of cases and 2.2% had bleeding of more than 200 ml, and 53 patients which contribute to 23% had retention and required a catheter for 48 hours or more. After three months, it was observed that erosion of the mesh occurred in three cases. Fourteen cases (7%) continue to have SUI failure rate. The classical TVT and TVT-Secur were found to be very effective, easy, and safe procedures and with excellent results.

  10. 33 CFR 83.06 - Safe speed (Rule 6).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Safe speed (Rule 6). 83.06... Safe speed (Rule 6). Every vessel shall at all times proceed at a safe speed so that she can take... prevailing circumstances and conditions. In determining a safe speed the following factors shall be among...

  11. 33 CFR 83.06 - Safe speed (Rule 6).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Safe speed (Rule 6). 83.06... Safe speed (Rule 6). Every vessel shall at all times proceed at a safe speed so that she can take... prevailing circumstances and conditions. In determining a safe speed the following factors shall be among...

  12. Pressurized Lunar Rover (PLR)

    NASA Astrophysics Data System (ADS)

    Creel, Kenneth; Frampton, Jeffrey; Honaker, David; McClure, Kerry; Zeinali, Mazyar; Bhardwaj, Manoj; Bulsara, Vatsal; Kokan, David; Shariff, Shaun; Svarverud, Eric

    The objective of this project was to design a manned pressurized lunar rover (PLR) for long-range transportation and for exploration of the lunar surface. The vehicle must be capable of operating on a 14-day mission, traveling within a radius of 500 km during a lunar day or within a 50-km radius during a lunar night. The vehicle must accommodate a nominal crew of four, support two 28-hour EVA's, and in case of emergency, support a crew of six when near the lunar base. A nominal speed of ten km/hr and capability of towing a trailer with a mass of two mt are required. Two preliminary designs have been developed by two independent student teams. The PLR 1 design proposes a seven meter long cylindrical main vehicle and a trailer which houses the power and heat rejection systems. The main vehicle carries the astronauts, life support systems, navigation and communication systems, lighting, robotic arms, tools, and equipment for exploratory experiments. The rover uses a simple mobility system with six wheels on the main vehicle and two on the trailer. The nonpressurized trailer contains a modular radioisotope thermoelectric generator (RTG) supplying 6.5 kW continuous power. A secondary energy storage for short-term peak power needs is provided by a bank of lithium-sulfur dioxide batteries. The life support system is partly a regenerative system with air and hygiene water being recycled. A layer of water inside the composite shell surrounds the command center allowing the center to be used as a safe haven during solar flares. The PLR 1 has a total mass of 6197 kg. It has a top speed of 18 km/hr and is capable of towing three metric tons, in addition to the RTG trailer. The PLR 2 configuration consists of two four-meter diameter, cylindrical hulls which are passively connected by a flexible passageway, resulting in the overall vehicle length of 11 m. The vehicle is driven by eight independently suspended wheels. The dual-cylinder concept allows articulated as well as double

  13. Pressurized Lunar Rover (PLR)

    NASA Technical Reports Server (NTRS)

    Creel, Kenneth; Frampton, Jeffrey; Honaker, David; Mcclure, Kerry; Zeinali, Mazyar; Bhardwaj, Manoj; Bulsara, Vatsal; Kokan, David; Shariff, Shaun; Svarverud, Eric

    1992-01-01

    The objective of this project was to design a manned pressurized lunar rover (PLR) for long-range transportation and for exploration of the lunar surface. The vehicle must be capable of operating on a 14-day mission, traveling within a radius of 500 km during a lunar day or within a 50-km radius during a lunar night. The vehicle must accommodate a nominal crew of four, support two 28-hour EVA's, and in case of emergency, support a crew of six when near the lunar base. A nominal speed of ten km/hr and capability of towing a trailer with a mass of two mt are required. Two preliminary designs have been developed by two independent student teams. The PLR 1 design proposes a seven meter long cylindrical main vehicle and a trailer which houses the power and heat rejection systems. The main vehicle carries the astronauts, life support systems, navigation and communication systems, lighting, robotic arms, tools, and equipment for exploratory experiments. The rover uses a simple mobility system with six wheels on the main vehicle and two on the trailer. The nonpressurized trailer contains a modular radioisotope thermoelectric generator (RTG) supplying 6.5 kW continuous power. A secondary energy storage for short-term peak power needs is provided by a bank of lithium-sulfur dioxide batteries. The life support system is partly a regenerative system with air and hygiene water being recycled. A layer of water inside the composite shell surrounds the command center allowing the center to be used as a safe haven during solar flares. The PLR 1 has a total mass of 6197 kg. It has a top speed of 18 km/hr and is capable of towing three metric tons, in addition to the RTG trailer. The PLR 2 configuration consists of two four-meter diameter, cylindrical hulls which are passively connected by a flexible passageway, resulting in the overall vehicle length of 11 m. The vehicle is driven by eight independently suspended wheels. The dual-cylinder concept allows articulated as well as double

  14. Realistic Testing of the Safe Affordable Fission Engine (SAFE-100) Thermal Simulator Using Fiber Bragg Gratings

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stinson-Bagby, Kelly L.; Fielder, Robert S.; Van Dyke, Melissa K.

    2004-02-04

    The motivation for the reported research was to support NASA space nuclear power initiatives through the development of advanced fiber optic sensors for space-based nuclear power applications. Distributed high temperature measurements were made with 20 FBG temperature sensors installed in the SAFE-100 thermal simulator at the NASA Marshal Space Flight Center. Experiments were performed at temperatures approaching 800 deg. C and 1150 deg. C for characterization studies of the SAFE-100 core. Temperature profiles were successfully generated for the core during temperature increases and decreases. Related tests in the SAFE-100 successfully provided strain measurement data.

  15. 75 FR 1734 - Children’s Online Privacy Protection Rule Safe Harbor Proposed Self-Regulatory Guidelines; i-SAFE...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-13

    ...The Federal Trade Commission publishes this notice and request for public comment concerning proposed self-regulatory guidelines submitted by i-SAFE, Inc. under the safe harbor provision of the Children's Online Privacy Protection Rule.

  16. Curiosity's Autonomous Surface Safing Behavior Design

    NASA Technical Reports Server (NTRS)

    Neilson, Tracy A.; Manning, Robert M.

    2013-01-01

    The safing routines on all robotic deep-space vehicles are designed to put the vehicle in a power and thermally safe configuration, enabling communication with the mission operators on Earth. Achieving this goal is made a little more difficult on Curiosity because the power requirements for the core avionics and the telecommunication equipment exceed the capability of the single power source, the Multi-Mission Radioisotope Thermoelectric Generator. This drove the system design to create an operational mode, called "sleep mode", where the vehicle turns off most of the loads in order to charge the two Li-ion batteries. The system must keep the vehicle safe from over-heat and under-heat conditions, battery cell failures, under-voltage conditions, and clock failures, both while the computer is running and while the system is sleeping. The other goal of a safing routine is to communicate. On most spacecraft, this simply involves turning on the receiver and transmitter continuously. For Curiosity, Earth is above the horizon only a part of the day for direct communication to the Earth, and the orbiter overpass opportunities only occur a few times a day. The design must robustly place the Rover in a communicable condition at the correct time. This paper discusses Curiosity's autonomous safing behavior and describes how the vehicle remains power and thermally safe while sleeping, as well as a description of how the Rover communicates with the orbiters and Earth at specific times.

  17. 33 CFR 62.27 - Safe water marks.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Safe water marks. 62.27 Section... UNITED STATES AIDS TO NAVIGATION SYSTEM The U.S. Aids to Navigation System § 62.27 Safe water marks. Safe water marks indicate that there is navigable water all around the mark. They are often used to indicate...

  18. 33 CFR 62.27 - Safe water marks.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Safe water marks. 62.27 Section... UNITED STATES AIDS TO NAVIGATION SYSTEM The U.S. Aids to Navigation System § 62.27 Safe water marks. Safe water marks indicate that there is navigable water all around the mark. They are often used to indicate...

  19. 33 CFR 62.27 - Safe water marks.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Safe water marks. 62.27 Section... UNITED STATES AIDS TO NAVIGATION SYSTEM The U.S. Aids to Navigation System § 62.27 Safe water marks. Safe water marks indicate that there is navigable water all around the mark. They are often used to indicate...

  20. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gordon, S.

    During the period from fiscal year (FY) 2009 to FY 2011, there were a total of 21 incidents involving radioactively contaminated shipment trailers and 9 contaminated waste packages received at the Nevada National Security Site (NNSS) Area 5 Radioactive Waste Management Site (RWMS). During this time period, the EnergySolutions (ES) Clive, Utah, disposal facility had a total of 18 similar incidents involving trailer and package contamination issues. As a result of the increased occurrence of such incidents, DOE Environmental Management Headquarters (EM/HQ) Waste Management organization (EM-30) requested that the Energy Facility Contractors’ Group (EFCOG) Waste Management Working Group (WMWG) conductmore » a detailed review of these incidents and report back to EM-30 regarding the results of this review, including providing any recommendations formulated as a result of the evaluation of current site practices involving handling and management of radioactive material and waste shipments.« less

  1. Removing Hair Safely

    MedlinePlus

    ... For Consumers Home For Consumers Consumer Updates Removing Hair Safely Share Tweet Linkedin Pin it More sharing ... related to common methods of hair removal. Laser Hair Removal In this method, a laser destroys hair ...

  2. A fail-safe CMOS logic gate

    NASA Technical Reports Server (NTRS)

    Bobin, V.; Whitaker, S.

    1990-01-01

    This paper reports a design technique to make Complex CMOS Gates fail-safe for a class of faults. Two classes of faults are defined. The fail-safe design presented has limited fault-tolerance capability. Multiple faults are also covered.

  3. Safe mobility for older people notebook

    DOT National Transportation Integrated Search

    1999-04-01

    The Safe Mobility for Older People Notebook is a research product of the "Model Driver Screening and Evaluation Program" project sponsored by NHTSA, and is intended as a resource to support program initiatives promoting the safe mobility of older per...

  4. Beyond climate-smart agriculture: toward safe operating spaces for global food systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gulledge, Jay; Neufeldt, Heinrich; Jahn, Margaret M

    Agriculture is considered to be climate-smart when it contributes to increasing food security, adaptation and mitigation in a sustainable way. This new concept now dominates current discussions in agricultural development because of its capacity to unite the agendas of the agriculture, development and climate change communities under one brand. In this opinion piece authored by scientists from a variety of international agricultural and climate research communities, we argue that the concept needs to be evaluated critically because the relationship between the three dimensions is poorly understood, such that practically any improved agricultural practice can be considered climate-smart. This lack ofmore » clarity may have contributed to the broad appeal of the concept. From the understanding that we must hold ourselves accountable to demonstrably better meet human needs in the short and long term within foreseeable local and planetary limits, we develop a conceptualization of climate-smart agriculture as agriculture that can be shown to bring us closer to safe operating spaces for agricultural and food systems across spatial and temporal scales. Improvements in the management of agricultural systems that bring us significantly closer to safe operating spaces will require transformations in governance and use of our natural resources, underpinned by enabling political, social and economic conditions beyond incremental changes. Establishing scientifically credible indicators and metrics of long-term safe operating spaces in the context of a changing climate and growing social-ecological challenges is critical to creating the societal demand and political will required to motivate deep transformations. Answering questions on how the needed transformational change can be achieved will require actively setting and testing hypotheses to refine and characterize our concepts of safer spaces for social-ecological systems across scales. This effort will demand prioritizing

  5. Security Implications of Physical Design Attributes in the Emergency Department.

    PubMed

    Pati, Debajyoti; Pati, Sipra; Harvey, Thomas E

    2016-07-01

    Security, a subset of safety, is equally important in the efficient delivery of patient care. The emergency department (ED) is susceptible to violence creating concerns for the safety and security of patients, staff, and visitors and for the safe and efficient delivery of care. Although there is an implicit and growing recognition of the role of the physical environment, interventions typically have been at the microlevel. The objective of this study was to identify physical design attributes that potentially influence safety and efficiency of ED operations. An exploratory, qualitative research design was adopted to examine the efficiency and safety correlates of ED physical design attributes. The study comprised a multimeasure approach involving multidisciplinary gaming, semistructured interviews, and touring interviews of frontline staff in four EDs at three hospital systems across three states. Five macro physical design attributes (issues that need to be addressed at the design stage and expensive to rectify once built) emerged from the data as factors substantially associated with security issues. They are design issues pertaining to (a) the entry zone, (b) traffic management, (c) patient room clustering, (d) centralization versus decentralization, and (e) provisions for special populations. Data from this study suggest that ED security concerns are generally associated with three sources: (a) gang-related violence, (b) dissatisfied patients, and (c) behavioral health patients. Study data show that physical design has an important role in addressing the above-mentioned concerns. Implications for ED design are outlined in the article. © The Author(s) 2016.

  6. KSC-04pd1652

    NASA Image and Video Library

    2004-08-05

    KENNEDY SPACE CENTER, FLA. - Brig. Gen. J. Gregory Pavlovich, 45th Space Wing, addresses guests at the ribbon cutting for the Enhanced Firing Range on Schwartz Rd. at Kennedy Space Center. NASA’s Federal Law Enforcement Training Academy’s firing range has been upgraded to include a “rifle-grade” shoot house, a portable, tactical “shoot-back” trailer for cover and concealment drills, automated running targets and a new classroom facility. They are added to the existing three firearms ranges, “pistol-grade” shoot house, obstacle course and rappel tower. NASA’s Security Management and Safeguards Office funded the enhancements in order to improve ability to train the KSC security force and to support local, state and federal law enforcement agencies in Homeland Security.

  7. KSC-04pd1657

    NASA Image and Video Library

    2004-08-05

    KENNEDY SPACE CENTER, FLA. - At the ribbon cutting for the Enhanced Firing Range on Schwartz Rd. at Kennedy Space Center, a SWAT team demonstrates use of the facility. NASA’s Federal Law Enforcement Training Academy’s firing range has been upgraded to include a “rifle-grade” shoot house, a portable, tactical “shoot-back” trailer for cover and concealment drills, automated running targets and a new classroom. They are added to the existing three firearms ranges, “pistol-grade” shoot house, obstacle course and rappel tower. NASA’s Security Management and Safeguards Office funded the enhancements in order to improve ability to train the KSC security force and to support local, state and federal law enforcement agencies in Homeland Security.

  8. KSC-04pd1656

    NASA Image and Video Library

    2004-08-05

    KENNEDY SPACE CENTER, FLA. - At the ribbon cutting for the Enhanced Firing Range on Schwartz Rd. at Kennedy Space Center, Center Director Jim Kennedy practices firing on the new range. NASA’s Federal Law Enforcement Training Academy’s firing range has been upgraded to include a “rifle-grade” shoot house, a portable, tactical “shoot-back” trailer for cover and concealment drills, automated running targets and a new classroom facility. They are added to the existing three firearms ranges, “pistol-grade” shoot house, obstacle course and rappel tower. NASA’s Security Management and Safeguards Office funded the enhancements in order to improve ability to train the KSC security force and to support local, state and federal law enforcement agencies in Homeland Security.

  9. KSC-04pd1651

    NASA Image and Video Library

    2004-08-05

    KENNEDY SPACE CENTER, FLA. - Center Director Jim Kennedy addresses guests at the ribbon cutting for the Enhanced Firing Range on Schwartz Rd. at Kennedy Space Center. NASA’s Federal Law Enforcement Training Academy’s firing range has been upgraded to include a “rifle-grade” shoot house, a portable, tactical “shoot-back” trailer for cover and concealment drills, automated running targets and a new classroom facility. They are added to the existing three firearms ranges, “pistol-grade” shoot house, obstacle course and rappel tower. NASA’s Security Management and Safeguards Office funded the enhancements in order to improve ability to train the KSC security force and to support local, state and federal law enforcement agencies in Homeland Security.

  10. Developing Safe Schools Partnerships with Law Enforcement

    ERIC Educational Resources Information Center

    Rosiak, John

    2009-01-01

    Safe schools are the concern of communities throughout the world. If a school is safe, and if children feel safe, students "are better able to learn. But what are the steps to make" this happen? First, it is important to understand the problem: What are the threats to school safety? These include crime-related behaviors that find their way to…

  11. 77 FR 19963 - Special Local Regulation and Security Zone: War of 1812 Bicentennial Commemoration, Port of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-03

    ...The Coast Guard proposes to adopt a temporary special local regulation and temporary security zones, during, and after the War of 1812 Bicentennial Commemoration events in the Port of Boston, Massachusetts, to be held between June 28, 2012 and July 6, 2012. These regulations are necessary to promote the safe navigation of vessels and the safety of life and property during the heavy volume of vessel traffic expected during this event.

  12. Airway management through submental derivation: a safe and easily reproduced alternative for patients with complex facial trauma

    PubMed Central

    2018-01-01

    Objectives Airway management in patients with panfacial trauma is complicated. In addition to involving facial lesions, such trauma compromises the airway, and the use of intermaxillary fixation makes it difficult to secure ventilation by usual approaches (nasotracheal or endotracheal intubation). Submental airway derivation is an alternative to tracheostomy and nasotracheal intubation, allowing a permeable airway with minimal complications in complex patients. Materials and Methods This is a descriptive, retrospective study based on a review of medical records of all patients with facial trauma from January 2003 to May 2015. In total, 31 patients with complex factures requiring submental airway derivation were included. No complications such as bleeding, infection, vascular, glandular, or nervous lesions were presented in any of the patients. Results The use of submental airway derivation is a simple, safe, and easy method to ensure airway management. Moreover, it allows an easier reconstruction. Conclusion Based on these results, we concluded that, if the relevant steps are followed, the use of submental intubation in the treatment of patients with complex facial trauma is a safe and effective option. PMID:29535964

  13. Safe haven laws as crime control theater.

    PubMed

    Hammond, Michelle; Miller, Monica K; Griffin, Timothy

    2010-07-01

    This article examines safe haven laws, which allow parents to legally abandon their infants. The main objective is to determine whether safe haven laws fit the criteria of crime control theater, a term used to describe public policies that produce the appearance, but not the effect, of crime control, and as such are essentially socially constructed "solutions" to socially constructed crime "problems." The analysis will apply the principles of crime control theater to safe haven laws. Specifically, the term crime control theater applies to laws that are reactionary responses to perceived criminal threats and are often widely supported as a way to address the crime in question. Such laws are attractive because they appeal to mythic narratives (i.e., saving an innocent child from a predator); however they are likely ineffective due to the complexity of the crime. These laws can have deleterious effects when policymakers make false claims of success and stunt public discourse (e.g., drawing attention away from more frequent and preventable crimes). This analysis applies these criteria to safe haven laws to determine whether such laws can be classified as crime control theater. Many qualities inherent to crime control theater are present in safe haven laws. For example, the laws are highly publicized, their intentions lack moral ambiguity, rare cases of success legitimize law enforcement and other agencies, and they appeal to the public sense of responsibility in preventing crime. Yet the goal of saving infant lives may be unattainable. These qualities make the effectiveness of the laws questionable and suggest they may be counterproductive. This analysis determined that safe haven laws are socially constructed solutions to the socially constructed problem of child abandonment. Safe haven laws are appropriately classified as crime control theater. It is imperative that further research be conducted to examine the effectiveness and collateral effects of safe haven laws

  14. Safe Sleep Practices of Kansas Birthing Hospitals

    PubMed Central

    Ahlers-Schmidt, Carolyn R.; Schunn, Christy; Sage, Cherie; Engel, Matthew; Benton, Mary

    2018-01-01

    Background Sleep-related death is tied with congenital anomalies as the leading cause of infant mortality in Kansas, and external risk factors are present in 83% of these deaths. Hospitals can impact caregiver intentions to follow risk-reduction strategies. This project assessed the current practices and policies of Kansas hospitals with regard to safe sleep. Methods A cross-sectional survey of existing safe sleep practices and policies in Kansas hospitals was performed. Hospitals were categorized based on reported delivery volume and data were compared across hospital sizes. Results Thirty-one of 73 (42%) contacted hospitals responded. Individual survey respondents represented various hospital departments including newborn/well-baby (68%), neonatal intensive care unit (3%) and other non-nursery departments or administration (29%). Fifty-eight percent of respondents reported staff were trained on infant safe sleep; 44% of these held trainings annually. High volume hospitals tended to have more annual training than low or mid volume birth hospitals. Thirty-nine percent reported a safe sleep policy, though most of these (67%) reported never auditing compliance. The top barrier to safe sleep education, regardless of delivery volume, was conflicting patient and family member beliefs. Conclusions Hospital promotion of infant safe sleep is being conducted in Kansas to varying degrees. High and mid volume birth hospitals may need to work more on formal auditing of safe sleep practices, while low volume hospitals may need more staff training. Low volume hospitals also may benefit from access to additional caregiver education materials. Finally, it is important to note hospitals should not be solely responsible for safe sleep education. PMID:29844848

  15. Homeland Security

    EPA Pesticide Factsheets

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  16. Using Medications Safely

    MedlinePlus

    ... health systems play an important role in preventing medication errors. To make sure you use medicines safely and effectively, ASHP recommends that you: Keep a list of all medications that you take (prescribed drugs, nonprescription medicines, herbal ...

  17. A new Subcutaneously Anchored Device for Securing External Cerebrospinal Fluid Catheters: our Preliminary Experience.

    PubMed

    Frassanito, Paolo; Massimi, Luca; Tamburrini, Gianpiero; Pittiruti, Mauro; Doglietto, Francesco; Nucci, Carlotta Ginevra; Caldarelli, Massimo

    2016-09-01

    Accidental dislocation or removal is a well-known complication of external cerebrospinal fluid (CSF) drainage in daily clinical practice. At present, no data about the incidence of such complications are available in the scientific literature. SecurAcath (Interrad Medical, Plymouth, Minnesota, USA) is a subcutaneously anchored device recently adopted for securement of central venous catheters, known to be highly effective (and cost-effective) in reducing the risk of catheter dislodgement and/or accidental removal. We report our preliminary experience with the use of SecurAcath to secure CSF drainage, either ventricular or spinal, to the skin. SecurAcath was used in 29 consecutive patients (age range: 3 weeks-16 years, median age 6.3 years). In particular, the device was used for 25 ventricular catheters (a patient received 2 catheters in the same procedure for bilateral brain abscess) and 5 spinal drainages. Period in place ranged from 1-4 weeks (median 22 days). No complication related to the use of the device was observed, in particular there was no case of dislocation or accidental removal of the catheter. The removal procedure was extremely easy. The device has proven its utility also in 3 cases requiring an adjustment of the length of the catheter. In our experience, SecurAcath is a safe and effective device to secure CSF external catheters to the skin, with several relevant advantages: its placement and maintenance are easy; it may stay in place for the entire duration of the catheter; it allows a more complete antisepsis of the exit site, thus reducing local skin complications; it eliminates the risk of suture-related needlestick injuries. Copyright © 2016 Elsevier Inc. All rights reserved.

  18. Secure Objectives for School Security

    ERIC Educational Resources Information Center

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  19. Managing drugs safely.

    PubMed

    van den Anker, John N

    2005-02-01

    There is hard data to show that newborn infants are more likely than adults to experience adverse reactions to drugs. Paradoxically, drug-related legislation to ensure safe and effective drug use in humans neglected neonates until 2002, when the Best Pharmaceuticals Act for Children was signed into law in the USA. The situation for neonates should now catch up with that for adults and neonates will be prescribed more licensed drugs in the near future. If we are to be able to analyze the underlying system errors to improve the safe use of drugs in the studied patient population, reporting of adverse drug events and reactions needs to happen in a blame free environment. In addition, computerized physician order entry will certainly further improve the current situation by preventing errors in ordering, transcribing, verifying, and transmitting medication orders.

  20. Sandia National Laboratories: National Security Missions: Global Security

    Science.gov Websites

    Involvement News News Releases Media Contacts & Resources Lab News Image Gallery Publications Annual Library Events Careers View All Jobs Students & Postdocs Internships & Co-ops Fellowships Security Image Cyber and Infrastructure Security Advanced analyses and technologies for securing the

  1. An Automated Safe-to-Mate (ASTM) Tester

    NASA Technical Reports Server (NTRS)

    Nguyen, Phuc; Scott, Michelle; Leung, Alan; Lin, Michael; Johnson, Thomas

    2013-01-01

    Safe-to-mate testing is a common hardware safety practice where impedance measurements are made on unpowered hardware to verify isolation, continuity, or impedance between pins of an interface connector. A computer-based instrumentation solution has been developed to resolve issues. The ASTM is connected to the circuit under test, and can then quickly, safely, and reliably safe-to-mate the entire connector, or even multiple connectors, at the same time.

  2. Translational repression of the Drosophila nanos mRNA involves the RNA helicase Belle and RNA coating by Me31B and Trailer hitch.

    PubMed

    Götze, Michael; Dufourt, Jérémy; Ihling, Christian; Rammelt, Christiane; Pierson, Stephanie; Sambrani, Nagraj; Temme, Claudia; Sinz, Andrea; Simonelig, Martine; Wahle, Elmar

    2017-10-01

    Translational repression of maternal mRNAs is an essential regulatory mechanism during early embryonic development. Repression of the Drosophila nanos mRNA, required for the formation of the anterior-posterior body axis, depends on the protein Smaug binding to two Smaug recognition elements (SREs) in the nanos 3' UTR. In a comprehensive mass spectrometric analysis of the SRE-dependent repressor complex, we identified Smaug, Cup, Me31B, Trailer hitch, eIF4E, and PABPC, in agreement with earlier data. As a novel component, the RNA-dependent ATPase Belle (DDX3) was found, and its involvement in deadenylation and repression of nanos was confirmed in vivo. Smaug, Cup, and Belle bound stoichiometrically to the SREs, independently of RNA length. Binding of Me31B and Tral was also SRE-dependent, but their amounts were proportional to the length of the RNA and equimolar to each other. We suggest that "coating" of the RNA by a Me31B•Tral complex may be at the core of repression. © 2017 Götze et al.; Published by Cold Spring Harbor Laboratory Press for the RNA Society.

  3. OR.NET: a service-oriented architecture for safe and dynamic medical device interoperability.

    PubMed

    Kasparick, Martin; Schmitz, Malte; Andersen, Björn; Rockstroh, Max; Franke, Stefan; Schlichting, Stefan; Golatowski, Frank; Timmermann, Dirk

    2018-02-23

    Modern surgical departments are characterized by a high degree of automation supporting complex procedures. It recently became apparent that integrated operating rooms can improve the quality of care, simplify clinical workflows, and mitigate equipment-related incidents and human errors. Particularly using computer assistance based on data from integrated surgical devices is a promising opportunity. However, the lack of manufacturer-independent interoperability often prevents the deployment of collaborative assistive systems. The German flagship project OR.NET has therefore developed, implemented, validated, and standardized concepts for open medical device interoperability. This paper describes the universal OR.NET interoperability concept enabling a safe and dynamic manufacturer-independent interconnection of point-of-care (PoC) medical devices in the operating room and the whole clinic. It is based on a protocol specifically addressing the requirements of device-to-device communication, yet also provides solutions for connecting the clinical information technology (IT) infrastructure. We present the concept of a service-oriented medical device architecture (SOMDA) as well as an introduction to the technical specification implementing the SOMDA paradigm, currently being standardized within the IEEE 11073 service-oriented device connectivity (SDC) series. In addition, the Session concept is introduced as a key enabler for safe device interconnection in highly dynamic ensembles of networked medical devices; and finally, some security aspects of a SOMDA are discussed.

  4. Strategies for safe injections.

    PubMed Central

    Battersby, A.; Feilden, R.; Stoeckel, P.; Da Silva, A.; Nelson, C.; Bass, A.

    1999-01-01

    In 1998, faced with growing international concern, WHO set out an approach for achieving injection safety that encompassed all elements from patients' expectations and doctors' prescribing habits to waste disposal. This article follows that lead and describes the implications of the approach for two injection technologies: sterilizable and disposable. It argues that focusing on any single technology diverts attention from the more fundamental need for health services to develop their own comprehensive strategies for safe injections. National health authorities will only be able to ensure that injections are administered safely if they take an approach that encompasses the whole system, and choose injection technologies that fit their circumstances. PMID:10680247

  5. Sixth Warren K. Sinclair keynote address: The role of a strong regulator in safe and secure nuclear energy.

    PubMed

    Lyons, Peter B

    2011-01-01

    The history of nuclear regulation is briefly reviewed to underscore the early recognition that independence of the regulator was essential in achieving and maintaining public credibility. The current licensing process is reviewed along with the status of applications. Challenges faced by both the NRC and the industry are reviewed, such as new construction techniques involving modular construction, digital controls replacing analog circuitry, globalization of the entire supply chain, and increased security requirements. The vital area of safety culture is discussed in some detail, and its importance is emphasized. Copyright © 2010 Health Physics Society

  6. The role of food-security solutions in the protection of natural resources and environment of developing countries.

    PubMed

    Lashgarara, Farhad; Mirdamadi, Seyyed Mehdi; Hosseini, Seyyed Jamal Farajollah; Chizari, Mohammad

    2008-10-01

    The majority of the countries of the world, especially developing countries, face environmental problems. Limitations of basic resources (water and soil) and population growth have been the cause of these environmental problems that countries are confronted with. Developing countries have numerous problems, including destruction of forests, vegetable and animal species, and pollution of the environment. Damage to natural resources and the environment can influence the food-security situation. One of the main millennium development goals (MDGs) is protection of the environment and people's health. This cannot obtained unless there is ensured food security. Food security has been defined as a situation when all people, at all times, have physical and economic access to sufficient, safe, and nutritious food needed to maintain a healthy and active life. At the same time, with ensured food security, we can hope to protect the natural resources and environment. The methodology used is descriptive-analytical, and its main purpose is determining the importance and role of food-security solutions in the reduction of environmental hazards and improvement of natural resources and the environmental situation in developing countries. Therefore, some of the most important food-security solutions that can play an important role in this relation were discussed, including conventional research-based technology, biotechnology, information and communication technologies (ICTs), alternative energy sources, and food irradiation.

  7. Tangential gunshot wound with MagSafe ammunition.

    PubMed

    Rapkiewicz, Amy V; Tamburri, Robert; Basoa, Mark E; Catanese, Charles A

    2005-09-01

    MagSafe ammunition is a type of unconventional prefragmented ammunition. A fatal tangential gunshot wound involving MagSafe ammunition is presented. The ammunition and wound characteristics are discussed.

  8. Creating Safe Spaces for Music Learning

    ERIC Educational Resources Information Center

    Hendricks, Karin S.; Smith, Tawnya D.; Stanuch, Jennifer

    2014-01-01

    This article offers a practical model for fostering emotionally safe learning environments that instill in music students a positive sense of self-belief, freedom, and purpose. The authors examine the implications for music educators of creating effective learning environments and present recommendations for creating a safe space for learning,…

  9. A safe and reliable neutralization assay based on pseudovirus to measure neutralizing antibody titer against poliovirus.

    PubMed

    Liu, Shaohua; Song, Dongmei; Bai, Han; Lu, Weiwei; Dai, Xinxian; Hao, Chunsheng; Zhang, Zhongyang; Guo, Huijie; Zhang, Yue; Li, Xiuling

    2017-12-01

    With the promotion of inactivated poliomyelitis vaccine (IPV) and live attenuated oral poliomyelitis vaccine (OPV), the global reported cases of poliomyelitis have reduced sharply from 0.35 million in 1988 to 74 in 2015. The Polio Eradication & Endgame Strategic Plan published by WHO in 2013 included the strategy of implementation of poliovirus safe handling and containment measures to minimize the risks of facility-associated reintroduction of virus into the polio-free community to prevent the re-import of poliovirus. Toward this strategy, we produced replication-incompetent pseudovirus of poliovirus type 1, 2, 3 attenuated strains by constructing poliovirus capsid expression vectors and poliovirus replicon then transfecting HEK293T cells and developed a pseudovirus-based neutralization assay (pNA) to determine neutralizing antibody titer which is more secure, time-saving and reliable than conventional neutralization assay (cNA). By using anti-poliovirus rat serum, we demonstrated excellent correlation between neutralizing antibody titers measured by cNA and pNA. It was concluded that pNA can be a potential alternative to replace cNA as a safe and time-saving system for titer determination after live poliovirus's safekeeping. © 2017 Wiley Periodicals, Inc.

  10. Martime Security: Ferry Security Measures Have Been Implemented, but Evaluating Existing Studies Could Further Enhance Security

    DTIC Science & Technology

    2010-12-01

    relevant requirements, analyzed 2006 through 2009 security operations data, interviewed federal and industry officials, and made observations at five...warranted, acted on all findings and recommendations resulting from five agency- contracted studies on ferry security completed in 2005 and 2006 ...Figure 5: Security Deficiencies by Vessel Type, 2006 through 2009 27 Figure 6: Security Deficiencies by Facility Type, 2006 through 2009 28

  11. Asymptotically safe standard model extensions?

    NASA Astrophysics Data System (ADS)

    Pelaggi, Giulio Maria; Plascencia, Alexis D.; Salvio, Alberto; Sannino, Francesco; Smirnov, Juri; Strumia, Alessandro

    2018-05-01

    We consider theories with a large number NF of charged fermions and compute the renormalization group equations for the gauge, Yukawa and quartic couplings resummed at leading order in 1 /NF. We construct extensions of the standard model where SU(2) and/or SU(3) are asymptotically safe. When the same procedure is applied to the Abelian U(1) factor, we find that the Higgs quartic can not be made asymptotically safe and stay perturbative at the same time.

  12. Safe and Secure Border Infrastructure Act

    THOMAS, 113th Congress

    Rep. Peters, Scott H. [D-CA-52

    2013-09-25

    House - 09/26/2013 Referred to the Subcommittee on Railroads, Pipelines, and Hazardous Materials. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  13. Security and Financial Empowerment (SAFE) Act

    THOMAS, 111th Congress

    Sen. Murray, Patty [D-WA

    2009-10-01

    Senate - 10/01/2009 Read twice and referred to the Committee on Health, Education, Labor, and Pensions. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  14. AVIATION SECURITY: Transportation Security Administration Faces Immediate and Long-Term Challenges

    DTIC Science & Technology

    2002-07-25

    circumvent airport security , and provide whistleblower protection for air carrier and airport security workers. (See app. III for a summary of pending...GAO-01-1171T. Washington, D.C.: September 25, 2001. Aviation Security: Weaknesses in Airport Security and Options for Assigning Screening...125. Washington, D.C.: March 16, 2000. Aviation Security: FAA’s Actions to Study Responsibilities and Funding for Airport Security and to Certify

  15. Social Security Administration

    MedlinePlus

    ... Plan Costs my Social Security Check out your Social Security Statement , change your address & manage your benefits online today. Social Security Number Your Social Security number remains your ...

  16. 31 CFR 354.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Creation of Participant's Security Entitlement; security interests. 354.4 Section 354.4 Money and Finance: Treasury Regulations Relating to Money... Creation of Participant's Security Entitlement; security interests. (a) A Participant's Security...

  17. 31 CFR 354.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Creation of Participant's Security Entitlement; security interests. 354.4 Section 354.4 Money and Finance: Treasury Regulations Relating to Money... Creation of Participant's Security Entitlement; security interests. (a) A Participant's Security...

  18. 31 CFR 354.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false Creation of Participant's Security Entitlement; security interests. 354.4 Section 354.4 Money and Finance: Treasury Regulations Relating to Money... Creation of Participant's Security Entitlement; security interests. (a) A Participant's Security...

  19. 31 CFR 354.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Creation of Participant's Security Entitlement; security interests. 354.4 Section 354.4 Money and Finance: Treasury Regulations Relating to Money... Creation of Participant's Security Entitlement; security interests. (a) A Participant's Security...

  20. 31 CFR 354.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Creation of Participant's Security Entitlement; security interests. 354.4 Section 354.4 Money and Finance: Treasury Regulations Relating to Money... Creation of Participant's Security Entitlement; security interests. (a) A Participant's Security...

  1. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    NASA Astrophysics Data System (ADS)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  2. Relationship between Food Security with Sugar Level and Blood Pressure in Diabetes Type 2 in Tehran.

    PubMed

    Moghadam, Seyed Amir Hossein Zehni; Javadi, Maryam; Mohammadpooral, Asghar

    2016-12-01

    Food security has been defined as the "availability, stability, access and utilization of safe foods". Diabetes has been known as one of the biggest health and medical problems throughout the world and is clearly related to lifestyle, and particularly, improper food consumption. The aim of this study was to determine the relationship between food security with sugar and blood pressure in patients suffering from type 2 diabetes who refer to diabetes centers in Tehran. This cross-sectional study was conducted in 2015 on type 2 diabetes patients in Tehran, Iran. From two diabetes centers in the eastern and southern parts of Tehran, 243 type 2 diabetes patients were selected. Necessary information (demographic and food security information) about all the studied persons was collected using the standard questionnaire verified by US Department of Agriculture (USDA). The data was analyzed by SPSS version 16, statistical comparisons were made using analysis of variance (ANOVA) and Chi-square and Tukey tests and a significant level of <0.05. Most subjects were female (68.7%). There was no significant relationship between gender and food security (p=0.372). No significant relation was observed between food security and fasting blood pressure, HbA1C, and systolic blood pressure (p>0.05), but there was a significant relationship between food security and diastolic blood pressure (p= 0.030). According to the relationship between diastolic blood pressure and food security and the role of blood pressure in the irreparable diabetic complications, it is recommended to perform appropriate food advice.

  3. 76 FR 30495 - National Safe Boating Week, 2011

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-25

    ... Safe Boating Week, 2011 By the President of the United States of America A Proclamation As Americans... to watergoers. National Safe Boating Week is an opportunity to highlight the importance of safety... can save lives. Each year for National Safe Boating Week, the United States Coast Guard partners with...

  4. 12 CFR 615.5454 - Creation of participant's security entitlement; security interests.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Creation of participant's security entitlement; security interests. 615.5454 Section 615.5454 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT... Procedures for Farm Credit Securities § 615.5454 Creation of participant's security entitlement; security...

  5. 12 CFR 615.5454 - Creation of participant's security entitlement; security interests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Creation of participant's security entitlement; security interests. 615.5454 Section 615.5454 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT... Procedures for Farm Credit Securities § 615.5454 Creation of participant's security entitlement; security...

  6. Airport Managers' Perspectives on Security and Safety Management Systems in Aviation Operations: A Multiple Case Study

    NASA Astrophysics Data System (ADS)

    Brown, Willie L., Jr.

    Global terrorism continues to persist despite the great efforts of various countries to protect and safely secure their citizens. As airports form the entry and exit ports of a country, they are one of the most vulnerable locations to terror attacks. Managers of international airports constantly face similar challenges in developing and implementing airport security protocols. Consequently, the technological advances of today have brought both positive and negative impacts on security and terrorism of airports, which are mostly managed by the airport managers. The roles of the managers have greatly increased over the years due to technological advances. The developments in technology have had different roles in security, both in countering terrorism and, at the same time, increasing the communication methods of the terrorists. The purpose of this qualitative multiple case study was to investigate the perspectives of airport managers with regard to societal security and social interactions in the socio-technical systems of the National Terrorism Advisory System (NTAS). Through the data gained regarding managers' perception and experiences, the researcher hoped to enable the development of security measures and policies that are appropriate for airports as socio-technical systems. The researcher conducted interviews with airport managers to gather relevant data to fulfill the rationale of the study. Ten to twelve airport managers based in three commercial aviation airports in Maryland, United States participated in the study. The researcher used a qualitative thematic analysis procedure to analyze the data responses of participants in the interview sessions.

  7. Safe injection practice among health care workers, Gharbiya, Egypt.

    PubMed

    Ismail, Nanees A; Aboul Ftouh, Aisha M; El Shoubary, Waleed H

    2005-01-01

    A cross-sectional study was conducted in 25 health care facilities in Gharbiya governorate to assess safe injection practices among health care workers (HCWs). Two questionnaires, one to collect information about administrative issues related to safe injection and the other to collect data about giving injections, exposure to needle stick injuries, hepatitis B vaccination status and safe injection training. Practices of injections were observed using a standardized checklist. The study revealed that there was lack of both national and local infection control policies and lack of most of the supplies needed for safe injection practices. Many safe practices were infrequent as proper needle manipulation before disposal (41%), safe needle disposal (47.5%), reuse of used syringe & needle (13.2%) and safe syringe disposal (0%). Exposure to needle stick injuries were common among the interviewed HCWs (66.2%) and hand washing was the common post exposure prophylaxis measure (63.4%). Only 11.3% of HCWs had full course hepatitis B vaccination. Infection control -including safe injections- training programs should be afforded to all HCWs.

  8. Safe handling of antineoplastic drugs.

    PubMed

    Harrison, B R

    1994-07-01

    Managers should be aware of the hazardous properties of antineoplastic drugs and of the procedures and equipment commonly recommended to provide a safe working environment for employees, patients, and visitors. Compliance with the many published guidelines should help ensure passage of the inevitable Occupational Safety and Health Administration (OSHA) or Joint Commission inspection. Acute and chronic toxicities of the antineoplastic drugs, the potential for exposure in the workplace, and the basic guidelines for safe handling of these agents are reviewed.

  9. No safe place: parental alcoholism and adolescent suicide.

    PubMed

    Meyer, D C; Phillips, W M

    1990-10-01

    A child growing up in an alcoholic home develops either little self-consolidation (I-ness) and efficacy (I can) or a distorted self (I am insignificant). This results in a desperate search for a soothing-object (We-ness). The sadomasochistic behaviors, which a youth witnesses and is subjected to, become internalized as survival skills, but ultimately fail. These factors set the stage for a destructive modus operandi. When there is peer group attachment pressure, this teen does not find security when questioning, "Who am I?" because there is no "I" and no "We". Instead, this adolescent experiences fear, anxiety, and range, and wonders, "What's going to happen to me?" This propels the youth into frantic behaviors that are meant to confirm a sense of "We-ness" and competence. The result, however, is greater frustration and a mirroring of the opposite. Also, since there is a diminutive capacity for trust and an exiguous chance to reach out or respond to significant others, external soothingness becomes unobtainable. When the adolescent is confronted with aloneness, helplessness, and hopelessness, desperation results and a search for a safe place ensues. Suicide holds such an illusion. It is the embodiment of sadomasochism and permits the cognition "I am capable." A case study illustrates the problems.

  10. Neurosecurity: security and privacy for neural devices.

    PubMed

    Denning, Tamara; Matsuoka, Yoky; Kohno, Tadayoshi

    2009-07-01

    An increasing number of neural implantable devices will become available in the near future due to advances in neural engineering. This discipline holds the potential to improve many patients' lives dramatically by offering improved-and in some cases entirely new-forms of rehabilitation for conditions ranging from missing limbs to degenerative cognitive diseases. The use of standard engineering practices, medical trials, and neuroethical evaluations during the design process can create systems that are safe and that follow ethical guidelines; unfortunately, none of these disciplines currently ensure that neural devices are robust against adversarial entities trying to exploit these devices to alter, block, or eavesdrop on neural signals. The authors define "neurosecurity"-a version of computer science security principles and methods applied to neural engineering-and discuss why neurosecurity should be a critical consideration in the design of future neural devices.

  11. SafeNet: a methodology for integrating general-purpose unsafe devices in safe-robot rehabilitation systems.

    PubMed

    Vicentini, Federico; Pedrocchi, Nicola; Malosio, Matteo; Molinari Tosatti, Lorenzo

    2014-09-01

    Robot-assisted neurorehabilitation often involves networked systems of sensors ("sensory rooms") and powerful devices in physical interaction with weak users. Safety is unquestionably a primary concern. Some lightweight robot platforms and devices designed on purpose include safety properties using redundant sensors or intrinsic safety design (e.g. compliance and backdrivability, limited exchange of energy). Nonetheless, the entire "sensory room" shall be required to be fail-safe and safely monitored as a system at large. Yet, sensor capabilities and control algorithms used in functional therapies require, in general, frequent updates or re-configurations, making a safety-grade release of such devices hardly sustainable in cost-effectiveness and development time. As such, promising integrated platforms for human-in-the-loop therapies could not find clinical application and manufacturing support because of lacking in the maintenance of global fail-safe properties. Under the general context of cross-machinery safety standards, the paper presents a methodology called SafeNet for helping in extending the safety rate of Human Robot Interaction (HRI) systems using unsafe components, including sensors and controllers. SafeNet considers, in fact, the robotic system as a device at large and applies the principles of functional safety (as in ISO 13489-1) through a set of architectural procedures and implementation rules. The enabled capability of monitoring a network of unsafe devices through redundant computational nodes, allows the usage of any custom sensors and algorithms, usually planned and assembled at therapy planning-time rather than at platform design-time. A case study is presented with an actual implementation of the proposed methodology. A specific architectural solution is applied to an example of robot-assisted upper-limb rehabilitation with online motion tracking. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  12. The Safe and Effective Use of Shared Data Underpinned by Stakeholder Engagement and Evaluation Practice.

    PubMed

    Georgiou, Andrew; Magrabi, Farah; Hypponen, Hannele; Wong, Zoie Shui-Yee; Nykänen, Pirkko; Scott, Philip J; Ammenwerth, Elske; Rigby, Michael

    2018-04-22

     The paper draws attention to: i) key considerations involving the confidentiality, privacy, and security of shared data; and ii) the requirements needed to build collaborative arrangements encompassing all stakeholders with the goal of ensuring safe, secure, and quality use of shared data.  A narrative review of existing research and policy approaches along with expert perspectives drawn from the International Medical Informatics Association (IMIA) Working Group on Technology Assessment and Quality Development in Health Care and the European Federation for Medical Informatics (EFMI) Working Group for Assessment of Health Information Systems.  The technological ability to merge, link, re-use, and exchange data has outpaced the establishment of policies, procedures, and processes to monitor the ethics and legality of shared use of data. Questions remain about how to guarantee the security of shared data, and how to establish and maintain public trust across large-scale shared data enterprises. This paper identifies the importance of data governance frameworks (incorporating engagement with all stakeholders) to underpin the management of the ethics and legality of shared data use. The paper also provides some key considerations for the establishment of national approaches and measures to monitor compliance with best practice. Data sharing endeavours can help to underpin new collaborative models of health care which provide shared information, engagement, and accountability amongst all stakeholders. We believe that commitment to rigorous evaluation and stakeholder engagement will be critical to delivering health data benefits and the establishment of collaborative models of health care into the future. Georg Thieme Verlag KG Stuttgart.

  13. Developing the Political Citizen: How Teachers Are Navigating the Statutory Demands of the Counter-Terrorism and Security Act 205 and the Prevent Duty

    ERIC Educational Resources Information Center

    Bryan, Hazel

    2017-01-01

    The "Revised Prevent Duty Guidance for England and Wales" presents statutory guidance under section 29 of the Counter-Terrorism and Security Act 2015. This guidance states that "Schools should be safe spaces in which children and young people can understand and discuss sensitive topics, including terrorism and the extremist ideas…

  14. Space Security Law

    NASA Astrophysics Data System (ADS)

    Blount, P. J.

    2017-06-01

    Since the very beginning of the space age, security has been the critical, overriding concern at the heart of both international and domestic space law regimes. While these regimes certainly encompass broader interests, such as commercial uses of outer space, they are built on a legal foundation that is largely intended to regularize interactions among space actors to ensure security, safety, and sustainability in the space environment. Space security law, as a result, has central goals of both maintaining peace and providing security as a public good for the benefit of humankind. The idea of security is a technical and political construct. The law is a tool that is used to articulate that construct as concept and operationalize it as a value. As such, space security law is a network of law and regulation that governs a wide variety of space activities. There are four broad categories that typify the various manifestations of space security law: international peace and security; national security; human security; and space safety and sustainability. International peace and security, the first category, is directly concerned with the international law and norms that have been adopted to decrease the risk of conflict between states. National security, category two, consists of domestic law that implements, at the national level, the obligations found in the first category as well as law that promotes other national security goals. Human security, the third category, is the loose set of law and policy directed at the use of space for the protection of human populations, such as disaster response and planetary protection. Finally, the fourth category, space safety and security, represents the emerging body of law and policy that seeks to protect the space environment through measures that address space debris and harmful contamination. Obviously, these categories overlap and laws can serve duplicative purposes, but this compartmentalization reveals much about the legal

  15. Security Deposits

    DTIC Science & Technology

    1987-04-01

    security deposit action is described in the regulation as follows: h. Security Deposits (DACF and DACA ). (1) Issue. PCS moves create financial hardships...General Wickham, The Army Chief of Staff, specified a philosophy toward the family in the Army Family White Paper. General Wickham’s action was in...security deposits arose. 1 The Army’s action to the issue of security deposits will be thoroughly discussed in this paper. The Army’s action comes now

  16. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    NASA Astrophysics Data System (ADS)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  17. STS-30 Magellan spacecraft arrives at KSC after six-day journey from Colorado

    NASA Technical Reports Server (NTRS)

    1989-01-01

    The Payload Environmental Transportation System (PETS) (semi-truck and trailer), which transported the Magellan spacecraft on its six-day journey from Martin Marietta in Denver, Colorado, to Kennedy Space Center (KSC), arrives safely at the Space Assembly and Encapsulation Facility 2 (SAEF-2) planetary checkout facility. The spacecraft, destined for unprecedented studies of Venusian topographic features, is to be deployed by the crew of NASA's STS-30 mission in April 1989. View provided by KSC with alternate number KSC-88PC-1082.

  18. 77 FR 31147 - National Safe Boating Week, 2012

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-24

    ... Safe Boating Week, 2012 By the President of the United States of America A Proclamation For generations... friends and family a well- loved tradition. During National Safe Boating Week, we renew our commitment to... mark National Safe Boating Week, let us reflect on that important mission and resolve to do our part to...

  19. A Security Audit Framework to Manage Information System Security

    NASA Astrophysics Data System (ADS)

    Pereira, Teresa; Santos, Henrique

    The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.

  20. Defining Information Security.

    PubMed

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.