{"id":6393,"date":"2022-06-20T19:02:22","date_gmt":"2022-06-20T19:02:22","guid":{"rendered":"https:\/\/techclot.com\/index.php\/2022\/06\/20\/opc-announces-new-funding-recipients-for-independent-research-assessing-and-mitigating\/"},"modified":"2022-06-20T19:02:22","modified_gmt":"2022-06-20T19:02:22","slug":"opc-announces-new-funding-recipients-for-independent-research-assessing-and-mitigating","status":"publish","type":"post","link":"https:\/\/techclot.com\/index.php\/2022\/06\/20\/opc-announces-new-funding-recipients-for-independent-research-assessing-and-mitigating\/","title":{"rendered":"OPC announces new funding recipients for independent research: Assessing and mitigating &#8230;"},"content":{"rendered":"<p><a href=\"https:\/\/www.google.com\/url?rct=j&#038;sa=t&#038;url=https:\/\/www.priv.gc.ca\/en\/opc-news\/news-and-announcements\/2022\/an_220620_cp\/&#038;ct=ga&#038;cd=CAIyHDkyYmU1MGQ5NjY1NjYxZTA6Y28udWs6ZW46R0I&#038;usg=AOvVaw2fTWqzkBjAN3YtJA4n1EPp\">OPC announces new funding recipients for independent research: Assessing and mitigating &#8230;<\/a><\/p>\n<p><h2><abbr title=\"Office of the Privacy Commissioner of Canada\">OPC<\/abbr> announces new funding recipients for independent research: Assessing and mitigating privacy risks, barriers and inequalities<\/h2>\n<p><strong>June 20, 2022<\/strong><\/p>\n<p>The Office of the Privacy Commissioner of Canada (<abbr>OPC<\/abbr>) is proud to announce the new research and awareness projects funded as part of its <a data-udi=\"umb:\/\/document\/39db8e2f55a341d9a4d79cbb539c4775\" href=\"https:\/\/www.priv.gc.ca\/en\/opc-actions-and-decisions\/research\/funding-for-privacy-research-and-knowledge-translation\/about-the-contributions-program\/\" title=\"About the Contributions Program\">2022-2023 Contributions Program<\/a>.<\/p>\n<p>Understanding that privacy issues may affect diverse groups of people differently, the <abbr title=\"Office of the Privacy Commissioner of Canada\">OPC<\/abbr> wanted to explore the range of privacy-related experiences, barriers and inequalities in this area. Applicants were invited to submit proposals focusing on the theme: \u201cWho is impacted and how: assessing and mitigating privacy risks, barriers and inequalities.\u201d<\/p>\n<p>The <abbr title=\"Office of the Privacy Commissioner of Canada\">OPC<\/abbr> received 33 proposals for the 2022-2023 funding cycle. The proposals were evaluated by the Office based on four main criteria: quality of the proposal, innovation, feasibility and expected results. Following the evaluation process, 11 projects were selected to receive funding support totaling $500,000.<\/p>\n<p>This year the <abbr title=\"Office of the Privacy Commissioner of Canada\">OPC<\/abbr> enhanced its efforts to attract a broader range of applications and was pleased to receive proposals from across Canada, including a successful application from Nunavut. That project will look at privacy, artificial intelligence and machine learning through a \u201crural, remote and Indigenous lens.\u201d<\/p>\n<p>Other new projects will address topics such as First Nations data security; public perspectives on facial recognition technology; and privacy in virtual classrooms.<\/p>\n<p>For a full list of successful projects, see:&nbsp;<a data-udi=\"umb:\/\/document\/6cfcc408d41c4069bc35820530519b39\" href=\"https:\/\/www.priv.gc.ca\/en\/opc-actions-and-decisions\/research\/funding-for-privacy-research-and-knowledge-translation\/cp_bg\/\" title=\"cp_bg\">Contributions Program projects underway<\/a>.<\/p>\n<p>The Contributions Program funds independent privacy research and initiatives that generate new ideas, approaches, and knowledge to help organizations better safeguard personal information and to help Canadians make more informed decisions to protect their privacy.<\/p>\n<p>The Contributions Program was created in 2004 to support arm\u2019s length, non-profit research on privacy, further privacy policy development, and promote the protection of personal information in Canada. Since then, the Program has allocated approximately $8 million to more than 180 projects.<\/p>\n<p>For more information, please contact&nbsp;<a href=\"mailto:Francois.Cadieux@priv.gc.ca\">Fran\u00e7ois Cadieux, Manager, Policy and Research<\/a>, at Francois.Cadieux@priv.gc.ca or at 613-867-7632.<\/p>\n<p><strong><a href=\"https:\/\/blockads.fivefilters.org\">Adblock test<\/a><\/strong> <\/p>\n<p>Published at Mon, 20 Jun 2022 17:32:43 +0000<\/p>\n<p><a href=\"https:\/\/www.google.com\/url?rct=j&#038;sa=t&#038;url=https:\/\/today.tamu.edu\/2022\/06\/20\/artificial-intelligence-on-the-hunt-for-illegal-nuclear-material\/&#038;ct=ga&#038;cd=CAIyHDkyYmU1MGQ5NjY1NjYxZTA6Y28udWs6ZW46R0I&#038;usg=AOvVaw0UZkxfZ59_M8V02Qln3b0o\">Artificial Intelligence On The Hunt For Illegal Nuclear Material &#8211; Texas A&#038;M Today<\/a><\/p>\n<figure class=\"captioned-image alignnone\">\n<div class=\"captioned-image__image\"><img data-recalc-dims=\"1\" decoding=\"async\" class=\"wp-image-303038 lazyload\" data-src=\"https:\/\/i0.wp.com\/techclot.com\/wp-content\/uploads\/2022\/06\/0RoIDK.jpg?resize=640%2C360&#038;ssl=1\" alt=\"a student working in a lab\" width=\"640\" height=\"360\" data-srcset=\"https:\/\/techclot.com\/wp-content\/uploads\/2022\/06\/0RoIDK.jpg 350w, https:\/\/today.tamu.edu\/wp-content\/uploads\/2022\/06\/NUEN-nuclear-AI-chirayath-research-13June2022-768x432.jpg 768w, https:\/\/today.tamu.edu\/wp-content\/uploads\/2022\/06\/NUEN-nuclear-AI-chirayath-research-13June2022-500x282.jpg 500w, https:\/\/techclot.com\/wp-content\/uploads\/2022\/06\/0RoIDK.jpg 1000w\" data-sizes=\"auto, (max-width: 2400px) 100vw, 2400px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 640px; --smush-placeholder-aspect-ratio: 640\/360;\"><\/div>\n<div class=\"captioned-image__caption\" readability=\"7.5\"><figcaption class=\"caption\" readability=\"5\">\n<p>Nuclear engineering doctoral student Sean Martinson works on plutonium solution purification inside a protective glove box in Sunil Chirayath\u2019s nuclear forensics laboratory. <\/p>\n<hr class=\"caption__divider\">\n<p>Justin Elizalde\/Texas A&amp;M Engineering<\/p>\n<\/figcaption><\/div>\n<\/figure>\n<p>Millions of shipments of nuclear and other radiological materials are moved in the U.S. every year for good reasons, including health care, power generation, research and manufacturing. But there remains the threat that bad actors in possession of stolen or illegally produced nuclear materials or weapons will try to smuggle them across borders for nefarious purposes.<\/p>\n<p>Texas A&amp;M University researchers are making it harder for them to succeed.<\/p>\n<p>If border agents intercept illicit nuclear materials, investigators need to know who produced them and where they came from. Fortunately, nuclear materials carry certain forensic markers that can reveal valuable information, much like fingerprints can identify criminals.<\/p>\n<p>For instance, when scientists examine the concentration of certain key contaminant isotopes in separated plutonium samples they can determine three different attributes of the sample\u2019s history: the type of nuclear reactor that produced it, how long the plutonium or uranium was contained in the reactor and how long ago it was produced.<\/p>\n<p>With current statistical methodologies, they can determine these three attributes utilizing a generated database that stores the required information as a mathematical variation of these attributes for various nuclear reactor types and emerge with a good idea of who made the material.<\/p>\n<p>\u201cBut what if investigators are presented with a mixed plutonium sample?\u201d said Sunil Chirayath, author of a new study on nuclear forensics recently published in the journal <a href=\"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/00295639.2021.2024037\" target=\"_blank\" rel=\"noopener\"><em>Nuclear Science and Engineering<\/em>.<\/a>&nbsp;\u201cSuppose the adversary is mixing materials from two nuclear reactors at two different times, and that material is cooled for different times. A bad actor might do this intentionally to disguise it.\u201d<\/p>\n<p>Mixed samples of nuclear material are significantly more challenging to identify with traditional methodologies. In a real-world situation, the extra time required could have a catastrophic impact on the global community.<\/p>\n<p>To improve the process, Chirayath, associate professor in the Department of Nuclear Engineering and director of the Texas A&amp;M Engineering Experiment Station\u2019s&nbsp;<a href=\"https:\/\/nsspi.tamu.edu\/\" target=\"_blank\" rel=\"noopener\">Center for Nuclear Security Science and Policy Initiatives<\/a>, along with his research team, has developed a methodology using machine learning, a type of artificial intelligence.<\/p>\n<p>He can produce identifying markers through simulations, and then store that data in a 3D database. Each attribute is one level of the database, and a standard computer can quickly process the data and lead investigators to the reactor type that produced the plutonium sample \u2014 and, potentially, the suspects \u2014 by joining other pieces of the puzzle gathered through traditional forensics.<\/p>\n<p>Three experiments of irradiating uranium using three different reactor types and post-irradiation examinations have been conducted at Texas A&amp;M to date. Without knowing the samples\u2019 origins, doctoral student researcher Patrick O\u2019Neal successfully identified where each of the plutonium samples was produced by using machine learning.<\/p>\n<p>The work is being done through a&nbsp;<a href=\"https:\/\/engineering.tamu.edu\/news\/2022\/06\/New-methods-for-nuclear-detection-being-developed-through-consortium-collaboration.html\" target=\"_blank\" rel=\"noopener\">consortium of national labs and universities<\/a>&nbsp;funded by the U.S. Department of Energy\u2019s National Nuclear Security Administration. The consortium focuses on development of new methods of detecting and deterring nuclear proliferation and to educating the next generation of nuclear security professionals. Chirayath\u2019s team will soon run one more irradiation and the corresponding post-irradiation examination with funding already in place.<\/p>\n<p>The next step is to take this machine-learning methodology to high-level government labs, where researchers can work with much larger samples of nuclear materials. University labs are constrained by more restrictive irradiation safety limits.<\/p>\n<p>Chirayath is confident efforts to prevent nuclear proliferation are working. The international Treaty on the Non-Proliferation of Nuclear Weapons arose from concern about atomic weaponry, and all but four countries \u2014 India, Israel, Pakistan and South Sudan \u2014 signed it.<strong>&nbsp;<\/strong>North Korea signed it but walked away from it later.<\/p>\n<p>Chirayath also notes that with the rise in nuclear energy production comes an increased risk that the technology will be used to make weapons capable of mass destruction.<\/p>\n<p>\u201cWe have to make sure materials are not diverted from peaceful use,\u201d he said. \u201cWe need to double-up our tools and methodologies, but it\u2019s not just technical tools. We also have to double-up on policies and agreements to prevent proliferation from happening.\u201d<\/p>\n<p><strong><a href=\"https:\/\/blockads.fivefilters.org\">Adblock test<\/a><\/strong> <\/p>\n<p>Published at Mon, 20 Jun 2022 17:32:30 +0000<\/p>\n","protected":false},"excerpt":{"rendered":"<p>OPC announces new funding recipients for independent research: Assessing and mitigating &#8230; OPC announces new&#8230;<\/p>\n","protected":false},"author":3,"featured_media":6392,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-6393","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-artificial-intelligence"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/techclot.com\/wp-content\/uploads\/2022\/06\/0RoIDK.jpg?fit=350%2C197&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3orZX-1F7","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/posts\/6393","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/comments?post=6393"}],"version-history":[{"count":0,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/posts\/6393\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/media\/6392"}],"wp:attachment":[{"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/media?parent=6393"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/categories?post=6393"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/tags?post=6393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}