CINXE.COM

Search results for: nuclear threats

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: nuclear threats</title> <meta name="description" content="Search results for: nuclear threats"> <meta name="keywords" content="nuclear threats"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="nuclear threats" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="nuclear threats"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 1599</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: nuclear threats</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1599</span> Nuclear Terrorism Decision Making: A Comparative Study of South Asian Nuclear Weapons States</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Jawad%20Hashmi">Muhammad Jawad Hashmi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The idea of nuclear terrorism is as old as nuclear weapons but the global concerns of likelihood of nuclear terrorism are uncertain. Post 9/11 trends manifest that terrorists are believers of massive causalities. Innovation in terrorist’s tactics, sophisticated weaponry, vulnerability, theft and smuggling of nuclear/radiological material, connections between terrorists, black market and rough regimes are signaling seriousness of upcoming challenges as well as global trends of “terror-transnationalism.” Furthermore, the International-Atomic-Energy-Agency’s database recorded 2734 incidents regarding misuse, unauthorized possession, trafficking of nuclear material etc. Since, this data also includes incidents from south Asia, so, there is every possibility to claim that such illicit activities may increase in future, mainly due to expansion of nuclear industry in South Asia. Moreover, due to such mishaps the region is vulnerable to threats of nuclear terrorism. This is also a reason that the region is in limelight along with issues such as rapidly growing nuclear arsenals, nuclear safety and security, terrorism and political instability. With this backdrop, this study is aimed to investigate the prevailing threats and challenges in South Asia vis a vis nuclear safety and security. A comparative analysis of the overall capabilities would be done to identify the areas of cooperation to eliminate the probability of nuclear/radiological terrorism in the region. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=nuclear%20terrorism" title="nuclear terrorism">nuclear terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=safety" title=" safety"> safety</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=South%20Asia" title=" South Asia"> South Asia</a>, <a href="https://publications.waset.org/abstracts/search?q=india" title=" india"> india</a>, <a href="https://publications.waset.org/abstracts/search?q=Pakistan" title=" Pakistan"> Pakistan</a> </p> <a href="https://publications.waset.org/abstracts/48135/nuclear-terrorism-decision-making-a-comparative-study-of-south-asian-nuclear-weapons-states" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48135.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">356</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1598</span> Analysis of Threats in Interoperability of Medical Devices</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Sandhya">M. Sandhya</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20M.%20Madhumitha"> R. M. Madhumitha</a>, <a href="https://publications.waset.org/abstracts/search?q=Sharmila%20Sankar"> Sharmila Sankar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Interoperable medical devices (IMDs) face threats due to the increased attack surface accessible by interoperability and the corresponding infrastructure. Initiating networking and coordination functionalities primarily modify medical systems&#39; security properties. Understanding the threats is a vital first step in ultimately crafting security solutions for such systems. The key to this problem is coming up with some common types of threats or attacks with those of security and privacy, and providing this information as a roadmap. This paper analyses the security issues in interoperability of devices and presents the main types of threats that have to be considered to build a secured system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=interoperability" title="interoperability">interoperability</a>, <a href="https://publications.waset.org/abstracts/search?q=threats" title=" threats"> threats</a>, <a href="https://publications.waset.org/abstracts/search?q=attacks" title=" attacks"> attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=medical%20devices" title=" medical devices"> medical devices</a> </p> <a href="https://publications.waset.org/abstracts/70201/analysis-of-threats-in-interoperability-of-medical-devices" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/70201.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">333</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1597</span> Pakistan Nuclear Security: Threats from Non-State Actors</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jennifer%20Wright">Jennifer Wright</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The recent rise of powerful terrorist groups such as ISIS and Al-Qaeda brings up concerns about nuclear terrorism as well as a focus on nuclear security, specifically the physical security of nuclear weapons and fissile material storage sites in countries where powerful nonstate actors are present. Particularly because these non-state actors, who lack their own sovereign territory, cannot be ‘deterred’ in the traditional sense. In light of the current threat environment, it’s necessary to now rethink these strategies in the 21st century – a multipolar world with the presence of powerful non-state actors. As a country in the spotlight for its low ranking on the Nuclear Threat Initiative’s (NTI) Nuclear Security Index, Pakistan is a relevant example to explore the question of whether the presence of non-state actors poses a real risk to nuclear security today. It’s necessary to take a look at their nuclear security policies to determine if they’re robust enough to deal with political instability and violence in the country. After carrying out interviews with experts in May 2017 in Islamabad on nuclear security and nuclear terrorism, this paper aims to highlight findings by providing a Pakistan-centric view on the subject and give experts there a chance to counter criticism. Western media would have us fearful of nuclear security mechanisms in Pakistan after reports that areas such as cybersecurity and accounting and control of materials are weak, as well as sensitive nuclear material being transported in unmarked, unguarded vehicles. Also reported are cases where terrorist groups carried out targeted attacks against Pakistani military bases or secure sites where nuclear material is stored. One specific question asked of each interviewee in Islamabad was Do you feel the threat of nuclear terrorism calls into question the reliance on deterrence? Their responses will be elaborated on in the longer paper, but overall they demonstrate views that deterrence still serves a purpose for state-to-state security strategy, but not for a state in countering nonstate threats. If nuclear security is lax enough for these non-state actors to get their hands on either an intact nuclear weapon or enough military-grade fissile material to build a nuclear weapon, then what would stop them from launching a nuclear attack? As deterrence is a state-centric strategy, it doesn’t work to deter non-state actors from carrying out an attack on another state, as they lack their own territory, and as such, are not fearful of a reprisal attack. Deterrence will need to be addressed, and its relevance analyzed to determine its utility in the current security environment. The aim of this research is to demonstrate the real risk of nuclear terrorism by pointing to weaknesses in global nuclear security, particularly in Pakistan. The research also aims to provoke thought on the weaknesses of deterrence as a whole. Original thinking is needed as we attempt to adequately respond to the 21st century’s current threat environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=deterrence" title="deterrence">deterrence</a>, <a href="https://publications.waset.org/abstracts/search?q=non-proliferation" title=" non-proliferation"> non-proliferation</a>, <a href="https://publications.waset.org/abstracts/search?q=nuclear%20security" title=" nuclear security"> nuclear security</a>, <a href="https://publications.waset.org/abstracts/search?q=nuclear%20terrorism" title=" nuclear terrorism"> nuclear terrorism</a> </p> <a href="https://publications.waset.org/abstracts/89586/pakistan-nuclear-security-threats-from-non-state-actors" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/89586.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">226</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1596</span> Framing Opposition to Nuclear Power: Case of Akkuyu Nuclear Power</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pinar%20Temocin">Pinar Temocin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Although the Akkuyu nuclear power project has been in the planning the Akkuyu nuclear power plant in the Mersin Province of Southern Turkey, recent events have increased its visibility in the Turkish debate. The Fukushima accident, the 2010 nuclear deal with Russia followed by several consequent nuclear revelations of administrative deficiencies, and waste issues all spurted widespread protests across Turkey and have polarized the nation into two camps; supporters and detractors. Those who support a nuclear Turkey include energy entrepreneurs, local investors, and technical experts who are heavily involved in paving the way for the realization of a nuclear project. Civil society activists and environmentalists overwhelmingly oppose the nuclear program. This study focuses on the latter, analyzing how groups opposing nuclear power plants (NPPs) have framed the Akkuyu nuclear project as a dangerous, risky, disadvantageous, and irrational policy choice. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=nuclear%20energy" title="nuclear energy">nuclear energy</a>, <a href="https://publications.waset.org/abstracts/search?q=anti-nuclear%20movements" title=" anti-nuclear movements"> anti-nuclear movements</a>, <a href="https://publications.waset.org/abstracts/search?q=environmentalists" title=" environmentalists"> environmentalists</a>, <a href="https://publications.waset.org/abstracts/search?q=civil%20society" title=" civil society"> civil society</a>, <a href="https://publications.waset.org/abstracts/search?q=Turkey" title=" Turkey"> Turkey</a> </p> <a href="https://publications.waset.org/abstracts/66626/framing-opposition-to-nuclear-power-case-of-akkuyu-nuclear-power" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/66626.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">366</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1595</span> The Politics of Renewable Energy Generation and Its Challenges: A Case Study of Iran</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Naresh%20Kumar%20Verma">Naresh Kumar Verma</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nuclear energy being adapted as a renewable energy source and its production by developing countries has turned into a major strategic concern and politics by the developed world. The West seem to be the sole proprietor of such energy source and any country opting for such energy production either face significant hurdles or geopolitical challenges in developing such energy source. History of West Asia is full of interference by external powers which has been integral in the incessant conflict in the region. Whether it was the creation of Israel, the Gulf war of 1991, or the invasion of Iraq in 2003, and more recently the Iranian nuclear conundrum, the soil of West Asia has always been a witness to the play of extra regional powers game. Iran, being a theocratic state has been facing such threats and challenges, regarding its intentions and its capability in such energy production. The paper will try to assess the following issues: -Politics of Renewable Energy Generation. -Geographical and strategic significance of Iran’s nuclear programme. -Challenges in the path of Iran developing nuclear energy as a RE source. -The interests of the regional and extra-regional actors in challenging Iranian Nuclear Programme. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=developing%20countries" title="developing countries">developing countries</a>, <a href="https://publications.waset.org/abstracts/search?q=geopolitics" title=" geopolitics"> geopolitics</a>, <a href="https://publications.waset.org/abstracts/search?q=Iran" title=" Iran"> Iran</a>, <a href="https://publications.waset.org/abstracts/search?q=nuclear%20energy" title=" nuclear energy"> nuclear energy</a>, <a href="https://publications.waset.org/abstracts/search?q=renewable%20energy" title=" renewable energy"> renewable energy</a> </p> <a href="https://publications.waset.org/abstracts/24685/the-politics-of-renewable-energy-generation-and-its-challenges-a-case-study-of-iran" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24685.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">635</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1594</span> Dynamics of India&#039;s Nuclear Identity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Smita%20Singh">Smita Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Through the constructivist perspective, this paper explores the transformation of India’s nuclear identity from an irresponsible nuclear weapon power to a ‘de-facto nuclear power’ in the emerging international nuclear order From a nuclear abstainer to a bystander and finally as a ‘de facto nuclear weapon state’, India has put forth its case as a unique and exceptional nuclear power as opposed to Iran, Iraq and North Korea with similar nuclear ambitions, who have been snubbed as ‘rogue states’ by the international community. This paper investigates the reasons behind international community’s gradual acceptance of India’s nuclear weapons capabilities and nuclear identity after the Indo-U.S. Nuclear Deal. In this paper, the central concept of analysis is the inter-subjective nature of identity in the nuclear arena. India’s nuclear behaviour has been discursively constituted by India through evolving images of the ‘self’ and the ‘other.’ India’s sudden heightened global status is not solely the consequence of its 1998 nuclear tests but a calibrated projection as a responsible stakeholder in other spheres such as economic potential, market prospects, democratic credentials and so on. By examining India’s nuclear discourse this paper contends that India has used its material and discursive power in presenting a n striking image as a responsible nuclear weapon power (though not yet a legal nuclear weapon state as per the NPT). By historicising India’s nuclear trajectory through an inter-subjective analysis of identities, this paper moves a step ahead in providing a theoretical interpretation of state actions and nuclear identity construction. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=nuclear%20identity" title="nuclear identity">nuclear identity</a>, <a href="https://publications.waset.org/abstracts/search?q=India" title=" India"> India</a>, <a href="https://publications.waset.org/abstracts/search?q=constructivism" title=" constructivism"> constructivism</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20stakeholder" title=" international stakeholder"> international stakeholder</a> </p> <a href="https://publications.waset.org/abstracts/38512/dynamics-of-indias-nuclear-identity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/38512.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">439</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1593</span> Regulatory Measures on Effective Nuclear Security and Safeguards System in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nnodi%20Chinweikpe%20Akelachi">Nnodi Chinweikpe Akelachi</a>, <a href="https://publications.waset.org/abstracts/search?q=Adebayo%20Oladini%20Kachollom%20Ifeoma"> Adebayo Oladini Kachollom Ifeoma</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Insecurity and the possession of nuclear weapons for non-peaceful purposes constitute a major threat to global peace and security, and this undermines the capacity for sustainable development. In Nigeria, the threat of terrorism is a challenge to national stability. For over a decade, Nigeria has been faced with insecurity ranging from Boko-Haram terrorist groups, kidnapping and banditry. The threat exhibited by this non-state actor poses a huge challenge to nuclear and radiological high risks facilities in Nigeria. This challenge has resulted in the regulatory authority and International stakeholders formulating policies for a good mitigation strategy. This strategy is enshrined in formulated laws, regulations and guides like the repealed Nuclear Safety and Radiation Protection Act 19 of 1995 (Nuclear safety, Physical Security and Safeguards Bill), the Nigerian Physical Protection of Nuclear Material and Nuclear Facilities, and Nigerian Nuclear Safeguards Regulations of 2021. All this will help Nigeria’s effort to meet its national nuclear security and safeguards obligations. To further enhance the implementation of nuclear security and safeguards system, Nigeria has signed the Non-Proliferation Treaty (NPT) in 1970, the Comprehensive Safeguards Agreement (INFCIRC/358) in 1988, Additional Protocol in 2007 as well as the Convention on Physical Protection of Nuclear Material and its amendment in 2005. In view of the evolving threats by non-state actors in Nigeria, physical protection security upgrades are being implemented in nuclear and all high-risk radiological facilities through the support of the United States Department of Energy (US-DOE). Also, the IAEA has helped strengthen nuclear security and safeguard systems through the provision of technical assistance and capacity development. Efforts are being made to address some of the challenges identified in the cause of implementing the measures for effective nuclear security and safeguards systems in Nigeria. However, there are eminent challenges in the implementation of the measures within the security and systems in Nigeria. These challenges need to be addressed for an effective security and safeguard regime in Nigeria. This paper seeks to address the challenges encountered in implementing the regulatory and stakeholder measures for effective security and safeguards regime in Nigeria, amongst others. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=nuclear%20regulatory%20body" title="nuclear regulatory body">nuclear regulatory body</a>, <a href="https://publications.waset.org/abstracts/search?q=nuclear%20facilities%20and%20activities" title=" nuclear facilities and activities"> nuclear facilities and activities</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20stakeholders" title=" international stakeholders"> international stakeholders</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20and%20safeguards%20measures" title=" security and safeguards measures"> security and safeguards measures</a> </p> <a href="https://publications.waset.org/abstracts/159467/regulatory-measures-on-effective-nuclear-security-and-safeguards-system-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/159467.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">111</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1592</span> Evaluation of a Data Fusion Algorithm for Detecting and Locating a Radioactive Source through Monte Carlo N-Particle Code Simulation and Experimental Measurement</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hadi%20Ardiny">Hadi Ardiny</a>, <a href="https://publications.waset.org/abstracts/search?q=Amir%20Mohammad%20Beigzadeh"> Amir Mohammad Beigzadeh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Through the utilization of a combination of various sensors and data fusion methods, the detection of potential nuclear threats can be significantly enhanced by extracting more information from different data. In this research, an experimental and modeling approach was employed to track a radioactive source by combining a surveillance camera and a radiation detector (NaI). To run this experiment, three mobile robots were utilized, with one of them equipped with a radioactive source. An algorithm was developed in identifying the contaminated robot through correlation between camera images and camera data. The computer vision method extracts the movements of all robots in the XY plane coordinate system, and the detector system records the gamma-ray count. The position of the robots and the corresponding count of the moving source were modeled using the MCNPX simulation code while considering the experimental geometry. The results demonstrated a high level of accuracy in finding and locating the target in both the simulation model and experimental measurement. The modeling techniques prove to be valuable in designing different scenarios and intelligent systems before initiating any experiments. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=nuclear%20threats" title="nuclear threats">nuclear threats</a>, <a href="https://publications.waset.org/abstracts/search?q=radiation%20detector" title=" radiation detector"> radiation detector</a>, <a href="https://publications.waset.org/abstracts/search?q=MCNPX%20simulation" title=" MCNPX simulation"> MCNPX simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=modeling%20techniques" title=" modeling techniques"> modeling techniques</a>, <a href="https://publications.waset.org/abstracts/search?q=intelligent%20systems" title=" intelligent systems"> intelligent systems</a> </p> <a href="https://publications.waset.org/abstracts/167591/evaluation-of-a-data-fusion-algorithm-for-detecting-and-locating-a-radioactive-source-through-monte-carlo-n-particle-code-simulation-and-experimental-measurement" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/167591.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">123</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1591</span> A Nuclear Negotiation Qualitative Case Study with Force Field Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Onur%20Yuksel">Onur Yuksel</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In today’s complex foreign relations between countries, the nuclear enrichment and nuclear weapon have become a threat for all states in the world. There are couple isolated states which have capacity to produce nuclear weapons such as Iran and North Korea. In this article, Iran nuclear negotiation was analyzed in terms of its relations especially with The United States in order to find the important factors that affect the course of the ongoing nuclear negotiation. In this sense, the Force Field Analysis was used by determining and setting forth Driving and Restraining Forces of the nuclear negotiations in order to see the big picture and to develop strategies that may improve the long-term ongoing Iran nuclear negotiations. It is found that Iran nuclear negotiation heavily depends on breaking down the idea of Iran’s supporting terrorist organizations and being more transparent about nuclear and uranium enrichment. Also, it was found that Iran has to rebuild its relations with Western countries, especially with the United States. In addition, the counties— who contribute to Iran nuclear negotiations— will need to work on the dynamics and drivers of the Israel and Iran relations in order to peacefully transform the conflict between the two states. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=driving%20force" title="driving force">driving force</a>, <a href="https://publications.waset.org/abstracts/search?q=Iran%20nuclear%20negotiation" title=" Iran nuclear negotiation"> Iran nuclear negotiation</a>, <a href="https://publications.waset.org/abstracts/search?q=restraining%20force" title=" restraining force"> restraining force</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20force%20field%20analysis" title=" the force field analysis"> the force field analysis</a> </p> <a href="https://publications.waset.org/abstracts/103916/a-nuclear-negotiation-qualitative-case-study-with-force-field-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/103916.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">158</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1590</span> Nuclear Power Plant Radioactive Effluent Discharge Management in China</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jie%20Yang">Jie Yang</a>, <a href="https://publications.waset.org/abstracts/search?q=Qifu%20Cheng"> Qifu Cheng</a>, <a href="https://publications.waset.org/abstracts/search?q=Yafang%20Liu"> Yafang Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhijie%20Gu"> Zhijie Gu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Controlled emissions of effluent from nuclear power plants are an important means of ensuring environmental safety. In order to fully grasp the actual discharge level of nuclear power plant in China's nuclear power plant in the pressurized water reactor and heavy water reactor, it will use the global average nuclear power plant effluent discharge as a reference to the standard analysis of China's nuclear power plant environmental discharge status. The results show that the average normalized emission of liquid tritium in PWR nuclear power plants in China is slightly higher than the global average value, and the other nuclides emissions are lower than the global average values. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=radioactive%20effluent" title="radioactive effluent">radioactive effluent</a>, <a href="https://publications.waset.org/abstracts/search?q=HWR" title=" HWR"> HWR</a>, <a href="https://publications.waset.org/abstracts/search?q=PWR" title=" PWR"> PWR</a>, <a href="https://publications.waset.org/abstracts/search?q=nuclear%20power%20plant" title=" nuclear power plant"> nuclear power plant</a> </p> <a href="https://publications.waset.org/abstracts/81396/nuclear-power-plant-radioactive-effluent-discharge-management-in-china" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/81396.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">243</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1589</span> Civil Nuclear Liability Indian Perspective</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shivani%20Gupta">Shivani Gupta</a>, <a href="https://publications.waset.org/abstracts/search?q=Shrishti%20Chaturvedi"> Shrishti Chaturvedi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> By using a miniscule of nuclear matter, the problem of immeasurable human needs for energy can be resolved. However since nuclear energy also has the inherent potential for catastrophic destruction, one should be extremely mindful of the consequences should a mischance occur. Civil Nuclear Liability has recently gained a lot of momentum after India entered into agreements with nations like United States of America, France and others. Also now India is a part of the Convention on Supplementary Compensation (CSC). With a history of Bhopal Gas Tragedy, India is now much more vigilant about the latest developments in this sector. Therefore, it has become imperative to analyses the liability regime in the background of international conventions such as Vienna Convention 1963, Paris Convention 1960, Convention on Supplementary Compensation, 1997 and others. Also the present Indian legal scenarios in this regard which are derived from Civil Liability for Nuclear Damages Act, 2010 and Civil Liability for Nuclear Damages Rules, 2011 have also been extensively discussed in the paper. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=nuclear%20liability" title="nuclear liability">nuclear liability</a>, <a href="https://publications.waset.org/abstracts/search?q=civil%20liability%20for%20nuclear%20damages%20act" title=" civil liability for nuclear damages act"> civil liability for nuclear damages act</a>, <a href="https://publications.waset.org/abstracts/search?q=2010" title=" 2010"> 2010</a>, <a href="https://publications.waset.org/abstracts/search?q=civil%20liability%20for%20nuclear%20damages%20rules" title=" civil liability for nuclear damages rules"> civil liability for nuclear damages rules</a>, <a href="https://publications.waset.org/abstracts/search?q=India" title=" India"> India</a> </p> <a href="https://publications.waset.org/abstracts/42706/civil-nuclear-liability-indian-perspective" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42706.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">404</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1588</span> Towards the Management of Cybersecurity Threats in Organisations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=O.%20A.%20Ajigini">O. A. Ajigini</a>, <a href="https://publications.waset.org/abstracts/search?q=E.%20N.%20Mwim"> E. N. Mwim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=confidential%20information" title="confidential information">confidential information</a>, <a href="https://publications.waset.org/abstracts/search?q=cyberattacks" title=" cyberattacks"> cyberattacks</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=cyberspace" title=" cyberspace"> cyberspace</a>, <a href="https://publications.waset.org/abstracts/search?q=sensitive%20information" title=" sensitive information"> sensitive information</a> </p> <a href="https://publications.waset.org/abstracts/62869/towards-the-management-of-cybersecurity-threats-in-organisations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/62869.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">259</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1587</span> Nuclear Terrorism and Proliferation: A Conceptual Clarification</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Uche%20A.%20Nnawulezi">Uche A. Nnawulezi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper analyzes the advancing nature of nuclear terrorism and proliferation in the global environment and its attendant impacts. It analyzes discourse and practice with respect to the general prohibition on the utilization of fissionable radioactive materials. Thus, there has been a few ideological, reasonable and academic recommendations of policies aimed at eliminating nuclear weapons which its ultimate nightmare has remained an assault including nuclear explosion in densely populated urban areas. Likewise, this paper concentrates on safety measures aimed at preventing nuclear assaults which should not just concentrate on endeavors to prevent terrorists from exploding nuclear gadgets but should be more concerned on endeavors aimed at preventing the acquisition of nuclear weapons in the first place. The author of this paper has pointed out that the non-proliferation treaty should be vigorously supported as well as the Comprehensive Test Ban Treaty brought into force. This paper depended unequivocally on secondary sources, for example, textbooks, journals, articles, and periodicals. It concludes that the fundamental proposals made in this paper if completely used shall remain a cornerstone of efforts made in preventing the spread of nuclear weapons. At last, the only way is to eliminate stockpiles of nuclear weapons in the world or else the likelihood of nuclear terrorism remains a nightmare. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=nuclear" title="nuclear">nuclear</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=proliferation" title=" proliferation"> proliferation</a>, <a href="https://publications.waset.org/abstracts/search?q=global%20environment" title=" global environment"> global environment</a> </p> <a href="https://publications.waset.org/abstracts/85720/nuclear-terrorism-and-proliferation-a-conceptual-clarification" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/85720.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">248</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1586</span> Universality as Opportunity Domain behind the Threats and Challenges of Natural Disasters</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kunto%20Wibowo%20Agung%20Prodjonoto">Kunto Wibowo Agung Prodjonoto</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Occasionally, opportunities occur not due to chances but threats. This, however, is often not realized because a greater threat is perceived to be anything that threatens, endangers, or harms, resulting in bad impacts that are also part of the risk and consequence. As a result, more focus tends to direct towards the bad impacts. Risk, in this case, shall be seen rather as something challenging, which can turn to be an opportunity to tackle an obstacle. Therefore, it does not seem exaggerating if later, risk can be considered as a challenge that presents an opportunity. So as in the context of the threat of natural disasters which gives an idea that opportunities exist. Nature referred to in a fashion as 'natural disasters' captured an expression to picture the 'threats' aspect, which instructively implying a chance of opportunity. This is quite logical, as SWOT (strengths, weaknesses, opportunities, threats) analysis can evaluate the situation at hand related to the analysis of various factors in formulating strategies to deal with natural disaster situations. The analytical method created by Albert Humphrey is indeed not an analytical tool to provide solutions, but certainly 'opportunities and challenges' are discussed therein on a vertical line, where opportunities are posited on the positive axis, and threats are posed on the negative axis. Observing this dynamism, the challenges and threats of disasters are having opportunity relevance to moralizing opportunities, that by quality poses universalism populist characteristics, universalism characteristics, and regional characteristics. Here, universalism appears as an opportunity domain underneath the threats and challenges of natural disasters. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=universality" title="universality">universality</a>, <a href="https://publications.waset.org/abstracts/search?q=opportunities" title=" opportunities"> opportunities</a>, <a href="https://publications.waset.org/abstracts/search?q=threats" title=" threats"> threats</a>, <a href="https://publications.waset.org/abstracts/search?q=challenges%20of%20natural%20disasters" title=" challenges of natural disasters"> challenges of natural disasters</a> </p> <a href="https://publications.waset.org/abstracts/114198/universality-as-opportunity-domain-behind-the-threats-and-challenges-of-natural-disasters" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/114198.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">151</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1585</span> The Turkish Anti-Nuclear Platform: A Counter-Hegemonic Struggle</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sevgi%20Balkan-Sahin">Sevgi Balkan-Sahin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Justice and Development Party (AKP) government has included nuclear power as a major component of Turkey’s new energy strategy by promoting it as the only alternative for Turkey to diversify energy resources, trigger economic growth, and boost competitiveness of the country. The effective promotion of such a framing has created a hegemonic discourse around nuclear energy in Turkey. However, fiercely opposing the nuclear initiative of the government, the Turkish anti-nuclear platform (ANP) composed of more than 50 civil society groups has challenged the hegemonic discourse of the AKP government by presenting nuclear energy as dangerous for human health, human rights, and the protection of environment. Based on an engagement between Gramscian perspective and Laclau and Mouffe’s discourse theory, this paper considers the discourses of the Turkish anti-nuclear platform and its associated activities as a counter-hegemonic strategy to change the ‘common sense’ on nuclear energy in Turkey. Analyzing the data from interviews with the representatives of the anti-nuclear platform coupled with primary sources, such as Parliamentary Records and official statements by civil society organizations, the paper highlights how the anti-nuclear platform exercises power through counter-hegemonic discourses in terms of the delegitimization of nuclear energy in Turkey. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=counter-hegemony" title="counter-hegemony">counter-hegemony</a>, <a href="https://publications.waset.org/abstracts/search?q=discourse" title=" discourse"> discourse</a>, <a href="https://publications.waset.org/abstracts/search?q=nuclear%20energy" title=" nuclear energy"> nuclear energy</a>, <a href="https://publications.waset.org/abstracts/search?q=Turkey" title=" Turkey"> Turkey</a> </p> <a href="https://publications.waset.org/abstracts/72394/the-turkish-anti-nuclear-platform-a-counter-hegemonic-struggle" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72394.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">350</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1584</span> India’s Deterrence Program: Defense or Development</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aneri%20Mehta">Aneri Mehta</a>, <a href="https://publications.waset.org/abstracts/search?q=Krunal%20Mehta"> Krunal Mehta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A doctrine, any doctrine, incorporates a set of beliefs or principles held by a body of persons. A national nuclear doctrine represents, therefore, the collective set of beliefs or principles held by the nation in regard to the utility of its nuclear weapons. India’s foreign policy has been profoundly affected by the nuclear explosions conducted in May 1998. The departure from the professed peaceful nuclear policies has had several implications for India’s defense and foreign policies. The explosions in Pokhran have aggravated tensions in south Asia by disrupting diplomatic initiatives with Pak and China. Diplomacy has been reduced to damage control. The object of India’s nuclear deterrence is to persuade an adversary that the costs to him of seeking a military solution to his political problems with India will far outweigh the benefits. The paper focuses on India’s guidelines governing nuclear policy, development of nuclear materials for effective deterrence as well as civil development purpose. The paper finds that security concerns and technological capabilities are important determinants of whether India develops a nuclear weapons programs, while security concerns, economic capabilities, and domestic politics help to explain the possession of nuclear weapons. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=foreign%20policy" title="foreign policy">foreign policy</a>, <a href="https://publications.waset.org/abstracts/search?q=nuclear%20deterrence" title=" nuclear deterrence"> nuclear deterrence</a>, <a href="https://publications.waset.org/abstracts/search?q=nuclear%20policy" title=" nuclear policy"> nuclear policy</a>, <a href="https://publications.waset.org/abstracts/search?q=development" title=" development"> development</a> </p> <a href="https://publications.waset.org/abstracts/14898/indias-deterrence-program-defense-or-development" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/14898.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">521</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1583</span> The Current Development and Legislation on the Acquisition and Use of Nuclear Energy in Contemporary International Law </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Uche%20A.%20Nnawulezi">Uche A. Nnawulezi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Over the past decades, the acquisition and utilization of nuclear energy have remained a standout amongst the most intractable issues which past world leaders have unsuccessfully endeavored to grapple with. This study analyzes the present advancement and enactment on the acquisition and utilization of nuclear energy in contemporary international law. It seeks to address international co-operations in the field of nuclear energy by looking at what nuclear energy is all about and how it came into being. It also seeks to address concerns expressed by a few researchers on the position of nuclear law in the most extensive domain of the law by looking at the authoritative procedure for nuclear law, system of arrangements and traditions. This study also agrees in favour of treaty on non-proliferation of nuclear weapons based on human right and humanitarian principles that are not duly moral, but also legal ones. Specifically, the past development activities on nuclear weapon and the practical system of the nuclear energy institute will be inspected. The study noted among others, former president Obama's remark on nuclear energy and Pakistan nuclear policies and its attendant outcomes. Essentially, we depended on documentary evidence and henceforth scooped a great part of the data from secondary sources. The study emphatically advocates for the adoption of absolute liability principles and setting up of a viability trust fund, all of which will help in sustaining global peace where global best practices in acquisition and use of nuclear energy will be widely accepted in the contemporary international law. Essentially, the fundamental proposals made in this paper if completely adopted, might go far in fortifying the present advancement and enactment on the application and utilization of nuclear energy and accordingly, addressing a portion of the intractable issues under international law. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=nuclear%20energy" title="nuclear energy">nuclear energy</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20law" title=" international law"> international law</a>, <a href="https://publications.waset.org/abstracts/search?q=acquisition" title=" acquisition"> acquisition</a>, <a href="https://publications.waset.org/abstracts/search?q=development" title=" development"> development</a> </p> <a href="https://publications.waset.org/abstracts/82849/the-current-development-and-legislation-on-the-acquisition-and-use-of-nuclear-energy-in-contemporary-international-law" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82849.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">178</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1582</span> Identification and Characterization of Nuclear Envelope Protein Interactions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammed%20Hakim%20Jafferali">Mohammed Hakim Jafferali</a>, <a href="https://publications.waset.org/abstracts/search?q=Balaje%20Vijayaraghavan"> Balaje Vijayaraghavan</a>, <a href="https://publications.waset.org/abstracts/search?q=Ricardo%20A.%20Figueroa"> Ricardo A. Figueroa</a>, <a href="https://publications.waset.org/abstracts/search?q=Ellinor%20Crafoord"> Ellinor Crafoord</a>, <a href="https://publications.waset.org/abstracts/search?q=Veronica%20J.%20Larsson"> Veronica J. Larsson</a>, <a href="https://publications.waset.org/abstracts/search?q=Einar%20Hallberg"> Einar Hallberg</a>, <a href="https://publications.waset.org/abstracts/search?q=Santhosh%20Gudise"> Santhosh Gudise </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The nuclear envelope which surrounds the chromatin of eukaryotic cells contains more than a hundred transmembrane proteins. Mutations in some genes encoding nuclear envelope proteins give rise to human diseases including neurological disorders. The function of many nuclear envelope proteins is not well established. This is partly because nuclear envelope proteins and their interactions are difficult to study due to the inherent resistance to extraction of nuclear envelope proteins. We have developed a novel method called MCLIP, to identify interacting partners of nuclear envelope proteins in live cells. Using MCLIP, we found three new binding partners of the inner nuclear membrane protein Samp1: the intermediate filament protein Lamin B1, the LINC complex protein Sun1 and the G-protein Ran. Furthermore, using in vitro studies, we show that Samp1 binds both Emerin and Ran directly. We have also studied the interaction between Samp1 and Ran in detail. The results show that the Samp1 binds stronger to RanGTP than RanGDP. Samp1 is the first transmembrane protein known to bind Ran and it is tempting to speculate that Samp1 may provide local binding sites for RanGTP at membranes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=MCLIP" title="MCLIP">MCLIP</a>, <a href="https://publications.waset.org/abstracts/search?q=nuclear%20envelope" title=" nuclear envelope"> nuclear envelope</a>, <a href="https://publications.waset.org/abstracts/search?q=ran" title=" ran"> ran</a>, <a href="https://publications.waset.org/abstracts/search?q=Samp1" title=" Samp1"> Samp1</a> </p> <a href="https://publications.waset.org/abstracts/42955/identification-and-characterization-of-nuclear-envelope-protein-interactions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42955.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">353</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1581</span> Impact of America&#039;s Anti-Ballistic Missile System (ABMS) on Power Dynamics of the World</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fehmeen%20Anwar">Fehmeen Anwar</a>, <a href="https://publications.waset.org/abstracts/search?q=Ujala%20Liaqat"> Ujala Liaqat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> For over half a century, U.S. and the Soviet Union have been at daggers drawn with each other. Both leading powers of the world have been struggling hard to surpass each other in military and other technological fields. This neck-to-neck competition turned in favour of U.S. in the early 1990s when USSR had to face economic stagnation and later dismemberment of several of its states. The predominance of U.S. is still evident to date, rather it continues to grow. With this proposed defence program i.e. Anti-Ballistic Missile System, the U.S. will have a considerable chance of intercepting any nuclear strike by Russia, which re-asserts U.S. dominance in the region and creating a security dilemma for Russia and other states. The question is whether America’s recent nuclear deterrence project is merely to counter nuclear threats from Iran and North Korea or is it purely directed towards Russia, thus ensuring complete military supremacy in the world. Although U.S professes to direct its Anti-Ballistic Missile System (ABMS) against the axis of evil (Iran and North Korea), yet the deployment of this system in the East European territory undermines the Russian nuclear strategic capability, as this enables U.S. to initiate an attack and guard itself from retaliatory strike, thus disturbing the security equilibrium in Europe. The implications of this program can lead to power imbalance which can lead to the emergence of fundamentally different paradigm of international politics. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anti-Ballistic%20Missile%20System%20%28ABMS%29" title="Anti-Ballistic Missile System (ABMS)">Anti-Ballistic Missile System (ABMS)</a>, <a href="https://publications.waset.org/abstracts/search?q=cold-war" title=" cold-war"> cold-war</a>, <a href="https://publications.waset.org/abstracts/search?q=axis%20of%20evil" title=" axis of evil"> axis of evil</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20dynamics" title=" power dynamics"> power dynamics</a> </p> <a href="https://publications.waset.org/abstracts/10134/impact-of-americas-anti-ballistic-missile-system-abms-on-power-dynamics-of-the-world" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10134.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">293</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1580</span> SeCloudBPMN: A Lightweight Extension for BPMN Considering Security Threats in the Cloud</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Somayeh%20Sobati%20Moghadam">Somayeh Sobati Moghadam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Business processes are crucial for organizations and help businesses to evaluate and optimize their performance and processes against current and future-state business goals. Outsourcing business processes to the cloud becomes popular due to a wide varsity of benefits and cost-saving. However, cloud outsourcing raises enterprise data security concerns, which must be incorporated in Business Process Model and Notation (BPMN). This paper, presents SeCloudBPMN, a lightweight extension for BPMN which extends the BPMN to explicitly support the security threats in the cloud as an outsourcing environment. SeCloudBPMN helps business&rsquo;s security experts to outsource business processes to the cloud considering different threats from inside and outside the cloud. In this way, appropriate security countermeasures could be considered to preserve data security in business processes outsourcing to the cloud. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=BPMN" title="BPMN">BPMN</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20threats" title=" security threats"> security threats</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title=" cloud computing"> cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=business%20processes%20outsourcing" title=" business processes outsourcing"> business processes outsourcing</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a> </p> <a href="https://publications.waset.org/abstracts/97274/secloudbpmn-a-lightweight-extension-for-bpmn-considering-security-threats-in-the-cloud" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/97274.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">269</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1579</span> Taxonomy of Threats and Vulnerabilities in Smart Grid Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Faisal%20Al%20Yahmadi">Faisal Al Yahmadi</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20R.%20Ahmed"> Muhammad R. Ahmed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Electric power is a fundamental necessity in the 21<sup>st</sup> century. Consequently, any break in electric power is probably going to affect the general activity. To make the power supply smooth and efficient, a smart grid network is introduced which uses communication technology. In any communication network, security is essential. It has been observed from several recent incidents that adversary causes an interruption to the operation of networks. In order to resolve the issues, it is vital to understand the threats and vulnerabilities associated with the smart grid networks. In this paper, we have investigated the threats and vulnerabilities in Smart Grid Networks (SGN) and the few solutions in the literature. Proposed solutions showed developments in electricity theft countermeasures, Denial of services attacks (DoS) and malicious injection attacks detection model, as well as malicious nodes detection using watchdog like techniques and other solutions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=smart%20grid%20network" title="smart grid network">smart grid network</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=threats" title=" threats"> threats</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerabilities" title=" vulnerabilities"> vulnerabilities</a> </p> <a href="https://publications.waset.org/abstracts/135866/taxonomy-of-threats-and-vulnerabilities-in-smart-grid-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/135866.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">139</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1578</span> Analytical Study on Threats to Wetland Ecosystems and Their Solutions in the Framework of the Ramsar Convention</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ehsan%20Daryadel">Ehsan Daryadel</a>, <a href="https://publications.waset.org/abstracts/search?q=Farhad%20Talaie"> Farhad Talaie </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wetlands are one of the most important ecosystems on Earth. Nevertheless, various challenges threaten these ecosystems and disrupt their ecological character. Among these, the effects of human-based threats are more devastating. Following mass degradation of wetlands during 1970s, the Ramsar Convention on Wetlands (Ramsar, Iran, 1971) was concluded to conserve wetlands of international importance and prevent destruction and degradation of such ecosystems through wise use of wetlands as a mean to achieve sustainable development in all over the world. Therefore, in this paper, efforts have been made to analyze threats to wetlands and then investigate solutions in the framework of the Ramsar Convention. Finally, in order to operate these mechanisms, this study concludes that all states should in turn make their best effort to improve and restore global wetlands through preservation of environmental standards and close contribution and also through taking joint measures with other states effectively. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ramsar%20Convention" title="Ramsar Convention">Ramsar Convention</a>, <a href="https://publications.waset.org/abstracts/search?q=threats" title=" threats"> threats</a>, <a href="https://publications.waset.org/abstracts/search?q=wetland%20wcosystems" title=" wetland wcosystems"> wetland wcosystems</a>, <a href="https://publications.waset.org/abstracts/search?q=wise%20use" title=" wise use"> wise use</a> </p> <a href="https://publications.waset.org/abstracts/6722/analytical-study-on-threats-to-wetland-ecosystems-and-their-solutions-in-the-framework-of-the-ramsar-convention" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6722.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">401</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1577</span> Technical and Economical Evaluation of Electricity Generation and Seawater Desalination Using Nuclear Energy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20Hany%20A.%20Khater">A. Hany A. Khater</a>, <a href="https://publications.waset.org/abstracts/search?q=G.%20M.%20Mostafa"> G. M. Mostafa</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20R.%20Badawy"> M. R. Badawy </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The techno-economic analysis of the nuclear desalination is a very important tool that enables studying of the mutual effects between the nuclear power plant and the coupled desalination plant under different operating conditions, and hence investigating the feasibility of safe and economical production of potable water. For this purpose, a comprehensive model for both technical and economic performance evaluation of the nuclear desalination has been prepared. The developed model has the capability to be used in performing a parametric study for the performance measuring parameters of the nuclear desalination system. Also a sensitivity analysis of varying important factors such as interest/discount rate, power plant availability, fossil fuel prices, purchased electricity price, nuclear fuel cost, and specific base cost for both power and water plant has been conducted. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=uclear%20desalination" title="uclear desalination">uclear desalination</a>, <a href="https://publications.waset.org/abstracts/search?q=PWR" title=" PWR"> PWR</a>, <a href="https://publications.waset.org/abstracts/search?q=MED" title=" MED"> MED</a>, <a href="https://publications.waset.org/abstracts/search?q=MED-TVC" title=" MED-TVC"> MED-TVC</a>, <a href="https://publications.waset.org/abstracts/search?q=MSF" title=" MSF"> MSF</a>, <a href="https://publications.waset.org/abstracts/search?q=RO" title=" RO"> RO</a> </p> <a href="https://publications.waset.org/abstracts/25942/technical-and-economical-evaluation-of-electricity-generation-and-seawater-desalination-using-nuclear-energy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25942.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">725</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1576</span> Models, Methods and Technologies for Protection of Critical Infrastructures from Cyber-Physical Threats</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ivan%20%C5%BDupan">Ivan Župan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Critical infrastructure is essential for the functioning of a country and is designated for special protection by governments worldwide. Due to the increase in smart technology usage in every facet of the industry, including critical infrastructure, the exposure to malicious cyber-physical attacks has grown in the last few years. Proper security measures must be undertaken in order to defend against cyber-physical threats that can disrupt the normal functioning of critical infrastructure and, consequently the functioning of the country. This paper provides a review of the scientific literature of models, methods and technologies used to protect from cyber-physical threats in industries. The focus of the literature was observed from three aspects. The first aspect, resilience, concerns itself with the robustness of the system’s defense against threats, as well as preparation and education about potential future threats. The second aspect concerns security risk management for systems with cyber-physical aspects, and the third aspect investigates available testbed environments for testing developed models on scaled models of vulnerable infrastructure. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title="critical infrastructure">critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-physical%20security" title=" cyber-physical security"> cyber-physical security</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20industry" title=" smart industry"> smart industry</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20methodology" title=" security methodology"> security methodology</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20technology" title=" security technology"> security technology</a> </p> <a href="https://publications.waset.org/abstracts/169637/models-methods-and-technologies-for-protection-of-critical-infrastructures-from-cyber-physical-threats" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/169637.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">77</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1575</span> Analysis of Possible Causes of Fukushima Disaster</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abid%20Hossain%20Khan">Abid Hossain Khan</a>, <a href="https://publications.waset.org/abstracts/search?q=Syam%20Hasan"> Syam Hasan</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20A.%20R.%20Sarkar"> M. A. R. Sarkar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Fukushima disaster is one of the most publicly exposed accidents in a nuclear facility which has changed the outlook of people towards nuclear power. Some have used it as an example to establish nuclear energy as an unsafe source, while others have tried to find the real reasons behind this accident. Many papers have tried to shed light on the possible causes, some of which are purely based on assumptions while others rely on rigorous data analysis. To our best knowledge, none of the works can say with absolute certainty that there is a single prominent reason that has paved the way to this unexpected incident. This paper attempts to compile all the apparent reasons behind Fukushima disaster and tries to analyze and identify the most likely one. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fuel%20meltdown" title="fuel meltdown">fuel meltdown</a>, <a href="https://publications.waset.org/abstracts/search?q=Fukushima%20disaster" title=" Fukushima disaster"> Fukushima disaster</a>, <a href="https://publications.waset.org/abstracts/search?q=Manmade%20calamity" title=" Manmade calamity"> Manmade calamity</a>, <a href="https://publications.waset.org/abstracts/search?q=nuclear%20facility" title=" nuclear facility"> nuclear facility</a>, <a href="https://publications.waset.org/abstracts/search?q=tsunami" title=" tsunami"> tsunami</a> </p> <a href="https://publications.waset.org/abstracts/88370/analysis-of-possible-causes-of-fukushima-disaster" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/88370.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">266</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1574</span> Nuclear Materials and Nuclear Security in India: A Brief Overview</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Debalina%20Ghoshal">Debalina Ghoshal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nuclear security is the ‘prevention and detection of, and response to unauthorised removal, sabotage, unauthorised access, illegal transfer or other malicious acts involving nuclear or radiological material or their associated facilities.’ Ever since the end of Cold War, nuclear materials security has remained a concern for global security. However, with the increase in terrorist attacks not just in India especially, security of nuclear materials remains a priority. Therefore, India has made continued efforts to tighten its security on nuclear materials to prevent nuclear theft and radiological terrorism. Nuclear security is different from nuclear safety. Physical security is also a serious concern and India had been careful of the physical security of its nuclear materials. This is more so important since India is expanding its nuclear power capability to generate electricity for economic development. As India targets 60,000 MW of electricity production by 2030, it has a range of reactors to help it achieve its goal. These include indigenous Pressurised Heavy Water Reactors, now standardized at 700 MW per reactor Light Water Reactors, and the indigenous Fast Breeder Reactors that can generate more fuel for the future and enable the country to utilise its abundant thorium resource. Nuclear materials security can be enhanced through two important ways. One is through proliferation resistant technologies and diplomatic efforts to take non proliferation initiatives. The other is by developing technical means to prevent any leakage in nuclear materials in the hands of asymmetric organisations. New Delhi has already implemented IAEA Safeguards on their civilian nuclear installations. Moreover, the IAEA Additional Protocol has also been ratified by India in order to enhance its transparency of nuclear material and strengthen nuclear security. India is a party to the IAEA Conventions on Nuclear Safety and Security, and in particular the 1980 Convention on the Physical Protection of Nuclear Material and its amendment in 2005, Code of Conduct in Safety and Security of Radioactive Sources, 2006 which enables the country to provide for the highest international standards on nuclear and radiological safety and security. India's nuclear security approach is driven by five key components: Governance, Nuclear Security Practice and Culture, Institutions, Technology and International Cooperation. However, there is still scope for further improvements to strengthen nuclear materials and nuclear security. The NTI Report, ‘India’s improvement reflects its first contribution to the IAEA Nuclear Security Fund etc. in the future, India’s nuclear materials security conditions could be further improved by strengthening its laws and regulations for security and control of materials, particularly for control and accounting of materials, mitigating the insider threat, and for the physical security of materials during transport. India’s nuclear materials security conditions also remain adversely affected due to its continued increase in its quantities of nuclear material, and high levels of corruption among public officials.’ This paper would study briefly the progress made by India in nuclear and nuclear material security and the step ahead for India to further strengthen this. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=India" title="India">India</a>, <a href="https://publications.waset.org/abstracts/search?q=nuclear%20security" title=" nuclear security"> nuclear security</a>, <a href="https://publications.waset.org/abstracts/search?q=nuclear%20materials" title=" nuclear materials"> nuclear materials</a>, <a href="https://publications.waset.org/abstracts/search?q=non%20proliferation" title=" non proliferation"> non proliferation</a> </p> <a href="https://publications.waset.org/abstracts/42840/nuclear-materials-and-nuclear-security-in-india-a-brief-overview" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42840.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">352</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1573</span> Organisational Disclosure: Threats to Individuals&#039; Privacy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=N.%20A.%20Badrul">N. A. Badrul </a> </p> <p class="card-text"><strong>Abstract:</strong></p> People are concerned that they are vulnerable as a result of what is exposed about them on the internet. Users are increasingly aware of their privacy and are making various efforts to protect their personal information. However, besides individuals themselves, organisations are also exposing personal information of their staff to the general public by publishing it on their official website. This practice may put individuals at risk and particularly vulnerable to threats. This preliminary study explores explicitly the amount and types of personal information disclosure from organisational websites. Threats and risks related to the disclosures are discussed. In general, all the examined organisational websites discloses personal information with varies identifiable degree of data. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=personal%20information" title="personal information">personal information</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=e-government" title=" e-government"> e-government</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20disclosure" title=" information disclosure"> information disclosure</a> </p> <a href="https://publications.waset.org/abstracts/8541/organisational-disclosure-threats-to-individuals-privacy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/8541.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">318</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1572</span> The Use of Nuclear Generation to Provide Power System Stability</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Heather%20Wyman-Pain">Heather Wyman-Pain</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuankai%20Bian"> Yuankai Bian</a>, <a href="https://publications.waset.org/abstracts/search?q=Furong%20Li"> Furong Li</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The decreasing use of fossil fuel power stations has a negative effect on the stability of the electricity systems in many countries. Nuclear power stations have traditionally provided minimal ancillary services to support the system but this must change in the future as they replace fossil fuel generators. This paper explains the development of the four most popular reactor types still in regular operation across the world which have formed the basis for most reactor development since their commercialisation in the 1950s. The use of nuclear power in four countries with varying levels of capacity provided by nuclear generators is investigated, using the primary frequency response provided by generators as a measure for the electricity networks stability, to assess the need for nuclear generators to provide additional support as their share of the generation capacity increases. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=frequency%20control" title="frequency control">frequency control</a>, <a href="https://publications.waset.org/abstracts/search?q=nuclear%20power%20generation" title=" nuclear power generation"> nuclear power generation</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20system%20stability" title=" power system stability"> power system stability</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20inertia" title=" system inertia"> system inertia</a> </p> <a href="https://publications.waset.org/abstracts/47932/the-use-of-nuclear-generation-to-provide-power-system-stability" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/47932.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">437</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1571</span> Two-Dimensional Modeling of Spent Nuclear Fuel Using FLUENT</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Imane%20Khalil">Imane Khalil</a>, <a href="https://publications.waset.org/abstracts/search?q=Quinn%20Pratt"> Quinn Pratt</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In a nuclear reactor, an array of fuel rods containing stacked uranium dioxide pellets clad with zircalloy is the heat source for a thermodynamic cycle of energy conversion from heat to electricity. After fuel is used in a nuclear reactor, the assemblies are stored underwater in a spent nuclear fuel pool at the nuclear power plant while heat generation and radioactive decay rates decrease before it is placed in packages for dry storage or transportation. A computational model of a Boiling Water Reactor spent fuel assembly is modeled using FLUENT, the computational fluid dynamics package. Heat transfer simulations were performed on the two-dimensional 9x9 spent fuel assembly to predict the maximum cladding temperature for different input to the FLUENT model. Uncertainty quantification is used to predict the heat transfer and the maximum temperature profile inside the assembly. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=spent%20nuclear%20fuel" title="spent nuclear fuel">spent nuclear fuel</a>, <a href="https://publications.waset.org/abstracts/search?q=conduction" title=" conduction"> conduction</a>, <a href="https://publications.waset.org/abstracts/search?q=heat%20transfer" title=" heat transfer"> heat transfer</a>, <a href="https://publications.waset.org/abstracts/search?q=uncertainty%20quantification" title=" uncertainty quantification"> uncertainty quantification</a> </p> <a href="https://publications.waset.org/abstracts/86958/two-dimensional-modeling-of-spent-nuclear-fuel-using-fluent" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/86958.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">220</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1570</span> A Review on Nuclear Desalination Technology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aiswarya%20C.%20L">Aiswarya C. L</a>, <a href="https://publications.waset.org/abstracts/search?q=Swatantra%20Pratap%20Singh"> Swatantra Pratap Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, most desalination plants have been powered by fossil fuels, and to a lesser extent, by green energy. Greenhouse gases emitted by fossil-fuelled plants significantly impact the global climate. So scientists are forced to develop a powerful energy source to protect the environment with greater sustainability due to climate change issues. Nuclear energy can supply much more fresh water than what is currently available. Furthermore, it is more affordable and does not emit any greenhouse gases. This review compares conventional desalination plants with nuclear-powered desalination plants in terms of cost, energy consumption, water recovery, and environmental issues. On the basis of the review conducted, nuclear desalination has been demonstrated to be technically feasible and economically competitive with a variety of fossil fuels, renewable energy sources, and waste heat sources. Nuclear sources have been criticized due to their lack of safety. But studies show, if we were able to handle the issue with care, the problems could be eliminated. Here we're looking at the Seawater Reverse Osmosis Plant (SWROP) at Kudankulam Nuclear Power Plant in Tamil Nadu, India and review the further possibility of implementing nuclear desalination technology in other states of India. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=energy%20consumption" title="energy consumption">energy consumption</a>, <a href="https://publications.waset.org/abstracts/search?q=environmental%20impacts" title=" environmental impacts"> environmental impacts</a>, <a href="https://publications.waset.org/abstracts/search?q=nuclear%20desalination" title=" nuclear desalination"> nuclear desalination</a>, <a href="https://publications.waset.org/abstracts/search?q=water%20recovery" title=" water recovery"> water recovery</a> </p> <a href="https://publications.waset.org/abstracts/145504/a-review-on-nuclear-desalination-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145504.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">211</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=nuclear%20threats&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=nuclear%20threats&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=nuclear%20threats&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=nuclear%20threats&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=nuclear%20threats&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=nuclear%20threats&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=nuclear%20threats&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=nuclear%20threats&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=nuclear%20threats&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=nuclear%20threats&amp;page=53">53</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=nuclear%20threats&amp;page=54">54</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=nuclear%20threats&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10