Security clustering algorithm based on reputation in hierarchical peer-to-peer network
NASA Astrophysics Data System (ADS)
Chen, Mei; Luo, Xin; Wu, Guowen; Tan, Yang; Kita, Kenji
2013-03-01
For the security problems of the hierarchical P2P network (HPN), the paper presents a security clustering algorithm based on reputation (CABR). In the algorithm, we take the reputation mechanism for ensuring the security of transaction and use cluster for managing the reputation mechanism. In order to improve security, reduce cost of network brought by management of reputation and enhance stability of cluster, we select reputation, the historical average online time, and the network bandwidth as the basic factors of the comprehensive performance of node. Simulation results showed that the proposed algorithm improved the security, reduced the network overhead, and enhanced stability of cluster.
Enhancing Security and Stability in Afghanistan
2015-12-01
developing Afghan institutional capacity to enhance security and stability across Afghanistan. During the June 1 through November 30, 2015, reporting...aerial fires. Nonetheless, the AAF will require coalition support for several years in order to build institutional functions and continue development...during this reporting period have been positive steps towards institutional change within the ministries. After a government-wide overhaul of the
ERIC Educational Resources Information Center
Anaso, George Nwaorah; Nwabudike, Christopher Eziafa
2014-01-01
An in-depth investigation was conducted on the possibility of literature employed to enhance cohesion, sustainable unity, national stability, and security of lives and property in the contemporary Nigeria. These three elements--unity, national stability, and security of lives and property are considered the key pillars of a modern state, the…
Design and Analysis of Secure Routing Protocol for Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Wang, Jiong; Zhang, Hua
2017-09-01
In recent years, with the development of science and technology and the progress of the times, China's wireless network technology has become increasingly prosperous and it plays an important role in social production and life. In this context, in order to further to enhance the stability of wireless network data transmission and security enhancements, the staff need to focus on routing security and carry out related work. Based on this, this paper analyzes the design of wireless sensor based on secure routing protocol.
A National Security Strategy of Engagement and Enlargement
1994-07-01
environmental degradation, exacerbated by rapid population growth, threatens to undermine political stability in many countries and regions. At the same...democratic nations is growing, enhancing the prospects for political stability , peaceful conflict resolution and greater dignity and hope for the people
International Outreach and Coordination Strategy for the National Strategy for Maritime Security
2005-11-01
economic stability of the international community, all nations have a vital interest in ensuring that the maritime domain remains secure and open for the free and legitimate use of all. Public and private entities must work in concert to succeed. Accordingly, in order to enhance global maritime security, the Department of State will leverage its diplomatic resources and influence, while coordinating closely with other components of the US Government, to promote and enhance close cooperation among sovereign nations, international and regional organizations and the maritime
Power system security enhancement through direct non-disruptive load control
NASA Astrophysics Data System (ADS)
Ramanathan, Badri Narayanan
The transition to a competitive market structure raises significant concerns regarding reliability of the power grid. A need to build tools for security assessment that produce operating limit boundaries for both static and dynamic contingencies is recognized. Besides, an increase in overall uncertainty in operating conditions makes corrective actions at times ineffective leaving the system vulnerable to instability. The tools that are in place for stability enhancement are mostly corrective and suffer from lack of robustness to operating condition changes. They often pose serious coordination challenges. With deregulation, there have also been ownership and responsibility issues associated with stability controls. However, the changing utility business model and the developments in enabling technologies such as two-way communication, metering, and control open up several new possibilities for power system security enhancement. This research proposes preventive modulation of selected loads through direct control for power system security enhancement. Two main contributions of this research are the following: development of an analysis framework and two conceptually different analysis approaches for load modulation to enhance oscillatory stability, and the development and study of algorithms for real-time modulation of thermostatic loads. The underlying analysis framework is based on the Structured Singular Value (SSV or mu) theory. Based on the above framework, two fundamentally different approaches towards analysis of the amount of load modulation for desired stability performance have been developed. Both the approaches have been tested on two different test systems: CIGRE Nordic test system and an equivalent of the Western Electric Coordinating Council test system. This research also develops algorithms for real-time modulation of thermostatic loads that use the results of the analysis. In line with some recent load management programs executed by utilities, two different algorithms based on dynamic programming are proposed for air-conditioner loads, while a decision-tree based algorithm is proposed for water-heater loads. An optimization framework has been developed employing the above algorithms. Monte Carlo simulations have been performed using this framework with the objective of studying the impact of different parameters and constraints on the effectiveness as well as the effect of control. The conclusions drawn from this research strongly advocate direct load control for stability enhancement from the perspectives of robustness and coordination, as well as economic viability and the developments towards availability of the institutional framework for load participation in providing system reliability services.
75 FR 77305 - Security-Based Swap Data Repository Registration, Duties, and Core Principles
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-10
... authorities can access and analyze the data from secure, central locations to better monitor for systemic risk... authorities information to help limit systemic risk and by promoting stability through enhanced transparency...) performing market surveillance, prudential supervision, and macroprudential (systemic risk) supervision; and...
Cyber security issues in online games
NASA Astrophysics Data System (ADS)
Zhao, Chen
2018-04-01
With the rapid development of the Internet, online gaming has become a way of entertainment for many young people in the modern era. However, in recent years, cyber security issues in online games have emerged in an endless stream, which have also caused great attention of many game operators. Common cyber security problems in the game include information disclosure and cyber-attacks. These problems will directly or indirectly cause economic losses to gamers. Many gaming companies are enhancing the stability and security of their network or gaming systems in order to enhance the gaming user experience. This article has carried out the research of the cyber security issues in online games by introducing the background and some common cyber security threats, and by proposing the latent solution. Finally, it speculates the future research direction of the cyber security issues of online games in the hope of providing feasible solution and useful information for game operators.
Tobe, Chris
2003-10-01
Certain strategies can offer not-for-profit hospitals potentially greater investment yields while maintaining stability and principal safety. Treasury inflation-indexed securities can offer good returns, low volatility, and inflation protection. "Enhanced cash" strategies offer liquidity and help to preserve capital. Stable value "wrappers" allow hospitals to pursue higher-yielding fixed-income securities without an increase in volatility.
A National Security Strategy for A New Century.
1997-05-01
enhancing the prospects for political stability , peaceful conflict resolution and greater hope for the people of the world. At the same time, the dangers we...proliferation of weapons of mass destruction are global concerns that transcend national borders; and environmental damage and rapid population growth undermine economic prosperity and political stability in many countries.
The DOD Role in African Policy
1993-01-01
best hope for Africa’s long-term political stability . If democracy is indeed the political system best suited to cultural diversity, then it should...flourish in Africa. The United States should therefore strengthen programs, such as security assistance, that can enhance political stability while...involvement would seem to be a natural way to encourage democracy and political stability in Africa. To do so, however, DOD needs to maintain its
The Fatal Five? Five Factors That Enhance Effectiveness of Stability Operations
2014-05-22
Conflict METL Mission Essential Task List MSG Military Support Group NSS National Security Strategy OOTW Operations Other Than War PDF...Revolutionary War. However, despite the propensity for the military to conduct this type of operation, the U.S. Army has a mixed record of executing stability...the U.S. Army has a mixed record of executing stability tasks. This monograph identifies five factors that contribute to the effectiveness of
Using digital watermarking to enhance security in wireless medical image transmission.
Giakoumaki, Aggeliki; Perakis, Konstantinos; Banitsas, Konstantinos; Giokas, Konstantinos; Tachakra, Sapal; Koutsouris, Dimitris
2010-04-01
During the last few years, wireless networks have been increasingly used both inside hospitals and in patients' homes to transmit medical information. In general, wireless networks suffer from decreased security. However, digital watermarking can be used to secure medical information. In this study, we focused on combining wireless transmission and digital watermarking technologies to better secure the transmission of medical images within and outside the hospital. We utilized an integrated system comprising the wireless network and the digital watermarking module to conduct a series of tests. The test results were evaluated by medical consultants. They concluded that the images suffered no visible quality degradation and maintained their diagnostic integrity. The proposed integrated system presented reasonable stability, and its performance was comparable to that of a fixed network. This system can enhance security during the transmission of medical images through a wireless channel.
2007 Stability, Security, Transition and Reconstruction Operations Conference
2007-11-28
narcotics Foster sustainable economy U.S.PRT tasks Jalalabad June 2007 Who can respond to which challeges ? 2. Battlespace or Humanitarian Space...Education Integrated Interagency Stabilization and Reconstruction Training Plug and Play System Lessons Learned from the Field USAID NGOs World Bank ...World Bank , IMF? Expanding the Focus… At the US and NATO Strategic/Operational Level Enhanced/new structures and procedures to improve: Interaction
Enhancing Security and Stability in Afghanistan
2016-06-01
and complicated by the Taliban’s April 19, 2016, HPA in Kabul, the Afghan government’s subsequent response imploring Pakistan to take more direct ...USFOR-A contributes to both the RS mission and to the U.S. counterterrorism mission. Preceding OFS, U.S. forces had a direct combat role under...to support the development of the capacity and capability of foreign security forces and their supporting institutions” (Joint Publication 3-22
2009-02-01
assessments and meeting rehearsal and individual learning materials • Specify the metrics to be used to capture the quality of interagency...government; • Improve security; and • Promote reconstruction (Barno, 2004; Dziedzic & Siedl, 2005; Center for Army Lessons Learned (CALL), 2007). The...their orientations and creating group-level, hierarchical orientations out of the aggregated individual orientations (Wan, Chiu, Peng, & Tam , 2007
Lay, Chee Leng; Koh, Charlynn Sher Lin; Wang, Jing; Lee, Yih Hong; Jiang, Ruibin; Yang, Yijie; Yang, Zhe; Phang, In Yee; Ling, Xing Yi
2018-01-03
The application of aluminum (Al)-based nanostructures for visible-range plasmonics, especially for surface-enhanced Raman scattering (SERS), currently suffers from inconsistent local electromagnetic field distributions and/or inhomogeneous distribution of probe molecules. Herein, we lithographically fabricate structurally uniform Al nanostructures which enable homogeneous adsorption of various probe molecules. Individual Al nanostructures exhibit strong local electromagnetic field enhancements, in turn leading to intense SERS activity. The average SERS enhancement factor (EF) for individual nanostructures exceeds 10 4 for non-resonant probe molecules in the visible spectrum. These Al nanostructures also retain more than 70% of their original SERS intensities after one-month storage, displaying superb stability under ambient conditions. We further achieve tunable polarization-dependent SERS responses using anisotropic Al nanostructures, facilitating the design of sophisticated SERS-based security labels. Our micron-sized security label comprises two-tier security features, including a machine-readable hybrid quick-response (QR) code overlaid with a set of ciphertexts. Our work demonstrates the versatility of Al-based structures in low-cost modern chemical nano-analytics and forgery protection.
A Decision Framework for Enhancing Mobile Ad Hoc Network Stability and Security
2008-06-01
www.selfless-security.org/papers/addendum.php#ivt, accessed: March 2008. [10] Berners - Lee , T., Hendler, J., and O. Lassila, "The Semantic Web," in...study under her mentorship. Professor Tim Levin consistently offered his time and expertise throughout my time at NPS. Watching and listening to...Senge, "Tests for Building Confidence in System Dynamics Models," in TIMS Studies in the Management Sciences, Vol. 14, pp. 209-228, 1980. [40
THE ROLE OF TEACHERS' ORGANIZATIONS IN EDUCATIONAL PLANNING. WCOTP THEME STUDY, 1966.
ERIC Educational Resources Information Center
World Confederation of Organizations of the Teaching Profession, Morges (Switzerland).
TO PROMOTE INTERNATIONAL EDUCATIONAL PLANNING--AIMED AT ECONOMIC GROWTH, SOCIAL DEVELOPMENT, POLITICAL STABILITY, ENHANCEMENT OF THE NATIONAL CULTURAL HERITAGE, AND DEVELOPMENT OF INDIVIDUAL POTENTIAL--FISCAL, DEMOGRAPHIC, AND PEDAGOGICAL DATA WERE SECURED BY MEANS OF A QUESTIONNAIRE TO 33 TEACHERS' ORGANIZATIONS REPRESENTING 29 COUNTRIES…
Security for whom? Stabilisation and civilian protection in Colombia.
Elhawary, Samir
2010-10-01
This paper focuses on three periods of stabilisation in Colombia: the Alliance for Progress (1961-73) that sought to stem the threat of communist revolution in Latin America; Plan Colombia and President Alvaro Uribe's 'democratic security' policy (2000-07) aimed at defeating the guerrillas and negotiating a settlement with the paramilitaries; and the current 'integrated approach', adopted from 2007, to consolidate more effectively the state's control of its territory.(1) The paper assesses the extent to which these stabilisation efforts have enhanced the protection of civilians and ultimately finds that in all three periods there has been a disconnect between the discourse and the practice of stabilisation. While they have all sought to enhance security, in actual fact, they have privileged the security of the state and its allies at the expense of the effective protection of the civilian population. This has not only led to widespread human rights abuses but also has undermined the long-term stability being pursued. © 2010 The Author(s). Journal compilation © Overseas Development Institute, 2010.
Measuring Stability and Security in Iraq
2008-06-01
1 1.1. Political Stability .....................................................................................................1...Section 1—Stability and Security 1.1 Political Stability With recent improvements in security, the current political environment in Iraq is
Voltage stability analysis in the new deregulated environment
NASA Astrophysics Data System (ADS)
Zhu, Tong
Nowadays, a significant portion of the power industry is under deregulation. Under this new circumstance, network security analysis is more critical and more difficult. One of the most important issues in network security analysis is voltage stability analysis. Due to the expected higher utilization of equipment induced by competition in a power market that covers bigger power systems, this issue is increasingly acute after deregulation. In this dissertation, some selected topics of voltage stability analysis are covered. In the first part, after a brief review of general concepts of continuation power flow (CPF), investigations on various matrix analysis techniques to improve the speed of CPF calculation for large systems are reported. Based on these improvements, a new CPF algorithm is proposed. This new method is then tested by an inter-area transaction in a large inter-connected power system. In the second part, the Arnoldi algorithm, the best method to find a few minimum singular values for a large sparse matrix, is introduced into the modal analysis for the first time. This new modal analysis is applied to the estimation of the point of voltage collapse and contingency evaluation in voltage security assessment. Simulations show that the new method is very efficient. In the third part, after transient voltage stability component models are investigated systematically, a novel system model for transient voltage stability analysis, which is a logical-algebraic-differential-difference equation (LADDE), is offered. As an example, TCSC (Thyristor controlled series capacitors) is addressed as a transient voltage stabilizing controller. After a TCSC transient voltage stability model is outlined, a new TCSC controller is proposed to enhance both fault related and load increasing related transient voltage stability. Its ability is proven by the simulation.
Measuring Stability and Security in Iraq
2008-03-01
1 1.1. Political Stability .....................................................................................................1...March 7, 2008 Section 1—Stability and Security 1.1 Political Stability During this reporting period, improvements in security led to more favorable
New Partnerships for a New Era: Enhancing the South African Army’s Stabilization Role in Africa
2009-06-01
Union and the African Standby Force. The path to peace and stability in Africa is a long one, but these are important first steps. One of the...principal African nations in this effort has been South Africa. That nation’s armed forces have been heavily committed to African Union and United...range of important continental and regional initiatives such as the formation of the African Union (AU), including its Peace and Security Council
Kim, Ijung; Nole, Michael; Jang, Sunghyun; ...
2017-01-31
Here in this paper, we report a new way of storing CO 2 in a highly porous hydrate structure, stabilized by silica nanoparticles (NPs). Such a porous CO 2 hydrate structure was generated either by cooling down NP-stabilized CO 2-in-seawater foams, or by gently mixing CO 2 and seawater that contains silica NPs under CO 2 hydrate-generating conditions. With the highly porous structure, enhanced desalination was also achievable when the partial meltdown of CO 2 hydrate was allowed.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kim, Ijung; Nole, Michael; Jang, Sunghyun
Here in this paper, we report a new way of storing CO 2 in a highly porous hydrate structure, stabilized by silica nanoparticles (NPs). Such a porous CO 2 hydrate structure was generated either by cooling down NP-stabilized CO 2-in-seawater foams, or by gently mixing CO 2 and seawater that contains silica NPs under CO 2 hydrate-generating conditions. With the highly porous structure, enhanced desalination was also achievable when the partial meltdown of CO 2 hydrate was allowed.
Wide Area Security Region Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Makarov, Yuri V.; Lu, Shuai; Guo, Xinxin
2010-03-31
This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of systemmore » parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of security hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed technology. Recommendations for the future work have also been formulated.« less
Energy Security: From Deal Killers to Game Changers
NASA Astrophysics Data System (ADS)
Cooke, Charlie
2010-03-01
Five energy security ``deal killers" are identified: 1) Global warming and CO2 emissions from fossil fuel combustion; 2) Intermittent energy sources (wind, solar) and the presence and stability of the grid; 3) Penetration of plant defenses to produce transportation fuels from biomass; 4) Mimicking nature: artificial photosynthesis for solar energy to fuels; and 5) Spent fuel from nuclear power reactors. Transformational basic research is required to successfully change the ground rules, to transform these ``deal killers" into ``game changers." T hey are: 1) Offsetting carbon capture and storage costs through enhanced oil recovery and methane generation from high temperature geothermal saline aquifers; 2) Electrical energy storage, through batteries and super-capacitors; 3) Genetic modification of plant cell walls, and catalytic methods for transforming plant sugars into fuels; 4) Separation of solar-induced electrons from holes, and catalysis to produce fuels; and 5) Closing the nuclear fuel cycle. Basic research can revolutionize our approach to carbon-free energy by enhancing nature to achieve energy security.
2014-05-01
economic stability , military defense, global influence, and trade or business efforts. A nation s education system is however the most critical precondition to achieving the elements listed. For these reasons, the protection of and the continued growth of the cyberspace as an international environment is cause for a secure global cyberspace. The Internet in particular, is a vehicle the nation uses to communicate, cooperate, and conduct business dealings involving our assets and for this reason cybersecurity is a major concern. In this paper, we choose to focus on adding
Long-term efficient organic photovoltaics based on quaternary bulk heterojunctions
NASA Astrophysics Data System (ADS)
Nam, Minwoo; Cha, Minjeong; Lee, Hyun Hwi; Hur, Kahyun; Lee, Kyu-Tae; Yoo, Jaehong; Han, Il Ki; Kwon, S. Joon; Ko, Doo-Hyun
2017-01-01
A major impediment to the commercialization of organic photovoltaics (OPVs) is attaining long-term morphological stability of the bulk heterojunction (BHJ) layer. To secure the stability while pursuing optimized performance, multi-component BHJ-based OPVs have been strategically explored. Here we demonstrate the use of quaternary BHJs (q-BHJs) composed of two conjugated polymer donors and two fullerene acceptors as a novel platform to produce high-efficiency and long-term durable OPVs. A q-BHJ OPV (q-OPV) with an experimentally optimized composition exhibits an enhanced efficiency and extended operational lifetime than does the binary reference OPV. The q-OPV would retain more than 72% of its initial efficiency (for example, 8.42-6.06%) after a 1-year operation at an elevated temperature of 65 °C. This is superior to those of the state-of-the-art BHJ-based OPVs. We attribute the enhanced stability to the significant suppression of domain growth and phase separation between the components via kinetic trapping effect.
Togral, Guray; Hasturk, Askin Esen; Kekec, Fevzi; Parpucu, Murat; Gungor, Safak
2015-01-01
In this retrospective study, surgical results of four patients with sacral tumors having disparate pathologic diagnoses, who were treated with partial or total sacrectomy and lumbopelvic stabilization were abstracted. Two patients were treated with partial sacral resection and two patients were treated with total sacrectomy and spinopelvic fixation. Fixation methods included spinopelvic fixation with rods and screws in two cases, reconstruction plate in one case, and fresh frozen allografts in two cases. Fibular allografts used for reconstruction accelerated bony union and enhanced the stability in two cases. Addition of polymethyl methacrylate in the cavity in the case of a giant cell tumor had a positive stabilizing effect on fixation. As a result, we can conclude that mechanical instability after sacral resection can be stabilized securely with lumbopelvic fixation and polymethyl methacrylate application or addition of fresh frozen allografts between the rods can augment the stability of the reconstruction. PMID:26713133
Arıkan, Murat; Togral, Guray; Hasturk, Askin Esen; Kekec, Fevzi; Parpucu, Murat; Gungor, Safak
2015-12-01
In this retrospective study, surgical results of four patients with sacral tumors having disparate pathologic diagnoses, who were treated with partial or total sacrectomy and lumbopelvic stabilization were abstracted. Two patients were treated with partial sacral resection and two patients were treated with total sacrectomy and spinopelvic fixation. Fixation methods included spinopelvic fixation with rods and screws in two cases, reconstruction plate in one case, and fresh frozen allografts in two cases. Fibular allografts used for reconstruction accelerated bony union and enhanced the stability in two cases. Addition of polymethyl methacrylate in the cavity in the case of a giant cell tumor had a positive stabilizing effect on fixation. As a result, we can conclude that mechanical instability after sacral resection can be stabilized securely with lumbopelvic fixation and polymethyl methacrylate application or addition of fresh frozen allografts between the rods can augment the stability of the reconstruction.
Ananth, D V N; Nagesh Kumar, G V
2016-05-01
With increase in electric power demand, transmission lines were forced to operate close to its full load and due to the drastic change in weather conditions, thermal limit is increasing and the system is operating with less security margin. To meet the increased power demand, a doubly fed induction generator (DFIG) based wind generation system is a better alternative. For improving power flow capability and increasing security STATCOM can be adopted. As per modern grid rules, DFIG needs to operate without losing synchronism called low voltage ride through (LVRT) during severe grid faults. Hence, an enhanced field oriented control technique (EFOC) was adopted in Rotor Side Converter of DFIG converter to improve power flow transfer and to improve dynamic and transient stability. A STATCOM is coordinated to the system for obtaining much better stability and enhanced operation during grid fault. For the EFOC technique, rotor flux reference changes its value from synchronous speed to zero during fault for injecting current at the rotor slip frequency. In this process DC-Offset component of flux is controlled, decomposition during symmetric and asymmetric faults. The offset decomposition of flux will be oscillatory in a conventional field oriented control, whereas in EFOC it was aimed to damp quickly. This paper mitigates voltage and limits surge currents to enhance the operation of DFIG during symmetrical and asymmetrical faults. The system performance with different types of faults like single line to ground, double line to ground and triple line to ground was applied and compared without and with a STATCOM occurring at the point of common coupling with fault resistance of a very small value at 0.001Ω. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.
17 CFR 242.104 - Stabilizing and other activities in connection with an offering.
Code of Federal Regulations, 2010 CFR
2010-04-01
... the principal market if the security has traded in the principal market on the day stabilizing is... security has traded in that market on the day stabilizing is initiated or on the last preceding business... expressed in a currency other than the currency of the principal market for the security, such bid may be...
ERIC Educational Resources Information Center
Raby, K. Lee; Roisman, Glenn I.; Booth-LaForce, Cathryn
2015-01-01
A longstanding question for attachment theory and research is whether genetically based characteristics of the child influence the development of attachment security and its stability over time. This study attempted to replicate and extend recent findings indicating that the developmental stability of attachment security is moderated by oxytocin…
Naval Medical Research and Development News. Volume 7, Issue 1, January 2015
2015-01-01
Laos, Malaysia, Thailand and the Philippines . Vietnam has set a 2030 malaria elimination goal and NAMRU-2 is partnering to identify malaria...conducting active surveillance of dengue and malaria; extending training opportunities to the local military, and identifying new pathogens and vectors...enhance regional security, stability and cooperation,” said Gutierrez. “Over the last year, Soto Cano was activated as the fourth site to take
O'Brien, Jennifer A; DeJarnette, Sherry
2014-01-01
There are many reasons to take a critical look at the practice's banking relationship(s)--technology advancements, security measures, improvements in available services, recent banking enhancements designed specifically for medical practices, the impact of the financial crisis on bank ratings and stability, changing practice needs, opportunities for operational automation at the practice--and it is just simply smart to periodically evaluate and compare the features, pricing, and potential savings offered by vendors.
2010-12-01
U.S. Army Research Institute for the Behavioral and Social Sciences Research Report 1934 Augmented performance...release; distribution is unlimited. U.S. Army Research Institute for the Behavioral and Social Sciences Department of the Army Deputy...distribution of reports to: U.S. Army Research Institute for the Behavioral and Social Sciences, Attn: DAPE-ARI-ZXM, 2511 Jefferson Davis Highway, Arlington
Department of Defense Chemical and Biological Defense Program. Annual Report to Congress
2008-05-01
defense system acquisition costs through collaboration in the areas of development, production , and support, and to enhance interoperability with...security area leverages S&T efforts of the other product areas. Where unmet requirements are identified and where S&T is required to meet cost ...Defense Program Inventory Requirements The industrial base, which has scaled down since the end of the Cold War, has stabilized. Ongoing military
Report on Enhancing Security and Stability in Afghanistan
2015-06-01
Warrior helicopters, the AAF’s organic capability to provide aerial fires continues to grow. However, the AAF continues to struggle with a shortage ...of pilots and aircrews, as well as the maintenance of air platforms. To address the pilot shortage , coalition forces are pursuing the addition of...historically ordered supplies for the ANDSF, Afghan personnel have little experience doing it themselves. As a result, reported shortages in operational units
Raby, K Lee; Roisman, Glenn I; Booth-LaForce, Cathryn
2015-11-01
A longstanding question for attachment theory and research is whether genetically based characteristics of the child influence the development of attachment security and its stability over time. This study attempted to replicate and extend recent findings indicating that the developmental stability of attachment security is moderated by oxytocin receptor (OXTR) genetic variants. Using longitudinal data from over 550 individuals, there was no evidence that OXTR rs53576 moderated the association between attachment security during early childhood and overall coherence of mind ("security") during the Adult Attachment Interview at age 18 years. Additional analyses involving a second commonly investigated OXTR variant (rs2254298) and indices of individuals' dismissing and preoccupied attachment states of mind also failed to provide robust evidence for oxytonergic moderation of the stability in attachment security across development. The discussion focuses on research strategies for investigating genetic contributions to attachment security across the life span. (c) 2015 APA, all rights reserved).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jiang, Huaiguang; Li, Yan; Zhang, Yingchen
In this paper, a big data-based approach is proposed for the security improvement of an unplanned microgrid islanding (UMI). The proposed approach contains two major steps: the first step is big data analysis of wide-area monitoring to detect a UMI and locate it; the second step is particle swarm optimization (PSO)-based stability enhancement for the UMI. First, an optimal synchrophasor measurement device selection (OSMDS) and matching pursuit decomposition (MPD)-based spatial-temporal analysis approach is proposed to significantly reduce the volume of data while keeping appropriate information from the synchrophasor measurements. Second, a random forest-based ensemble learning approach is trained to detectmore » the UMI. When combined with grid topology, the UMI can be located. Then the stability problem of the UMI is formulated as an optimization problem and the PSO is used to find the optimal operational parameters of the UMI. An eigenvalue-based multiobjective function is proposed, which aims to improve the damping and dynamic characteristics of the UMI. Finally, the simulation results demonstrate the effectiveness and robustness of the proposed approach.« less
1992-08-31
NC r") Form 1473, JUN 86 Previous editions are obsolete SECURITY CLASSIFICATION OF THIS PACE I 18. Subject Terms (Continued) I analysis, aging , band...detail the several steps involved in the processing of sol-gel derived optical silicas: I 1) mixing, 2) casting, 3) gelation, 4) aging , 5) drying, 6...ultrastructurcs, such as for doping applications and laser-enhanced densification. The possible disadvantages discussed in this Chapter are inherent
Brief analysis of Jiangsu grid security and stability based on multi-infeed DC index in power system
NASA Astrophysics Data System (ADS)
Zhang, Wenjia; Wang, Quanquan; Ge, Yi; Huang, Junhui; Chen, Zhengfang
2018-02-01
The impact of Multi-infeed HVDC has gradually increased to security and stability operating in Jiangsu power grid. In this paper, an appraisal method of Multi-infeed HVDC power grid security and stability is raised with Multi-Infeed Effective Short Circuit Ratio, Multi-Infeed Interaction Factor and Commutation Failure Immunity Index. These indices are adopted in security and stability simulating calculation of Jiangsu Multi-infeed HVDC system. The simulation results indicate that Jiangsu power grid is operating with a strong DC system. It has high level of power grid security and stability, and meet the safety running requirements. Jinpin-Suzhou DC system is located in the receiving end with huge capacity, which is easily leading to commutation failure of the transmission line. In order to resolve this problem, dynamic reactive power compensation can be applied in power grid near Jinpin-Suzhou DC system. Simulation result shows this method is feasible to commutation failure.
NASA Astrophysics Data System (ADS)
Ma, Xiang-Chun; Sun, Shi-Hai; Jiang, Mu-Sheng; Gui, Ming; Zhou, Yan-Li; Liang, Lin-Mei
2014-03-01
In a practical continuous-variable quantum-key distribution (CVQKD), the fluctuations of the local oscillator (LO) not only make the normalization of Bob's measurement outcomes difficult, but also can change the signal-to-noise ratio (SNR) of an imperfect balanced homodyne detector (BHD), which may lead the security of a practical system of CVQKD to be compromised severely. In this paper, we propose that the LO intensity can be manipulated by the legitimate parties, i.e., being tuned and stabilized to a required constant value, to eliminate the impact of LO fluctuations and defeat Eve's potential attack on the LO. Moreover, we show that the secret key rate can be increased over a noisy channel, especially the channels of metropolitan QKD networks, by tuning the intensity of LO and thus the SNR of a practical BHD to an optimal value, and we find that, counterintuitively, the requirement on BHD (i.e., high detection efficiency and low electronic noise) can also be reduced in this case. To realize this manipulation, we give a schematic setup which, thus, can be used to enhance the security of a practical CVQKD system.
Kaliningrad and Baltic Security
2001-06-01
Kennedy-Minott, Thesis Co-Advisor ___________________________________________ James Wirtz , Chairman Department of National Security Affairs iv...39 Jochen Prantl, �Security and Stability in Northern Europe � A Threat Assessment,� Program on the Northern Dimension of the CFSP, 29...www.usis.usemb.se/ wireless/500/eur508.htm Prantl, Jochen . �Security and Stability in Northern Europe � A Threat Assessment.� Program on the Northern Dimension
Stability and Change in Attachment Security Across Adolescence
Allen, Joseph P.; McElhaney, Kathleen Boykin; Kuperminc, Gabriel P.; Jodl, Kathleen M.
2006-01-01
This study examined both continuity and familial, intrapsychic, and environmental predictors of change in adolescent attachment security across a two-year period from mid- to late-adolescence. Assessments included the Adult Attachment Interview, observed mother-adolescent interactions, test-based data, and adolescent self-reports obtained from an ethnically and socio-economically diverse sample of moderately at-risk adolescents interviewed at ages 16 and 18. Substantial stability in security was identified. Beyond this stability, however, relative declines in attachment security were predicted by adolescents’ enmeshed, overpersonalizing behavior with their mothers, depressive symptoms, and poverty status. Results suggest that while security may trend upward for non-stressed adolescents, stressors that overwhelm the capacity for affect regulation and that are not easily assuaged by parents predict relative declines in security. over time. PMID:15566380
Method of electrode fabrication for solid oxide electrochemical cells
Jensen, R.R.
1990-11-20
A process for fabricating cermet electrodes for solid oxide electrochemical cells by sintering is disclosed. First, a porous metal electrode is fabricated on a solid oxide cell, such as a fuel cell by, for example, sintering, and is then infiltrated with a high volume fraction stabilized zirconia suspension. A second sintering step is used to sinter the infiltrated zirconia to a high density in order to more securely attach the electrode to the solid oxide electrolyte of the cell. High performance fuel electrodes can be obtained with this process. Further electrode performance enhancement may be achieved if stabilized zirconia doped with cerium oxide, chromium oxide, titanium oxide, and/or praseodymium oxide for electronic conduction is used. 5 figs.
Method of electrode fabrication for solid oxide electrochemical cells
Jensen, Russell R.
1990-01-01
A process for fabricating cermet electrodes for solid oxide electrochemical cells by sintering is disclosed. First, a porous metal electrode is fabricated on a solid oxide cell, such as a fuel cell by, for example, sintering, and is then infiltrated with a high volume fraction stabilized zirconia suspension. A second sintering step is used to sinter the infiltrated zirconia to a high density in order to more securely attach the electrode to the solid oxide electrolyte of the cell. High performance fuel electrodes can be obtained with this process. Further electrode performance enhancement may be achieved if stabilized zirconia doped with cerium oxide, chromium oxide, titanium oxide, and/or praseodymium oxide for electronic conduction is used.
NASA Astrophysics Data System (ADS)
Nair, Nirmal-Kumar
As open access market principles are applied to power systems, significant changes are happening in their planning, operation and control. In the emerging marketplace, systems are operating under higher loading conditions as markets focus greater attention to operating costs than stability and security margins. Since operating stability is a basic requirement for any power system, there is need for newer tools to ensure stability and security margins being strictly enforced in the competitive marketplace. This dissertation investigates issues associated with incorporating voltage security into the unbundled operating environment of electricity markets. It includes addressing voltage security in the monitoring, operational and planning horizons of restructured power system. This dissertation presents a new decomposition procedure to estimate voltage security usage by transactions. The procedure follows physical law and uses an index that can be monitored knowing the state of the system. The expression derived is based on composite market coordination models that have both PoolCo and OpCo transactions, in a shared stressed transmission grid. Our procedure is able to equitably distinguish the impacts of individual transactions on voltage stability, at load buses, in a simple and fast manner. This dissertation formulates a new voltage stability constrained optimal power flow (VSCOPF) using a simple voltage security index. In modern planning, composite power system reliability analysis that encompasses both adequacy and security issues is being developed. We have illustrated the applicability of our VSCOPF into composite reliability analysis. This dissertation also delves into the various applications of voltage security index. Increasingly, FACT devices are being used in restructured markets to mitigate a variety of operational problems. Their control effects on voltage security would be demonstrated using our VSCOPF procedure. Further, this dissertation investigates the application of steady state voltage stability index to detect potential dynamic voltage collapse. Finally, this dissertation examines developments in representation, standardization, communication and exchange of power system data. Power system data is the key input to all analytical engines for system operation, monitoring and control. Data exchange and dissemination could impact voltage security evaluation and therefore needs to be critically examined.
Protecting the entanglement of twisted photons by adaptive optics
NASA Astrophysics Data System (ADS)
Leonhard, Nina; Sorelli, Giacomo; Shatokhin, Vyacheslav N.; Reinlein, Claudia; Buchleitner, Andreas
2018-01-01
We study the efficiency of adaptive optics (AO) correction for the free-space propagation of entangled photonic orbital-angular-momentum (OAM) qubit states to reverse moderate atmospheric turbulence distortions. We show that AO can significantly reduce crosstalk to modes within and outside the encoding subspace and thereby stabilize entanglement against turbulence. This method establishes a reliable quantum channel for OAM photons in turbulence, and it enhances the threshold turbulence strength for secure quantum communication by at least a factor 2.
Unbalanced Stability: Applying Lessons from American Cities in Stability Operations
2011-05-19
teenagers congregating on street corners, public solicitation for prostitution, begging, public drinking, verbal harassment of women on the street, and...United Nations Security Council, “United Nations Security Council Resolution 1590 (2005).” http://www.un.org/ga/search/view_doc.asp?symbol=S/RES/ 1590 (2005...Security Council. “United Nations Security Council Resolution 1590 (2005).” United Nations. http://www.un.org/ga/search/view_doc.asp?symbol=S/RES/ 1590
Mother-Child Attachment From Infancy to the Preschool Years: Predicting Security and Stability.
Meins, Elizabeth; Bureau, Jean-François; Fernyhough, Charles
2018-05-01
Relations between maternal mind-mindedness (appropriate and nonattuned mind-related comments), children's age-2 perspective-taking abilities, and attachment security at 44 (n = 165) and 51 (n = 128) months were investigated. Nonattuned comments predicted insecure preschool attachment, via insecure 15-month attachment security (44-month attachment) and poorer age-2 perspective-taking abilities (51-month attachment). With regard to attachment stability, higher perspective-taking abilities distinguished the stable secure groups from (a) the stable insecure groups and (b) children who changed from secure to insecure (at trend level). These effects were independent of child gender, stressful life events, and socioeconomic status (SES). The contribution of these findings to our understanding of stability and change in attachment security from infancy to the preschool years is discussed. © 2017 The Authors. Child Development © 2017 Society for Research in Child Development, Inc.
17 CFR 240.17a-2 - Recordkeeping requirements relating to stabilizing activities.
Code of Federal Regulations, 2010 CFR
2010-04-01
.... (a) Scope of section. This section shall apply to any person who effects any purchase of a security... engages in, “stabilizing,” as defined in § 242.100 of this chapter, the price of any security; or effects... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Recordkeeping requirements...
17 CFR 242.104 - Stabilizing and other activities in connection with an offering.
Code of Federal Regulations, 2011 CFR
2011-04-01
... SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS M, SHO, ATS, AC, AND NMS AND CUSTOMER MARGIN REQUIREMENTS FOR SECURITY FUTURES Regulation M § 242.104 Stabilizing and other activities in connection with an...
Code of Federal Regulations, 2010 CFR
2010-04-01
... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and the...
2006-11-01
initiatives. Political Stability Iraq’s Council of Representatives has passed key legislation to initiate the constitutional review process, to...facilitate foreign invest- ment, and to outline a process for region formation. Most important for long-term political stability is the success of...November 30, 2006 5 1. Stability and Security in Iraq 1.1 Political Stability 1.1.1 Steps to a Free and Self-Governing Iraq As detailed in the August
Climate Change, Instability and a Full Spectrum Approach to Conflict Prevention in Africa
2009-10-23
commander to follow. 15. SUBJECT TERMS Climate Change, Global Warming , Security Cooperation, Stability, Instability, Stabilization, Security...note that global warming could also create similar impacts on resources.19 In modern times disputes over natural resources have erupted into conflict...16. Center for Naval Analysis, National Security and the Threat of Climate Change, 18. 17. Michael T. Klare, ― Global Warming Battlefields: How
African Union: Towards Good Governance, Peace and Security
2012-03-15
While good governance, peace and security remain individual state responsibilities, they constitute the main pillars of Africa’s political stability and...African national leadership to drive this process.2 Political stability itself requires strong state institutional capabilities to ensure continuity
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bates, T.R. Jr.; Tait, S.; Mumford, G.
The authors discuss how improvements that can increase rig safety can be made in equipment, regulations, and stabilized personnel levels. With regard to equipment, exposure to material handling must be reduced through automation, and well-control technology must be improved by enhanced use of computers and better systems to handle gas. According to this analysis, regulations are needed that are global in scope and have had their costs-to-benefits fully and fairly assessed. Self regulation must be used effectively throughout the industry. Job security and wages should be made adequate to maintain an experienced, motivated, and safe work force.
Cybersecurity: The Nation’s Greatest Threat to Critical Infrastructure
2013-03-01
protection has become a matter of national security, public safety, and economic stability . It is imperative the U.S. Government (USG) examine current...recommendations for federal responsibilities and legislation to direct nation critical infrastructure efforts to ensure national security, public safety and economic stability .
Military Education Workshop Addresses Threats to Stability and Security
2007-08-01
for an upcoming National Intelligence Estimate (NIE), the National Inteligence Council (NIC) has reached out to a broad group of U.S. government...OFFICIAL BUSINESS resource competition and conflict; water and food security; health and disease, and the stability of governments. The Army should be
Wood, Megan A; Bukowski, William M; Santo, Jonathan B
2017-01-01
A two-wave longitudinal study of 380 preadolescents (M age = 10.87) from largely middle-class schools in Montréal, Québec, Canada, assessed the hypothesis that friendship security, but not friendship intimacy, moderates the stability of anxiety during adolescence. This central but largely overlooked question about peer relations concerns which aspects of friendship account for the effects of friendship on emotional adjustment. Anxiety and friendship quality were measured via self-report questionnaires, employing the Network of Relationships Inventory for security and intimacy items. An index of friendship durability, which combined reciprocity and stability within first- and second-best friendship choices, was derived from sociometric measures. A latent variable path analysis examined with structural equation modeling showed that anxiety was less stable for children who perceived their friendships as secure. The moderating effect of intimacy was statistically nonsignificant. A follow-up analysis showed that the effects of security did not result from friendship durability. These findings provide support for the long-standing but previously unaddressed hypothesis that security, rather than intimacy, accounts for friendship's effect on anxiety reduction during early adolescence.
NASA Astrophysics Data System (ADS)
Chen, L.; Lai, C.; Marchewka, R.; Berry, R. M.; Tam, K. C.
2016-07-01
Structural colors and photoluminescence have been widely used for anti-counterfeiting and security applications. We report for the first time the use of CdS quantum dot (QD)-functionalized cellulose nanocrystals (CNCs) as building blocks to fabricate nanothin films via layer-by-layer (LBL) self-assembly for anti-counterfeiting applications. Both negatively- and positively-charged CNC/QD nanohybrids with a high colloidal stability and a narrow particle size distribution were prepared. The controllable LBL coating process was characterized by scanning electron microscopy and ellipsometry. The rigid structure of CNCs leads to nanoporous structured films on poly(ethylene terephthalate) (PET) substrates with high transmittance (above 70%) over the entire range of visible light and also resulted in increased hydrophilicity (contact angles of ~40 degrees). Nanothin films on PET substrates showed good flexibility and enhanced stability in both water and ethanol. The modified PET films with structural colors from thin-film interference and photoluminescence from QDs can be used in anti-counterfeiting applications.Structural colors and photoluminescence have been widely used for anti-counterfeiting and security applications. We report for the first time the use of CdS quantum dot (QD)-functionalized cellulose nanocrystals (CNCs) as building blocks to fabricate nanothin films via layer-by-layer (LBL) self-assembly for anti-counterfeiting applications. Both negatively- and positively-charged CNC/QD nanohybrids with a high colloidal stability and a narrow particle size distribution were prepared. The controllable LBL coating process was characterized by scanning electron microscopy and ellipsometry. The rigid structure of CNCs leads to nanoporous structured films on poly(ethylene terephthalate) (PET) substrates with high transmittance (above 70%) over the entire range of visible light and also resulted in increased hydrophilicity (contact angles of ~40 degrees). Nanothin films on PET substrates showed good flexibility and enhanced stability in both water and ethanol. The modified PET films with structural colors from thin-film interference and photoluminescence from QDs can be used in anti-counterfeiting applications. Electronic supplementary information (ESI) available. See DOI: 10.1039/c6nr03039d
1992-04-03
10. SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT ELEMENT NO. NO. NO. ACCESSION NO. 11. TITLE (Include Security Classification) ASEAN...region is a consequence of the stability, coordination and team work of ASEAN. With a reduction of U.S. forces presence in the area, the key to securing...fastest-growing regions in the world today. The stability in the region is a consequence of the stability, coordination and team work of ASEAN. With a
Quantum-Enhanced Cyber Security: Experimental Computation on Quantum-Encrypted Data
2017-03-02
AFRL-AFOSR-UK-TR-2017-0020 Quantum-Enhanced Cyber Security: Experimental Computation on Quantum-Encrypted Data Philip Walther UNIVERSITT WIEN Final...REPORT TYPE Final 3. DATES COVERED (From - To) 15 Oct 2015 to 31 Dec 2016 4. TITLE AND SUBTITLE Quantum-Enhanced Cyber Security: Experimental Computation...FORM SF 298 Final Report for FA9550-1-6-1-0004 Quantum-enhanced cyber security: Experimental quantum computation with quantum-encrypted data
3 CFR - Providing Stability and Security for Medicare Reimbursements
Code of Federal Regulations, 2011 CFR
2011-01-01
... 3 The President 1 2011-01-01 2011-01-01 false Providing Stability and Security for Medicare... Beneficiaries and Pension Relief Act of 2010”, which averts a 21.3 percent reduction in the Medicare physician... contractors to automatically reprocess, to the extent feasible, any claims reflecting the 21.3 percent fee...
Roles for international military medical services in stability operations (security sector reform).
Bricknell, M C M; Thompson, D
2007-06-01
This is the second in a series of three papers that examine the role of international military medical services in stability operations in unstable countries. The paper discusses security sector reform in general terms and highlights the interdependency of the armed forces, police, judiciary and penal systems in creating a 'secure environment'. The paper then looks at components of a local military medical system for a counter-insurgency campaign operating on interior lines and the contribution and challenges faced by the international military medical community in supporting the development of this system. Finally the paper highlights the importance of planning the medical support of the international military personnel who will be supporting wider aspects of security sector reform. The paper is based on background research and my personal experience as Medical Director in the Headquarters of the NATO International Stability Assistance Force in Afghanistan in 2006.
Energy Security: From Deal Killers to Game Changers
NASA Astrophysics Data System (ADS)
Orbach, Raymond L.
2010-03-01
Five ``deal killers'' for achieving energy security will be addressed: 1) Global warming and CO2 emissions from fossil fuel combustion, 2) Intermittent energy sources (wind, solar) and the presence and stability of the grid, 3) Penetration of plant defenses to produce transportation fuels from biomass, 4) Mimicking nature: artificial photosynthesis for solar energy-to-fuels, and 5) Spent fuel from nuclear power reactors. Basic research can lead to ``game changers'' for these five fields: 1) Carbon capture and storage through enhanced oil and gas recovery, 2) Electrical energy storage for base-load electricity through batteries and supercapacitors, 3) Genetic modification of the plant cell wall, and catalytic methods for conversion of plant sugars to fuels, 4) Separation of solar-induced electrons from holes, and catalysis to produce fuels, and 5) Closing the nuclear fuel cycle. The present state for each of these game changers will be summarized, and future research opportunities discussed.
Transboundary natural area protection: Broadening the definition of national security
Haven B. Cook
2007-01-01
This paper looks at the definition and concept of national security, and examines how the environment is linked with national security. The traditional, state view of national security that guides most foreign policy includes the concepts of military power, sovereignty and geopolitical stability. This paper advocates broadening the definition of security to include...
Research of real-time video processing system based on 6678 multi-core DSP
NASA Astrophysics Data System (ADS)
Li, Xiangzhen; Xie, Xiaodan; Yin, Xiaoqiang
2017-10-01
In the information age, the rapid development in the direction of intelligent video processing, complex algorithm proposed the powerful challenge on the performance of the processor. In this article, through the FPGA + TMS320C6678 frame structure, the image to fog, merge into an organic whole, to stabilize the image enhancement, its good real-time, superior performance, break through the traditional function of video processing system is simple, the product defects such as single, solved the video application in security monitoring, video, etc. Can give full play to the video monitoring effectiveness, improve enterprise economic benefits.
Lions in the Path of Stability and Security: Oman’s Response to Pressing Issues in the Middle East
2008-12-01
brothers and sisters who have given their lives in service to their country - your love for your fellow man provides me eternal motivation, may you all...conditions of war. This thesis will explain how one little-known country in the heart of the region achieved a comfortable level of stability and...security. It will analyze Oman’s stability by explaining how the country has dealt with two sources of insecurity first an insurgency and then an
Gulf Cooperation Council: search for security in the Persian Gulf
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kechichian, J.A.
1985-01-01
This study purports to analyze the conservative Arab monarchies' search for regional security in the Persian Gulf. It speculates on the GCC's future prospects as a vehicle of cooperation in the field of security. Threats to the member states of the GCC stem from the policies pursued by revolutionary Iran, Israel, the Soviet Union and its proxies, and a regime in Iraq. The proposition is developed that these sources of threat present an overwhelming challenge to the security and stability of GCC states. Second, it examines the capabilities of the GCC member states for coping with threats. Conceived broadly, bothmore » military and non-military capabilities are examined. Security relations of the GCC states with external powers as a means of enhancing their abilities to cope more effectively with both internal and external threats are examined. Particular attention is devoted to the domestic consequences of these special relations. Third, it discusses the GCC's reactions to perceived regional threats. These include the Iran-Iraq War, the Arab-Israeli conflict, the Soviet threat, and potential political sources of dissidence in member states. It is argued that although GCC states have adopted a number of joint policies, they did not respond to or initiate action on either the Iranian Revolution, the Palestine conflict, the Soviet occupation of Afghanistan, the Gulf war or the recent Israeli invasion of Lebanon.« less
Brimblecombe, J; Bailie, R; van den Boogaard, C; Wood, B; Liberato, S C; Ferguson, M; Coveney, J; Jaenke, R; Ritchie, J
2017-12-01
Food insecurity underlies and compounds many of the development issues faced by remote Indigenous communities in Australia. Multi-sector approaches offer promise to improve food security. We assessed the feasibility of a novel multi-sector approach to enhance community food security in remote Indigenous Australia. A longitudinal comparative multi-site case study, the Good Food Systems Good Food for All Project, was conducted (2009-2013) with four Aboriginal communities. Continuous improvement meetings were held in each community. Data from project documents and store sales were used to assess feasibility according to engagement, uptake and sustainability of action, and impact on community diet, as well as identifying conditions facilitating or hindering these. Engagement was established where: the community perceived a need for the approach; where trust was developed between the community and facilitators; where there was community stability; and where flexibility was applied in the timing of meetings. The approach enabled stakeholders in each community to collectively appraise the community food system and plan action. Actions that could be directly implemented within available resources resulted from developing collaborative capacity. Actions requiring advocacy, multi-sectoral involvement, commitment or further resources were less frequently used. Positive shifts in community diet were associated with key areas where actions were implemented. A multi-sector participatory approach seeking continuous improvement engaged committed Aboriginal and non-Aboriginal stakeholders and was shown to have potential to shift community diet. Provision of clear mechanisms to link this approach with higher level policy and decision-making structures, clarity of roles and responsibilities, and processes to prioritise and communicate actions across sectors should further strengthen capacity for food security improvement. Integrating this approach enabling local decision-making into community governance structures with adequate resourcing is an imperative.
76 FR 23515 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-27
... material and would add new event notification requirements on the theft or loss of enhanced weapons...-2011-0017] RIN 3150-AI49 Enhanced Weapons, Firearms Background Checks, and Security Event Notifications... regulations governing security event notifications. These proposed regulations are consistent with the...
Assistant Secretary of Defense for Homeland Defense and Global Security
Defense for Policy ASD for Asian and Pacific Security Affairs ASD for Homeland Defense Global Security Special Operations/Low-Intensity Conflict Counternarcotics and Global Threats Stability and Humanitarian HomeOUSDP OfficesASD for Homeland Defense Global Security Assistant Secretary of Defense for Homeland
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-27
... general aviation (GA) aircraft operators who wish to fly into and/or out of Ronald Reagan Washington.... Information Collection Requirement Title: Enhanced Security Procedures at Ronald Reagan Washington National...] Extension of Agency Information Collection Activity Under OMB Review: Enhanced Security Procedures at Ronald...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-30
... Collection Activity Under OMB Review: Highway Baseline Assessment for Security Enhancement (BASE) Program... Assessment for Security Enhancement (BASE) Program. Type of Request: New collection. OMB Control Number: Not yet assigned. Form(s): Highway Baseline Assessment for Security Enhancement (BASE). Affected Public...
2015-06-12
develop in the following order: Water Security, Rivers, Agreements, Population, Water Resource Management, Deforestation, History , Threats , and Climate...and political stability. To achieve peace , solutions can be developed through the use of international institutions, signing agreements...influences population, economy, energy, peace , and political stability. Achieveing peaceful solutions must come through the use of international
Sägmüller, B; Schwarze, B; Brehm, G; Schneider, S
2001-11-01
A method based on surface-enhanced Raman scattering (SERS) spectroscopy was developed to meet the need for the reliable and rapid identification of illicit drugs such as the 'designer drug' XTC, preferably to increase the security of legal certificates. A matrix stabilized silver halide dispersion on a microtiter plate is used as the SERS-active substrate, providing an easy to use system for sample preparation and probing by means of a Raman microscope. The potential of the method is demonstrated by applying it to the identification of the psychoactive ingredients of drug containing tablets which were confiscated by the local police at techno-music events. The samples of interest were 26 different brands of XTC tablets and several pieces of evidence (powders) containing amphetamine. For reference, we show SERS and Raman spectra of pristine amphetamine, methamphetamine, 3,4-methylenedioxyamphetamine, 3,4-methylenedioxymethamphetamine (MDMA) and 3,4-methylenedioxyethamphetamine.
Isolated desynchronization and intertwined synchronization in networks of semiconductor lasers
NASA Astrophysics Data System (ADS)
Xu, Mingfeng; Pan, Wei; Zhang, Liyue
2018-04-01
Two patterns of synchronization in networks of semiconductor lasers (SLs) induced by symmetries of inherent network topology are presented. One type is termed isolated desynchronization, in which one or more clusters lose stability while all others remain synchronized. Another type is intertwined synchronization, in which some clusters always achieve and lose their synchrony at the same time. The existence of these special synchronization patterns and their relationship with the topology of network is discussed systemically. The results show that such behaviors exist in different topologies of SL networks. We also discussed the influence of significant parameters of SL networks on the stability of cluster synchronization. It is shown that the network dynamics is sensitive to the two key internal parameters of SLs, the linewidth-enhancement factor, and gain saturation coefficient. Our work is very beneficial to the implementation of secure communication and synchronization networks based on SLs.
46 CFR 170.160 - Specific applicability.
Code of Federal Regulations, 2012 CFR
2012-10-01
...) A vessel that performs one of the simplified stability proof tests described in subpart C of part... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS Intact Stability Criteria § 170.160 Specific applicability. (a) Except...
46 CFR 170.160 - Specific applicability.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) A vessel that performs one of the simplified stability proof tests described in subpart C of part... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS Intact Stability Criteria § 170.160 Specific applicability. (a) Except...
46 CFR 170.160 - Specific applicability.
Code of Federal Regulations, 2014 CFR
2014-10-01
...) A vessel that performs one of the simplified stability proof tests described in subpart C of part... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS Intact Stability Criteria § 170.160 Specific applicability. (a) Except...
46 CFR 170.160 - Specific applicability.
Code of Federal Regulations, 2013 CFR
2013-10-01
...) A vessel that performs one of the simplified stability proof tests described in subpart C of part... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS Intact Stability Criteria § 170.160 Specific applicability. (a) Except...
Optimization of power systems with voltage security constraints
NASA Astrophysics Data System (ADS)
Rosehart, William Daniel
As open access market principles are applied to power systems, significant changes in their operation and control are occurring. In the new marketplace, power systems are operating under higher loading conditions as market influences demand greater attention to operating cost versus stability margins. Since stability continues to be a basic requirement in the operation of any power system, new tools are being considered to analyze the effect of stability on the operating cost of the system, so that system stability can be incorporated into the costs of operating the system. In this thesis, new optimal power flow (OPF) formulations are proposed based on multi-objective methodologies to optimize active and reactive power dispatch while maximizing voltage security in power systems. The effects of minimizing operating costs, minimizing reactive power generation and/or maximizing voltage stability margins are analyzed. Results obtained using the proposed Voltage Stability Constrained OPF formulations are compared and analyzed to suggest possible ways of costing voltage security in power systems. When considering voltage stability margins the importance of system modeling becomes critical, since it has been demonstrated, based on bifurcation analysis, that modeling can have a significant effect of the behavior of power systems, especially at high loading levels. Therefore, this thesis also examines the effects of detailed generator models and several exponential load models. Furthermore, because of its influence on voltage stability, a Static Var Compensator model is also incorporated into the optimization problems.
DOT National Transportation Integrated Search
2003-09-09
Mr. Guerrero's testimony examines (1) challenges in securing the nation's transportation system; (2) actions transportation operators, as well as state and local governments, have taken since September 11 to enhance security; (3) the federal role in ...
76 FR 65107 - Recovery of Delinquent Debts-Treasury Offset Program Enhancements
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-20
... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404, 408, 416, and 422 [Docket No. SSA-2010-0010] RIN 0960-AH19 Recovery of Delinquent Debts--Treasury Offset Program Enhancements AGENCY: Social Security... Recovery Policy, Social Security Administration, 6401 Security Boulevard, Baltimore, MD 21235-6401, (410...
46 CFR 170.190 - Stability test procedure modifications.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 7 2014-10-01 2014-10-01 false Stability test procedure modifications. 170.190 Section 170.190 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS Determination of Lightweight Displacement and Centers of...
46 CFR 170.190 - Stability test procedure modifications.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 7 2013-10-01 2013-10-01 false Stability test procedure modifications. 170.190 Section 170.190 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS Determination of Lightweight Displacement and Centers of...
46 CFR 170.190 - Stability test procedure modifications.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 7 2012-10-01 2012-10-01 false Stability test procedure modifications. 170.190 Section 170.190 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS Determination of Lightweight Displacement and Centers of...
46 CFR 170.190 - Stability test procedure modifications.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Stability test procedure modifications. 170.190 Section 170.190 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS Determination of Lightweight Displacement and Centers of...
46 CFR 170.190 - Stability test procedure modifications.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 7 2011-10-01 2011-10-01 false Stability test procedure modifications. 170.190 Section 170.190 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS Determination of Lightweight Displacement and Centers of...
The role of privacy protection in healthcare information systems adoption.
Hsu, Chien-Lung; Lee, Ming-Ren; Su, Chien-Hui
2013-10-01
Privacy protection is an important issue and challenge in healthcare information systems (HISs). Recently, some privacy-enhanced HISs are proposed. Users' privacy perception, intention, and attitude might affect the adoption of such systems. This paper aims to propose a privacy-enhanced HIS framework and investigate the role of privacy protection in HISs adoption. In the proposed framework, privacy protection, access control, and secure transmission modules are designed to enhance the privacy protection of a HIS. An experimental privacy-enhanced HIS is also implemented. Furthermore, we proposed a research model extending the unified theory of acceptance and use of technology by considering perceived security and information security literacy and then investigate user adoption of a privacy-enhanced HIS. The experimental results and analyses showed that user adoption of a privacy-enhanced HIS is directly affected by social influence, performance expectancy, facilitating conditions, and perceived security. Perceived security has a mediating effect between information security literacy and user adoption. This study proposes several implications for research and practice to improve designing, development, and promotion of a good healthcare information system with privacy protection.
46 CFR 170.085 - Information required before a stability test.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 7 2013-10-01 2013-10-01 false Information required before a stability test. 170.085 Section 170.085 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS Plan Approval § 170.085 Information required before a stability test. If a stability test is t...
Pavone, Vincenzo; Esposti, Sara Degli
2012-07-01
As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.
2012-11-01
Abbreviations BPC building partner capacity DOD Department of Defense DSCA Defense Security Cooperation Agency EFTS Enhanced Freight Tracking System...SCOs are ready to receive a planned delivery. For both FMS and pseudo-FMS processes, DOD uses the Enhanced Freight Tracking System ( EFTS ), a secure...providing data for this system. The Security Assistance Management Manual recommends that SCOs use the EFTS to maintain awareness of incoming shipments
45 CFR 702.53 - Closed meetings.
Code of Federal Regulations, 2010 CFR
2010-10-01
... currencies, securities, commodities, or financial institutions, be likely to: (A) Lead to significant financial speculation in currencies, securities, or commodities, or (B) Significantly endanger the stability...
45 CFR 702.53 - Closed meetings.
Code of Federal Regulations, 2011 CFR
2011-10-01
... currencies, securities, commodities, or financial institutions, be likely to: (A) Lead to significant financial speculation in currencies, securities, or commodities, or (B) Significantly endanger the stability...
Lawlis, Tanya; Islam, Wasima; Upton, Penney
2018-04-01
Food security is defined by four dimensions: food availability, access, utilisation and stability. Resettled refugees face unique struggles securing these dimensions and, thus, food security when moving to a new country. This systematic review aimed to identify the challenges Australian refugees experience in achieving the four dimensions of food security. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines were followed; the SPIDER tool was used to determine eligibility criteria. Three databases were searched using terms relating to food in/security and refugees from 2000 to 20 May 2017. Seven articles were retained for analysis. Studies were categorised against the four dimensions, with four studies identifying challenges against all dimensions. Challenges contributing to high levels of food insecurity in each dimension included: availability and cost of traditional foods, difficulty in accessing preferred food outlets, limited food knowledge and preparation skills and food stability due to low income and social support. Food insecurity adversely impacts refugee health and integration. Methodical research framed by the four dimensions of food security is imperative to address challenges to securing food security in refugee groups and assisting in the development of sustainable interventions. © 2017 Dietitians Association of Australia.
Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rogers,E.; deBoer,G.; Crawford, C.
2009-10-19
The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the riskmore » of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.« less
46 CFR 179.212 - Watertight bulkheads for subdivision and damage stability.
Code of Federal Regulations, 2011 CFR
2011-10-01
... this chapter, a monohull vessel which undergoes a simplified stability proof test in accordance with... stability. 179.212 Section 179.212 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER 100 GROSS TONS) SUBDIVISION, DAMAGE STABILITY, AND WATERTIGHT INTEGRITY Subdivision...
46 CFR 179.212 - Watertight bulkheads for subdivision and damage stability.
Code of Federal Regulations, 2012 CFR
2012-10-01
... this chapter, a monohull vessel which undergoes a simplified stability proof test in accordance with... stability. 179.212 Section 179.212 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER 100 GROSS TONS) SUBDIVISION, DAMAGE STABILITY, AND WATERTIGHT INTEGRITY Subdivision...
46 CFR 179.212 - Watertight bulkheads for subdivision and damage stability.
Code of Federal Regulations, 2013 CFR
2013-10-01
... this chapter, a monohull vessel which undergoes a simplified stability proof test in accordance with... stability. 179.212 Section 179.212 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER 100 GROSS TONS) SUBDIVISION, DAMAGE STABILITY, AND WATERTIGHT INTEGRITY Subdivision...
46 CFR 179.212 - Watertight bulkheads for subdivision and damage stability.
Code of Federal Regulations, 2014 CFR
2014-10-01
... this chapter, a monohull vessel which undergoes a simplified stability proof test in accordance with... stability. 179.212 Section 179.212 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER 100 GROSS TONS) SUBDIVISION, DAMAGE STABILITY, AND WATERTIGHT INTEGRITY Subdivision...
46 CFR 28.530 - Stability instructions.
Code of Federal Regulations, 2010 CFR
2010-10-01
... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY UNINSPECTED VESSELS REQUIREMENTS FOR COMMERCIAL FISHING... ensure that vessel masters and individuals in charge of vessels are provided with enough stability... personnel in the commercial fishing industry have had specialized training in stability. Therefore...
Liyanage, Thakshila; Rael, Ashur; Shaffer, Sidney; Zaidi, Shozaf; Goodpaster, John V; Sardar, Rajesh
2018-04-30
Apart from high sensitivity and selectivity of surface-enhanced Raman scattering (SERS)-based trace explosive detection, efficient sampling of explosive residue from real world surfaces is very important for homeland security applications. Herein, we demonstrate an entirely new SERS nanosensor fabrication approach. The SERS nanosensor was prepared by self-assembling chemically synthesized gold triangular nanoprisms (Au TNPs), which we show display strong electromagnetic field enhancements at the sharp tips and edges, onto a pressure-sensitive flexible adhesive film. Our SERS nanosensor provides excellent SERS activity (enhancement factor = ∼6.0 × 106) and limit of detection (as low as 56 parts-per-quadrillions) with high selectivity by chemometric analyses among three commonly military high explosives (TNT, RDX, and PETN). Furthermore, the SERS nanosensors present excellent reproducibility (<4.0% relative standard deviation at 1.0 μM concentration) and unprecedentedly high stability with a "shelf life" of at least 5 months. Finally, TNT and PETN were analyzed and quantified by transferring solid explosive residues from fingerprints left on solid surfaces to the SERS nanosensor. Taken together, the demonstrated sensitivity, selectivity, and reliability of the measurements as well as with the excellent shelf life of our SERS nanosensors obviate the need for complicated sample processing steps required for other analytical techniques, and thus these nanosensors have tremendous potential not only in the field of measurement science but also for homeland security applications to combat acts of terror and military threats.
Under Secretary of Defense for Policy > OUSDP Offices > ASD for Homeland
Defense Global Security > Defense Critical Infrastructure Program > Roles Skip to main for Asian and Pacific Security Affairs ASD for Homeland Defense Global Security DASD Defense -Intensity Conflict Counternarcotics and Global Threats Stability and Humanitarian Affairs Special Operations
The doctrinal basis for medical stability operations.
Baker, Jay B
2010-01-01
This article describes possible roles for the military in the health sector during stability operations, which exist primarily when security conditions do not permit the free movement of civilian actors. This article reviews the new U.S. Army Field Manuals (FMs) 3-24, Counterinsurgency and FM 3-07, Stability Operations, in the context of the health sector. Essential tasks in medical stability operations are identified for various logical lines of operation including information operations, civil security, civil control, support to governance, support to economic development, and restoration of essential services. Restoring essential services is addressed in detail including coordination, assessment, actions, and metrics in the health sector. Coordination by the military with other actors in the health sector including host nation medical officials, other United States governmental agencies, international governmental organizations (IGOs), and nongovernment organizations (NGOs) is key to success in medical stability operations.
PMU-Aided Voltage Security Assessment for a Wind Power Plant
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jiang, Huaiguang; Zhang, Yingchen; Zhang, Jun Jason
2015-10-05
Because wind power penetration levels in electric power systems are continuously increasing, voltage stability is a critical issue for maintaining power system security and operation. The traditional methods to analyze voltage stability can be classified into two categories: dynamic and steady-state. Dynamic analysis relies on time-domain simulations of faults at different locations; however, this method needs to exhaust faults at all locations to find the security region for voltage at a single bus. With the widely located phasor measurement units (PMUs), the Thevenin equivalent matrix can be calculated by the voltage and current information collected by the PMUs. This papermore » proposes a method based on a Thevenin equivalent matrix to identify system locations that will have the greatest impact on the voltage at the wind power plant's point of interconnection. The number of dynamic voltage stability analysis runs is greatly reduced by using the proposed method. The numerical results demonstrate the feasibility, effectiveness, and robustness of the proposed approach for voltage security assessment for a wind power plant.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chung, W. S.; Yun, S. W.; Lee, D. S.
2012-07-01
Questions of whether past nuclear regulatory body of Korea is not a proper system to monitor and check the country's nuclear energy policy and utilization have been raised. Moreover, a feeling of insecurity regarding nuclear safety after the nuclear accident in Japan has spread across the public. This has stimulated a renovation of the nuclear safety regime in Korea. The Nuclear Safety and Security Commission (NSSC) was launched on October 26, 2011 as a regulatory body directly under the President in charge of strengthening independence and nuclear safety. This was a meaningful event as the NSSC it is a muchmore » more independent regulatory system for Korea. However, the NSSC itself does not guarantee an enhanced public acceptance of the nuclear policy and stable use nuclear energy. This study introduces the new NSSC system and its details in terms of organization structure, appropriateness of specialty, budget stability, and management system. (authors)« less
Press-fit acetabular cup fixation: principles and testing.
Macdonald, W; Carlsson, L V; Charnley, G J; Jacobsson, C M
1999-01-01
Pre-clinical testing of the fixation of press-fit acetabular components of total hip prostheses relies on cadaver or synthetic bone, but the properties and geometry of bone models differ from those of physiological bone. Cup designs use varied mechanisms for initial stability in bone; therefore, using different analogues and tests is appropriate. Press-fit cup stability was tested in the following: firstly, polyurethane (PU) foam modelling cancellous support; secondly, glass-fibre reinforced epoxide (GFRE) tubes modelling acetabular cortical support; thirdly, cadaveric acetabula. Three commercial cups [Harris-Galante II (H-G-II), Zimmer; Optifix, Smith & Nephew, Richards; porous coated anatomic (PCA), Howmedica] and an experimental cup with enhanced rim fixation were tested in three modes: direct pull-out, lever-out and axial torque. The fixation stabilities measured in the PU and the GFRE models showed trends consistent with those in cadaver bone, differing in the oversizing and cup geometry. The experimental cup was significantly more secure in most modes than other cups; the H-G II and Optifix cups showed similar stabilities, lower than that of the experimental cup but greater than that of the PCA cup (analysis of variance and Tukey's highly significant test; p < 0.001). The stabilities measured in cadaver bone more closely approximated those in GFRE. The use of several bone analogues enables separation of fixation mechanisms, allowing more accurate prediction of in vivo performance.
Nanomaterial strategies for immunodetection
NASA Astrophysics Data System (ADS)
Porter, M. D.; Granger, M. C.; Siperko, L. M.; Lipert, R. J.
2011-06-01
Metallic nanoparticles are playing increasingly important roles in biodiagnostic platforms. This emergence reflects the need to detect disease indicating entities at increasingly lower levels in human and veterinary diagnostics, homeland security, and food and water safety. To establish this perspective, this paper overviews our recent work using surface enhanced Raman scattering for detection of proteins, viruses, and microorganisms in heterogeneous immunoassays. It describes the assay platform, which is comprised of an antibody-modified capture substrate and gold nanoparticle-based label. The latter draws on the ability to reproducibly construct gold nanoparticles modified with a monolayer of an intrinsically strong Raman scatterer that is then coated with a layer of antibodies. This construct, referred to as an extrinsic Raman label, takes advantage of the signal enhancement of scatterers when coated on nanometer-sized gold particles and the antigenic binding specificity of the immobilized antibody layer. Challenges related to nonspecific adsorption, particle stability, and measurement reproducibility are also briefly examined.
The human factor: enhancing women's rights.
Steinzor, N
1995-01-01
The Universal Declaration of Human Rights, adopted by the UN in 1948, declares that all human beings are born free and equal in dignity and rights, and that everyone has the right to life, liberty, and security of person. In practice, however, far from everyone has these rights, especially women. Many women worldwide have neither the awareness of nor access to family planning methods with which they could regulate their fertility and childbearing. Thus deprived of their reproductive freedom, these women cannot pursue education, employment, and other life options which would otherwise be readily available to them were they not saddled with poor reproductive health and too many children. Expanded choices enhance the status of women, which in turn helps them to reduce fertility rates and stabilize population growth. The author discusses how the wide range of cultural and social norms, and economic and political systems worldwide make it very difficult and complex to actually implement universal human rights.
Novel technology for enhanced security and trust in communication networks
NASA Astrophysics Data System (ADS)
Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit; Jannson, Tomasz
2011-06-01
A novel technology that significantly enhances security and trust in wireless and wired communication networks has been developed. It is based on integration of a novel encryption mechanism and novel data packet structure with enhanced security tools. This novel data packet structure results in an unprecedented level of security and trust, while at the same time reducing power consumption and computing/communication overhead in networks. As a result, networks are provided with protection against intrusion, exploitation, and cyber attacks and posses self-building, self-awareness, self-configuring, self-healing, and self-protecting intelligence.
Security and Stability Analysis of Wind Farms Integration into Distribution Network
NASA Astrophysics Data System (ADS)
Guan-yang, Li; Hongzhao, Wang; Guanglei, Li; Yamei, Cheng; Hong-zheng, Liu; Yi, Sun
2017-05-01
With the increasing share of the wind power in the power system, wind power fluctuations will cause obvious negative impacts on weak local grid. This paper firstly establish electromechanical transient simulation model for doubly fed induction wind turbine, then use Matlab/Simulink to achieve power flow calculation and transient simulation of power system including wind farms, the local synchronous generator, load, etc, finally analyze wind power on the impact of the local power grid under typical circumstances. The actual calculated results indicate that wind mutation causes little effect on the power grid, but when the three-phase short circuit fault happens, active power of wind power decreases sharply and the voltage of location of wind power into the grid also drop sharply, finally wind farm split from power system. This situation is not conducive to security and stability of the local power grid. It is necessary to develop security and stability measures in the future.
Single Logon: balancing security and healthcare productivity.
Sapp, Margaret J; Behrens, Terrence L
2004-01-01
Mayo Single Logon (MSL) has faced the traditional dilemma that is painful to all IT organizations because it forces the tradeoff between user productivity and security. Recent regulatory initiatives, such as HIPAA, have caused the issue of security to take on more importance, forcing organizations to revisit the balance of security and productivity. MSL is a security application that brokers user credentials and facilitates desktop security. The simple design, functionality and stability have allowed MSL to speed up user productivity, keep satisfaction high and help solve many security initiatives.
2009-12-01
6 Intercity Passenger Rail Program (Amtrak) .....................................................................7 Intercity Bus Security Grant...20 Additionally Amtrak is eligible to receive funding to continue security enhancements for its intercity rail services between high-risk urban...Research Service 7 Intercity Passenger Rail Program (Amtrak) The Intercity Passenger Rail Program (IPR) is designed to enhance security of the
Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Crawford, Cary E.; de Boer, Gloria; De Castro, Kara
2010-10-01
The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the “human factor.” Gen. Eugene Habiger, a former “Assistant Secretary for Safeguards and Security” at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that “good security is 20% equipment and 80% people.”1 Although eliminating the “human factor” is not possible, accounting for and mitigating the riskmore » of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.« less
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 4 2014-10-01 2014-10-01 false Stability. 108.301 Section 108.301 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Stability... Mobile Offshore Drilling Units. [CGD 79-023, 48 FR 51008, Nov. 4, 1983] ...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 4 2011-10-01 2011-10-01 false Stability. 108.301 Section 108.301 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Stability... Mobile Offshore Drilling Units. [CGD 79-023, 48 FR 51008, Nov. 4, 1983] ...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 4 2013-10-01 2013-10-01 false Stability. 108.301 Section 108.301 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Stability... Mobile Offshore Drilling Units. [CGD 79-023, 48 FR 51008, Nov. 4, 1983] ...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 4 2010-10-01 2010-10-01 false Stability. 108.301 Section 108.301 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Stability... Mobile Offshore Drilling Units. [CGD 79-023, 48 FR 51008, Nov. 4, 1983] ...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 4 2012-10-01 2012-10-01 false Stability. 108.301 Section 108.301 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Stability... Mobile Offshore Drilling Units. [CGD 79-023, 48 FR 51008, Nov. 4, 1983] ...
Dinwoodie, Thomas L.
2002-12-17
A stabilized PV system comprises an array of photovoltaic (PV) assemblies mounted to a support surface. Each PV assembly comprises a PV module and a support assembly securing the PV module to a position overlying the support surface. The array of modules is circumscribed by a continuous, belt-like perimeter assembly. Cross strapping, extending above, below or through the array, or some combination of above, below and through the array, secures a first position along the perimeter assembly to at least a second position along the perimeter assembly thereby stabilizing the array against wind uplift forces. The first and second positions may be on opposite sides on the array.
Sieben, Michaela; Steinhorn, Gregor; Müller, Carsten; Fuchs, Simone; Ann Chin, Laura; Regestein, Lars; Büchs, Jochen
2016-11-01
Plasmids are common vectors to genetically manipulate Escherichia coli or other microorganisms. They are easy to use and considerable experience has accumulated on their application in heterologous protein production. However, plasmids can be lost during cell growth, if no selection pressure like, e.g., antibiotics is used, hampering the production of the desired protein and endangering the economic success of a biotechnological production process. Thus, in this study the Continuously Operated Shaken BIOreactor System (COSBIOS) is applied as a tool for fast parallel testing of strain stability and operation conditions and to evaluate measures to counter such plasmid loss. In specific, by applying various ampicillin concentrations, the lowest effective ampicillin dosage is investigated to secure plasmid stability while lowering adverse ecological effects. A significant difference was found in the growth rates of plasmid-bearing and plasmid-free cells. The undesired plasmid-free cells grew 30% faster than the desired plasmid-bearing cells. During the testing of plasmid stability without antibiotics, the population fraction of plasmid-bearing cells rapidly decreased in continuous culture to zero within the first 48 h. An initial single dosage of ampicillin did not prevent plasmid loss. By contrast, a continuous application of a low dosage of 10 µg/mL ampicillin in the feed medium maintained plasmid stability in the culture. Consequently, the COSBIOS is an apt reactor system for measuring plasmid stability and evaluating methods to enhance this stability. Hence, decreased production of heterologous protein can be prevented. © 2016 American Institute of Chemical Engineers Biotechnol. Prog., 32:1418-1425, 2016. © 2016 American Institute of Chemical Engineers.
76 FR 6199 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-03
... XI. Voluntary Consensus Standards XII. Finding of No Significant Environmental Impact XIII. Paperwork... potential advantages to NRC licensees and certificate holders to enhance security. The first advantage is... advantage is that security personnel of certain licensees or certificate holders will be permitted to...
The United States Strategy in East Asia-Pacific-Implications for Australia’s Defenses
1996-01-01
Mohamed Najib bin Tun Abdul Razak , "Towards Cooperative Security and Regional Stability, the Malaysian View." The Army and the Future. Ed. David Horner...repair and maintenance of warships on a commercial basis. See The Hon. Datuk Seri Mohamed Najib bin Tun Abdul Razak , 132. Times says that Jakarta...Cambridge University Press, 1965. The Hon. Datuk Seri Mohamed Najib bin Tun Abdul Razak . "Towards Cooperative Security and Regional Stability: The
Iraq: Regional Perspectives and U.S. Policy
2007-01-12
The Regional Strategic Balance and Political Stability . . . . . . . . . . . . . 2 Sectarian and Ethnic Politics and Violence... Political Stability and Energy Security . . . . . . . . . . . . . . 27 Eliminating Transnational Terrorist Threats...Strategic Balance and Political Stability . The removal of the Saddam Hussein regime upset the tenuous political and economic balance that had existed
46 CFR 174.070 - General damage stability assumptions.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 7 2013-10-01 2013-10-01 false General damage stability assumptions. 174.070 Section 174.070 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY SPECIAL RULES PERTAINING TO SPECIFIC VESSEL TYPES Special Rules Pertaining to Mobile Offshore Drilling...
46 CFR 174.070 - General damage stability assumptions.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false General damage stability assumptions. 174.070 Section 174.070 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY SPECIAL RULES PERTAINING TO SPECIFIC VESSEL TYPES Special Rules Pertaining to Mobile Offshore Drilling...
Chen, L; Lai, C; Marchewka, R; Berry, R M; Tam, K C
2016-07-21
Structural colors and photoluminescence have been widely used for anti-counterfeiting and security applications. We report for the first time the use of CdS quantum dot (QD)-functionalized cellulose nanocrystals (CNCs) as building blocks to fabricate nanothin films via layer-by-layer (LBL) self-assembly for anti-counterfeiting applications. Both negatively- and positively-charged CNC/QD nanohybrids with a high colloidal stability and a narrow particle size distribution were prepared. The controllable LBL coating process was characterized by scanning electron microscopy and ellipsometry. The rigid structure of CNCs leads to nanoporous structured films on poly(ethylene terephthalate) (PET) substrates with high transmittance (above 70%) over the entire range of visible light and also resulted in increased hydrophilicity (contact angles of ∼40 degrees). Nanothin films on PET substrates showed good flexibility and enhanced stability in both water and ethanol. The modified PET films with structural colors from thin-film interference and photoluminescence from QDs can be used in anti-counterfeiting applications.
BALKANS SECURITY. Current and Projected Factors Affecting Regional Stability
2000-04-01
Security Briefing Section II Current Situation in Kosovo and Bosnia primary responsibility for public security in Kosovo. 6 According to a senior KFOR...Integrity * Reliability GAO/NSIAD-00-125BR „.c-miBUTION STATEMENT A ApSwed for Public Release Contents Letter Briefing Section Appendixes Tables...Figures Briefing Section I: Background Briefing Section II: Current Situation in Kosovo and Bosnia Briefing Section III: Projected Security Situation
Security: The Fourth Pillar of the Caribbean Community. Does the Region Need a Security Organ
2016-06-10
activities disrupt stability, undermine democratic institutions and hinder the economic activity so vital to the region. Geostrategic Significance...of the Caribbean region and CARICOM, as well as an overview of its organization and role as a major regional institution . The chapter also...various national security institutions mandated to address the needs of the specific countries. Among their national security architecture, CARICOM
Cyber Deterrence and Stability
DOE Office of Scientific and Technical Information (OSTI.GOV)
Goychayev, Rustam; Carr, Geoffrey A.; Weise, Rachel A.
Throughout the 20th and early 21st centuries, deterrence and arms control have been cornerstones of strategic stability between the superpowers. However, the weaponization of the cyber realm by State actors and the multipolar nature of cyber conflict now undermines that stability. Strategic stability is the state in which nations believe that if they act aggressively to undermine U.S. national interests and the post-World War II liberal democratic order, the consequences will outweigh the benefits. The sense of lawlessness and lack of consequences in the cyber realm embolden States to be more aggressive in taking actions that undermine stability. Accordingly, thismore » paper examines 1) the role of deterrence and arms control in securing cyber stability, and 2) the limitations and challenges associated with these traditional national security paradigms as applied to this emerging threat domain. This paper demonstrates that many 20th-century deterrence and arms control concepts are not particularly applicable in the cyber realm. However, they are not entirely irrelevant. The United States can distill lessons learned from this rich deterrence and arms control experience to develop and deploy a strategy to advance cyber stability.« less
46 CFR 174.045 - Intact stability requirements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 7 2013-10-01 2013-10-01 false Intact stability requirements. 174.045 Section 174.045 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY SPECIAL RULES PERTAINING TO SPECIFIC VESSEL TYPES Special Rules Pertaining to Mobile Offshore Drilling Units § 174.045...
46 CFR 174.085 - Flooding on column stabilized units.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Flooding on column stabilized units. 174.085 Section 174.085 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY SPECIAL RULES PERTAINING TO SPECIFIC VESSEL TYPES Special Rules Pertaining to Mobile Offshore Drilling...
46 CFR 174.085 - Flooding on column stabilized units.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 7 2013-10-01 2013-10-01 false Flooding on column stabilized units. 174.085 Section 174.085 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY SPECIAL RULES PERTAINING TO SPECIFIC VESSEL TYPES Special Rules Pertaining to Mobile Offshore Drilling...
46 CFR 174.050 - Stability on bottom.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 7 2013-10-01 2013-10-01 false Stability on bottom. 174.050 Section 174.050 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY SPECIAL RULES PERTAINING TO SPECIFIC VESSEL TYPES Special Rules Pertaining to Mobile Offshore Drilling Units § 174.050...
46 CFR 174.045 - Intact stability requirements.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Intact stability requirements. 174.045 Section 174.045 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY SPECIAL RULES PERTAINING TO SPECIFIC VESSEL TYPES Special Rules Pertaining to Mobile Offshore Drilling Units § 174.045...
46 CFR 174.065 - Damage stability requirements.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Damage stability requirements. 174.065 Section 174.065 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY SPECIAL RULES PERTAINING TO SPECIFIC VESSEL TYPES Special Rules Pertaining to Mobile Offshore Drilling Units § 174.065...
46 CFR 174.065 - Damage stability requirements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 7 2013-10-01 2013-10-01 false Damage stability requirements. 174.065 Section 174.065 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY SPECIAL RULES PERTAINING TO SPECIFIC VESSEL TYPES Special Rules Pertaining to Mobile Offshore Drilling Units § 174.065...
46 CFR 174.050 - Stability on bottom.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Stability on bottom. 174.050 Section 174.050 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY SPECIAL RULES PERTAINING TO SPECIFIC VESSEL TYPES Special Rules Pertaining to Mobile Offshore Drilling Units § 174.050...
46 CFR 169.840 - Verification of vessel compliance with applicable stability requirements.
Code of Federal Regulations, 2012 CFR
2012-10-01
... stability requirements. 169.840 Section 169.840 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Operations Tests, Drills, and Inspections § 169.840 Verification of vessel compliance with applicable stability requirements. (a) After loading and prior to...
33 CFR 183.330 - Stability test.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Stability test. 183.330 Section 183.330 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... of 2 Horsepower or Less Tests § 183.330 Stability test. (a) Flotation standard. When the conditions...
33 CFR 183.330 - Stability test.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Stability test. 183.330 Section 183.330 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... of 2 Horsepower or Less Tests § 183.330 Stability test. (a) Flotation standard. When the conditions...
33 CFR 183.330 - Stability test.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Stability test. 183.330 Section 183.330 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... of 2 Horsepower or Less Tests § 183.330 Stability test. (a) Flotation standard. When the conditions...
33 CFR 183.330 - Stability test.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Stability test. 183.330 Section 183.330 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... of 2 Horsepower or Less Tests § 183.330 Stability test. (a) Flotation standard. When the conditions...
33 CFR 183.230 - Stability test.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Stability test. 183.230 Section 183.230 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... of More Than 2 Horsepower Tests § 183.230 Stability test. (a) Flotation standard. When the conditions...
33 CFR 183.230 - Stability test.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Stability test. 183.230 Section 183.230 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... of More Than 2 Horsepower Tests § 183.230 Stability test. (a) Flotation standard. When the conditions...
46 CFR 169.840 - Verification of vessel compliance with applicable stability requirements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... stability requirements. 169.840 Section 169.840 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Operations Tests, Drills, and Inspections § 169.840 Verification of vessel compliance with applicable stability requirements. (a) After loading and prior to...
46 CFR 169.840 - Verification of vessel compliance with applicable stability requirements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... stability requirements. 169.840 Section 169.840 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Operations Tests, Drills, and Inspections § 169.840 Verification of vessel compliance with applicable stability requirements. (a) After loading and prior to...
33 CFR 183.230 - Stability test.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Stability test. 183.230 Section 183.230 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... of More Than 2 Horsepower Tests § 183.230 Stability test. (a) Flotation standard. When the conditions...
33 CFR 183.230 - Stability test.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Stability test. 183.230 Section 183.230 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... of More Than 2 Horsepower Tests § 183.230 Stability test. (a) Flotation standard. When the conditions...
33 CFR 183.230 - Stability test.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Stability test. 183.230 Section 183.230 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... of More Than 2 Horsepower Tests § 183.230 Stability test. (a) Flotation standard. When the conditions...
33 CFR 183.330 - Stability test.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Stability test. 183.330 Section 183.330 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... of 2 Horsepower or Less Tests § 183.330 Stability test. (a) Flotation standard. When the conditions...
The Effect of Piracy on Somalia as a Failed State
2011-02-01
economic stability and security for Somalia needed to eradicate piracy. If the U.S. were involved in another operation in Somalia to eradicate pirate bases, the international community must provide security and economic stability via a land-based approach. Problem: If the U.S. were involved in another operation in Somalia to eradicate pirate bases, Somalia’s geography, transportation, and political conditions present challenges. The country suffered from drought in the 1990’s, which made peacekeeping forces depend ’on organic supplies.
29 CFR 825.101 - Purpose of the Act.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., to promote the stability and economic security of families, and to promote national interests in... stability in the family and productivity in the workplace. FMLA will encourage the development of high...
46 CFR 97.15-7 - Verification of vessel compliance with applicable stability requirements.
Code of Federal Regulations, 2012 CFR
2012-10-01
... stability requirements. 97.15-7 Section 97.15-7 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS OPERATIONS Tests, Drills, and Inspections § 97.15-7 Verification of vessel compliance with applicable stability requirements. (a) Except as provided in paragraph (d...
46 CFR 196.15-7 - Verification of vessel compliance with applicable stability requirements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... stability requirements. 196.15-7 Section 196.15-7 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS OPERATIONS Test, Drills, and Inspections § 196.15-7 Verification of vessel compliance with applicable stability requirements. (a) After loading and prior to departure...
46 CFR 97.15-7 - Verification of vessel compliance with applicable stability requirements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... stability requirements. 97.15-7 Section 97.15-7 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS OPERATIONS Tests, Drills, and Inspections § 97.15-7 Verification of vessel compliance with applicable stability requirements. (a) Except as provided in paragraph (d...
46 CFR 196.15-7 - Verification of vessel compliance with applicable stability requirements.
Code of Federal Regulations, 2012 CFR
2012-10-01
... stability requirements. 196.15-7 Section 196.15-7 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS OPERATIONS Test, Drills, and Inspections § 196.15-7 Verification of vessel compliance with applicable stability requirements. (a) After loading and prior to departure...
46 CFR 97.15-7 - Verification of vessel compliance with applicable stability requirements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... stability requirements. 97.15-7 Section 97.15-7 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS OPERATIONS Tests, Drills, and Inspections § 97.15-7 Verification of vessel compliance with applicable stability requirements. (a) Except as provided in paragraph (d...
46 CFR 196.15-7 - Verification of vessel compliance with applicable stability requirements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... stability requirements. 196.15-7 Section 196.15-7 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS OPERATIONS Test, Drills, and Inspections § 196.15-7 Verification of vessel compliance with applicable stability requirements. (a) After loading and prior to departure...
46 CFR 178.320 - Intact stability requirements-non-sailing vessels.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 7 2011-10-01 2011-10-01 false Intact stability requirements-non-sailing vessels. 178.320 Section 178.320 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER... Intact stability requirements—non-sailing vessels. (a) As permitted by § 178.310(c) of this part, the...
Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng
2018-01-11
Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.
An, Younghwa
2012-01-01
Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.
An, Younghwa
2012-01-01
Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. PMID:22899887
2008 Stability, Security, Transition and Reconstruction Operations Conference
2008-09-04
Facilitator Power of Public-Private Partnerships • Health Professional Education • Greater Access to Care China Diabetes Education Program Dominican Republic...Argentina Canada Chile Colombia Ecuador Peru Uruguay Interagency, multinational, inter-institutional partnerships State Department Homeland Security...Disaster Preparedness Disaster Response Regional Response Capacity OFDA-LAC / MDROs Regional Security System (RSS) UNCLASSIFIED ECUADOR / KY PERU / WV
Security region-based small signal stability analysis of power systems with FSIG based wind farm
NASA Astrophysics Data System (ADS)
Qin, Chao; Zeng, Yuan; Yang, Yang; Cui, Xiaodan; Xu, Xialing; Li, Yong
2018-02-01
Based on the Security Region approach, the impact of fixed-speed induction generator based wind farm on the small signal stability of power systems is analyzed. Firstly, the key factors of wind farm on the small signal stability of power systems are analyzed and the parameter space for small signal stability region is formed. Secondly, the small signal stability region of power systems with wind power is established. Thirdly, the corresponding relation between the boundary of SSSR and the dominant oscillation mode is further studied. Results show that the integration of fixed-speed induction generator based wind farm will cause the low frequency oscillation stability of the power system deteriorate. When the output of wind power is high, the oscillation stability of the power system is mainly concerned with the inter-area oscillation mode caused by the integration of the wind farm. Both the active power output and the capacity of reactive power compensation of the wind farm have a significant influence on the SSSR. To improve the oscillation stability of power systems with wind power, it is suggested to reasonably set the reactive power compensation capacity for the wind farm through SSSR.
78 FR 42510 - 36(b)(1) Arms Sales Notification
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-16
..., political and economic stability and have served U.S. national security interests. Australia will use the MK... in the Western Pacific that contributes significantly to ensuring peace and stability in the region...
NASA Astrophysics Data System (ADS)
Roselyn, J. Preetha; Devaraj, D.; Dash, Subhransu Sekhar
2013-11-01
Voltage stability is an important issue in the planning and operation of deregulated power systems. The voltage stability problems is a most challenging one for the system operators in deregulated power systems because of the intense use of transmission line capabilities and poor regulation in market environment. This article addresses the congestion management problem avoiding offline transmission capacity limits related to voltage stability by considering Voltage Security Constrained Optimal Power Flow (VSCOPF) problem in deregulated environment. This article presents the application of Multi Objective Differential Evolution (MODE) algorithm to solve the VSCOPF problem in new competitive power systems. The maximum of L-index of the load buses is taken as the indicator of voltage stability and is incorporated in the Optimal Power Flow (OPF) problem. The proposed method in hybrid power market which also gives solutions to voltage stability problems by considering the generation rescheduling cost and load shedding cost which relieves the congestion problem in deregulated environment. The buses for load shedding are selected based on the minimum eigen value of Jacobian with respect to the load shed. In the proposed approach, real power settings of generators in base case and contingency cases, generator bus voltage magnitudes, real and reactive power demands of selected load buses using sensitivity analysis are taken as the control variables and are represented as the combination of floating point numbers and integers. DE/randSF/1/bin strategy scheme of differential evolution with self-tuned parameter which employs binomial crossover and difference vector based mutation is used for the VSCOPF problem. A fuzzy based mechanism is employed to get the best compromise solution from the pareto front to aid the decision maker. The proposed VSCOPF planning model is implemented on IEEE 30-bus system, IEEE 57 bus practical system and IEEE 118 bus system. The pareto optimal front obtained from MODE is compared with reference pareto front and the best compromise solution for all the cases are obtained from fuzzy decision making strategy. The performance measures of proposed MODE in two test systems are calculated using suitable performance metrices. The simulation results show that the proposed approach provides considerable improvement in the congestion management by generation rescheduling and load shedding while enhancing the voltage stability in deregulated power system.
49 CFR 1562.29 - Armed security officer requirements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for... 49 Transportation 9 2013-10-01 2013-10-01 false Armed security officer requirements. 1562.29...
49 CFR 1562.29 - Armed security officer requirements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for... 49 Transportation 9 2014-10-01 2014-10-01 false Armed security officer requirements. 1562.29...
49 CFR 1562.29 - Armed security officer requirements.
Code of Federal Regulations, 2012 CFR
2012-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for... 49 Transportation 9 2012-10-01 2012-10-01 false Armed security officer requirements. 1562.29...
Building Partner Country Capacity for Stability Operations
2011-01-01
international aFFairs law and Business national seCurity population and aging puBliC saFety sCienCe and teChnology terrorism and homeland seCurity this... Quantic Thurston, MG-942-A, 2010 (available at http://www.rand.org/pubs/monographs/MG942.html). This research brief was written by Kristin J. Leuschner...AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY TERRORISM AND HOMELAND SECURITY
2017-12-01
poses a threat to regional security and economic stability—major U.S. national interests. Distributed maritime capability is demonstrated by applying...regional security, economic stability, fisheries enforcement 15. NUMBER OF PAGES 95 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT...a dominant aggressor in the South China Sea that poses a threat to regional security and economic stability—major U.S. national interests
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5 business...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5 business...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5 business...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5 business...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form X-17A-19 Report by... Certain Stabilizing Activities § 240.17a-19 Form X-17A-19 Report by national securities exchanges and... Corporation such information as is required by § 249.635 of this chapter on Form X-17A-19 within 5 business...
Mendiondo, Guillermina M; Gibbs, Daniel J; Szurman-Zubrzycka, Miriam; Korn, Arnd; Marquez, Julietta; Szarejko, Iwona; Maluszynski, Miroslaw; King, John; Axcell, Barry; Smart, Katherine; Corbineau, Francoise; Holdsworth, Michael J
2016-01-01
Increased tolerance of crops to low oxygen (hypoxia) during flooding is a key target for food security. In Arabidopsis thaliana (L.) Heynh., the N-end rule pathway of targeted proteolysis controls plant responses to hypoxia by regulating the stability of group VII ethylene response factor (ERFVII) transcription factors, controlled by the oxidation status of amino terminal (Nt)-cysteine (Cys). Here, we show that the barley (Hordeum vulgare L.) ERFVII BERF1 is a substrate of the N-end rule pathway in vitro. Furthermore, we show that Nt-Cys acts as a sensor for hypoxia in vivo, as the stability of the oxygen-sensor reporter protein MCGGAIL-GUS increased in waterlogged transgenic plants. Transgenic RNAi barley plants, with reduced expression of the N-end rule pathway N-recognin E3 ligase PROTEOLYSIS6 (HvPRT6), showed increased expression of hypoxia-associated genes and altered seed germination phenotypes. In addition, in response to waterlogging, transgenic plants showed sustained biomass, enhanced yield, retention of chlorophyll, and enhanced induction of hypoxia-related genes. HvPRT6 RNAi plants also showed reduced chlorophyll degradation in response to continued darkness, often associated with waterlogged conditions. Barley Targeting Induced Local Lesions IN Genomes (TILLING) lines, containing mutant alleles of HvPRT6, also showed increased expression of hypoxia-related genes and phenotypes similar to RNAi lines. We conclude that the N-end rule pathway represents an important target for plant breeding to enhance tolerance to waterlogging in barley and other cereals. © 2015 The Authors. Plant Biotechnology Journal published by Society for Experimental Biology and The Association of Applied Biologists and John Wiley & Sons Ltd.
77 FR 22835 - Notice of Passenger Facility Charge (PFC) Approvals and Disapprovals
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-17
... Description of Projects Approved for Collection and Use: Install primary crash network. Security enhancements--access control 1. Acquire computer based interactive training system. Security enhancements--access...
DOT National Transportation Integrated Search
2009-05-01
To enhance aviation security, the Department of Homeland Securitys (DHS) Transportation Security Administration (TSA) developed a programknown as Secure Flightto assume from air carriers the function of matching passenger information against...
Nonimmigrant Overstays: Brief Synthesis of the Issue
2010-01-15
finger biometric system for immigration identification17 to the major identity management and screening... finger scans and digital photographs) to check identity. Enhanced Border Security and Visa Entry Reform Act of 2002 The Enhanced Border Security ...further provides: “A determination by the Secretary of Homeland Security that an alien who applied for authorization to travel to the United States
stability Science & Innovation Collaboration Careers Community Environment Science & Innovation . Provide a safe, secure, and effective stockpile Protect against the nuclear threat Counter emerging excellence STRATEGY We will create a modern workplace that is environmentally responsible, safe, and secure
Perspectives on nutrition needs for the new millennium for South Asian regions.
Krishnaswamy, K
2001-06-01
South Asia is the most populated region of the world with several nutritional challenges. Though per capita food energy supply, child survival and life expectancy have improved, and even today large segments of the population are below the poverty line with high infant and maternal mortality rates. It is important to recognize the crucial role of nutrition throughout the life cycle-from conception to old age. It is very necessary now to move from food security to nutrition security and improve the quality of foods both in macro- and micronutrients in order to break the transgenerational effects of malnutrition. The key solutions to the problems should address the issue of social development, population stabilization, environmental degradation and inadequate health and nutritional services. Strategies for empowering women and actuating community participation as sustainable programmes for human development, measures to reduce underweight and stunting in children and prevention of micronutrient malnutrition across the population are required. Enhancing food and nutrition security through innovative diversified agriculture and dietary practices, prevention and control of infection, promotion of food safety and fortification of staples with appropriate attention on emerging chronic disorders are essential. Population control measures to stabilize the fertility rates, biotechnological approaches for genetically modified foods, nutrition surveillance based on assessment, analysis and action to address the logistic, technical and compliance issues with emphasis on promotion of breast feeding and complementary foods with adequate attention on the reproductive needs of adolescent girls, pregnant mothers and lactating women would eliminate low birth weight, stunting, and chronic energy deficiency in vulnerable groups. Focused studies on bioavailability of micronutrients and its enhancement, innovative horticulture interventions, fortifications, social marketing strategies would promote the intake of micronutrient and phytonutrient rich foods. In-depth epidemiological research, an insight into foetal origins of adult disease and nutrition-genes interaction and life style alterations will avert the emerging epidemic of chronic diet related disorders. An investment in preventing foetal malnutrition improves nutrition of women in reproductive age, infant and child nutrition and prevents the onset of chronic disease in adult life. Human resource development, IEC measures, technology transfer, operational and logistic research, building of databases, integrated, intersectoral, multidisciplinary plans and sound management information system and surveillance with net working and experience sharing in the region will help to overcome the common challenges and lay the foundation for a better scenario in these regions in the near future.
Choices in International Conflict: With a Focus on Security Issues in Asia.
ERIC Educational Resources Information Center
Francis, Gregory; Mukai, Gary; Kim, Pearl; Leininger, James
Many world leaders and scholars feel that the U.S.-Japan Security Alliance is essential for long-term peace, prosperity, and stability in Asia. The purpose of this curriculum unit is to examine this alliance by introducing students to case studies of international conflict, with a focus on security issues in Asia. Through each of the lessons…
46 CFR 78.17-22 - Verification of vessel compliance with applicable stability requirements.
Code of Federal Regulations, 2012 CFR
2012-10-01
... stability requirements. 78.17-22 Section 78.17-22 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS OPERATIONS Tests, Drills, and Inspections § 78.17-22 Verification of vessel compliance with applicable stability requirements. (a) After loading and prior to departure and at all other...
46 CFR 78.17-22 - Verification of vessel compliance with applicable stability requirements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... stability requirements. 78.17-22 Section 78.17-22 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS OPERATIONS Tests, Drills, and Inspections § 78.17-22 Verification of vessel compliance with applicable stability requirements. (a) After loading and prior to departure and at all other...
46 CFR 78.17-22 - Verification of vessel compliance with applicable stability requirements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... stability requirements. 78.17-22 Section 78.17-22 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS OPERATIONS Tests, Drills, and Inspections § 78.17-22 Verification of vessel compliance with applicable stability requirements. (a) After loading and prior to departure and at all other...
46 CFR 170.295 - Special consideration for free surface of passive roll stabilization tanks.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 7 2011-10-01 2011-10-01 false Special consideration for free surface of passive roll stabilization tanks. 170.295 Section 170.295 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... consideration for free surface of passive roll stabilization tanks. (a) The virtual increase in the vertical...
46 CFR 31.10-30 - Stability requirements-TB/ALL.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 1 2011-10-01 2011-10-01 false Stability requirements-TB/ALL. 31.10-30 Section 31.10-30 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS INSPECTION AND CERTIFICATION Inspections § 31.10-30 Stability requirements—TB/ALL. Each tank vessel must meet the applicable requirements in...
46 CFR 31.10-30 - Stability requirements-TB/ALL.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 1 2013-10-01 2013-10-01 false Stability requirements-TB/ALL. 31.10-30 Section 31.10-30 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS INSPECTION AND CERTIFICATION Inspections § 31.10-30 Stability requirements—TB/ALL. Each tank vessel must meet the applicable requirements in...
46 CFR 31.10-30 - Stability requirements-TB/ALL.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 1 2012-10-01 2012-10-01 false Stability requirements-TB/ALL. 31.10-30 Section 31.10-30 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS INSPECTION AND CERTIFICATION Inspections § 31.10-30 Stability requirements—TB/ALL. Each tank vessel must meet the applicable requirements in...
46 CFR 31.10-30 - Stability requirements-TB/ALL.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Stability requirements-TB/ALL. 31.10-30 Section 31.10-30 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS INSPECTION AND CERTIFICATION Inspections § 31.10-30 Stability requirements—TB/ALL. Each tank vessel must meet the applicable requirements in...
46 CFR 31.10-30 - Stability requirements-TB/ALL.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 1 2014-10-01 2014-10-01 false Stability requirements-TB/ALL. 31.10-30 Section 31.10-30 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS INSPECTION AND CERTIFICATION Inspections § 31.10-30 Stability requirements—TB/ALL. Each tank vessel must meet the applicable requirements in...
18 CFR 375.205 - Closed meetings.
Code of Federal Regulations, 2011 CFR
2011-04-01
... the premature disclosure of which would be: (i) In the case of an agency which regulates currencies, securities, commodities, or financial institutions, likely to: (A) Lead to significant financial speculation in currencies, securities, or commodities, or (B) Significantly endanger the stability of any...
18 CFR 375.205 - Closed meetings.
Code of Federal Regulations, 2010 CFR
2010-04-01
... the premature disclosure of which would be: (i) In the case of an agency which regulates currencies, securities, commodities, or financial institutions, likely to: (A) Lead to significant financial speculation in currencies, securities, or commodities, or (B) Significantly endanger the stability of any...
12 CFR 407.2 - Closing meetings.
Code of Federal Regulations, 2010 CFR
2010-01-01
... the premature disclosure of which would: (i) In the case of an agency which regulates currencies, securities, commodities, or financial institutions, be likely to: (A) Lead to significant financial speculation in currencies, securities, or commodities, or (B) significantly endanger the stability of any...
Islanding the power grid on the transmission level: less connections for more security
Mureddu, Mario; Caldarelli, Guido; Damiano, Alfonso; Scala, Antonio; Meyer-Ortmanns, Hildegard
2016-01-01
Islanding is known as a management procedure of the power system that is implemented at the distribution level to preserve sensible loads from outages and to guarantee the continuity in electricity supply, when a high amount of distributed generation occurs. In this paper we study islanding on the level of the transmission grid and shall show that it is a suitable measure to enhance energy security and grid resilience. We consider the German and Italian transmission grids. We remove links either randomly to mimic random failure events, or according to a topological characteristic, their so-called betweenness centrality, to mimic an intentional attack and test whether the resulting fragments are self-sustainable. We test this option via the tool of optimized DC power flow equations. When transmission lines are removed according to their betweenness centrality, the resulting islands have a higher chance of being dynamically self-sustainable than for a random removal. Less connections may even increase the grid’s stability. These facts should be taken into account in the design of future power grids. PMID:27713509
Virtualizing Resources for the Application Services and Framework Team
NASA Technical Reports Server (NTRS)
Varner, Justin T.; Crawford, Linda K.
2010-01-01
Virtualization is an emerging technology that will undoubtedly have a major impact on the future of Information Technology. It allows for the centralization of resources in an enterprise system without the need to make any changes to the host operating system, file system, or registry. In turn, this significantly reduces cost and administration, and provides a much greater level of security, compatibility, and efficiency. This experiment examined the practicality, methodology, challenges, and benefits of implementing the technology for the Launch Control System (LCS), and more specifically the Application Services (AS) group of the National Aeronautics and Space Administration (NASA) at the Kennedy Space Center (KSC). In order to carry out this experiment, I used several tools from the virtualization company known as VMWare; these programs included VMWare ThinApp, VMWare Workstation, and VMWare ACE. Used in conjunction, these utilities provided the engine necessary to virtualize and deploy applications in a desktop environment on any Windows platform available. The results clearly show that virtualization is a viable technology that can, when implemented properly, dramatically cut costs, enhance stability and security, and provide easier management for administrators.
Islanding the power grid on the transmission level: less connections for more security
NASA Astrophysics Data System (ADS)
Mureddu, Mario; Caldarelli, Guido; Damiano, Alfonso; Scala, Antonio; Meyer-Ortmanns, Hildegard
2016-10-01
Islanding is known as a management procedure of the power system that is implemented at the distribution level to preserve sensible loads from outages and to guarantee the continuity in electricity supply, when a high amount of distributed generation occurs. In this paper we study islanding on the level of the transmission grid and shall show that it is a suitable measure to enhance energy security and grid resilience. We consider the German and Italian transmission grids. We remove links either randomly to mimic random failure events, or according to a topological characteristic, their so-called betweenness centrality, to mimic an intentional attack and test whether the resulting fragments are self-sustainable. We test this option via the tool of optimized DC power flow equations. When transmission lines are removed according to their betweenness centrality, the resulting islands have a higher chance of being dynamically self-sustainable than for a random removal. Less connections may even increase the grid’s stability. These facts should be taken into account in the design of future power grids.
Neural evidence for a multifaceted model of attachment security.
Canterberry, Melanie; Gillath, Omri
2013-06-01
The sense of attachment security has been linked with a host of beneficial outcomes related to personal and relational well-being. Moreover, research has demonstrated that the sense of attachment security can be enhanced via cognitive priming techniques. Studies using such techniques have shown that security priming results with similar outcomes as dispositional attachment security. The way security priming leads to these effects, however, is yet to be unveiled. Using fMRI we took one step in that direction and examined the neural mechanisms underlying enhanced attachment security. Participants were exposed to explicit and implicit security- and insecurity-related words. Security priming led to co-occurring activation in brain areas reflective of cognitive, affective, and behavioral processes (e.g., medial frontal cortex, parahippocampus, BA 6). There were activation differences based on attachment style. This research serves as an important step in mapping out the security process and supports a conceptualization of security as part of a behavioral system with multiple components. Copyright © 2012 Elsevier B.V. All rights reserved.
Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng
2018-01-01
Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719
Physical-enhanced secure strategy in an OFDM-PON.
Zhang, Lijia; Xin, Xiangjun; Liu, Bo; Yu, Jianjun
2012-01-30
The physical layer of optical access network is vulnerable to various attacks. As the dramatic increase of users and network capacity, the issue of physical-layer security becomes more and more important. This paper proposes a physical-enhanced secure strategy for orthogonal frequency division multiplexing passive optical network (OFDM-PON) by employing frequency domain chaos scrambling. The Logistic map is adopted for the chaos mapping. The chaos scrambling strategy can dynamically allocate the scrambling matrices for different OFDM frames according to the initial condition, which enhance the confidentiality of the physical layer. A mathematical model of this secure system is derived firstly, which achieves a secure transmission at physical layer in OFDM-PON. The results from experimental implementation using Logistic mapped chaos scrambling are also given to further demonstrate the efficiency of this secure strategy. An 10.125 Gb/s 64QAM-OFDM data with Logistic mapped chaos scrambling are successfully transmitted over 25-km single mode fiber (SMF), and the experimental results show that proposed security scheme can protect the system from eavesdropper and attacker, while keep a good performance for the legal ONU.
Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho
2017-01-01
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al’s method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration. PMID:28335572
Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho
2017-03-21
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.
Immobilization of laccase on a novel ZnO/SiO2 nano-composited support for dye decolorization
NASA Astrophysics Data System (ADS)
Li, Wei-Xun; Sun, Huai-Yan; Zhang, Rui-Feng
2015-07-01
ZnO nanowires were introduced into macroporous SiO2 by means of in situ hydrothermal growth. The obtained nano-composite was then used to immobilize laccase (secured from Trametes versicolor) through the process of static adsorption. The average loading amount was as high as 193.4 μmol-g-1. The immobilized laccase was proven to be an effective biocatalyst in the decolorization of two dyes: Remazol Brilliant Blue B, and Acid Blue 25. The decolorization percentage of Remazol Brilliant Blue B and Acid Blue 25 reached 93% and 82% respectively. The immobilized laccase exhibited enhanced thermal stability and pH adaptability compared to free laccase. After ten recycles, the immobilized laccase retained 42% decolorization catalytic activity.
Economic Assessment: Stability, Security, Transition and Reconstruction Operations
2007-03-13
strategy has incorporated economic stability as a central part of post-combat operations and nation building. A viable, growing economy has also been a...and prosperity. Economic stability served as a tool for reconstruction as well as the catalyst for integration as outlined in the Marshall Plan...for future SSTR operations as it relates to economic stability is “Privatization can be a prerequisite for economic growth, especially where
Securing, Stabilizing, and Rebuilding Iraq: Key Issues for Congressional Oversight
2007-01-01
Been Constrained by Security, Management , and Funding Challenges 72 U.S. Military Readiness 79 Enclosure XII: Extended Operations Have Had...Forces Have Resulted in Shortages of Critical Items 92 Improving Acquisition Outcomes 97 Enclosure XV: DOD Needs to Improve Its Capacity to Manage ...International Monetary Fund IRMO Iraq Reconstruction Management Office IRRF Iraqi Relief and Reconstruction Fund ISF Iraqi security forces ISFF
Tribal Militias: An Effective Tool to Counter Al-Qaida and Its Affiliates?
2014-11-01
Army issues affecting the national security community . The Peacekeeping and Stability Operations Institute provides subject matter expertise...implications for the Army, the Department of Defense, and the larger national security community . In addition to its studies, SSI publishes special reports on...newsletter to update the national security community on the research of our analysts, recent and forthcoming publications, and upcoming confer- ences
Contemporary United States Foreign Policy Towards Indonesia
2004-01-01
regard to resolving a number of longstanding territorial disputes, and it has become a cornerstone for the promotion of economic and social development...and stability and security in the region. However, Indonesia is also faced with a variety of social , economic, and internal security issues, most...faced with significant social , economic, and security issues. Thesis Question The thesis question is: Does contemporary US policy promote US national
On the Brink: Instability and the Prospect of State Failure in Pakistan
2010-04-12
unpredictable posture. Most importantly, these historical events, coupled with current political , economic, and security related issues, have created a...current political , economic, and security related issues, have created a fragile state with the propensity to fail. Therefore, this monograph highlights...hardships that have affected the state’s political stability, economic performance, and security. These unrelenting problems lie at the foundation
China in Africa: An AFRICOM Response
2009-01-01
physical security of Chinese investment and, more fundamentally, whether agreements with the current sitting government will have lasting economic and...political and economic stability in Africa. These interests support U.S. security objectives in Africa, encouraging more ef- fective governance and mitigating...grievances against the status quo. Conse- quently, in the furtherance of its mission “to promote a stable and secure African environment,” the newly
Internal contamination of an irradiator discovered during security enhancement.
Harvey, R P
2014-08-01
High-risk radioactive sources regulated under Increased Controls Regulations have been protected by licensed facilities, but the federal government has placed significant emphasis on these sources and has developed initiatives to assist radioactive material licensees. The Department of Energy's Global Threat Reduction Initiative (GTRI) Domestic Threat Reduction Program is a voluntary federally funded program for security enhancements of high-risk radiological material. During the hardening or security enhancement process by the United States Department of Energy (U.S. DOE) contractors, a small amount of radioactive contamination was discovered in a Cesium irradiator. Ultimately, it was decided to pursue disposal with U.S. DOE's Off-Site Recovery Program (OSRP). Radiological devices may have a leaking source or known internal contamination that may cause difficulty during security enhancement. If the licensee understands this, it may provide facilities the opportunity to plan and prepare for unusual circumstances.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations § 1562.27...
Code of Federal Regulations, 2010 CFR
2010-10-01
... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations § 1562.27...
Code of Federal Regulations, 2011 CFR
2011-10-01
... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations § 1562.27...
Code of Federal Regulations, 2013 CFR
2013-10-01
... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations § 1562.27...
Code of Federal Regulations, 2012 CFR
2012-10-01
... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations § 1562.27...
Code of Federal Regulations, 2013 CFR
2013-04-01
..., describe the following, including a clear discussion of the manner in which each potential item is designed... enhancement designed to ensure that the asset-backed securities or pool assets will pay in accordance with... purpose is to provide credit enhancement related to pool assets or the asset-backed securities. (4) Any...
Code of Federal Regulations, 2014 CFR
2014-04-01
..., describe the following, including a clear discussion of the manner in which each potential item is designed... enhancement designed to ensure that the asset-backed securities or pool assets will pay in accordance with... purpose is to provide credit enhancement related to pool assets or the asset-backed securities. (4) Any...
Code of Federal Regulations, 2012 CFR
2012-04-01
..., describe the following, including a clear discussion of the manner in which each potential item is designed... enhancement designed to ensure that the asset-backed securities or pool assets will pay in accordance with... purpose is to provide credit enhancement related to pool assets or the asset-backed securities. (4) Any...
NASA Astrophysics Data System (ADS)
Ma, Xianlei; Zhou, Yuepeng; Shi, Xiaoping
2017-04-01
In China, land rental transactions have increased considerably since the 1990s, but there exists a high degree of segmentation and informal features. The rental transactions between partners with close social relations and the use of informal contracts remain a common phenomenon in many regions, which strongly reduce the potential of the land rental market to enhance productivity and equity. The current literature postulates that the insecurity of land property rights may restrict land transactions between members of same social relations. Studies conducted in China show that the land rentals between partners with closer social relations prefer informal contracts because these contracts are self-enforced based on trust and reputation. However, little literature has jointly examined the effect of land tenure security and social relations on joint decisions of partner and contract choice in the Chinese land rental market. Based on household data collected in Jiangxi and Liaoning provinces in 2015, this paper aims to examine the relationship between land tenure security perceptions, social relation and land rental contract choices in China. We differentiate between formal and informal contracts of land rental activities because they have different enforcement mechanisms and thus different risk-sharing strategy. With regards to social relations, we differ among relatives, villagers living in the same village and strangers according to social distance. In order to reduce estimation bias without accounting for endogenous matching between landlords and tenants, we investigate the joint partner and contract choices in the land rental market using a nested logit framework. The paper contributes to the literature on the effect of tenure security and social relations on land rental contracts by (i) taking into account endogenous matching between landlords and tenants, and estimating the joint decisions of partner and contract choice, and (ii) examining the effect of perceived tenure security, instead of de jure rights, on households' contract choice. The empirical results show that landlords are more likely to rent out land to tenants who live in the same village, instead of relatives and strangers. This kind of partner matching is based on consideration of both land tenure security and flexibility of rental relationships. Insecure land tenure encourages landlords to select informal contracts, because informal contracts seem to protect better protection than formal contracts as landlords are willing to match villagers. Policy implications are twofold based on our findings: 1) Land tenure reforms should put more emphasis on enhancing households' perception on tenure security and further reducing land market segmentation; 2) Measures that may be taken to stabilize rental contractual relationships may focus on the improvement of rural pension system and unemployment insurance for rural-urban migrants. Key Words: land rental market; contract choice; tenure security, social relations
49 CFR 1562.25 - Fixed base operator requirements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 1562.25 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain...
Potential uses of a wireless network in physical security systems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Witzke, Edward L.
2010-07-01
Many possible applications requiring or benefiting from a wireless network are available for bolstering physical security and awareness at high security installations or facilities. These enhancements are not always straightforward and may require careful analysis, selection, tuning, and implementation of wireless technologies. In this paper, an introduction to wireless networks and the task of enhancing physical security is first given. Next, numerous applications of a wireless network are brought forth. The technical issues that arise when using a wireless network to support these applications are then discussed. Finally, a summary is presented.
NASA Technical Reports Server (NTRS)
2010-01-01
Topics covered include: Burnishing Techniques Strengthen Hip Implants; Signal Processing Methods Monitor Cranial Pressure; Ultraviolet-Blocking Lenses Protect, Enhance Vision; Hyperspectral Systems Increase Imaging Capabilities; Programs Model the Future of Air Traffic Management; Tail Rotor Airfoils Stabilize Helicopters, Reduce Noise; Personal Aircraft Point to the Future of Transportation; Ducted Fan Designs Lead to Potential New Vehicles; Winglets Save Billions of Dollars in Fuel Costs; Sensor Systems Collect Critical Aerodynamics Data; Coatings Extend Life of Engines and Infrastructure; Radiometers Optimize Local Weather Prediction; Energy-Efficient Systems Eliminate Icing Danger for UAVs; Rocket-Powered Parachutes Rescue Entire Planes; Technologies Advance UAVs for Science, Military; Inflatable Antennas Support Emergency Communication; Smart Sensors Assess Structural Health; Hand-Held Devices Detect Explosives and Chemical Agents; Terahertz Tools Advance Imaging for Security, Industry; LED Systems Target Plant Growth; Aerogels Insulate Against Extreme Temperatures; Image Sensors Enhance Camera Technologies; Lightweight Material Patches Allow for Quick Repairs; Nanomaterials Transform Hairstyling Tools; Do-It-Yourself Additives Recharge Auto Air Conditioning; Systems Analyze Water Quality in Real Time; Compact Radiometers Expand Climate Knowledge; Energy Servers Deliver Clean, Affordable Power; Solutions Remediate Contaminated Groundwater; Bacteria Provide Cleanup of Oil Spills, Wastewater; Reflective Coatings Protect People and Animals; Innovative Techniques Simplify Vibration Analysis; Modeling Tools Predict Flow in Fluid Dynamics; Verification Tools Secure Online Shopping, Banking; Toolsets Maintain Health of Complex Systems; Framework Resources Multiply Computing Power; Tools Automate Spacecraft Testing, Operation; GPS Software Packages Deliver Positioning Solutions; Solid-State Recorders Enhance Scientific Data Collection; Computer Models Simulate Fine Particle Dispersion; Composite Sandwich Technologies Lighten Components; Cameras Reveal Elements in the Short Wave Infrared; Deformable Mirrors Correct Optical Distortions; Stitching Techniques Advance Optics Manufacturing; Compact, Robust Chips Integrate Optical Functions; Fuel Cell Stations Automate Processes, Catalyst Testing; Onboard Systems Record Unique Videos of Space Missions; Space Research Results Purify Semiconductor Materials; and Toolkits Control Motion of Complex Robotics.
Li, Jing-hui; Łuczka, Jerzy
2010-10-01
Transport properties of a Brownian particle in thermal-inertial ratchets subject to an external time-oscillatory drive and a constant bias force are investigated. Since the phenomena of negative mobility, resonant activation and noise-enhance stability were reported before, in the present paper, we report some additional aspects of negative mobility, resonant activation and noise-enhance stability, such as the ingredients for the appearances of these phenomena, multiple resonant activation peaks, current reversals, noise-weakened stability, and so on.
Security enhancement study for the U.S. motorcoach industry : executive summary
DOT National Transportation Integrated Search
2003-05-01
The Security Enhancement Study for the U.S. Motorcoach Industry was commissioned by the Federal Motor Carrier Safety Administration (FMCSA) and conducted by the John A. Volpe National Transportation Systems Center (Volpe Center). It was prepared to i...
Developing Ministerial Collaborative Planning Capacity
2012-03-14
1204, Arlington, VA 22202- 4302. Respondents should be aware that notwithstanding any other provision of law , no person shall be subject to any...to build capacity and legitimacy within a host nation’s security sector. Providing a safe and secure environment founded on the rule of law is the...6 Vision: A highly efficient ministry capable of providing security and stability for all components of society, applying the rule of law and
Arab Threat Perceptions and the Future of the U.S. Military Presence in the Middle East
2015-10-01
knowledge, and provides solutions to strategic Army issues affecting the national security community . The Peacekeeping and Stability Operations...analysts concern topics having strategic implications for the Army, the Department of Defense, and the larger national security community . In addition...update the national security community on the research of our analysts, recent and forthcoming publications, and upcoming confer- ences sponsored by
Russia and NATO Enlargement: The Assurances in 1990 and Their Implications
2009-06-01
to achieve “an agreement on the final legal settlement of the German question, which would serve our security interests and the cause of stability... intrinsically coupled to new security structures in Europe with no dominant player, particularly not the Soviet Union’s rival, the United States...main European security issues and would unconditionally acknowledge the CIS [Commonwealth of Independent States] as a sphere of vital interest to
Mingenbach, W.A.
1988-02-09
A device is provided for stabilizing a flexible membrane secured within a frame, wherein a plurality of elongated arms are disposed radially from a central hub which penetrates the membrane, said arms imposing alternately against opposite sides of the membrane, thus warping and tensioning the membrane into a condition of improved stability. The membrane may be an opaque or translucent sheet or other material. 10 figs.
Wan, Meng; Li, Jiang; Li, Tao; Zhu, Han; Wu, Weiwei; Du, Mingliang
2018-06-28
A facile method to prepared nitrogen anion-decorated cobalt tungsten disulfides solid solutions retaining ultra-thin WS2-like nanosheet structures (The N-CoxW1-xS2) anchored on carbon nanofibers is developed. The synergistic effect of the WS2 nanosheets provides a secure framework for stabilizing the amorphous Co-S clusters, carbon nanofibers (CNFs) substrate and nitrogen anion-decoration significantly enhances the inherent conductivity of the catalyst, resulting in a significantly promoted hydrogen evolution reaction (HER) activity and stable performance compared to pure Co9S8 nanoparticles or ultra-thin WS2 nanosheets. The N-CoxW1-xS2 electrode demonstrates the excellent electrocatalytic performance, with current density of 10 mA cm-2 at a low overpotential of 93 mV and Tafel slope of 85 mV dec-1, as well as the long-term stability in acid electrolyte. The present investigation may provide a feasible strategy for incorporating other heteroatoms into transitional metal disulfides (TMDs) materials to design catalysts with highly active and stable performance for water splitting. © 2018 IOP Publishing Ltd.
NASA Astrophysics Data System (ADS)
Sahare, Padmavati; Ayala, Marcela; Vazquez-Duhalt, Rafael; Agrawal, Vivechana
2014-08-01
In this work, a commercial peroxidase was immobilized onto porous silicon (PS) support functionalized with 3-aminopropyldiethoxysilane (APDES) and the performance of the obtained catalytic microreactor was studied. The immobilization steps were monitored and the activity of the immobilized enzyme in the PS pores was spectrophotometrically determined. The enzyme immobilization in porous silicon has demonstrated its potential as highly efficient enzymatic reactor. The effect of a polar organic solvent (acetonitrile) and the temperature (up to 50°C) on the activity and stability of the biocatalytic microreactor were studied. After 2-h incubation in organic solvent, the microreactor retained 80% of its initial activity in contrast to the system with free soluble peroxidase that lost 95% of its activity in the same period of time. Peroxidase immobilized into the spaces of the porous silicon support would be perspective for applications in treatments for environmental security such as removal of leached dye in textile industry or in treatment of different industrial effluents. The system can be also applied in the field of biomedicine.
NASA Astrophysics Data System (ADS)
Vishnudas, Subha; Savenije, Hubert H. G.; Van der Zaag, Pieter; Anil, K. R.
A sloping field is not only vulnerable to soil erosion it may also suffer from soil moisture deficiency. Farmers that cultivate on slopes everywhere face similar problems. Conservation technologies may reduce soil and nutrient losses, and thus enhance water holding capacity and soil fertility. But although these technologies promote sustainable crop production on steep slopes, the construction of physical structure such as bench terraces are often labour intensive and expensive to the farmers, since construction and maintenance require high investments. Here we studied the efficiency of coir geotextile with and without crop cultivation in reducing soil moisture deficiency on marginal slopes in Kerala, India. From the results it is evident that the slopes treated with geotextile and crops have the highest moisture retention capacity followed by geotextiles alone, and that the control plot has the lowest moisture retention capacity. As the poor and marginal farmers occupy the highland region, this method provides an economically viable option for income generation and food security along with slope stabilization.
2009-04-21
6 Intercity Passenger Rail Program (Amtrak) .....................................................................6... Intercity Bus Security Grant Program..............................................................................7 Trucking Security Program...continue security enhancements for its intercity rail services between high-risk urban areas. 20 U.S. Department of Homeland Security, Federal Emergency
Ying, Liu; Bashir, Muhammad Khalid; Abid, Muhammad; Zulfiqar, Farhad
2017-01-01
In most of the developing countries, lack of resources and little market accessibility are among the major factors that affect small farming household food security. This study aims to investigate the status of small farming households’ food security, and its determinants including the role of market accessibility factors in enhancing food security at household level. In addition, this study also determines the households’ perception about different kinds of livelihoods risks. This study is based on a household survey of 576 households conducted through face-to-face interviews using structured interviews in Punjab, Pakistan. Food security status is calculated using dietary intake method. The study findings show that one-fourth of the households are food insecure. The study findings reveal that farm households perceive increase in food prices, crop diseases, lack of irrigation water and increase in health expenses as major livelihood risks. Further, the results of logistic regression show that family size, monthly income, food prices, health expenses and debt are main factors influencing the food security status of rural households. Furthermore, the market accessibility factors (road distance and transportation cost) do significantly affect the small farming household food security. The results suggest that local food security can be enhanced by creating off-farm employment opportunities, improved transportation facilities and road infrastructure. PMID:29077719
Ahmed, Umar Ijaz; Ying, Liu; Bashir, Muhammad Khalid; Abid, Muhammad; Zulfiqar, Farhad
2017-01-01
In most of the developing countries, lack of resources and little market accessibility are among the major factors that affect small farming household food security. This study aims to investigate the status of small farming households' food security, and its determinants including the role of market accessibility factors in enhancing food security at household level. In addition, this study also determines the households' perception about different kinds of livelihoods risks. This study is based on a household survey of 576 households conducted through face-to-face interviews using structured interviews in Punjab, Pakistan. Food security status is calculated using dietary intake method. The study findings show that one-fourth of the households are food insecure. The study findings reveal that farm households perceive increase in food prices, crop diseases, lack of irrigation water and increase in health expenses as major livelihood risks. Further, the results of logistic regression show that family size, monthly income, food prices, health expenses and debt are main factors influencing the food security status of rural households. Furthermore, the market accessibility factors (road distance and transportation cost) do significantly affect the small farming household food security. The results suggest that local food security can be enhanced by creating off-farm employment opportunities, improved transportation facilities and road infrastructure.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Equivalents. 170.010 Section 170.010 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR..., arrangements, calculations, information, or tests required in this subchapter may be approved by the Commandant...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 7 2011-10-01 2011-10-01 false Equivalents. 170.010 Section 170.010 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR..., arrangements, calculations, information, or tests required in this subchapter may be approved by the Commandant...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 7 2014-10-01 2014-10-01 false Equivalents. 170.010 Section 170.010 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR..., arrangements, calculations, information, or tests required in this subchapter may be approved by the Commandant...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 7 2013-10-01 2013-10-01 false Equivalents. 170.010 Section 170.010 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR..., arrangements, calculations, information, or tests required in this subchapter may be approved by the Commandant...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 7 2012-10-01 2012-10-01 false Equivalents. 170.010 Section 170.010 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR..., arrangements, calculations, information, or tests required in this subchapter may be approved by the Commandant...
46 CFR 170.160 - Specific applicability
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Specific applicability 170.160 Section 170.160 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS Weather Criteria § 170.160 Specific applicability (a) Except as provided...
77 FR 52766 - Technology and Trading Roundtable
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-30
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67725; File No. 4-652] Technology and Trading... ``Technology and Trading: Promoting Stability in Today's Markets'' to discuss ways to promote stability in..., implement, and manage complex and inter-connected trading technologies. The roundtable discussion will be...
Impacts of Floods Events on Food Security
NASA Astrophysics Data System (ADS)
Caporali, E.; Pacetti, T.; Rulli, M. C.
2017-12-01
The analysis of the interactions among natural disasters and food security is particularly significant for developing countries where food availability (one of the four pillars of food security together with access, utilization and stability) can be highly jeopardize by extreme events that damage the primary access to food, i.e. the agriculture. The main objective of this study is to analyze the impact of flood events on food security for two disastrous flood events in Bangladesh on 2007 and in Pakistan on 2010, selected here as case studies based on the existing literature related to extreme floods.The adopted methodology integrates remote sensing data, agricultural statistics, and water footprint values in order to (i) evaluating the potentially affected agricultural areas; (ii) converting the affected areas into crop loss; (iii) estimating the associated calories and water footprint losses. In Bangladesh, the estimated lost rice is around 12.5% of the total potential production, which implies a 5.3% calories loss with respect to the total potential energy provided by rice and 4.4% of total WF associated to national food supply. In Pakistan, the results show a crops loss of 19% for sugarcane and 40% for rice, with a related calories loss of 8.5% and a WF loss of 13.5%.The results highlight the countries vulnerability to flood, being both countries strongly dependent on local agricultural production. The 2007 flood event reflected critically upon Bangladeshi food security, almost doubling the existing food deficit. The same happened in Pakistan where an already scarce food supply has been worsened by the 2010 flood.Method results are fully repeatable; whereas, for remote sensed data the sources of data are valid worldwide and the data regarding land use and crops characteristics are strongly site specific, which need to be carefully evaluated.These case studies stress the importance of integrating different analysis approaches to carry out an assessment of the meaningful connections between flood and food security and to enhance the resilience of territories.
NASA Astrophysics Data System (ADS)
Inscore, Frank E.; Gift, Alan D.; Maksymiuk, Paul; Farquharson, Stuart
2004-12-01
The United States and its allies have been increasingly challenged by terrorism, and since the September 11, 2001 attacks and the war in Afghanistan and Iraq, homeland security has become a national priority. The simplicity in manufacturing chemical warfare agents, the relatively low cost, and previous deployment raises public concern that they may also be used by terrorists or rogue nations. We have been investigating the ability of surface-enhanced Raman spectroscopy (SERS) to detect extremely low concentrations (e.g. part-per-billion) of chemical agents, as might be found in poisoned water. Since trace quantities of nerve agents can be hydrolyzed in the presence of water, we have expanded our studies to include such degradation products. Our SERS-active medium consists of silver or gold nanoparticles incorporated into a sol-gel matrix, which is immobilized in a glass capillary. The choice of sol-gel precursor allows controlling hydrophobicity, while the porous silica network offers a unique environment for stabilizing the SERS-active metals. Here we present the use of these metal-doped sol-gels to selectively enhance the Raman signal of the hydrolyzed products of the G-series nerve agents.
Afghanistan Narcotics: The Bigger Battle Toward Stabilization
2009-04-01
Development of economic opportunities coupled with effective governmental reform is necessary for the nation to become prosperous, stable, and secure. 15...without marginalizing narcotics production and narco-trafficking. Effective security, strong governance, judicial capability...introduce the possibility of meaningful alternative livelihoods. Development of these economic opportunities coupled with effective governmental
Stability and Change of Adolescents' Aggressive Behavior in Residential Youth Care
ERIC Educational Resources Information Center
Eltink, E. M. A.; Ten Hoeve, J.; De Jongh, T.; Van der Helm, G. H. P.; Wissink, I. B.; Stams, G. J. J. M.
2018-01-01
Background: Aggression in residential youth care institutions is a frequent problem. Objective: The present short-term longitudinal study examined individual and institutional predictors of aggression in a group of 198 adolescents placed in open, semi-secure and secure residential institutions from the perspective of the importation and…
Health and security in the global village.
Evans, G
1993-01-01
With the ecological stability of the world under threat, no country can stand alone. National security should no longer be viewed in a purely military light but rather as a matter demanding cooperation between all countries on a broad range of vital issues, not least those related to health and the environment.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-29
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Proposed Information Collection; Comment Request; Competitive Enhancement Needs Assessment Survey Program AGENCY: Bureau of Industry and Security... their abilities to meet defense program needs. The information collected from voluntary surveys will be...
76 FR 72682 - 36(b)(1) Arms Sales Notification
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-25
... important allies in the Western Pacific. The strategic location of this political and economic power contributes significantly to ensuring peace and economic stability in the region. Australia's efforts in... impact on regional, political, and economic stability and have served U.S. national security interests...
46 CFR 170.200 - Estimated lightweight vertical center of gravity.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Estimated lightweight vertical center of gravity. 170.200 Section 170.200 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS Determination of Lightweight Displacement and...
46 CFR 170.200 - Estimated lightweight vertical center of gravity.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 7 2014-10-01 2014-10-01 false Estimated lightweight vertical center of gravity. 170.200 Section 170.200 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS Determination of Lightweight Displacement and...
46 CFR 170.200 - Estimated lightweight vertical center of gravity.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 7 2013-10-01 2013-10-01 false Estimated lightweight vertical center of gravity. 170.200 Section 170.200 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS Determination of Lightweight Displacement and...
46 CFR 170.200 - Estimated lightweight vertical center of gravity.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 7 2012-10-01 2012-10-01 false Estimated lightweight vertical center of gravity. 170.200 Section 170.200 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS Determination of Lightweight Displacement and...
46 CFR 170.200 - Estimated lightweight vertical center of gravity.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 7 2011-10-01 2011-10-01 false Estimated lightweight vertical center of gravity. 170.200 Section 170.200 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS Determination of Lightweight Displacement and...
46 CFR 153.1004 - Inhibited and stabilized cargoes.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 5 2012-10-01 2012-10-01 false Inhibited and stabilized cargoes. 153.1004 Section 153.1004 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS CARRYING BULK LIQUID, LIQUEFIED GAS, OR COMPRESSED GAS HAZARDOUS MATERIALS Operations Special...
46 CFR 153.1004 - Inhibited and stabilized cargoes.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 5 2010-10-01 2010-10-01 false Inhibited and stabilized cargoes. 153.1004 Section 153.1004 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS CARRYING BULK LIQUID, LIQUEFIED GAS, OR COMPRESSED GAS HAZARDOUS MATERIALS Operations Special...
46 CFR 153.1004 - Inhibited and stabilized cargoes.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 5 2013-10-01 2013-10-01 false Inhibited and stabilized cargoes. 153.1004 Section 153.1004 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS CARRYING BULK LIQUID, LIQUEFIED GAS, OR COMPRESSED GAS HAZARDOUS MATERIALS Operations Special...
46 CFR 153.1004 - Inhibited and stabilized cargoes.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 5 2011-10-01 2011-10-01 false Inhibited and stabilized cargoes. 153.1004 Section 153.1004 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS CARRYING BULK LIQUID, LIQUEFIED GAS, OR COMPRESSED GAS HAZARDOUS MATERIALS Operations Special...
46 CFR 153.1004 - Inhibited and stabilized cargoes.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 5 2014-10-01 2014-10-01 false Inhibited and stabilized cargoes. 153.1004 Section 153.1004 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS CARRYING BULK LIQUID, LIQUEFIED GAS, OR COMPRESSED GAS HAZARDOUS MATERIALS Operations Special...
46 CFR 172.165 - Intact stability calculations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY SPECIAL RULES PERTAINING TO BULK CARGOES Special Rules Pertaining to a Ship That Carries a Bulk Liquefied Gas Regulated... paragraph (a) of this section, the effects of the addition of water ballast may be considered. ...
Privacy-enhanced electronic mail
NASA Astrophysics Data System (ADS)
Bishop, Matt
1990-06-01
The security of electronic mail sent through the Internet may be described in exactly three words: there is none. The Privacy and Security Research Group has recommended implementing mechanisms designed to provide security enhancements. The first set of mechanisms provides a protocol to provide privacy, integrity, and authentication for electronic mail; the second provides a certificate-based key management infrastructure to support key distribution throughout the internet, to support the first set of mechanisms. These mechanisms are described, as well as the reasons behind their selection and how these mechanisms can be used to provide some measure of security in the exchange of electronic mail.
African White Gold: Elephant Ivory and Rhino Horn Trafficking - US Intervention and Interdiction
2015-03-01
wildlife trafficking and poaching is the impact to international security, regional stability, and to local governance. The rapid rise in the price of... poaching presents significant second and third order affects that impact their security, their rule of law, national sovereignty, and their future...national security. Research Question Both the recent spike in elephant and rhino poaching , and the rapid rise in the price of ivory creates an
Measuring Stability and Security in Iraq
2008-12-01
majority of the country. On September 1, 2008, Anbar Province, once an AQI stronghold, transferred to Provincial Iraqi Control ( PIC ). With the...transfer of Babil and Wasit Provinces to PIC in October 2008, the ISF is now in charge of security operations in the majority of Iraq’s 18 provinces... PIC ). Security responsibility for Babil Province was handed over to the GoI on October 23, 2008, and Wasit Province transitioned to PIC on October
1986-12-01
Classification. U Security Marks, Accession *:U00298 AD *. ADA096538 TITLE: Assessment of the Crossed Porro Prism Resonator AUTHOR. Seea, B.A.; Fueloep, K...Laser Range Finder Mechanical Property Stability Resonator Porro Prism Standord Mirror Examine Pgs: 16 Classification: U Security Marks: Accession...Gamma-Ray Laser Graser Mossbauer Effect Borrman Superradiance Nuclear-Magnetic Resonance Pgs: 26 Classification: U Security Marks: Accession *:U00484 AD
Operating in the Gray Zone: An Alternative Paradigm for U.S. Military Strategy
2016-04-01
labeling, or re-labeling, may have been to draw the attention of busy policymakers to rapidly emerging security issues , it has evolved into something... issues affecting the national security community. The Peacekeeping and Stability Operations Institute provides subject matter expertise, technical...SSI) is part of the U.S. Army War College and is the strategic-level study agent for issues related to national security and military strategy with
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-30
... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration New Agency Information Collection Activity Under OMB Review: Public Transportation Baseline Assessment for Security Enhancement... voluntary site visits with security and operating officials of public transportation systems. This program...
2010-12-01
relevant requirements, analyzed 2006 through 2009 security operations data, interviewed federal and industry officials, and made observations at five...warranted, acted on all findings and recommendations resulting from five agency- contracted studies on ferry security completed in 2005 and 2006 ...Figure 5: Security Deficiencies by Vessel Type, 2006 through 2009 27 Figure 6: Security Deficiencies by Facility Type, 2006 through 2009 28
2012-06-08
political stability and absence of violence, government effectiveness, and control of corruption (World Bank Institute 2010). These aggregates are...Accountability Political stability and absence of violence Government Effectiveness Control of Corruption Period in Years 2007-2010 in % Period in...of political stability and levels of violence, voice and accountability, government effectiveness, and control of corruption. The assessment goes
2009-06-12
and 2004 National Military Strategy (NMS) continue to germinate . Discussions surrounding the spread of effective democracies and alternate...additional civil-military operation capabilities such as enhanced engineering, additional medical and dental support, and transportation tailored for
Collaboration with the Local Community.
ERIC Educational Resources Information Center
Jackson, Michael L.; Cherrey, Cynthia
2002-01-01
Colleges and universities continually search for ways to enhance the safety and security of their educational programs and physical plant. This article examines how the University of Southern California and other institutions are using collaborative efforts with the local community to enhance their mutual safety and security through dynamic…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Caskey, D.L.; Olascoaga, M.T.
1990-01-01
Sandia National Laboratories has been involved in designing, installing and evaluating security systems for various applications during the past 15 years. A systems approach to security that evolved from this experience was applied to aviation security for the Federal Aviation Administration. A general systems study of aviation security in the United States was concluded in 1987. One result of the study was a recommendation that an enhanced security system concept designed to meet specified objectives be demonstrated at an operational airport. Baltimore-Washington International Airport was selected as the site for the demonstration project which began in 1988 and will bemore » completed in 1992. This article introduced the systems approach to airport security and discussed its application at Baltimore-Washington International Airport. Examples of design features that could be included in an enhanced security concept also were presented, including details of the proposed Ramps Area Intrusion Detection System (RAIDS).« less
Wang, Aiqin; Li, Yiming; Yang, Xiaolong; Bao, Mutai; Cheng, Hua
2017-05-15
It is necessary for chemical dispersant to disperse oil effectively and maintain the stability of oil droplets. In this work, Xanthan Gum (XG) was used as an environmentally friendly additive in oil dispersant formulation to enhance the stability and biodegradation of dispersed crude oil droplets. When XG was used together with chemical dispersant 9500A, the dispersion effectiveness of crude oil in artificial sea water (ASW) and the oil droplet stability were both greatly enhanced. In the presence of XG, lower concentration of 9500A was needed to achieve the effective dispersion and stabilization. In addition to the enhancement of dispersion and stabilization, it was found that the biodegradation rate of crude oil by bacteria was dramatically enhanced when a mixture of 9500A and XG was used as a dispersant. Because of the low environmental impact of XG, this would be a potential way to formulate the dispersant with lower toxicity. Copyright © 2017 Elsevier Ltd. All rights reserved.
46 CFR 170.055 - Definitions concerning a vessel.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Definitions concerning a vessel. 170.055 Section 170.055 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS Definitions § 170.055 Definitions concerning a vessel. (a) Auxiliary...
Safe teleradiology: information assurance as project planning methodology
NASA Astrophysics Data System (ADS)
Collmann, Jeff R.; Alaoui, Adil; Nguyen, Dan; Lindisch, David
2003-05-01
This project demonstrates use of OCTAVE, an information security risk assessment method, as an approach to the safe design and planning of a teleradiology system. By adopting this approach to project planning, we intended to provide evidence that including information security as an intrinsic component of project planning improves information assurance and that using information assurance as a planning tool produces and improves the general system management plan. Several considerations justify this approach to planning a safe teleradiology system. First, because OCTAVE was designed as a method for retrospectively assessing and proposing enhancements for the security of existing information management systems, it should function well as a guide to prospectively designing and deploying a secure information system such as teleradiology. Second, because OCTAVE provides assessment and planning tools for use primarily by interdisciplinary teams from user organizations, not consultants, it should enhance the ability of such teams at the local level to plan safe information systems. Third, from the perspective of sociological theory, OCTAVE explicitly attempts to enhance organizational conditions identified as necessary to safely manage complex technologies. Approaching information system design from the perspective of information security risk management proactively integrates health information assurance into a project"s core. This contrasts with typical approaches that perceive "security" as a secondary attribute to be "added" after designing the system and with approaches that identify information assurance only with security devices and user training. The perspective of health information assurance embraces so many dimensions of a computerized health information system"s design that one may successfully deploy a method for retrospectively assessing information security risk as a prospective planning tool. From a sociological perspective, this approach enhances the general conditions as well as establishes specific policies and procedures for reliable performance of health information assurance.
ERIC Educational Resources Information Center
Daneman, Kathy
1998-01-01
Describes the integration of security systems to provide enhanced security that is both effective and long lasting. Examines combining card-access systems with camera surveillance, and highly visible emergency phones and security officers. as one of many possible combinations. Some systems most capable of being integrated are listed. (GR)
Strategy to Enhance International Supply Chain Security
2007-07-01
airports as part of the effort to secure air passenger travel . The security assessment crew traveling by air, land or sea cannot be considered only a... travel security issue. The assessment of a container ship’s crew or of a driver moving a truck into the secure area of a port are also supply chain...threats through its traveler screening and worker credentialing programs. The strategy to secure the supply chain reflects the larger security
Monitoring Items in Real Time to Enhance CAT Security
ERIC Educational Resources Information Center
Zhang, Jinming; Li, Jie
2016-01-01
An IRT-based sequential procedure is developed to monitor items for enhancing test security. The procedure uses a series of statistical hypothesis tests to examine whether the statistical characteristics of each item under inspection have changed significantly during CAT administration. This procedure is compared with a previously developed…
Optical identity authentication technique based on compressive ghost imaging with QR code
NASA Astrophysics Data System (ADS)
Wenjie, Zhan; Leihong, Zhang; Xi, Zeng; Yi, Kang
2018-04-01
With the rapid development of computer technology, information security has attracted more and more attention. It is not only related to the information and property security of individuals and enterprises, but also to the security and social stability of a country. Identity authentication is the first line of defense in information security. In authentication systems, response time and security are the most important factors. An optical authentication technology based on compressive ghost imaging with QR codes is proposed in this paper. The scheme can be authenticated with a small number of samples. Therefore, the response time of the algorithm is short. At the same time, the algorithm can resist certain noise attacks, so it offers good security.
Code of Federal Regulations, 2010 CFR
2010-04-01
...' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950... was exempt from Social Security tax was also excluded. Certain other work for the United States or an... the Agriculture Marketing Service and the Commodity Stabilization Service, formerly the Production and...
The Specter of Sunni Military Mobilization in Lebanon
2013-11-01
stabilization Future national security environment and forces European security issues, especially the Mediterranean littoral West Africa...5 More space for militant narratives .......................................................... 8 The Syrian war comes...their political dominance Sunni officials and elites attack the legitimacy of state institu- tions, particularly the Lebanese Army The Future
[Subjective Gait Stability in the Elderly].
Hirsch, Theresa; Lampe, Jasmin; Michalk, Katrin; Röder, Lotte; Munsch, Karoline; Marquardt, Jonas
2017-07-10
It can be assumed that the feeling of gait stability or gait instability in the elderly may be independent of a possible fear of falling or a history of falling when walking. Up to now, there has been a lack of spatiotemporal gait parameters for older people who subjectively feel secure when walking. The aim of the study is to analyse the distribution of various gait parameters for older people who subjectively feel secure when walking. In a cross-sectional study, the gait parameters stride time, step time, stride length, step length, double support, single support, and walking speed were measured using a Vicon three-dimensional motion capture system (Plug-In Gait Lower-Body Marker Set) in 31 healthy people aged 65 years and older (mean age 72 ± 3.54 years) who subjectively feel secure when walking. There was a homogeneous distribution in the gait parameters examined, with no abnormalities. The mean values have a low variance with narrow confidence intervals. This study provides evidence that people who subjectively feel secure when walking demonstrate similarly objective gait parameters..
46 CFR 109.227 - Verification of vessel compliance with applicable stability requirements.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 4 2011-10-01 2011-10-01 false Verification of vessel compliance with applicable stability requirements. 109.227 Section 109.227 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS OPERATIONS Tests, Drills, and Inspections § 109.227 Verification...
46 CFR 109.227 - Verification of vessel compliance with applicable stability requirements.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 4 2010-10-01 2010-10-01 false Verification of vessel compliance with applicable stability requirements. 109.227 Section 109.227 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS OPERATIONS Tests, Drills, and Inspections § 109.227 Verification...
46 CFR 109.227 - Verification of vessel compliance with applicable stability requirements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 4 2014-10-01 2014-10-01 false Verification of vessel compliance with applicable stability requirements. 109.227 Section 109.227 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS OPERATIONS Tests, Drills, and Inspections § 109.227 Verification...
46 CFR 109.227 - Verification of vessel compliance with applicable stability requirements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 4 2013-10-01 2013-10-01 false Verification of vessel compliance with applicable stability requirements. 109.227 Section 109.227 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS OPERATIONS Tests, Drills, and Inspections § 109.227 Verification...
46 CFR 109.227 - Verification of vessel compliance with applicable stability requirements.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 4 2012-10-01 2012-10-01 false Verification of vessel compliance with applicable stability requirements. 109.227 Section 109.227 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS OPERATIONS Tests, Drills, and Inspections § 109.227 Verification...
Stability of Attachment Representations during Adolescence: The Influence of Ego-Identity Status.
ERIC Educational Resources Information Center
Zimmermann, Peter; Becker-Stoll, Fabienne
2002-01-01
Examines two core assumptions of attachment theory: internal working models of attachment should increase in stability during development, and attachment is related to the adaptive solution of stage-salient issues, in adolescence, specifically to identity formation. Results show secure attachment representation was positively associated with the…
46 CFR 170.003 - Right of appeal.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Right of appeal. 170.003 Section 170.003 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS General Provisions § 170.003 Right of appeal. Any person directly affected by a...
46 CFR 170.173 - Criterion for vessels of unusual proportion and form.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Criterion for vessels of unusual proportion and form. 170.173 Section 170.173 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS Weather Criteria § 170.173 Criterion...
33 CFR 155.245 - Damage stability information for inland oil barges.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Damage stability information for inland oil barges. 155.245 Section 155.245 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) POLLUTION OIL OR HAZARDOUS MATERIAL POLLUTION PREVENTION REGULATIONS FOR...
33 CFR 155.245 - Damage stability information for inland oil barges.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Damage stability information for inland oil barges. 155.245 Section 155.245 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) POLLUTION OIL OR HAZARDOUS MATERIAL POLLUTION PREVENTION REGULATIONS FOR...
33 CFR 155.240 - Damage stability information for oil tankers and offshore oil barges.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Damage stability information for oil tankers and offshore oil barges. 155.240 Section 155.240 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) POLLUTION OIL OR HAZARDOUS MATERIAL POLLUTION...
33 CFR 155.240 - Damage stability information for oil tankers and offshore oil barges.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Damage stability information for oil tankers and offshore oil barges. 155.240 Section 155.240 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) POLLUTION OIL OR HAZARDOUS MATERIAL POLLUTION...
33 CFR 155.240 - Damage stability information for oil tankers and offshore oil barges.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Damage stability information for oil tankers and offshore oil barges. 155.240 Section 155.240 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) POLLUTION OIL OR HAZARDOUS MATERIAL POLLUTION...
33 CFR 155.245 - Damage stability information for inland oil barges.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Damage stability information for inland oil barges. 155.245 Section 155.245 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) POLLUTION OIL OR HAZARDOUS MATERIAL POLLUTION PREVENTION REGULATIONS FOR...
Chaos-based CAZAC scheme for secure transmission in OFDM-PON
NASA Astrophysics Data System (ADS)
Fu, Xiaosong; Bi, Meihua; Zhou, Xuefang; Yang, Guowei; Lu, Yang; Hu, Miao
2018-01-01
To effectively resist malicious eavesdropping and performance deterioration, a novel chaos-based secure transmission scheme is proposed to enhance the physical layer security and reduce peak-to-average power ratio (PAPR) in orthogonal frequency division multiplexing passive optical network (OFDM-PON). By the randomly extracting operation of common CAZAC values, the specially-designed constant amplitude zero autocorrelation (CAZAC) is created for system encryption and PAPR reduction enhancing the transmission security. This method is verified in {10-Gb/s encrypted OFDM-PON with 20-km fiber transmission. Results show that, compared to common OFDM-PON, our scheme achieves {3-dB PAPR reduction and {1-dB receiver sensitivity improvement.
NASA Astrophysics Data System (ADS)
Yadav, Poonam Lata; Singh, Hukum
2018-05-01
To enhance the security in optical image encryption system and to protect it from the attackers, this paper proposes new digital spiral phase mask based on Fresnel Transform. In this cryptosystem the Spiral Phase Mask (SPM) used is a hybrid of Fresnel Zone Plate (FZP) and Radial Hilbert Mask (RHM) which makes the key strong and enhances the security. The different keys used for encryption and decryption purposed make the system much more secure. Proposed scheme uses various structured phase mask which increases the key space also it increases the number of parameters which makes it difficult for the attackers to exactly find the key to recover the original image. We have also used different keys for encryption and decryption purpose to make the system much more secure. The strength of the proposed cryptosystem has been analyzed by simulating on MATLAB 7.9.0(R2008a). Mean Square Errors (MSE) and Peak Signal to Noise Ratio (PSNR) are calculated for the proposed algorithm. The experimental results are provided to highlight the effectiveness and sustainability of proposed cryptosystem and to prove that the cryptosystem is secure for usage.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Purpose. 27.100 Section 27.100 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS General § 27.100 Purpose. The purpose of this part is to enhance the security of our Nation by furthering the...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Purpose. 27.100 Section 27.100 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS General § 27.100 Purpose. The purpose of this part is to enhance the security of our Nation by furthering the...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Purpose. 27.100 Section 27.100 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS General § 27.100 Purpose. The purpose of this part is to enhance the security of our Nation by furthering the...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Purpose. 27.100 Section 27.100 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS General § 27.100 Purpose. The purpose of this part is to enhance the security of our Nation by furthering the...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Purpose. 27.100 Section 27.100 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS General § 27.100 Purpose. The purpose of this Part is to enhance the security of our Nation by furthering the...
2009-06-08
Security Grant Program ...............................................................................6 Intercity Passenger Rail Program (Amtrak...6 Intercity Bus Security Grant Program...fy2009.pdf. 19 Additionally Amtrak is eligible to receive funding to continue security enhancements for its intercity rail services between high-risk
2009-08-05
Freight Rail Security Grant Program ...............................................................................6 Intercity Passenger Rail Program...Amtrak) .....................................................................6 Intercity Bus Security Grant Program...overview- fy2009.pdf. 19 Additionally Amtrak is eligible to receive funding to continue security enhancements for its intercity rail services
Multimedia Security System for Security and Medical Applications
ERIC Educational Resources Information Center
Zhou, Yicong
2010-01-01
This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…
Siddiqui, Khawar Sohail
2017-05-01
The biotechnological applications of enzymes are limited due to the activity-stability trade-off, which implies that an increase in activity is accompanied by a concomitant decrease in protein stability. This premise is based on thermally adapted homologous enzymes where cold-adapted enzymes show high intrinsic activity linked to enhanced thermolability. In contrast, thermophilic enzymes show low activity around ambient temperatures. Nevertheless, genetically and chemically modified enzymes are beginning to show that the activity-stability trade-off can be overcome. In this review, the origin of the activity-stability trade-off, the thermodynamic basis for enhanced activity and stability, and various approaches for escaping the activity-stability trade-off are discussed. The role of entropy in enhancing both the activity and the stability of enzymes is highlighted with a special emphasis placed on the involvement of solvent water molecules. This review is concluded with suggestions for further research, which underscores the implications of these findings in the context of productivity curves, the Daniel-Danson equilibrium model, catalytic antibodies, and life on cold planets.
The design and implementation of web mining in web sites security
NASA Astrophysics Data System (ADS)
Li, Jian; Zhang, Guo-Yin; Gu, Guo-Chang; Li, Jian-Li
2003-06-01
The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illegal access can be avoided. Firstly, the system for discovering the patterns of information leakages in CGI scripts from Web log data was proposed. Secondly, those patterns for system administrators to modify their codes and enhance their Web site security were provided. The following aspects were described: one is to combine web application log with web log to extract more information, so web data mining could be used to mine web log for discovering the information that firewall and Information Detection System cannot find. Another approach is to propose an operation module of web site to enhance Web site security. In cluster server session, Density-Based Clustering technique is used to reduce resource cost and obtain better efficiency.
Land Grabbing and the Commodification of Agricultural Land in Africa
NASA Astrophysics Data System (ADS)
D'Odorico, P.; Rulli, M. C.
2014-12-01
The increasing global demand for farmland products is placing unprecedented pressure on the global agricultural system. The increasing demand can be met through either the intensification or the expansion of agricultural production at the expenses of other ecosystems. The ongoing escalation of large scale land acquisitions in the developing world may contribute to both of these two processes. Investments in agriculture have become a priority for a number of governments and corporations that are trying to expand their agricultural production while securing good profits. It is unclear however to what extent these investments are driving the intensification or the expansion of agriculture. In the last decade large scale land acquisitions by external investors have increased at unprecedented rates. This global land rush was likely enhanced by recent food crises, when prices skyrocketed in response to crop failure, new bioenergy policies, and the increasing demand for agricultural products by a growing and increasingly affluent human population. Corporations recognized the potential for high return investments in agricultural land, while governments started to enhance their food security by purchasing large tracts of land in foreign countries. It has been estimated that, to date, about 35.6 million ha of cropland - more than twice the agricultural land of Germany - have been acquired by foreign investors worldwide. As an effect of these land deals the local communities lose legal access to the land and its products. Here we investigate the effect of large scale land acquisition on agricultural intensification or expansion in African countries. We discuss the extent to which these investments in agriculture may increase crop production and stress how this phenomenon can greatly affect the local communities, their food security, economic stability and the long term resilience of their livelihoods, regardless of whether the transfer of property rights is the result of an informed decision and the land was paid at market value.
Kiah, M L Mat; Nabi, Mohamed S; Zaidan, B B; Zaidan, A A
2013-10-01
This study aims to provide security solutions for implementing electronic medical records (EMRs). E-Health organizations could utilize the proposed method and implement recommended solutions in medical/health systems. Majority of the required security features of EMRs were noted. The methods used were tested against each of these security features. In implementing the system, the combination that satisfied all of the security features of EMRs was selected. Secure implementation and management of EMRs facilitate the safeguarding of the confidentiality, integrity, and availability of e-health organization systems. Health practitioners, patients, and visitors can use the information system facilities safely and with confidence anytime and anywhere. After critically reviewing security and data transmission methods, a new hybrid method was proposed to be implemented on EMR systems. This method will enhance the robustness, security, and integration of EMR systems. The hybrid of simple object access protocol/extensible markup language (XML) with advanced encryption standard and secure hash algorithm version 1 has achieved the security requirements of an EMR system with the capability of integrating with other systems through the design of XML messages.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-03
... holders, and other stakeholders on a draft guidance document entitled ``Weapons Safety Assessment'' (WSA... weapons under the NRC's proposed rule titled ``Enhanced Weapons, Firearms Background Checks, and Security.... You should not include any site-specific security information in your comments. Federal rulemaking Web...
Perception of personal safety in urban recreation sites
Herbert W. Schroeder; L.M. Anderson
1984-01-01
Photograph of 17 urban recreation sites in Chicago and Atlanta were evaluated by college students (n = 68) in Illinois, Georgia, and Michigan, for either perceived security, scenic quality, or both. For most raters, high visibility and developed park features significantly enhanced perceived security. Scenic quality, on the other hand, was enhanced for the majority of...
Marketing and reputation aspects of neonatal safeguards and hospital-security systems.
Smith, Alan D
2009-01-01
Technological advancements have migrated from personal-use electronics into the healthcare setting for security enhancements. Within maternity wards and nurseries, technology was seen as one of best way to protect newborns from abduction. The present study is a focus on what systems and methods are used in neonatal security, the security arrangements, staff training, and impacts outside the control of the hospital, customer satisfaction and customer relations management. Through hypothesis-testing and exploratory analysis, gender biases and extremely high levels of security were found within a web-enabled and professional sample of 200 respondents. The factor-based constructs were found to be, in order of the greatest explained variance: security concerns, personal technology usage, work technology applications, and demographic maturity concerns, resulting in four factor-based scores with significant combined variance of 61.5%. It was found that through a better understanding on the importance and vital need for hospitals to continue to improve on their technology-based security policies significantly enhanced their reputation in the highly competitive local healthcare industry.
2011-04-01
Ug99 stem rust resistant wheat breeder seed to MAIL, which will be released to farmers for commercial planting in fall 2011. Poppy yields decreased...level continues to improve the Afghan Government’s overall agricultural sector. Wheat is a key staple in Afghanistan, accounting for over one-half of...tight global supply could affect the country’s food security. Afghanistan’s wheat production routinely does not meet demand and is subject to sizable
2010-03-08
1999.- U.N. Civilian Police component in Kosovo (UNMIK.) 2000.- Oficina del Programa de Irak (no es especificamente una misi6n de paz) 2000.- Special...community security, and political security. Nevertheless, it is worth pointing out that the establishment and the inclusion of an agenda based on the human...model the pattern set in France by the Gendarmerie and in Catalonia by the existing Mossos de Escuadra. The Dulce of Ahumada personally shaped this new
Long, Wu-Jian; Khayat, Kamal Henri; Lemieux, Guillaume; Hwang, Soo-Duck; Xing, Feng
2014-01-01
With the extensive use of self-consolidating concrete (SCC) worldwide, it is important to ensure that such concrete can secure uniform in-situ mechanical properties that are similar to those obtained with properly consolidated concrete of conventional fluidity. Ensuring proper stability of SCC is essential to enhance the uniformity of in-situ mechanical properties, including bond to embedded reinforcement, which is critical for structural engineers considering the specification of SCC for prestressed applications. In this investigation, Six wall elements measuring 1540 mm × 2150 mm × 200 mm were cast using five SCC mixtures and one reference high-performance concrete (HPC) of normal consistency to evaluate the uniformity of bond strength between prestressing strands and concrete as well as the distribution of compressive strength obtained from cores along wall elements. The evaluated SCC mixtures used for casting wall elements were proportioned to achieve a slump flow consistency of 680 ± 15 mm and minimum caisson filling capacity of 80%, and visual stability index of 0.5 to 1. Given the spreads in viscosity and static stability of the SCC mixtures, the five wall elements exhibited different levels of homogeneity in in-situ compressive strength and pull-out bond strength. Test results also indicate that despite the high fluidity of SCC, stable concrete can lead to more homogenous in-situ properties than HPC of normal consistency subjected to mechanical vibration. PMID:28788223
Long, Wu-Jian; Khayat, Kamal Henri; Lemieux, Guillaume; Hwang, Soo-Duck; Xing, Feng
2014-10-10
With the extensive use of self-consolidating concrete (SCC) worldwide, it is important to ensure that such concrete can secure uniform in-situ mechanical properties that are similar to those obtained with properly consolidated concrete of conventional fluidity. Ensuring proper stability of SCC is essential to enhance the uniformity of in-situ mechanical properties, including bond to embedded reinforcement, which is critical for structural engineers considering the specification of SCC for prestressed applications. In this investigation, Six wall elements measuring 1540 mm × 2150 mm × 200 mm were cast using five SCC mixtures and one reference high-performance concrete (HPC) of normal consistency to evaluate the uniformity of bond strength between prestressing strands and concrete as well as the distribution of compressive strength obtained from cores along wall elements. The evaluated SCC mixtures used for casting wall elements were proportioned to achieve a slump flow consistency of 680 ± 15 mm and minimum caisson filling capacity of 80%, and visual stability index of 0.5 to 1. Given the spreads in viscosity and static stability of the SCC mixtures, the five wall elements exhibited different levels of homogeneity in in-situ compressive strength and pull-out bond strength. Test results also indicate that despite the high fluidity of SCC, stable concrete can lead to more homogenous in-situ properties than HPC of normal consistency subjected to mechanical vibration.
Taking Steps to Protect Against the Insider Threat
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pope, Noah Gale; Williams, Martha; Lewis, Joel
2015-10-16
Research reactors are required (in accordance with the Safeguards Agreement between the State and the IAEA) to maintain a system of nuclear material accounting and control for reporting quantities of nuclear material received, shipped, and held on inventory. Enhancements to the existing accounting and control system can be made at little additional cost to the facility, and these enhancements can make nuclear material accounting and control useful for nuclear security. In particular, nuclear material accounting and control measures can be useful in protecting against an insider who is intent on unauthorized removal or misuse of nuclear material or misuse ofmore » equipment. An enhanced nuclear material accounting and control system that responds to nuclear security is described in NSS-25G, Use of Nuclear Material Accounting and Control for Nuclear Security Purposes at Facilities, which is scheduled for distribution by the IAEA Department of Nuclear Security later this year. Accounting and control measures that respond to the insider threat are also described in NSS-33, Establishing a System for Control of Nuclear Material for Nuclear Security Purposes at a Facility During Storage, Use and Movement, and in NSS-41, Preventive and Protective Measures against Insider Threats (originally issued as NSS-08), which are available in draft form. This paper describes enhancements to existing material control and accounting systems that are specific to research reactors, and shows how they are important to nuclear security and protecting against an insider.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Iveson, Steven W.
Global chemical security has been enhanced through the determined use and integration of both voluntary and legislated standards. Many popular standards contain components that specifically detail requirements for the security of materials, facilities and other vital assets. In this document we examine the roll of quality management standards and how they affect the security culture within the institutions that adopt these standards in order to conduct business within the international market place. Good manufacturing practices and good laboratory practices are two of a number of quality management systems that have been adopted as law in many nations. These standards aremore » designed to protect the quality of drugs, medicines, foods and analytical test results in order to provide the world-wide consumer with safe and affective products for consumption. These standards provide no established security protocols and yet manage to increase the security of chemicals, materials, facilities and the supply chain via the effective and complete control over the manufacturing, the global supply chains and testing processes. We discuss the means through which these systems enhance security and how nations can further improve these systems with additional regulations that deal specifically with security in the realm of these management systems. We conclude with a discussion of new technologies that may cause disruption within the industries covered by these standards and how these issues might be addressed in order to maintain or increase the level of security within the industries and nations that have adopted these standards.« less
Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho
2014-01-01
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs. PMID:24919012
Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho
2014-06-10
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.
After the Spring: Reforming Arab Armies
2014-09-01
Arab region, and intercultural communication . She was previously assigned to the North Atlantic Treaty Organization (NATO) Defence College and the...and provides solutions to strategic Army issues affecting the national security community . The Peacekeeping and Stability Operations Institute...concern topics having strategic implications for the Army, the Department of Defense, and the larger national security community . In addition to its
ERIC Educational Resources Information Center
Hess, Cynthia; Krohn, Sylvia; Reichlin, Lindsey; Román, Stephanie; Gault, Barbara
2014-01-01
Community colleges are a critical resource for women seeking to achieve economic security and stability, yet many women who are community college students face challenges that make it difficult to persist in their education and complete their degrees. To understand the circumstances and experiences of female community college students in…
Physical and Cross-Layer Security Enhancement and Resource Allocation for Wireless Networks
ERIC Educational Resources Information Center
Bashar, Muhammad Shafi Al
2011-01-01
In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-25
... a computing environment that has adequate computer security controls in place to prevent... NRC intends to issue a security Order to this Licensee in the near future. The Order will require compliance with specific Additional Security Measures to enhance the security for certain radioactive...
Simple bridge security inspection : final report, September 2006.
DOT National Transportation Integrated Search
2006-09-01
Bridges are among the most visible targets for terrorists since their destruction will have an : immediate as well as long-term economical and psychological impact on the nation. : Enhancing bridge security is key to improving homeland security and i...
32 CFR 2001.80 - Prescribed standard forms.
Code of Federal Regulations, 2011 CFR
2011-07-01
... when their use will enhance the protection of national security information and/or will reduce the....80 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Standard...
Promoting International Energy Security: Volume 4, The Gulf of Guinea
2012-01-01
Politicians, both federal and state, routinely 2 For a recent and concise review of stability in Nigeria, see Nigeria: Assessing Risks to Stability (Lewis...Export Customer for ATR 42MP,” Defense News, December 10, 2009. Lewis, Peter M., Nigeria: Assessing Risks to Stability, Washington, D.C.: Center for...especially the risks that U.S.-provided military capabilities might be applied to local civilian populations. While there are signs of improved governance
Strategy to Enhance International Supply Chain Security
2007-07-01
as part of the effort to secure air passenger travel . The security assessment crew traveling by air, land or sea cannot be considered only a travel ...threats through its traveler screening and worker credentialing programs. The strategy to secure the supply chain reflects the larger security strategy of...living or traveling abroad. • Assisting U.S. businesses in the international marketplace. • Coordinating and providing support for international
2014-09-01
biometrics technologies. 14. SUBJECT TERMS Facial recognition, systems engineering, live video streaming, security cameras, national security ...national security by sharing biometric facial recognition data in real-time utilizing infrastructures currently in place. It should be noted that the...9/11),law enforcement (LE) and Intelligence community (IC)authorities responsible for protecting citizens from threats against national security
NASA Astrophysics Data System (ADS)
Park, Hyun-Woo; Song, Aeran; Kwon, Sera; Choi, Dukhyun; Kim, Younghak; Jun, Byung-Hyuk; Kim, Han-Ki; Chung, Kwun-Bum
2018-03-01
This study suggests a sequential ambient annealing process as an excellent post-treatment method to enhance the device performance and stability of W (tungsten) doped InZnO thin film transistors (WIZO-TFTs). Sequential ambient annealing at 250 °C significantly enhanced the device performance and stability of WIZO-TFTs, compared with other post-treatment methods, such as air ambient annealing and vacuum ambient annealing at 250 °C. To understand the enhanced device performance and stability of WIZO-TFT with sequential ambient annealing, we investigate the correlations between device performance and stability and electronic structures, such as band alignment, a feature of the conduction band, and band edge states below the conduction band. The enhanced performance of WIZO-TFTs with sequential ambient annealing is related to the modification of the electronic structure. In addition, the dominant mechanism responsible for the enhanced device performance and stability of WIZO-TFTs is considered to be a change in the shallow-level and deep-level band edge states below the conduction band.
31 CFR Appendix A to Part 551 - EXECUTIVE ORDER 13536
Code of Federal Regulations, 2010 CFR
2010-07-01
... laws of the United States of America, including the International Emergency Economic Powers Act (50 U.S... directly or indirectly threaten the peace, security, or stability of Somalia, including but not limited to..., or stability of Somalia, acts of piracy or armed robbery at sea off the coast of Somalia threaten the...
46 CFR 170.300 - Special consideration for free surface of spoil in hopper dredge hoppers.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 7 2014-10-01 2014-10-01 false Special consideration for free surface of spoil in hopper dredge hoppers. 170.300 Section 170.300 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS Free Surface § 170.300...
46 CFR 170.270 - Door design, operation, installation, and testing.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 7 2012-10-01 2012-10-01 false Door design, operation, installation, and testing. 170.270 Section 170.270 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS Watertight Bulkhead Doors § 170.270 Door design, operation, installation, and testing. (a...
46 CFR 170.270 - Door design, operation, installation, and testing.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 7 2014-10-01 2014-10-01 false Door design, operation, installation, and testing. 170.270 Section 170.270 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS Watertight Bulkhead Doors § 170.270 Door design, operation, installation, and testing. (a...
46 CFR 170.270 - Door design, operation, installation, and testing.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 7 2013-10-01 2013-10-01 false Door design, operation, installation, and testing. 170.270 Section 170.270 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS Watertight Bulkhead Doors § 170.270 Door design, operation, installation, and testing. (a...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System.more » Selected papers were processed separately for inclusion in the Energy Science and Technology Database.« less
Stabilization and Solidification of Nitric Acid Effluent Waste at Y-12
DOE Office of Scientific and Technical Information (OSTI.GOV)
Singh, Dileep; Lorenzo-Martin, Cinta
Consolidated Nuclear Security, LLC (CNS) at the Y-12 plant is investigating approaches for the treatment (stabilization and solidification) of a nitric acid waste effluent that contains uranium. Because the pH of the waste stream is 1-2, it is a difficult waste stream to treat and stabilize by a standard cement-based process. Alternative waste forms are being considered. In this regard, Ceramicrete technology, developed at Argonne National Laboratory, is being explored as an option to solidify and stabilize the nitric acid effluent wastes.
Research and simulation on the rollover system of corn harvester
NASA Astrophysics Data System (ADS)
Li, Shizhuang; Cao, Shukun
2017-01-01
The structural characteristics of our country's corn harvester are narrow-track, high centroid and existence of eccentric distance, so rollover accident is easily to occur when driving in mountainous and hilly regions. In order to improve the design quality of corn harvester and enhance the security of operation, it is of great significance to research the rollover prevention system of the corn harvester. Hydro-pneumatic suspension has powerful function of adjusting the balance of automobile body and good shock absorption function. In this paper, hydro-pneumatic suspension is applied to the rollover prevention system of the corn harvester to improve the ability of anti-rollover. At last using ADAMS simulation technology to simulate the roll stability of traditional corn harvester and the corn harvester with hydro pneumatic suspension, then calculating the heeling angle in both cases.
Enhanced Security for Online Exams Using Group Cryptography
ERIC Educational Resources Information Center
Jung, I. Y.; Yeom, H. Y.
2009-01-01
While development of the Internet has contributed to the spread of online education, online exams have not been widely adopted. An online exam is defined here as one that takes place over the insecure Internet, and where no proctor is in the same location as the examinees. This paper proposes an enhanced secure online exam management environment…
NREL: News - New Energy Systems Enhance National Security
resources, bioenergy and bio-based products, zero energy buildings, wind energy, geothermal energy, solar Energy Systems Enhance National Security Washington D.C., March 14, 2002 Experts from the U.S . Department of Energy's National Renewable Energy Laboratory (NREL) have identified key renewable energy
NASA Technical Reports Server (NTRS)
Skeberdis, Daniel
2016-01-01
This is a presentation at the MOWG fall meeting that will discuss CCS purpose, future status, security enhancements, arbitrary ephemeris mission features, overview of CCS 7.3, approach for the use of NORAD TLEs, account and data security, CCS System virtualization, control box visualization modification and other enhancements.
Fuel Cycle Technologies 2014 Achievement Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hong, Bonnie C.
2015-01-01
The Fuel Cycle Technologies (FCT) program supports the Department of Energy’s (DOE’s) mission to: “Enhance U.S. security and economic growth through transformative science, technology innovation, and market solutions to meet our energy, nuclear security, and environmental challenges.” Goal 1 of DOE’s Strategic Plan is to innovate energy technologies that enhance U.S. economic growth and job creation, energy security, and environmental quality. FCT does this by investing in advanced technologies that could transform the nuclear fuel cycle in the decades to come. Goal 2 of DOE’s Strategic Plan is to strengthen national security by strengthening key science, technology, and engineering capabilities.more » FCT does this by working closely with the National Nuclear Security Administration and the U.S Department of State to develop advanced technologies that support the Nation’s nuclear nonproliferation goals.« less
NASA Astrophysics Data System (ADS)
Tian, Zhang; Yanfeng, Gong
2017-05-01
In order to solve the contradiction between demand and distribution range of primary energy resource, Ultra High Voltage (UHV) power grids should be developed rapidly to meet development of energy bases and accessing of large-scale renewable energy. This paper reviewed the latest research processes of AC/DC transmission technologies, summarized the characteristics of AC/DC power grids, concluded that China’s power grids certainly enter a new period of large -scale hybrid UHV AC/DC power grids and characteristics of “strong DC and weak AC” becomes increasingly pro minent; possible problems in operation of AC/DC power grids was discussed, and interaction or effect between AC/DC power grids was made an intensive study of; according to above problems in operation of power grids, preliminary scheme is summarized as fo llows: strengthening backbone structures, enhancing AC/DC transmission technologies, promoting protection measures of clean energ y accessing grids, and taking actions to solve stability problems of voltage and frequency etc. It’s valuable for making hybrid UHV AC/DC power grids adapt to operating mode of large power grids, thus guaranteeing security and stability of power system.
Benefits of Moderate-Z Ablators for Direct-Drive Inertial Confinement Fusion
NASA Astrophysics Data System (ADS)
Lafon, M.; Betti, R.; Anderson, K. S.; Collins, T. J. B.; Skupsky, S.; McKenty, P. W.
2014-10-01
Control of hydrodynamic instabilities and DT-fuel preheating by hot electrons produced by laser-plasma interaction is crucial in inertial confinement fusion. Moderate- Z ablators have been shown to reduce the laser imprinting on target and suppress the generation of hot electrons from the two-plasmon-decay instability. These results have motivated the use of ablators of higher- Z than pure plastic in direct-drive-ignition target designs for the National Ignition Facility (NIF). Two-dimensional radiation-hydrodynamic simulations assess the robustness of these ignition designs to laser imprint and capsule nonuniformities. The complex behavior of the hydrodynamic stability of mid- Z ablators is investigated through single and multimode simulations. A polar-drive configuration is developed within the NIF Laser System specifications for each ablator material. The use of multilayer ablators is also investigated to enhance the hydrodynamic stability. Results indicate that ignition target designs using mid- Z ablators exhibit good hydrodynamic properties, leading to high target gain for direct-drive implosions on the NIF. This material is based upon work supported by the Department of Energy National Nuclear Security Administration under Award Number DE-NA0001944 and the Office of Fusion Energy Sciences Number DE-FG02-04ER54786.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-20
... security-based swaps. The new legislation was intended among other things to enhance the authority of... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66156; File No. SR-FINRA-2012-004] Self... (Application of Rules to Security-Based Swaps) January 13, 2012. Pursuant to Section 19(b)(1) of the Securities...
The Threat of Security: Hindering Technology Integration in the Classroom
ERIC Educational Resources Information Center
Robinson, LeAnne K.; Brown, Abbie; Green, Tim
2007-01-01
For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…
Ways to Improve DoD 8570 IY Security Certification
ERIC Educational Resources Information Center
Bates, Justin D.
2017-01-01
The goal of this research was to discover a list of changes that can be applied to IT security certifications to enhance the day-to-day capabilities of IT security professionals. Background: IT security professionals are often required to obtain certifications that do not adequately prepare them for the full scope of work that will be necessary…
Secure FAST: Security Enhancement in the NATO Time Sensitive Targeting Tool
2010-11-01
designed to aid in the tracking and prosecuting of Time Sensitive Targets. The FAST tool provides user level authentication and authorisation in terms...level authentication and authorisation in terms of security. It uses operating system level security but does not provide application level security for...and collaboration tool, designed to aid in the tracking and prosecuting of Time Sensitive Targets. The FAST tool provides user level authentication and
2008-03-01
executables. The current roadblock to detecting Type I Malware consistantly is the practice of legitimate software , such as antivirus programs, using this... Software Security Systems . . 31 3.2.2 Advantages of Hardware . . . . . . . . . . . . . 32 3.2.3 Trustworthiness of Information . . . . . . . . . 33...Towards a Hardware Security Backplane . . . . . . . . . 42 IV. Review of State of the Art Computer Security Solutions . . . . . 46 4.1 Software
49 CFR 1562.1 - Scope and definitions.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Maryland Three Airports: Enhanced Security Procedures for Operations at Certain Airports in the Washington... security coordinator means the official at a Maryland Three Airport who is responsible for ensuring that the airport's security procedures are implemented and followed. Maryland Three Airport means any of...
49 CFR 1562.1 - Scope and definitions.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Maryland Three Airports: Enhanced Security Procedures for Operations at Certain Airports in the Washington... security coordinator means the official at a Maryland Three Airport who is responsible for ensuring that the airport's security procedures are implemented and followed. Maryland Three Airport means any of...
49 CFR 1562.21 - Scope, general requirements, and definitions.
Code of Federal Regulations, 2014 CFR
2014-10-01
... WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for... operators located at DCA or gateway airports; individuals designated as a security coordinator by aircraft... not include an armed security officer. DCA means Ronald Reagan Washington National Airport. DASSP...
49 CFR 1562.21 - Scope, general requirements, and definitions.
Code of Federal Regulations, 2012 CFR
2012-10-01
... WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for... operators located at DCA or gateway airports; individuals designated as a security coordinator by aircraft... not include an armed security officer. DCA means Ronald Reagan Washington National Airport. DASSP...
49 CFR 1562.1 - Scope and definitions.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Maryland Three Airports: Enhanced Security Procedures for Operations at Certain Airports in the Washington... security coordinator means the official at a Maryland Three Airport who is responsible for ensuring that the airport's security procedures are implemented and followed. Maryland Three Airport means any of...
49 CFR 1562.1 - Scope and definitions.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Maryland Three Airports: Enhanced Security Procedures for Operations at Certain Airports in the Washington... security coordinator means the official at a Maryland Three Airport who is responsible for ensuring that the airport's security procedures are implemented and followed. Maryland Three Airport means any of...
49 CFR 1562.21 - Scope, general requirements, and definitions.
Code of Federal Regulations, 2013 CFR
2013-10-01
... WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for... operators located at DCA or gateway airports; individuals designated as a security coordinator by aircraft... not include an armed security officer. DCA means Ronald Reagan Washington National Airport. DASSP...
49 CFR 1562.1 - Scope and definitions.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Maryland Three Airports: Enhanced Security Procedures for Operations at Certain Airports in the Washington... security coordinator means the official at a Maryland Three Airport who is responsible for ensuring that the airport's security procedures are implemented and followed. Maryland Three Airport means any of...
The Impact on Strategic Stability of Ballistic Missile Defense in Eastern Europe
2009-06-12
how did we get to this point? And what does it mean for strategic stability? Is there even still such a thing in a post-Cold War and post-Anti...Despite these radical changes to global security since the end of the Cold War, very few examinations of exactly what strategic stability means ...examining the historical definition of the phrase and researching the various perturbations that have resulted from changing national nuclear capabilities
The Land Component Role in Maritime Security
2016-12-31
U.S. Army Pacific (USARPAC) is designated as the Theater Joint Force Land Component Command (TJFLCC) and endeavors to support the PACOM Theater ...security. 1 Mike Wall , “What 11 Billion People Mean for Space Travel,” November 27, 2013...human outcomes that are a prerequisite for achieving national objectives”18. These are land-based operations designed to create stability in human
Requirements For Security Sector Reform Success
2016-05-26
Advanced Military Studies United States Army Command and General Staff College Fort Leavenworth, Kansas 2016 Approved for public release...ACRONYM(S) School of Advanced Military Studies , Advanced Military Studies Program 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION...political and economic stability are required for Security Sector Reform (SSR) success over the long term. This study suggests that states with stable
Measuring Stability and Security in Iraq
2010-03-01
development, generating 27 signed investment licenses totaling $2 billion for the tourism and hospitality industries, with 13 projects under...continue to plan and execute the responsible drawdown of U.S. military forces from Iraq. By August 31, 2010, U.S. forces will have transitioned... planning and budgeting, procurement, and information technology. In summary, political, rule-of-law, economic and energy, and security trends in Iraq
Integrating Partner Nations into Coalition Operations
2006-01-01
of United Nations (UN) Security Council Resolu- tion 1529, Chile , Canada, France, and the United States established a multinational force...of restabi- lization. Chile continues to deploy forces as a member of the UN Stabilization Force Haiti (MINUSTAH), led by Brazil and comprised...supporting a tailored exercise and theater security cooperation program that has encouraged partners such as Chile , Brazil, and El Salvador to develop
Tuneable enhancement of the salt and thermal stability of polymeric micelles by cyclized amphiphiles
Honda, Satoshi; Yamamoto, Takuya; Tezuka, Yasuyuki
2013-01-01
Cyclic molecules provide better stability for their aggregates. Typically in nature, the unique cyclic cell membrane lipids allow thermophilic archaea to inhabit extreme conditions. By mimicking the biological design, the robustness of self-assembled synthetic nanostructures is expected to be improved. Here we report topology effects by cyclized polymeric amphiphiles against their linear counterparts, demonstrating a drastic enhancement in the thermal, as well as salt stability of self-assembled micelles. Furthermore, through coassembly of the linear and cyclic amphiphiles, the stability was successfully tuned for a wide range of temperatures and salt concentrations. The enhanced thermal/salt stability was exploited in a halogen exchange reaction to stimulate the catalytic activity. The mechanism for the enhancement was also investigated. These topology effects by the cyclic amphiphiles offer unprecedented opportunities in polymer materials design unattainable by traditional means. PMID:23481382
Enhanced optical security by using information carrier digital screening
NASA Astrophysics Data System (ADS)
Koltai, Ferenc; Adam, Bence
2004-06-01
Jura has developed different security features based on Information Carrier Digital Screening. Substance of such features is that a non-visible secondary image is encoded in a visible primary image. The encoded image will be visible only by using a decoding device. One of such developments is JURA's Invisible Personal Information (IPI) is widely used in high security documents, where personal data of the document holder are encoded in the screen of the document holder's photography and they can be decoded by using an optical decoding device. In order to make document verification fully automated, enhance security and eliminate human factors, digital version of IPI, the D-IPI was developed. A special 2D-barcode structure was designed, which contains sufficient quantity of encoded digital information and can be embedded into the photo. Other part of Digital-IPI is the reading software, that is able to retrieve the encoded information with high reliability. The reading software developed with a specific 2D structure is providing the possibility of a forensic analysis. Such analysis will discover all kind of manipulations -- globally, if the photography was simply changed and selectively, if only part of the photography was manipulated. Digital IPI is a good example how benefits of digital technology can be exploited by using optical security and how technology for optical security can be converted into digital technology. The D-IPI process is compatible with all current personalization printers and materials (polycarbonate, PVC, security papers, Teslin-foils, etc.) and can provide any document with enhanced security and tamper-resistance.
Information security requirements in patient-centred healthcare support systems.
Alsalamah, Shada; Gray, W Alex; Hilton, Jeremy; Alsalamah, Hessah
2013-01-01
Enabling Patient-Centred (PC) care in modern healthcare requires the flow of medical information with the patient between different healthcare providers as they follow the patient's treatment plan. However, PC care threatens the stability of the balance of information security in the support systems since legacy systems fall short of attaining a security balance when sharing their information due to compromises made between its availability, integrity, and confidentiality. Results show that the main reason for this is that information security implementation in discrete legacy systems focused mainly on information confidentiality and integrity leaving availability a challenge in collaboration. Through an empirical study using domain analysis, observations, and interviews, this paper identifies a need for six information security requirements in legacy systems to cope with this situation in order to attain the security balance in systems supporting PC care implementation in modern healthcare.
Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho
2014-01-01
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.
USign--a security enhanced electronic consent model.
Li, Yanyan; Xie, Mengjun; Bian, Jiang
2014-01-01
Electronic consent becomes increasingly popular in the healthcare sector given the many benefits it provides. However, security concerns, e.g., how to verify the identity of a person who is remotely accessing the electronic consent system in a secure and user-friendly manner, also arise along with the popularity of electronic consent. Unfortunately, existing electronic consent systems do not pay sufficient attention to those issues. They mainly rely on conventional password based authentication to verify the identity of an electronic consent user, which is far from being sufficient given that identity theft threat is real and significant in reality. In this paper, we present a security enhanced electronic consent model called USign. USign enhances the identity protection and authentication for electronic consent systems by leveraging handwritten signatures everyone is familiar with and mobile computing technologies that are becoming ubiquitous. We developed a prototype of USign and conducted preliminary evaluation on accuracy and usability of signature verification. Our experimental results show the feasibility of the proposed model.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 4 2010-10-01 2010-10-01 false Special examination in lieu of drydocking for column stabilized units or surface type units when specifically approved by the Commandant. 107.265 Section 107.265 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 4 2014-10-01 2014-10-01 false Special examination in lieu of drydocking for column stabilized units or surface type units when specifically approved by the Commandant. 107.265 Section 107.265 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 4 2012-10-01 2012-10-01 false Special examination in lieu of drydocking for column stabilized units or surface type units when specifically approved by the Commandant. 107.265 Section 107.265 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 4 2013-10-01 2013-10-01 false Special examination in lieu of drydocking for column stabilized units or surface type units when specifically approved by the Commandant. 107.265 Section 107.265 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 4 2011-10-01 2011-10-01 false Special examination in lieu of drydocking for column stabilized units or surface type units when specifically approved by the Commandant. 107.265 Section 107.265 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS...
Characterization of Nanostructured Polymer Films
2014-12-23
discovered that polymer films with exceptional thermal and kinetic stability could be formed by Matrix Assisted Pulsed Laser Evaporation ( MAPLE ) onto...thermal properties of amorphous polymer nanoglobules fabricated via Matrix-Assisted Pulsed Laser Deposition ( MAPLE ). We discovered that stability in... MAPLE , Glass Transition Temperature 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian
2015-03-01
The telecare medical information systems (TMISs) enable patients to conveniently enjoy telecare services at home. The protection of patient's privacy is a key issue due to the openness of communication environment. Authentication as a typical approach is adopted to guarantee confidential and authorized interaction between the patient and remote server. In order to achieve the goals, numerous remote authentication schemes based on cryptography have been presented. Recently, Arshad et al. (J Med Syst 38(12): 2014) presented a secure and efficient three-factor authenticated key exchange scheme to remedy the weaknesses of Tan et al.'s scheme (J Med Syst 38(3): 2014). In this paper, we found that once a successful off-line password attack that results in an adversary could impersonate any user of the system in Arshad et al.'s scheme. In order to thwart these security attacks, an enhanced biometric and smart card based remote authentication scheme for TMISs is proposed. In addition, the BAN logic is applied to demonstrate the completeness of the enhanced scheme. Security and performance analyses show that our enhanced scheme satisfies more security properties and less computational cost compared with previously proposed schemes.
2009-01-01
Cattle raiding and the effects of poaching would likely intensify as well. Fisheries may be adversely impacted due to climatic effects on coral...organized crime to set roots in southern Africa during the early 1990s. Chinese gangs have since diversified into trafficking of poached rhino horn...charged with poaching rhino horn for shipment to China.90 Intelligence sources developed by Botswana security personnel for anti- poaching purposes
2010-04-30
5 Intercity Bus Security Grant Program...eligibility.22 This grant program includes funding for the Freight Rail Security Grant Program (FRSGP), and the Intercity Passenger Rail Program (IPR...eligible to receive funding to continue security enhancements for its intercity rail services between high-risk urban areas. 21 U.S. Department of
Digital watermarking in telemedicine applications--towards enhanced data security and accessibility.
Giakoumaki, Aggeliki L; Perakis, Konstantinos; Tagaris, Anastassios; Koutsouris, Dimitris
2006-01-01
Implementing telemedical solutions has become a trend amongst the various research teams at an international level. Yet, contemporary information access and distribution technologies raise critical issues that urgently need to be addressed, especially those related to security. The paper suggests the use of watermarking in telemedical applications in order to enhance security of the transmitted sensitive medical data, familiarizes the users with a telemedical system and a watermarking module that have already been developed, and proposes an architecture that will enable the integration of the two systems, taking into account a variety of use cases and application scenarios.
Memristor-integrated voltage-stabilizing supercapacitor system.
Liu, Bin; Liu, Boyang; Wang, Xianfu; Wu, Xinghui; Zhao, Wenning; Xu, Zhimou; Chen, Di; Shen, Guozhen
2014-08-06
Voltage-stabilized supercapacitors: A single supercapacitor formed with PCBM/Pt/IPS nanorod-array electrodes is designed and delivers enhanced areal capacitance, capacitance retention, and excellent electrical stability under bending, while a significant voltage-decrease is observed during the discharging process. Once integrated with the memristor, the memristor-integrated supercapacitor systems deliver an extremely low voltage-drop, indicating greatly enhanced voltage-stabilizing features. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
75 FR 881 - Meeting of Advisory Committee on International Communications and Information Policy
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-06
... development issues, international spectrum requirements and harmonization, cyber-security, and data protection... will discuss key issues of importance to U.S. communications policy interests including future... Bureau of Diplomatic Security to enhance the Department's security by tracking visitor traffic and to...
77 FR 2450 - Security Zone; Potomac and Anacostia Rivers, Washington, DC
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-18
... implement comprehensive port security regimes designed to safeguard human life, vessels, and waterfront... protect life, property and the environment, therefore, a 30-day notice period is impracticable. Delaying... enhance public and maritime safety and security in order to safeguard life, property, and the environment...
NASA Technical Reports Server (NTRS)
Bartels, Robert E.
2011-01-01
Launch vehicles frequently experience a reduced stability margin through the transonic Mach number range. This reduced stability margin is caused by an undamping of the aerodynamics in one of the lower frequency flexible or rigid body modes. Analysis of the behavior of a flexible vehicle is routinely performed with quasi-steady aerodynamic lineloads derived from steady rigid computational fluid dynamics (CFD). However, a quasi-steady aeroelastic stability analysis can be unconservative at the critical Mach numbers where experiment or unsteady computational aeroelastic (CAE) analysis show a reduced or even negative aerodynamic damping. This paper will present a method of enhancing the quasi-steady aeroelastic stability analysis of a launch vehicle with unsteady aerodynamics. The enhanced formulation uses unsteady CFD to compute the response of selected lower frequency modes. The response is contained in a time history of the vehicle lineloads. A proper orthogonal decomposition of the unsteady aerodynamic lineload response is used to reduce the scale of data volume and system identification is used to derive the aerodynamic stiffness, damping and mass matrices. The results of the enhanced quasi-static aeroelastic stability analysis are compared with the damping and frequency computed from unsteady CAE analysis and from a quasi-steady analysis. The results show that incorporating unsteady aerodynamics in this way brings the enhanced quasi-steady aeroelastic stability analysis into close agreement with the unsteady CAE analysis.
Jeon, Sunbin; Jung, Hyunchul; Kim, Sung Hyun; Lee, Ki Bong
2018-06-18
CO 2 capture using polyethyleneimine (PEI)-impregnated silica adsorbents has been receiving a lot of attention. However, the absence of physical stability (evaporation and leaching of amine) and chemical stability (urea formation) of the PEI-impregnated silica adsorbent has been generally established. Therefore, in this study, a double-layer impregnated structure, developed using modified PEI, is newly proposed to enhance the physical and chemical stabilities of the adsorbent. Epoxy-modified PEI and diepoxide-cross-linked PEI were impregnated via a dry impregnation method in the first and second layers, respectively. The physical stability of the double-layer structured adsorbent was noticeably enhanced when compared to the conventional adsorbents with a single layer. In addition to the enhanced physical stability, the result of simulated temperature swing adsorption cycles revealed that the double-layer structured adsorbent presented a high potential working capacity (3.5 mmol/g) and less urea formation under CO 2 -rich regeneration conditions. The enhanced physical and chemical stabilities as well as the high CO 2 working capacity of the double-layer structured adsorbent were mainly attributed to the second layer consisting of diepoxide-cross-linked PEI.
Data threats analysis and prevention on iOS platform
NASA Astrophysics Data System (ADS)
Gao, Bo; Wang, Yi; Chen, Zhou; Tang, Jiqiang
2015-12-01
Background: The rapid growth of mobile internet has driven the rapid popularity of smart mobiles. iOS device is chosen by more and more people for its humanity, stability and excellent industrial design, and the data security problem that followed it has gradually attracted the researchers' attention. Method & Result: This thesis focuses on the analysis of current situation of data security on iOS platform, from both security mechanism and data risk, and proposes countermeasures. Conclusion: From practical work, many problems of data security mechanism on iOS platform still exist. At present, the problem of malicious software towards iOS system has not been severe, but how to ensure the security of data on iOS platform will inevitably become one of the directions for our further study.
Li, Dan; Shi, Dingqin; Xia, Yonggao; Qiao, Lin; Li, Xianfeng; Zhang, Huamin
2017-03-15
Separators with high security, reliability, and rate capacity are in urgent need for the advancement of high power lithium ion batteries. The currently used porous polyolefin membranes are critically hindered by their low thermal stability and poor electrolyte wettability, which further lead to low rate capacity. Here we present a novel promising porous polybenzimidazole (PBI) membrane with super high thermal stability and electrolyte wettability. The rigid structure and functional groups in the PBI chain enable membranes to be stable at temperature as high as 400 °C, and the unique flame resistance of PBI could ensure the high security of a battery as well. In particular, the prepared membrane owns 328% electrolyte uptake, which is more than two times higher than commercial Celgard 2325 separator. The unique combination of high thermal stability, high flame resistance and super high electrolyte wettability enable the PBI porous membranes to be highly promising for high power lithium battery.
An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity
Lu, Yanrong; Li, Lixiang; Zhang, Hao; Yang, Yixian
2016-01-01
User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network. Owing to the better properties and higher performance of chaotic theory, the chaotic maps have been introduced into the security schemes, and hence numerous key agreement schemes have been put forward under chaotic-maps. Recently, Xie et al. released an enhanced scheme under Farash et al.’s scheme and claimed their improvements could withstand the security loopholes pointed out in the scheme of Farash et al., i.e., resistance to the off-line password guessing and user impersonation attacks. Nevertheless, through our careful analysis, the improvements were released by Xie et al. still could not solve the problems troubled in Farash et al‥ Besides, Xie et al.’s improvements failed to achieve the user anonymity and the session key security. With the purpose of eliminating the security risks of the scheme of Xie et al., we design an anonymous password-based three-party authenticated key agreement under chaotic maps. Both the formal analysis and the formal security verification using AVISPA are presented. Also, BAN logic is used to show the correctness of the enhancements. Furthermore, we also demonstrate that the design thwarts most of the common attacks. We also make a comparison between the recent chaotic-maps based schemes and our enhancements in terms of performance. PMID:27101305
Facilities | Transportation Research | NREL
detailed chemical characterization, performance property measurements, and stability research. Photo of Technology Evaluation Center This off-network data center provides secure management, storage, and processing
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-22
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66398; File No. SR-NSCC-2012-02] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change To Enhance Its Margining Methodology as Applied to Municipal and Corporate Bonds February 15, 2012...
Cyber Hygiene for Control System Security
Oliver, David
2015-10-08
There are many resources from government and private industry available to assist organizations in reducing their attack surface and enhancing their security posture. Furthermore, standards are being written and improved upon to make the practice of securing a network more manageable. And while the specifics of network security are complex, most system vulnerabilities can be mitigated using fairly simple cyber hygiene techniques like those offered above.
Education in Northern Ireland since the Good Friday Agreement: Kabuki Theatre Meets "Danse Macabre"
ERIC Educational Resources Information Center
Gardner, John
2016-01-01
The Good Friday Agreement (1998) between the UK and Irish governments, and most of the political parties in Northern Ireland, heralded a significant step forward in securing peace and stability for this troubled region of the British Isles. From the new-found stability, the previous fits and starts of education reform were replaced by a…
Planning for Action: Campaign Concepts and Tools
2012-08-01
142 10-15. Stability Mechanisms – Army .................................... 143 10-16. Stability Mechanisms – Joint...defeat mechanisms, which focus 143 the destructive and coercive capabilities of the force to provide security and public order and safety for...Matthew B. Ridgway. GEN Ridgway successfully led the 82d Airborne Division and XVIII Airborne Corps in the ETO during World War II and Eighth (US
ERIC Educational Resources Information Center
Tran, Henry; Weinraub, Marsha
2006-01-01
Main and interactive effects of child care quality, stability, and multiplicity on infants' attachment security, language comprehension, language production, and cognitive development at 15 months were examined using data from the National Institute of Child Health and Human Development (NICHD) Study of Early Child Care. Thirty-nine percent of the…
Security Cooperation Activities: Strengthening a Partner Military and its Governing Institutions
2016-05-26
governments suffered from economic instability , corruption, poor rule of law, and low administration of justice. Government and economic stability ...types of programs applied. Conditions defining allied state characteristics are military structure, government polity rating, and economic stability ...regional instability . Dr. Michael Mihalka and Mr. Mark Wilcox covered the trends in liberal democracy in the South Caucasus in light of economic
withdraw a large majority of troops months into the operation, but a stable environment required almost a decade to achieve. Stabilization in such a...scenario requires Political, Social , Justice, Economic and Security needs to be met. The military has not been equipped to meet these needs by themselves
Li, Bin; Konecke, Stephanie; Wegiel, Lindsay A; Taylor, Lynne S; Edgar, Kevin J
2013-10-15
Amorphous solid dispersions (ASD) of curcumin (Cur) in cellulose derivative matrices, hydroxypropylmethylcellulose acetate succinate (HPMCAS), carboxymethylcellulose acetate butyrate (CMCAB), and cellulose acetate adipate propionate (CAAdP) were prepared in order to investigate the structure-property relationship and identify polymer properties necessary to effectively increase Cur aqueous solution concentration. XRD results indicated that all investigated solid dispersions were amorphous, even at a 9:1 Cur:polymer ratio. Both stability against crystallization and Cur solution concentration from these ASDs were significantly higher than those from physical mixtures and crystalline Cur. Remarkably, curcumin was also stabilized against chemical degradation in solution. Chemical stabilization was polymer-dependent, with stabilization in CAAdP>CMCAB>HPMCAS>PVP, while matrices enhanced solution concentration as PVP>HPMCAS>CMCAB≈CAAdP. HPMCAS/Cur dispersions have useful combinations of pH-triggered release profile, chemical stabilization, and strong enhancement of Cur solution concentration. Copyright © 2013 Elsevier Ltd. All rights reserved.
Challenges and Responses to Asian Food Security
NASA Astrophysics Data System (ADS)
Teng, Paul P. S.; Oliveros, Jurise A. P.
2015-10-01
Food security is a complex phenomenon made up of multiple dimensions — food availability, physical access to food, economic access to food, food utilization — each of which has a stability dimension which underpins it. This review provides details on these dimensions and links them to two published indices which provide assessments of the state of food security in a country. The paper further provides analyses of the main supply and demand factors in the food security equation. Food security faces natural and anthropogenic threats such as loss of productive land and water, climate change and declining crop productivity, all of which are potentially amenable to solutions provided by science and technology. Demographic and accompanying diet changes further exacerbate the demands made on the natural resource base for food production. Finally, possible responses to the challenges confronting a secured food future are discussed from technological, policy and system level perspectives.
Windblown sediment transport and loss in a desert-oasis ecotone in the Tarim Basin.
Pi, Huawei; Sharratt, Brenton; Lei, Jiaqiang
2017-08-10
The Tarim Basin is regarded as one of the most highly erodible areas in China. Desert comprises 64% of the land use in the Basin, but the desert-oasis ecotone plays a prominent role in maintaining oasis ecological security and stability. Yet, little is known concerning the magnitude of windblown sediment transport in a desert-oasis ecotone. Therefore, aeolian sediment transport and loss was assessed from a desert-oasis experimental site located near Alaer City in the northwestern Tarim Basin. Sediment transport and factors governing transport were measured during three high wind events in 2012 and four events in 2013. Sediment transport was measured to a height of 10 m using passive aeolian airborne sediment samplers. The mass flux profile over the eroding surface was well represented by the power-law (R 2 > 0.77). Sediment loss from the site ranged from 118 g m -2 for the 20-24Apr 2012 wind event to 2925 g m -2 for the 31Mar-11Apr 2012 event. Suspension accounted for 67.4 to 84.8% of sediment loss across all high wind events. Our results indicate the severity of wind erosion in a desert-oasis ecotone and thus encourage adoption of management practices that will enhance oasis ecological security.
Hong, Bong Jin; Compton, Owen C.; An, Zhi; Eryzazici, Ibrahim; Nguyen, SonBinh T.
2013-01-01
Aqueous dispersions of graphene oxide are inherently unstable in the presence of electrolytes, which screen the electrostatic surface charge on these nanosheets and induce irreversible aggregation. Two complementary strategies, utilizing either electrostatic or steric stabilization, have been developed to enhance the stability of graphene oxide in electrolyte solutions, allowing it to stay dispersed in cell culture media and serum. The electrostatic stabilization approach entails further oxidation of graphene oxide to low C/O ratio (~1.03) and increases ionic tolerance of these nanosheets. The steric stabilization technique employs an amphiphilic block copolymer that serves as a non-covalently bound surfactant to minimize the aggregate-induced nanosheets-nanosheet interactions. Both strategies can stabilize graphene oxide nanosheets with large dimensions (>300 nm) in biological media, allowing for an enhancement of >250% in the bioconjugation efficiency of streptavidin in comparison to untreated nanosheets. Notably, both strategies allow the stabilized nanosheets to be readily uptake by cells, demonstrating their excellent performance as potential drug delivery vehicles. PMID:22017285
Cassibba, Rosalinda; Castoro, Germana; Costantino, Elisabetta; Sette, Giovanna; Van Ijzendoorn, Marinus H
2015-01-01
This study aims to explore whether a short-term and attachment-based video-feedback intervention, the Video-Feedback Intervention to Promote Positive Parenting With Discussions on the Representational Level (VIPP-R; F. Juffer, M.J. Bakermans-Kranenburg, & M.H. van IJzendoorn, 2008), might be effective in enhancing maternal sensitivity and in promoting infants' attachment security in an Italian sample of dyads with primiparous mothers. Moreover, we explore whether the effectiveness of VIPP-R might be different for parents with insecure attachment representations who might be most in need of preventive intervention, as compared to parents who already have a more balanced and secure state of mind. Thirty-two infants (40% female) and their mothers participated in the study. The sample was divided into an intervention group (n = 16) and a comparison group (n = 16). At 6 and 13 months of age, the Adult Attachment Interview (AAI; M. Main, N. Kaplan, & J. Cassidy, 1985) was administered. Moreover, a 30-min mother-infant play situation was videotaped and coded for maternal sensitivity with the Emotional Availability Scales (Z. Biringen, J. Robinson, & R.N. Emde, 2000). At 13 months of age, the Strange Situation Procedure (M.D.S. Ainsworth, M.D. Blehar, E. Waters, & S. Wall, 1978) was used to assess the security of mother-infant attachment. Results revealed a significant interaction effect between intervention and AAI security for infant attachment security; moreover, main effects of AAI security and intervention for maternal sensitivity were found. The VIPP-R appears effective in enhancing maternal sensitivity and infant attachment security, although only mothers with an insecure attachment representation may benefit from the intervention. © 2014 Michigan Association for Infant Mental Health.
Enhancing Security by System-Level Virtualization in Cloud Computing Environments
NASA Astrophysics Data System (ADS)
Sun, Dawei; Chang, Guiran; Tan, Chunguang; Wang, Xingwei
Many trends are opening up the era of cloud computing, which will reshape the IT industry. Virtualization techniques have become an indispensable ingredient for almost all cloud computing system. By the virtual environments, cloud provider is able to run varieties of operating systems as needed by each cloud user. Virtualization can improve reliability, security, and availability of applications by using consolidation, isolation, and fault tolerance. In addition, it is possible to balance the workloads by using live migration techniques. In this paper, the definition of cloud computing is given; and then the service and deployment models are introduced. An analysis of security issues and challenges in implementation of cloud computing is identified. Moreover, a system-level virtualization case is established to enhance the security of cloud computing environments.
2004-08-05
KENNEDY SPACE CENTER, FLA. - Dave Saleeba, assistant administrator with the Office of Security Management and Safeguards at NASA Headquarters, speaks to guests at the ribbon cutting for the Enhanced Firing Range on Schwartz Rd. at Kennedy Space Center. NASA’s Federal Law Enforcement Training Academy’s firing range has been upgraded to include a “rifle-grade” shoot house, a portable, tactical “shoot-back” trailer for cover and concealment drills, automated running targets and a new classroom facility. They are added to the existing three firearms ranges, “pistol-grade” shoot house, obstacle course and rappel tower. NASA’s Security Management and Safeguards Office funded the enhancements in order to improve ability to train the KSC security force and to support local, state and federal law enforcement agencies in Homeland Security.
Key-Generation Algorithms for Linear Piece In Hand Matrix Method
NASA Astrophysics Data System (ADS)
Tadaki, Kohtaro; Tsujii, Shigeo
The linear Piece In Hand (PH, for short) matrix method with random variables was proposed in our former work. It is a general prescription which can be applicable to any type of multivariate public-key cryptosystems for the purpose of enhancing their security. Actually, we showed, in an experimental manner, that the linear PH matrix method with random variables can certainly enhance the security of HFE against the Gröbner basis attack, where HFE is one of the major variants of multivariate public-key cryptosystems. In 1998 Patarin, Goubin, and Courtois introduced the plus method as a general prescription which aims to enhance the security of any given MPKC, just like the linear PH matrix method with random variables. In this paper we prove the equivalence between the plus method and the primitive linear PH matrix method, which is introduced by our previous work to explain the notion of the PH matrix method in general in an illustrative manner and not for a practical use to enhance the security of any given MPKC. Based on this equivalence, we show that the linear PH matrix method with random variables has the substantial advantage over the plus method with respect to the security enhancement. In the linear PH matrix method with random variables, the three matrices, including the PH matrix, play a central role in the secret-key and public-key. In this paper, we clarify how to generate these matrices and thus present two probabilistic polynomial-time algorithms to generate these matrices. In particular, the second one has a concise form, and is obtained as a byproduct of the proof of the equivalence between the plus method and the primitive linear PH matrix method.
Water security evaluation in Yellow River basin
NASA Astrophysics Data System (ADS)
Jiang, Guiqin; He, Liyuan; Jing, Juan
2018-03-01
Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.
Enhancement of colour stability of anthocyanins in model beverages by gum arabic addition.
Chung, Cheryl; Rojanasasithara, Thananunt; Mutilangi, William; McClements, David Julian
2016-06-15
This study investigated the potential of gum arabic to improve the stability of anthocyanins that are used in commercial beverages as natural colourants. The degradation of purple carrot anthocyanin in model beverage systems (pH 3.0) containing L-ascorbic acid proceeded with a first-order reaction rate during storage (40 °C for 5 days in light). The addition of gum arabic (0.05-5.0%) significantly enhanced the colour stability of anthocyanin, with the most stable systems observed at intermediate levels (1.5%). A further increase in concentration (>1.5%) reduced its efficacy due to a change in the conformation of the gum arabic molecules that hindered their exposure to the anthocyanins. Fluorescence quenching measurements showed that the anthocyanin could have interacted with the glycoprotein fractions of the gum arabic through hydrogen bonding, resulting in enhanced stability. Overall, this study provides valuable information about enhancing the stability of anthocyanins in beverage systems using natural ingredients. Copyright © 2016 Elsevier Ltd. All rights reserved.
Restorative effect of oxygen annealing on device performance in HfIZO thin-film transistors
NASA Astrophysics Data System (ADS)
Ha, Tae-Jun
2015-03-01
Metal-oxide based thin-film transistors (oxide-TFTs) are very promising for use in next generation electronics such as transparent displays requiring high switching and driving performance. In this study, we demonstrate an optimized process to secure excellent device performance with a favorable shift of the threshold voltage toward 0V in amorphous hafnium-indium-zinc-oxide (a-HfIZO) TFTs by using post-treatment with oxygen annealing. This enhancement results from the improved interfacial characteristics between gate dielectric and semiconductor layers due to the reduction in the density of interfacial states related to oxygen vacancies afforded by oxygen annealing. The device statistics confirm the improvement in the device-to-device and run-to-run uniformity. We also report on the photo-induced stability in such oxide-TFTs against long-term UV irradiation, which is significant for transparent displays.
Summary of FY15 results of benchmark modeling activities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Arguello, J. Guadalupe
2015-08-01
Sandia is participating in the third phase of an is a contributing partner to a U.S.-German "Joint Project" entitled "Comparison of current constitutive models and simulation procedures on the basis of model calculations of the thermo-mechanical behavior and healing of rock salt." The first goal of the project is to check the ability of numerical modeling tools to correctly describe the relevant deformation phenomena in rock salt under various influences. Achieving this goal will lead to increased confidence in the results of numerical simulations related to the secure storage of radioactive wastes in rock salt, thereby enhancing the acceptance ofmore » the results. These results may ultimately be used to make various assertions regarding both the stability analysis of an underground repository in salt, during the operating phase, and the long-term integrity of the geological barrier against the release of harmful substances into the biosphere, in the post-operating phase.« less
NASA Astrophysics Data System (ADS)
Mignone, B. K.
2008-12-01
Threats to US and global energy security take several forms. First, the overwhelming dependence on oil in the transport sector leaves the US economy (and others) vulnerable to supply shocks and price volatility. Secondly, the global dependence on oil inflates prices and enhances the transfer of wealth to authoritarian regimes. Finally, the global reliance on fossil fuels more generally jeopardizes the stability of the climate system. These three threats - economic, strategic and environmental - can only be mitigated through a gradual substitution away from fossil fuels (both coal and oil) on a global scale. Such large-scale substitution could occur in response to potential resource constraints or in response to coordinated government policies in which these externalities are explicitly internalized. Here, I make use of a well-known integrated assessment model (MERGE) to examine both possibilities. When resource limits are considered alone, global fuel use tends to shift toward even more carbon-intensive resources, like oil shale or liquids derived from coal. On the other hand, when explicit carbon constraints are imposed, the fuel sector response is more complex. Generally, less stringent climate targets can be satisfied entirely through reductions in global coal consumption, while more stringent targets require simultaneous reductions in both coal and oil consumption. Taken together, these model results suggest that resource constraints alone will only exacerbate the climate problem, while a subset of policy-driven carbon constraints may yield tangible security benefits (in the form of reduced global oil consumption) in addition to the intended environmental outcome.
Ravindra, Vijay M; Wallace, Scott A; Vaidya, Rahul; Fox, W Christopher; Klugh, Arnett R; Puskas, David; Park, Min S
2016-02-01
The Role III, Multinational Medical Unit at Kandahar Air Field, Afghanistan, was established to provide combat casualty care in theater for International Security Assistance Forces, Afghanistan National Security Forces, and local nationals during Operation Enduring Freedom-Afghanistan. The authors describe their experience of treating unstable lumbar spine fractures with orthopedic extremity instrumentation sets from January 2007 to January 2008 and November 2010 to May 2011. During the study periods, 15 patients comprising Afghanistan National Security Forces and local nationals presented to the medical facility for treatment of unstable lumbar spine fractures. The patients underwent surgery for either anterior corpectomy and instrumented fusion (n = 5) or posterior instrumented fusion (n = 10). Because of periodic scarcity of spinal instrumentation sets, orthopedic extremity instrumentation sets were used (Synthes Large Fragment LCP Instrument and Implant Set) for spinal stabilization. Immediate postoperative standing and sitting plain radiographs demonstrated no evidence of fracture progression or immediate hardware failure. One patient was seen in follow-up at 4 weeks and demonstrated construct stability on follow-up radiographs. In the combat environment with sparse resources, unstable spine fractures may potentially be treated using instrumentation not specifically designed for spinal implantation. This is an off-label use, and the authors do not recommend the use of these techniques as standard treatment in most medical environments. Copyright © 2016 Elsevier Inc. All rights reserved.
2009-02-01
management, available at <http://www.iso.org/ iso /en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=39612&ICS1=35&ICS2=40 &ICS3=>. ISO /IEC 27001 . Information...Management of the Systems Engineering Process. [ ISO /IEC 27001 ] ISO /IEC 27001 :2005. Information technology -- Security techniques -- Information security...software life cycles [ ISO /IEC 15026]. Software assurance is a key element of national security and homeland security. It is critical because dramatic
Individualizing Japan: searching for its origin in first modernity.
Suzuki, Munenori; Ito, Midori; Ishida, Mitsunori; Nihei, Norihiro; Maruyama, Masao
2010-09-01
Since the mid-1990s Japanese society has entered a period of major change. The previous patterns of social order and social integration have collapsed, and it has become increasingly difficult to envision a stable life course for oneself. The 'secure' foundation has been weakening and anxiety has spread at an accelerated pace. Japan could enter the age of second modernity, or reflexive modernization. In Japan's first modernity, the mechanism responsible for risk management, an integrated society, and stabilized social order, was, first, private corporations that guaranteed long-term stability for employees and their families (company-centrism) and, second, land development rapidly implemented under the guidance of bureaucrats (developmentalism). From the 1990s, these systems were fundamentally destroyed by globalization and neoliberal policies. Private corporations limited the groups that could benefit from the seniority wage system, undermining in-house welfare benefits. The government abandoned its role of improving the industrial and economic conditions of surrounding areas through offering public works projects. After these risk-stabilizing mechanisms were gone, two problems became conspicuous - poverty among young workers in urban areas and the collapse of the local community in marginal areas. As the seniority wage system and lifetime employment were substitutes for the public social security system, public measures to deal with poverty remain inadequate. Now, the individualization of the family has advanced somewhat under compulsion as the rate of unmarried people and the divorce rate have climbed. The Japanese have a tendency to seek 'self-realization'; at the same time, they also want 'secure employment'. Thus, they are torn between individualization and the desire for security. What is now necessary is a more stable system that will ensure them adequate material and spiritual 'elbowroom' to allow them to make their own choices. © London School of Economics and Political Science 2010.
Double polymer sheathed carbon nanotube supercapacitors show enhanced cycling stability
NASA Astrophysics Data System (ADS)
Zhao, Wenqi; Wang, Shanshan; Wang, Chunhui; Wu, Shiting; Xu, Wenjing; Zou, Mingchu; Ouyang, An; Cao, Anyuan; Li, Yibin
2015-12-01
Pseudo-materials are effective in boosting the specific capacitance of supercapacitors, but during service their degradation may also be very strong, causing reduced cycling stability. Here, we show that a carbon nanotube sponge grafted by two conventional pseudo-polymer layers in sequence can serve as a porous supercapacitor electrode with significantly enhanced cycling stability compared with single polymer grafting. Creating conformal polymer coatings on the nanotube surface and the resulting double-sheath configuration are important structural factors leading to the enhanced performance. Combining different polymers as double sheaths as reported here might be a potential route to circumvent the dilemma of pseudo-materials, and to simultaneously improve the capacitance and stability for various energy storage devices.Pseudo-materials are effective in boosting the specific capacitance of supercapacitors, but during service their degradation may also be very strong, causing reduced cycling stability. Here, we show that a carbon nanotube sponge grafted by two conventional pseudo-polymer layers in sequence can serve as a porous supercapacitor electrode with significantly enhanced cycling stability compared with single polymer grafting. Creating conformal polymer coatings on the nanotube surface and the resulting double-sheath configuration are important structural factors leading to the enhanced performance. Combining different polymers as double sheaths as reported here might be a potential route to circumvent the dilemma of pseudo-materials, and to simultaneously improve the capacitance and stability for various energy storage devices. Electronic supplementary information (ESI) available. See DOI: 10.1039/c5nr05978j
Chung, Youngseok; Choi, Seokjin; Lee, Youngsook; Park, Namje; Won, Dongho
2016-10-07
More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness. To address this vulnerability, anonymous authentication is an essential security mechanism for preserving privacy and providing security. Over recent years, various anonymous authentication schemes have been proposed. Most of them reveal both strengths and weaknesses in terms of security and efficiency. Recently, Farash et al. proposed a lightweight anonymous authentication scheme in ubiquitous networks, which remedies the security faults of previous schemes. However, their scheme still suffers from certain weaknesses. In this paper, we prove that Farash et al.'s scheme fails to provide anonymity, authentication, or password replacement. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Considering the limited capability of sensor nodes, we utilize only low-cost functions, such as one-way hash functions and bit-wise exclusive-OR operations. The security and lightness of the proposed scheme mean that it can be applied to roaming service in localized domains of wireless sensor networks, to provide anonymous authentication of sensor nodes.
Chung, Youngseok; Choi, Seokjin; Lee, Youngsook; Park, Namje; Won, Dongho
2016-01-01
More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness. To address this vulnerability, anonymous authentication is an essential security mechanism for preserving privacy and providing security. Over recent years, various anonymous authentication schemes have been proposed. Most of them reveal both strengths and weaknesses in terms of security and efficiency. Recently, Farash et al. proposed a lightweight anonymous authentication scheme in ubiquitous networks, which remedies the security faults of previous schemes. However, their scheme still suffers from certain weaknesses. In this paper, we prove that Farash et al.’s scheme fails to provide anonymity, authentication, or password replacement. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Considering the limited capability of sensor nodes, we utilize only low-cost functions, such as one-way hash functions and bit-wise exclusive-OR operations. The security and lightness of the proposed scheme mean that it can be applied to roaming service in localized domains of wireless sensor networks, to provide anonymous authentication of sensor nodes. PMID:27739417
General Aviation Security Enhancement Act of 2009
Rep. Dent, Charles W. [R-PA-15
2009-06-26
House - 07/13/2009 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Role of the U.S. Military in the Professionalization of the Armed Forces of Liberia
2015-06-12
professionalizing the AFL. The GEF states, “Partner nations provide for their own security, contribute effectively to broader regional or global security...facilitates the development of important professional and personal relationships that effectively strengthen military alliances and the international...Forces of Liberia (AFL) presents a developing opportunity to contribute to the broader U.S. interests. However, in order to ensure stability within
[The Explore of the Security Strategy Model in Hospital Mobile Clinic New Mode].
Li, Ke; Xia, Yong; Wang, Wei
2016-03-01
The paper elaborates and analyzes the current status of mobile hospital information security, then puts forward a security new model of the mobile treatment, then its architecture and solutions is elaborated. The use of this model makes the overall security level of hospital information to be further improved and enhanced, it has a positive signifi cance to promote the overal hospital management level.
Modeling Security Bridge Certificate Authority Architecture
NASA Astrophysics Data System (ADS)
Ren, Yizhi; Li, Mingchu; Sakurai, Kouichi
Current Public Key Infrastructures suffer from a scaling problem, and some may have security problems, even given the topological simplification of bridge certification authorities. This paper analyzes the security problems in Bridge Certificate Authorities (BCA) model by using the concept of “impersonation risk, ” and proposes a new modified BCA model, which enhances its security, but is a bit more complex incertification path building and implementation than the existing one.
Das, Ashok Kumar; Goswami, Adrijit
2014-06-01
Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme.
Video Encryption and Decryption on Quantum Computers
NASA Astrophysics Data System (ADS)
Yan, Fei; Iliyasu, Abdullah M.; Venegas-Andraca, Salvador E.; Yang, Huamin
2015-08-01
A method for video encryption and decryption on quantum computers is proposed based on color information transformations on each frame encoding the content of the encoding the content of the video. The proposed method provides a flexible operation to encrypt quantum video by means of the quantum measurement in order to enhance the security of the video. To validate the proposed approach, a tetris tile-matching puzzle game video is utilized in the experimental simulations. The results obtained suggest that the proposed method enhances the security and speed of quantum video encryption and decryption, both properties required for secure transmission and sharing of video content in quantum communication.
Global Climate Change, Food Security and the U.S. Food System
NASA Technical Reports Server (NTRS)
Brown, Molly Elizabeth; Walsh, Margaret; Hauser, Rachel; Murray, Anthony; Jadin, Jenna; Baklund, Peter; Robinson, Paula
2013-01-01
Climate change influences on the major pillars of food security. Each of the four elements of food security (availability,access,utilization,andstability) is vulnerable to changes in climate. For example,reductions in production related to regional drought influence food availability at multiple scales. Changes in price influences the ability of certain populations to purchase food (access). Utilization maybe affected when production zones shift, reducing the availability of preferred or culturally appropriate types of food within a region. Stability of the food supply may be highly uncertain given an increased incidence of extreme climatic events and their influence on production patterns.
Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho
2014-01-01
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847
Enhanced Patient Expectant and Antiemetic Drug Efficacy
1999-07-01
Breast Cancer Nausea and Vomiting Expectancy Patient Information Antiemetic Side Effect 15. NUMBER OF PAGES 15 16. PRICE CODE 17. SECURITY ...CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF THIS PAGE Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT...5-HT3 receptor antagonist class of antiemetics (ondansetron, granisetron , tropisitron) have greatly reduced chemotherapy-related vomiting, this has
National Security Education Act of 1991: Summary and Analysis. CRS Report for Congress.
ERIC Educational Resources Information Center
Riddle, Wayne Clifton
This report analyzes and summarizes the National Security Education Act of 1991 (NSEA) which authorizes a new program of aid for foreign language and area studies. The report discusses the legislation's aim to increase future national security through enhanced foreign language abilities and knowledge of other countries, the NSEA's authorized…
Enhancing National Security in Jamaica Through the Development and Employment of Special Forces
2005-06-01
face Jamaica. This study examines the value, utility, and possible roles of such a unit in the Jamaican security landscape, and makes recommendations...and possible roles of such a unit in the Jamaican security landscape, and makes recommendations for the establishment and employment of such a unit...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-25
... identified by an interagency working group that is reviewing export control issues related to homeland security. The interagency working group is made up of representatives from the Departments of Commerce, Defense, Homeland Security and State. The purpose of the interagency working group is to ensure that...
Enhanced Physical Stability of Amorphous Drug Formulations via Dry Polymer Coating.
Capece, Maxx; Davé, Rajesh
2015-06-01
Although amorphous solid drug formulations may be advantageous for enhancing the bioavailability of poorly soluble active pharmaceutical ingredients, they exhibit poor physical stability and undergo recrystallization. To address this limitation, this study investigates stability issues associated with amorphous solids through analysis of the crystallization behavior for acetaminophen (APAP), known as a fast crystallizer, using a modified form of the Avrami equation that kinetically models both surface and bulk crystallization. It is found that surface-enhanced crystallization, occurring faster at the free surface than in the bulk, is the major impediment to the stability of amorphous APAP. It is hypothesized that a novel use of a dry-polymer-coating process referred to as mechanical-dry-polymer-coating may be used to inhibit surface crystallization and enhance stability. The proposed process, which is examined, simultaneously mills and coats amorphous solids with polymer, while avoiding solvents or solutions, which may otherwise cause stability or crystallization issues during coating. It is shown that solid dispersions of APAP (64% loading) with a small particle size (28 μm) could be prepared and coated with the polymer, carnauba wax, in a vibratory ball mill. The resulting amorphous solid was found to have excellent stability as a result of inhibition of surface crystallization. © 2015 Wiley Periodicals, Inc. and the American Pharmacists Association.
Fisher, Ronald E; Norman, Michael
2010-07-01
The US Department of Homeland Security (DHS) is developing indices to better assist in the risk management of critical infrastructures. The first of these indices is the Protective Measures Index - a quantitative index that measures overall protection across component categories: physical security, security management, security force, information sharing, protective measures and dependencies. The Protective Measures Index, which can also be recalculated as the Vulnerability Index, is a way to compare differing protective measures (eg fence versus security training). The second of these indices is the Resilience Index, which assesses a site's resilience and consists of three primary components: robustness, resourcefulness and recovery. The third index is the Criticality Index, which assesses the importance of a facility. The Criticality Index includes economic, human, governance and mass evacuation impacts. The Protective Measures Index, Resilience Index and Criticality Index are being developed as part of the Enhanced Critical Infrastructure Protection initiative that DHS protective security advisers implement across the nation at critical facilities. This paper describes two core themes: determination of the vulnerability, resilience and criticality of a facility and comparison of the indices at different facilities.
Shrestha, Nensi; Shrestha, Hridaya; Ryu, Taeyong; Kim, Hangun; Simkhada, Shishli; Cho, Young-Chang; Park, So-Yeon; Cho, Sayeon; Lee, Kwang-Youl; Lee, Jae-Hyuk; Kim, Kwonseop
2018-04-30
δ-Catenin, a member of the p120-catenin subfamily of armadillo proteins, reportedly increases during the late stage of prostate cancer. Our previous study demonstrates that δ-catenin increases the stability of EGFR in prostate cancer cell lines. However, the molecular mechanism behind δ-catenin-mediated enhanced stability of EGFR was not explored. In this study, we hypothesized that δ-catenin enhances the protein stability of EGFR by inhibiting its lysosomal degradation that is mediated by c-casitas b-lineage lymphoma (c-Cbl), a RING domain E3 ligase. c-Cbl monoubiquitinates EGFR and thus facilitates its internalization, followed by lysosomal degradation. We observed that δ-catenin plays a key role in EGFR stability and downstream signaling. δ-Catenin competes with c-Cbl for EGFR binding, which results in a reduction of binding between c-Cbl and EGFR and thus decreases the ubiquitination of EGFR. This in turn increases the expression of membrane bound EGFR and enhances EGFR/Erk1/2 signaling. Our findings add a new perspective on the role of δ-catenin in enhancing EGFR/Erk1/2 signaling-mediated prostate cancer.
You, Ilsun; Kwon, Soonhyun; Choudhary, Gaurav; Sharma, Vishal; Seo, Jung Taek
2018-06-08
The Internet of Things (IoT) utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN), but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN), which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security) is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO) and the Security-Enhanced Option (SEO). The protocol is validated through Burrows⁻Abadi⁻Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two handshake options, Pre-Shared Key (PSK) and Elliptic Curve Cryptography (ECC), of Datagram Transport Layer Security (DTLS).
Code of Federal Regulations, 2010 CFR
2010-01-01
... which would: (i) Be likely to (A) lead to significant speculation in currencies, securities, or commodities, or (B) significantly endanger the stability of any financial institution; or (ii) Be likely to...
How CBO Estimates Automatic Stabilizers
2015-11-01
the economy. Most types of revenues—mainly personal, corporate, and social insurance taxes —are sensitive to the business cycle and account for most of...Medicare taxes for self-employed people, taxes on production and imports, and unemployment insurance taxes . Those six categories account for the bulk of...federal tax revenues.6 Individual taxes account for most of the automatic stabilizers from revenues, followed by Social Security plus Medicare
Global Stability and Dynamics of Strongly Nonlinear Systems Using Koopman Operator Theory
2017-03-01
calculus, applied mathematics, Director’s Research Initiative 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18... research of Svenkeson et al.4 Section 2 is Accomplishments and Section 3 is the Conclusion. 2. Accomplishments 2.1 Prescribed External Forcing To study ...ARL-TR-7959 MAR 2017 US Army Research Laboratory Global Stability and Dynamics of Strongly Nonlinear Systems Using Koopman
2017-04-06
commander in bringing stability to the region. This research paper will also evaluate the current capability of the AFMS International Health...education, exercises, materiel, leader, personnel, and facilities (DOTMLPF) analysis. This research paper is organized to describe the 1) concept...foreign security partners, and selected international organizations by supporting: 1) combined policies, plans, and procedures, including
The anchoring function: parental authority and the parent-child bond.
Omer, Haim; Steinmetz, Sarit G; Carthy, Tal; von Schlippe, Arist
2013-06-01
Descriptions of parental authority and of the formation of a secure parent-child bond have remained unconnected in conceptualizations about parenting and child development. The parental anchoring function is here presented as an integrative metaphor for the two fields. Parents who fulfill an anchoring function offer a secure relational frame for the child, while also manifesting a stabilizing and legitimate kind of authority. The anchoring function enriches the two fields by: (1) adding a dimension of authority to the acknowledged functions of the safe haven and the secure base that are seen as core to a secure parent-child bond, and (2) adding considerations about the parent-child bond to Baumrind's classical description of authoritative parenting. © FPI, Inc.
Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks.
Feng, Zhi; Wen, Guanghui; Hu, Guoqiang
2017-05-01
This paper studies a distributed secure consensus tracking control problem for multiagent systems subject to strategic cyber attacks modeled by a random Markov process. A hybrid stochastic secure control framework is established for designing a distributed secure control law such that mean-square exponential consensus tracking is achieved. A connectivity restoration mechanism is considered and the properties on attack frequency and attack length rate are investigated, respectively. Based on the solutions of an algebraic Riccati equation and an algebraic Riccati inequality, a procedure to select the control gains is provided and stability analysis is studied by using Lyapunov's method.. The effect of strategic attacks on discrete-time systems is also investigated. Finally, numerical examples are provided to illustrate the effectiveness of theoretical analysis.
Surface-enhanced Raman spectroscopy and homeland security: a perfect match?
Golightly, Rebecca S; Doering, William E; Natan, Michael J
2009-10-27
This Nano Focus article reviews recent developments in surface-enhanced Raman spectroscopy (SERS) and its application to homeland security. It is based on invited talks given at the "Nanorods and Microparticles for Homeland Security" symposium, which was organized by one of the authors and presented at the 238th ACS National Meeting and Exhibition in Washington, DC. The three-day symposium included approximately 25 experts from academia, industry, and national laboratories and included both SERS and non-SERS approaches to detection of chemical and biological substances relevant to homeland security, as well as fundamental advances. Here, we focus on SERS and how it is uniquely positioned to have an impact in a field whose importance is increasing rapidly. We describe some technical challenges that remain and offer a glimpse of what form solutions might take.
2004-08-05
KENNEDY SPACE CENTER, FLA. - At the ribbon cutting for the Enhanced Firing Range on Schwartz Rd. at Kennedy Space Center, Dave Saleeba practices firing on the new range. Saleeba is assistant administrator with the Office of Security Management and Safeguards at NASA Headquarters and was a guest speaker at the ceremony. NASA’s Federal Law Enforcement Training Academy’s firing range has been upgraded to include a “rifle-grade” shoot house, a portable, tactical “shoot-back” trailer for cover and concealment drills, automated running targets and a new classroom facility. They are added to the existing three firearms ranges, “pistol-grade” shoot house, obstacle course and rappel tower. NASA’s Security Management and Safeguards Office funded the enhancements in order to improve ability to train the KSC security force and to support local, state and federal law enforcement agencies in Homeland Security.
Association of Southeast Asian Nations (ASEAN) can serve as a mechanism to strengthen U.S. partnerships in the region while sustaining stability and maintaining the economic growth of the region.... economically in the last few decades. The U.S. has developed key partnerships and alliances in the region and has an obligation to assist its partners in...ensuring that any threats to the social and environmental stability are managed in accordance with the rules of law. The U.S. relies on the region for
The research of computer network security and protection strategy
NASA Astrophysics Data System (ADS)
He, Jian
2017-05-01
With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.
Rational Design of Biobetters with Enhanced Stability.
Courtois, Fabienne; Schneider, Curtiss P; Agrawal, Neeraj J; Trout, Bernhardt L
2015-08-01
Biotherapeutics are the fastest growing class of pharmaceutical with a rapidly evolving market facing the rise of biosimilar and biobetter products. In contrast to a biosimilar, which is derived from the same gene sequence as the innovator product, a biobetter has enhanced properties, such as enhanced efficacy or reduced immunogenicity. Little work has been carried out so far to increase the intrinsic stability of biotherapeutics via sequence changes, even though, aggregation, the primary degradation pathway of proteins, leads to issues ranging from manufacturing failure to immunological response and to loss of therapeutic activity. Using our spatial aggregation propensity tool as a first step to a rational design approach to identify aggregation-prone regions, biobetters of rituximab have been produced with enhanced stability by introducing site-specific mutations. Significant stabilization against aggregation was achieved for rituximab with no decrease in its binding affinity to the antigen. © 2015 Wiley Periodicals, Inc. and the American Pharmacists Association.
Magnetoconvection and universality of heat transport enhancement
NASA Astrophysics Data System (ADS)
Lim, Zi Li; Chong, Kai Leong; Xia, Ke-Qing
2017-11-01
We numerically investigate how a vertical external magnetic field affects the convective flow in a Rayleigh-Benard turbulent convection. We observed an enhancement of heat transport under certain range of the Hartmann number Ha that characterizes the strength of the stabilizing Lorentz force. Heat transport enhancement caused by a stabilizing force is also observed in several other systems. We find that the heat transport behaviour in the present system may also be understood in terms of an interplay between the stabilizing and destabilizing forces of the system and the observed optimum heat transport enhancement can be explained by an optimal coupling between thermal boundary layer and the momentum boundary layer. Therefore, the observed behaviour in magnetoconvection appears to belong to the same universality class of stabilizing-destabilizing (SD) flows reported recently. This work was supported by the Research Grants Council (RGC) of HKSAR (No. CUHK14301115) and a NSFC/RGC Joint Research Project (Ref. N_CUHK437/15).
Microcomputer Polling Improvements for AFSATCOM.
1981-06-01
AGENCY NAME A AODRESS(il differ~,.ru C~ntrolling Office) IS. SECURITY CLASS. (of this report) 2/’ .iUNCLASSI FIED 1/ 5a. DECLASSIFICATION DOWNGRADING...enhance (over) DD I1JAN 73 1473, UNCLASSIFIED - ~~~ SECURITY CLASSIFICATION OF THIS PAGE (When Dots Enterd’I.. SECURITY CLASSIaICATION OF THIS PAGE(ahnm...Data Entered) 20. ABSTRACT (Continued) /7 hetting capabilities for the satellite-user community /V 4. UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE
Security Analysis of Yeh-Tsai Security Mechanism
NASA Astrophysics Data System (ADS)
Yum, Dae Hyun; Shin, Jong Hoon; Lee, Pil Joong
Yeh and Tsai recently proposed an enhanced mobile commerce security mechanism. They modified the lightweight security mechanism due to Lam, Chung, Gu, and Sun to relieve the burden of mobile clients. However, this article shows that a malicious WAP gateway can successfully obtain the mobile client's PIN by sending a fake public key of a mobile commerce server and exploiting information leakage caused by addition operation. We also present a countermeasure against the proposed attack.
TCIA Secure Cyber Critical Infrastructure Modernization.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keliiaa, Curtis M.
The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.
2016-09-01
League (EPL), football, mass gatherings, National Football League (NFL), safety manuals, soccer , sports security, soccer , terrorism, terrorist...fulfillment of the requirements for the degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from the NAVAL...kurtbadenhausen/2015/07/15/the-worlds-50-most-valuable-sports- teams-2015/. 3 professional league, the English Premier soccer league, earns $2.7 billion.6 In
Field trial of the enhanced data authentication system (EDAS)
Thomas, Maikael A.; Hymel, Ross W.; Baldwin, George; ...
2016-11-01
The Enhanced Data Authentication System (EDAS) is means to securely branch information from an existing measurement system or data stream to a secondary observer. In an international nuclear safeguards context, the EDAS connects to operator instrumentation, and provides a cryptographically secure copy of the information for a safeguards inspectorate. However, this novel capability could be a valuable complement to inspector-owned safeguards instrumentation, offering context that is valuable for anomaly resolution and contingency.
How Space - The Fourth Operational Medium - Supports Operational Maneuver.
1987-05-17
51981 87-3044 87 9 18 014 UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE Form Approved REPORT DOCUMENTATION PAGE OMB No. 0704-0188 la. REPORT...P. J anecek (14213 AT L_ aCd) ZL-wI DO Form 1473, JUN 86 Previous editions are obsolete. SECURITY CLASSIFICATION OF THIS PAGE UNCLASSIFIED . ~18...Space technology, superior and enhanced weapons, and space systems combine to form spacepower that can be exploited to enhance ground force mission
Enhanced MHT encryption scheme for chosen plaintext attack
NASA Astrophysics Data System (ADS)
Xie, Dahua; Kuo, C. C. J.
2003-11-01
Efficient multimedia encryption algorithms play a key role in multimedia security protection. One multimedia encryption algorithm known as the MHT (Multiple Huffman Tables) method was recently developed by Wu and Kuo. Even though MHT has many desirable properties, it is vulnerable to the chosen-plaintext attack (CPA). An enhanced MHT algorithm is proposed in this work to overcome this drawback. It is proved mathematically that the proposed algorithm is secure against the chosen plaintext attack.
2010-01-01
Law and legal institutions G31. U.S. SOF training of foreign military/security forces “to enhance their capacity” in counterterrorism, COIN, and...engagement advice to SOF. G31. U.S. SOF training of foreign military/security forces “to enhance their capacity” in counterterrorism, COIN, and FID is a...AND SUBTITLE USSOCOM Research Topics 2011 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e
SEAODV: A Security Enhanced AODV Routing Protocol for Wireless Mesh Networks
NASA Astrophysics Data System (ADS)
Li, Celia; Wang, Zhuang; Yang, Cungang
In this paper, we propose a Security Enhanced AODV routing protocol (SEAODV) for wireless mesh networks (WMN). SEAODV employs Blom's key pre-distribution scheme to compute the pairwise transient key (PTK) through the flooding of enhanced HELLO message and subsequently uses the established PTK to distribute the group transient key (GTK). PTK and GTK authenticate unicast and broadcast routing messages respectively. In WMN, a unique PTK is shared by each pair of nodes, while GTK is shared secretly between the node and all its one-hop neighbours. A message authentication code (MAC) is attached as the extension to the original AODV routing message to guarantee the message's authenticity and integrity in a hop-by-hop fashion. Security analysis and performance evaluation show that SEAODV is more effective in preventing identified routing attacks and outperforms ARAN and SAODV in terms of computation cost and route acquisition latency.
Recent advances in enhanced luminescence upconversion of lanthanide-doped NaYF4 phosphors
NASA Astrophysics Data System (ADS)
Kumar, Deepak; Verma, Kartikey; Verma, Shefali; Chaudhary, Babulal; Som, Sudipta; Sharma, Vishal; Kumar, Vijay; Swart, Hendrik C.
2018-04-01
NaYF4 is regarded as the best upconversion (UC) matrix owing to its low phonon energy, more chemical stability, and a superior refractive index. This review reports on the various synthesis techniques of lanthanide-doped NaYF4 phosphors for UC application. The UC intensity depends on different properties of the matrix and those are discussed in detail. Plasmon-enhanced luminescence UC of the lanthanide-doped NaYF4 core-shells structure is discussed based on a literature survey. The present review provides the information about how the UC intensity can be enhanced. The idea about the UC is then deliberately used for versatile applications such as luminescent materials, display devices, biomedical imaging and different security appliances. In addition, the present review demonstrates the recent trends of NaYF4 UC materials in solar cell devices. The role of NaYF4 phosphor to eradicate the spectral variance among the incident solar spectrum, semiconductor as well as the sub-band gap nature of the semiconductor materials is also discussed in detail. Considering the fact that the research status on NaYF4 phosphor for photovoltaic application is now growing, the present review is therefore very important to the researchers. More importantly, this may promote more interesting research platforms to investigate the realistic use of UC nanophosphors as spectral converters for solar cells.
Enhanced Patient Expectation and Antiemetic Drug Efficacy
1999-07-01
NUMBER OF PAGES 15 Breast Cancer Expectancy Antiemetic Nausea and Vomiting Patient Information Side Effect 16. PRICE CODE 17. SECURITY CLASSIFICATION 18... SECURITY CLASSIFICATION OF THIS 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT PAGE OF ABSTRACT Unclassified Unclassified...by the introduction of the 5-HT 3 receptor antagonist class of antiemetics (ondansetron, granisetron , tropisitron) have greatly reduced chemotherapy
Reducing the Risk of Dangerous Chemicals Getting into the Wrong Hands
ERIC Educational Resources Information Center
Matthews, Nancy
2008-01-01
Under the Department of Homeland Security (DHS) Appropriations Act of 2007, DHS has the authority and funding to regulate security at facilities storing chemicals considered to be high-risk (P. L. 109-295, Section 550). This article discusses the Department's efforts to enhance the security of facilities that store chemicals that could be stolen…
Issues of Human Security and Educational Development in the Niger Delta Region of Nigeria
ERIC Educational Resources Information Center
Ololube, Nwachukwu Prince; Kpolovie, Peter James; Amaele, Samuel
2013-01-01
Drawing from documents, observation, interview and questionnaire, we highlighted the role of issues of human security and its impact on the educational development of the Niger Delta region as well as means of enhancing human security in Nigeria. This article is a conceptual and methodological breakthrough in Nigeria's academic landscape where…
Stabilization of a protein conferred by an increase in folded state entropy.
Dagan, Shlomi; Hagai, Tzachi; Gavrilov, Yulian; Kapon, Ruti; Levy, Yaakov; Reich, Ziv
2013-06-25
Entropic stabilization of native protein structures typically relies on strategies that serve to decrease the entropy of the unfolded state. Here we report, using a combination of experimental and computational approaches, on enhanced thermodynamic stability conferred by an increase in the configurational entropy of the folded state. The enhanced stability is observed upon modifications of a loop region in the enzyme acylphosphatase and is achieved despite significant enthalpy losses. The modifications that lead to increased stability, as well as those that result in destabilization, however, strongly compromise enzymatic activity, rationalizing the preservation of the native loop structure even though it does not provide the protein with maximal stability or kinetic foldability.
Stability in Russia’s Chechnya and Other Regions of the North Caucasus: Recent Developments
2009-04-03
economic downturn and Russia’s boosted financial commitments to Abkhazia and South Ossetia could result in fewer Russian subsidies to the North...security forces. In late March 2009, Dagestani political analyst Khadzhimurat Kamalov discounted any effect on Dagestan’s security if some or all...suffered greatly during the Chechnya conflict, mainly from the influx of displaced persons which in effect doubled the population during intense
2012-04-01
and Section 1230 of the National Defense Authorization Act for Fiscal...has personally taken ownership of anti-corruption reforms within the Ministry of Defense and is fighting to make the MoD an example for the rest of...progress, the ANA is expected to lack combat enablers and logistics support for the foreseeable future . AFGHAN AIR FORCE The Afghan Air Force’s
Terrorism in Southeast Asia: A Growing Challenge to Regional Peace, Security and U.S. Interests
2004-03-19
political stability economic growth and security. The collective will of the ASEAN community has been ineffective in addressing the root causes of regional and transnational terrorism. This paper will address U.S. interests and objectives in the region; how these objectives can be met; and what instruments of power should be used without intervening in the domestic affairs of these countries that might result in regional opportunities for
2006-05-16
and Internally Displaced Persons (IDPs) Judicial Personnel and Infrastructure Trafficking in Persons Property Food Security Legal System Reform...Shelter and Non- Food Relief Human Rights Humanitarian Demining Corrections Public Health War Crime Courts and Tribunals Education Truth...Risk Analysis, 22(2) (2002): 385. 26 Ibid. 27 Ibid. 28 Dombroski, 20. 29 Keith R. Hayes, “Final Report: Inductive Hazard Analysis for GMOs
Harnessing Post-Conflict Transitions: A Conceptual Primer
2010-09-01
aid community uses transition as a key indi- cator of success for development and aid programs (Cliffe et al., 2003; Crane et al., 2009; Crichton ...3, pp. 345-365. Barnett, M ., (2006), “Building a republican peace: Stabilizing states after war,” International Security, Vol. 30, No. 4, pp. 87-112...Security, Vol. 29, No. 4, pp. 157-195. Berdal, M . R., (2009), Building Peace After War, Abingdon, UK; New York; London, UK: Routledge: International
Measuring Stability and Security in Iraq
2009-03-01
faces a budget deficit of $20 billion in 2009 based on a price of $50 per barrel and an export rate of 2.0 million barrels per day. Current oil prices...security details with handguns and assist them in obtaining MoI weapons cards. In addition to protection officers, the Coalition assists with...production throughout 2009. Overall, crude oil production peaked at 2.54 million barrels per day (mbpd) in July 2008 and leveled off at approximately
Measuring Stability and Security in Iraq
2009-06-01
preventing judges from receiving registered firearms. The U.S. Marshal Service continues to provide handguns to judges and their security details and...in the South, a trend expected to continue throughout 2010. Overall, crude oil production peaked at 2.54 million barrels per day (mbpd) in...the best way to utilize MoI human and material resources. The result of this commission was the MoI 2009 training plan, which addresses the issue of
Employing U.S. Army Special Forces to Defeat America’s Emerging Threats
2013-04-01
GPF operation which is primarily focused on improving allied and host nation security force capacity.36 In 2004, the El Salvadorian Ambassador to...forces to Haiti to conduct Stability Operations following their devastating earthquakes . Operation Unified Quest, led by LTG Ken Keen included personnel...U.S. Border Patrol (point of entry and border security operations), 95th Civil Affairs Brigade (Civil Affairs related activities), El Paso and Austin
Domestic Determinants and Security Policy-Making in East Asia
2000-11-01
the U.S.-Japan alliance cannot be overstated as a foundation stone of Asia’s stability, the bilateral relationship has been sub- jected to heavy stress...financial crisis, are addressed by only a single department or ministry. ■ American neglect and Japanese obsession — With the purpose of the alliance ...requirement for a new rationale, fears weakening of American resolve to remain committed. Security independence by Japan and U.S. abandonment of the alliance
Proliferation: Threat and Response
1997-11-01
primary agent, the Defense Technology capabilities also contribute to ongoing efforts to Security Administration ( DTSA ). These efforts are focus and...Special Weapons Agency Organization DTSA Defense Technology Security BW Biological Weapons Administration BWC Biological and Toxin Weapons EPCI Enhanced
76 FR 17143 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-28
... Data System 5. Enhancing Air Cargo Security 6. National Strategy Global Supply Chain Security and the...: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Advisory Committee on...
Domestic Fuel for Enhancing National Security Act of 2011
Sen. Murray, Patty [D-WA
2011-05-25
Senate - 05/25/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Security and Fairness Enhancement for America Act of 2009
Rep. Goodlatte, Bob [R-VA-6
2009-05-07
House - 06/12/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Anion-conducting polymer, composition, and membrane
Pivovar, Bryan S [Los Alamos, NM; Thorn, David L [Los Alamos, NM
2011-11-22
Anion-conducing polymers and membranes with enhanced stability to aqueous alkali include a polymer backbone with attached sulfonium, phosphazenium, phosphazene, and guanidinium residues. Compositions also with enhanced stability to aqueous alkali include a support embedded with sulfonium, phosphazenium, and guanidinium salts.
Anion-conducting polymer, composition, and membrane
Pivovar, Bryan S [Los Alamos, NM; Thorn, David L [Los Alamos, NM
2009-09-01
Anion-conducing polymers and membranes with enhanced stability to aqueous alkali include a polymer backbone with attached sulfonium, phosphazenium, phosphazene, and guanidinium residues. Compositions also with enhanced stability to aqueous alkali include a support embedded with sulfonium, phosphazenium, and guanidinium salts.
Anion-conducting polymer, composition, and membrane
Pivovar, Bryan S.; Thorn, David L.
2010-12-07
Anion-conducing polymers and membranes with enhanced stability to aqueous alkali include a polymer backbone with attached sulfonium, phosphazenium, phosphazene, and guanidinium residues. Compositions also with enhanced stability to aqueous alkali include a support embedded with sulfonium, phosphazenium, and guanidinium salts.
Anion-Conducting Polymer, Composition, and Membrane
Pivovar, Bryan S.; Thorn, David L.
2008-10-21
Anion-conducing polymers and membranes with enhanced stability to aqueous alkali include a polymer backbone with attached sulfonium, phosphazenium, phosphazene, and guanidinium residues. Compositions also with enhanced stability to aqueous alkali include a support embedded with sulfonium, phosphazenium, and guanidinium salts.
A framework to enhance security of physically unclonable functions using chaotic circuits
NASA Astrophysics Data System (ADS)
Chen, Lanxiang
2018-05-01
As a new technique for authentication and key generation, physically unclonable function (PUF) has attracted considerable attentions, with extensive research results achieved already. To resist the popular machine learning modeling attacks, a framework to enhance the security of PUFs is proposed. The basic idea is to combine PUFs with a chaotic system of which the response is highly sensitive to initial conditions. For this framework, a specific construction which combines the common arbiter PUF circuit, a converter, and the Chua's circuit is given to implement a more secure PUF. Simulation experiments are presented to further validate the framework. Finally, some practical suggestions for the framework and specific construction are also discussed.
2004-08-05
KENNEDY SPACE CENTER, FLA. - After the ribbon cutting for the Enhanced Firing Range on Schwartz Rd. at Kennedy Space Center, guests get a close look at the new “rifle-grade” shoot house. NASA’s Federal Law Enforcement Training Academy’s firing range upgrades also include a portable, tactical “shoot-back” trailer for cover and concealment drills, automated running targets and a new classroom. They are added to the existing three firearms ranges, “pistol-grade” shoot house, obstacle course and rappel tower. NASA’s Security Management and Safeguards Office funded the enhancements in order to improve ability to train the KSC security force and to support local, state and federal law enforcement agencies in Homeland Security.
2004-08-05
KENNEDY SPACE CENTER, FLA. - At the ribbon cutting for the Enhanced Firing Range on Schwartz Rd. at Kennedy Space Center, a SWAT team demonstrates use of the facility. NASA’s Federal Law Enforcement Training Academy’s firing range has been upgraded to include a “rifle-grade” shoot house, a portable, tactical “shoot-back” trailer for cover and concealment drills, automated running targets and a new classroom. They are added to the existing three firearms ranges, “pistol-grade” shoot house, obstacle course and rappel tower. NASA’s Security Management and Safeguards Office funded the enhancements in order to improve ability to train the KSC security force and to support local, state and federal law enforcement agencies in Homeland Security.
2004-08-05
KENNEDY SPACE CENTER, FLA. - Center Director Jim Kennedy addresses guests at the ribbon cutting for the Enhanced Firing Range on Schwartz Rd. at Kennedy Space Center. NASA’s Federal Law Enforcement Training Academy’s firing range has been upgraded to include a “rifle-grade” shoot house, a portable, tactical “shoot-back” trailer for cover and concealment drills, automated running targets and a new classroom facility. They are added to the existing three firearms ranges, “pistol-grade” shoot house, obstacle course and rappel tower. NASA’s Security Management and Safeguards Office funded the enhancements in order to improve ability to train the KSC security force and to support local, state and federal law enforcement agencies in Homeland Security.
Liu, Bo; Zhang, Lijia; Xin, Xiangjun
2018-03-19
This paper proposes and demonstrates an enhanced secure 4-D modulation optical generalized filter bank multi-carrier (GFBMC) system based on joint constellation and Stokes vector scrambling. The constellation and Stokes vectors are scrambled by using different scrambling parameters. A multi-scroll Chua's circuit map is adopted as the chaotic model. Large secure key space can be obtained due to the multi-scroll attractors and independent operability of subcarriers. A 40.32Gb/s encrypted optical GFBMC signal with 128 parallel subcarriers is successfully demonstrated in the experiment. The results show good resistance against the illegal receiver and indicate a potential way for the future optical multi-carrier system.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liu, Bin; Xu, Wu; Yan, Pengfei
The conventional DMSO-based electrolyte (1 M lithium bis(trifluoromethanesulfonyl)imide (LiTFSI) in DMSO) is unstable against the Li metal anode and therefore cannot be used directly in practical Li-O2 batteries. Here, we demonstrate that a highly concentrated electrolyte based on LiTFSI in DMSO (with a molar ratio of 1:3) can greatly improve the stability of the Li metal anode against DMSO and significantly improve the cycling stability of Li-O2 batteries. This highly concentrated electrolyte contains no free DMSO solvent molecules, but only complexes of (TFSI–)a-Li+-(DMSO)b (where a + b = 4), and thus enhances their stability with Li metal anodes. In addition,more » such salt-solvent complexes have higher Gibbs activation energy barriers than the free DMSO solvent molecules, indicating improved stability of the electrolyte against the attack of superoxide radical anions. Therefore, the stability of this highly concentrated electrolyte at both Li metal anodes and carbon-based air electrodes has been greatly enhanced, resulting in improved cyclic stability of Li-O2 batteries. The fundamental stability of the electrolyte with free-solvent against the chemical and electrochemical reactions can also be used to enhance the stability of other electrochemical systems.« less
77 FR 37881 - 36(b)(1) Arms Sales Notification
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-25
... and humanitarian operations have made a significant impact on regional political and economic stability and have served U.S. national security interests. Norway intends to use these aircraft in support...
Private health insurance in South Korea: an international comparison.
Shin, Jaeun
2012-11-01
The goal of this study is to present the historical and policy background of the expansion of private health insurance in South Korea in the context of the National Health Insurance (NHI) system, and to provide empirical evidence on whether the increased role of private health insurance may counterbalance government financing, social security contributions, out-of-pocket payments, and help stabilize total health care spending. Using OECD Health Data 2011, we used a fixed effects model estimation. In this model, we allow error terms to be serially correlated over time in order to capture the association of private health insurance financing with three other components of health care financing and total health care spending. The descriptive observation of the South Korean health care financing shows that social security contributions are relatively limited in South Korea, implying that high out-of-pocket payments may be alleviated through the enhancement of NHI benefit coverage and an increase in social security contributions. Estimation results confirm that private health insurance financing is unlikely to reduce government spending on health care and social security contributions. We find evidence that out-of-pocket payments may be offset by private health insurance financing, but to a limited degree. Private health insurance financing is found to have a statistically significant positive association with total spending on health care. This indicates that the duplicated coverage effect on service demand may cancel out the potential efficiency gain from market initiatives driven by the active involvement of private health insurance. This study finds little evidence for the benefit of private insurance initiatives in coping with the fiscal challenges of the South Korean NHI program. Further studies on the managerial interplay among public and private insurers and on behavioral responses of providers and patients to a given structure of private-public financing are warranted to formulate the adequate balance between private health insurance and publicly funded universal coverage. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
Who Should Have the Hammer? Leadership of SSTR Planning and Operations
2009-10-23
Security Presidential Directive/NSPD-44 was produced which clarified governmental management of reconstruction and stabilization efforts. 1 Additionally...President, “ Management of Interagency Efforts Concerning Reconstruction and Stabilization, pp. 1 2 U.S. Department of Defense, DoDD 3000.05, pp.1 3 U.S...from regional and local State personnel, and conditional stand up of teams within the Interagency Management System. 16 Defense Department guidance
AMERICA’S BASE NETWORK: CREDIBLE DETERRENCE
2017-04-06
reduction occurring after World War I.13 Both eras saw decades of instability and warfare replace the economic stability provided by the US and its global...is still in effect today and is based on shared interests in security and stability . The alliance was formally established via an Economic and...Abstract This essay looks at historical US basing strategy in order to understand the geopolitical and economic complexity facing diplomacy of future
War Comes to Bala Morghab: A Tragedy of Policy and Action in Three Acts
2011-12-01
real shower in December—a full 5 months after operations had commenced. The North Atlantic Treaty Organization (NATO) side of the FOB improved...Security Assistance Force (ISAF), Stability Operations Integration Cell ( SOIC ), “Murghab District, Badghis District Narrative Assessment, 5 May 2010...available at <http://publicintelligence. net/ufouo-stability-operations-information-center- soic -murghab-district-assessment/>. 3 Ibid. 4 Most facts
Assessment of the stability of a multimachine power system by the transient energy margin
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stanton, S.E.
1982-01-01
This reasearch develops a tool for the direct assessment of the transient stability of a multimachine electric power system that is subject to a large disturbance. The tool is the Transient Energy Margin. The transient of interest is the first swing (or inertial) transient. The Transient Energy Margin is computed by evaluating an energy function using the relevant unstable equilibrium point and the system states at the instant the disturbance is removed. In evaluating the function, a significant portion of the fault kinetic energy is identified as not contributing to system instability. The resulting energy value is a measure ofmore » the margin-of-safety for the disturbed system. A distinction is proposed between assessing system stability and assessing system security. The Transient Energy Margin is used first to assess the stability of the system. This profile ranks various distrubances to display the strengths and weaknesses of the system. A modified Transient Energy Margin is then proposed as an assessment of security; the transient energy margin profile is repeated to evaluate the system response in terms of the local minimum energy conditions approached by the critical trajectories. Both techniques are applied to a practical, 17 generator test system.« less
Are Some Technologies Beyond Regulatory Regimes?
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jones, Wendell B.; Kusnezov, Dimitri
Regulatory frameworks are a common tool in governance to incent and coerce behaviors supporting national or strategic stability. This includes domestic regulations and international agreements. Though regulation is always a challenge, the domain of fast evolving threats, like cyber, are proving much more difficult to control. Many discussions are underway searching for approaches that can provide national security in these domains. We use game theoretic learning models to explore the question of strategic stability with respect to the democratization of certain technologies (such as cyber). We suggest that such many-player games could inherently be chaotic with no corresponding (Nash) equilibria.more » In the absence of such equilibria, traditional approaches, as measures to achieve levels of overall security, may not be suitable approaches to support strategic stability in these domains. Altogether new paradigms may be needed for these issues. At the very least, regulatory regimes that fail to address the basic nature of the technology domains should not be pursued as a default solution, regardless of success in other domains. In addition, the very chaotic nature of these domains may hold the promise of novel approaches to regulation.« less
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.
1986-05-30
and airport security measures in effect. Section V of this report provides a smry of firearms which were detected at screening points under suspicious...with the Secretary of State concerning threats, and (3) the inclusion of a sumnmary on foreign airport security in the Semiannual Report to Congress on...International Civil Aviation Organization (ICAO) to embark inediately upon an intensified program aimed at responding to the need for enhanced airport security . As
Security of Quantum Repeater Network Operation
2016-10-03
AFRL-AFOSR-JP-TR-2016-0079 Security of Quantum Repeater Network Operation Rodney Van Meter KEIO UNIVERSITY Final Report 10/03/2016 DISTRIBUTION A...To) 29 May 2014 to 28 May 2016 4. TITLE AND SUBTITLE Security of Quantum Repeater Network Operation 5a. CONTRACT NUMBER 5b. GRANT NUMBER FA2386...ABSTRACT Much of the work on quantum networks , both entangled and unentangled, has been about the uses of quantum networks to enhance end- host security
78 FR 17781 - Transportation Worker Identification Credential (TWIC)-Reader Requirements
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-22
...In this Notice of Proposed Rulemaking (NPRM), the Coast Guard proposes to require owners and operators of certain vessels and facilities regulated by the Coast Guard to use electronic readers designed to work with the Transportation Worker Identification Credential (TWIC) as an access control measure. This NPRM also proposes additional requirements associated with electronic TWIC readers, including recordkeeping requirements for those owners and operators required to use an electronic TWIC reader, and security plan amendments to incorporate TWIC requirements. The TWIC program, including the proposed TWIC reader requirements in this rule, is an important component of the Coast Guard's multi-layered system of access control requirements and other measures designed to enhance maritime security. This rulemaking action, once final, would build upon existing Coast Guard regulations designed to ensure that only individuals who hold a TWIC are granted unescorted access to secure areas at those locations. The Coast Guard has already promulgated regulations pursuant to the Maritime Transportation Security Act of 2002 (MTSA) that require mariners and other individuals to obtain a TWIC and present it for inspection by security personnel prior to gaining access to such secure areas. By requiring certain vessels and facilities to perform TWIC inspections using electronic TWIC readers, this rulemaking would further enhance security at those locations. This rulemaking would also implement the Security and Accountability For Every Port Act of 2006 electronic TWIC reader requirements.
Work security in a global economy.
Rosskam, Ellen
2003-01-01
Work security is a fundamental right of all working people. After World War II, the welfare state became an intrinsic part of the "Golden Age" of capitalism, in which universal prosperity seemed attainable. Workers' organizations frequently played a crucial role in policy decisions that promoted full employment, income stability, and equitable treatment of workers. Today's world order is quite different. Globalization in its present form is a major obstacle to work security. Globalization is not simply a market-driven phenomenon. It is a political and ideological movement that grants authority to capital over governments and labor. This transfer of authority hinders national efforts to promote work security and may impact the well-being of communities worldwide. In the absence of domestic autonomy, international labor standards are needed to protect social welfare. They should be geared toward curbing unemployment, poverty, and social exclusion in the global economy. The article looks at three initiatives to promote global work security.
Rapid stabilization of thawing soils For enhanced vehicle mobility: a field demonstration project
DOT National Transportation Integrated Search
1999-02-01
Thawing soil presents a formidable challenge for vehicle operations cross-country and on unsurfaced roads. To mitigate the problem, a variety of stabilization techniques were evaluated for their suitability for rapid employment to enhance military ve...
Levasseur-Moreau, Jean; Brunelin, Jerome; Fecteau, Shirley
2013-01-01
For ages, we have been looking for ways to enhance our physical and cognitive capacities in order to augment our security. One potential way to enhance our capacities may be to externally stimulate the brain. Methods of non-invasive brain stimulation (NIBS), such as repetitive transcranial magnetic stimulation (rTMS) and transcranial electrical stimulation (tES), have been recently developed to modulate brain activity. Both techniques are relatively safe and can transiently modify motor and cognitive functions outlasting the stimulation period. The purpose of this paper is to review data suggesting that NIBS can enhance motor and cognitive performance in healthy volunteers. We frame these findings in the context of whether they may serve security purposes. Specifically, we review studies reporting that NIBS induces paradoxical facilitation in motor (precision, speed, strength, acceleration endurance, and execution of daily motor task) and cognitive functions (attention, impulsive behavior, risk-taking, working memory, planning, and deceptive capacities). Although transferability and meaningfulness of these NIBS-induced paradoxical facilitations into real-life situations are not clear yet, NIBS may contribute at improving training of motor and cognitive functions relevant for military, civil, and forensic security services. This is an enthusiastic perspective that also calls for fair and open debates on the ethics of using NIBS in healthy individuals to enhance normal functions. PMID:23966923
Counterterrorism Enhancement and Department of Homeland Security Authorization Act of 2010
Rep. King, Peter T. [R-NY-3
2010-06-24
House - 07/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
2004-08-05
KENNEDY SPACE CENTER, FLA. - At the ribbon cutting for the Enhanced Firing Range on Schwartz Rd. at Kennedy Space Center, Dave Saleeba (left with weapon) and Center Director Jim Kennedy (right, with weapon) practice firing on the new range. Saleeba is assistant administrator with the Office of Security Management and Safeguards at NASA Headquarters and was a guest speaker at the ceremony. NASA’s Federal Law Enforcement Training Academy’s firing range has been upgraded to include a “rifle-grade” shoot house, a portable, tactical “shoot-back” trailer for cover and concealment drills, automated running targets and a new classroom facility. They are added to the existing three firearms ranges, “pistol-grade” shoot house, obstacle course and rappel tower. NASA’s Security Management and Safeguards Office funded the enhancements in order to improve ability to train the KSC security force and to support local, state and federal law enforcement agencies in Homeland Security.
NASA Technical Reports Server (NTRS)
2004-01-01
KENNEDY SPACE CENTER, FLA. At the ribbon cutting for the Enhanced Firing Range on Schwartz Rd. at Kennedy Space Center, Dave Saleeba (left with weapon) and Center Director Jim Kennedy (right, with weapon) practice firing on the new range. Saleeba is assistant administrator with the Office of Security Management and Safeguards at NASA Headquarters and was a guest speaker at the ceremony. NASAs Federal Law Enforcement Training Academys firing range has been upgraded to include a rifle-grade shoot house, a portable, tactical shoot-back trailer for cover and concealment drills, automated running targets and a new classroom facility. They are added to the existing three firearms ranges, pistol-grade shoot house, obstacle course and rappel tower. NASAs Security Management and Safeguards Office funded the enhancements in order to improve ability to train the KSC security force and to support local, state and federal law enforcement agencies in Homeland Security.